Sources and Methods of Foreign Nationals Engaged in Economic and Military Espionage: Hearing Before the Subcommittee on Immigration, Border Security, and Claims of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, First Session, September 15, 2005, Volume 4 |
From inside the book
Results 1-5 of 18
Page
... Applications and Foreign Students Per Coun- ty , " submitted by the Honorable John Hostettler , a Representative in Con- gress from the State of Indiana , and Chairman , Subcommittee on Immigra- tion , Border Security , and Claims ...
... Applications and Foreign Students Per Coun- ty , " submitted by the Honorable John Hostettler , a Representative in Con- gress from the State of Indiana , and Chairman , Subcommittee on Immigra- tion , Border Security , and Claims ...
Page 3
... applications has eroded the United States military advantage and the greater U.S. intelligence community's ability to provide information to policymakers and un- dercut U.S. industry . It goes to my point that we must separate sort of ...
... applications has eroded the United States military advantage and the greater U.S. intelligence community's ability to provide information to policymakers and un- dercut U.S. industry . It goes to my point that we must separate sort of ...
Page 8
... applications . But the top 10 also include some of our close allies , as you noted , Mr. Chairman . These allies may exploit their easy access to push the envelope into areas where they have not been invited . In the majority of cases ...
... applications . But the top 10 also include some of our close allies , as you noted , Mr. Chairman . These allies may exploit their easy access to push the envelope into areas where they have not been invited . In the majority of cases ...
Page 17
... application and to those on the Defense Department's Militarily Critical Technologies List ( MCTL ) , many of which are dual - use , with both military and commercial applications . All of the technologies on the MCTL are targeted every ...
... application and to those on the Defense Department's Militarily Critical Technologies List ( MCTL ) , many of which are dual - use , with both military and commercial applications . All of the technologies on the MCTL are targeted every ...
Page 22
... application turned out to be a People's Liberation Army or PRC government defense research institute . Thus , the United States faces an organized program out of China that is designed to gather high technology information of military ...
... application turned out to be a People's Liberation Army or PRC government defense research institute . Thus , the United States faces an organized program out of China that is designed to gather high technology information of military ...
Other editions - View all
Common terms and phrases
863 Program abroad adversaries American ARCADIA GROUP assessments Chairman Chinese CLEAVE Cold War Committee counter counterintelligence and security counterintelligence community counterintelligence elements counterintelligence operations countries critical technologies cyber defense dual-use dual-use technologies economic Effective counterintelligence efforts Elias Zerhouni ensure espionage exploit focus foreign governments foreign intelligence services foreign intelligence threats foreign nationals foreign students foreign-born global GOHMERT high technology HOSTETTLER integrity intel intelligence activities intelligence collection JACKSON LEE ligence LOFGREN military military espionage National Counterintelligence Executive National Counterintelligence Strategy National Security Agency national security secrets People's Liberation Army People's Republic percent Praveen Chaudhary proprietary information protect Republic of China science and technology sensitive information sensitive technology sensitive U.S. technologies strategic counterintelligence Subcommittee target terrorism terrorist Thank theft trade secrets U.S. counterintelligence U.S. firms U.S. national security UNCLASSIFIED United VAN CLEAVE Visa Mantis vulnerable war on terrorism weapons WORTZEL Wulf
Popular passages
Page 21 - The People's Republic of China is a socialist State under the people's democratic dictatorship led by the working class and based on the alliance of workers and peasants. The socialist system is the basic system of the People's Republic of China.
Page 60 - Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
Page 32 - States as may be designated, and the Academy shall, whenever called upon by any department of the Government, investigate, examine, experiment, and report upon any subject of science or art, the actual expense of such investigations, examinations, experiments, and reports to be paid from appropriations which may be made for the purpose, but the Academy shall receive no compensation whatever for any services to the Government of the United States.
Page 39 - Commission's view, the inadequacies of our systems of research and education pose a greater threat to US national security over the next quarter century than any potential conventional war that we might imagine.
Page 31 - Second only to a weapon of mass destruction (WMD) detonating in an American city, we can think of nothing more dangerous than a failure to manage properly science, technology, and education for the common good over the next quarter of a century".
Page 6 - Wulf is President of the National Academy of Engineering and Vice Chair of the National Research Council, the principal operating arm of the National Academies of Sciences and Engineering.
Page 7 - Mr. Chairman. I do have a prepared statement I would like to submit for the record.
Page 32 - I am on leave from the University of Virginia to serve as President of the National Academy of Engineering (NAE).
Page 73 - R&D Programme was officially launched by the Chinese government in March 1986, so the China's hi-tech R&D programme is often called "863 Programme". Concentrated on limited targets, seven areas were selected in this programme, which include biotechnology, space technology, information technology, laser technology, automation technology, energy technology and advanced materials. The total budget is 10000 million Chinese dollars (about 1.2 billion US dollars). Advanced computing system is the most...
Page 9 - I would like to submit for the record, if I may, Mr. Chairman, a couple of items.