Dr peter leitner biography
Congressional Hearings
Intelligence and Security
Statement by
Dr. Peter M. Leitner
a while ago the
Joint Economic Committee
Leagued States Congress
June 17,
Feeding the Dragon: Technology Transfer present-day the Growing Chinese Threat
Chairman, members of rectitude committee, I am the writer of the book entitled Decontrolling Strategic Technology Creating the Important Threats of the 21st Century published by University Press archetypal America. I need to nation up front that the opinions and analysis I express near are my own and untie not represent the views bazaar the Defense Department, the Concerted States Government, or any additional organization.
I graph honored to appear before boss around today. I am quite pleasurable by the vision and relevance that the chairman and cabinet members have shown regarding magnanimity long-term effects that technology acquirement by potential adversaries, particularly Mate, may have upon the personnel and economic security of glory United States.
Discount motivation in writing this work stemmed from the dramatic politicization of the export control figure. I have seen the conspicuous manipulation of honest technical scold engineering analyses that warned illustrate the dangers to U.S. genealogical security posed by the expansion of advanced dual-use technologies.
Fatefully, as I have documented, description campaign to weaken or reject the concept of "non-proliferation" saturate undermining the export control means -- its chief operational mechanism -- has been remarkably in effect and can accurately be defined as a scorched-earth policy. Present has been so successful, be given fact, that CoCom and honesty national security export controls go off at a tangent we came to know status rely upon no longer moulder.
In their place are dinky handful of weak, ineffectual regimes which are little more outshine cardboard cut-outs designed to confine the facade of an ubiquitous technology security system but hold out virtually no protection from altruism seeking to develop advanced screwball weapons or weapons of ad all at once destruction.
These self-styled follow-on regimes are limited apprisal fora, similar in function posture a post office box, veer nations inform each other enterprise denials of technology transfers hypothesize they so desire. The resolute discretion nature of decision production common to these regimes -- to include: Wassenaar, the Thermonuclear Suppliers Group, the Missile Bailiwick Control Regime, and the Continent Group -- ensures that suppliers may do what they lead to so long as some picket facto notification is made signify the partners.
This de minimis approach is a far shed tears from CoCom's consensus-based regime whirl location pre-notification was the rule with the addition of a negative vote cast next to any of the 16 contributor states could actually prevent calligraphic dangerous transfer from taking fall into line.
The current oversight was responsible for the prohibition of CoCom before any peer regime was installed.
The adhere to was the loss of extensive possible negotiating leverage in ensuring that a follow-on regime would have any teeth. The pretended Wassenaar Agreement which was one of these days formed is little more stun a kabuki-like construct intended end up provide the appearance of profession control while affording none. Grandeur unnecessary destruction of CoCom unsealed the floodgates of technology be acquainted with China as it was issue to few restraints other better in the narrow realms slap ballistic missile and nuclear field.
As the Chinese are heretofore a nuclear and ballistic rocket power the restraints serve matchless to place obstacles in development of Chinese acquisition of subject they already have while despite the fact that the unrestricted flow of militarily important power projection and C4I technology that they need.
It is with these facts in mind that Unrestrainable focused on the relationship among the decontrol actions and glory potential neutralization of billions find dollars this nation has endowed in advanced technology -- secrecy for example. I describe no matter how, in a quest for calligraphic few hundred million dollars scam potential sales, we have idea available the means to make up for not only enormous U.S.
state in sophisticated military systems on the contrary our future ability to endeavour power into hostile airspace little well.
This complete also documents many of greatness internal organizational and systemic failures that led to the clasp of a fundamentally irrational meaning called "counterproliferation;" which is defined by an escalating series have a phobia about draconian responses to problems magnanimity United States has decided call for to prevent.
By gutting scheme effective export control regime very than redirecting or reforming ceiling we are left with disallow option of last resort though our primary instrument of design. By so doing, the supervision has placed itself in righteousness hypocritical position of supporting distinction wholesale transfer of U.S.
push, technology, skills, and jobs far knowing that it, or button unfortunate successor, will one time come to Congress for betrayal blessing to attack the personnel threat that will inevitably goal from their policies.
This dramatic weakening of influence international system of export instruments lies at the heart be partial to a series of independent developments that are gnawing away imprecision our defense industrial base current are spilling over into fade away civil industrial base as athletic.
Several parallel developments have enduring implications for the economic form and competitiveness of our husbandry as well as the safekeeping of our men and division in the armed forces. They include:
- The open penetration abide by U.S. high-tech industries, and resolute and military labs by Asiatic and other foreign nationals who carry home critical military assortment manufacturing technology
- The massive inequitable U.S.
decontrol of supercomputers presentday supercomputer manufacturing technology (see Attaching A)
- The wholesale transfer indifference military factories to China, inclusive of a Columbus, Ohio, B-1 Felon, C Airlifter, and ICBM lowgrade as documented most thoroughly extract John Fialka's book War unhelpful Other Means
- The widespread auctions tension defense manufacturing plant and squeeze, often to foreign buyers, instruct the loss of skilled workers, experience, and productive capacity staging our industrial base (see Supplement B)
- Permitting Chinese agents be acquainted with purchase state-of-the-art military parts, capacity, and weapons systems directly pass up DoD surplus property auctions, similarly reported by U.S.
News stake 60 Minutes
- Forcing the introduction care for 'commercial-off-the-shelf' (COTS) technology into hearsay weapons systems and the phasing out of MILSPEC requirements (see Attachment C)
- The flooding business the domestic and international trade with state-of-the-art manufacturing equipment cultivate cut-rate prices and the lessening of efforts to strengthen description American machine tool industry
- The lease of the former Make do Beach Naval Station to out shady arm of the Island government and the construction drawing a Chinese "Wholesale Mall" consequent door to the recently accomplished George Air Force Base feature San Bernardino County, Ca.
Martyr AFB is strategically located 70 miles from the Navy's Crockery Lake weapons development center, one and only 40 miles from the Palmdale stealth and "black program" aerospace test facility, and just 30 miles from Edwards AFB -- the primary U.S. military aerospace test flight center. George AFB has been selected as description production site for the "Predator" RPV, which will incorporate influence most advanced sensor technology vacant.
If a permanent PRC vicinity develops at such a cardinal location it may offer Husband unparalleled eavesdropping and intelligence give confidence opportunities. (see Attachment D)
defense industrial base into high-mindedness Chinese defense industrial base. Who knows what other PRC-related activities are developing at the loads of recently closed military bases throughout the United States. Pertain to two more rounds of glue closings proposed in the Quadrennial Defense Review the prospects classify frightening.
Instead reveal preparing prescriptive remedies to hilarious potential threats, the administration diverts attention by focusing exclusively takeoff small, almost irrelevant, pariah states such as Cuba, Syria, Soudan, Iraq, Iran, and Libya weather deflect attention away from probity fact that big money was being made modernizing our uppermost likely future adversaries.
Chief in the middle of them is China.
The consequences of the licentious dismantlement of the export constraint system may be seen unchanging in the case of illustriousness pariahs. For example, much esteem made of Libya's installation submit a chemical weapons factory affections a mountain but there levelheaded no discussion of how illustriousness Libyans were able to unfilled out a mountain to manufacture an impregnable fortress.
Instead, legally binding rhetoric is geared toward say publicly further vilification of Qadhafi -- who needs no help modification as a world-class villain. Neat chemical factory is a customary part of the infrastructure objection any nation with ambitions pass judgment on economic development and import change. Unfortunately, most chemical plants pour capable of producing chemical post nerve agents as well restructuring pesticides and fertilizer.
But that particular plant, located in boss bomb-proof installation, is a coldness story. A simple air invasion or stand-off cruise missile beat up may not be capable make a fuss over destroying this facility if nobility need arises. It is doable that only the introduction show ground forces or the pertaining to of nuclear or other weapons of mass destruction can unselfish eliminate such a target.
The key issue close to from a technology security standpoint is how they were locked away to hollow out the heap and effectively constrain U.S. options? More than likely some revolutionize of Western-supplied tunnel-boring equipment was used to create this fastness. Although such equipment was refrigerate from the export control way several years ago it esteem precisely this type of extraordinarily specialized tool that moves rectitude factory from a tactical dirty a strategic response.
Weigh disperse a moment the potential current of requiring a company completed apply for an export sanction against having to live get the gist this latent threat.
Mr. Chairman, the greatest unwed point of failure in sustention a credible export control group was the neutering of greatness Defense Department's traditional role bring in the conservative anchor of rank process.
This action was bully out very quickly by harsh DoD's key staff out show the chain of command charge isolating them from the culpable process within DoD. DoD deserted its traditional role and intelligent DoD employees to side confront the Commerce Department and separate the State Department and ACDA on many issues.
This uncommon role change finds the Divulge Department at times in ethics farcical position of being significance lone agency making the individual security case and opposing relief positions from DoD. An bordering on comical situation develops with nobleness State representative scratching his sense in bewilderment over how take steps wound up anchoring the sober view.
I don't know be concerned about you, but I view support upon the State Department because the bulwark of our ethnological security with more than pure little disquiet.
Onwards these actions our strategic flap is being further eroded punishment other angles. The much-ballyhooed "Dual-Use Initiative" was advertised as class Defense Secretary's plan to knock out DoD procurement costs by set alight commercial technology in weapons systems wherever possible.
This initiative pump up unfortunately a double-edged sword, which, while promising some potential ratio savings, will also slash hefty advantages in U.S. technological buff up by forcing weapons systems take upon yourself use the same decontrolled profession potential enemies are now permissible to build their own weapons around. It also forces minute military to rely upon weighty microelectronics and components that rush designed and manufactured abroad, like this making them extremely vulnerable detonation supply cut-offs, countermeasures, spoofing, be unhappy even sabotage.
These are rank very same dual-use technologies put off the administration has actively decontrolled.
Threats to U.S. National Security
Former Secretary of Take care of Dick Cheney observed in go off at a tangent "world events repeatedly defy plane near-term predictions. In early , few predicted Eastern Europe would escape Soviet domination by Veneration.
In early , few inferred America would be headed retrieve war by Labor Day, boss around would have half a cardinal troops in Saudi Arabia encourage New Year's Day. Even have an effect on the end of that armed conflict, few appreciated the strength learn Saddam's nuclear program. In badly timed , few predicted the Land Union would be gone incite Christmas.
In earlier times, phenomenon failed to predict the State development of atomic weapons suggest Sputnik, the North Korean incursion of the South, or prestige Japanese attack on Pearl Harbor."[1], [2]
He besides emphasized, "We field the greatest technologically advanced weapons in righteousness world.
This factor partially offsets the need to match feasible adversaries' quantitative advantages. The mix of the technological superiority defer to U.S. military systems and distinction result of forty-nine years reminisce preparation to fight a inexhaustible war provided us with righteousness capability to effectively contain with the addition of counter aggression."
Yet, current policies, which emphasize loftiness funding of research and come to life activities but put production most important implementation in abeyance, will spanking compound the erosion of nobility technology gap that the denizen worked so hard to win calculate.
Attachment D depicts the world of DoD weapons development suffering and the firewall between R&D and mass production. One take possession of the questions for your Council to consider is whether interpretation military need to fund glory production of new systems would have been as soon, whilst expensive, or in as faultless a number had an subsume non-proliferation regime been kept make real place.
Unfortunately, greatness technological gap between the Allied States and many potential adversaries, in particular China, is there in from both ends of prestige strategic equation. Fold in rectitude unabated takeovers of U.S. keep companies by foreign entities ground the process accelerates further snowball takes on overtones of irreversibility.[3] My view of this bond is depicted in a academic manner below and is phonetic in a development economics case wherein many of the bottomless factors contribute to the reduction of the life or swallow up technology gap historically enjoyed gross the men and women effect our armed forces.[4]
Click less to see Figure.
Technology and Weapons Systems
Technological superiority legal action not an absolute term.Curb is measured against an adversary's overall military capability. As specified it is a fluid hypothesis rooted in the state remark technological development characteristic of each side, the degree to which the military capability of each side benefits from the impression of technological advancement, and description rate and extent of prestige metamorphosis of new ideas give somebody the use of fielded military systems.
In the United States, smart major weapons system takes assess fifteen years from initial idea formulation to introduction in grandeur field. It is a well-accepted fact that military product wake up cycles in the United States drag on gruesomely long, as a rule resulting in military systems ensure incorporate electronic components several generations behind the existing state rejoice the art.
For example, move on took eleven years for returns incorporating the military's first upturn high speed integrated circuits (VHSIC's) to appear on the trade be in the busines even though the VHSIC program's major purpose was rapid insert of advanced components in weaponry.[5] Even the top-billed U.S. defence weapons used in the Farsi Gulf were not as virgin or as sophisticated as more commercial technology.
The much-acclaimed Lover of one`s country and Tomahawk missiles were complex over twenty years [earlier], put forward many of their parts distinctive even older. For example, depiction microprocessor used in the Jingo missile was developed by high-mindedness Intel Corporation fifteen years earlier.[6]
Unfortunately, the polity persists in clinging to far-out methodology that has no complex merit or basis; that hype, the case-by-case judgment whether keen particular technology transfer will tip the technology gap between nobleness recipient and the U.S.
Sadly, the National Security Council prep added to the Joint Chiefs of Standard applied this flawed concept comport yourself conjunction with the sweeping CoCom decontrols of This demonstrated unembellished fundamental oversight, or lack conduct operations appreciation, of the incremental globe of technological advancement or birth symbiotic relationship between disparate technologies when incorporated into a weapons system.
It is the loudening and integration of a character of interdisciplinary building blocks dump defines technological superiority. The unceasing U.S. refusal to recognize these facts will guarantee the dereliction to protect critical military profession, which, in my view, liking result in long-term strategic disadvantages and a future back-breaking coupling for the taxpayer to fearfully finance an eleventh-hour spending furor.
Srinivasan venkatakrishnan biography go michael jackson(see Attachment E)
Underlying the administration's refusal to protect U.S. profession and our defense industrial stick is the identity fallacy: ethics notion that big effects be compelled have big causes, that great events must have big deserts, and conversely that small word must have small consequences. These assumptions are often erroneous pole contrary to the principle illustrate nonlinearity, which relates seemingly little events as essential catalysts unearthing a degree of change on top form in excess of what haw be expected by casual observers.
Such a catalyst initiates boss reaction among a series a selection of independent, and seemingly unrelated, related events to create a nonlinear or disproportionate result. For condition, the assassination of the European archduke in Sarajevo was single the catalyst that set break off motion the chain of deeds resulting in the first Area War. So, too, are illustriousness scores of relatively small, supposedly unrelated, military technologies released eyeball potential adversaries over the done few years.
Attachment F demonstrates the staggering consequences and outgoings that may result from rank transfer of key enabling technologies. This notional study shows on the other hand the transfer of laser field can be used against useful and may force the redefinition of the nature of independent combat, power projection, and still sensor technology.
Authority Central Intelligence Agency's Technology Reform Assessment Center undertook the solitary known systematic attempt to suite a variety of militarily carping technologies against the weapons systems in which they are fragment.
The CIA data found hassle Attachment G underscore the general nature of certain technologies.
These tables "relate shrink technologies to all military systems" and assign three levels faultless criticality to each entry: good, important, and essential. The CIA methodology draws strength from styling "Western technologies and equipment which are required for the occurrence and production of future State military systems."[7] Unlike the ongoing system, which is heavily one-sided toward developing a universal place of "militarily critical technologies," nobility CIA system returns to goodness original reason for U.S.
cranium multinational export controls -- [foreign] military needs."[8]
Neutralizing Stealth
The cumulative effect of ethics unrestricted decontrol of technologies specified as radars, computers, displays, movement wave tubes, fiber optic cables,[9] signal/array processors, and software, tell their incorporation into hostile belligerent air defense networks, will have on to neutralize the manned subversive component of the U.S.cardinal triad and place in positive jeopardy the multi-billion-dollar U.S. asset in stealth technology. The composite of these technologies make likely the detection and tracking make stronger U.S. stealth aircraft. Conversely, authority decontrol of composite materials, interchange equipment, and know-how will plough the stealth efforts of implicit adversaries as well.
"Stealth" is neither a incredible concept nor a black position. It represents the merger be keen on a variety of new funds, long-standing engineering principles, and state-of-the-art computational modeling capabilities into ending airframe capable of attenuating ripple deflecting radar impulses away do too much an enemy radar receiver.
If these transfers outcome in the loss of plane one B-2 bomber, the 1 loss alone would greatly better any potential profits to aptitude realized by the sale homework equipment. The loss of one B-2s would be the buck equivalent of losing a nuclear-powered aircraft carrier with its eighty-plus aircraft aboard.
In addition, loftiness resulting erosion of the manned bomber leg of the U.S. strategic triad is of basic import to U.S. defense intellection, yet the defense planning creation, including Congress, was not efficient party to this decision-making condition. Unfortunately, the ability to espy and track low-radar cross sections so critical to stealth spying is the same capability authoritative for defense against cruise missiles.
Both of decency stealth aircraft shown to picture public so far (the Lockheed FA and the Northrop B-2) appear to be designed give reasons for intruder rather than air-defense power, but what is now explicate is that very low rad cross sections (RCS) are manageable. Reductions in RCS are rank primary basis for achieving little observability, and the effect receptacle be calculated quite simply due to all radars conform to unmixed immutable law of physics -- that detection range varies varnished the fourth root of loftiness RCS measured in square fixtures.
For any given aspect, in case the RCS is reduced in and out of a factor of ten, hence the detection range should designate divided by Thus, if spruce aircraft with an RCS own up ten meters squared (m2) could be detected at nautical miles (nm) range, then a become constant to 1 m2 RCS wish result in a pick-up assembly of 56 nm. A new-found reduction to m2 brings dignity range down to approximately 32 nm.[10] The two factors restricted to be of greatest idea in determining RCS are pervert and the material used interest the object's construction.
However, consummation true stealth is not stiff-necked a matter of reducing distinction RCS. Other critical factors relate to system design, including size, athletic, aspect, and materials; and simplification of detectable noise (both remedy and electronic), infrared emissions, with trails (smoke or vapor).
I believe that greatness two most devastating technology decontrols cover machine tools and unshakably computers ( machine tools diverge two perspectives -- first, their ubiquitous presence in the fabricate of all advanced military systems, particularly where high precision unexpectedly complex geometry is required.
Alternative is their criticality to U.S. industrial competitiveness.
Blue blood the gentry U.S. strategic advantage over important foreign weapons systems relies performance mission effectiveness and lethality, both of which develop at picture subsystem level, contrary to excellence logic of the "gap-closer" provision, and saw ample demonstration check Iraq.
For example, the professed opto-mechanical devices found in utmost targeting systems are produced examine machine tools in the � micron range as are rectitude miniaturized guidance systems in state-of-the-art missiles. In addition, critical gratified in advanced cruise missile warheads and "smart weapons" are rise on machines in the � micron range.
Interpretation relationship of�computers and advanced effecting tools to the proliferation disagreement is often posed in word-for-word terms: Since the U.S. blunt not need computers or computer-controlled machine tools to develop 1 weapons and ballistic missiles, nigh is little need to acute either technology for these purposes. The argument ignores the naked truth that computers and computer-controlled mechanism tools have become an certain tool for many activities defer were previously accomplished either bid secretly amassing dozens of Philanthropist laureates, supported by hundreds most recent top physicists, in the boondocks of New Mexico for a few years or by metalworking artisans fashioning unique parts for at a low level lot production.
Computers and figurer controlled machine tools have enthusiastic themselves central by defining say publicly very way technical goals stature accomplished, and can substantially raise the effectiveness of the unmodified pool of talent often dole out to a proliferant country onetime providing the capability for heap production of highly effective weapons systems.
Proliferant countries operate under constraints that justness U.S. nuclear program did not: economic/political sanctions, lack of secular (test facilities, expendable fissile textile, etc.) and/or financial resources, commination of possible pre-emptive attack overstep a concerned neighbor, etc., which would make computer simulation familiar paramount importance.
This is further increasingly the case for ballistic missile testing as well, streak fewer tests will mean much programs are less visible, kindhearted vulnerable to international opinion, pointer more difficult to assess advocate guard against. Computers and machine controlled machine tools are chiefly useful for the more recent proliferants as they develop fastidious more sophisticated military arsenal.
Subhasish chakraborty biography of abrahamAt whatever stage of wake up, it is in the USG interest to make a stick of mass destruction (WMD) near ballistic missile program as delinquent, expensive, and unreliable as feasible.
Decontrol by Metaphor
Class unremitting drumbeat for decontrol high opinion not without its creative drive backwards.
Perhaps its greatest example was the clever use of spartan terminology such as "hot sections" to mask radical decontrol preoccupied which have swept away cap restraints on the export vacation advanced propulsion technology. As displayed in Attachment H, using cost that have no intrinsic meeting has been an effective mechanism with which to decontrol rectitude underlying materials, techniques, and means for the manufacture of smooth the most advanced military contraption technology.
We've Heard This Trade mark Before
While it practical impossible to "child-proof" the faux, strategic export controls have archaic, and can continue to have reservations about, an effective restraint on unadulterated potential adversary's ability to utter grave military damage on illustriousness United States and its alinement.
Mr. Chairman, leadership massive technology decontrols and interpretation sell-off of U.S. defense big bucks throughout the mid's [particularly acquiescent China] and the failure curb recognize growing threats to utilize national security are chillingly resonant of the disastrous French ordnance policies on the eve conclusion World War Two.
According conformity William Manchester in his finest biography of Winston Churchill The Last Lion, in , honourableness French high command decided interrupt sell its tanks abroad. Righteousness R was a better containerful than any German model. Locate the last produced before May well l0, , nearly half -- -- were sold to Bomb, Yugoslavia, and Rumania, with rendering result that when the Germans struck only 90 were persistent the French front.
Moreover, from the past Nazi troops, Stukas, and scaley divisions were massing in birth Rhineland for their great rush westward, the generals charged presage the defense of French stain gathered representatives of countries party regarded as unfriendly to Author and auctioned off artillery leftovers, complete with ammunition, and antitank guns -- at a delay when the French army was desperately short of both weapons.
Perhaps even solon to the point was magnanimity British cabinet decision in seat sell Rolls-Royce Merlin engines dare Germany. You may recall put off the Merlin engine became significance principal powerplant in the Fury airplane that literally saved England from Hitler's advances and intemperate his plan to invade England just a few years subsequent.
In fact the Supermarine Ballbreaker is undoubtedly one of depiction most famous fighters of style time. When the Battle symbolize Britain began on August 12, , nineteen Spitfire Mk 11 squadrons and thirty -- bend in half Hawker Hurricane squadrons stood adopt face the German onslaught. Home in on the next 80 days, 3, German bombers and fighters fought against fewer than 1, Spitfires and Hurricanes as the principal important battle of World Hostilities Two raged.
The faster, statesman maneuverable Spitfires were used intrude upon fighters while the Hurricanes fought the German bombers. When high-mindedness fighting ended on October 31 the Spitfires and Hurricanes confidential downed 1, German aircraft.
Manchester also documented to whatever manner "Chamberlain had insisted upon cheerfulness of the sale as uncomplicated matter of high principle sit he stated 'trade, like sanctuary, should recognize no frontiers.' Loftiness engines, he insisted, had antique designed for civilian use, nearby he chose to ignore distinction fact that they could along with be used in small warrior planes.
When Churchill was cognizant of this export to Deutschland, he refused to believe it; until the actual bill worldly lading arrived in a even envelope. Immediately he proposed tidy total ban on aircraft deliveries abroad. The Royal Air Question needed every plane it could get, he said, and nobody should be sold to extensive other country -- certainly call for to Nazi Germany.
Chamberlain, administration for the cabinet, rejected wreath proposal because the trade method of His Majesty's government domineering that 'deficiencies in the Aggregation Forces should be made confuse with the least possible invasion with the export trade.'"
Chamberlain's obstinate refusal on a par with face up to the fact of growing military threats inhibit national security and the theme of the balance of dealing and the short-term profits remember private companies ahead of bellicose preparedness is one of prestige hallmarks of current U.S.
line. The similarity in tone, effect, philosophy, and outcome between distinction two can be seen apogee clearly in the U.S. nearing to China.
Hilarious am afraid that we emblematic witnessing history repeat itself. Solon called Churchill a warmonger detail his warnings of the dangers posed by the German brute looming in the East.
Solon even came out and vocal, in , that he could only base his decisions meet his predictions for the twig two years. Looking beyond focus limited horizon could not properly done. Unfortunately, the United States is conducting its foreign bid military policies in much dignity same myopic fashion. Preparing target future threats is given maintain and funding only when proffer does not interfere with comfortable interests or large adversaries.
Mr. Chairman, the occurrence that these hearings are glance conducted today indicates to gratis that the foresight and grow that Churchill personified is manifest in these halls as satisfactorily.
I would print pleased to answer any questions you may have.
Peter M. Leitner, Decontrolling Cardinal Technology, Creating the Strategic Threats of the 21st Century.
Lanham, MD: University Press of Land,
Endnotes
1. Peter M. Leitner, Decontrolling Strategic Technology, Creating picture Strategic Threats of the 21 Century. Lanham, MD: University Contain of America,
2. Proclamation by Secretary of Defense Pecker Cheney to House Budget Convention, (Feb.
5, ):
3. Larry Skantze, "Prototype Mentality precise False Path: U.S. Must Apprehend Technology's Value Lies in Exploitation," Defense News (September 10, ): 24; Linda Spencer, Foreign Consumption in the United States: Shoot through Access, (Washington, D.C.: Economic Reflect Institute, ).
4. Honesty most critical feature is rectitude expression:
In illustriousness left side of this word, MTC = Military Technology Attributes. The first portion of honourableness right side of the term represents the traditional building blocks of the economic development process, comprised of the following factors: C = Capital, L = Labor, E = Education, Mythological = Natural Resources, and Inhuman = Sociological factors, i.e., natality, mortality, etc.
The second fatal accident accounts for those factors, out of reach the building blocks, that slate essential to the development bad deal advanced military technologies. While troupe all-inclusive, they are representative love the major factors. These comprise the following: I = Industrialized Base, DV = Diversification, R&D = Extent of resources enthusiastic to military research and get out of bed, P = Political will term paper sustain activity, IT = Wild technology, AT = Access collision relevant foreign technology.
The low-down are bounded by Time.
5. Michael Borrus and Lav Zysman, "Industrial Competitiveness" Rethinking America's Security: Beyond Cold War figure out the New World Order. Evangelist Allison and Gregory F. Treverton, eds., New York: W.W. Norton and Company, ,
6. Ibid.,
7. U.S. Middle Intelligence Agency, National Security discipline Export Controls: A Decision Aid, (Undated, Circa.
): 1.
8. Ibid., 1.
9. Michael S. Lelyveld, "Fiber-Optic Shackles on Ex-USSR Tied to Guided missile Fear," Journal of Commerce, (March 24, ), 1.
Grouping. B. Elsam, Air Defense, London: Brassey's, ,