TECHNOLOGY PIRACY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP88-01070R000100690004-6
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
11
Document Creation Date:
December 20, 2016
Document Release Date:
March 9, 2007
Sequence Number:
4
Case Number:
Publication Date:
May 5, 1983
Content Type:
OPEN SOURCE
File:
Attachment | Size |
---|---|
![]() | 625.66 KB |
Body:
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
RADIO TV REPORTS, INC.
4701 WILLARD AVENUE, CHEVY CHASE, MARYLAND 20815 656-4068
PROGRAM American Interests STATION WETA-TV
PBS Network
DATE May 5, 1983 10:30 P.M. CITY Washington, D.C.
Technology Piracy
WILLIAM SCHNEIDER: Today there continues to be a
serious threat to our national security from Soviet technology
piracy, in which an increasing one-way stream of U.S. technology
is moving to the Soviet Union.
PETER KROGH: The Soviets are modernizing their military
through a vast flow of high-technology from the West. The
Administration calls it a hemorrhage that must be stopped. But
critics say the government is overreacting with policies that
will cripple U.S. industry's hottest exports and blunt America's
edge on the newest frontier of world trade.
REP. DON BONKER: For some people, it's a hemorrhage.
To others, it's harassment of the business community.
KROGH: The Soviet military bloc has an edge over the
West in sheer numbers, fielding more troops, more tanks, more
planes, more missiles. The Western Alliance confronts this
challenge with superior technology. Its arsenal is more advanc-
ed, its weapons presumed more effective, many of them combat-
proven on the battlefields of the Middle East. It is through
this primacy in technology that the West maintains the balance of
military power.
RICHARD PERLE: In the last several years we have
suffered a serious loss of technology from the West. This has
shown up in the form of the increasing sophistication of Soviet
military equipment.
KROGH: Alarms about growing Soviet military might are a
standard feature of Washington's politics. How serious is this
threat? Very serious, according to the Democrats on the Senate
OFFICES IN: WASHINGTON DC, ? NEW YORK ? LOS ANGELES ? CHICAGO ? DETROIT* AND OTHER PRINCIPAL CITIES
Material supplied by Radio N Reports, Inc. may be used for file and reference purposes only. It may not be reproduced, sold or publicly demonstrated or exhibited.
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Investigations Committee. They found that priceless U.S.
technology has made its way to Moscow, contributing to giant
strides in Soviet military strength. Ominous, accoding to the
intelligence community, whose first detailed study of the loss of
strategic technology revealed, quote, Western technical superior-
ity is eroding, as the Soviet Union and its allies introduce more
and more sophisticated weaponry, weapons that all too often are
manufactured with the direct help of Western technology.
Among the examples cited were a new scheme for hardened
missile silos, clearly patterned after American designs; the
rapid development of the Ilyushin-76, a large military transport
with obvious similarities to the American C-141; and catapult
systems like those used on American carriers, common throughout
the West, but, to quote the CIA, beyond Soviet naval experience.
In fact, much of the technology the West takes for
granted is beyond Soviet capabilities. According to one official
charged with frustrating Moscow's acquisition efforts:
WILLIAM VON RAAB: Right now the Soviet Union is
incapable of fulfilling its own ambitious military production
goals. They know they need Western technology, and know specifi-
cally what technology they need.
KROGH: In other words, Western technology is a neces-
sity for the Soviets, not a luxury. The CIA's national intelli-
gence officer for science and technology explains why.
JAN HERRING: Although the Soviets do have good scien-
tists and engineers, their political-economic system is not
conducive to technological innovation.
Take a look at the civil sector. Their oil and gas,
their chemicals, their agriculture, and even their automotive
industry requires large amounts of Western technology to be
productive. In fact, the military sector in the Soviet Union
even needs higher levels of technology to produce the high-
performance weapons that their military planners demand.
KROGH: Technology requiring an investment of hundreds
of millions of dollars and years of research, except that the
Soviets have found a shortcut.
SCHNEIDER: The Soviet technological gains obtained
through a carefully crafted acquisition program are providing
them with significant savings in time and money in their military
research and development programs, rapid modernization of their
defense industrical infrastructure, the closing of gaps between
our weapons systems and theirs.
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
KROGH: As a requirement for military modernization,
Moscow's pursuit of Western technology is not left to chance.
According to the CIA, the Soviet effort is massive, well-planned
and well-managed, a national-level program approved at the
highest party and governmental levels.
In this CIA diagram of the Soviet bureaucracy, all the
ministries in blue are known to be heavily involved in procuring
Western technology, six ministries in all, employing as many as
20,000 party cadre in such work. At least one entire ministry
does nothing but pursue technology from the West.
DR. IGOR GLAGOLEV: The State Committee on Science and
Technology [unintelligible] depends on studies, is devoted almost
exclusively to the acquisition of Western technology and...
KROGH: Before he defected in 1976, Dr. Glagolev was an
adviser to the Soviet Politburo and the Central Committee of the
Communist Party, as well as a section director in the Academy of
Sciences. Based on his experience, he told Congress to ban the
transfer of all technology to the Soviets.
DR. GLAGOLEV: All kinds of technology which are
required from the West are used first of all for the military
purposes and for the purposes of the KGB, because these two
situations have the first priority in the Soviet Union.
KROGH: It is the KGB, the Committee for State Security,
which oversees the entire Soviet effort to acquire Western
technology. It is a responsibility not likely to be diluted now
that Yuri Andropov, former head of the KGB, presides in the
Kremlin.
VON RAAB: Their success, until lately, has been
alarming for us, but certainly most gratifying for them. They
have acquired computers, lasers, guidance and navigation systems,
structural materials, and microprocessors, just to name a few.
But all their acquisitions have two things in common.
They have military value and they were acquired with relative
ease.
KROGH: In fact, some of Moscow's most valuable acquisi-
tions have been obtained openly and legally through trade by
purchasing items ostensibly for civilian use and diverting them
to the military. Three examples:
In 1972 the Soviets scored a major breakthrough in missile
accuracy by purchasing American machinery to manufacture indus-
trial ball bearings, the kind of high-speed precision ball
bearings that are also critical to the development of ICBM
guidance systems.
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
A few years later, Japan sold the Russians two huge
floating drydocks, quite beyond the production capability of any
Soviet shipyard. The Russians diverted them to the servicing of
their newest aircraft carriers.
And then there was the Kama River truck plant, the
world's largest and most sophisticated, built with American
technology and credit. In 1979 the Soviet Army invaded Afghani-
stan on the wheels of American know-how.
It was Afghanistan which promoted the first U.S. efforts
to ban the sale of all advanced technology to the Soviets. But
the legal trade of technical hardware is only one source of
technology for Moscow. Raw scientific data is another. As the
CIA points out, an open society provides countless opportunities
for information-gathering.
HERRING: From the hundreds of cases of military-
significant technology that we have studied, we have found that
something of the order of 70 percent had been acquired by Soviet
intelligence operations, both overt and clandestine. On the
other hand, we believe that the remaining 30 percent of the
acquired military-
significant technology is just as important. It comes from open-
source publications, from student exchanges, and from just the
uncontrolled sale of technology on a worldwide basis.
KROGH: What they cannot buy, the Soviets can often
learn about in other ways. Critical information is readily
available at scientific trade fairs and professional gatherings,
in popular magazines, technical journals, and government publica-
tions, and through the Freedom of Information Act.
SENATOR SAM NUNN: What I think is ridiculous is that
our Freedom of Information Act is now so broad that if Qaddafi of
Libya wrote in and demanded of the government that he be given
access to certain unclassified information, he could get it. If
Andropov, the head of the Soviet Union, wrote in and signed his
own name and title, under our Freedom of Information Act, he is
absolutely entitled to it.
KROGH: Finally, according to Dr. Miles Costick, an
expert on Soviet industrial espionage, the Soviets tap univer-
sities and private research institutes.
DR. MILES COSTICK: For instance, Massachusetts Insti-
tute of Technology was one of the principal targets because it is
known as a defense contractor and doing classified work for the
United States defense community. The inertial navigation system
for the United States intercontinental ballistic missiles and
intercontinental bombers was developed in the mid- and late '60s
at the MIT.
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
KROGH: The prime concern of the intelligence community,
however, lies elsewhere.
HERRING: There has been some military-significant
technologies acquired from our universities. But in the most
part, it's been a very small part of this transfer flow.
KROGH: The real hemorrhage, fully 70 percent of what
the Soviets acquire, is the result of espionage.
October 1982. The Swedish Navy searches in vain for
what it thinks is a Soviet submarine prowling near a highly
classified military base. The sub eludes them. The reason,
according to one authority, is that it was a new mini-sub with
some extraordinary characteristics.
DR. COSTICK: One of them was that it could dive deeper,
all the way to the ocean floor, at depths which no military
submarine could have ever reached.
Number two, those submarines, being small and not having
magnetic properties, could not be detected by the traditional
anti-submarine warfare technology.
KROGH: Such a submarine does exist. The technology was
developed for civilian deep sea research by an American firm,
then purchased by a Canadian company. By law, it could not be
exported to the Soviet Union. But the Russians got hold of it
anyway.
DR.COSTICK: How were they able to acquire this techno-
logy? Well, they have gone to the firm and made an offer which
was difficult to refuse. They were prepared to pay several times
the price. However, the export license which was required for
such a submarine and such a technology was denied. The Soviets
set up a dummy firm in Switzerland. And export of such an item
to Switzerland would not be controlled because Switzerland is not
a controlled country. That particular firm came and bought this
submarine from the Canadian firm. It was dismantled, placed into
crates, shipped via air freight to Zurich, Switzerland, where it
was immediately re-routed to the Aeroflot -- namely, the Soviet
government airlines -- and shipped to the Soviet Union.
KROGH: The U.S. to Canada to Switzerland to Russia.
Such diversion schemes are all too typical, according to the
Commerce Department's new Office of Export Enforcement, which is
trying to stop them.
THEODORE WU: The Soviet Union and the East Bloc
countries, individually and collectively, want to get their hands
on U.S.-origin and other Western-origin technologies. And we can
see
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
that especially in the last couple of years that the number of
suspected illegal transactions, as well as clearly unlawful
export of controlled technologies, are on the rise.
KROGH: As a former U.S. attorney in California,
Theodore Wu had his own close encounter with such practices. In
1980 he helped convict the president of an optical company who
sold laser mirrors like these to the Russians. They look
harmless, but they're similar to those developed for the Air
Force flying laser laboratory for experiments in anti-missile
defense systems. In this case, the initiative was taken by an
American businessman.
aggressive.
But usually Soviet agents have to be more
WU: They gave so-called shopping lists as to what
items
they
want
to get and when they want to get these items, how
much
they
are
willing to pay to get these items. And indeed,
they
have
very
good information as to who manufacture some of
these
items and where these manufacturers are located, and
what
security safeguard, if any, do these manufacturers have.
KROGH: The current Soviet shopping list includes
advanced computers; microelectonics, including machinery for
manufacturing high-speed integrated circuits; and, of course,
laser technology for the development of Star Wars type anti-
missile and anti-satellite systems.
This is the world of high technology. And in the United
States, two regions in particular have become centers of high-
tech industry, the East Coast between Boston and Washington,
D.C., and the West Coast, especially a 30-mile strip just south
of San Francisco known as Silicon Valley. Nearly 1500 companies
are clustered here, including some of the largest in the high-
tech field. This is the home of the silicon microchip, perhaps
the epitome of what is called dual technology. Dual because
microchips are not only the brains of civilian calculators and
computer games, but of the most advanced weapons, as well.
Advanced military technology, reflecting its dual
civilian and military use, is now developed by private companies,
often operating in vulnerable industrial parks like these rather
than in closely guarded government plants. Ask anyone who
believes there is a technology hemorrhage where it starts, and
the answer is the same.
SENATOR NUNN: I think the greatest area is probably in
the private sector and in areas where the Department of Defense
is not directly involved.
HERRING: These companies oftentimes are not capable of
protecting themselves against the HUMINT penetration operations
of the Soviet bloc.
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
KROGH: Until very recently, most private companies paid
little heed to security measures. So as much as $20 million
worth of microelectronic gear has been stolen each year just from
California's Silicon Valley alone. Much of it ends up on the
black market or in what local police call a gray market of semi-
legal trade. But for the Russians it's often more like a
supermarket.
For example, Werner Bruckhausen, thought to be an East
German agent, funneled an estimated $9 million worth of electro-
nics to the Soviet bloc by purchasing large quantities of such
stolen goods. He smuggled them out through a network of phony
corporations, part of an international web of some 400 dummy
firms spun by the Soviet bloc throughout the West.
There are also more traditional espionage cases. Marian
Zakarski was a Polish spy masquerading as vice president of a
firm owned by the Polish government. He enticed and bribed
William Bell, a disenchanted engineer at Hughes Aircraft, into
divulging critical information on America's newest warplanes,
like the F-15, the B-1 bomber, the Stealth bomber, and several
types of missiles.
The Pentagon estimates that Moscow meets 50 percent of
its needs for strategic technology through espionage conducted by
3000 special field agents. For the FBI, it's an increasing
headache.
EDWARD O'MALLEY: Not only are the activities by the
Soviets increasing, but the activities of their surrogates here
in the United States -- and when I say surrogates, I mean the
Eastern European intelligence services -- are on the increase
also.
JOHN MCGUIRE: His story was that he was a Belgium
businessman doing business in Russia, and they were pressuring
him for a long time.
KROGH: John McGuire was the target of what started out
as an indirect approach by the Soviets. McGuire is president of
a Virginia-based firm called Software A.G. of North America,
which produces computer programs for classified use. The key to
unscrambling these programs is called a source code.
MCGUIRE: It's analogous to the chemical formulas or a
Coca-Cola formula. You can drink the Coke, but you don't
understand what the process was to produce that liquid.
KROGH: Among the customers for McGuire's system are the
CIA and the Marine Corps. The Russians wanted McGuire's source
code.
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
MCGUIRE: It would save them ten years in understanding
the most advanced version of data base management. It would have
collapsed the time necessary to achieve that sophistication on
their own computers.
KROGH: McGuire was offered nearly half a million
dollars for the code by a Belgian, Mark Degeiter, who admitted
he'd sell it to Moscow. McGuire called the FBI.
MCGUIRE: Under guidance of the FBI, they got a court
order, they tapped my phone, they put a video camera in my
office. We were trying to get Degeiter to come in here and
discuss the situation. He was flitting around the country and
over in Russia and Europe, out in Silicon Valley in California.
And so I had a lot of phone conversations with him over that
period of time, maybe 30 or 40. At which point, we were negotia-
ting. For example, he wanted me to deliver the source code in
Belgium and get paid off in Switzerland in cash. And, of course,
the FBI wanted the transaction to take place under surveillance
in the United States, so that we could apprehend him.
KROGH: Because of McGuire's cooperation and persever-
ance, the FBI finally nabbed Degeiter. But at FBI Headquarters,
the realization that such cooperation is far too rare and
industrial security much too lax led to DECA, Development of
Counterintelligence Awareness, a program to alert more than
11,000 private firms with defense contracts to the danger of
espionage.
O'MALLEY: It's a program where, having identified these
firms, we'll go out and we'll talk to them. We'll talk to them
about our own responsibilities in the counterintelligence area
and how they can be of assistance to us, and perhaps how we can
be of assistance to them. And we'll also tell them about the
threat posed by the intelligence services of the hostile coun-
tries and others.
KROGH: But the FBI's DECA program is only a small part
of the government's plan to halt technology leaks, and the only
part that isn't controversial.
VON RAAB: Through Operation Exodus, the United States
has begun the first major systematic effort to keep critical
technology out of the hands of potential enemies, while facili-
tating trade and commerce with trading partners abroad.
KROGH: There are some 300 ports, airfields and roads
through which to smuggle technology out of the United States.
Exodus is trying to cover all of them, including Baltimore
Harbor. It's a new rule for Customs, which traditionally
Approved For Release 2007/03/09: CIA-RDP88-0107OR000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
monitors what comes into the country. Now nearly 300 special
agents and inspectors are keeping tabs on what goes out.
But dockside inspections are only a part of the opera-
tion. Like the FBI's DECA program, each local office is respons-
ible for checking out nearby companies, to educate them and
gather information about them.
Senior inspector Steven Knox explains how it's done.
STEVEN KNOX: We go through the exprt register item-by-
item. We will go through communications systems item-by-item.
Here's one which manufactures underwater communications
systems. Our primary question would be, "What is the sophisti-
cation of the underwater communications system?" because it could
be such things as for submarine use, obviously, for naval use.
We will go out. We will pay them a visit.
KROGH: The Exodus program is the cutting edge of a
campaign to control the illegal export of high technology. It is
also a magnet for controversy. Congressman Don Bonker tried to
close down the Exodus program in Seattle and Portland when
exporters complained that legitimate shipments were being
subjected to costly delays.
REP. BUNKER: Opeation Exodus is a new and, I think,
unwarranted dimension to the enforcement program under the Export
Administration Act. There was no Operation Exodus a few years
ago. It was conceived in the White House and funded by the
Department of Defense. And now they're coming to Congress,
asking for $30 million to carry out an enforcement function that
is already being implemented by the Department of Commerce.
KROGH: But when it comes to deterring illegal exports,
the Commerce Department has not done its job, according to
critics, who charge that because the department's main function
is to promote trade, it is ill-equipped and uninclined to police
its own customers, the export industry.
Commerce has responded to this charge by creating a new
Office of Export Enforcement, headed by Theodore Wu, who has been
defending his efforts before Congress.
WU: And we are now well on the way to becoming a highly
specialized, trained export enforcement investigative arm that is
well supported by intelligence operations.
KROGH: But Wu has not pacified the critics, including
Senator Sam Nunn, whose 18-month investigation of technology
leaks led him to propose transferring all law enforcement
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
functions to Operation Exodus and its experienced personnel from
the Customs Service.
SENATOR SAM NUNN: So this is right up the alley of
Customs. It's what they've been doing for years and years. And
I think it makes all sorts of sense to put law enforcement
functions in an agency that has law enforcement history and
background and capability.
KROGH: The trade industry has been aroused by the
Exodus controversy, knowing that it masks a profound policy
dispute over export controls now being fought out within the
Administration.
FILM NARRATOR: CBEMA, the Computer and Business
Equipment Manufacturers Association, is the voice of our industry
in Washington, D.C.
KROGH: Trade organizations such as CBEMA are fighting
rigid export controls that they fear will squeeze them out of the
world market without impairing Moscow's access to advanced
Western technology.
FILM NARRATOR: Remove export barriers for all products
and services that are not subject to genuine national security
interests.
KROGH: They are especially upset by the Administra-
tion's failure to revise the Pentagon's list of critical military
technology, items barred from export because of their supposed
strategic value. Critics claim the list is too big, too incon-
sistent, and simply unrealistic.
Dr. Hylan B. Lyon, a CBEMA spokesman, formerly served as
White House Science Adviser to four Presidents.
DR. HYLAN B. LYON: Anything can be used for military
purposes. All technology in the U.S. is used by the military.
What you have to do is decide which items make a significant
contribution to the Soviet military. The weight of evidence is
that a minicomputer or home computer won't make a significant
contribution.
KROGH: Even some of the strongest supporters of tighter
controls agree.
SENATOR NUNN: The government has to have credibility.
And to have credibility, we have to have a list that's narrow
enough that businesses believe that we really do know what we're
doing. If the list is too long, if the list contains many items
that can be purchased off the shelf, so to speak, in this country
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6
or in other countries, then, to that extent, businesses get
turned off.
KROGH: Moscow's access to advanced technology from
other countries is a turn-off to American businessmen faced with
stringent export controls. They point out that U.S. efforts to
block construction of the Soviet gas pipeline failed precisely
because France, Germany, and other members of the West's Coordi-
nating Committee on Trade, called COCOM, refused to withhold
their own technology from Moscow.
DR. LYON: You can make the assertion that almost any
technology that the U.S. has also exists within COCOM. So if the
Soviets want to acquire Western technology, they can acquire it
from any one of those sources.
REP. BONKER: If we're going to say to a U.S. manufac-
turer, "You can't export because this is a dual-use item," or
whatever; and France and Japan and England and West Germany and
other countries don't comply with similar license requirements,
then the only result of the program is to injure U.S. industry.
KROGH: U.S. industry is concerned that the Admini-
stration is trying to launch an all-out economic war against the
Soviet Union. They don.'t think such a war can be won. They
don't think they should be used to fight it. But they fear that
high technology, the U.S. trump card in the highly competitive
world of international trade, can be squandered by restricting
instead of promoting exports.
But the final battlefield will be in Congress, as it
moves toward renewal of the Export Administration Act, which
expires in the fall, legislation which, unexpectedly, is becoming
a focal point of U.S. policy toward the Soviet Union.
REP. BONKER: There are hawks in the Congress and hawks
in the Administration who would like to see a cutoff of almost
all our high technology, who have rather paranoid sentiments
about the so-called hemorrhaging of our technology.
SENATOR NUNN: The whole thing is, you're not paranoid
if they're really after it. And I think the Soviets really are
after our technology.
Approved For Release 2007/03/09: CIA-RDP88-01070R000100690004-6