Sources and Methods of Foreign Nationals Engaged in Economic and Military Espionage: Hearing Before the Subcommittee on Immigration, Border Security, and Claims of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, First Session, September 15, 2005, Volume 4 |
From inside the book
Results 1-5 of 17
Page 3
... opportunities - and research opportunities with those in the United States . You will constantly hear from your ... opportunity to do other business efforts with that company , but there had to be a line in the sand on important ...
... opportunities - and research opportunities with those in the United States . You will constantly hear from your ... opportunity to do other business efforts with that company , but there had to be a line in the sand on important ...
Page 4
... opportunity of bringing those who are persecuted to the shores , but also those who have talent , who are contributors and those who just have brawn , who have literally built America . Let us not close the door to the opportunity of ...
... opportunity of bringing those who are persecuted to the shores , but also those who have talent , who are contributors and those who just have brawn , who have literally built America . Let us not close the door to the opportunity of ...
Page 7
... opportunity to appear before you today to discuss foreign intelligence threats to U.S. national intel- ligence security and our economic well - being . Since some of the Members of the Subcommittee may not be fa- miliar with my office ...
... opportunity to appear before you today to discuss foreign intelligence threats to U.S. national intel- ligence security and our economic well - being . Since some of the Members of the Subcommittee may not be fa- miliar with my office ...
Page 10
... opportunity to testify today on the subject of foreign intelligence threats to America's vital military and other sensitive technologies . Let me begin by telling you a little about my office , the National Counterintelligence Executive ...
... opportunity to testify today on the subject of foreign intelligence threats to America's vital military and other sensitive technologies . Let me begin by telling you a little about my office , the National Counterintelligence Executive ...
Page 19
... opportunity to testify today on the theft of national se- curity secrets and national security sensitive technology . I have a longer statement I would like to submit for the record , if I may . Mr. HOSTETTLER . Without objection . Mr ...
... opportunity to testify today on the theft of national se- curity secrets and national security sensitive technology . I have a longer statement I would like to submit for the record , if I may . Mr. HOSTETTLER . Without objection . Mr ...
Other editions - View all
Common terms and phrases
863 Program abroad adversaries American ARCADIA GROUP assessments Chairman Chinese CLEAVE Cold War Committee counter counterintelligence and security counterintelligence community counterintelligence elements counterintelligence operations countries critical technologies cyber defense dual-use dual-use technologies economic Effective counterintelligence efforts Elias Zerhouni ensure espionage exploit focus foreign governments foreign intelligence services foreign intelligence threats foreign nationals foreign students foreign-born global GOHMERT high technology HOSTETTLER integrity intel intelligence activities intelligence collection JACKSON LEE ligence LOFGREN military military espionage National Counterintelligence Executive National Counterintelligence Strategy National Security Agency national security secrets People's Liberation Army People's Republic percent Praveen Chaudhary proprietary information protect Republic of China science and technology sensitive information sensitive technology sensitive U.S. technologies strategic counterintelligence Subcommittee target terrorism terrorist Thank theft trade secrets U.S. counterintelligence U.S. firms U.S. national security UNCLASSIFIED United VAN CLEAVE Visa Mantis vulnerable war on terrorism weapons WORTZEL Wulf
Popular passages
Page 21 - The People's Republic of China is a socialist State under the people's democratic dictatorship led by the working class and based on the alliance of workers and peasants. The socialist system is the basic system of the People's Republic of China.
Page 60 - Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or international terrorist activities, but not including personnel, physical, document or communications security programs.
Page 32 - States as may be designated, and the Academy shall, whenever called upon by any department of the Government, investigate, examine, experiment, and report upon any subject of science or art, the actual expense of such investigations, examinations, experiments, and reports to be paid from appropriations which may be made for the purpose, but the Academy shall receive no compensation whatever for any services to the Government of the United States.
Page 39 - Commission's view, the inadequacies of our systems of research and education pose a greater threat to US national security over the next quarter century than any potential conventional war that we might imagine.
Page 31 - Second only to a weapon of mass destruction (WMD) detonating in an American city, we can think of nothing more dangerous than a failure to manage properly science, technology, and education for the common good over the next quarter of a century".
Page 6 - Wulf is President of the National Academy of Engineering and Vice Chair of the National Research Council, the principal operating arm of the National Academies of Sciences and Engineering.
Page 7 - Mr. Chairman. I do have a prepared statement I would like to submit for the record.
Page 32 - I am on leave from the University of Virginia to serve as President of the National Academy of Engineering (NAE).
Page 73 - R&D Programme was officially launched by the Chinese government in March 1986, so the China's hi-tech R&D programme is often called "863 Programme". Concentrated on limited targets, seven areas were selected in this programme, which include biotechnology, space technology, information technology, laser technology, automation technology, energy technology and advanced materials. The total budget is 10000 million Chinese dollars (about 1.2 billion US dollars). Advanced computing system is the most...
Page 9 - I would like to submit for the record, if I may, Mr. Chairman, a couple of items.