HEARINGS BEFORE THE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS OF THE COMMITTEE ON GOVERNMENTAL AFFAIRS UNITED STATES SENATE NINETY-SEVENTH CONGRESS SECOND SESSION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP85M00364R001001520004-2
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
661
Document Creation Date:
December 20, 2016
Document Release Date:
December 11, 2007
Sequence Number:
4
Case Number:
Publication Date:
May 1, 1982
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP85M00364R001001520004-2.pdf | 32.9 MB |
Body:
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
HEARINGS
BEFORE THE
PERMANENT
SUBCOMMITTEE ON INVESTIGATIONS
OF THE
COMMITTEE ON
GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
NINETY-SEVENTH CONGRESS
SECOND SESSION
MAY 4, 5, 6, 11, AND 12, 1982
Printed for the use of the Committee on Governmental Affairs
C / 3 7
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
HEARINGS
BEFORE THE
PERMANENT
SUBCOMMITTEE ON INVES
OF THE
IGATIONS
COMMITTEE ON
GOVERNMENTAL AFFAIRS
UNITED STATES SENATE
NINETY-SEVENTH CONGRESS
SECOND SESSION
MAY 4, 5, 6, 11, AND 12, 1982
Printed for the use of the Committee on Governmental Affairs
U.S. GOVERNMENT PRINTING OFFICE
95-9290 WASHINGTON ; 1982
For sale by the Superintendent of Documents, U.S. Government Printing Office
Washington, D.C. 20402
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
COMMITTEE ON GOVERNMENTAL AFFAIRS
WILLIAM V. ROTH, JR., Delaware, Chairman
CHARLES H. PERCY, Illinois
TED STEVENS, Alaska
CHARLES McC. MATHIAS, JR., Maryland
JOHN C. DANFORTH, Missouri
WILLIAM S. COHEN, Maine
DAVID DURENBERGER, Minnesota
MACK MATTINGLY, Georgia
WARREN B. RUDMAN, New Hampshire
HARRISON H. SCHMITT, New Mexico
JOAN M. MCENTEE,
THOMAS F. EAGLETON, Missouri
HENRY M. JACKSON, Washington
LAWTON CHILES, Florida
SAM NUNN, Georgia
JOHN GLENN, Ohio
JIM SASSER, Tennessee
DAVID PRYOR, Arkansas
CARL LEVIN, Michigan
Staff Director
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
WILLIAM V. ROTH, JR., Delaware, Chairman
WARREN B. RUDMAN, New Hampshire, Vice Chairman
CHARLES H. PERCY, Illinois SAM NUNN, Georgia
CHARLES McC. MATHIAS, Ja., Maryland HENRY M. JACKSON, Washington
JOHN C. DANFORTH, Missouri LAWTON CHILES, Florida
WILLIAM S. COHEN, Maine JOHN GLENN, Ohio
JIM SASSER, Tennessee
S. CASS WEILAND, Chief Counsel
MICHAEL C. EBERHARDT, Deputy Chief Counsel
ELEANORE J. HILL, Chief Counsel to the Minority
KATHERINE BIDDEN, Chief Clerk
(n)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
CONTENTS
Testimony of? Page
Arkov, Joseph, (assumed name for former Soviet engineer) 27
Asselin, Fred, staff investigator, Permanent Subcommittee on Inves-
tigations 82
Baker, Dr. Lara H., Jr., assistant office leader, International Tech-
nology Office, Los Alamos National Laboratory, University of
California _ 54
Bell, William H., prisoner; accompanied by Robert L. Kirste, at-
torney_ 37
Brady, J. Lawrence, Assistant Secretary of Commerce for Trade
Administration, Department of Commerce 262
Bryant, Clyde, Chief, Support Services Division, Office of Munitions
Control, State Department 156
Bryen, Dr. Stephen D., Deputy Assistant Secretary of Defense, Inter-
national Economics, Trade and Security Policy, Department of
Defense 249
Buckley, James L. Under Secretary of State for Security Assistance,
Science and Technology, Department of State 156
Corcoran, George G., Assistance Commissioner (Border Operations),
U.S. Customs Service 193
Fry, Glenn W., staff investigator, Permanent Subcommittee on Inves-
tigations
74, 82
Greenberg, Theodore, assistant U.S. attorney, Eastern District of
Virginia 129
Inman, Adm. Bobby R., Deputy Director, Central Intelligence
Agency 235
Johnston, Ernest, Deputy Assistant Secretary of State for Economic
and Business Affairs 156
Kapper, Dr. Frank, Director of Military Technology Sharing 218
Lecht, Charles, former president and chairman of the board, Advanced
Computer Techniques Corp 229
Lomacky, Dr. Oles, 'Director of the Office of Technology Trade 218
Lorenzo, Michael, Deputy Under Secretary of Defense, International
Programs and Technology, Department of Defense 218
Maguire, John, president, Software AG of North America, Inc 121
Marshall, John D., businessman, Santa Clara, California 71
Martin, John L., Criminal Division, U.S. Department of Justice_ 129
O'Brien, Patrick, Director, General Investigations, U.S. Customs
Service 193
O'Malley, Edward J., Assistant Director, Intelligence Division,
Federal Bureau of Investigation 168
Southard, Douglas, deputy district attorney, County of Santa Clara,
California 143
Van Cook, Arthur, Director of Information Security, Department of
Defense, and chairman, National Disclosure Policy Committee 181
Von Raab, William, Commissioner, U.S. Customs Service 193
Vorona, Dr. Jack, Director, Scientific and Technical Information,
Defense Intelligence Agency, Department of Defense 10
(III)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Iv
EXHIBITS
Intro-
duced Appears
on Page an Page
1. Assessment of the technology transfer problem regarding diver-
sions to the Soviet Union 6 7
2. Public Law 96-72, 96th Congress, September 29, 1979, Export
Administration Act of 1979 97
3. Testimony of William V. Skidmore, Director, Office of Export
Administration, Department of Commerce, before the Sub-
committee on International Economic Policy and Trade of the
House Committee on Foreign Affairs, March 26, April 14, 28,
and May 13, 1981, Export Administration Amendments Act
of 1981 97
4. Export Administration report to Congress, October 1978?March
1979, issued by the Industry and Trade Administration, De-
partment of Commerce; Export Administration report to
Congress, April 1979?September 1979; issued by the Industry
and Trade Administration, Department of Commerce; Export
Administration annual report fiscal year 1980, issued Febru-
ary 1981, by International Trade Administration, Department
of Commerce; Export Administration annual report fiscal year
1981, issued February 1982, by the International Trade Ad-
ministration, Department of Commerce 97
5. Memorandum from Sharon R. Connelly, Director, Compliance
Division, to William V. Skidmore, Director, Office of Export
Administration, on "Administrative Enforcement Activity in
the Compliance Division in Fiscal Year 1981 Compared to
Prior Years," October 5, 1981 97
6. 198L summary of work of Facilitations Branch of Compliance
Division_ 97
7. S. 206, 96th Congress, Office of Strategic Trade Act of 1980,
introduced on April 24, 1980, by Senator Garn ; floor remarks
of Senator Garn; and May 8, 1980, "Dear Colleague letter"
regarding legislation__97
8. Letter to the Speaker of the House and the President of the
Senate transmitting a report from President Carter, "Ship-
ments of Agricultural Commodities to the Soviet Union,"
January 2, 1980_ 97
9. Report by the Comptroller General of the United States,
"Lessons To Be Learned From Offsetting The Impact Of The
Soviet Grain Sales Suspension," July 27, 1081, -U.S. General
Accounting Office. 97
10. Memorandum from William Green, Deputy Assistant Com-
missioner for Border Operations, Customs Service, to Robert
L. Kench, Associate Deputy Attorney General and Chairman
of Inter-agency Working Group on Export Control, October
20, 1980 97 97-99
11. Los Angeles Times article, "4 Accused of Exports for Soviet
Bloc Nations," August 20, 1981, p. 1 97 *
12. Indictment, United States v. Werner J. Bruchhausen, Anatoli
Tony Maluta, Sabina Dorn Tittel; and Dietmar Ulrichshofer;
U.S. District Court for the Central District of California 97
13. Information, United States v. Anatoli Tony Maluta, U.S. District
Court, Central District of California 97
14. Stipulation of Facts and Exhibits re: trial of Anatoli Tony
Maluta, United States v. Anatoli Tony Maluta, October 27,
1981, U.S. District Court, Central District of California_ _ _ _ 97
15. Memorandum re: Sentencing; Exhibits; Declaration of Theodore
W. Wu, United States v. Anatoli 7'. "Valuta and Sabina D.
Tittel, U.S. District Court, Central District of California 97
16. Commerce Department press release of April 3, 1981, an-
nouncing that the Department had denied all U.S. export
privileges to Anatoli Maluta, Sabina Dorn Tittel; and Werner
J. Bruchhausen and three firms associated with them; and 16
more Commerce Department press releases relating to actions
taken in connection with alleged violations of export laws
and regulations in 1980 and 1981 97
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
EXHIBITS?Continued
Intro-
duced Appears
on page on page
17. Commerce Department press release of September 8, 1980
in which Commerce Secretary Philip M. Klutznick and
Attorney General Benjamin Civiletti announced that Pres-
ident Carter had directed formation of an interagency work-
ing group chaired by the Justice Department 'to examine
ways to improve compliance with the export control laws."_ _ _
18. Commerce Department press release of January 11, 1980,
announcing, 'Commerce Secretary Denies $1 Billion Plus
In Export Licenses for Soviet Union"
19. Volumes 4, 7, 8, and 11, reporter's transcript, U.S. v. Spawr,
Optical Research, Inc., Walter J. Spawr, Frances Spawr,
November 13, 24 and 25 and December 3, 1980, U.S. District
Court, Central District of California
20. Qualification standards and position discriptions on? GS-1811
Federal criminal investigation issued by the Office of Per-
sonnel Management
21. Speech by Senator Henry M. Jackson on "Technology Transfer
Policy?The High Stakes," in Senate, February 11, 1982 _
22. Congressional Research Service report entitled, "Foreign
Espionage and U.S. Technology," prepared at the request of
the Senate Permanent Subcommittee on Investigations by
Mark M. Lowenthal, Foreign Affairs and National Defense
Division; and George Holliday and Lawrence Evans, both
of the Economics Division; August 12, 1980
23. Statements of Lawrence J. Brady, Assistant Secretary of
Commerce for Trade Administration, before House Sub-
committees on Science, Research and Technology and on
Investigation and Oversight, March 29, 1982; and before
Senate Subcommittee on International Finance and Monetary
Affairs, April 14, 1982
24. Commerce Department April 1982 biography of William V.
Skidmore, Director, Office of Anti-Boycott Compliance;
and Acting Director, Compliance Division
25. New York Times editorial, "Smothered By A Security Blanket,"
April 12, 1982
26. Letter from Frank Carlucci, Deputy Secretary of Defense
to William D. Carey, Executive Officer and Publisher of
Science magazine, printed under the heading, "Scientific
Exchanges and U.S. National Security," in January 8, 1982
issue
27. Soviet Military Power, Department of Defense publication_ _ __
28. Letters from Chairman Roth and Senator Nunn to Commerce
and Treasury Departments requesting specific information on
export controls, September 21, 1981; April 14 and 16, 1982__
29. Sworn affidavit of John Rennish
30. Sworn affidavit of Michael Dolphin
31. Sworn statement of Charles McLeod
32. Freedom of Information Act (S. 1751), and a section by section
analysis, submitted by Mr. Van Cook
33. Briefing on duel-use technology prepared by Col. Kenneth
Evans, U.S. Army
34. Statement prepared for the subcommittee by the American
Society for Industrial Security
35. Prepared statement submitted to the subcommittee by the
Computer ?Sz Business Equipment Manufacturers Association..
36. Prepared statement submitted by the Electronics Industries
Association
37. Prepared statement submitted by the Scientific Apparatus
Makers Association
38. Court exhibits, documents and related material
97
97
97
97
*
97
*
97
*
97
*
97
97
*
97
*
97
*
97
*
277
278
277
283
277
287
191
*
296
*
296
*
296
*
296
*
296
*
296
*
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
VI
APPENDIX
Asselin, Fred, investigator, Permanent Subcommittee on Investigations.
Prepared statement, including a summary written by Mr. Asselin on the Page
CTC case 366
Baker, Dr. Lara H., Jr., assistant office leader, Los Alamos National Lab-
oratory, "Talking Notes"' of Dr. Baker; his submitted r?m?a memoran-
dum dated April 16, 1982, which contains Dr. Baker's response to the
Customs Bureau regarding the CTC case 338
Brady, Lawrence, Assistant Secretary of Commerce for Trade Adminis-
tration, Department of Commerce, prepared statement 596
Bryen, Dr. Stephen D., Deputy Assistant Secretary of Defense, Inter-
national Economics, Trade and Security Policy, Department of Defense,
prepared statement_ 583
Buckley, James L., Under Secretary of State for Security Assistance, Sci-
ence and Technology, Department of State, statement with related mate-
rial and attachments_ 533
Cohen, Senator William S., prepared statement 313
Fry, Glenn W., staff investigator, Permanent Subcommittee on Investi-
gations, prepared statement 426
Greenberg, Theodore, assistant U.S. attorney, Eastern District of Virginia,
prepared statement 432
Inman, Adm. Robert R., Deputy Director, Central Intelligence Agency,
prepared statement_ 577
Jackson, Senator Henry M., prepared statement; letters to President
Reagan dated March 8, 1982, and November 14, 1980, relating to the sub-
committee's investigation; a newsletter by Senator Jackson dated
February 11, 1982, on the subject matter_ 315
Lecht, Charles, former president and chairman of the board, Advanced
Computer Techniques Corp., statement 570
Lorenzo, Michael, Deputy Under Secretary of Defense, International
Programs and Technology, Department of Defense, prepared statement;
copy of speech dated March 11, 1982, to the George Washington Univer-
sity on Military Transfer Technology_ 552
Southard, Douglas, deputy district attorney, county of Santa Clara, Calif.,
prepared statement 475
U.S. Department of Commerce: Inspector General's Report of Inspection
of the Export Administration's Compliance Division 606
Wu, Theodore Wai, assistant U.S. attorney, Criminal Division, Central
District of California, prepared statement (did not testify) 510
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
TUESDAY, MAY 4, 1982
US. SENATE,
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
OF THE COMMITTEE ON GOVERNMENTAL AFFAIRS,
Washington, D.C.
The subcommittee met at 10:10 a.m., pursuant to call, in room 3302,
Dirksen Senate Office Building, under authority of Senate Resolution
361, dated March 5, 1980, Hon. William V. Roth, Jr., presiding.
Members of the subcommittee present: Senator William V. Roth,
Jr., Republican, Delaware; Senator William S. Cohen, Republican,
Maine; Senator Warren B. Rudman, Republican, New Hampshire;
Senator Henry M. Jackson, Democrat, Washington; Senator Lawton
Chiles, Democrat, Florida; and Senator Sam Nunn, Democrat,
Georgia.
Members of the professional staff present: S. Cass Weiland, chief
counsel; Michael C. Eberhardt, deputy chief counsel; Katherine Bid-
den, chief clerk; Eleanore J. Hill, chief counsel to the minority;
Gregory Baldwin, assistant counsel to the minority; Jack Key, Glenn
Fry and Fred Asselin, staff investigators to the minority; and
Kathleen Dias. executive secretary to the minority chief counsel.
[Members of the subcommittee present at convening: Senators Roth,
Nunn, Jackson, Cohen, Chiles, and Rudman.]
Chairman ROTH. Today the Permanent Subcommittee on Investiga-
tions opens 5 days of in-depth hearings into the loss of U.S. technology
to the Soviet Bloc countries. At the very outset, I want to congratu-
late you, Senator Nunn, and your staff for the excellent work in put-
ting together this series of very important hearings.
As chairman I am, of course, cognizant of the accomplishments of
the subcommittee under you, Senator Jackson, on this subject during
the mid-seventies and fully support the tvne of investigation that has
led to the presentation of evidence we will begin to hear today.
The issues that will be addressed here in the next two weeks are of
great concern to me and should be fully understood so that the Ameri-
can people can better appreciate the extent to which our sensitive tech-
nology is finding its way into the Soviet Union and its bloc nations.
There is no question that the Soviets have undertaken a massive, *ell-
financed, expertly coordinated program to systematically acquire as
much as our high technology as they can steal, purchase through mid-
dlemen or otherwise appropriate. And all because they are unable to
produce that technology themselves. So they are left to copy ours and
use it, no to make life more comfortable for their citizens, but
to advance their numerous weapons systems and overall military
capabilities. -
(1)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
2
It is of the utmost importance, therefore, that our Federal law
enforcement and intelligence agencies work closely with representa-
tives of private industry in identifying and protecting those sensitive
items and processes which are the targets of Soviet operatives. But in
so doing we must remain committed to our great tradition of Ameri-
can competition in the world marketplace. A balance must be struck
between our legitimate effort to curtail any assistance to Soviet mili-
tary buildup on one hand, and our promotion of free, enterprise in
the world market on the other hand.
This is no easy balance to strike, but hopefully our hearings will
identify the issues that we must address if we are to succeed in both
of these goals.
One key factor to success will be the assurance that our Federal
intelligence agencies are interacting with Federal enforcement agencies
to identify those types of sensitive technology most desired by the
Soviet Union. This is where our e:mphasis on control must lie, not with
items of little or no priority to the Soviets.
Furthermore, much of the technology developed here in the United
States is also being developed by other Western nations for sale over-
seas, while our allies readily trade away sensitive information to the
Soviet bloc. We must, therefore, work together with our friendly
neighbors to establish carefully conceived important programs aimed
at specific types of technology.
Clearly, effectiveness depends on multilateral enforcement.. Where
that cooperation is lacking, we must build incentives to achieve them;
and where there are presently treaties in effect, we must insure that
there is a sufficient commitment to their vigorous enforcement.
I look forward to the next several days of hearings and again want
to thank Senator Nunn for his efforts.
Senator Nunn.
OPENING STATEMENT OF SENATOR NUNN
Senator Nuiciv. Thank you very much, Mr. Chairman. I want to
thank you, Mr. Chairman, and the entire majority staff for your
splendid cooperation during the course of this investigation and in
plans for these hearings. We have had the minority staff working on
this problem now for about 15 months and during the entire course of
that investigation, we have had splendid and total cooperation from
the majority, which we appreCiate very much.
The subcommittee today begins its evaluation of the effectiveness of
the executive branch in enforcing exPort controls, particularly with
regard to transfer of technology to the Soviet Union and other Warsaw
Pact nations.
The subcommittee has received information indicating that the exec-
utive branch has devoted insufficient attention and resources to enforc-
ing export controls on high technology. When I say the executive
branch during the course of these hearings. I want to make it absolutely
plain I am talking about the executive branch that exists now and the
one that existed before. This is a bipartisan thing and this is not aimed
at any particular administration. This problem transcends any admin-
istration or any leadership.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
3
For this Nation to neglect export controls is to assist the Soviets in
carrying out their global designs. They have stated often their goal to
achieve superiority in science and technology. We are mistaken not to
take them at their word.
Since the end of World War II, the Soviets have made great strides
in building their military prowess. Our own security analysts admit to
the increased level of deployed Soviet military technology. We have
relied on our technological superiority to offset the Soviet Union's
commitment to have more of everything, more men in arms, more
armor, more aircraft, more ships at sea. Kowever, the United States'
advantage in basic military technology is being challenged. Today the
Soviets have more of most things military. They are also closing the
gap technologically in many fields.
In modernizing their military capabilities, the Soviets first had to
modernize their industry. In that pursuit, they relied to an important
extent on technology from the United States.
According to American defense analysts, the United States has been
the source of much of the Soviet Union's electronic and computer tech-
nology and advanced manufacturing capability. Some of this ex-
pertise was given or sold to the Soviets willingly. Some of it the
Soviets obtained illegally.
The Soviets have come to view our technology as their technology, to
be obtained whenever they need it. As a consequence, we are in the posi-
tion of supporting our own costly national security apparatus, and
indirectly helping them to build theirs.
Since 1970, the Western democracies and Japan have supplied the
Soviet industrial sector with millions of dollars' worth of efficient
machine tools, chemical plants, precision instrumentation, and associ-
ated technologies. Western goods and technologies have played a major
role in the modernization and expansion of Soviet industry. The use of
the technology embodied in the Western equipment has enabled the
Soviet Union and the Warsaw Pact countries to achieve industrial
growth at a faster rate than would have been possible with their own
resources.
Our purpose in these hearings is to identify the principal vehicles
the Soviets use to obtain high technology from the United States and
to examine our ability to halt the technological drain.
Imagine for a moment an office in the Kremlin where senior Soviet
officials decide what kind of technology they need from us and then
devise their efforts to obtain it.
The Kremlin office, a composite of several Soviet departments, re-
sponds to the law of supply and demand. The demand is reflected in
the needs of military and industrial planners. The planners give the
"Technology Transfer Office" a shopping list of desired high technol-
ogy components and knowledge. The composite Soviet officers in charge
of obtaining American technology surveys his resources.
Generally speaking, he has seven basic approaches he can utilize.
First, there are the KGB and the GRU, the spy organizations which
practice traditional hand-in-the-safe information gathering crafts.
Their tactics range from bribery to blackmail to extortion.
Second, the Soviets rely on information published by the U.S. Gov-
ernment and made available by Federal agencies.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
4
The subcommittee will examine information indicating that too
much data about our military programs may be being made public. The
Soviets draw heavily on the Government's Public documents.
Third, the Soviets promptly translate U.S. technical journals and
distribute them among their scientists and engineers. There is nothing
the United States can do to stop that. However, the subcommittee will
examine the procedures with which the Government decides to make
heretofore sensitive information available.
Fourth, the Soviets promote information exchanges as ways to es-
tablish improved relations between the two countries. But information
exchanges may serve the Soviets in other ways.
The subcommittee will examine information indicating that the So-
viets exploited such exchanges for their own benefit and the United
States gives up more information than it receives.
Similarly, the subcommittee will examine information indicating
that the Soviets exploit the so-called student exchange program with
the United States. Sources indicate that the Soviets send to American
universities established scientists to learn at our Nation's centers of
high technology studies. In return, the United States usually is repre-
sented by college-age students whose interests are literature, art, or
history.
Fifth, the Soviets and their surrogates form marketing and manu-
facturing companies in this country which serve two purposes for
them. They buy high technology and munitions for illicit export to
the Soviet Union. Second, they use their facilities in the United States
as havens for spies. Both these techniques will be examined in the
hearings.
Sixth, the Soviets turn to agreements in which American companies
and consortiums build factories in the U.S.S.R.
Seventh, the Soviets employ business intermediaries in the United
States and foreign countries. Using false shipping documentation and
other illegal practices, business intermediaries buy high technology
components and knowledge and send them to the Soviet sphc?re.
It is important to note that in these hearings we have special
interest in so-called "dual-use" technology; that is to say, technology
developed or manufactured in this country primarily by the private
sector and primarily for commercial purposes. It is termed "dual use"
because in the hands of the Soviets or another adversary, the tech-
nology can have military applications that can be used against the
United States.
Such technology cannot be exported legally without a validated
license from the U.S. Department of Commerce.
The Commerce Department's Office of Export Administration,
known as OEA, has the responsibility of enforcing export controls
under the Export Administration Act. Investigation of alleged viola-
tions is conducted by 0EA's Compliance Division.
Our preliminary investigation has raised serious questions about
the ability of the, Commerce Department to enforce effectively those
U.S. export laws governing technology transfer.
The subcommittee will examine carefully allegations that from as
early as .1963, the Compliance Division has been undermanned and
undertrained as a law enforcement organization. By contrast, the
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
5
Soviets have become increasingly adept in their ability to secure our
high technology.
In that context, the subcommittee intends to examine the mecha-
nisms both on the statutory and agency levels, which the United States
has developed to implement a strong policy aimed at halting the tech-
nology drain. We will weigh the testimony and evidence to determine
what can be done to improve the ability of the executive branch to
enforce export controls.
The transfer of technology to the Soviet Union is one of our most
important national security problems. It is a national security issue
that deserves the most responsible and thoughtful scrutiny.
I want to stress fiat a primary consideration of this subcommittee's
inquiry is to enable the private sector of our economy the opportunity
to export with as few regulations and controls as possible. One point
has come through clearly in the preliminary investigation. It is that
the way high technology export controls are administered now, too
many items are controlled, and because the Government tries to control
too many commodities, it fails to keep track of those products the
Soviets desire most. So, in the effort to broaden and have a comprehen-
sive list, we end up uncovering more and more. An improved system
of export regulations would focus on those high technology items the
Soviets must have.
This so-called Soviet shopping list, based on sound intelligence esti-
mates, will enable our Government to safeguard the most critical as-
pect of our technology and we hope also eliminate some of the regula-
tions and controls that cause American businessmen to complain bit-
terly about wasteful Government redtape.
The result, if it can be implemented, will be an improved enforce-
ment effort and an improved balance of trade.
What Chairman Roth pointed out at the beginning of these hearings
is very important. It is extremely difficult for an open society to have
restrictions on technology transfer. We have to arrive at a balance.
The openness of our society is one of the strengths that we have in de-
veloping new technologies. It is also apparent that the Soviet Union
has a distinct advantage in developing technology because they have a
closed society. So we certainly have to keep that balance in mind.
Mr. Chairman, I think it is appropriate at this point to express my
respect and admiration for our colleague on this subcommittee, Sena-
tor Jackson. who was one of the first to speak out on the importance
of the technology transfer issue.
As early as 1974, Senator Jackson. then chairman of this subcom-
mittee, convened hearings on this subject and helped focus needed at-
tention on a subject that was much in need of congressional oversight.
Senator Jackson's work in this area provided an accurate and com-
prehensive foundation for the investigation we launch today. So I
want to commend you, Senator Jackson, for your longstanding leader-
ship in this field and as I have said so many times in the post, you know
and understand national security matters very well?with one or two
poc-sible exceptions that we can -discuss later on.
In addition, Mr. Chairman. I want to point out that in this prelimi-
nary investigation, the minority staff has coordinated its efforts with
the staff of the Senate Select Committee on Intelligence. We have re-
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
6
ceived complete cooperation and assistance from select committee staff
and I myself have benefited greatly from the generous guidance of my
distinguished colleagues, Senator Goldwater, the chairman of the
select committee, and Senator Moynihan, the vice chairman.
Our staff has provided thorough briefings to the select committee
staff and I have kept members of the select committee advised of our
progress as well.
In concluding my opening statement, Mr. Chairman, I request that
you order printed in the record at this point an assessment of the tech-
nology transfer problem regarding diversions to the Soviet Union.
The assessment prepared by national security specialists in the execu-
tive branch was made available to me through established procedures.
Chairman ROTH. Without objection, it will be so printed.
[The document referred to was marked "Exhibit No. 1," for refer-
ence and follows:]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
7
EXHIBIT NO. 1
Soviet Acquisition of
Western Technology
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
8
Contents
Page
Introduction
Soviet Acquisition of Western Technology: A National-Level Program
Soviet Mechanisms for Acquiring Western Technology 2
Soviet Acquisitions and Benefits 5
Outlook for the 1980s 11
Appendix
Projected Soviet Technological Needs and Acquisition Targets 13
Through the 1980s
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Soviet Acquisition of
Western Technology
Introduction
The United States and its Allies traditionally have
relied on the technological superiority of their weap-
ons to preserve a credible counterforce to the quanti-
tative superiority of the Warsaw Pact. But that
technical superiority is eroding as the Soviet Union
and its Allies introduce more and more sophisticated
weaponry?weapons that all too often are manufac-
tured with the direct help of Western technology.'
Stopping the Soviets' extensive acquisition of mili-
tary-related Western technology?in ways that are
both effective and appropriate in our open society?is
one of the most complex and urgent issues facing the
Free World today.
This report describes the Soviet program to acquire
US and Western technology, the acquisition mecha-
nisms used, the spectrum of Western acquisitions that
have contributed to Soviet military might, the project-
ed Soviet priority needs for Western technology, and
the problems of effectively stemming the transfer of
Western technology that could someday find applica-
tion in weapons used to threaten the West.
Soviet Acquisition of Western Technology:
A National-Level Program
Since at least the 1930s, the Soviet Union has devoted
vast amounts of its financial and manpower resources
to the acquisition of Western technology that would
enhance its military power and improve the efficiency
of its military manufacturing technology. Today this
Soviet effort is massive, well planned, and well man-
aged?a national-level program approved at the high-
est party and governmental levels.
? While there are numerous interpretations of "technology" for
weapons, it is defined in this report as the application of scientific
knowledge, technical information, know-how, critical materials,
keystone manufacturing and test equipment, and end products
which are essential to the research and development as well as the
series manufacture of modern high-quality weapons and military
equipment. Western technology is defined as that technology
developed by the Free World.
1
9
This program accords top priority to the military and
military-related industry, and major attention is also
given to the civilian sectors of Soviet industry that
support military production.
The Soviets and their Warsaw Pact allies have ob-
tained vast amounts of militarily significant Western
technology and equipment through legal and illegal
means. They have succeeded in acquiring the most
advanced Western technology by using, in part, their
scientific and technological agreements with the West
to facilitate access to the new technologies that are
emerging from the Free World's applied scientific
research efforts; by spending their scarce hard curren-
cy to illegally purchase controlled equipment, as well
as to legally purchase uncontrolled advanced Western
technologies having military-industrial applications;
and by tasking their intelligence services to acquire
illegally those US and Western technologies that are
classified and export controlled.
The Soviets have been very successful in acquiring
Western technology by blending acquisitions legally
and illegally acquired by different government organi-
zations. The Soviet intelligence services?the Soviet
Committee for State Security (KGB) and the Chief
Intelligence Directorate of the Soviet General Staff
(GRU)?have the primary responsibility for collecting
Western classified, export-controlled, and proprietary
technology, using both clandestine and overt collec-
tion methods. They in turn make extensive use of
many of the East European Intelligence Services (see
inset, p. 2); for their efforts in acquiring Western
technology, these countries are paid in part with
Soviet military equipment and weapons.
Clandestine Requisition of the West's most advanced
military-related equipment and know-how by the
KGB and GRU is a major and growing problem.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
East European Intelligence Services Acquire
Technologies for the Soviet Union
In the late 1970s a former East European intelligence
officer revealed organizational and targeting details
related to Soviet-directed acquisitions of Western
technology by East European intelligence services
particularly military-industrial manufacturing-
related technologies that were given the highest prior-
ity for collection by at least one East European
intelligence service. Many technologies were acquired
through dummy firms established in Western Europe
that were successful in securing some of the most
advanced technologies in the West, including com-
puter, microelectronic, nuclear, and chemical
technologies.
In microelectronics, for example, many US firms
were targeted through their affiliates in Western
Europe; scientists, technicians, and commercial rep-
resentatives also were successfully recruited to pro-
vide information during their trips to Europe. Al-
though most of the military and defense-industrial
information acquired by East European intelligence
services went to the Soviets, much of it was used by
the East Europeans themselves to benefit their ntili-
tory and civilian industries. The computer, micro-
electronic, and photographic areas were priority tar-
gets. The East European countries benefited con-
siderably from microelectronic acquisitions, and
could not have achieved the present level of develop-
ment in their computer industry without illegal
acquisitions of Western technology
These intelligence organizations have been so success-
ful at acquiring kVestern technology that the man-
power levels they allocate to this effort have increased
significantly since the 1970s to the point where there
arc now several thousand technology collection offi-
cers at work. These personnel, under various covers
ranging from diplomats to journalists to trade offi-
cials, are assigned throughout the world.
Soviet foreign trade organizations, or enterprises,
although quasi-independent entities, are partially sub-
ordinated to the Ministry of Foreign Trade, and their
activities are closely coordinated by this Ministry.
10
They have major responsibilities for Both legal and
illegal acquisitions and purchases; they work closely
with the KGB and GRU in arranging trade diver-
sions. East European trade companies assist them in
clandestine and illegal acquisition operations.
Official Soviet and East European science and tech-
nology (s&-r) organizations also play a major role in
both open and clandestine acquisition of Western
technology. The Soviet State Committee for Science
and Technology (GKNT) is the key player in arrang-
ing government-to-government science and technol-
ogy agreements to facilitate access to and the acquisi-
tion of established as well as new technologies,
including those just emerging from Western universi-
ties, laboratories, and high-technology firms. It is the
GKNT that oversees the allocation of scarce Soviet
hard currency for the legal purchase by various Soviet
organizations of selected Western technology for So-
viet military purposes. If the GKNT is unable to
acquire the necessary technology by open or legal
means, it tasks Soviet intelligence to clandestinely
acquire the technology.
It is the well-organized and well-coordinated use of all
these organizations that has made the Soviet program
to acquire Western technology so successful. As a
result, the Soviets have acquired militarily significant
technologies and critically important industrial West-
ern technologies that have benefited every major
Soviet industry engaged in the research, development,
and production of weapon systems.
Soviet Mechanisms for Acquiring Western Technology
Soviet acquisition mechanisms include: legal means
through open literature, through legal trade channels,
and through student scientific and technological ex-
changes and conferences; illegal means through trade
channels that evade US and Western (i.e. CoCom)'
export controls, including acquisitions by their intelli-
gence services through recruited agents and industrial
'Thu Coordinating Committee (CoCom) was established in 1949 to
serve as the forum for Western efforts to develop a system of
strategic export controls. It is composed of the United States, the
United Kingdom, Turkey, Portugal, Norway, the Netherlands,
Luxembourg, Japan, Italy, Greece, France, the Federal Republic of
Germany, Denmark, Canada, and Belgium.
2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
espionage. While a large volume of technology is
acquired by nonintelligence personnel, the overwhelm-
ing majority of what the United States considers to be
militarily significant technology acquired by and for
the Soviets was obtained by the Soviet intelligence
services and their surrogates among the East Europe-
an intelligence services. However, legal acquisitions
by other Soviet organizations are important since it is
often the combination of legally and illegally acquired
technologies that gives the Soviets the complete mili-
tary or industrial capability they need.
Because of the priority accorded to the military over
the civilian sectors of the Soviet economy, Western
dual-use technology?i.e., technology with both mili-
tary and civilian applications?almost always finds its
way first into military industries, and subsequently
into the civilian sectors of industries that support
military production. Thus, Soviet assurances that
legally purchased dual-use technology will be used
solely for civilian applications can seldom be accepted
at face value.
Legal acquisitions generally have their greatest im-
pact on the Soviets' broad industrial base, and thus
affect military technology on a relatively long-term
basis. The Soviet Kama Truck Plant, for example,
was built over some seven years with massive imports
of more than $1.5 billion worth of US and West
European automotive production equipment and tech-
nology. Large numbers of military-specification
trucks produced there in 1981 are now being used by
Soviet forces in Afghanistan and by Soviet military
units in Eastern Europe opposite NATO forces. Simi-
larly, large Soviet purchases of printed circuit board
technology and numerically controlled machine tools
from the West already have benefited military manu-
facturing sectors.
The Soviets give priority to those purchases that meet
the direct needs of the Soviet military-industrial
complex by paying for them in hard currency. Over
the past 10 years, the Soviets legally and illegally
purchased large quantities of Western high-technol-
ogy microelectronics equipment that has enabled
them to build their own military microelectronics
industry in a short time. This acquired capability in
11
microelectronics is the critical basis for the present
wide-ranging enhancements of Soviet military sys-
tems and for their continuing sophistication.
Acquisitions through illegal trade channels often have
both industrial and military applications, and thus are
important in the near term. Illegal acquisitions of
technology fall into two general categories, both of
which are extremely difficult to detect and monitor.
One is the diversion of controlled technology from
legitimate trade channels to proscribed destinations.
This is done through US and foreign firms that are
willing to engage in profitable impropriety; through
agents-in-place in US or foreign firms or foreign
subsidiaries of US firms; through Soviet- and East
European?owned firms locally chartered in the
West; and through foreign purchasing agents (includ-
ing arms dealers). For instance, to evade the US
embargo on microelectronic technology exports to the
Soviet Union, the Soviets and their surrogates have
set up dummy corporations in the West that purchase
sophisticated microelectronics manufacturing equip-
ment. This equipment is then shipped and reshipped,
sometimes with the knowledge of individuals in the
companies, to disguise its ultimate destination?the
Soviet Union or Eastern Europe. Both the Soviet and
Warsaw Pact intelligence services are in the main-
stream of this illegal technology trade flow. The other
type of diversion is an in-place diversion, in which
legally acquired technology and equipment?in the
computer area, for example?are put to military end
uses not authorized in export license applications.
The acquisitions that most directly affect Soviet
military development have come from intelligence
collection and related illegal trade diversions. Soviet
Bloc intelligence services have concentrated their
effort in the United States, Western Europe, and
Japan. These services target defense contractors and
high-technology firms working on advanced technol-
ogy (both classified and unclassified), foreign firms
and subsidiaries of US firms abroad, and internation-
al organizations with access to advanced and/or
proprietary technology, including access to computer
data base networks throughout the world.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
12
Table I
Major Fields of Technology of Interest to
Soviet and East European Visitors to the United States
Computers
Materials
Architecture
Automatic Control
CAD (Computer-Aided Design)
Cybernetics/Artificial Intelligence
Data Bases
Image Processing Design
Image Processing/Retrieval
Amorphous
CAD
Composites
Cryogenics
Deformation
Memories
N/C (Numerically Controlled) Units
Networks
Pattern Recognition
Programming
Robots
Software
Metallurgy
N/C Machine Tools
Powder Metals
Superconductors
Testing/NDT (Non-Destructive)
Semiconductors
CAD
Circoits
Defects
Devices
Design
Ion Implantation
Production Technology
SAW (Surface Acoustic Wave) Devices
Commun(cations, Navigation,
and Control
Antennas
Microwave/Millimeter Waves
Radio Wave Propagation
Satellite Communications
Signal Processing
Telecommunications
Vehicular/Transportation
Laser and Optics
Marine Systems
Shipbuilding
Fiber Optics
Gas Lasers
Optics
Tunable Lasers
Nuclear Physics Cryogenics
Fusion
Materials
M111) (Ma g n etohydrodyna m ics)
rvIicrobiology Genetic Engineering
Reactors
Structural Designs
Superconductors
Both legal and illegal acquisitions of US and Western
technology and equipment are coordinated with infor-
mation obtained through the complex network of
international governmental scientific and technical
agreements and exchanges that the USSR maintains
with the advanced industrial nations. These include
know-how, equipment, and computer data base collec-
tion activities of Soviet scientists and engineers who
participate in academic, commercial, and official
S&T exchanges. Visiting Soviet and East European
technical and student delegations to the United States
generally consist of expert scientists, many of whom
arc connected with classified work in their home
countries. Such was the case with the Soviet scientist
who managed to get assigned to fuel-air explosives
work. When he finished his US study programs, he
almost certainly returned to the USSR to work on
related weapons. Other Soviet and East European
scientists have come to the United States to work in
the aerohydrodynamic, cryogenic, optic, laser, com-
puter, magnetic bubble computer memory, nuclear,
microelectronic, and structural and electronic materi-
al areas. Given the military importance of these fields
to the Soviet Union, it appears likely that a high
percentage of these scientists will work on military-
related programs in these areas after they return
home.
From the beginning, Soviet candidates in various
academic and scientific exchange programs have
nearly always proposed research activities involving
technologies in areas that have direct military appli-
cations and in which the Soviets are technologically
deficient. Table I provides a list of the key high-
technology fields that Soviet and East European
4
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
visitors come to the United States to study, research,
or discuss, many of which are on the US Militarily
Critical Technology List today. In each of the past
two years, more than a third of the 50 program
proposals offered under the Graduate Student/Young
Faculty Program of the International Research and
Exchanges Board (IREX) has been completely un-
acceptable in terms of prospective technology loss,
and many other programs needed to be modified or
have access constrained before the exchanges could be
allowed.
The Soviets correctly view the United States and
several other Western countries as a continuing
source of important and openly available scientific
and technical information, which they take every
opportunity to-obtain access to. Some of the unclassi-
fied documents so acquired are previously classified
materials which had been downgraded to unclassified
through US procedures providing for automatic de-
classification after a stipulated period. When collect-
ed on a massive scale and centrally processed by the
Soviets, this information becomes significant because
it is collectively used by Soviet weapons designers and
weapons countermeasure experts.
The Soviets also regularly attend high-technology
trade shows, and attempt to visit commercial firms in
the West, particularly small and medium-sized firms
that are active in developing new technologies. These
apparent trade promotion efforts often mask Soviet
attempts to acquire emerging Western technological
know-how before its military uses have been identified
and government security controls have been applied.
Emerging technologies are particularly vulnerable to
foreign collection efforts of this type.
Soviet intelligence continues to place a high priority
on the collection of S&T information on genetic
engineering and futuristic weapons such as lasers and
particle beam weapons. The Soviets have been step-
ping up their efforts to acquire new and emerging
technologies such as very-high-speed integrated-cir-
cuit (VHS1C) and very-large-scale integration (VLSI)
technology from Western universities and commercial
laboratories for both military and commercial
applications.
5
13
Over the past few years there has been an increased
use of Soviet- and East European?owned firms locally
chartered in the United States and abroad to exploit
Western-controlled and military-related technology.
There are more than twenty Soviet- and East
European?owned firms in the United States, and near
the end of the 1970s there were more than 300 similar
firms in Western Europe. In addition to the United
States, heavy concentrations are in the United King-
dom, Sweden, the Netherlands, Italy, the Federal
Republic of Germany, France, Canada, Belgium, and
Austria. These firms are avenues for Soviet acquisi-
tion of advanced Western technologies, as was shown
when the US engineer arrested in late 1981 was
charged with selling US secret documents to an East
European intelligence officer employed by a Polish-
owned firm chartered in Illinois (see inset, p. 6).
Furthermore, firms chartered in the United States
can legally purchase controlled US technology and
study it without actually violating US export controls
unless they attempt to export the equipment or related
technical data from the United States without a
license.
Soviet Acquisitions and Benefits
Today's recognition of the crucial role of Western
technology in the development and production of
Soviet weapon systems and related military equip-
ment is not unique. Soviet dependence on Western
technology was visible and clear-cut in the years
immediately after World War II, when the Soviets
stole Western nuclear secrets leading to their develop-
ment of a nuclear weapon capability, and copied a US
bomber in its entirety leading to production of their
TU-4. To achieve major improvements in their mili-
tary capability quickly, they exploited captured scien-
tists and industrial plants and resorted to a combina-
tion of espionage, stealing, and copying Western
systems.
Since that early period of near-complete reliance in
the 1950s, the Soviets' dependence on Western tech-
nology to develop their weapons has decreased. Nev-
ertheless, despite several decades of Soviet priorities
focused on science, technology, and weapon systems,
the Soviets, because of their inability to be innovative
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
US Radar Expert Passes Over 20 Significant Classi-
fied Reports on Future US Weapon Systems to Intel-
ligence Agent
William II. Bell, a radar project engineer for a high-
technology US defense firm was recruited by an
intelligence officer who operated under cover as a vice
president of the Polish firm called Polamco. This
firm iso subsidiary of the Polish Government Corpo-
ration and is incorporated in Illinois and Delaware. It
began as an importerlexporter of machinery, parts
and tools and as a consultant to firms exporting these
products to Poland. The recruitment began as a
simple friendship between neighbors with mutual
sporting interests, grew quickly to include their fam-
i:ies, then to proving Bell's credentials by showing a
classified document to the agent, and then to passing
microfilm copies of classified reports at meeting
places in the US, Switzerland, and Austria. Mr. Bell
was in financial straits and was easily influenced by
the cash proffered?a total of 5110,000 over a three-
year period. In all, over 20 highly classified reports
on advanced future US weapon systems or their
components were passed to the Polish Intelligence
Service and probably eventually to the Soviet Intelli-
gence Service.
Among the classified reports, those of prime impor-
tance to the West included the F-1.5 look-down-
shoot-down radar system, the quiet radar system for
the 81 and Stealth bombers, an all-weather radar
system for tanks, an experimental radar system for
the US Navy, the Phoenix air-to-air missile, a ship-
borne surveillance radar, the Patriot surface-to-air
missile, a towed-array submarine sonar system, a
new air-to-air missile, the improved HAWK surface-
to-air missile, and a NATO air-defense system. The
information in these documents put in jeopardy exist-
ing weapons and advanced future weapon systems of
the United States and its Allies. The acquisition of
this information will save the Polish and Soviet
Governments hundreds of millions of dollars in R&D
efforts by permitting them to implement proven de-
signs developed by the United States and by fielding
operational counterpart systems in a much shorter
time period. Specifications on current and future US
weapon systems will enable them to develop defensive
countermeasure systems.
14
and effectively apply new technology to weapons
developments, still depend on Western technology and
equipment to develop and manufacture some of their
advanced weapon systems more quickly.
Today, Soviet military designers carefully choose the
Western designs, engineering approaches, and equip-
ment most appropriate to their deficiencies and needs.
These needs are still substantial and pervade almost
every area of weapons technology and related manu-
facturing equipment. Table 2 lists classes of Western
technology acquired by the Soviets and East Europe-
ans and illustrates the wide range of Soviet military
technology needs. In the following paragraphs of this
section, Soviet Bloc acquisitions have been grouped
according to their likely applications: strategic sys-
tems, aircraft systems, naval systems, and tactical
systems. Also cited are acquisitions in the microelec-
tronic and computer areas that have broad application
to military and industrial programs. In certain of
these areas, notably the development of microelec-
tronics, the Soviets would have been incapable of
achieving their present technical level without the
acquisition of Western technology. In other areas,
acquisitions have allowed the Soviets to reduce the
indigenous effort they would otherwise have had to
expend.
The Soviets' strategic weapons program has benefited
substantially from the acquisition of Western technol-
ogy. The striking similarities between the US Minute-
man silo and the Soviet SS-I3 silo very likely resulted
from acquisition of US documents and expedited
deployment of this, the first Soviet solid-propellant
ICBM. The Soviets' ballistic missile systems in par-
ticular have, over the past decade, demonstrated
qualitative improvements that probably would not
have been achieved without Western acquisitions of
ballistic missile guidance and control technology. The
most striking example of this is the marked improve-
ment in accuracy of the latest generation of Soviet
ICBMs?an improvement which, given the level of
relevant Soviet technologies a decade ago, appears
almost certainly to have been speeded by the acquisi-
tion of Western technology. Their improved accuracy
has been achieved through the exploitation and devel-
opment of good-quality guidance components--such
6
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
15
Table 2
Selected Soviet and East European Legal and Illegal Acquisitions
From the West Affecting Key Areas of Soviet Military Technology
Key Technology Area Notable Success
Computers Purchases and acquisitions of complete systems designs, concepts, hardware and software, including a
wide variety of Western general purpose computers and minicomputers, for military applications.
Microelectronics Complete industrial processes and semiconductor manufacturing equipment capable of meeting all
Soviet military requirements, if acquisitions were combined.
Signal Processing Acquisitions of processing equipment and know-how.
Manufacturing Acquisitions of automated and precision manufacturing equipment for electronics, materials, and optical
and future laser weapons technology; acquisition of information on manufacturing technology related to
weapons, ammunition, and aircraft parts including turbine blades, computers, and electronic
components; acquisition of machine tools for cutting large gears for ship propulsion systems.
Communications Acquisitions of low-power, low-noise, high-sensitivity receivers.
Lasers Acquisitions of optical, pulsed power source, and other laser-related components, including special
optical mirrors and mirror technology suitable for future laser weapons.
Guidance and Navigation
Acquisitions of marine and other navigation receivers, advanced inertial-guidance components, including
miniature and laser gyros; acquisitions of missile guidance subsystems; acquisitions of precision
machinery for ball bearing production for missile and other applications; acquisition of missile test range
instrumentation systems and documentation and precision cinetheodolites for collecting data critical to
postflight ballistic missile analysis.
Structural Materials
Propulsion
Acoustical Sensors
Electro-optical Sensors
Radars
Purchases and acquisitions of Westcrn titanium alloys, welding equipment, and furnaces for producing
titanium plate of large size applicable to submarine construction.
Missile technology; some ground propulsion technology (diesels, turbines, and rotaries); purchases and
acquisitions of advanced jut engine fabrication technology and jet engine design information.
Acquisitions of underwater navigation and direction-finding equipment.
Acquisition of information on satellite technology, laser rangefinders, and underwater low-light-level
television cameras and systems for remote operation.
Acquisitions and exploitations of air defense radars and antenna designs for missile systems.
as gyroscopes and accelerometers. The quality of
these instruments, in turn, depends to a considerable
degree on the quality of the small, precision, high-
speed bearings used.
Through the 1950s and into the 1960s, the Soviet
precision bearing industry lagged significantly behind
that of the West. However, through legal trade
purchases in the 1970s, the Soviet Union acquired US
precision grinding machines for the production of
small, high-precision bearings. Similar grinding ma-
chines, having lower production-rate capabilities,
were available from several foreign countries. Only a
few of these machines, either US or foreign, would
have been sufficient to supply Soviet missile designers
with all the quality bearings they needed. These
purchases provided the Soviets with the capability to
manufacture precision bearings in large volume soon-
7
er than would have been likely through indigenous
development. The Soviets probably could have used
indigenous grinding machines and produced the re-
quired quality of bearings over a long period by
having an abnormally high rejection rate.
While some of the Soviet acquisition in the aircraft
area appears directed toward the development of
countermeasures against Western systems, the Soviets
appear to target data on Western aircraft primarily to
acquire the technology. Furthermore, while the Sovi-
ets have acquired a large amount of hardware and
data from planes downed or captured in Vietnam and
elsewhere, they continue to attempt to acquire the
most advanced technologies through both legal and
illegal transactions with the West. Assimilation of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Western technology has been of great benefit to both
their military and commercial aircraft development
programs?to the extent that aircraft from certain
Soviet military design bureaus are to a significant
degree copies of aircraft of Western design. Soviet
military aircraft designers have "ordered" documents
on Western aircraft and gotten them within a few
months, including plans and drawings for the US
C-SA giant transport aircraft early in its development
cycle; these plans, although dated now, have contrib-
uted to current Soviet development of a new strategic
military cargo plane. Designers were in particular
need of data on US technological advances, but more
importantly, they needed information on aerospace
manufacturing techniques.
Soviet aircraft designers have been interested in US
military transports and wide-body jets and probably
have managed to accelerate the development pro-
grams for their IL-76 Candid and :IL-86 transports.
The IL-86 looks much like the Boeing 747 and the
IL-76 resembles the C-141. Neither system is an
identical copy.
The IL-76 also is used by the Soviets as the platform
for their new AWACS (Airborne Warning And Con-
trol System), which is expected to be operational in
the mid-1980s. This system will provide the Soviets
with a major improvement in attacking low-flying
missiles and bombers. The Soviet AWACS is striking-
ly similar in many ways to the US AWACS, and is a
major improvement over their old AWACS.
The Soviets' acquisition effort in the naval systems
area reflects well the two major factors that motivate
their requirements: the acquisition-of technology not
readily available to them?yet critical to their pro-
grams?and the acquisition of equipment which,
while producible in the Soviet Union, allows them to
divert resources to more pressing naval programs. The
Soviets appear to have concentrated their acquisitions
in areas related to aircraft carriers, deep sea diving
capabilities, sensor systems for antisubmarine warfare
and navigation, and ship maintenance facilities. In the
maintenance area, two huge floating drydocks pur-
chased from the West for civilian use by the Soviets
have been diverted to military use. Drydocks are
critical for both routine and fast repair of ships
damaged in warfare. In 1978, when th,e Soviets took
possession of one of the drydocks, they diverted it to
the Pacific Naval Fleet. The other was sent to the
Northern Fleet in 1981.
These drydocks are so large that they can carry
several naval ships. More importantly, they are the
only drydock facilities in either of the two major
Soviet fleet areas?Northern or Pacific?capable of
servicing the new Kiev-class V/STOL aircraft carri-
ers. Soviet advanced submarines carrying ballistic
missiles, Soviet Kiev aircraft carriers, and Soviet
destroyers were among the first ships repaired in these
drydocks. It is important to note that the drydocks
themselves are so large that no Soviet shipyard would
have been capable of accommodating their construc-
tion without major facility modifications, associated
capital expenditures, and interruptions in present
weapons programs. Their importance will be even
more pronounced when the Soviets construct the still-
larger carriers (for high-performance aircraft) project-
ed for the 1990s. The Soviets even have acquired
Western aircraft carrier catapult equipment and doc-
umentation for this larger carrier; catapult technol-
ogy, though relatively common in the West, is outside
the Soviet experience.
Within the past few years, the USSR also has con-
tracted for or purchased foreign-built oceanographic
survey ships equipped with some of the most modern
Western-manufactured equipment. In place of US
equipment that was embargoed, other Western equip-
ment has been installed on the ships. This moderniza-
tion of what is the world's largest oceanographic fleet
with Western technology will help support the devel-
opment of Soviet weapon system programs and anti-
submarine systems against the West.
Although the Soviets have a strong indigenous tech-
nology base that could support the development of
much of their tactical weapons systems, this does not
prevent them from maintaining an ambitious program
for acquiring and benefiting from Western technology
in this area. In some cases, their acquisitions satisfy
deficiencies in Soviet technology; smart weapons tech-
nology and electro-optical technology are examples of
8
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520064-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
17
Table 3
Microelectronic Equipment and Technology
Legally and Illegally Acquired by the Soviet Bloc
Equipment or Technology Comments
Process Technology for
Microelectronic Wafer
Preparation
The Soviets have acquired hundreds of specific pieces of equipment related to wafer preparation,
including expitaxial growth furnaces, crystal pullers, rinsers/dryers, slicers, and lapping and polishing
units.
Process Technology for
Producing Circuit Masks
Many acquisitions in this area include computer-aided design software, pattern generators and
compilers, digital plotters, photorepeaters, contact printers, mask comparators, electron-beam gener-
ators, and ion milling equipment.
Equipment for Device
Fabrication
Many hundreds of acquisitions in this area have provided the SoOets with mask aligners, diffusion fur-
naces, ion implanters, comers, etchers, and photochemical process lines.
Assembly and Test Equipment
Hundreds of items of Western equipment, including scribers, bonders, probe testers, and final test
equipment have been acquired by the Soviets.
this. Signal and information-processing technology,
particularly for Soviet air defense systems, is another.
More often, however, technology is exploited to speed
up a developmental program or to improve upon
original Western designs in an expeditious manner.
The Soviets appear to have concentrated their tactical
systems acquisitions on Western tank, antitank, and
air defense?related technology and equipment in or-
der to derive concepts and know-how to benefit their
weapons programs and to design countermeasures to
the Western systems. The Soviet SA-7 heat-seeking,
shoulder-fired antiaircraft missile contains many fea-
tures of the US Redeye missile. Such acquisitions
have enabled the Soviets to obtain advanced tactical
weapon capabilities sooner than otherwise would have
been possible.
Western equipment and technology have played a
very important, if not crucial, role in the advancement
of Soviet microelectronic production capabilities. This
advancement comes as a result of over 10 years of
successful acquisitions?through illegal, including
clandestine, means?of hundreds of pieces of Western
microelectronic equipment worth hundreds of millions
of dollars to equip their military-related manufactur-
ing facilities. These acquisitions have permitted the
Soviets to systematically build a modern microelec-
tronics industry which will be the critical basis for
enhancing the sophistication of future Soviet military
9
systems for decades. The acquired equipment and
know-how, if combined, could meet 100 percent of the
Soviets' high-quality microelectronic needs for mili-
tary purposes, or 50 percent of all their microelec-
tronic needs.
Table 3 identifies the microelectronic production-
related equipment that has been acquired by the
Soviet Bloc. These acquisitions have been grouped
into areas related to the four steps required to produce
a microchip: wafer preparation, circuit-mask making,
device fabrication, and assembly and testing.
Soviet computer technology has long been limited by
fabrication and production technology problems and
by difficulties in software development. Since 1969
the USSR and East European countries have been
developing a family of general purpose computers
known as the Ryad series. These computers, which
make up virtually the total Soviet and East European
effort in large general purpose computers, have been
and will continue to be used in a wide variety of civil
and military applications. Western technology has
been important to development of the Ryad series by
providing proven design directions both at the system
and component levels. The architectural designs of the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
18
R>ad computers, for example, arc patterned after
those of the highly successful mass produced IBM 360
and 370 series, computers that are used in a wide
range of applications and are highly serviceable in the
field.
With this approach, the Soviets and East Europeans
eliminated many of the risks involved in undertaking
the development and production of a new series of
general purpose computers, and saved considerable
amounts of manpower and time. Since the early 1970s
the Soviets and East Europeans have legally pur-
chased ,ore than 3,000 minicomputers, some of
which now being used in military-related organi-
zation, Furthermore, they are also developing mini-
computers that are direct copies of Western models.
Soviet and East European development of computer
systems has been aided by all available means?legal
and illegal, including clandestine--for acquiring the
needed technical know-how.
Thus, the Soviets and their Warsaw Pact allies have
derived significant military gains from their acquisi-
t'ions of Western technology, particularly in the stra-
tegic, aircraft, naval, tactical, microelectronics, and
computer areas. This multifaceted Soviet acquisitions
program has allowed the Soviets to:
? Save hundreds of millions of dollars in R&D costs,.
and years in R&D development lead time (see inset).
? Modernize critical sectors of their military industry
and reduce engineering risks by following or copy-
ing proven Western designs, thereby limiting the
rise in their military production costs.
? Achieve greater weapons performance than if they
had to rely solely on their own technology.
? Incorporate countermeasures to Western weapons
early in the developmentiof their own weapon
programs.
These gains are evident in all areas of military
weapons systems. While difficult to quantify, it is
clear that the Western military expenditures needed
to overcome or defend against the military capabilities
derived by the acquisition of Western technology far
outweigh the West's earnings from the legal sales to
the Soviets of its equipment and technology.
Soviet Intelligence Officer Reveals
Technology Acquisition Saved Soviet Military
Hundreds of Millions of Rubles
A former Soviet intelligence officer revealed that
information on Western military-related technology
acquired by the Soviet intelligence services saved the
Soviet military industry hundreds of millions of
rubles. The acquisition of Western technology oper-
ationally was assigned the highest priority for collec-
tion by local residencies in key West European
countries because of the relatively easy access to
much US and Western technology in Europe and the
praise being received by the services for their acquisi-
tion efforts.
These acquisitions were directed by the military
manufacturing industries under the Council of Minis-
ters, and there was intense competition between the ?
intelligence services to acquire Western technology
needed for weapons development programs. Of par-
ticular need by Soviet weapons designers has been the
acquisition of knowledge on special materials, nota-
bly the weaving of carbon filaments in a three
dimensional configuration which the services were
tasked to acquire. The end products from this 3-D
carbon-carbon weaving technology are useful for ab-
lative heat shields for high velocity reentry vehicles -
(the warhead part of ICBMs and SLBMs) and for
other portions of rocket motors for large missiles.
The Soviet acquisition of some of this technology is
likely to enable them to eventually gain a capability
for increased military options against the West?a
capability that otherwise would have taken them
several additional years to develop themselves. The
intelligence services also worked closely with scien-
tists from the Soviet military manufacturing indus-
tries and even planned joint operations against West-
ern Trade and Equipment Fairs in order to acquire
needed Western technology.
10
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Outlook for the 1980s
The Soviets military R&D and weapon test-and-
evaluation efforts are continuing at a rapid pace.
Several hundred development projects for weapons
systems and major system elements are now under
way, and it is expected that through the 1980s the
number of new or modified advanced Soviet weapon
systems emerging from these projects into production
and deployment will remain at the high levels of the
last two decades?some 200 weapon systems per
decade.
Soviet military manufacturing capacity increased by a
significant 80 percent during the 1960s and 1970s,
and new plant expansion now under way at one-fourth
of their key weapons manufacturing facilities will add
considerably to their capabilities. These new facilities
will be ready to produce weapons in the next four to
10 years. Plant expansion is in the following areas:
ground warfare vehicles, including new tanks; avi-
ation, including facilities for a new B-1-type bomber
and a new long-range military transport aircraft
having strategic airlift capabilities; naval shipbuild-
ing, including submarines for ballistic missiles and
cruise missiles, as well as full-size aircraft carriers for
high-performance aircraft capable of competing with
the United States in global operations; and electronic
and microelectronic manufacturing facilities through-
out the USSR. The development and production of
new Soviet weapons at these facilities is sure to be
more complex and costly than during the 1970s.
All of this military development and plant expansion
activity, however, is taking place at a time when the
Soviet economy has reached its lowest level of growth
since World War II. Soviet annual GNP growth may
well be limited to an average of Ito 2 percent by the
mid-1980s. Stagnation in industrial sectors that are
key to both the civilian and the military sectors will
make it increasingly difficult for the Soviets to satisfy
the needs of both. Thus, Soviet leaders will have to
make tough choices among defense, investment, and
consumption; the competition among rival claimants
for resources will become intense. Under these condi-
tions, it may be impossible for the Soviets to maintain
current growth in military production without hurting
the civilian economy.
11
19
?
Despite these economic difficulties, there are no signs
that the Soviets are shifting resources away from the
military sector or slowing down development of weap-
on systems that will be entering the production stage
by mid-decade. New generations of Warsaw Pact
weapons will require selected critical component and
modern manufacturing technologies. It is in these
areas that Soviet illegal acquisitions of Western tech-
nology, complemented by legal acquisitions, are most
likely to be concentrated over the next five to 10
years.
Among the more important technologies are micro-
electronics, computers, and signal processing. Micro-
electronics will play a very significant role in advances
in computers and signal processing, and all of these
technologies will be important in developing advanced
Soviet missile, aircraft, naval, and tactical weapon
systems, and associated detection systems. Additional
projected Soviet technological needs related to such
systems are presented in the appendix.
As the result of both tactical and strategic force
modernizations, Soviet and Warsaw Pact military
manufacturers are increasingly pressed by large-scale
production requirements and the related need to
control manufacturing and materials costs. Thus,
particularly critical for the 1980s are Soviet needs to
improve their manufacturing capability. To a large
extent, the level of manufacturing technology in Sovi-
et plants determines the Soviets' capability to move
new technology from R&D into military applications.
Manufacturing technologies play a significant role not
only in the development of advanced component tech-
nologies, such as microelectronics and computers, but
also in the actual production of modern military
systems.
Future Soviet and Warsaw Pact acquisition efforts?
including acquisitions by their intelligence services?
are likely to concentrate on the sources of such
component and manufacturing technologies,
including:
? Defense contractors in the United States, Western
Europe, and Japan who are the repositories of
military development and manufacturing
technologies.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
? General producers of military-related auxiliary
manufacturing equipment in the United States,
Western Europe, and Japan.
? Small and medium-size firms and research centers
that develop advanced component technology and
designs, including advanced civil technologies with
future military applications.
The combination of past Soviet acquisition practices
and projected Soviet military needs indicates that the
United States and its Allies are likely to experience
serious counterintelligence and related industrial se-
curity and export control problems over the next five
to 10 years.
The task of stopping Soviet Bloc intelligence oper-
ations aimed at Western military and industrial tech-
nologies already poses a formidable counterintelli-
gence problem, both in the United States and abroad.
But that task is likely to become even more difficult in
the future as several trends identified in the 1970s
continue into the 1980s:
? First, since the early 1970s, the Soviets and their
surrogates among the East Europeans have been
increasingly using their national intelligence ser-
vices to acquire Western civilian technologies?for
example, automobile, energy, chemicals, and even
consumer electronics.
? Second, since the mid-1970s, Soviet and East Euro-
pean intelligence services have been emphasizing
the collection of manufacturing-related technology,
in addition to weapons technology.
? Third, since the late 1970s, there has been increased
emphasis by these intelligence services on the acqui-
sition of new Western technologies emerging from
universities and research centers.
The combined effect of these trends is a heavy focus
by Soviet Bloc inteliigence on the commercial sectors
in the West?sectors that are not normally protected
from hostile intelligence services. In addition, the
security provided by commercial firms is no match for
the human penetration operations of such foreign
20
intelligence services. But the most alarming aspect of
this commercial focus by Soviet Bloc intelligence
services is that as a result of these operations the
Soviets have gained, and continue to gain, access to
those advanced technologies that are likely to be used
by the West in its own future weapons systems.
The Soviet intelligence effort against Western defense
contractor firms poses a serious problem in itself.
With more than 11,000 such firms in the United
States and hundreds of subsidiaries abroad, US coun-
terintelligence efforts are stretched thin. Protection of
US firms abroad from hostile intelligence threats is
the responsibility of host governments, but they too
are feeling the burden of well-orchestrated Soviet
Bloc efforts. The Soviet intelligence threat and the
illegal trade problem appear to be severe in Japan. It '
appears that Western industrial security?both de-
fense and commercial?will be severely tested by the
Soviet intelligence services and their surrogates
among the East European intelligence services during
the 1980s.
Western industrial nations also can expect increased
Soviet Bloc intelligence activities directed at the
acquisition of their key industrial technologies. West-
ern export controls are presently being updated and
broadened; the CoCom allies have recently agreed to
strengthen controls and to enhance their enforcement.
Moreover, serious hard currency shortages, along with
generally increased restrictions on Soviet S&T visitors
to the United States, will make the Soviets even more
dependent on intelligence and other illegal efforts to
acquire the goods and equipment they will need.
The massive, well-planned, and well-coordinated So-
viet program to acquire Western technology through
combined legal and illegal means poses a serious and
growing threat to the mutual security interests of the
United States and its Allies. In response, the West
will need to organize more effectively than it has in
the past to protect its military, industrial, commercial,
and scientific communities.
I 2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Appendix
Projected Soviet Technological
Needs and Acquisition Targets
Through the 1980s
Given the dynamic nature of their collection program,
it is expected that the Soviets will continue their
attempts to acquire a broad range of Western technol-
ogies. Certain areas, however, represent priority col-
lection targets for them; these areas are critical to the
Soviets' enhancement of their weapons capability.
Over the past decade, the Soviets' most pronounced
improvements in strategic weaponry have been in the
development of a MIRV ballistic missile capability
and a significant improvement in the accuracy of their
ICBMs. The former capability was made possible
largely through the introduction of onboard digital
computers and the latter through the improvement in
the quality of the missile guidance systems and the
procedures used to calibrate them. Technology acqui-
sitions from the West contributed significantly to
these improved capabilities.
The Soviets probably will continue to make their
highest priority the acquisition of Western microelec-
tronics and computer technology for in-flight guid-
ance computers. This acquisition effort will be moti-
vated by a desire to overcome reliability problems and
also to provide the on-board processing capability
required for the development of new guidance options
with the potential for extremely high accuracies.
The Soviets will also give top priority to acquiring
information on the latest generation of US-inertial
components upon which the MX ICBM and the
Trident SLBM guidance systems are based. Despite
the past accuracy improvements of Soviet ICBMs,
these two US systems incorporate technologies be-
yond present Soviet technological capabilities. More-
over, their SLBM accuracies are significantly behind
those of US systems. In addition to information on
hardware, the Soviets are expected to seek calibration
software algorithms which, as the guidance instru-
ments themselves reach their practical performance
limit, would allow for continued improvement in
weapon system accuracy.
13
21
Western solid rocket propulsion technology also will
be a high-priority Soviet acquisition target in the
1980s. While the Soviets have vast experience with
the liquid-propellant systems which represent the bulk
of their ballistic missile force, they are shifting their
emphasis to solid propulsion systems, which have
practical advantages over liquid systems in a variety
of applications. At the fame time, the Soviets have
had only limited success with the progress of their
solid-propulsion program. They probably will pursue
the acquisition of information on solid-propellant pro-
duction procedures, and propellant grain design, mo-
tor case, and rocket nozzle technologies.
The Soviets' ABM R&D effort has continued apace
since the 1960s. As a result, they have gained consid-
erable expertise in the development of large fixed-site
radars for early warning, tracking, and engagement,
and their interceptor technology has also improved
substantially over the years. Areas remain, however,
in which the Soviets will still seek and would benefit
from sophisticated Western ABM technology. These
include signal processing for detection, discrimina-
tion, target assignment, and sensor technology, par-
ticularly in the long-wave infrared portion of the
electromagnetic spectrum applicable toward improv-
ing their launch detection capability.
Priority Soviet targets in the aircraft area will include
Western materials technology, particularly composite
materials to allow weight-efficient designs. The Sovi-
ets would also benefit from the acquisition of certain
engine technologies, in particular those critical to the
development of high-bypass turbofans for large strate-
gic airlift type of aircraft. While, in general, Soviet
avionics technology appear adequate, the Soviets have
yet to demonstrate a capability to deploy reliable,
accurate airborne inertial navigation systems for long-
range navigation and weapons delivery. Thus, while
long used in the West, these systems are still prime
candidates for acquisition.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Very high priority probably will be given to the
acquisition of computer-aided aircraft design technol-
ogy, an area in which the Soviets are clearly im-
pressed by US progress. In general, they also will
continue to benefit from the acquisition of efficient
aircraft production technology from the West to
reduce costs.
While the Soviets have a strong indigenous air defense
radar and missile technology, their general lag in
microelectronics and microprocessing will direct them
to attempt wherever possible in the West the acquisi-
tion of advanced signal-processing hardware and
software.
The Soviets will continue to emphasize the acquisition
of naval-related technologies applicable to improving
their antisubmarine warfare capabilities, an area in
which much Western technology is superior to theirs.
Thus, a significant effort to acquire acoustic sensor
technology can be expected, in particular that tech-
nology applicable to the development of large towed
aconstic arrays that would assist the localization of
Western submarines in open waters. They probably
will also target the acquisition of Western signal-
processing hardware and software required to fully
exploit the detection capabilities of these sensors.
Another critical problem area to which the Soviets
will direct acquisition is that of submarine quieting.
Here also the Soviets lag the West significantly. As a
result, not only are their submarines more vulnerable
to detection, but the self-generated noise reduces the
effectiveness of their own acoustic sensors.
An area in which the Soviets have historically lagged
behind the West is precision submarine navigation?
in particular, in the development of submarine inertial
navigation systems. The need for improvements here
will become more pressing as the Soviets develop long-
range cruise missiles for land attack which require
precise knowledge of launch location.
The Soviets also will continue to target technologies
related to the design and construction of large aircraft
carriers (for high-performance aircraft) to reduce the
likelihood of p,or design choices that would arise in
what is for them an entirely new type of construction
program.
22
Much of the Soviet acquisition effort in the area of
tactical weapons is likely to be targeted against seeker
and sensor technology for tactical missiles and preci-
sion-guided munitions. The Soviets will apply consid-
erable effort in particular to acquiring advanced
Western electro-optical technology including that re-
lated to antitank weapons. As in other weapons areas,
the signal processing and microelectronics technol-
ogies supporting tactical weapon systems will also be
priority acquisition targets. Technical documentation
on entire weapon systems, if obtained, will be u.ged to
develop countermeasures.
In the microelectronics area the USSR is now at the
stage of implementing its LSI (large-scale integration)
technology to high-volume production. Despite the
large acquisitions of Western technology and produc-
tion equipment over the past 10 years which have
brought them to the LSI level, additional acquisitions
from the West are needed for the more sophisticated
weapons projects of the future. Ever-increasing needs
for higher precision Western equipment will extend at
least through the 1980s.
In addition, the Soviets will require considerable
expansion of their microelectronic material base to
support continued expansion of integrated-circuit pro-
duction. In this regard, the USSR is seeking Western
help to build two or three poly-silicon plants that will
more than double current Soviet capacity for military
applications. Also, with increasing advances in the
technology, the USSR already will be seeking addi-
tional Western assistance in key complementary tech-
nologies such as packaging and printed circuit board
production.
The USSR is expected to focus its future acquisitions
efforts on the emerging technologies related to very-
high-speed integrated circuits (VHSIC) and very-
large-scale integration (VLSI). It is important to note
that, while VHS1C is thought of as a military devel-
opmeut program, and VLSI as a civilian technology,
there is little difference between the two as far as
Soviet production needs are concerned. The same
materials, production, and test equipment will be used
to produce both. In both of these technological areas,
the USSR has developed effective means for illegally
acquiring Western advanced products.
14
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
23
Prime Soviet collection efforts in computer technology
through the 1980s are likely to include large-scale
scientific computers such as the US-built CRAY-I
Computer. Computers of this class offer significant
improvements over Soviet models in weapons-systems
design and simulation and in the processing of nu-
merical data for many military applications. Other
hardware targets will include: very dense random-
access memory chips; high-capacity disk drives and
packs; the so-called "superminicomputer" class of
machines; and the latest in general purpose computer
technology. All of the above targets offer opportuni-
ties for significant performance improvements and
represent technologies of substantial Soviet lag.
In computer software, the Soviets will continue to
attempt to collect IBM programs and programs of
other vendors written for these machines because of
past Soviet decisions related to copying IBM comput-
ers. The large and growing number of IBM-compati-
ble computers in the USSR means that collection
activity in this area can be expected to increase. The
compelling attraction of computer networks also
should spur great Soviet interest in acquiring net-
work-control software and other programs related to
networking.
15
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
24
Chairman ROTH. Senator Cohen.
Senator COTTEN. Mr. Chairman, I have a prepared statement which
I would ask your permission to insert in the record.1
Chairman ROTH. Without objection.
OPENING STATEMENT OF SENATOR COHEN
Senator COTTEN. I agree with Senator Nunn that while he and
Senator Jackson may have some dispute on strategic airlift, there
is no dispute about the strategic vulnerabilities brought about by
our lack of control over the export of technology to the Soviet Union
and to other Warsaw Pact countries.
The subcommittees interest in this issue has been a bipartisan
effort. As Senator Nunn pointed out, Senator Jackson began the
investigation in the early seventies and as a member of the subcom-
mittee. I can recall, he also had a series of hearings in 1980. One of
the issues that has been of great importance to me is one touched
upon by Senator Nunn in his opening remarks; that is academic
exchanges. It makes very little sense to me to undertake a program
of controlling the flow of goods and materials to the Soviet Union
and their Warsaw Pact countries, if, in fact, we allow them into our
universities and colleges to obtain the information itself. It is for
that reason that I asked Dr. Perry during those hearings in 1980
for a list of all the U.S. students studying in the Soviet Union and
a corresponding list of those Soviet students who were studying in
the United States.
It is contained in this record of our hearings, February 20, 1980.
I will just take a moment to cali attention to the disparity that cur-
rently exists. For American students studying in the Soviet Union,
I will just list three or four topic areas: Ideas about the Russian
east in the 19th century Russia and the role of p-eographical science
in shaping them; debates of democratization of the military from
1866 to 1881; the musical genres in Russian music from the last half
of the 16th century to the first half of the 18th century: administration
of the Russian Empire under Catherine the Great, 1762 to 1796; and
a study of the linguistic basis of Pushkin's Iambic Tetrameter.
It is interesting to note the comparison of what the Soviets are
studying here,. There are some 45 listed, so T will only list one or two:
Research in the theory and applications of measuring computing sys-
tems for automation of scientific experiments and testing power engi-
neering objects; research of the effect of various technological and
constructive parameters on the properties of thin film covers: research
of interaction of ions and plasmas to solid surfaces, especially with
compound surfaces which are used as construction material for vacuum
chambers of fusion devices; research in the field of automatic control
as applied to space ships; and development of recurrent methods for
navigation in space and optimal filtration of hindrances; and the list
(roes on and on. You can see there, is in fact a double standard that is
practiced ITS far as acquisition of information concerning our respec-
tive societies. I would submit this is an area where we ought to focus
more seriously as we proceed with these hearings.
See p. 313 for the prepared statement of Senator Cohen.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
25
Thank you very much, Mr. Chairman.
Chairman ROTH. Senator Jackson.
Senator JACKSON. Mr. Chairman, I would like to ask consent to have
my entire statement in the record together with two letters, a letter to
President Reagan on March 8 and a letter to President-elect Reagan
on November 14, 1980, together with a speech that I made on February
11 of, this year, at an appropriate place in the record and that my
statement be included as read.'
Mr. Chairman, I want to commend you as chairman for following
through on the excellent work that Senator Nunn was able to accom-
plish as the previous chairman of this subcommittee, pursuing this all-
important area of technology transfer.
Senator Nunn played a critical role in the evolution of the studies
and investigations that are now underway.
I. would point out that documents and other information made
available to the Senate by the Select Committee on 'Intelligence, of
which. I am a member, as is the distinguished chairman of the sub-
committee, Senator Roth, established that the Soviets are pursuing
a purposeful and determined campaign in this field. Their activities, as
the chairman knows and members of the subcommittee know, are
diverse, numerous, and well funded, and they have in too many cases
been successful.
We now know, and I believe these hearings will further demonstrate
that in many ways the United States has in effect, been supporting the
metastasizing power of the Soviet Union. As I stated in remarks to
the Senate several weeks ago, there is no longer doubt that our tech-
nology has materially aided Soviet expansion. It has improved Soviet
weapons. intelligence devices and economic leverage. The need for a
clear and comprehensive technology transfer policy is urgent. Yet our
Government still has a long way to go. And I want to reiterate what
Senator Nunn said, and that is that this is a bipartisan problem. It is
a problem that has been present in previous administrations as well
as a problem for the present administration.
And may I just conclude on one point here that I think is vital. Our
President is going to be sitting down with Mr. Brezhnev, or an ap-
propriate designee, we hope very shortly, in negotiations of strategic
consequence. One of the tragedies is that our President will not at this
time be able to say to President Brezhnev, "We will be glad .to help
make for a more peaceful world. We will help make it possible for
your country to enjoy some of the benefits of our technology if you
will only cooperate in these other areas." In other words, our President
will not have the bargaining power, the leverage which he should
have in negotiations, because the Soviets have been able to obtain our
technology by larceny, where they are not able to get it openly. This
gives them an enormous edge both economically and militarily over
what they could accomplish otherwise. This should not be the case,
and I do want to emphasize the timeliness of this hearing and the
importance of this investigation as we deal in the broad strategic area
affecting negotiations between the two countries. We have lost a very
valuable bargaining chip worth billions of dollars in commercial terms
but of even bigger consequence in terms of diplomacy, in terms of
I See p. 315 for the prepared statement of Senator Jackson along with the two mentioned
letters and copy of Senator Jackson's speech of Feb. 11, 1982.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
28
national security and in terms of trying to reach an agreement that
will make for a more peaceful world.
Chairman ROTH. Thank you, Senator Jackson.
Senator Rudman.
Senator RITDMAN. Thank you, Mr. Chairman.
I don't have an opening statement this morning.
Chairman ROTH. Senator Chiles.
Senator CHILES. Mr. Chairman, I would like to ask permission to
put my opening statement in the record.
Chairman ROTH. Without objection.
[The statement follows:]
OPENING STATEMENT OF SENATOR CHILES
Senator CHILES. I do want to take this opportunity to thank Senator
Jackson who started calling attention to this problem a number of
years ago and to thank Senator Nunn and his staff. They did a tre-
mendous amount of work to get prepared for this hearing.
I think this hearing is something we have needed to do for a long,
long time. We have been allowing our technology to go to the Russians.
It allows them to take a shortcut, and to be able to use their money
and to put their money into developing technology for weapons and
some of the other items and even using the technology they are getting
from us, even in the weapons field, but to cut across and not to spend
tho research and development money, and that is something that has
been going on for a long time.
We have known that technology was leaving this country. At the
same time, so far we have done very little about it. One example of
Soviet bloc efforts to obtain U.S. technology for military purposes
took place in my home State. A Federal grand jury in south Florida
indicted a Mr. Carl Heiser and another man and charged them with
acting as agents for the Soviet Union and East Germany. He was con-
victed of conspiring to export, without licensing and authorization,
an inertial navigation system and a large capacity advanced com-
puter. Both of those products have directed military applications and
although both men were found guilty in a jury trial, they were able
to overturn their convictions on appeal. This particular case is only
one example of Soviet efforts to obtain our most advanced technology.
I think while there are some laws on the books, enforcement has
been very lax and the Commerce Department have not taken the kind
of steps we have needed. I hope that these hearings are going to lead
to a new policy and to a tightening of controls so that we are not ex-
porting this technology. I am delighted to see these hearings are being
held.
Chairman ROTH. Thank you, Senator Chiles. We will now call our
first witness, Joseph Arkov. He is a former Soviet engineer now living
in the United States.
Mr. Arkov, under our rules, we require each witness to take the
oath. We will not require you to stand, but if you will raise your right
hand.
Do yon solemnly swear that the testimony you give before this sub-
committee will be the truth, the whole truth, and nothing but the truth,
so help you God?
Mr. ARKOV. I do.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
27
TESTIMONY OF JOSEPH ARKOV (ASSUMED NAME FOR FORMER
SOVIET ENGINEER)
Chairman Rani. You may now proceed.
Senator NuNN. Mr. Chairman, may I make a brief statement on this?
Our first witness is Joseph Arkov, the assumed name of an emigre
who, as an engineer in the Soviet Union, worked on various projects
to copy or use American technology.
Mr. Arkov is testifying behind a screen because he is concerned about
his relatives still living in the Soviet Union. I want to stress Mr.
Arkov is here voluntarily. When subcommittee staff contacted him
early this year, he was cooperative and forthright and said he would
try to assist us in any way he could.
Mr. Arkov, I want to thank you on behalf of every member of the
subcommittee for being here and testifying and I want to make it plain
that he is using an assumed name for his family's protection.
Chairman ROTH. Please proceed.
Mr. ARKOV. My name is Joseph Arkov. I am a Russian emigre who
currently resides in California. I have been in the United States for
2 years. I am employed as an engineer.
I make this statement gladly as a demonstration of my wish to co-
operate with the Congress in gathering information about the Soviet
Union's efforts to obtain, duplicate, and utilize high technology ma-
chinery and information from the United States. At my request, my
true name, as well as specific references to my life in the Soviet Union
have been deleted from this statement, in order to protect my true
identity and to prevent possible harm to my family or me.
I was born and raised in the Soviet Union. My first 8 years of edu-
cation were spent in ordinary public elementary schools. In my ninth
year of education, when I was about 14 years old, I came to the atten-
tion of my teachers as being gifted in science and engineering. I was
then enrolled in a special school sponsored by the department of phys-
ics at a well-known university in the Soviet Union. Following that 1
year program of study, I was allowed to attend an engineering school.
I was a student in the engineering school for 6 years. During this
period, I was also required to receive military training in a program
similar to ROTC studies offered college students in the United States.
After graduation from the engineering school in 1970, I went to
work in a research institute. A primary ajective of the research in-
stitute was to develop highly sophisticated cameras for use in military
applications. The institute's activities are examined closely by the So-
viet defense ministry. I worked in the institute for about 6 years, from
1971 to 1977.
In 1977, I was assigned to work in another research institute. In this
plant, as in many other engineering research and development facil-
ities in the Soviet Union, the major emphasis is on military pursuits.
i
However, there often s a small section of the military-related in-
stallation set aside for the development of civilian and commercial
products. Civilian and commercial product development sections are
not high priority projects.
If, for example, a new American computer has been obtained by the
Soviets, they will make a military application of it, rather than a
civilian application. The institute used a sophisticated American com-
puter in its military operations. Officials at the institute were very
95-929 0 - 82 - 3
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
28
proud of it and even provided tours for employees to see it. It was in
such a civilian and commercial section where I was assigned to work.
The Soviet Government wants to develop its own ability to produce
high technology equipment similar to that manufactifted: hi the West
and Japan. But once such products are made in the Soviet Union,
the people of the Soviet Union still do not have confidence in them.
They prefer goods from the West.
A special premium is placed on products produced in the United
States. Goods made in Japan also are considered particularly desir-
able. Given the choice, the people of the Soviet Union do not prefer
their own country's products. There is no patriotism in department
stores.
The Soviet Government wants more high technology from the
United States. Each technical institute is allocated a certain amount of
money to be used for the purchase of "Western, particularly, American
technology.
The Soviet Union has two goals in mind when it seeks to obtain high
technology machinery from the "West. One objective is to study the
equipment with the intention of imitating or duplicating it.
The second objective is to use the machinery, particularly to use it in
the manufacture of other high technology components. The second
goal?the use of the machinery?is, by far, the most important to the
Soviets.
In my work in the second research institute, I had the assignment of
copying Western and Japanese high technology. One of my tasks, for
example, was to develop a system design for the production of color
television cameras for video tape recorders. In this pursuit, my super-
visors made no attempt to be deceptive about what they wanted me to
do. I was not to conduct any original research and development. I was
given television components produced in Japan and I was told to copy
them.
The Soviet Government benefits to a certain extent from its pro-
grams aimed at duplicating Western technology. But the results have
been, and will continue to be, limited. Soviet authorities have come to
the realistic conclusion that their country's level of technology is too
far behind the "West for them to make great strides through copying.
They do not have the human resources or the fine-tuned equipment
required to produce the high technology machinery they try to copy.
Once they know what makes a given piece of machinery work, they
find that they do not have ,the technical know-how and equipment to
produce the product themselves. That is why they want Western high
technology machines that will enable them to produce the products.
And the Western products they desire the most are those produced in
the United States. That is why they want American high technology
machines with which they can produce the components for high tech-
nology products.
By using?not copying?the American high technology products,
they move closer to their goal of technical self-sufficiency. Whether
they will ever become self-sufficient in high technology is a debatable
point. My own view is that this course of action gives them quick gains
but, over the long run, it will result in their being permanently behind
the United States, forever having to rely on American products to
manufacture their own.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
29
However, being behind us in technology is a relative condition. The
Soviets can make progress in a technical sense and, at the same time,
trail the United States but, by their standards, they will have achieved
much. Their accomplishments will have been made with limited cost to
them because the basic research and development will have been paid
for by the Americans.
To repeat, then, the Soviet strategy in obtaining American high
technology products includes efforts to copy and duplicate but the
Soviets' primary objective is to obtain machinery which they can use in
the manufacture of their own high technology equipment.
This distinction?the difference between copying of technology and
the use of it?is an important one because it provides the United States
with a key insight into which products the Soviets are the most anxious
to obtain. It also can influence American policymakers in deciding
which products the United States can afford to sell the Soviet Union,
and which components should not be sold to them.
Soviet strategy in using American products can be seen in the fol-
lowing illustration. Let us say, for example, that the Soviets have 100
plants involved in producing components for use in space flight. Each
of the plants could use a certain kind of American computer. But they
cannot obtain 100 computers; that is, one for each plant. Instead, they
are able to obtain three or four American computers of the desired i
type. They use the computers as best they can n those three or four
plants where they can do the most good. They are not inclined to use
them as nonproducing models to be studied in a laboratory for the
purpose of copying.
Moreover, if the American product obtained in another transac-
tion?if, for example, the product is a sophisticated oven used in the
heating of microchips?then they are even less interested in copying or
imitating. They will use the oven to produce microchips. There is no
civilian use for equipment used to manufacture integrated circuits or
semi-conductors.
The Soviet Union obtains American high technology in ways other
than copying or utilizing machinery. The Soviets make the most of
American technical journals and Government documents.
In the free society of the United States, there is not much that can
be done to prevent the Soviets from getting hold of technical journals
and other private publications. But it is my opinion that the U.S.
Government is following an unwise policy in making public as much
military data as it does.
rAt this point, Senator Jackson withdrew from the hearing room.]
Mr. Amoy. From my own personal experience in the research in-
stitutes, I know how the Soviets wasted no time in distributing infor-
mation from the U.S. military. In a military refresher course fol-
lowing my graduation from college, I was part of a group that was
shown films of U.S. military equipment such as tanks, artillery, and
amphibious vehicles. One film showed the internal layout of one such
vehicle. The blueprints revealed their publication date, a time only
2 months prior to the date of the refresher course. That indicated to
me that the Soviets had obtained and made informational use of the
design of the vehicle before it went into production. In addition, one
of my duties in the research institute was to read American technical
journals and U.S. Government publications. A special team of Eng-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
30
lish- speakingSoviet linguists was employed to provide us with prompt
translations into Russian of the journals and documents.
In most fields of technical research, development and production
which I am familiar with in the Soviet Union, the overwhelming
majority of resources are invested in military applications. If, in the
area of high technology obtained from the United States, one much
prized oscilloscope is obtained from the United States, it will be turned
over for military application in virtually every instance. This strength-
ens the position of the U.S.S.R. armed services but it is done at the
expense of the civilian sector.
The oscilloscope might have been used in the development of a con-
sumer product but rarely are such high technology devices ever utilized
to benefit the Soviet citizen as a consumer.
As a matter of fact, the Soviet industrial capacity is so completely
overburdened with military production that the Soviets could not make
a civilian or commercial application of certain high technology prod-
ucts even if they wanted to.
For example, there is almost no possible way the Soviets could make
a civilian application of laser technology. Any laser component they
obtain from the United States will go into the military sector. The
Soviets have no other use for it. There is no commercial market for
high technology equipment to the U.S.S.R. People cannot afford such
luxuries yet the Government displays it for propaganda purposes.
Most equipment is used by the Soviet military industry.
In my engineering jobs in the Soviet Union, I frequently was as-
signed to attend trade fairs where Western nations, including the
United States, displayed their high technology equipment. I was seen
as a potential buyer. But, in fact, I was not there as a would-be con-
sumer. I had not been sent to the trade fair to buy anything. I was
there to obtain information about Western technology concerning air-
craft and missiles as well as other technical areas. I discovered many
valuable technical ideas at trade fairs and reported on them to my
supervisor back in the Soviet Union.
Aside from learning and inspecting the wares displayed in trade
fairs, Soviet visitors have been known to steal products and their com-
ponents. I know a man in Russia who had been assigned as a security
guard at a trade fair in Moscow. This assignment was the turning
point of his career. In league with the KGB, the man used his position
as security guard to steal several pieces of high technology equipment.
He was rewarded handsomely for his thievery. Not an especially
intelligent man, he could never have earned on his own the Ph. D.
degree he subsequently was awarded. He was then made director of
a department in a research institute, a position for which his training,
experience, and ability left him totally unqualified.
Senator NuNN, Might I interrupt while you are taking a break.
You are saying this individual stole equipment from a trade fair
where he was a security guard and he was rewarded for that with a
Ph. D. degree?
Mr. ARKOV. Yes.
Senator NuNN. Was it an honorary degree or do they have such a
thing in the Soviet Union?
Mr. ARKOV. It is an honorary degree and it is awarded not only aca-
demically, but materially.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
31
Senator Ntrisrisr. It is an honorary degree for thievery?
Mr. ARKOV. Yes.
Senator COHEN. It is called the "Peter Principle" in this country.
Mr. ARKOV. In my college days, neither I nor any of .my fellow
students were given the opportunity to study in the United States
under a student exchange program. Normal students were never con-
sidered for such programs. Those who got to study in the United
States usually were not even students in the usual sense of the word.
They were much older than we were and often they were well estab-
lished in their technical or scientific fields. Frequently they were
professors who had already obtained their Ph. D. degrees.
One of my supervisors at a research institute visited the United
States to work with the National Aeronautics and Space Administra-
tion in Houston on the Apollo space program. His duties at the
institute related to its military operations and I am sure that he was
instructed by Soviet officials to obtain and bring back any information
he learned while working on the space program.
The Soviets considered college age students to be too young and
unpredictable to be trusted to attend universities in the United States.
Equally important, we had not yet advanced far enough in our studies
and knowledge to obtain the high level of information Soviet authori-
ties desired.
Soviet authorities selected participants in the student exchange
programs from science and engineering. Conversely, American
exchange students might be from the humanities; they might come
to the Soviet Union to study Dostoyevski. But the Soviet students did
not go to the United States to study Faulkner. Their purpose in the
United States was to obtain American technology. In the engineering
classes I took in college, I met students from Cuba, North Vietnam,
and Hungary but no Americans.
As a youth, I was fascinated by Marxist ideology and believed in
the society the Soviets were trying to build. But by the age of 19, I
was becoming disillusioned. What contributed to my growing disen-
chantment with Soviet life was my realization of the extent to which
the government put out false or distorted information.
In the Soviet Union, the government has a monopoly on truth.
Officials lie about so many things that it is possible to slip into a frame
of mind in which nothing the government says is believed.
Senator NuisTN. Mr. Chairman, may I ask one other question at this
point?
Do you think you were the exception in this regard in distrusting
the government or was this pervasive in the young people of your age?
In other words, were you one person who was skeptical? Were there
a lot of people skeptical about the Soviet propaganda?
Mr. ARKOV. Yes; that is true. There are a lot of people who are
skeptical but not everyone.
Senator Nuivisr. Could you hazard a guess? What is the order of
magnitude of people who really believe their own government is lying?
Mr. ARKOV. I would say most of the population feel that what gov-
ernment says is not true. But they don't have the source of other in-
formation and they cannot compare it.
Is it true or not? The Soviets have, a feeling that it is not true, but
they don't know what the truth is.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
32
Senator NuNN. Are you saying a very large percentage?
Mr. ARKOV. Very large, most of the population.
Senator Ntrxx. More than half the people are really skeptical?
Mr. ARKOV. Yes; especially young people.
Senator NUNN. Young people particularly?
Thank you.
Mr. ARKOV. Besides my objection to the many official lies, I was also
deeply troubled by the relatively low income I was receiving and could
hope to receive in the future. While engineers enjoy a social status of
some consequence in the U.S.S.R., they are paid very poorly. It is an
odd contradiction on Soviet society that the government wants very
badly to compete technologically with the West but rewards with
meager pay the engineers whose job it is to make the country competi-
tive. Moreover, the fact that I am Jewish was an additional barrier to
any improvement in income.
All these factors?the official lies and distortions, the lack of pro-
fessional opportunity, the anti-Semitism and, most important of all,
the absence of freedom?combined to lead me to conclude that I had
had enough of the oppressive Soviet regime. In the late 1970's, I con-
cluded that I had no choice but to try to get my family and myself out
of the country.
I applied for an emigration visa. I knew that authorities might
quickly take punitive steps against me. I have a friend in Russia who
applied for an emigration visa. A trained engineer, my friend was
promptly fired from his technical job and was never given permis-
sion to leave the Soviet Union. Unable to find another professional
position, he was forced to take any job that came along. The last I
heard of him he had been reduced to working as gatekeeper.
I do not know why some applications for emigration visas are ap-
proved and why others, such as that of my friend, are consistently
denied. But some applications do get through and, for reasons un-
known to me, my family's and mine were approved. Although I was
immediately fired from my job when I petitioned for the visa, after
a wait of 4 months, we received permission to leave the country.
We have settled in Los Angeles County and I have found satisfying
employment as an engineer in an optical firm. Things have worked out
in a satisfactory manner for my family and me. We are thankful and
proud to be living in this great nation.
Thank you.
Chairman ROTH. Thank you, Mr. Arkov.
I, too, want to join Senator Nunn in thanking you for your willing-
ness to come before us and your fine cooperation throughout the
hearing.
The subcommittee will limit the first round of questioning to 5 min-
utes. I would point out to my colleagues that we have, I think, five wit-
nesses this morning so that it is important that we move as expedi-
tiously as possible.
Mr. Arkov, what would you consider to be the most important steps
for the United States to adopt to prevent the flow to the Soviet Union
of modern technology and equipment.? Would you list several meas-
ures that you think are important to protect our valued secrets?
Mr. ARKOV. It is a difficult question.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
33
First, we have to study thoroughly what kind of fruits the Soviets
obtain from the information and technology supplied to them. We have
to analyze all of the information published.
Chairman ROTH. Why do you think that the U.S.S.R. prefers to
obtain Western technology rather than concentrate more on research
and development whether intended for commercial or military
purposes?
Mr. ARKOV. Trying to obtain Western technology, they don't dismiss
conducting their own research. They would rather try to be independ-
ent in their own way.
Chairman ROTH. Do the Soviets have the talent to advance in tech-
nology like the United States and other Western nations?
Mr. ARKOV. They do have an intellectual potential, but in most cases
they are limited in the technological support in which to yield the
high quality and quantity of products. There is also a lack ,of organiza-
tion within the government system which prevents them from pur-
suing high quality achievements.
Chairman ROTH. Do you know a any instances where the U.S.S.R.
obtained Western technology from U.S. allies or from Eastern Block
nations?
Mr. ARKOV. Yes; the U.S.S.R. received a vacuum coating technology
used in optic filters from Lichtenstein. The institute and the U.S.S.R.
who received this sophisticated technology did extensive military
research.
Chairman Rom. Senator Nunn.
Senator NuNisr. Thank you, Mr. Chairman.
What particular areas of technology and information were consid-
ered most important by the Soviets based on your experience?
Mr. ARKOV. Semiconductors, solid state devices, microelectronics,
fiber optics, systems of communication, space technology, subsea
technology, and surveillance and detection systems.
Senator NuNN. Where would you go in our society to obtain critical
use technology
Mr. ARKOV. First. I would try to establish contacts with people
involved in the business of my interest. The best places to do this
are at technical symposiums and meetings where people are less formal
and more willing to talk.
Senator NurN-N. Do you believe that the United States is putting
too much emphasis on technology transfer to the Soviet Union? Do
you think we are engaging in a degree of paranoia?
Mr. ARKOV. No, not at all. You should take first steps to prevent
our technology from slipping to the Soviet Union.
Senator Nuismt. How do you gage the United States and the
U.S.S.R. in terms of technological advance? Are we far ahead of
the Soviets? Are we somewhat ahead of the Soviets? Or are they
gaining on us?
Mr. Amoy. I feel that they are behind us but they can gain a lot
using our technology if they can obtain it. And even then, they try
to reinforce their labor force and manpower used for military
purposes.
Senator NUNN. You understand we are an open society and that is
one of our strengths. When you look at what the Soviets' obtained
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
:34
from us in technology and look at our open society, how do you
balance those two in terms of importance?
Mr. ARKOV. I wouldn't trade anything for freedom but it is very
difficult to analyze how to trade them. It is a very difficult question.
Senator NUNN. It is a difficult tradeoff. You understand that one
of the strengths of our technological development is that we do have
an open society, freedom of exchange, and so forth with our
information.
Let me ask you another way:: Do you think the Soviets closed
society actually impedes their technology development?
Mr. ARKOV. No.
Senator NuNN. You do not?
Mr. ARKOV. I do not.
Senator NuNN. What is the major problem with the Soviet technol-
ogy? Why aren't they further ahead than they are with the Soviet
technology?
I am speaking in terms of the commercial and industrial sectors, not
just the military.
Mr. ARKOV. First of all, it is a lack of organization.
Senator NUN N. A what?
Mr. ARKOV. A lack of organization. They cannot organize the society
as well as the United States. But they do have intellectual potential.
They have some smart people.
Senator NUNN. You say they do have intellectual potential?
Mr. ARKOV. Yes; but they do not have the organization which can
help them to utilize the intellectual potential.
Senator NUNN, Mr. Chairman, I will come back after Senator
Cohen.
Chairman ROTH. Senator Cohen.
Senator COHEN. I just have one or two ouestions. Your statement
concerning the comparison between studying Dostoyevski and Faulk-
ner, I think, is a good one. It reminded me of the double standard that
we have even in our athletic competitions.
For example, our amateur, at least, true amateurs in this country,
have to compete against what I believe to be true pro ressionals in
the Soviet Union for the Olympic games. Unfortunately, that is the
way the rules are written. But it seems to me drawing from your state-
ment about the disparity of students studying in this country and our
students studying in your country or former country, that the Soviets
are never going to allow our students to study anything much beyond
the humanities.
Is that a fair statement?
Mr. ARKOV. Yes, very fair.
Senator COHEN. It is also clear that the Soviets are never going to
allow young Soviet students to come to this country to study humani-
ties or even physics or any other courses because they are considered to
be too unprofessional, too unskilled for the purposes for which the
Soviet Union would seek to use them.
Mr. ARKOV. Yes; this is true, especially the analogy of Faulkner is
very good.
Senator COHEN. What is the option open for the United States? Is
it to bar Soviet students from studying subjects which could be con-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
35
verted to military purposes, or useful in developing military tech-
nology?
What is the option for a free society such as the United States?
Mr. ARKOV. I think that is a great idea to let our students study
around colleges but they should let their own Soviet students to study
the same things here, but not in high technology.
Senator COHEN. So we should have a so-call two-way street that
since we allowed to study Soviet Russian culture, Soviet students
should be allowed to study American humanities?
Mr. ARKOV. Yes; it should be done on an equal basis.
Senator COTTEN. That is all I have, Mr. Chairman.
Chairman ROTH. Senator Rudman.
Senator RUDMAN. Thank you, Mr. Chairman.
Mr. Arkov, I notice in your statement that you spent 6 years work-
ing in what was called a research institute dealing with optics and
cameras and used by the Soviet military, is that correct?
Mr. ARKOV. Well, it's correct.
Senator RtumA-N. Did that institute, have any great independent
research arm of its own or was it mainly aimed at obtaining tech-
nology from the Far East and from this country and essentially copy-
ing their technology to develop products that the Soviets would use in
their military forces?
Mr. ARKOV. Well, the task of copying Western technology?it is part
of the job they assign to them. The major application of their assign-
ment was for military. Is that the question?
Senator RUDMAN. Yes; let me just follow that up. You spoke in your
prepared statement about the use of sophisticated American com-
puters in various Soviet military operations, and also about the use
of semiconductor technology. There are those in this country who
feel that had we not transferred that technology legally to the Soviet
Union?we sold them certain semiconductor technology and certain
sophisticated computer technology in the late sixties and early seven-
ties?the Soviets would not have achieved the advantages in mis-
silery which they have made in terms of the enormous throw weight
and precision of their guidarce systems. Do you agree with that as-
sessment? Do you think that the sale of those semiconductors and
those computers has given them a tremendous step forward in their
technology in the defense area from your background and your
knowledge?
Mr. ARKOV. Yes; I think so. I can't tell exactly. It's hard to estimate
the degree of advantage they got. But they gained there using Ameri-
can computers and American semiconductors.
Senator RUDMAN. In your research institute, I assume you had
computers. Were there computers in the research institute for your
use?
Mr. ARKOV. Yes.
Senator RUDMAN. There were computers. Were they Soviets com-
puters or were they American computers?
Mr. ARKOV. Most of them were Soviet computers, but they also did
have American computers and they used both and we tried to establish
computerized system resembling the American one.
Senator RUDMAN. Would you repeat the last part of that for me.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
36
Mr. ARKOV. They tried to copy a computerized, a test system, using
the American computer.
Senator RUDMAN. Did you find in your work in that institute, of
those Soviet computers and American computers that the American
computers were more advanced, easier to use, and could do more
things?
Mr. ARKOV. Yes, it was, especially the minicomputer and the Soviets
at that time didn't have minicomputers.
Senator RUDMAN. You are talking about microprocesses and mini-
computers?
Mr. ARKOV. Yes.
Senator RUDMAN. Thank you, Mr. Chairman.
Chairman ROTH. I have just one question. From your background
and experience, do you think people in the Soviet Union believe that
it is easier to secure technical information from the United States or
from Japan and Western Europe? Which area has possessed the best
security in protecting technological secrets?
Mr. ARKOV. I think, for instance Japan publishes less than the
United States.
Senator NuNN. Publishes?
Mr. ARKOV. Publishes less technical information. First, they publish
information in Japanese and maybe develop the same, but they really
publish less.
Chairman ROTE. I gather from your testimony that much valuable
information comes from military and Government journals themselves,
U.S. military journals?
Mr. ARKOV. Well, not only military but other professional
magazines.
Chairman ROTH. Other professional.
Senator Nunn.
Senator NUNN. You mentioned two or three times Soviets placed
their top priority in actually utilizing American technology as opposed
to copying it. Do they do both?
Mr. ARKOV. They do both.
Senator NuNN. But they actually utilize it. What happens when an
American cnmputer or other technology breaks down, if that computer
has been obtained by illegal means? How do they repair it?
Mr. ARKOV. They probably don't. They study it thoroughly trying
to copy it because they can't repair it. They don't have spare parts.
Senator Nu-NN. How good is the Soviet reverse engineering? How
good are they at copying or reverse engineering, taking American
pieces of equipment and then making their own?
Mr. ARKOV. There is a big gap between engineering knowledge
and?
Senator NuNN. Big gap between engineering knowledge and what?
Mr. ARKOV. Big gap between engineering knowledge and their man-
ufacturing ability. They do know how to make, but they cannot make
it because there is a lack of technology.
Senator NuNN. So they have difficulty with reverse engineering, is
that what you are saying?
Mr. ARKOV. That's right.
Senator NuNN. They do it, they work at it, they try to do it but it is
very difficult?
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
37
Mr. ARKOV. Even if they do know how to make it, in many instances
they cannot make it. So they still would be trying to obtain more and
more technology.
Senator NUNN. Thank you,
Mr. Chairman.
Chairman ROTH. I want to thank you, Mr. Arkov, for coming before
us, for your loyalty to this country. I would say to our people attend-
ing this hearing that it will be necessary to clear the room to protect
the security of this witness. So I would ask the security people now to
clear the hearing room.
[Hearing room cleared at this time.]
Chairman Roam. The subcommittee will please be in order. I thank
the people attending the hearing for their cooperation.
At this time, we will call forward Mr. William Holden Bell. Mr.
Bell, please come forward.
Mr. Bell, will you please stand, raise your right hand. Do you
solemnly swear the testimony you give before this subcommittee will
be the truth, the whole truth, and nothing but the truth, so help you
God?
Mr. BELL. I do.
Chairman ROTH. Please be seated. Mr. Bell, you may proceed with
your testimony.
Mr. Bell is represented by an attorney who is out for just a moment
and will return.
Mr. BELL. Can I proceed?
Chairman ROTH. We will wait until your attorney comes in.
Senator NUNN. Mr. Chairman, while we are waiting, can I ask the
witness a couple of background questions to lay a foundation?
Chairman ROTH. Sure, please proceed, Senator Nunn.
Senator NUNN. Mr. Bell, are you now serving a prison sentence?
Mr. BELL. Yes, I am.
Senator NUNN. Where are you serving?
Mr. BELT, Sprinqfield Camp, Springfield, Mo.
Senator NUNN. What was the crime you were convicted of?
Mr. BELL. For passing defense data.
Senator NUNN. Mr. Chairman, Mr. Bell has an attorney here this
morning. According to our rules, he is permitted to consult with his
attorney at any point. I want to be sure, that he and his attorney recog-
nize that. He is entitled to consult with you if you would like.
Mr. KinsTn. Thank you.
Chairman ROTH. Mr. Bell is under oath. Please proceed.
TESTIMONY OF WILLIAM HOLDEN BELL, PRISONER, ACCOMPANIED
BY ROBERT LANDON KIRSTE, COUNSEL
Mr. BELL. Mr. Chairman, I am grateful for the opportunity to ap-
pear before this subcommittee and provide whatever information that
I can. I have worked in the international field for more than 20 years
and have first-hand experience in the transfer of technology to West-
ern Europe and to the Soviet bloc nations.
In the way of background. I was born on May 14, 1920, in Seattle,
Wash. After leaving school and working for my father as a teenager
to support the family, I joined the Navy at the age of 18'. The destroyer-
minesweeper to which I was assigned swept the channel at Pearl Har-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
38
bor during the attack on December 7 and was preshipped to sea. I also
participated in civil operations throughout the world and was hos-
pitalized following injury in an underwater explosion in Iwo Jima.
I married my first wife after receiving an honorable discharge. We
have two sons and one daughter.
I completed my high school education by correspondence school
while in the Navy. I attended the University of Southern California
and the University of California Los Angeles where I received a bache-
lors degree in applied physics. In 1950, I was employed by Hughes
Aircraft Co. as a test technician and the following year became ac-
cepted as an engineer and member of the technical staff.
During my 30 year career at Hughes Aircraft Co., I held a secret
clearance classification and had many technical and managerial posi-
tions. I continued my education through research, experiments, semi-
nars, symposiums, and constant reading of scientific literature. I was
and am an expert in the military application of radar in tactical op-
erations and weapons systems.
Since 1962, I have been directly concerned with the transfer of U.S.
technology to Europe and the Middle East. From 1962 to 1965. I was
manager of a European program for Hughes Aircraft Co. and from
1974 to 1976 I was manager of radar operriions for Europe and the
Mideast. In connection with these assignments and otherwise, I per-
sonally traveled extensively through Europe and the Middle East.
A number of personal events combined to set the stage for my re-
cruitment by the Polish Marion Zacharski, my overseas assignments
were financial nightmares, although they are touted as glamorous and
lucrative. My wife and I were divorced in an extended proceeding. My
assets were tied up and. I was paying her $200 a week alimony.
I was pursued by four separate IRS offices for back taxes on dis-
allowed deductions primarily arising out of my overseas assignments.
I returned from Europe to find a younger group at Hughes and I
shunted off to a quiet back room.
My youngest son, Kevin, to whom I was extremely close, died need-
lessly from burns sustained in a camping accident in Mexico. While I
waited with an ambulance at Los Angeles International Airport, a
Mexican Airlines pilot ejected him from the plane in Mexico prevent-
ing him from receiving prompt and adequate treatment.
I married a young Belgian citizen, Rita. We tried to build a new
life with her young son in her Playa del Rey apartment complex.
I was forced to file bankruptcy and name my employer on the
schedules, however. I continued to pay or reaffirm most of my debts.
Zacharski and his wife moved into the apartment complex and he
and I began to play tennis on a daily basis. He slowly became my
best friend. He was about the age of my oldest son who had been
close to his mother and quite distant from me since our divorce. When
you are sent to Europe, you are told to expect attempts by foreign
spies, but whoever would expect it to happen here at home?
Zacharski was the west coast manager of a Polish-owned American
company, Polamco, which is a Polish-American receiving company.
He had an extensive expense account and gave away various items
out of their public relations funds. He was interested in what I did
and enlisted my aid in making contacts in the industry for the possible
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
39
sale of Polamco machine products. He suddenly delivered $4,000 to
me for my very minimal efforts in that regard.
He expressed an interest in having Polamco hire me as a con-
sultant after I retired from Hughes Aircraft Co. In order to impress
him I showed him a sample of some work I had done of which I was
quite proud. Although I showed it to him on the tennis court, he took
it to his apartment for reading. It was classified secret.
At this time, the apartments were being converted into con-
dominiums at the cost of over $80,000. Zacharski asked me if I were
going to buy one, as his company was buying his. He knew I didn't
have the funds. In view of my prospective employment by Polamco,
he thought he could help me. Subsequently, he appeared at my door
handing me envelopes of cash. With this money I paid the IRS and
made a down payment on the condominium. I signed a receipt for
the money and concealed the source from my wife.
Zacharski furnished me with a movie camera. He instructed me to
make a setup to photograph documents by using a single frame device.
He told me that we would be making a trip to Europe but when it
was time to go he did not accompany me. The primary purpose of the
trip was to negotiate.
Even as I went to Innsbruck, Austria, I was rationalizing and
kidding myself that the persons I would meet were representatives
of Polamco, that this was just the kind of industrial espionage that
goes on all the time.
This meeting started by my turning over film of documents that
I had previously shown to Zacharski. I was paid $5,000 in expenses
for the trip in cash. All of the cash that I was given was always
in $50 or $100 bills. I talked with two men the FBI had since referred
to as handlers. A man later identified as Paul and the younger guy
whose name I cannot recall. Under the guise of discussing methods
of payment to me, they took great care to describe where I lived
and shopped in frightening detail. They also showed me pictures of
my family, my wife and my young boy, and told me that there were
only six persons involved.
They told me that if anyone caused a problem, they would be
taken care of.
I was assigned the code name of Jackson and given a phone num-
ber in Poland. I signed a receipt for the money. There was no ques-
tion of what I was getting into. I made one more trip to Innsbruck,
another to Lintz, and a final one to Geneva, Switzerland. On the last
two trips, I traveled with films of American secret technology in
my luggage. They had provided me with black and white high-resolu-
tion film which had 8 to 12 feet of regular color home movie film
attached to the ends in case it was inspected.
A young guy asked me to design a low-level-based radar which
would detect planes coming into Poland from 200 meters above the
sea. Both Zacharski and my handlers gave me extensive lists of docu-
ments to be obtained. They knew exactly what they wanted?right
down to the company identification numbers. They even asked if I
could go to work for a different American company, DARPA, to get
what they wanted. DARPA, incidentally, is the Defense Advanced
Research Projects Agency, an organization funded directly by the
Department of Defense.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
40
They fund advance technical programs, technology programs, types
of things the military would ordinarily handle but they would have a
high payoff if they were successful.
Zacharski told me that he could go to any town in the United
States and the local chamber of commerce would direct him exactly
where to go and who to contact. He delivered additional cash in gold
coins to me at my condominium. It was always the same. He would
come to my door when I was alone, hand it to me with a smile and
walk away, or place it in my tennis bag as we walked to the tennis
courts.
He made constant trips to Chicago and in fact traveled extensively
throughout the United States for the company?Polamco.
My financial burdens, of course, were resolved overnight. However,
I was afraid when I could not, or would not, deliver more classified
documents I would be liquidated or, much worse, my family would
be endangered.
My third trip was to Lintz, Austria
Senator NuNN. Did he ever tell you that or was that something you
feared?
Mr. BELL. Yes, sir, I did. On one of my trips into Austria, on the first
trip and the second trip, a man by the name of Paul threatened me on
both trips. It was a very clear threat. He threatened me by showing
me pictures of my 8-year-old son, my wife's son, whom I raised since
he was 31/2. He showed me pictures of my wife. It was very clear there
were tenors of threat. Incidentally, it is a horrible feeling when you
are operating on the wrong part of the law.
I am sure it is horrible to anyone who has their family threatened,
but when you are on the wrong side of the law, it is horrible.
My financial burdens, of course., were resolved overnight. However,
I was afraid wl- en I could not or would not deliver more classified in-
formation, I would be liquidated.
My third trip was to Lintz, which is only 50 miles from the Czecho-
slovakian border. I was particularly frightened on this trip. I met the
young guy and walked with him to a small restaurant. There was only
one other patron, a roughly dressed man who appeared to be a laborer.
The weather was stormy and the city dark and foreboding. The young
guy seemed totally at ease. He took the film from me openly and dis-
appeared into the. kitchen. He returned and we drank coffee, making
small talk, then left and walked about 100 meters to another restaurant
where we drank more coffee.
Leaving the second cafe, we walked an inclined path lined with
hedges up into a wooded area. After we had gone up some distance and
stopped to talk, I suddenly saw the rouely dresed laborer which I
had seen earlier pearing over a hedge or bush. He ducked down as I
looked at him. I thought for a moment that I would be killed. The
young guy simply smiled about it and told me that it was his man
watching him because he carried a lot of money.
They constantly wanted me to go to Mexico City and I kept making
excuses. I knew a man at DARPA who I respected and trusted. I
thought if I could confide in him he might help me out of my dilemma.
On a trip east, I tried to see him but he was out. I don't know if I would
have actually had the nerve to tell him, but that was my intent. It is
the closest I ever came to giving myself up.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
41
Zacharski told me that he was being followed. From the way he
described it, I couldn't believe it. He claimed that he was being open-
ly harassed and I assumed it had something to do with some labor
union rather than the FBI or likewise. Or some problem with Polamco.
One day when we went to play tennis, he told me "There they are." He
pointed out two cars in the parking lot. I went back to my apartment
and got ,my camera. I photographed each of them, afterward laying
my camera on the ledge. Then I went to each car and confronted the
person in each car. I demanded to know who they were and what they
were doing. They refused to tell me anything and departed. When I
returned to the ledge, the camera was gone. To this day, I do not know
what became of it.
The FBI tapped Zacharski's phone. I was told they also tapped
mine. It didn't matter because Zacharski has told me never to talk on
the phone. Although I was unaware of it, I was also being followed.
On my final trip to Geneva, I took film of the LPIR or quiet radar.
I was followed all the way. When I arrived Geneva, an innocent
American in a turtle neck sweater engaged me in a conversation and
a drink at the hotel. He happened to b from my birthplace in Seattle,
Wash., and I understood that 6 months were invested in ascertaining
that he had nothing to do with me. I went to the Arizona Museum a
day early and noticed a man with a black hat, coat, and briefcase
wearing dark glasses, looking at me.
I walked to a newsstand or a moment and left. He walked to the
same newsstand. The FBI showed me/photos of these men. The fol-
lowing day I gave away the film on the quiet radar to my handler in
the elevator at the United Nations building. I was no longer being
surveiled when I did this.
On this trip, I was instructed to go to Mexico City on the next trip
and meet a new contact at another museum. I was to carry an airline
bag and respond to the code phrase "Are you interested in the Aztec
exhibit?"
By replying, "No, I'm interested in the Mayan calendar" I was
shown a key chain with a black medallion bearing a silver P for
Poland, which my contact would display. I never went. The FBI in-
terviewed me first. I told them everything. There is little left of my
life now but I feel I am freer in prison than I was with Zacharski.
I have set down the circumstances of my recruitment by Zacharski
in detail so that similarities of what goes on in industry can be recog-
nized. Within the avionics industry, it is a common practice for all
comprnies to obtain the secrets of their competitors by the same tech-
nique Zacharski used with me.
Senator NUNN. You mean by that that it is such a common practice
in the industry, that when industry people are approached, they are
not going to be assured if it is a Soviet company or American
company?
Mr. BELL. No, I?
Senator NI7NN. You were not under any impression this was another
American company?
Mr. BELL. Absolutely, yes, for the first 11/2 or 2 years. I considered
Polamco, it was a Chicago-based company operating in the United
States under the full support of the 'U.S. Government, under their
auspices. Yes, I considered them an American company but I certainly
A mroved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
42
did not when I started to get into this, I certainly did not. When I
was offered a job as a consultant engineer for Polamco, I was inter-
ested in getting that job. It was a solution to all my problems.
They were successful, they were clever, very clever.
I sat down the circumstances of my recruitment by Zacharski in
some detail so that the similarities of what commonly goes on in the
industry can be recognized. Within the avionics industry, it is common
practice for all companies to obtain the secrets of their competitors by
the same technique Zacharski used with me.
An engineer from one company is interviewed by the management
of another. Considerable benefits are dangled in front of the engineer
in terms of increased earnings and better position. He is asked to pro-
duce samples of his work?do you want me to repeat?
Senator NUNN. That is all right. Please talk directly into the mike.
Mr. BELL. An engineer for one company is interviewed by the man-
agement of another. Considerable benefits are dangled in front of the
engineer in terms of increased earnings and better position. He is asked
to produce samples of his work and this is normally done without re-
gard to their security classification. He may also be asked to provide
specific documents directly. Sometimes the engineer is hired.
More often he is not. This is generally tolerated because, of course,
both companies are American. And they are in competition with each
other.
When American companies compete to make sales to friendly for-
eign governments, a considerable amount of technology is passed in
order to make the sale. The companies themselves classify the tech-
nology in many cases which they develop under the authority of the
Department of Defense. There is a clear conflict of interest between
the security responsibility of classifying technology and information
and the economic interest of the companies trying to market their
products.
A well-known example of this problem occurred with the inter-
national competition for the replacements of the aging F-104 NATO
tactical fighter aircraft. A memo of understanding was issued by our
Department of Defense at this time. It was largely considered by the
industry as a license to offer the highest American technology to the
Europeans in order to win the contract.
While I was in Europe, I became aware of the impact of the various
Communist Parties particularly in France and Italy. This dates clear
back to 1958, 1957. I passed through many picket lines of red flags to
reach my office at Dassault Aircraft Co. in St. Cloud, France. Many of
the employees there were quite frank to tell me that they considered
Americans as rabblerousers who had a mania about communism. I was
prevented from attending a meeting at the Sylvania facilities in
Naples, Italy, by a picket line of red flags. American technology passed
to European industries is most certainly the target of Communist
infiltration, as well as here.
[At this point, Senator Cohen left the hearing room.]
Mr. BELL. During the international fighter program, including
Hughes Aircraft Co., delivered 'hundreds of drawings, specifications,
photographs, and process specifications plus technical operation and
performance documents. Thousands of man-hours of technical engi-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
43
neering assistance was provided and teams of European specialists
were brought to California for briefings.
All of this transfer was done for the purpose of submitting a planned
purpose proposal in pursuit of the contract and to dazzle the Europe-
ans with their technology.
Look down-shoot down radar systems both by Westinghouse and
Hughes Aircraft Co. were proposed to the NATO countries, Sweden,
Switzerland, Spain, Iran, Israel, Turkey, and Saudi Arabia. Briefings
for the proposed sale and construction took place in 1974 through 1975
and following. This, incidentally, was more extensive than the infor-
mation I passed to Poland 6 years later.
I would like to add the F-14 look down-shoot down radar was de-
livered to Iran and is still there undoubtedly compromised to the
Soviet Union.
On other occasions, the Department of Defense is bypassed. Hughes
Aircraft Co., for example, invented a system for very accurate bomb-
ing through a TV camera system which could be locked onto a target.
This was sold to the U.S. Navy who rightly refused Hughes Aircraft
Co.'s application to export it to interested European buyers.
Martin-Marietta, for example, transferred comparable technology
to a French company for overseas productions and sales. I was told
this was managed by ignoring the Department of Defense and operat-
ing directly through the Department of State, after the fact, which
they were free to do since they did not have the Department of
Defense contract.
Polamco operates openly in the United States as do other Eastern
bloc corporations. Zacharski once told me he could ship a radar the
size of a small desk to Poland in a machinery case. Incidentally, this
is radar weighing 500 to 800 pounds. He had complete access to money
and traveled anywhere he wished. Although his phone was tapped and
he was constantly watched, the FBI agents never saw him do anything
more than run a red light and change lanes illegally.
In light of all my financial and personal problems and my friend-
ship with Zacharski, all of which the company was aware of, my se-
curity clearance surely should have been rejected or should have been
reviewed. In California, you must renew your driver's license every
3 years. My clearance was 28 years old.
It also seems to me that a random imprint of a coded line running
diagonally through a classified document could deter their reproduc-
tion. It would serve as a fingerprint to identify the person who is
charged out to it and could be read automatically. This certainly would
have deterred me. A security oriented classification review should be
imposed on the transfer of technology during the sales process. The
responsibility for security and profits should be effectively separated.
Every person employed in a security job should know what I did
to myself, my loved ones and my country and realized how easy it is
to get trapped.
Chairman ROTH. Mr. Bell, did Zacharski represent to you that Po-
lamco was a client of McDonnell-Douglas? If so, why?
Mr. BELL. Yes. Mr. Zacharski showed me a letter that he had on
McDonnell-Douglas stationery which was addressed to some sub-
contractors and I think to whom it concerned, which encouraged the
95-929 0 - 82 - 4
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
94
subcontractors to do business with Polamco, to buy the machinery and
was a glowing report on Polamco, I might add that I learned later
that the reason for that letter was that McDonnell-Douglas was com-
peting to sell the DC-10 for LOTT Airlines which was a Polish air-
line. This was part of the sales campaign.
Chairman ROTH.. Were the Polish agents interested in the tech-
nology of any other Western nation?
Mr. BELL. Yes. I should add on the last one that Zacharski also had
access to the atomic energy facilities in Nevada and various naval
shipyards, all of which he had access to or installation of equipment,
large machinery, for maintenance of the machinery and for training.
Some of this was done through subcontractors, but his people from
Polamco had the access.
May I have the last question?
Chairman ROTH. Let me ask you a followup question.
So what you are saying is that despite the fact that it was common
knowledge that Polamco was a Polish-owned company, it was free
to compete in this kind of operation, even though it involved tech-
nical and classified information?
Mr. BELL. That is true. Polamco was operating in this country under
the auspices of the U.S. Government and they are still operating.
They have offices in Chicago, their main office, they have offices
in Detroit, they have an office on the west coast in the Los Angeles
area. They not only have the freedom to operate this way, it permits
them to have people travel under the Polamco treasury to wash the
money, if you will and it gives them access to various companies
around the country operating under the guise. of Polamco.
Chairman ROTH. So despite your experience with this organiza-
tion as far as you know, there has been no limitation or change in the
way Polamco operates?
Mr. BELL. As far as I know, that is correct.
Chairman ROTT-T. Were the Polish agents interested in the tech-
nology of any other Western countries?
Mr. BELL. Yes. They asked questions that were directed toward the
technology in West Germany.
I believe the reason for this was they told me that they considered
Germany as their historical enemy but also they were in economic
competition with them and they wanted to maintain a par with their
technology. They asked particularly about radar and weapons sys-
tems and my company developed and sold the large radar systems.
Chairman ROTH. Did Hughes Aircraft ever participate in joint
projects with companies of other nations involving technology trans-
fer? Was technology transfer an important consideration?
Mr. BELL. Yes. We had on many occasions. Probably the best ex-
ample of it would be the international fighter program that took place
in the 1974-75 time period in which they were looking for replace-
ment of the NATO F-104 fighter bomber aircraft. There were several
companies competing for that.
The U.S. companies were narrowed down to General Dynamics and
Northrop, the European companies were Dassault Aircraft Co. in
France, and one in Sweden.
There was a British company, also.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
45
As part of that program, there was a consortium established by the
Department of Defense which consisted of Norway, the Netherlands,
Belgium, and Denmark, and the United States, five-country consor-
tium. A memorandum of understanding was negotiated and issued
which guaranteed an offset program of 60 percent of the equipment
we manufactured in Europe and all of the technology. That is the
main point, all the technology would be transferred. This was taken
by the industry as a license to reveal all of our technology.
We were encouraged to dazzle the Europeans with our technology,
with our advanced technology.
Chairman ROTH. You were encouraged by whom?
Mr. BELL. We were encouraged by the prime contractors under the
full knowledge of the Department of Defense. I believe it was right
for us to interpret this as a license to move out and discuss our tech-
nology. I don't believe anybody?I think we all used integrity. They
didn't want to cause any harm. But when you get in the heat of com-
petition, engineers are engineers, they are proud of what they do.
They meet with their counterparts and they talk. They do talk. Much
data was transferred. There is a climate. In this case, a requirement
was to produce 60 percent of the system in Europe. Therefore, we
had to price it. We could not price it unless they had the information
to price. This required us to transmit a great deal of data and a great
deal of information to conferences and so on; not only by the winner,
but by the losers, as well, and all the subcontractors that were com-
peting to get the award for the airplane.
This was one example. There are many others. This is one example.
Chairman ROTH. Senator Nunn.
Senator NUNN. Mr. Bell, is Polamco still operating in this country?
Mr. BELL. They were operating before I came in mid-December.
I understand they are still operating here.
Senator NuNw. How many people do they have working for them?
Mr. BELL. They do somewhere between $30 and $50 million a year
in business. In the Los Angeles area I have met and seen perhaps
a dozen of their employees, anywhere from technicians up to senior
personnel. However, it is important to note that senior executives
from Polamco, people who traveled in the guise of senior executives,
came to the United States, the Los Angeles area, a guest of Polamco,
Polamco was their reason for being here. It was a gimmick to provide
direct access in this country for technical people in Europe.
As an example, a good example, I believe, early during the days,
perhaps a year and a half after I met Mr. Zacharski, he tried to
arrange for a meeting between me and the professor from the Uni-
versity of Warsaw. This meeting was to take place in Santa Barbara.
The meeting didn't take place. This didn't take place. I saw no reason
why I should meet with the professor from the University. I didn't
see how he would be associated with Polamco.
After I became involved, I was again requested on more than one
occasion by the agents overseas, they tried to set up a meeting with
the professor from the University of Warsaw. Incidentally, the data
that I provided, I was assured was going to be held in one place at
the University of Warsaw and would have, the access to it would be
limited to about six people.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
46
Chairman ROTH.. Do you consider Polamco a legitimate company
doing business in this country or do you consider it simply as a guise
for Soviet spy activities through their proxy?
Arr. BELL. My feeling from what I have seen is that both are true.
T think the most important one is this latter one. To me I was con-
vinced when I realized that Polamco was not, perhaps it is?well,
it is a Chicago-based company, but when T discovered absolutely for
certain that it was under the control of the Polish Government and
that they use it as a cover for their secret service operations, there is
no question in my mind what they are here for, what they are doing.
[At this point Senator Roth withdrew from the hearing room.]
Senator NUNN. Do you know of any action they have taken against
Zacharski since he was convicted of spying?
Mr. BELL. Polamco? Polamco, as a matter of fact, we just heard
recently, I heard it?as a matter of fact, through my attorney?is
that we have people that are in contact with Barbara, his wife, a
lovely lady. She is still receiving the Polamco paycheck.
Senator NUNN. In other words, a Polish company is licensed to do
business in the United States. One of their employees has been con-
victed of spying. He has gone to jail. Yet he is still on the payroll and
in iail. Is that true?
Mr. BELL. That is true.
I wouldn't want to restrict it to just one executive. I believe it is
deeper than that. As a matter of fact, one of the things which was
going to happen the week after Zacharski was arrested, he was going
to get me in contact with a follow-on contact. He was leaving for
Chicago, moving to Chicago, as president of the company. He was
g,omg to get me in contact with somebody who would replace him in
the Los Angeles area, which I assume?I, of course, cannot prove this,
but my thinking was he would be from Polamco. But certainly
Polamco was part of the whole thing.
Senator NUNN. I assumed Zacharski was not president. I-Te was
just an employee is that right?
Mr. BELL. Competition for presidency of that company to replace
the man that was president in the fall of last year took place in
Poland.
Zacharski was one of the competitors. There was one other man
competing. This took place in Poland. In talking to the agents in
Europe, I know that this discussion took place witl,in the government.
So the government is putting the executives into Polamco.
Senator NUNN. Are you saying the spying efforts of Polamco in-
clude people all the way to the top?
Mr. BELL. I am sure of it. Yes.
Senator NUNN. Did Zacharski have any knowledge of the internal
affairs of Hughes Aircraft separate from what you may have com-
municated to him?
Mr. BELL. Yes. I was surprised on several occasions he would know
things I didn't understand how he would know about his aircraft
company. Like for example, when my boss was changed, he knew that
I had a new boss. I don't know how he ever found that out. But more
important than that, that he would ask for data, drawings, and the
data would be identified in many cases by the identification numbers,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
47
through that identification number; not just Hughes, but one was from
another company, such as Westinghouse.
He would have the identification numbers there also.
Senator NuNN. So you knew precisely what they were
Mr. BELL. They knew precisely what they were. After I knew. They
asked me for things which was impossible for me to deliver. As a
matter of fact, most of the stuff I delivered was not asked for. I just
delivered stuff, things that were available.
Senator NuNN. What kind of technology were they most interested
in? What were the military applications?
Mr. BELL. The last thing, for the last few months they were very
much interested in the cruise missile; a particular piece of the cruise
missile.
I should say I don't know. I don't know anything about the cruise
missile. I can only surmise as an engineer. They were asking for what
they described as a video c,orrelator. I don't know if I should surmise
in this meeting, but except to say that I can see how it would be used
on the cruise missile if it is on it. But they were very much interested
in it, thinking it was at least a part of the cruise missile, and they
thought that maybe Hughes was a manufacturer of that missile equip-
ment.
I don't know if they were or not.
Senator NuNN. Did they ask you to seek employment in other firms
so as to broaden their source of information?
Mr. BELL. Yes, they did on more than one occasion, but especially
on one occasion. They asked me if I could leave my company and go to
work for another company in the United States. They mentioned
specifically not a company, but an organization within the Department
of Defense. I have already told you what DARPA is. It would be a
real key for them where they could have somebody in DARPA, where
all the advanced technology work is being done.
They also, on the companies involved, it is my understanding, from
previous conversations we had, conversations that led right into them
asking me what they were interested in?in the way of companies was
Boeing Aircraft Co. and perhaps Westinghouse.
Senator NUNN. Boeing and Westinghouse?
Mr. BELL. Yes. Boeing would be, I am sure, because of the cruise
missile. I am not sure why Westinghouse.
Senator NuNN. Did they ever ask you about your level of security
clearance
Mr. BELL. Yes, they did. As a matter of fact, they asked me if I had
a top security clearance. They have asked me more than once, but on
one occasion they asked me if I had a top secret security clearance and
I told them. Died to them. I said I did.
Senator NErNx. At that time, you did not, though?
Mr. BELL. I did not.
Senator N-uNN. Did you give them any information that was labeled
top secret?
Mr. BELL. No. I did not. I gave them some secret information on the
last two trips.
Senator NuNN. Did you ever turn over to them what is classified as
top secret information?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
48
Mr. BELL. No, I never did. It was not available to me. I suppose may-
be there is some way of getting it. I don't know. I never tried.
Senator NUNN. Did you try to go beyond your own clearance?
Mr. BELL. No, I did not.
Senator NUNN. Are you suggesting that if every piece of classified
information had some special designation Liat this would have a de-
terrent effect?
Mr. BELL. Yes, with modern coding techniques you could put ran-
dom vertical lines through the paper when you print it, before the
paper is delivered to the companies so they type on it.
Three or four lines, if they are randomly through there, then you
can identify each document with the counter, like you see in a depart-
ment store or a drug store, this scans over these lines and tells the ratio
of distance between them. So they would have a fingerprint. They
would know which document, the document signed out by me by the
Document Control Center, would have my fingerprint on it. If I tried
to pass it, I couldn't photograph it, there is no way of removing those
lines without removing the print, it doesn't matter if it is blown up,
made smaller, the ratio of distance between the lines still remain the
same. If I knew that, if the person knew that, he would think twice
before he would do something like this.
Senator NUNN. How would that work on the copies?
Mr. BELL. The same way. The copies, all that can happen is you
could make it bigger or smaller, 'but the ratio of the distance between
the lines remains the same.
Senator NUNN. Would you know where the copy came from in
terms of the original?
Mr. BELL. You would know where that particular copy came from.
I believe?I thought about it extensively?I believe it is something
that could be done economically. And I think it should be done.
Senator NUNN. Did you offer to obtain an entire radar system
for the Polish agents?
Mr. BELL. Yes, I did, in a sense. They were interested in obtaining
a TWT which is a special high-powered radar transmitter, anywhere
from 30 to 50 pounds in weight. They wanted one. They were going
to ship it back to Poland by machine crates. It has something to do
with the Polamco shipping plant, to move equipment back and forth.
So I offered them, just testing, to see what they can ship, "Could you,
would you be interested in a total system, which would weigh 500 to
800 pounds? It would be the size of a desk." They became very excited
about it. Yes, they could handle it. So it shows you the flexibility they
have and the power they have, having a company like that operating
in the States.
Senator NUNN. Did you carry through on that offer?
Mr. BELL. No; I never delivered any equipment.
Senator NUNN. Did they mention to you how they would handle
the equipment, how they would get it out of this country? Was there
any discussion of the mechanism if you delivered it, what they would
do with it?
Mr. BELL. We had some discussion around the subject where I know
they were talking about using Polamco shipping crates or the Polamco
shipping channels. Incidentally, this may not be directly associated
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
49
here, maybe it is, but they were bringing in vodka and they are bring-
ing it in in the same way. They put it in the machinery. This gives
you an idea.
Senator Nurnc. Did they tell you how they repair equipment that
they may have gotten illegally from the United States or other West-
ern nations?
Mr. BELL. How they would repair it?
Senator Nurnsr. Yes.
Mr. BELL. No; they didn't.
But I could add a few lines on that if you don't mind.
Senator NuNic. Your opinion? Yes.
Mr. BELL. I know in transferring technology to Europe, any engineer
in the industry will verify this, in order to transfer technology to an
industry in Western Europe, I have to assume it would be more difficult
than Russia, or any Soviet bloc country. It takes thousands of draw-
ings, specifications, it takes a huge amount of data and that is to de-
liver enough data for them to reproduce it, put it in production. It
takes a huge amount of data. Not only that, it takes thousands upon
thousands of hours, man-hours of support once they have this data
to get the stuff in production. We have had much experience doing
this in Western Europe. How in the world the Soviet Union can put
something into production when they receive only small amount of
data on a sales brochure or even if they had all the drawings, I don't
see how they would ever get it into production in the Soviet Union
without having at least thousands of man-hours of support.
I believe that if you talk to anybody knowledgeable in this field?
Senator NtrNN. You say reversing engineering is very difficult and
time consuming even if they have the equipment itself, and all the
plans and specifications?
Mr. BELL. To put it in production. That is true. You can get a lot
of valuable information off of it. But to put that equipment into
production, even if you had what I said, they do not have the com-
ponents. That is the key to the whole thing.
The best system engineer in the world, that is what we do in system
engineering, is only as good as the elements he has to work with. They
do not have the components in the Soviet Union. I base that on two
things, on what I have seen in Western Europe, I conducted a survey
for Hughes Aircraft Co., throughout the industry in Western Europe,
and Australia in 1970. I know what they have. They are a generation
behind the United States, but they are coming up fast on Western
Europe.
I have seen the Soviet Trade Show in Los Angeles. I saw what they
had in the way of components and they were 2 years behind. This was
maybe 5 years ago. But I have no reason to believe that the Soviet
Union component technology is any further advanced than Western
Europe.
Senator Nuisrx. What do you think is the most damaging informa-
tion that you gave to them? How would you rate it?
Mr. BELL. The most damaging information I gave them was the
OPIR, quiet radar data. I gave them a brochure. We were developing,
not developing our radar, what we were doing, we had a radar
which Hughes has developed on their own money, which DARPA
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
50
put money in to modify, to demonstrate the technology which is a
quiet radar technology. That is the radar that can operate without
being detected by another passive receiver. The document, the sales
document that went forward to get that contract I handed over on
the last trip to Europe. To me that was the most damaging one,
the one I am most ashamed of.
Senator NUNN. What steps would you recommend, based on your
own experience, for both Hughes Aircraft and for the Federal Govern-
ment? I say "Hughes," I don't mean them exclusively, but any com-
pany dealing in high technology? What steps other than the ones you
have now outlined about the fingerprints, and so forth, would you
recommend?
Mr. BELL. I think that when they have people that are in access to
classified material, at the level I was, that they should be reviewed
more often. I don't think they should be fired. Perhaps we can help
them with the problem, all the signals are there, everything. All the
classical reasons, a guy is in trouble. I had them. They knew about
them. I don't want to pick on Hughes Aircraft. It is a great company.
This is true throughout the industry.
Senator NUNN. You are saying the industry should do a lot more
themselves if they had more thorough periodic reviews of access?
Mr. BELL. Yes: I think yes: I definitely feel that is true. I believe on
the Government's side it is clear, you know. We don't want to be, as
Americans, suspicious of our neighbors. We certainly don't want to
do that, but gentlemen? the way things are going, if you don't have
more control of people coming in 7acharski was a good example. He
was given a visa in Poland in 1977, I believe it was. Given a visa when
I was told that they knew full well that he was a highly trained Polish
intelligence officer.
Senator NUNN. Who knew that?
Mr. BELL. The FBI knew that. They told me that the CIA knew it
and the visa was issued. Maybe they had good reason for it. Maybe
they wanted to follow it. That sure puts us at a disadvantage. He was
placed under surveillance the clay he arrived in the United States and
when he arrived in California, he was under continuous surveillance
there.
As a matter of fact, he was under surveillance before I was guilty,
before I had done anything, other than I was in the process of being
entrapped.
It would have been so much easier to warn me.
Senator NUNN. But you are saying this passing of very valuable
information took place right under the nose of our own law enforce-
ment agencies who had in effect targeted both Zacharski and yourself
before the information was passed. Is that right?
Mr. BELL. Yes.
Not only that, it took place over the period of time, on the last trip
to Geneva, where I carried the most sensitive data, they followed me.
They had a girl, FBI lady follow me into Paris. stay in Paris the few
days I was there. They had an agent pick me up in either Paris or in
Zurich, follow me to Geneva. But they lost me the day that the thing
went down.
Senator NUNN. Did you know they were following you? Did you
know they lost you?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
41
Mr. BELL. I only knew after the fact, after they told me. I believe I
mentioned two gentlemen they had pictures of, that took place the clay
before. I went up to the area where the contract was to be, just to look
it over, as I was concerned. I was really concerned about as soon as my
usefulness became negligible, that I would be eliminated. It is a nat-
ural, normal thing, and I was concerned about that. I wasn't particu-
larly concerned in Geneva. I didn't think they would do it there. But
I still went up 1 day ahead to look over the contract area. They fol-
lowed me on that. They had pictures of the two gentlemen.
Senator NuNN. But you didn't know at that time?
Mr. BELL. I didn't know at that time.
Senator RUDMAN [presiding]. Mr. Bell, although you haven't said
so in your testimony, you certainly, I think, have inferred that Polam-
co is something more than a commercial enterprise that recruited
you.
Mr. BELL. I will say it. If I didn't say it directly, I will say it now.
Yes. I am certain of that.
Senator NuNN. So it would be naive for this subcommittee or the
public to feel that because you were the only one who was apprehended,
you were the only one that they recruited?
Mr. BELL. When I was apprehended, they came to contact me about
Zacharski and I knew, like I say, other times I considered it myself,
I had to come to an end some way. I was concerned about doing it in
the Los Angeles area because of the rest of my family, because they
knew so much about where my family went to school, where we shop.
So when they contacted me, it took me a couple of hours to finally do it,
but then I told everything, I provided all the evidence, and so on. But
with the idea that we would go after the entire operation and shut
them all down. That was my understanding. I was assured that was
the understanding by some of the agencies I was working with. But
then at the last minute they decided because Zacharski was moving to
Chicago, he had been appointed, promoted to president of the company.
Senator NuNN. President of which company?
Mr. BELL. He had been promoted to president of Polamco. He was
moving. to Chicago to take over that position. He was already in Chi-
cago. He had been there for 2 weeks. He had come back on the week-
ends. His wife was packing up, everything was packed, she was plan-
ning on leaving in a week or two and Zacharski was going to come back
the following weekend and that would be his last trip when he lived
there.
He would be coming back.
Senator RUDMAN. That was at about the time he was apprehended?
Mr. BELL. That is when he was apprehended.
Senator RUDMAN. I would assume that the area you lived in, the
apartment complex that you and he chose to live in, housed many
employees of Aerospace Co.?
Mr. BELL. Yes.
Mr. Zacharski settled down in the Playla Del Rey apartment com-
plex, which has about 525 apartments in there. There are many em-
ployees of the defense industry in those apartments. I don't know all
of them. I know some of them. He was constantly trying to meet other
ones. I don't know if he was successful or not. I don't know if he moved
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
52
in there, I have always thought about this. I would like to know some
day, whether he moved in there to get to me or whether it was an
accident. We happened to be living there.
Senator RUDMAN. I would assume it was no accident, Mr. Bell.
Mr. BELL. All the signals are there. In fact, when I discussed with
the agents in Europe, they were aware that I filed bankruptcy. They
had all the information.
Senator RUDMAN. That company is still operating as an agency of
the quasi-official agency of the Polish Government?
Mr. BELL. That is correct.
Senator RUDMAN. It has employees in Chicago?
Mr. BELL. That is correct.
Senator RUDMAN. It has employees in Los Angeles?
Mr. BELL. That is correct.
Senator RUDMAN. It has employees, I assume, in other major Ameri-
can cities?
Mr. BELL. In Detroit, for sure.
Senator RUDMAN. Do you know how many employees this Polamco
has?
Mr. BELL. No, I don't.
Senator RUDMAN. Would you assume they have a fairly large num-
ber or small number? Was it less than 100, do you know?
Mr. BELL. If I had to guess, I would say something over 100.
Senator RUDMAN. The president of this company was indicted,
convicted?
Mr. BELL. That is correct.
Senator RUDMAN. He presently is serving time in this country?
Mr. BELL. That is correct.
Senator RUDMAN. Yet, he has been replaced and to your knowledge
that company continues to operate?
Mr. BELL. That is correct.
Senator RUDMAN. It is your testimony here this morning, that in
addition to legitimate purposes of building markets for Polish prod-
ucts, machinery products in particular' that you believe that his com-
pany is devoted to industrial espionage?
Mr. BELL. Yes, they do. As a matter of fact, I may put that first.
Senator RUDMAN. So you think their primary reason may be indus-
trial espionage with the selling of legitimate Polish products and
the buying of legitimate American products to export to Poland as
being secondary?
Mr. BELL. That is what I believe.
Senator RUDMAN. That is your belief?
Mr. BELL. That is my belief.
Senator RUDMAN. You had more to do with them than anybody
else we could talk to. So your belief is important.
Mr. BELL. I want to add that doesn't mean every employee there
is involved in this. Certainly the company is the umbrella, is the
supperting element that makes it possible for them to do this.
It is under the control of the Polish Government.
Chairman ROTH. Zacharski is still on the payroll of that
government?
Mr. BELL. That is correct.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
53
Senator RUDMAN. By virtue of the nature of certain products that
they sell and under our country's policy of encouraging free com-
petition, they have access to a number of American defense contrac-
tors and in fact a number of American defense installations?
Mr. BELL. Any company which manufactures using machinery is
a potential customer to Polamco. They have a reason to go there and
to talk to them; to have cocktail parties, to do the things you do when
you are trying to talk them out of it.
Senator RUDMAN. It is bad enough that you might have a legitimate
Polish company infiltrated by their intelligence people who might
have access. We actually give access to a Polish-sponsored company
and by virtue of what they sell. They have access at some level to a
whole range of American companies?
Mr. BELL. I would certainly believe that to be true. Yes.
Senator RUDMAN. I would certainly say to Senator Nunn that that
is something which requires some further looking into.
Mr. BELL. I would, you know we are talking here about Polamco,
I would be surprised if it doesn't go further than Polamco.
Senator RUDMAN. I am sure every Soviet bloc country, in fact I
know of a number of them which have trading companies.
As a matter of fact, they are moving from the area of which we
are speaking. There are a number of other countries with trading
companies that do indulge in industrial espionage that has nothing
to do with national defense. It has to do with simply other trade
secrets. That, of course, is a well-known fact.
Mr. BELL. I believe anything to do with technology involves the
national defense, particularly component technology. I think that is
where our advantage is over the rest of the world, not just militarily,
but economically. We are the leading nation and the reason we are
the leading nation is because we have the technology, that is the
component technology; the tools of the trade.
Senator NUNN. I might add that tomorrow we will be getting into
other companies of this nature, including one Soviet company, direct
Soviet company. So it is not just the including
case that we are
dealing with. We are dealing with a good many of them.
Senator RUDMAN. I only have one other question unless Senator
Nunn has other questions, and after that we will probably dismiss
you as a witness today. You stated that companies tended to draw
on the employees of other companies in terms of seeking employment,
back and forth, and asked them to disclose documents that they had
worked on, process, procedures and in fact people would bring classi-
fied documents to show the kind of work that they did. Is that correct?
Mr. BELL. That is correct. I think it is well known.
Senator RUDMAN. Common practice even though theoretically the
whole security system is based on a need-to-know basis?
Mr. BELL. Right. This is not a?it is a violation of security, but not
necessarily illegal.
Senator RUDMAN. Did you have any problems whatsoever of bring-
ing documentation that was labeled secret out of your plant at Hughes
to your home for photographing?
Mr. BELL. I'm sorry?
Senator RUDMAN. Did you have any difficulty in removing it from
the premises?
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
54
Mr. BELL. I did not.
Senator RUDMAN. Was that illegal
Mr. BELL. That is illegal.
Senator RUDMAN. You were not supposed to remove it?
Mr. BELL. Not supposed to remove it.
Senator RUDMAN. But you never were checked?
Mr. BELL. To be fair with the company, I was a trusted employee.
I had been there 30 years. I know I was never checked.
Senator Mammy. Obviously, it is the trusted employees that people
recruit because of the very nature of what you were doing.
Mr. BELL. Unfortunately.
Senator RUDMAN. Senator Nunn.
Senator NUNN. Thank you very much, Mr. Bell.
We appreciate your cooperation. I think you have made a major
contribution to these hearings.
Senator RUDMAN. Thank you very much, Mr. Bell.
The subcommittee now calls Dr. Lara H. Baker, Jr.
Raise your right hand. It is the policy of this subcommittee to ad-
minister the oath.
Do you swear the testimony you are about to give in the course of
this hearing shall be the truth, the whole truth, and nothing but the
truth, so help you God?
Dr. BAKER. I do.
TESTIMONY OF DR. LARA H. BAKER, JR., ASSISTANT OFFICE
LEADER, INTERNATIONAL TECHNOLOGY OFFICE, LOS ALAMOS
NATIONAL LABORATORY, UNIVERSITY OF CALIFORNIA
Senator Ittromu.r. Identify yourself and if yon would like to proceed
with a summary of your statement, all of which will be included in its
entirety in the record.
Senator NUNN. Mr. Chairman, I have a brief introduction of Dr.
Baker. Our next witness is Dr. Baker, who has just taken the oath.
He is employed by the Los Alamos National Laboratory. He is one
of our Nation's foremost experts on the subject of Soviet computing
and Soviet technology in general.
Dr. Baker gives advice to the U.S. military services and intelligence
agencies in technical matters. He teaches computer science at the grad-
uate level. He is certainly one of the most informed men in this country
on these technology transfer issues.
We are delighted to have him here this morning. We have a much
longer resume which I would ask to be admitted to the record.'
Senator RUDMAN. Without objection.
Dr. BAKER. Thank you.
In my testimony today, I would like to followup on Senator Nunn's
opening statement in which the Senator constructed, for purposes of
discussion, a composite of a department within the Kremlin whose
sole function is to obtain strategic and dual-use technology from the
United States, Japan, and from other Western democraeies.
See p. 338 for the statement of Dr. Lara H. Baker, Jr. His resume and related material
follow the statement.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
55
In an interview on March 8, 1982, the Director of Central Intelli-
gence, Mr. William Casey said:
We have determined that the Soviet strategic advances depend on Western
technology to a far greater degree than anybody ever dreamed of. It just doesn't
make any sense for us to spend additional billions of dollars to protect ourselves
against the capabilities that the Soviets have developed largely by virtue of
having pretty much of a free ride on our research and development.
They use every method you can imagine?purchase, legal and illegal; theft;
bribery; espionage; scientific exchange; study of trade press, and invoking the
Freedom of Information Act?to get this information.
We found that scientific exchange is a big hole. We send scholars or young
people to the Soviet Union to study Pushkin poetry; they send a 45-year-old man
out of their KGB or defense establishment to exactly the schools and the pro-
fessors who are working on sensitive technologies.
The KGB has developed a large, Independent, specialized organization which
does nothing but work on getting access to Western science and technology.
They have been recruiting about 100 young scientists and engineers a year for
the last 15 years. They roam the world looking for technology to pick up.
Back in Moscow there are 400 or 500 assessing what they might need and
where they might get it?doing their targeting and then assessing what they
get. It's a very sophisticated and far-flung operation.
Thus, Senator Nunn's composite is basically accurate. There are
offices and bureaus within the Kremlin, throughout the U.S.S.R. and
throughout the Soviet bloc, whose principal purpose is to transfer high
technology from the West to the Soviet sphere of influence.
I will describe several of the vehicles the Soviets use in their efforts
to obtain our strategic technology, and then give some examples of
how successful they are.
Classical espionage is one of those vehicles. The newspapers are full
of accounts of how Soviet and Soviet bloc individuals, some of whom
have diplomatic immunity, have been involved with traditional hand-
in-the-safe spy rings.
We live in a free society and are proud of that fact. One of our
greatest strengths is the information transfer that our Constitution
allows and that we encourage among our own people.
Tapping into this information flow is an extremely fruitful tech-
nique for the Soviets to use. Also of high importance is the fact that
they have been able to tie up a significant quantity of U.S. Government
resources. These resources are dedicated to answering Freedom of
Information Act requests, checking for downgrading and classifica-
tion of documents, and evaluating national security implications of
compilations of documents.
In our society, one of the most treasured freedoms is free speech.
This reaches its epitome in the freedom of organizations to produce
periodicals covering whatever they wish to talk about. Information
suggests that the Soviets place a very high priority on Western tech-
nical journals. We heard that this morning in the first testimony.
Consider the areas of student exchanges.
As part of the spirit of detente, the United States and the Soviet
Union entered into student exchange programs. This was a particular
coup on the part of the Soviets, since the best technology transfer
organization in the world is the U.S. university system. In the U.S.
universities, a very large number of highly qualified, highly moti-
vated, superbly trained people spend their working lives trying to
come up with better ways to transfer technology to their students.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
56
These people are called university professors. It's their job. and they
do it very well.
Currently, approximately one-half of the graduate students in the
United States are not U.S. citizens. The non-U.S. fraction for many
science and engineering programs is higher. This is particularly worri-
some when one considers the quality of graduate education available in
the United States.
While there are U.S. Government restrictions on Soviet participa-
tion in graduate programs, these restrictions are not applied as strin-
gently to Soviet bloc students, that is, Eastern European students.
Thus, the best in U.S. graduate studies is available, albeit indirectly,
to the Soviets. This helps alleviate the Soviet problems with training
really first-rate engineers.
At several U.S. universities, including MIT and Stanford, one can
start a particular program in electrical engineering with a blank note-
book; at the end of 1 year, the successful student will leave this par-
ticular set of courses holding in his hand a microprocessor chip, a
microprccessor being a computer on one integrated circuit.
During that year, the student will have used computer-aided design
to design the microprocessor, he will have used computer-aided layout
to lay out the processor on silicon, manufactured the chip either in
the laboratory or in collaboration with a manufacturer, tested the
circuit, packaged the circuit, mounted the microcomputer on a printed
circuit board, and made the resulting computer work.
Thus, in 1 year, the student will have been exposed to an intense,
carefully orchestrated program covering the U.S. integrated circuit
industry.
I find in teaching, many people are not familiar with integrated
circuits. I went out this morning to an electronic supply house in
Maryland and bought some. I have these available if the subcommittee
would like to take a lcok at them.
This particular kind of circuit is called an Erasable Programable
Read Only Memory circuits. If you look inside the window on top of
it, you see a three-sixteenths inch square piece of silicon. That square
is the circuit.
The small lines leading from that circuit out to the rest of the
package are gold wires. There are 24 of those wires bonded to that
circuit and bonded to the other end of these prongs.
As you handle these, be careful. 'The prongs are sharp.
In the area of foreign-owned corporations, the tangled web of
ownership of many U.S. corporations obscures the identity of their
true owners. Eastern bloc or Soviet-owned corporations can be recipi-
ents of U.S. technology without the donors of that technology realiz-
ing that the information is going to a foreign government.
In the area of scientific exchange, again, as part of d6tente, the
United States entered into several bilateral agreements with the Soviet
Union on various scientific and technical subjects. As part of these
agreements, the United. States furnished technical information and
equipment. such as a superconducting magnet for a Soviet magneto-
hydrodynamics?MHD system.
This magnet was Oroduced with state of the art U.S. .machining and
quality control equipment, and was far beyond anything the Soviets
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
57
could build for themselves. It was loaned to the Soviets as part of an
exchange agreement in return for participation in the MHD experi-
ments.
The loan of the magnet to the Soviets was approved after review
by the DOD, the DOE, and various agencies.
[At this point, Senator Rudman withdrew from the hearing room.]
[The letter of authority follows:]
U.S. SENATE,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
Washington, D.C.
Pursuant to Rule 5 of the Rules of Procedure of the Senate Permanent Sub-
committee on Investigations of the Committee on Governmental Affairs, per-
mission is hereby granted for the Chairman, or any Member of the Subcom-
mittee as designated by the Chairman, to conduct open and/or executive hear-
ings without a quorum of two members for the administration of oaths and
taking testimony in connection with hearings on the Transfer of United States
High Technology to the Soviet Union and Soviet Bloc Nations, to be held May 4,
5, 6, 11, and 12, 1982.
Wxnuem V. ROTH, JR.,
Chairman.
SAM NUNN,
Ranking Minority Member.
Dr. BAKER. It was felt that the United States would acquire experi-
ence operating the magnet in a facility whose equivalent would not
exist in the West before 1986 or 1987. Since all of the U.S. technical
reviewers agreed that the Soviets could not reverse-engineer the mag-
net to acquire the critical manufacturing techniques, the loan was
approved.
We did receive return from the exchange but also provided a source
of technical equipment to the Soviets.
Business intermediaries: As an area for consideration, business in-
termediaries, that is, U.S. corporations that act as intermediaries for
bloc firms without the manufacturers being aware of such arrange-
ments, are a major source of Soviet covert technology acquisition. The
use of these companies provides an open conduit, lubricated by greed,
for transferring immense quantities of materiel and technology to the
bloc.
The best known?and certainly one of the most successful for the
Soviet Union, and perhaps one of the most damaging to the United
States?was a business intermediary syndicate headed by a 34-year-
old West German named Werner J. Bruchhausen.
I will refer to this as the Continental Technology Corp. or CTC
Organization. The CTC scheme was based on his ownership of more
than 10 electronics firms in southern California and West Germany
and his close ties to other firms elsewhere in Western Europe. The in-
dividuals involved would meet with Soviet and Soviet bloc high-tech-
nology customers, they would discuss what the Soviets needed, and
then would ship the goods, illegally, out of the United States into
Western Europe. From there, they were transshipped into the Soviet
sphere.
In 1981, part of the syndicate was immobilized and two of its prin-
cipals brought to trial.
Of particular interest to me in the Bruchh,ausen case is the informa-
tion it gives us about Soviet intentions. We delude ourselves if we
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
58
think the Soviets enter the black market in search of strategic com-
ponents in a helter-skelter style, buying up dual-use commodities
without rhyme or reason.
The truth of the matter is that the Soviets and their surrogates buy
nothing they don't have specific, well defined need for. They know
exactly What they want?right down to the model number?and what
they want is part of a carefully crafted design.
Among the strategic components that Bruchhausen directed his
accomplices at the Continental Technology Corp. in southern Cali-
fornia to buy for the Soviets were the following:
The information on this laboratory memorandum, I believe' is
available. It was made available to your staff yesterday. Included on
this list is a summary of the information I sent to Customs.
The U.S. Customs Service and the U.S. attorney in Los Angeles
prosecuting the CTC case needed a technical expert to assist them.
They chose me. I sent them an expanded version, it turns out to be
GO pages, of this. The defendant's lawyer apparently felt he did not
want me on the stand because he stipulated to this information at the
trial.
Included in this description are microcomputer development sys-
tems, microcircuit test systems, microcircuits, as I have showed you,
that sort of thing.
Senator NUNN [presiding]. We will make that part of the record
without objection.1
It seems that the Soviets are highly organized in their overall
espionage, covert-type activities in securing American technology.
But we have heard testimony this morning that one of the big prob-
lems they have in producing their own technology is their lack of
organization.
How do you explain the ability of the Soviets to be well programed,
well-informed, know the details of everything they want, have a
master plan about how they are going to get it and yet they are not
capable enough in their own country of organizing, if that is true., to
pr(duce the technology themselves.
Dr. BAKER. I believe their problems in producing the technology in-
cludes organization, but I think their main problem is people. There
is no incentive in the Soviet bloc to produce quality products. Some-
one who works in a factory works to generate products; their quality
is of secondary importance.
For comparison purposes, the people in the United States who make
integrated circuits like this?I have been through their factories
where they work?those people are as close to fanatical about the care
and precision they use to do their job as any group I have ever seen. I
believe there may be basic cultural blocks in the Soviet Union that
prevent the motivation of large numbers of factory workers to take
this kind of care.
When I ask, how U.S. managers motivate these people, how much
they have to pay them, the U.S. mana-2;ers said it wasn't really money;
they said they had to find people who wanted to do a good job and get
out of the way.
I See p. 351 for the material referred to by Dr. Lara Baker, Jr.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
59
Senator NUNN. They must have some incentive systems with the
KGB Lecause they are pretty diligent in their work.
Dr. BAKER. The KGB are the elite, as far as I can tell. They get the
best people. They do motivate them. They do reward them and thereby
get the collection done very well. That is how. They find very good
people; they do reward them; that doesn't happen in the rest of the
bloc.
Someone who gets in the KGB is well rewarded with high privileges,
high status, everything.
Senator NuNN. If they had the incentive system for their engineers
that they have for the KGB, they would not have to steal as much tech-
nology and could develop their own.
Dr. BAKER. I think that is very true, Senator.
This list of Soviet acquisitions has 60 or so examples but is by no
means exhaustive. The equipment is a fraction of the exports; I ex-
amined about 400 air waybills. This is the result of 60 examinations.
The Soviets are having serious problems developing their integrated
circuit/microcomputer industry, mainly in the areas of process control
and quality assurance. The above-mentioned items significantly con-
tribute to the Soviet availability of hardware for developmental and
production systems.
There is no question in my mind that the major pieces of hardware
purchased from Continental Technology Corp. over the last 4 years
of the corporation's operation, taken together, include at least one
complete integrated circuit processing plant. This conclusion is in-
eluctable when you examine the totality of information available on
the case. The Soviets purchased everything they needed for such a
plant, including: saws for cutting silicon crystals, equipment for mak-
ing masks for integrated circuit production, plotters to draw the cir-
cuits, basic computer-aided-design systems for integrated circuit pro-
duction, scribers for separating integrated circuits on wafers, testers
for testing integrating circuits on wafers, bonding equipment for
bonding connecting leads to integrated circuits, and packaging equip-
ment for putting the circuits in final packages. As a result, they have
purchased clandestinely all the hardware they need for equipping a
good integrated circuit production plant. They showed no interest in
purchasing production equipment that .was not state of the art. They
showed very good taste.
High-quality integrated circuits are the basis of modern military
electronics. Integrated circuits form the basis for military systems
which are more flexible, more capable, and more reliable than systems
using discrete electronic components. The production tooling and
equipment obtained by the Soviets will significantly improve the
Soviets' capability to produce such circuits.
The Soviets purchased everything they needed for their plant. The
sequence in which they purchased things and the quantities indicate
the production plant would be of medium size and should be capable
of delivering a high-quality product.
Because of the CTC. the United States gave up technology, much of
which the Soviets could not have obtained elsewhere. It would have
taken them considerably longer to equip the plant, if they could have
equipped it at all, with indigenous capabilities.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
60
What is lost is lost; we cannot get it back. But there is a positive side
to the case: It is in what we can learn from it. There is a wealth of
intelligence to be learned from the Bruchkausen case. It tells us much
about Soviet shortcomings and Soviet strengths and their long-term
strategic objectives.
As background for this statement, I would like to talk about tech-
nology development.
In general, the development of technology can be broken into
several areas: Theoretical research, applied research, development,
and production.
I would like to look at those areas separately.
The Soviets have historically spent a large amount of their efforts
supporting theoretical research. As a result, they have the theoretical
basis for almost any technology they wish to exploit. ,
Experimental research has very slightly less support in the Soviet
Union than theoretical research but still, by 'Western standards,
extraordinarily good support. Like theoretical research, experimental
research in the West is done by people who are advancing the cause
of science and, for that and personal reasons, want to and do, publish
extensively. The Western literature is available to the Soviets.
Although their literature is carefully censored, much of it is avail-
able to us. In the theoretical and experimental research areas, to vary-
ing degrees, the two countries support each other.
In the area of development, this lead is enhanced by the flexibility
inherent in the Western political and economic system.
Western countries are encouraged, by tax advantages and simple
self-interest, to do research into appropriate areas in Oder to increase
their profits. In the Soviet system, on the other hand, the incentive
for doing broad-ranging and possibly risky research is low. The
penalty for failure is high. The penalty for failure in the United
States is economic and professional, at worst. It isn't always even
that, of course. The ready availability of components and technology
in the West encourages wide-ranging develo2mental efforts. There
is a true pyramiding effect?we build on eac.a other's work.
The Soviet system in preproduction can manage to produce a few
of almost any product they want, provided they are willing to devote
the resources to it. The best example of this would be the Soviet
"civilian" space program, in which they managed to put people in
orbit before the United States did, but at a high cost.
In the area of serial production, that is, the day-to-day production
of large quantities of a product, the differences between the two sys-
tems become most obvious. The United States is world renowned,
and justifiably so, for the quality of its serial production facilities.
Other parts of the world, notably Japan, are approaching the United
States quality and quantity in this area. The Soviet bloc, however,
is not.
Serial production is the Achilles' heel of the Soviet bloc. Especially
in high technology areas, the big problem the Soviets have is quality
assurance. As I said, they count products, not quality products. This
is the area where the Soviets exhibit weakness and need the most help.
As a secondary part of this, they have serious problems manufactur-
ing the tools to manufacture the equipment. This is what the CTC case
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
61
helped alleviate by providing a full complement of high quality work-
ing production equipment.
In the area of available manpower, one of the serious problems af-
flicting the Soviet economy is the lack of qualified, highly trained,
technical people in the areas of computers and microelectronics. One
cause of this is the lack of enough computing and electronic equipment
to train the next generation of scientists and engineers. They simply
don't have enough equipment to allow students sufficient "hands-on"
practice at an early stage in their education. The Soviets are trying to
alleviate this problem by producing large, for them, numbers of
RYAD computers?copies of the U.S. IBM System 360's and 370's.
Many of the export license requests, both in the United States and
elsewhere, are for computer systems going to universities or scientific
research institutes in the Soviet bloc. It is difficult to turn such requests
down on the basis of end-user since such organizations support the
Soviet war machine only indirectly. Cases like the Bruchhausen orga-
nization are more obvious. Yet, when I brief various parts of the exec-
utive branch on Soviet bloc computing' I find a surprising lack of
knowledge of the CTC case. Thus, one of the few public examples of
effective compliance action is not widely understood.
Senator NuNN. What do you mean by "effective compliance?"
Dr. BAKER. This is a case where, someone actually was exporting
equipment, was caught, was convicted, and, most effectively, was put
in jail.
Senator Ntrxx. They did succeed in getting virtually everything
they wanted before that punishment took place, did they not?
Dr. BAKER. Yes and no. They got a complete plant, and I think they
got everything they asked for up to the time. As far as I know, at the
time the organization was shut down, the organization was still going
full steam ahead. There was no evidence the Soviets tapered off in
their attempts to acquire equipment through this firm. It just hap-
pened that the records we had information on-2 or 3 years?showed
a complete circuit plant.
Senator RUDMAN. You believe they are capable of maintaining and
repairing that equipment and keeping it operative?
Dr. BARER. For a time. I think they can maintain it, depending on
what goes on, for a while by putting very good engineers on it. They
are going to have a problem with spare parts. You might consider the
equipment as having a half life. That is, after a while, half the systems
in the field are going to fail.
Usually four of everything were shipped to the bloc. I suspect two
were used in production, two for spare parts. That will help in main-
tenance quite a bit because they have a working model to go from.
It is necessary that the U.S. intelligence community coordinate in-
formation derived abroad with data that surfaces here in the United
States. We can discern Soviet objectives in the area of strategic com-
modities. We can than product with a satisfactory level of accuracy
where the Soviets will be trying to tap into technology.
A recently formed interagency committee devoted to this problem
will assist in this area.
One cannot prevent the dissemination of data forever; one can only
slow down a transfer and thereby make it more expensive for the ad-
Am:proved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
62
versary to acquire the data. Eventually, the adversaries get any in-
formation they want badly enough.
In the United States, the most advanced technology is often used
in the civilian sector. Fielded U.S. military equipment is often many
years behind its civilian counterpart because of the need for greater
reliability, delays in the acquisition process, or for other reasons. On
the other hand, the Soviet military gets the best, most modern equip-
ment as soon as it is available. Thus delays in the transfer of high
technology to the Soviet bloc affects the military more seriously than
it affects the civilian sector. I -would like to emphasize that there
is no real civilian sector in the Soviet economy?it is all a state enter-
prise. The military gets the cream of all the production.
The fact that, in the long run, the information will be transferred
does not mean we should not control it. Any obstacle we can place
in the path of technology transfer increases the amount of resources
the Soviet bloc must devote to acquiring the information and de-
creases the total quantity of information they receive. Such increases
in demand on resources, albeit increases on the seemingly inexhaustible
resources of the Soviet intelligence apparatus, are a drain on the
Soviet system.
The Soviet system has difficulty in flexibly responding to new in-
formation. As a result, the longer information is delayed, the harder
it is for the Soviets to integrate it into their production cycle.
.Their planning goes on many years in advance, and the inclusion of
new technology does not automatically cause a revision in the plan.
It may cause an addition to the plan but not necessarily a reduction
in other, less productive areas. The highly structured environment in
the Soviet Union often has a self-defeating result: Factories or enter-
prises will produce obsolete equipment because they were ordered to
although they have the ability to produce more modern equipment
and know about the demand for that equipment but have no authority
to produce it.
When we know better what the Soviets are attempting to acquire,
we can more effectively prevent them from succeeding.
Senator RUDMAN. Again you are making an important distinction
in the Soviet system. You said that when they stole this equipment,
or detained it by covert means that they were going after state of the
art; they knew what they were going after, they had a list of it, they
had very good taste, in your words. But you are saying in their own
production, in their own capabilities internally, they are not going
after state of the art because the system just doesn't work that way;
is that right?
Dr. BAKER. Yes, that is my judgment, that is what I see in the open
literature and the other information. Serial production for the civil-
ian economy is very low on the totem pole and the military economy
suffers somewhat from the same inflexibility.
Many of our control efforts seem to be based on the assumption that
we can control everything. We cannot. A more thoughtful enforce-
ment approach is to decide which items are most important to the
Soviets and focus our attention and resources on those items.
A key ingredient in the Soviet acquired integrated-circuit manu-
facturing plant is a high-pressure oxidation system. One model of this
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
63
kind of system is called by the trademarked name "Hipox." It pre-
cisely controls the atmosphere and temperatures involved in the con-
version of a wafer of crystalline silicon into a wafer containing
several hundred integrated circuits,
Most high-technology components wear out over time. This is where
I got my phrase in answer to your question a while ago, "half-life."
In general, the higher the technology involved in the system, the
shorter the half-life and therefore the greater the demand for spare
parts.
The Hipox systems, so essential to the new Soviet integrated circuit
factory, should be requiring parts by now. If this system and other
critical systems in the plant cannot be serviced the factory will be
slowed down or be otherwise negatively affected.
That tells us that the Soviets will soon be in the market for spare
parts for the Hipox systems, among others. Only a very few com-
panies in the world manufacture high-pressure oxidation systems.
They are all in the West. Each of these companies could be put on
notice to be on the alert for false documentation and other signs of
CTC type business in their intermediary business.
Senator RUDMAN. Do you see any sign that our Government has
organized to do this? You made two important points here, indeed
many important points, but two that stand out. You are talking about
instead of trying to control everything that involves high technology,
they try to have a select group of items they are most in need of and
really bear down on that.
Do you see any signs our Government is organized in that direction
to make that kind of effort?
Dr. BAKER. There are two encouraging signs in that direction. The
first is the Technology Transfer Intelligence Committee which was
formed to find out what their real problems are. The second sign is the
Militarily Critical Technologies List?MCTL?effort in the Depart-
ment of Defense, Department of Energy, and other agencies which is
an effort to put together a compilation of what technologies are, in
fact, critical to us so that we can be alert on what technologies they are
going to be after later. Also, later on the MCTL, we can find out the
so-called civilian uses, in our case real civilian uses, of certain tech-
nologies, and be on the alert for purchases of that kind of civilian
equipment which contains military technology. For example, very
small turbine engines are used in auxiliary power units for jet aircraft,
which is not in itself a critical area, but the technology is very similar
to that used on military small turbines.
I do not mean to imply by earlier remarks that many, or even more
than a few, of the U.S. industrial manufacturers are venal or unpatri-
otic enough to close their eyes to this kind of technology theft. How-
ever, they are very busy; given prima-facie evidence of respectability,
they do not often investigate further. I have every reason to believe
that, given a proper warning, the companies would report suspicious
inquiries promptly and effectively. In addition, suppliers to these com-
panies can be alerted to potential unusual requests.
This kind of precision targeting for export control requires the avail-
ability of accurate technical evaluations of the components and sys-
tems involved in an export or diversion. The expertise needed for these
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
?4
evaluations is a scarce commodity. It is for this reason that the De-
partment of Commerce continually calls upon technical experts from
other agencies to review complex export cases.
The Assistant Secretary for Defense Programs, Department of
Energy, provides technical expertise and policy guidance to other reg-
ulatory agencies with regard to export control matters; this service
was also provided by the DOE's predecessor agencies. For example, I
am the chairman of the technical task group that is responsible for re-
writing the -U.S. proposals to the coordinating committee for interna-
tional control of exports of computers. Other national laboratory ex-
perts chair other committees. My group is devoted to computers and
directly related items. Also, Department of Commerce licensing offi-
cers call laboratory experts, on a regular basis, to request technical ad-
vice on complex export cases.
In other forums, I have proposed the establishment of a center of
expertise to provide a source of technical information for the various
government agencies involved in technology transfer/export control
activities. This will go far to help alleviate the scarcity of available
technical expertise.
Senator NUNN. Where would that center be housed?
Dr. BAKER. I would like to see it housed in one of the national
laboratories which executive department is not critical as long as the
center is in a working, thriving, laboratory so the people involved
in making the export determination are in a state-of-the-art tech-
nical environment where they can maintain their skills and not become
technically obsolete.
Senator NUNN. How many people and how much money are you
talking about?
Dr. BAKER. The first estimate was on the order of 20 people, about
$5 million.
Senator NUNN. Per year?
Dr. BAKER. Yes, sir.
Senator NUNN. This would be the center where all the other de-
partments and agencies could go for their advice?
Dr. BAKER. The intent would be to set up a center that provided an
honest technical answer. It is not the intent to suggest the center would
answer policy questions. That is the. province of the executive depart-
ments themselves, but it would be 'useful if there were a place where
anybody who needed it, Customs, Commerce, Energy, Defense, could
pick up the phone and get an honest technical answer promptly.
With 20 people, there is no way you can cover the field of all dis-
ciplines necessary for that kind of a center but you can cover the field
well enough to find out who should be asked, so the Government can
call one spot and know that the question will be forwarded to the
proper person. For things like computers, lasers, the common ques-
tions, obviously people should be in the center itself.
In any decision to allow or prohibit the export of a piece of equip-
ment, or a technology, three factors come into play.
First, are the procedural considerations: Are the forms filled out
correctly? Are proper concurrences received? Are the overall charac-
teristics of the equipment within appropriate limits, et cetera?
Second, is the technical evaluation of the item to be exported. Is the
system truly appropriate for the stated end-use? Are the statements
about the end-use/end-user true?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
65
As I have previously stated, the technical evaluation of an export
case is a very complex task requiring a particular expertise. The tech-
nical evaluation is best made by an individual who is technically com-
petent in the field and who understands the state of the art in the West
and in the Soviet bloc. Such individuals are rare.
The third factor in implementing export controls is policy. The
policy sets the rules: What we are allowed to export, what we are not
allowed to export.
The key consideration among the three factors?procedure, techni-
cal, and policy?is the technical evaluation. In fact, policy is usually
the result of technical evaluation. For example, a policy that includes
a prohibition against the export of certain oscilloscopes is based on
the technical evaluation of what national security uses the adversary
could make of oscilloscopes. The United States is frequently criticized
for having a poorly articulated policy on export controls or, at best, an
uncertain policy.
The point may not be as clear as I would like to make it. Let me try
to say. it another way. I cannot overstress the importance of having an
effective system of technical evaluation. To achieve the goal of such an
effective evaluation we must optimize three functions.
First, we must be able to look closely at a commodity and be able to
assess its capabilities in both the commercial and the military sectors.
Obviously, the knowledge of its military uses is critical. That ques-
tion can be answered only by competent technical evaluation?imply-
ing an evaluation done by a technically competent analyst.
Second, we must decide whether or not the stated end-user is who
the purchase documents and export documents purport him to be.
For example, is the end-user really a tractor factory or is it a tank
factory? That question can be answered only with competent intelli-
gence data. The analysis of such intelligence data requires intelligence
expertise as well as technical expertise.
Third, we must assess the adversary's capability to use the commod-
ity in a manner that could harm us. That question can be answered
only with detailed technical knowledge and competent intelligence
data about the adversary's system.
I would like to conclude my prepared testimony with the recom-
mendation that, in evaluating export controls, the subcommittee take
into account the very important distinction between strategic and
dual-use equipment versus strategic and dual-use know-how.
Even if our investigative and enforcement capabilities were near
perfect, they would still be directed primarily against equipment. In
both the law and in the Federal regulations, controls should be
strengthened with reference to the know-how that accompanies a
product.
If the Soviets clandestinely acquire. a piece of equipment, and the
equipment works, they have acquired a capability that presumably
they did not have before. Along with that equipment, especially if it
is high-technology equipment, they need the technical data that goes
with it. They need the technical manuals that support the product;
they need the technical art that enhances the equipment.
In many ways it may be difficult to control the shipment of technical
manuals that accompany manufactured equipment. However, I believe
that we can control the art and the support that goes with legally ac-
quired equipment. Showing the Soviets how to make the rope with
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
66
which to hang us does not strike me as a reasonable approach for the
United States to take.
I thank you very much for the opportunity to testify and I hope
that my testimony has been useful to you. I would be happy to try to
answer any questions at this time.
Senator NuNN. Thank you, very much. Your testimony has been
very useful and we thank you very much for your help.
John Marshall, who will testify after you, talks rbout the Soviets
first equipping the semiconductor plant with manufacturing equip-
ment in 1975.
Mr. Marshall says that by 1977, they will probably be ready to start
equipping or testing equipment. Does that square with what you
know?
Dr. BAKER. Precisely, sir. In the CTC invoices I saw for the 1978-
79 timeframe, they were requiring production equipment and in the
1979-80 time period, they were principally working on test equipment
such as complete integrated circuit test systems, handling complete
systems and equipment for the plant. Mr. Marshall's data is quite con-
sistent with my information.
Senator NUNN. Why did Assistant U.S. Attorney Wu and the U.S.
Customs Service seek you as a technical adviser in the Maluta-title
prosecution?
Dr. BAKER. I believe they sought me because of my technical exper-
tise and the fact that they needed help in a very short time. I was
called through unconventional channels on very short notice and asked
to help support the Customs people.
Senator NuNN. Does the Commerce Department have people avail-
able for this kind of technical advice?
Dr. BAKER. I believe so.
Senator NuNx. Was it your understanding that the prosecution's
inability to get the needed technical assistance what caused a serious
delay in the Government's efforts? Was that one of the reasons you
were called?
Dr. BAKER. I would recommend you ask that question of Mr. Wu
when he testifies. I was told at the time that they had a serious statute
of limitation deadline and were about to be unable to prosecute the
cases.
Senator NuNN. What kind of technical assistance was needed for
that prosecution?
Dr. BAKER. They needed really two kinds. First, they needed some-
one to go through the list of equipment that had been shipped over-
seas and determine which of them were, in fact, illegal shipments; that
is, which required licenses and which didn't. That is in essence a licens-
ing officer's kind of decision.
Second, they needed a decision as to the military importance of the
equipment being shipped. They needed to have someone who was
willing to say, and willing to testify in court to the fact, that a particu-
lar shipment or set of shipments was of military importance to the
Soviets and made a difference in their military capability.
Senator Num.r. What is the difference between the talents you
brought to that prosecution in terms of technical expertise and what
the Commerce Department could have brought today?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
67
Dr. BAKER. I can only answer that in terms of the Commerce De-
partment licensing people and experts I worked with and have worked
with for about the last 9 years. Those people are very good at making
decisions about whether or not something requires a valid export
license.
They could have done the first half of the evaluation quite well and
told the customs people which equipment was improperly exported and
which wasn't, which did or did not require a license.
For the second part of the evaluation, involved with the military
significance, I do not believe the expertise exists in the parts of Com-
merce I have seen.
To my knowledge, the people from the licensing branch could not
have answered that question.
Senator NUNN. Is it your opinion that there is no question as to
where the ultimate destination of that equipment was supposed to be
in the CTC case.?
Dr. BAKER. There is absolutely no question in my mind; it went to
the Soviet Union. My source for that kind of information was the
invoices I saw marked to the principal electronics import-export firm
for the Soviet Union in Moscow.
Senator NUNN. In the CTC invoice evaluations, you note the fact
that a piece of machinery is either ahead of the state of the art of the
Soviets or at least equal to what the Soviets have. What is the sig-
nificance of that?
Dr. BAKER. To me the significance is that they are buying equipment
that they cannot make themselves. They are buying equipment obvi-
ously to try to produce in this case integrated circuits, that their cur-
rent equipment will not make. They were trying to improve their long-
term capabilities, they were spending a large amount of very rare hard
currency to get the equipment.
It indicates to me that they were trying to improve the military
potential by acquiring the production line.
Senator NUNN. Dr. Baker' based on your experience working with
the Commerce Department, do you believe that they have access to
enough intelligence to properly perform their job?
Dr. BAKER. I would recommend that question be asked to the Com-
merce people, but the people I work with in Commerce do not have
access to all?source intelligence and do not, as a general rule, have
access to intelligence at all. I work with licensing people and people
who handle cases.
Senator NUNN. Are you familiar with the Commerce Department's
own intelligence group?
Dr. BAKER. This last weekend I was given an opportunity to read
the staff study before these hearings. Up until I read that staff study,
I had no idea Commerce had an intelligence group.
Senator NUNN. You follow this whole area very closely, do you not?
Dr. BAKER. Yes, sir.
Senator NUNN. Does that indicate that since you didn't know that
the Commerce Department had an intelligence unit in the compliance
division that most other people in this field probably aren't aware of
it either?
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
68
Dr. BAKER. Certainly the people I work with in the export control
of electronics and computers do not or have shown no evidence of being
aware; I have never heard it discussed, mentioned, inferred, anything.
I was going to say I am also, as an employee of a DOE labora-
tory, part of the intelligence community. As a result, I work with
intelligence agencies and have never heard it mentioned there either.
Senator NUNN. Does that indicate that the intelligence unit itself
is so small or so unknown that it probably is not getting the kind of
information it needs from others to have that capability or would
you conclude that?
Dr. BAKER. It would appear that the intelligence unit needed to
gather information in this field should be larger than the one I saw
mentioned at Commerce. Again both CIA and DIA are putting to-
gether the units to study this problem.
Senator NUNN. You testified about the intelligence value of the CTC
Maluta case; that is, what the United States can learn from the con-
duct of Maluta and the others.
You are an expert on the technical considerations of the CTC
case.
Have you ever been approached by an intelligence person who
asked for an evaluation of the CTC case?
Dr. BAKER. No, sir.
Senator NUNN. Do you know anyone else who has? Do you know
whether they have really studied that case?
Dr. BAKER. No, sir.
Senator NuNN. If they have, you don't know about it?
Dr. BAKER. If they have, I don't know about it. As I say, I was
the technical expert for the U.S. Customs Service and U.S. attorney
in this case.
Senator NUNN. You are saving that that case has a wealth of
information for our own intelligence experts?
Dr. BAKER. I believe SO.
Senator NUNN. So you are certainly recommending that they study
that in detail?
Dr. BAKER. Yes, sir.
Senator NUNN. Do you know whether the Commerce Department
has had anyone studying that in detail?
Dr. BAKER. I don't know.
Senator NUNN. If they have, you don't know about it?
Dr. BAKER. Correct, sir.
Senator NUNN. Under the best of circumstances if our Govern-
ment were organized to make good use of technology transfer intelli-
gence, what should have happened as a result of that case?
Dr. BAKER. In the best of circumstances it would have been useful
if there were a place for a person like me to go, a single place to
explain what I thought had happened and to provide a way to get
this information down to the street level, enforcement agencies,
quickly in order to get things stopped and/or to draft my decision,
follow up a different way. But there was no place to go to that I
know of.
Senator NUNN. You referred to the half life of the Hipox oven
as being a clue as to when the Soviets expect to be back in the Hipox
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
69
marketplace. When should they arrive and what should we do to
anticipate it?
Dr. BAKER. I think they ought to be here now. I expect they are try-
ing to get parts for it right now. I would think the best procedure
would be to notify the manufacturer and suppliers of that kind of
equipment to expect shipments to people they don't know. The inte-
grated circuit business is a surprisingly close knit group.
Most people in that group, because they attend the same parties, go
to the same beaches, that sort of thing, know who the suppliers are and
would know when the potential diversion could be occurring.
Senator NuNisr. Do we have anyone in Government now who is re-
sponsible for 'performing this task; that is, of anticipating what the
Soviets may be after next in dual-use technology? Do we have any-
body who is primarily responsible for that in Government who should
be informed about the CTC-Maluta case? Do you know of an agency
or group of people designated for that purpose?
Dr. BAKER. I am not aware of any.
Senator NuigN. That is what you are suggesting, are you not?
Dr. BAKER. Yes,
sir.
Senator NUNN. You are suggesting some reverse engineering in the
espionage area by the United States in the sense of determining in
advance what would be most useful for the Soviets, what they need,
what they are most likely to go after and disseminating that knowledge
to those who need to know?
Dr. BAKER. Yes, sir. That is a good way to put it.
Senator N-cricw. Is nuclear nonproliferation also one of your respon-
sibilities at Los Alamos?
Dr. BAKER. Yes, sir.
Senator NuNx. Has this half life concept worked in our efforts to
curtail potential nuclear proliferation problems?
Dr. BAKER. Yes, sir. In one particular instance we had reason to
believe that a country would be acquiring some commodities that would
be of use in their efforts. The Department of Energy went to the sup-
pliers, mentioned to them "if you get any strange requests for this
kind of commodity, please let us know.' The suppliers cooperated
beautifully. The equipment was not shipped.
Senator IsTuNN. Dr. Baker, you probably know as much about this
subject as anyone we will have before us, perhaps more than anyone.
In summary, what are we doing correctly as far as preventing or
delayinfr the amount of technology going out of this country to the
Soviet Union? Where would you give the Federal Government high
marks?
Dr. BAKER. I understand. A couple or three areas I would give the
highest marks to DOE's long-standing efforts in technology transfer
control, and the efforts by the CIA and DIA to get into the tech-
nology transfer arena much more strongly than they have in the past.
Again they are reflecting a requirement of the administration; they
work for it, the law requires it; they are going into this area very
well. I think they have very good people.
The above refer to analysis and forecasting. In the area of enforce-
ment, the efforts of the U.S. Customs Service, in cooperation with the
Justice Department, should be encouraged.
A nnmved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
70
Senator NUNN. CIA and DIM
Dr. BAKER. CIA, DIA, DOE, and other parts of the intelligence
community, are going into it and I think have good people working
on it. The militarily critical technologies list will be helpful to us
in trying to figure out what areas we need to pay most attention to on
our part. If the Soviets are going after something that we don't care
about, simply charge them a lot of money, and let them have it. If
they are going after something we do care about, we should protect it.
I think'' these hearings will be useful in publicizing the problem.
Most manufacturers I think will be quite interested and quite effec-
tive in helping control this problem but many, many people don't
believe there is a problem.
Senator NUNN. Where would you give us low marks? You have
already talked about your primary suggestion, but how else would
you summarize what the Government needs to do?
Dr. BAKER. I would suggest and again this is not my field, I am a
technologist, not a Government organization specialist. But working
in the field, the lacks I see are the lack of centralized technical support,
a lack of, a place to bcro to get prosecutions done in this kind of a case
easily, some place perhaps to gather the information for prosecutions
in cases like this and the lack of a mechanism whereby the information
that may become available through intelligence or other sources could
be quickly gotten to people who need it, to get something done effec-
tively.
Senator NUNN. SO it is lack of a concentrated pool of people who
have technical capability serving as a central source and as a primary
source and also as a clearinghouse source to point to where the knowl-
edge exists if they don't have it. Is that right?
Dr. BAKER. That is correct, sir, either in technology, or in prosecu-
tion, or in intelligence. As I say, the intelligence organizations are try-
ing to solve the problems on the intelligence side.
Senator NUNN. You are saying that one area that ought to be
looked at is perhaps a national laboratory like Los Alamos?
Dr. BAICER. Los Alamos has done a lot of work in the area; but there
are other laboratories who do work in the area. The main thing in
providing a technical center, is to get it out of Washington, into areas
where there is a high technology environment so you attract the people,
keep them busy.
Senator NUNN. Would there be approximately 20 new people and
approximately 55 million of new money per year?
Dr. BAKER. That is what I was anticipating. I would expect in the
long run that there would be no actual saving of money by the Gov-
ernment in doing this because the people involved in evaluating cases,
technically now, would begin evaluating them in their own specialties.
For example, the military who have to evaluate cases technically
could now not worry about that, but could worry about the military
implications.
Senator NUNN. Would there be a lot of people who could be able to
feed into this process who would continue in their existing jobs?
Dr. BAKER. That is correct, sir.
Senator NUNN. So you would be having access to a lot more people?
Dr. BAKER. There would be access, more than that number of
people; yes, sir. Another reason for putting this center in something
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
71
like a national lab, if you need an expert in a particular field, you
can go down the hall and get him. Again, this is simply having it away
from Washington.
Senator NUNN. Dr. Baker, thank you very much for being with us.
Thank you for your testimony and your splendid cooperation and we
hope we can continue to call on you as a resource as we frame our
recommendation.
Dr. BAKER. Thank you, sir.
Senator NUNN. Our next and final witness of the day is Mr. John D.
Marshall. We had planned to have staff statements today but the Sen-
ate is going into closed session on the military authorization bill at
2 :15, so we will defer our staff statements until tomorrow's hearing.
Mr. Marshall, if you will hold up your hand, I will give you the
oath. Do you swear the testimony you will give before this subcom-
mittee will be the truth, the whole truth, and nothing but the truth,
so help you God?
Mr. MARSHALL. I do.
Senator NUNN. Thank you. I know you have a statement. We would
like to get your statement. Could you give us a little bit of
background?
TESTIMONY OF JOHN D. MARSHALL, BUSINESSMAN, SANTA CLARA,
CALM
Mr. MARSHALL. I have been in the electronics business since 1961.
I am a chemist by education, I have been involved in the formation of
a number of businesses, both manufacturing of integrated circuits
and companies to build the equipment for the integrated circuit
industry.
Senator Ntricisr. Thank you.
Could we have the subcommittee room in order, please?
Mr. Marshall, if you would wait. In just a minute, we will have
quiet in the room and you can go ahead.
Senator Nrrimr. Mr. Marshall.
Mr. MARSHALL. I am a chemist and have been in business in Santa
Clara County in a variety of scientific and engineering pursuits since
the early 1960's.
One of the businessmen in Santa Clara County whom I had dealings
with was Carl Storey, president of II Industries. I had known Carl
since 1964. At the time, I had recently sold a business I owned, and
planned to start a new enterprise in the near future. But, when I met
Mueller, I was more or less between assignments and was supporting
myself by working for several firms as a consultant.
Storey told me that Mueller was setting up some kind of semicon-
ductor plant in Hamburg, West Germany. A short time la ter I learned
that Mueller was less interested in actually building a factory but that
his main goal was to sell equipment to European semiconductor com-
panies.
Mueller told me that he was doing business with the Soviet Union
in regard to equipment for electronic watch production.
In the winter of 1975, I made two trips to Moscow with Mueller. On
both trips, the Soviets treated Mueller with special deference. Clearly,
Approved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
72
he was someone they had had dealings with before and someone they
wished to cultivate.
On the first trip, Mueller and I met briefly with a Soviet named
Pavlov. It was hardly more than an introduction, however, and I did
not learn much about him. The trip was not very productive.
On the second trip, we met several Soviets who purported to be
technical people. They were not very well trained and were not famil-
iar with sophisticated technological thinking. But it was apparent to
me by the questions they asked and the subjects they discussed that
the Soviets had built a semiconductor manufacturing and assembly
plant and they were anxious to equip it. They wanted American semi-
conductor manufacturing equipment and they had detailed literature
on the precise kind of equipment they wanted. They also wanted me to
obtain for them certain semiconductor components. It was clear to me
that Mueller had deceived me as to the Soviets' intentions, that it was
not merely electronic watches that the Soviets wanted to manufac-
ture. It seemed to me they had in mind the manufacture of any num-
ber of high technology products, including computers.
I realized that for me to provide such equipment for them would
have constituted questionable or illegal conduct on my part. I wanted
to play no role in such activity and refused to participate further and
left.
Senator NUNN. Did they offer you money or were they just going to
use your services and pay you? What was the offer?
Mr. MARSHALL. They really didn't offer me money. Supposedly I was
Mueller's employee as a consultant. Mueller offered to pay me my
standard consulting fee.
Senator NUNN. You were actually working for him?
Mr. MARSHALL. I was working for Mueller.
Senator NUNN. Did he pay your expenses on the trips?
Mr. MARSHALL. He was supposed to. He didn't pay me.
Senator NuNN. He was supposed to?
Mr. MARSHALL. That's right, he was supposed to pay me and pay
my consulting fee. What I really learned through the whole thing,
Mueller was trying to prove to the people there that he had some tech-
nical expertise and when they started going into areas that were defi-
nitely sensitive and I got the drift of really what was going on., I told
him I wanted no part of it. And got out.
In addition to the questions the Soviets asked me' I began to better
understand certain conversations I had overheard between Mueller
and persons he was meeting with during our trips to Moscow. It be-
came apparent to me that Mueller and these persons were involved
actively in a relatively substantial effort to buy American semiconduc-
tor manufacturing equipment for illegal shipment to the Soviet Union.
Among the persons I met during this association with Mueller was
another West German named Volker Nast, who was introduced to me
as being one of Mueller's partners. I met Nast in Germany as we were
enroute to Moscow. In Hamburg, I met an English or Canadian sub-
ject whose name I cannot recall whose mission was to supply the So-
viets with semiconductor technology; that is to say, he was to show
them how to make integrated circuits and how to use properly the
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
73
equipment they would be obtaining. In Moscow, I met a woman who
spoke English with a German accent who was planning to ship certain
American-made photolithographic materials to the Soviet Union via
East Berlin. I do not remember her name.
In 1975, the United States was preeminent in the field of semi-
conductor technology. It is my view that the Soviets had built their
manufacturing plant, or plants, to specifications for American-made
equipment-_for the manufacture, assembly and testing of integrated
circuits. Now that the facilities were constructed, they were, in the
winter of 1975, confronted with the next step, which was to equip the
facilities.
In 1975, their primary interest in equipment would have related to
the manufacture and assembly phases of semiconductor production.
By 1977, they would probably have been ready to begin equipping the
facilities with the test equipment; and with software development
equipment.
Senator Numsr. Thank you very much, Mr. Marshall. We appreciate
your being here and your cooperation. We also appreciate your being
alerted to what was about to go on and getting involved in that. That
is a good example for a lot of other business people who may be exposed
to the same thing. Do you know whether Mr. Mueller was ever charged
with any crime in this country?
Mr. MARSHALL. I believe he was charged with a crime. In fact, as I
mentioned, the gentleman that introduced me to Mr. Mueller was sub-
sequently brought to trial for shipping equipment illegally to the
Soviet Union.
Senator Nuismr. Is that Mr. Nast?
Mr. MARSHALL. That was Mr. Storey.
Senator NUNN. Mr. Storey, so Mr. Storey was actually indicted and
tried?
Mr. MARSHALL. And tried.
Senator N17NN. Was he convicted?
Mr. MARSHALL. I testified at his trial, he was convicted. Apparently
there was an incompetent reporter at the trial and so, I guess they
negotiated a plea after that. They went to retry. He was convicted at
the trial.
Senator NuNx. How about Mr. Mueller, he never has been?
Mr. MARSHALL. Mr. Mueller, I think is a German citizen. I believe
he has been indicted but I don't think he is going to come back into
the country and I guess you can't extradite from Germany.
Senator NuNN. How about Mr. Nast?
Mr. MARSHALL. Same situation.
Senator NuNN. Indicted?
Mr. MARSHALL. I believe so.
Senator NuNN. In other words, we can't extradite them on those
charges as far as you know?
Mr. MARSHALL. In fact that is the information I got from your
investigators because I asked these questions of them. They are very
aware of the situation.
Senator Nuicx. Mr. Asselin, are you familiar with this or Glenn
Fry? How about taking the stand and let's complete this part right
now.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
74
TESTIMONY OF GLENN W. FRY, STAFF INVESTIGATOR, PERMA-
NENT SUBCOMMITTEE ON INVESTIGATIONS
Hold up your right hand, do you swear the testimony you give in
this case will be the truth, the whole truth, and nothing but the truth,
so help you God?
Mr. FRY. Yes.
Senator NUNN. State your name and present position.
Mr. FRY. My name is Glenn Fry, staff investigator for the minority.
Senator NUNN. How long have you been investigating this case?
Mr. FRY. Approximately 1 year.
Senator NuNN. Would you tell us what the status legally is of Mr.
Mueller we heard testimony about and Mr. Nast?
Mr. FRY. Richard Mueller is a West German and he initially started
to procure American equipment as early as 1974.
Senator NUNN. I don't believe that mike is on. I can't hear you.
Mr. Fay. Is this all right?
Senator NUNN. That is better.
Mr. FRY. Richard Mueller is a West German who as early as 1974
was attempting to procure semi-conductor manufacturing equipment
from the United States, specifically two companies on the west coast,
II Industries and Kasper Electronics. He tried at first through an in-
dividual in Germany named Luther Heidecke who worked for Honey-
well A.G. in West Germany. His attempts in this area failed. The next
time he was heard of was when he was dealing directly with II Indus-
tries and Kasper Electronics.
Senator Ntri.tx. Did he get indicted in this country?
Mr. FRY. Yes; he did.
Senator NUNN. Has he ever been tried?
Mr. FRY. No; be hasn't.
Senator NUNN. Why riot?
Mr. FRY. He and Volker Nast both flew to Germany.
Senator NUNN. Both been indicted?
Mr. FRY. Both hove been indicted.
Senator NUNN. Has our Government tried to extradite him?
Mr. FRY. There is no way to extradite him for these charges.
S-nator NrrNN. Why is that?
Mr. FRY. The West German Government is just not sympathetic.
Senator NUNN. Let's say he was a murderer in the United States,
what would happen if he fled to West Germany then?
Mr. FRY. I am not that familiar with the extradition laws, but I
assume something of that severity
Senator Ntrivx. I ask you to have the staff look into this as soon as
possible and get us the status of the law as to why this is not an ex-
traditable offense. Your understanding is that it is not an extraditable
offense?
Mr. FRY. This is the information we received from Justice and
Customs.
Senator NuNx. And the offense he was charged with was violation
of the U.S. Export Administration Act?
Mr. FRY. Yes, sir,
Senator NUNN. What about espionage, would that have been an
extraditable offense? If you don't know, you can furnish it in a
memo
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
75
Mr. FRY. I don't know.
Senator NuNN. I would like to have that in the record. You are
going to be testifying tomorrow. Perhaps you can get it by then.
Mr. FRY. All right.
Senator NuNN. We are engaged in a military alliance with West
Germany as one of our prime partners. We are spending billions and
billions of dollars. The efforts that were being made in this case that
you related, Mr. Marshall, were aimed at improving the Soviet mili-
tary capability. We charge people involved with the crime and they
flee to one of our prime allies that we are helping to defend against
the Soviets and we can't get them back. Does that strike you as being
somewhat of a paradox?
Mr. MARSHALL. It certainly does. I was dumbfounded with the fact
we couldn't do anything because I went to the Custom's people and
cooperated with the Custom's people in prosecution of this case and
found out at that time, too, there was nothing they could do to Mueller.
Another thing I found out during the same time was apparently
the Russians are also getting a lot of semi-conductor integrated circuit
technology from Japan and apparently there is no problem in them
obtaining this very sensitive technology from the Japanese and now
the Japanese have made very, very substantial strides over the last
10 years and now are just on about a par with our existing technology
and seems to me if the Russians want something they can go to the
Japanese and get it, no questions asked.
Senator NuNN. Another one of our allies.
Mr. FRY. Japan?
Senator N-uNN. Yes.
Mr. FRY. It is.
Senator NUNN. In the defense budget on the floor today, we are
spending so much money on our own allies, yet we didn't exercise
much effort in terms of agreeing to extraditable offenses with them.
If we have I don't know about it. I would like a staff analysis of that.
[At the request of the subcommittee, Dr. Edith Palmer, a senior
legal specialist in the European Law Division of the Library of
Congress, prepared a report on "Problems of Enforcement of National
Security Export Controls Involving Illegal Conduct Abroad." The
report follows.:]
PROBLEMS OF ENFORCEMENT OF NATIONAL SECURITY EXPORT CONTROLS INVOLVING
ILLEGAL CONDUCT ABROAD
Diversions of controlled technology are at times carried out through compli-
cated schemes involving interim exports to West European countries, particularly
the Federal Republic of Germany, in conjunction with various forms of transit
through neutral countries such as Austria and Switzerland before the goods
reach their final destination in the Soviet Bloc.
These schemes hamper enforcement of our national security export controls in
two major ways. First, they often involve the participation of forcign nationals
operating from abroad who cannot be brought to justice beciuse they are neither
extradited to this country nor punished in their home countries. Second, they
make discovery of illegal conduct very difficult in that the cooperation of several
European countries is required in investigating the facts. This cooperation works
well with regard to the Federal Republic of Germany, but the Swiss authorities
have in such cases refused assistance. It is also questionable whether coopera-
tion could be obtained from Austria.
An example of the impunity 'with which foreign nationals violate our export
controls is the ease of Volker Nast, a national resident of the Federal Republic
of Germany. In April of 1976, Volker Nast was indicted by a Federal grand jury
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
713
in San Francisco for violation of 18 U.S.C. ? 371, conspiracy to violate the Ex-
port Administration Act.' Even though his conspirators in the United States were
prosecuted and convicted, Volker Nast could not be brought to trial because his
extradition was not obtained.
In 1980, Volker Nast again participated in a scheme of illegal exports of 'U.S.
technology in violation of the Arms Export Control Act.' Through the diligent
efforts of the U.S. Customs Service, the illegal export of the controlled item, a
Microwave Surveillance Receiver System, was forestalled. Two co-conspirators
in this scheme, one a U.S. citizen and the other a German citizen, were appre-
hended in New York City and were tried and convicted. On May 26, 1981, Volker
Nast was charged with a two-count indictment in Baltimore, Maryland, for con-
spiracy in violation of 18 U.S.C. ? 371, and with aiding and abetting an attempt
to violate the Arms Export Control Act, in violation of 18 U.S.C. ? 2 and 22 U.S.C.
? 2778. But because of his German residence he could not be tried.' Given Volker
Nast's conduct to date, it is foreseeable that he may continue his profitable activi-
ties unless ways and means can be found to deter him in the future.
The most effective deterrent for offenders like Volker Nast would be to obtain
their extradition to the United States. However, this often will not be possible
for various reasons, the most compelling being that the offender is a national of
the country that is requested to extradite. In fact, in the Federal Republic of
Germany, the extradition of a German national is ba-red by a constitutional pro-
hibition.' This constitutes a preclusion of law justifying the refusal of extradition
as provided in Article 7 of the Extradition Treaty between the United States and
the Federal Republic of Germany.5
Aside from the issue of German nationality, it is not clear to what extent the
Federal Republic of Germany under the Extradition Treaty now in force would
grant extradition of a U.S. citizen or a citizen of a third country to the United
States for violations of U.S. export controls. If the offender were a U.S. citizen,
the issue would turn on a finding of double criminality for the conduct.
The intent of the parties is to interpret the Extradition Treaty broadly in
order to avoid any possible gaps in the prosecution of crimes." The Treaty
obligates the Federal Republic of Germany to grant extradition for any Federal
offense under U.S. law that is punishable in the United States and in the Federal
Republic by imprisonment for more than one year.' It would seem that a good
faith interpretation of ?the Treaty would warrant a German finding of double
criminality because German export control laws make the unauthorized export
of certain controlled materials punishable by imprisonment up to three years.'
However, it is by no means assured whether or not a German court invoked to
examine the allowability of extradition would come to this conclusion, since
German export control laws are not nearly as comprehensive as those of the
50 U.S.C., app. 2401-2420.
18 U.S.C. ? 2; 22 U.S.C. ? 2778.
Affidavit of April 5, 1982, of Michael Dolphin, Special Agent. U.S. Customs Service,
stating these facts to Glenn Fry and Jack Key of the Senate Permanent Subcommittee on
Investigations, Committee on Governmental A `fairs.
4 Art. 16, para. 2, of the Basic Law of the Federal Republic of Germany (Grundgesetz fur
die Bundesrepublik Deutschland vom 23. Mai 1949, Bundesgesetzblatt [official law gazette
of the Federal Republic of Germany. BGB1.], p. 1.
5 Treaty Between the Federal Republic of Germany and the United States of America
Concerning Extradition [US-FRG Treaty], signed at Bonn. June 20, 1978, entered into
force August 29, 1980, T.I.A.S. 9785.
6 H. Grtitzner and P. Piitz, Internationaler Rechtshilleverkehr in Strafsachen H V 10,
p. 26. note 2 (Hamburg. 1955- ).
'Articles 1 and 2, US-FRG Treaty- Article 2 also incorporates as extraditable an enum-
eration of offenses contained in the Appendix. In the German interpretation of the Treaty,
this enumeration prevails only for requests from the United States that are based on of-
fenses under state law, whereas for offenses under the Federal laws of the United States,
extraditability is determined by double criminality plus the punishment threshhold. The
numerated offenses, however, are indicative of the intent of the Treaty as to the types of
crimes covered. Number 27 of the Appendix specifically includes :
(a) Offenses against the laws relating to importation, exportation, or transit of goods,
articles, or merchandise.
(b) Offenses relating to willful evasion of taxes and duties.
(c) Offenses against the laws relating to international transfer of funds.
The only category of offenses that is excepted from extradition is that of political
offenses. According to Article 4 of the Treaty, the requested State determines whether or
not an offense is political. While a German finding of political intent with regard to U.S.
export control violations would seem unlikely, given the obvious commercial motives under-
lying such transactions, violations of U.S. espionage laws would almost certainly fall under
the political offense exception.
Sees. 34 and 7, Aussenwirtschaftsgesetz vom 28. April 1961. BGB1. 1. p. 481, as
amended, in conjunction with secs. 5, 38. 40, 45, and 70, Aussenwirtschaftsverordnung vom
22. August 1961, BGB1. I, p. 1381, as amended.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
77
United States. Criminal sanctions in the German export control system are
viewed as exceptional, in view of the free-trade orientation of German foreign
economic relations legislation, and most infractions of it are punishable merely
by administration fines.'
If the United States were to request the extradition of an offender who is a
national of a third country for U.S. export control violations, the Federal Repub-
lic might refuse extradition if tl-e illegal conduct occurred entirely outside the
territory of the United States, since the Treaty, with regard to non-nationals
of the requesting country, requites that the requested country must in its own
laws have jurisdiction over the type of offense when committed extraterritori-
ally." German criminal law, however, does not list export control violations
among the offenses for which it prosecutes foreigners for acts committed
abroad."
With regard to persons who are not German nationals, the United States
might at times succeed in obtaining extradition when the violators of the U.S.
export control laws commit other offenses as well that are extraditable under
the Extradition Treaty with Germany. Fiscal offenses and perjury might fall
into this category. However, the rule of specialty would limit U.S. prosecution
to the offenses for which extradition was granted."
The refusal to extradite nationals is a concept that the Federal Republic
shares with many European countries," and this principle is frequently defended
by its proponents with the argument that these countries will exercise jurisdic-
tion over their nationals for offenses committed either in their territory or
abroad and that they will punish them according to their domestic laws." How-
ever, this argument fails to be convincing when, as in the case of export viola-
tions, the ccnduct of the person whose extradition is sought is not punishable
in the requested country.
It is a well-recognized principle in international law that a state refusing to
extradite a criminal should punish him according to its municipal laws. This
principle has been expressed in numerous international conventions dealing with
the suppression of crimes, and these agreements frequently contain clauses ob-
ligating the member countries to make the reprehensive conduct punishable ac-
cording to their own laws and to establish jurisdiction in their laws over offenders
whose extradition is refused.' Whereas these conventions deal with universal
crimes for which there is a broad consensus that they need to be suppressed, this
may not be the case with regard to U.S. export controls. However, the protection
of these controls might well constitute an obligation among the members of the
North Atlantic Treaty " to protect their mutual security by adopting laws to
enforce these controls.
The difficulties of investigating violations of U.S. export controls abroad be-
came especially apparent in 1980, when Theodore Wai Wu, Assistant United
States Attorney, traveled to West Germany and subsequently to Switzerland to
Investigate massive schemes of diverting U.S. controlled technology to the Soviet
Bloc involving exports to the Federal Republic of Germany and various forms
Aussenwirtschaftsrpcht 1975, at 33 (Frankfurt, 1975).
"Art. 1, US-FRG Treaty.
"Sees, 5 and 6 of the German Criminal Code, i.e., Strafgesetzbuch in der Fassung vom 2.
Januar 1975, BGB1.. p. 1, as amended.
la Art. 22, US-FRG Treaty.
13 Austria bars the extradition of nationals by a constitutional provision: sec. 12,
Auslieferungs- und Rechtshilfegesetz vom 4. Dezember 1979, Bundesgesetzblatt [official law
gazette of Austria], No. 529/1979. Switzerland bars the extradition of nationals by legisla-
tion: Art. 7, Rechtshilfegesetz vom 20. Marz 1981, Bundesblatt [official law gazette of
Switzerland] I, p. 791.
'1l. Wise, "Some Problems of Extradition," 15 Wayne Law Review 715 (1969).
"Obligations to provide Jurisdiction and criminal provisions to punish offenses for which
extradition is not granted are contained In: Convention for the Suppression of Unlawful
Seizure of Aircraft, done at The Hague, December 16, 1970, entered into force for the
United States October 14, 1971, T.I.A.S. 7192, the Convention for the Suppression of
Unlawful Acts Against the Safety of Civil Aviation, done at Montreal, September 23,
1971, entered into force for the United States January 26, 1973, T.I.A.S. 7570; Con-
vention on the Prevention and Punishment of Crimes Against Internationally Protected
Persons Including Diplomatic Agents, done at New York, December 14, 1973, entered into
force for the United States February 20. 1977, T.I.A.S. 8532; Single Convention on Nar-
cotic Drugs, done at New York, March 30, 1961, entered into force for the United States,
June 24, 1967, T.I.A.S. 6298. Most European countries are also bound by such an obliga-
tion according to the European Convention on the Suppression of Terrorism, done January
27, 1977, BGB1. 1978. II. p. 321.
la Arts. 3 and 4, North Atlantic Treaty, signed at Washington, April 4, 1949, entered into
force for the United States August 24, 1949, T.I.A.S. 1964.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
78
of transit through Switzerland and Austria." The West German authorities were
very cooperative and their assistance, granted under a bilateral customs agree-
ment,' was instrumental in discovering the complex schemes of diversion. But
the Swiss authorities denied assistance on the grounds that the country's political
neutrality barred assistance for U.S. export control enforcements that are viewed
by the Swiss as involving political considerations. They also denied it on the
grounds that the Swiss business secrecy laws prohibited certain inquiries. Mutual
assistance in criminal matters is granted to the United States by Switzerland
under the Mutual Assistance Treaty of 1973." Whereas this U.S.-Swiss Treaty
contains broad obligations of assistance, refusals of the type described above
are possible because of discretionary clauses contained in its Articles 3 and 10.10
Mutual assistance between Austria and the United States is granted on the
basis of reciprocity in the absence of a treaty. It is possible that the Austrian
authorities would also refuse assistance to the United States for the investigation
of export control violations, since the Austrian Law on Extradition and Mutual
Assistance contains a general reservation precluding assistance when it would
violate essential Austrian interests.' Austrian neutrality and business secrets are
prime examples of such protected interests in the intent of the Austrian
legislature.'
National security export controls of the United States cannot be enforced
effectively as long as these difficulties in prosecuting foreign offenders and
investigating operations abroad continue to exist. These factual problems and
the legal situations on which they are based should be taken into consideration
by the U.S. Secretary of State in consultation with the Secretary of Defense, the
Secretary of Commerce, and the heads of other appropriate departments and
agencies when negotiating with other countries regarding cooperation in restrict-
ing the export of goads and technology under the Export Administration Act, as
provided in 50 U.S.C., app. ? 2404 (k ).
Senator NUNN. Mr. Marshall, during your exposure to Richard
Mueller, can you recall the circumstances that led you to believe he
was illegally diverting United States technologies to the Soviet
Union?
Mr. MARSHALL. While I was with him I began to overhear a lot of
conversations he was having with other people and conversations he
was having on the telephone which definitely indicated that he was
doing this. In fact, as I mentioned, I was a witness for the prosecution
of the people in the Ii Industries case because I had sonic direct knowl-
edge and I guess it was my testimony that was key in getting a con-
viction.
Senator Nui.rx. Did Mueller appear to know exactly what United
States technology he was to obtain for the Soviets?
Mr. MARSHALL. I believe so.
Senator NUNN. How do you gather that?
Mr. MARSHALL. He was after certain things. In fact, during this time
he wanted me to get involved, he was trying to get me to supply, or
wanted me to supply some very sophisticated maskmaking equipment.
I told him he was nuts, but it was some very sophisticated equipment.
He was saying he was going to buy it from West Germany and then
move it from West Germany into the Soviet Union.
17 Statement of Theodore Wal Wu. Assistant United States Attorney, Criminal Division.
Central District of California, before the Permanent Subcommittee on Investigations, United
States Senate. May 5, 1982.
18 Agreement Regarding Mutual Assistance Between the Customs Services of the United
States and the Federal Republic of Germany, signed at Washington. August 23, 1973, en-
tered into force June 13. 1975. T.I.A.S. 8098.
10 Treaty Between the United States of America and the Swiss Confederation on Mutual
Assistance in Criminal Matters, signed at Bern, May 25, 1973, entered into force Janu-
ary 23, 1977, T.I.A.S. 8302.
20 Article 3 of the Treaty gives the requested state discretion to refuse assistance that is
likely to preiudice its sovereignty, security, or similar interests. Article 10 makes the dis-
closure of business secrets by Switzerland subject to the approval of the Swiss Central
Authority.
.1 Sec. 2. AHRG. supra note 13.
28 R. Linke and H. Epp, Internationales Strafrecht 19 (Wien, 1981).
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
79
Senator Ninrx. He was making no bones about that?
Mr. MARSHALL. That's right.
Senator NUNN. Did he tell you it was illegal?
Mr. MARSHALL. It was obviously illegal.
Senator NUNN. He knew it was illegal and no question about it?
Mr. MARSHALL. Sure.
Senator NUNN. Did he mention whether money was available for
this purpose?
Mr. MARSHALL. Not really. He mentioned they wanted the equipment
and I guess he was being rewarded very handsomely by the Russians.
He was spending a lot of money, bought two new Mercedes, was in the
process of building a very large home in the countryside around Ham-
burg. So he obviously was doing very well financially.
Senator NUNN. Did he do other things or was he primarily engaged
in trying to obtain equipment for the Soviets?
Mr. MARSHALL. I think that was his major job. What he was doing
was trying to work under the guise of being a manufacturer's repre-
sentative for some sophisticated equipment in Europe, and using that
as really a guise to obtain the equipment to ship to the Soviet bloc.
Senator NUNN. You gave testimony in a trial involving II Indus-
tries and Kasper Electronics, two Silicon Valley firms which pled
guilty to violations of the Export Administration Act. Were you
familiar with the nature of the equipment that was being shipped for
the Soviets?
Mr. MARSHALL. Yes, I was.
Senator NUNN. What was it to have been used for in your opinion?
Mr. MARSHALL. It would have been used for the production of the
integrated circuits. It was part of the photolithography process used
to make integrated circuits.
Senator NUNN. What about the military applications?
Mr. MARSHALL The circuits certainly have military application; the
equipment has no military application.
Senator NUNN. This is primarily industrial? -
Mr. MARSHALL. For production circuits used to print the patterns,
the microscopic patterns on the silicon?
Senator NUNN. Does that mean once they produce these they would
have been using it for commercial purposes?
Mr. MARSHALL. Commercial Or military.
Senator NuNrr. Or military?
Mr. MARSHALL. Yes.
Senator NUNN. Members of the minotity staff showed you a list of
equipment that has been illegally exported to the Soviets over the pe-
riod 1976 to 1980; is that correct?
Mr MARSHALL. Yes.
Senator NUNN. These illegal exports were valued at about $10 mil-
lion. Have you looked at that list?
Mr. MARSHALL. I have seen the list; yes.
Senator Nuisrx. What type of equipment was this and how would
it have been used, in your opinion?
Mr. MARSHALL. Most of the equipment there really broke down into
two categories. One category was mainly test equipment, for testing
integrated circuits. Another area was software development for de-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
80
veloping software for a particular microprocessor chip, 8080 micro-
processor chip. There was, I guess, one piece of equipment there that
would be used for the processing of the integrated circuits which was
really more advanced than anything that existed during 1975 when
Mueller was talking to me. This is a relatively new piece of equipment,
the Hipox machine.
So it sounds like maybe they, have something going and they are
continuing to facilitize it and update it with modern equipment just
like a U.S. manufacturer would.
Senator NuNN. Mr. Marshall, based on your experience, do you have
any suggestions for the Federal Government as to how to curb tech-
nology transfers to the Soviet Union and the Eastern bloc?
Mr. MARSHALL. I listened to Dr. Baker's testimony and his idea
about limiting, taking key segments away from them and spare parts
for those segments just would be. I think, a very effective way to con-
trol it because I think with the proliferation of semiconductor tech-
nology as exists in the world today it would be hard to control every-
thing, but I think there are a few key areas that if controlled it would
seriously limit their ability to continue to modernize the technology.
Senator NtrNN. So you agree with Dr. Baker's suggestions in that
respect?
Mr. MARSHALL. Yes, sir.
Senator NuNN. Is there anything else you would like to offer to the
subcommittee this morning?
Mr. MARSHALL. No.
Senator NUNN. We appreciate very much your cooperation, Mr.
Marshall. Thank you.
The hearings of the Senate Permanent Subcommittee on Investiga-
tions on Technology Transfer will continue on Wednesday, May 5,
which is tomorrow, at 9 a.m. We will start at 9 o'clock in the morning
and catch up with some of the additional information from the staff.
We will hear from Jack Vorona,, Director, Scientific and Technical
Information, DIA; Theodore Wu, assistant U.S. attorney, Central
District of California; John Maguire, president of Software A.G.,
Reston, Va.; Theodore Greenberg, assistant U.S. attorney, Eastern
District of Virginia; and Douglas Southard, assistant district attor-
ney, county of Santa Clara, Calif.
We will start with our own staff which has an important analysis of
their investigation.
The subcommittee will adjourn.
[Whereupon, at 1:30 p.m. the hearing was recessed, to reconvene at
9 :05 a.m., Wednesday, May 5, 1982.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
WEDNESDAY, MAY 5, 1982
U.S. SENATE,
PERMANENT SUBCOMMLL IEE ON INVESTIGATIONS
OF THE COMMIrrLE ON GOVERNMENTAL AFFAIRS,
Washington, D.0 .
The subcommittee met at 9:05 a.m. in room 3302, Dirksen Senate
Office Building, under authority of Senate Resolution 361, dated March
5,1980, Hon. Sam Nunn presiding.
Members of the subcommittee present: Senator Sam Nunn, Demo-
crat, Georgia; and Senator William S. Cohen, Republican, Maine.
Members of the professional staff present: S. Cass Weiland, chief
counsel; Michael C. Eberhardt, deputy chief counsel; Katherine Bid-
den, chief clerk; Eleanore J. Hill, chief counsel to the minority; Greg-
ory Baldwin, assistant counsel to the minority; Jack Key, Glenn Fry,
and Fred Asselin, staff investigators to the minority; and Kathleen
Dias, executive secretary to the minority chief counsel.
[Senator present at time of convening: Senator Nunn.]
[The letter of authority follows:]
U.S. SENATE,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
Washington, D.C.
Pursuant to Rule 5 of the Rules of Procedure of the Senate Permanent Sub-
committee on Investigations of the Committee on Governmental Affairs, permis-
sion is hereby granted for the Chairman, or any Member of the Subcommittee as
designated by the Chairman, to conduct open and/or executive hearings without
a quorum of two members for the administration of oaths and taking testimony
in connection with hearings on the Transfer of United States High Technology
to the Soviet Union and Soviet Bloc Nations, to be held May 4, 5, 6, 11 and 12,
1982.
WILLIAM V. ROTH, JR.,
Chairman.
SAM NUNN,
Ranking Minority Member.
Senator NUNN. The subcommittee will come to order.
Our first witnesses this morning will be Mr. Fred Asselin, staff in-
vestigator, and Mr. Glenn Fry, staff investigator.
If you all would take the stand.
Mr. Fry has been sworn but let's both take the oath again.
Do you swear the testimony you give before this subcommittee will
be the truth, the whole truth, and nothing but the truth, so help you
God?
Mr. ASSELIN. I do.
Mr. FRY. I do.
(81)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
MEI
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
82
TESTIMONY OF FRED ASSELIN AND GLENN W. FRY, STAFF IN-
VESTIGATORS, PERMANENT SUBCOMMITTEE ON INVESTIGA-
TIONS
Senator NUNN. I believe both of you have statements this morning
and we will ask you to proceed with those.
Mr. ASSELIN. Mr. Chairman, I Am Fred Assel in. I am an investi-
gator on the minority staff of the Senate Permanent Subcommittee on
Investigations.
I have shortened considerably my prepared statement. I request that
my entire 32-page statement be printed in the hearing record.'
Senator NUNN. Without objection, your statement will appear as if
read.
Mr. ASSELIN. I also have a summary of the CTC-Maluta case that I
would request be inserted in the ?hearing record.
Under the Export Administration Act, the U.S. Department of
Commerce, through its Office of Export Administration, has juris-
diction over most nonclassified exports from the United States.
Enforcement of the Export Administration Act is carried out by
the Compliance Division of the Office of Export Administration.
The Compliance Division has three Branches?Investigations, In-
telligence, and Facilitation?Inspections.
The minority staff of the subcommittee has made an evaluation of
the effectiveness of the Compliance Division. An assessment of Com-
pliance Division resources and procedures was made. The minority
staff interviewed current and former executives of the Division, and
current and former special agents of the Division. Also interviewed
were law enforcement personnel from other agencies, Government in-
telligence officials and officials of agencies whose mission brings them
in contact with the Compliance Division.
Uppermost in mir minds as we made this evaluation were the na-
tional security implications of the responsibility vested in the Com-
pliance Division. The Export Administration Act itself spells out that
national security responsibility.
The minority staff also evaluated the Compliance Division in terms
of its being a law enforcement entity.
The information that; the minority staff has gathered about the Com-
pliance Division was compared to official pronouncements which the
Department of Commerce has made about the Division in testimony
before Congress and in annual renorts to Congress.
The investigation, which lasted more than 1 year, resulted in a series
of preliminary findings. which are now submitted to subcommittee
members for their consideration. It is our recommendation that subse-
quent witnesses to these hearings from the law enforcement and
national security fields be asked tocomment on the minority staff's
preliminary findings wherever appropriate.
In reports to Congress, the Commerce Department has portrayed
the Compliance Division as if the Division were competently organized
See p. 366 for the prepared statement of Fred Asselin.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
83
and adequately staffed to enforce the Export Administration Act
export controls provisions. By contrast, our investigation found that
the Compliance Division is not effective. It is an understaffed and
poorly equipped and, in certain instances, undertrained and unquali-
fied investigative and intelligence unit.
According to Commerce Department congressional testimony,
Department officials "regard the enforcement program as an integral
part of the export control system," and say their policy is to "marshal
our limited resources to exact maximum compliance with the law."
It is useful to note the reference to limited resources because the
staff also will underscore the limited nature of the Commerce Depart-
ment's commitment to enforcing export controls. Moreover, the staff
inquiry concluded that the Department's commitment to export con-
trols enforcement is so limited, in fact, that it is impossible to expeet
"maximum compliance with the law." It is optimistic to expect very
much compliance at all.
Our staff investigation revealed the number of inspectors for the
entire Nation is five or six?and five of them are located at the John F.
Kennedy International Airport in New York. On a rotating basis, one
of the five inspectors is on travel much of the time, trying to conduct
inspections for the rest of the Nation. Some airports and seaports never
are visited by Commerce Department inspectors in the course of a year.
Other exit ports are visited 1 week a year. A sixth inspector is in the
Washington, D.C. area.
The Commerce Department's testimony provided this description of
the Intelligence Branch of the Compliance Division:
The Intelligence Branch is staffed with criminal investigator intelligence
reporting officers and other support personnel who develop and maintain intel-
ligence information regarding possible export control violations. Branch per-
sonnel review all incoming allegations, voluntary disclosures and referrals from
the Facilitation Branch to determine whether referral to the Investigations
Branch is warranted.
The testimony suggests a much larger operation than actually exists.
The Intelligence Branch has a Chief, a Deputy Branch Chief, two full-
time professionals and one detailee from the Drug Enforcement Ad-
ministration.
The Intelligence Branch Chief, who is unique among the three
Branch chiefs because of his considerable background in law enforce-
ment, told the staff in a prehearing interview that his office is so over-
whelmed with its workload and so understaffed that it is impossible
for him to provide the kind of intelligence analysis needed for the Di-
vision's national security and law enforcement mission.
The Intelligence Branch is supposed to be able to process and assess
sensitive information. Yet, the Branch has no secured telephone. None
of its professionals has access to sensitive compartmented information;
that is, sensitive intelligence data.
Intelligence Branch personnel often are bogged down in relatively
insignificant assignments and do not have the time to collate and syn-
thesize information in an effort to anticipate violations.
In its testimony before the House Committee, the Department went
on to describe the Investigations Branch of the Compliance Division
by saying it "is also staffed with criminal investigators and conducts
full-scale investigations into alleged violations.'
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
84
The use of the adjective full scale to describe investigations suggests
a substantive effort. However, the subcommittee staff was informed
by the Chief of the Investigations Branch and by a former Director
of the Compliance Division that a full-scale investigation can be a
phone call or a letter.
Both, the fiscal year 1980 and 1981 reports to Congress, speak of "full
field investigations."
In 1980, Compliance Division special agents conducted 61 full field
investigations; and in 1981, an undisclosed number of full field in-
quiries were made, according to the two reports to Congress. The
Branch has abvut eight investigators. With such limited resources at
its disposal, the Compliance Division would be very Lard pressed to
conduct 61 full field investigations in a 12-month period.
The Chief of the Investigations Branch told the subcommittee staff
that 61 full field investigations might not have been the meaning that
the report to Congress intended to convey and that there might have
been a misunderstanding due to poorly constructed writing in the
report.
The testimony also noted that "A principal focus of the Investiga-
tions Branch is preventive enforcement. -We try to thwart illegal trans-
actions before they occur to avoid possible irreversible harm to na-
tional security."
Our investigation revealed that, preventive enforcement is far re-
moved from the realistic objectives of the Investigations Branch. The
Branch has about eight special agents, some formerly trained in tradi-
tional law enforcement, some untrained. Most of their work they do
on the telephone or by mail. There is some travel but the bulk of the
work is done in the Washington headquarters of the Commerce De-
partment. Investigative support is provided by a three-man field office
in New York.
In law enforcement, the term "preventive enforcement" suggests
something quite different, than an eight-member Investigations Branch
that does most of its work from the office. Preventive enforcement
means sending agents into the field, staving in close and frequent con-
tact with the many segments of the affected community.
Senator NUNN. Let me ask you a question right there. You talked
about several different branches. You mentioned the Inspection
Branch. Is that one separate branch?
Mr. ASSELIN. Yes, it is known formally as the Facilitation Branch.
Senator NUNN. Intelligence Branch is another branch?
Mr. ASSELIN. Yes, sir.
Senator NUNN. That is two separate ones there?
Mr. ASSELIN. And Investigations is a third.
Senator NuNN. There is an Investigations Branch?
Mr. ASSELIN. Yes.
Senator NUNN. How about a Compliance Branch?
Mr. ASSELIN. That's it.
Senator NUNN. It's all under one?
Mr. ASSELIN. The Compliance Division has the three branches?in-
vestigations, intelligence, inspections.
Senator NUNN. How many people are in the Intelligence Branch?
Mr. ASSELIN. They have a chief, a deputy chief, two full-time ana-
lysts and one detailee, so that's five.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
85
Senator NUNN. How many people are in the Intelligence Branch?
Mr. ASSELIN. That's five.
Senator Nu/cc. Inspection Branch?
Mr. ASSELIN. They have a chief and a deputy chief here in Wash-
ington. They have five or six inspectors' five at JFK in New York.
Senator NUNN. How many is that all together, eight or nine?
Mr. ASSELIN. Eight or nine professionals.
Senator NUNN. How about the Investigations Branch?
Mr. ASSELIN. Approximately eight. There is also a three-man in-
vestigations office in New York.
Senator NUNN. Which one of those branches is responsible for goods
that are going out of the country at the point of departure, like the
terminals, the airlines?
Mr. ASSELIN. Inspections presumably, but they are only located
at one airport.
Senator Ntrivx. Are they working with Customs, is Customs sup-
posed to feed information to them?
Mr. ASSELIN. From time to time,
they have had a working agree-
ment with Customs. One year they had two Customs people assigned
to them. I think that contract has terminated. I think now they are
back on their own again. They are supposed?
Senator NUNN. That is patently absured to believe eight or nine
people can
Mr. ASSELIN. It is. It is also absurd to locate them all at one airport.
Senator NUNN. What possible good can you do to visit an airport
once a year?
Mr. ASSELIN. That is a very good question. I don't know what they
expect to achieve with these random visits.
Senator NUNN. Is it a public relations visit, what is it?
Mr. ASSELIN. We weren't able to establish that, sir, what it is they
do when they go to these places.
Senator NUNN. They do not tell you what they do? When you ask
the question, what is it you do when you go to the Atlanta Airport
or the Miami Airport once a year, what is it you do there?
Mr. ASSELIN. They are supposed to go through shippers' export
declarations. They are supposed to carry out?
Senator NUNN. Those that have already gone or those that are
going?
Mr. ASSELIN. Those that are going at that moment.
Senator Nurrx. That day?
Mr. ASSELIN. Right.
Senator NUNN. It's a random sample, then?
Mr. ASSELIN. Yes, they claim they saw, and it's apparently a viable
statistic 230,000 in fiscal year 1981, which sounds like a lot, but it
isn't when you consider there are 9 million SED's filed a year, which
means they are missing 8.7 million they do not see.
They see 230,000 and they do not see 8.7 million.
Senator NUNN. That is the written paper, the shipper's export
declaration, right?
Mr. ASSELIN. Yes, it's one sheet. It is possible for 5 to 7 men to go
through 230,000 of those a year, I guess. They say it's possible and
other people have said it's possible.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
86
Senator NUNN. Do they have a computer operation that that is run
through, that triggers----
Mr. ASSELIN. hey thumb through them. They go to the site and
they thumb through them.
Where we wondered about the validity of that figure is in this
regard: They also claimed that in fiscal 1981, they found 10,000 dis-
crepancies in those 230,000 SED's. Of the 10,000 or so discrepancies,
they actually opened cargo on about 10,000 discrepancies. To do that,
they have to first of all call back to Washington to establish whether
or not a validated export license is needed?in other words, they have
to do some inquiry to check on why there is a discrepancy. Then you
begin to wonder how they did 230,000 because it comes down to about?
you start dividing 5, or 7 persons into 230,000, you get an awful la
of individual shipper's export declarations they went through and at
the same time opening up 10,000 pieces of cargo. So they are a very
busy group of people.
It is also interesting to note two or three of them are working 32-
hour weeks. They are not full-time employees. I don't doubt their
statistics. It just seems to me they work terribly hard, those inspectors.
They are grades 5, 7, and 9. Another statistic that may be useful is that
50 percent of the cargo in this category goes out of JFK, which means
50 percent of the Nation's exports in this area are not being seen to
the extent that 50 percent at JFK are being seen.
Senator Nu/sr'," Go ahead.
Mr. ASSELIN. In law enforcement, the term "preventive enforce-
ment" suggests something quite different than an eight-member in-
vestigations branch that does most of its work from the office. Pre-
ventive enforcement means sending agents into the field, staying in
close and frequent contact with the many segments of the affected
community. Preventive enforcement is aggressive policework.
Equally important, preventive enforcement means having an imagi-
native and resourceful intelligence capability as well. The Compliance
Division has none of these.
The official pronouncements of the Commerce Department reports
to Congress and congressional testimony are sharply different from
the views expressed by experienced law enforcement personnel who are
familiar with the operations of the Compliance Division.
One special agent currently employed in the Compliance Division
had served for more than 20 years as an Army criminal investigator
and has well established credentials as an agent. He said the Com-
pliance Division is totally ineffective in preventing dual-use tech-
nology from being shipped to the Soviet Union. He said the Kremlin's
spy organization, the KGB, could not have organized the Compliance
Division in a way more beneficial to Soviet interests. This agent's view
was not contradicted by persons in the law enforcement and national
security field. Unfortunately, it was virtually impossible to persuade
these persons to speak for attribution.
Senator NUNN. Why is it you have a department that seemingly does
not have the personnel, has been given a vary large mandate, an ad-
ministration that is very concerned about this problem and yet they
do not seem to be willing to admit they have a problem ?
Mr. ASSELIN. They won't admit it and it's the worst kept secret in
the executive branch.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
87
Everybody knows the inadequacies of the Compliance Division, yet
no one will come forward and tell the Congress and speak for attribu-
tion in this regard.
As I note later on. we asked the preeminent law enforcement orga-
nization in the United States, the FBI, to please help us evaluate this
organization. The FBI refused. As recently as last night we asked the
Justice Department to please assist us in evaluating this organization.
The Justice Department refused. They even insisted on not even being
asked the question in open session. I 'don't know why, to answer your
question.
The result of this reluctance to criticize constructively the Com-
pliance Division in public session leads to the current situation in
which the only evaluation the Congress hears is from the Commerce
Department, which houses the Division and which is less likely to make
a candid and forthright evaluation of the shortcomings of one of its
own components. For that reason it seemed important the minority
staff that Congress be informed of the widespread dissatisfaction that
exists in the executive branch concerning the Compliance Division
and the principal reasons for that dissatisfaction.
The Department of Commerce has as its major focus the promotion
of domestic and international trade. It is the finding of the minority
staff, based on interviews with officials of the Department and other
agencies, that Commerce is not comfortable with the task of limiting
the sale of anything, whether it is dual-use technology or some other
commodity.
The Commerce Department has devoted insufficient resources to the
Compliance Division. In 1961, for example, the intelligence branch of
the Division had six or seven professional analysts. Today-15 years
later?the intelligence branch has two analysts and one detailee from
another agency.
The Department of Commerce, therefore, has reduced its commit-
ment of resources in the intelligence field at the very time when the
problem of technology diversions has become more pressing for the
country.
Senator NuisTN. The Reagan administration and high levels of gov-
ernment are complaining about this problem and saying they are going
to really begin to restrict it. Doesn't it seem to be a paradox that the
agencies responsible for carrying it out are not able to tell the top peo-
ple in the Government, including the congressional committees that
they have a major problem when the President, their executive branch
leader, is apparently very concerned about this problem, very inter-
ested in trying to do something about it
Mr. ASSELIN. Yes, I agree with that and, as I will note later on in
the testimony, this has real consequences when a President thinks he
has the capability, as we will see on the grain embargo section of this
presentation.
The highest leaders of our Nation are led to believe we have an
export control capability when, in fact, we don't ard they make policy
based on a mistaken premise we have the capability, yet we don't
have the capability. I will get to that in a moment.
The minority staff is not the only entity that has questioned the
depth of the Commerce Department's commitment to regulating tech-
nology transfers. In introducing legislation to create an Office of
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
add.
Strategic Trade, Senator Garn said the Commerce Department can be
criticized for its work as "lead" agency in combating diversions. Sena-
tor Garn said the Commerce Department has shown itself to be pre-
occupied with the goal of more and more trade with the Soviets to such
an extent that the Department has become blind to national security
considerations stemming from the sale of certain kinds of high tech-
nology data and machinery.
The result of the Commerce Department's inadequacies in control-
ling diversions has been a historic erosion in American technological
preeminence, Senator Garn said.
The Commerce Department has limited tradition and limited ex-
pertise in traditional law enforcement. Yet the Compliance Division
is perceived and described by the Department as being a law enforce-
ment organization. Its personnel include special agents, whose titles
alone suggest law enforcement assignments. The special agents are
classified as series 1811 Federal criminal investigators.
The Compliance Division asserts its "lead" role in enforcing export
controls for the entire Government. The Division undertakes exercises
requiring specialized law enforcement skills and capabilities such as
the conduct of surveillances of suspected export controls violators.
But, because of its lack of tradition and expertise in law enforce-
ment, the Commerce Department does not require that its special
agents meet established standards of formal training. "On-the-job"
training is common at the Commerce Department; yet there is no re-
quirement that newcomers to the investigative ranks undergo formal
training in the enforcement of export controls or in the most funda-
metal aspects of police work.
The Agent's Manual is a basic instructional document in most law
enforcement organizations. Each agent is given a copy of the Agent's
Manual and is expected to study it and be fully and currently
informed about it.
The Agent's Manual describes proper procedures for the agent in
every aspect of his professional life?on points ranging from proper
dress to the opening and closing of cases to the writing of reports
of investigation.
We asked for a copy of the Compliance Division's Agent's Manual.
Its status is not clear. We asked the Acting Director of the Division if
we could see it. He gave us a bulky, loose-leaf binder arid explained
that it was the only such document in the building. We did not think
that it was suitable for distribution to and retention by his Special
Agents for frequent referral and updating; he concurred.
Another executive of the Division, asked if there was an Agent's
Manual, described it as "a semblance of an Agent's Manual."
The absence of a comprehensive, compact and readily available
Agent's Manual is reflective of a procedurally uncertain law enforce-
ment environment in the Compliance Division.
Executives in the Compliance Division have had insufficient law
enforcement background and training to be supervising investigators
on how to proceed in their inquiries.
The Director of the Compliance Division from 1963 to 1979 was a
former Customs Appraiser in Chicago with limited experience and
limited formal training in law enforcement before he got the job.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
89
He told the minority staff that he did not believe experience or formal
training were required for law enforcement work.
He was replaced in the Office of Director of the Compliance Divi-
sion by a person who also had limited traditional law enforcement
experience.
At this time, the position of Director of the Division is formally
vacant. It is being filled on a part-time basis by William Skidmore,
whose permanent position is Director of Anti-Boycott Compliance.
Mr. Skidmore has limited traditional law enforcement experience.
The former Director of the Compliance Division told the minority
staff that on several occasions from 1979 through the first quarter of
1982, she recommended to senior officers of the Commerce Department
that steps be taken to increase the effectiveness and numerical strength
of the Division. The Department rejected many of her recommenda-
tions, she said.
Compliance Division inspectors have limited resources at airports
and seaports to detect the export of controlled high technology com-
modities. The chief of the facilitation branch told the subcommittee
staff that the number of inspectors?five or six?was insufficient.
Compliance Division inspectors are not authorized to search and
seize suspected cargo. They must rely on U.S. Customs service person-
nel. Similarly, unlike Customs agents and inspectors who have kindred
and formalized working relationships with Customs employees
throughout many parts of the world, Commerce inspectors have no
counterparts on any foreign soil.
Compliance Division Special Agents working in the investigations
branch are not required to have any formal training in investigative
techniques, law enforcement or the Export Administration Act.
The approximately eight professional members?the Special
Agents?of the investigations branch have varying degrees of law en-
forcement background. Some have extensive law enforcement back-
ground. That would number about three of them. Others have limited
background in law enforcement. One Special Agent's previous job ex-
perience was secretarial.
Most of the investigative work of the investigations branch is done
in the office. Agents are expected to conduct inquiry on the telephone
and by mail. The most frequent response to allegations of violations of
the Export Administration Act is to send the alleged violator a letter
of warning.
The subcommittee staff tried to find out the size of the branch's back-
log. That was not possible. The chief of the investigations branch
said he was not sure how large it was. The previous Director of the
Division said the backlog was possibly as large as 300 or 400. The new
acting director said he thought it was about 200 cases.
The staff inquiry concluded that a backlog of 200, 300 or 400 cases
with an investigative staff of 8 agents seemed to be inordinately
large. So many cases hanging over a relatively small investigative staff
could create pressure on Special Agents to close cases without sufficient
inouiry.
The intelligence branch also has a significant backlog of unfinished
business. The chief of the intelligence branch said he had a backlog of
about 600 cases. He said that by the end of the calendar year, he could
have a backlog of 1,000 cases.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
89
He told the minority staff that he did not believe experience or formal
training were required for law enforcement work.
He was replaced in the Office of Director of the Compliance Divi-
sion by a person who also had limited traditional law enforcement
experience.
At this time, the position of Director of the Division is formally
vacant. It is being filled on a part-time basis by William Skidmore,
whose permanent position is Director of Anti-Boycott Compliance.
Mr. Skidmore has limited traditional law enforcement experience.
The former Director of the Compliance Division told the minority
staff that on several occasions from 1979 through the first quarter of
1982, she recommended to senior officers of the Commerce Department
that steps be taken to increase the effectiveness and numerical strength
of the Division. The Department rejected many of her recommenda-
tions, she said.
Compliance Division inspectors have limited resources at airports
and seaports to detect the export of controlled high technology com-
modities. The chief of the facilitation branch told the subcommittee
staff that the number of inspectors?five or six?was insufficient.
Compliance Division inspectors are not authorized to search and
seize suspected cargo. They must rely on U.S. Customs service person-
nel. Similarly, unlike Customs agents and inspectors who have kindred
and formalized working relationships with Customs employees
throughout many parts of the world, Commerce inspectors have no
counterparts on any foreign soil.
Compliance Division Special Agents working in the investigations
branch are not required to have any formal training in investigative
techniques, law enforcement or the Export Administration Act.
The approximately eight professional members?the Special
Agents?of the investigations branch have varying degrees of law en-
forcement background. Some have extensive law enforcement back-
ground. That would number about three of them. Others have limited
background in law enforcement. One Special Agent's previous job ex-
perience was secretarial.
Most of the investigative work of the investigations branch is done
in the office. Agents are expected to conduct inquiry on the telephone
and by mail. The most frequent response to allegations of violations of
the Export Administration Act is to send the alleged violator a letter
of warning.
The subcommittee staff tried to find out the size of the branch's back-
log. That was not possible. The chief of the investigations branch
said he was not sure how large it was. The previous Director of the
Division said the backlog was possibly as large as 300 or 400. The new
acting director said he thought it was about 200 cases.
The staff inquiry concluded that a backlog of 200, 300 or 400 cases
with an investigative staff of 8 agents seemed to be inordinately
large. So many cases hanging over a relatively small investigative staff
could create pressure on Special Agents to close cases without sufficient
inouiry.
The intelligence branch also has a significant backlog of unfinished
business. The chief of the intelligence branch said he had a backlog of
about 600 cases. He said that by the end of the calendar year, he could
have a backlog of 1,000 cases.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
91
The agent said that for the most part, the majority of his investiga-
tive work was from the office, as he relied on long distance telephone
calls, cables to American Embassies overseas and assistance from the
USDA and Customs.
Senator NUNN. You mean to testify that based on your investigation,
the grain embargo that resulted after the Soviets invaded Afghanistan
had one person in the Commerce Department checking on violations?
Mr. ASSELIN. Yes, sir.
Senator 1I7NN. Was any other agency responsible for checking on
violations?
Mr. ASSELIN. I spoke with the Agriculture Department official who
was chairman of the high level interagency group which monitored
the agricultural exports during the grain embargo. He said the group?
was formed early in 1980 when it became apparent that the Commerce
Department was committing insufficient resources to assembling infor-
mation about compliance and investigating allegations of violations.
He said it was his understanding that "one or two" persons were
representing the Commerce Department in this task and that he saw
that as a "terribly limited" dedication of personnel. He said informa-
tion assembled by the high level interagency group reflected a much
broader base than the Commerce Department could supply. He said,
however, that "the hard core business of proving violations"?that is,
the actual investigation?was the responsibility of the Commerce
Department.
He said members of the interagency group he chaired talked openly
of the unsatisfactory commitment of resources by the Commerce De-
partment. He said he recalled that the Commerce Department sent
representatives to the interagency group meetings whose security clear-
ances were not high enough to enable them to be there. He said in
certain instances the Commerce Department representative had to
wait outside the room until more sensitive issues were discussed.
Senator NUNN. So you have a major decision by the President of the
United States on a major foreign policy issue involving the United
States and the Soviet Union, involving all our allies, involving the
credibility of our foreign policy and economic policy around the
world and you have the Commerce Department assigning one indi-
vidual for enforcement purposes.
Mr. ASSELIN. That's right.
Senator NUNN. And that individual didn't have security clearance
high enough to even get in the room when they were talking about
high level classified information.
Mr. ASSELIN. He had a secret clearance.
Senator NUNN. He was not cleared for top secret information?
Mr. AssEu/sr. No. In fact, the first person Compliance sent over was
a Deputy Director of the Division. They refused to even let him in
the room until he got a higher clearance.
Senator NUNN. Who is they, the other people?
Mr. ASSELIN. The people at this high level group. The minority staff
inquiry found that the inadequate response of the Compliance Divi-
sion in enforcing the grain embargo demonstrates the serious govern-
ment operations problem in which the most senior officers of the
executive branch, from the President on down shape policy and pro-
mulgate directives on the mistaken premise that the affected agencies
95-q?eia - -
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
92
have the necessary means to turn the policy and directives into reality.
Senator NUNN. That really means that the grain embargo in effect
was a voluntary program and it was enforced virtually on the honor
system, was it not?
Mr. ASSELIN. To the extent it was enforced. I don't mean to suggest
there were not USDA and others monitoring, but they found no viola-
tions, no one was prosecuted, you had 100 percent compliance in a
sense with the grain embargo.
Senator NUNN. If they found a violation, if anybody found it, it
would have been up to the Commerce Department to investigate it and
they had one person to investigate the whole Nation.
Mr. ASSELIN. Yes; that is the point. And the Commerce Depart-
ment's commitment was so inadequate right from the very start that
that led USDA and others to take a more aggressive role because they
were unsatisfied with what Commerce was doing.
President Carter's grain embargo speech might have been received in
a different light had he also announced the Commerce Department
would assign one man--a GS-12 in the Compliance Division?to in-
vestigate alleged violations.
Senator NuNN. Did you find any evidence that the Agriculture De-
partment or the Commerce Department or anyone had informed Presi-
dent Carter that this was the degree of priority Commerce Department
was giving the grain embargo?
Mr. ASSELIN. I don't think Presidents are ever told things like that.
Senator NUNN. It's like President Reagan now, when he starts talk-
ing about the export of technical equipment that aids the Soviet Union,
nobody tells him that they have eight inspectors covering all the air-
ports and ports of the country in enforcing the Export Adminis-
tration Act; do they?
Mr. ASSELIN. This is precisely the point. The very existence of a
Compliance Division sounds as if somebody is there to do the work.
Senator NUNN. Would you say the Commerce Department is fair to
both Republican and Democratic Presidents, they treat them pretty
much alike?
Mr. ASSELIN. Yes; of course, this goes back about 30 years, that the
Compliance Division has been in operation. We have had Presidents of
both parties in that period.
Senator NcrNN. Of course, you had a great emphasis on it in the last
4 or 5 years. You had two Presidents who expected their major for&gn
policy decisions would be eminent; have you not?
Mr. ASSELIN. Yes; in fact, the grain embargo was a debated issue in
the last Presidential campaign. GAO found that the Soviet Union was
largely inconvenienced by the grain embargo. That would be about
the extent of it.
Senator NUNN. So really now today we do not have anyone in the
Government, any agents in the Government, who can tell us whether
the grain embargo was complied with by exporters or not.
Mr. ASSELIN. I think we had 100 percent compliance according to
the statistics.
Senator NUNN. But no one was exporting any grain they weren't
supposed to.
Mr. ASSELIN. According to the statistics, yes. The agent had 17 cases
he looked into. I think there may have been one or two letters of
warning.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
93
Perhaps the Commerce Department can fill us in on the extent of
the violations, but we found no criminal violations of the embargo.
A lack of close cooperation existed between the Compliance Division
and the U.S. Customs Service. The result was that effective enforce-
ment was reduced.
In Customs and in other offices of the executive branch?both in law
enforcement and in national security affairs?there is an unwillingness
to say anything critical in public about the effectiveness of the Com-
pliance Division. The reluctance to criticize the Compliance Division
exists amid a widespread sense throughout affected areas of Govern-
ment that the investigative capabilities of the Compliance Division
are inadequate.
The failure not to criticize the Commerce Department ignores the
fact that because of the inadequacies of the Compliance Division sig-
nificant amounts of dual-use technology that contribute to Soviet mili-
tary strength are being shipped to the Soviet bloc.
The minority staff should not be the only entity to make an evalua-
tion of the effectiveness of the Compliance Division. It was our hope
that other law enforcement organizations would come forward and
critique the Division in a constructive and professional manner. In this
pursuit, we were met with resistance. Working agents and senior offi-
cials alike would be candid, while insisting on their anonymity.
As I said, we asked the FBI to help us, they are the preeminent
law enforcement organization in the United States, their views would
be most helpful. The Bureau refused. they even insisted on the ques-
tion not being asked in open session. They said for the Justice De-
partment to answer it. So we asked the Justice Department, "Will you
evaluate these people for us?" "No; it's not for us." That is as recently
as last night, Senator. So there you are, we are stuck with it. We
welcome the opportunity. But the professionals in the field should be
asked to make a contribution, too.
Senator NuNN. So the attitude generally is what the President of
the United States doesn't know about the inability of his Commerce
Department to carry out his own policy doesn't hurt him, right?
What the Congress doesn't know doesn't hurt them.
Mr. ASSELIN. That is a fair surmise, yes, sir,
The subcommittee staff did obtain a:copy of a memorandum writ-
ten by a senior Customs Service officials who was critical of the Com-
pliance Division's procedures. The memorandum. written by William
Green, Deputy Assistant Commissioner in the Office of Border Opera-
tions, was critical of the Commerce Department on several points, in-
cluding alleged lack of trained personnel and an alle,ted counterpro-
ductive determination to involve itself in customs work overseas.
The many shortcomings of the Compliance Division as a law en-
forcement organization are apparent in the investigation of a syndi-
cate of businesses, known as the CTC group. owned, controlled, or
utilized by a West German named Werner J. Bruchhansen. Mr. Chair-
man, I have prepared a summary of the CTC ease which was drawn
from information provided the minority staff by Commerce Depart-
ment agents, Customs Service agents, the Department of Justice, and
other sources.
It is rather lengthy. I request that it be printed in the hearing
record as if read and that I be allowed to give a brief description of
what occurred in the CTC case.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
94
Senator NUNN. Without objection, it will be printed as if read.1
Mr. ASSELIN. From 1977 to 1980, the CTC network of companies
in the United States and Western Europe bought dual-use technology
under false pretenses in the United States and then exported it to the
Soviet Union and Warsaw Pact. As has been shown in yesterday's
testimony by Dr. Lara Baker, the CTC syndicate of companies was not
buying up high technology equipment at random. They had been given
a precise shopping list by the Soviets. As Dr. Baker pointed out, the
equipment the CTC syndicate bought was for the specific purpose of
building and equipping a semiconductor plant in the Soviet Union.
Testimony will show that as early as 1975 such a semiconductor plant
had been built in the U.S.S.R. and the Soviets were in the process of
equipping it with American-made machinery.
The existence of the CTC network of companies was first brought to
the attention of the authorities in 1977 and 1978 when two anonymous
letters were received at the American Consulate in Dusseldorf. The
State Department translated the letters into English and referred
them to the Compliance Division in Commerce. The letters were re-
ceived by the Compliance Division in 1978 and insufficient effort was
made to investigate the allegations.
After receipt of the letters, two U.S. producers of dual-use tech-
nology reported to the Commerce Department that they were suspici-
ous of the CTC companies. Insufficient inquiry was conducted in re-
sponse to the first letter.
A Commerce Department special agent did interview CTC's prin-
cipal executive in Los Angeles, a naturalized Russian-born American
citizen named Anatoli Maluta, also known as Tony Mainta and Tony
Metz. Maluta told the special agent from Compliance that he did not
know anything about export controls, or the need to have validated
export licenses to ship certain controlled commodities. But, Maluta
said, because of the agent's interest, he was canceling the suspicious
order.
No further investigation of the CTC network was conducted until
a second letter arrived at the Compliance Division, this time from
another high-technology producer who also voiced suspicions about
the CTC companies.
'Early in 1980, a second Compliance Division agent, Robert Rice,
was assigned to the case and conducted the kind of comprehensive
preliminary inquiry that was called for. Rice, the most senior agent in
the Division, came upon considerable information indicating wide-
spread violations of export controls.
He presented the evidence to the Office of the U.S. attorney in Los
Angeles in March 1980. A major inquiry was begun by the U.S. attor-
ney's office, under the direction of Assistant U.S. Attorney Theodore
W. Wu and the U.S. Customs Service. Customs ultimately assigned
about 15 agents to the case in California, Texas, New 'York, and
Western Europe.
Compliance Division Special Agent Rice was the only Commerce
Department representative assigned to the case on a regular basis.
Indictments were brought against Bruchhausen and Dietmar
Ulrichshofer, both of whom remained in Europe and are fugitives
I See p. 390 for the summary prepared by Fred Asselin on the CTC case.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
95
from American justice, and two Los Angeles accomplices?Maluta
and Sabina Dorn Tittel. Maluta and Tittel both were convicted.
The CTC case demonstrated technology diversions of about $10
million and is considered by law enforcement and national security
specialists to be one of the most important export control cases ever
brought to trial.
The inquiry showed that:
First, the Compliance Division did not move quickly to establish
the value of the anonymous letters.
Second, the Compliance Division did not connect the anonymous
letters to the allegations that were reported by two U.S.
manufacturers.
Third, when Compliance Division Agent Rice turned over the
results of his inquiry to Assistant U.S. Attorney Wu in Los Angeles,
it was apparent to Wu that considerable expenditures of resources
would be needed. Trained investigators would be required to conduct
interviews, evaluate shipping documents, surveil suspected violators,
and carry out other aspects of a traditional law enforcement full-scale,
full field investigation.
Commerce's contribution to that effort was Agent Rice, a competent
investigator in whom Wu had confidence. But he needed more than
one agent. He enlisted the assistance of the Customs Service. Later
assistance was provided by trained criminal investigators from the
IRS.
Senator Numv. So the individual Commerce had working on this
was according to all the opinions, a competent, good investigator?
ASSELTN. Yes; according to all reports he is one of their best,
if not the best.
Senator Nuisrx. What is his name?
Mr. ASSELIN. Robert Rice.
Fourth, at an early point in the inquiry it was necessary to seize
shipments. Commerce had neither the authority nor the manpower
to seize shinments, Customs did it.
Fifth, at another point in the inquiry it was necessary to search the
premises of CTC companies and the quarters of certain of its em-
ployees in the United States and Europe. The Compliance Division
had insufficient resources to implement simultaneous search warrants.
The Compliance Division had no law enforcement capabilities in
Western Europe to work with German customs in coordinating the
searches abroad. Customs executed the warrants in the United States
and, through its agreements with West German customs, arranged for
the execution of the warrants in Germany.
Sixth, to substitute sand for one of OTC's shipments to Moscow, a
sizable expenditure of funds was needed. The Compliance Division
balked at the shipment substitution strategy and refused to pay the
cost of recrating the sand and airfreight. Customs officials approved of
the substitution and agreed to pay the cost.
Seventh, extensive overseas coordination, in addition to the search
warrants was called for with West German Customs and other
foreign Officers. Commerce Department's Compliance Division had no
overseas law enforcement contacts. U.S. Customs' contacts were used.
Eighth, extensive surveillance was necessary. Armed Customs
agents and armed Internal Revenue Service criminal investigators
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
96
and an unarmed Compliance Division Special Agent Rice provided
it. Two suspects under surveillance had firearms in the back seat of
their car. The firearms were not used. But it was an important law
enforcement advantage for the agents on surveillance to be armed
as well.
Ninth, experienced supervisors with law enforcement background
and training were needed to direct the inquiry in the field. The Office
of the U.S. Attorney for the Central District of California, working
with supervisorial personnel in the Customs Service, provided the
needed direction. Contact with supervisorial personnel in the Com-
pliance Division' who remained in Washington, was made on the
telephone and the persons who worked on the case in California did
not consider such communication to be satisfactory.
Tenth, When the appropriate time came to apprehend Anatoli
Maluta and Sabina Dorn Tittle, IRS agents made the arrests. Customs
agents, like the trained IRS criminal investigators, are authorized to
make arrests. Even had the Compliance Division dispatched sufficient
numbers of agents to assist in the inquiry, they could not have
arrested the suspects.
The CTC case does not qualify as a Commerce Department investi-
gation. Customs Service agents did most of the work; and executive
supervision was provided by Assistant U.S. Attorney Theodore Wu
and Kenneth Ingleby, the Chief of the Customs Service Investiga-
tions Office in San Pedro.
In participating in the inquiry on a full-time basis and in conduct-
ing himself in a competent, professional manner, Compliance Division
Special Agent Robert Rice was handicapped in not being able to do
the things Customs agents can do routinely?search and seize suspi-
cious freight, make arrests, and carry a weapon.
Capable and resourceful as he was, Rice cannot be considered to
have been essential to the CTC inquiry. It could have succeeded with-
out him. It could never have succeeded without the Customs Service.
Customs contributed necessary manpower and fundamental law
enforcement tools. Commerce's contribution was Robert Rice.
After the CTC case was brought to Wu, the Compliance Division
played no essential role in the inquiry. That recognition leads to the
minority staff's final finding, which is that the Commerce Department
should not have the enforcement function under the Export Adminis-
tration Act.
It is the finding of the minority staff that the national security im-
plications of enforcement of the Export Administraticn Act are too
important to be entrusted any longer to the Commerce Department as
presently organized.
For three decades the enforcement function has resided in the Com-
merce Department?through administrations controlled by Democrats
and Republicans.
Three decades is sufficient time to allow reasonably capable officials
to perfect the most challenging task. But serious procedural and oper-
ational problems still exist in the Compliance Division. We find the
conclusion inescapable, therefore, that effective enforcement of the
Export Administration Act is beyond the institutional capabilities of
the Commerce Department. Moreover, from a Government operations
and executive organizational standpoint, the mere existence of the
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
97
Compliance Division is an impediment to efficient and effective en-
forcement cf the act.
[At this point Senator Cohen entered the hearing room.]
Mr. ASSELIN. Understaffed, flagrantly short of resources, the Divi-
sion cannot do the job effectively; but, by its presence, prevents other
components of Government from taking on the task.
It is our view that two solutions?one short term, one long range?
are available.
Immediate relief could be found if the Compliance Division were
abolished and all its functions placed in Customs. This action would
insure that competent, professional agents, trained in formal, tradi-
tional law enforcement procedures, would be assigned to investigate
alleged violations of the EAA ; that they would work under the super-
vision of executives who also would have formal, traditional law en-
forcement backgrounds; and, perhaps most important of all, the entire
function would exist in a Cabinet-level Department with lcng-time
experience in and commitment to traditional law enforcement. It is the
staff's recommendation that subcommittee members consider that con-
cept as an immediate solution as these hearings proceed.
In addition, in terms of longer range considerations, it is our recom-
mendation that subcommittee members consider the proposal put
forward by Senator Garn to create an independent Office of Strategic
Trade that, in summary, would absorb the Commerce Department's
Office of Export Administration and its components.
Mr. Chairman, that concludes my portion of the staff presentation.
I have a series of 27 documents I request be received as exhibits. They
start with exhibit 2. I request exhibit 10 be printed in the record.
Senator NuNN. Without objection.
[The documents referred to were marked "Exhibits 2 through 28,"
for reference, and may be found in the files of the subcommittee. Ex-
hibit 10, as requested, follows:]
EXHIBIT 10
DEPARTMENT OF THE TREASURY,
U.S. CUSTOMS SERVICE,
October 30, 1980.
MEMORANDUM
To: Robert L. Keuch. Associate Deputy Attorney General, Chairman, Inter'
Agency Working Group on Export Control.
From: Deputy Assistant Commissioner, Office of Border Operations.
Subject: Response to Request for Assessment of the Inter-Agency Working Group
on Export Control (WGCE) Subcommittees' Reports.
In your memorandum dated October 10, 1980. you requested the various WGCE
members to comment on the four subcommittee reports which were attached.
Given below are my comments, together with some general remarks on particular
export control matters which you may wish to consider.
Concerning the subcommittee reports. I have no comments concerning the
Intelligence Coordination and Prosecutive subcommittee's reports; except to
say that I believe they fairly portray the present situation. I am in agreement
with the conclusion and recommendations. The Administrative and Regulatory
Procedures subcommittee report also. I believe, fairly portrays the current situ-
ation and I support their recommendations. I would, however, like to add two
further recommendations. I recommend that a review of the present Arms
Export Control Act of 1976 be made with the view in mind of recommending an
increase in the penalty provisions and secondly, an addition to the Act empow-
ering Customs officers to make warrantless arrests for export violations.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
fig
The present statute provides for a maximum penalty of $100,000 and/or 2 years'
imprisonment. Since most of the more sophisticated investigations involve viola-
tors who are major corporations, agents of unfriendly foreign powers, inter-
national munitions brokers, or members of revolutionary/terrorist groups, the
maximum penalty is far too lenient to match the possible severity of the crime.
For example, a member of a terrorist group who exports explosives to his com-
patriots is only subject to 2 years' imprisonment, even though the explosive could
cause loss of life and bring about dire political consequences.
Addressing the question of warrantless arrests for export violations, at the
present time Customs officers do not have Federal warrantless arrest authority
for export violations but must depend on the various state citizens arrest statutes.
Fortunately, there is judicial precedence for these warrantless arrests (citizen
arrests) for export violations. However, if the authority existed by statute, it
would eliminate suppression hearings and result in a savings of time in connec-
tion with prosecutions involving warrantless arrests by Customs agents.
It should be noted that both of the above points were discussed in the Ad Hoc
(0'Mally) Committee final report and it was recommended that appropriate
lobbying for legislative action should take place.
Concerning the final report prepared by the Law Enforcement Coordination
Subcommittee, I again find that generally the report fairly portrays the existing
situation. There are, however, several observations I would like to make concern-
ing the current enforcement program of the Export Administration Act of 1979.
Throughout the report reference is made to the lack of present-day coordina-
tion and the need to improve same. What is particularly significant is Com-
merce's (CEA/CD) continued action to impede cooperation in investigations
even while it states that it wishes to fully participate in all cooperative ventures.
Commerce continues to take unilateral and uncoordinated action concerning
either joint or Customs initiated investigations by requesting foreign inquiries
through various U.S. embassies and consulates without consulting with either
Customs Attaches or Headquarters. Such action is causing serious problems.
These problems are not limited to hampering instant investigations, but also the
compromising of U.S. Customs and foreign government sources, damaging the
previously close and long relationships between U.S. Customs and their foreign
counterparts, and directly impacting on national security.
These unilateral actions taken by Commerce are not limited to investigations
initiated solely by Commerce and being worked only by them; but more impor-
tantly, include investigations initiated by Customs and now being either jointly
worked by both agencies, or by Customs alone. What is particularly significant
is that these unilateral actions have taken place while the Law Enforcement
Coordination Subcommittee deliberated and even after the final report was pre-
pared. Attached as an appendix are representative examples of Commerce's
action.
While Customs acknowledges that, under the Export Administration Act of
1979, OEN/CD is the agency primarily responsible for administration and en-
forcement of the Act, 0EA/CD is not at this time adequately staffed to enforce
the Act. CEA/CD has stated that it is planning to establish foreign offices, to-
gether with adequate staffs, and assume those duties related to export control
enforcement which the EDO's and Customs Attaches now perform. Once again,
OEA/CD is not adequately staffed to assume these duties and does not have ex-
perience concerning the conduct of investigations abroad. OBA/CD is also at a
distinct disadvantage in that they have no foreign counterparts with whom they
can relate and/or work. They will not have access to Customs mutual assistance
agreements on which they can rely to gain access to investigative data and/or
other desirable information. nor is it anticipated they will be able to establish
such agreements. The U.S. Customs Service is in a much better position to con-
duct export control investigations and inquiries abroad because we do have for-
eign counterparts with whom we work and relate: we do have formal and in-
formal agreements with our foreign counterparts; we have established foreign
offices with a staff of experienced investigators and have conducted export con-
trol investigations and inquiries abroad since at least before 1900.
Finally. Customs has maintained a neutral position over the past 2 years on
the question of who should assume primacy in the export control enforcement
field. It was Customs position that should they state they could do the job better
than another agency, the deliberations between the various agencies may de-
generate. However, neither Customs nor Treasury ever stated they would be
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
99
unwilling to assume additional duties in the export control enforcement area.
In fact, Deputy Secretary of Treasury Carswell, in a memorandum to Mr.
Brzezinski on February 8, 1980, in response to the Ad Hoc NSC Technology
Transfer Group, states ". . . Ideally, a single agency should have all the respon-
sibility and resources for administering the Export Administration Act, includ-
ing strong enforcement of its criminal provisions. Under current law, this would
be the Commerce Department. If, however, the United States desires to intensify
and improve criminal enforcement of this statute, then it must look to an agency
with worldwide posts and substantial criminal investigative resources already
established. Customs has these capabilities. It has offices with investigators in
eight major foreign cities; it has experience in performing this function for the
State Department under the Arms Export Control Act; and it has a widely
dispersed group of agents in the United States For these reasons, transferring
the criminal enforcement functions under the Act to Customs is the most realistic
alternative if we want to enhance performance in this area, at least as it relates
to high technology exports. . . ."
Before any final recommendation is submitted to policy bodies, such as the
NSO, concerning who should do what in the field of export control enforcement,
I would like to offer several points for thought:
1. Is Commerce (OEA/CD) really equipped today or will they be in the
future if they receive their requested additional slots, to conduct sophisticated
investigations involving critical technology transfer? Are their investigators
trained and as experienced as Customs special agents? Perhaps more important,
how long will it take to train them to bring them up to the level that now exists
at Customs?
2. Does Commerce contemplate asking for legislative authority to give them
powers to arrest, to execute search warrants, to make seizures, and to conduct
Customs searches? As you are aware, they do not have such powers now and
must rely on Customs.
3. Does Commerce anticipate opening offices in most major cities, which Cus-
toms has presently established, so they can quickly respond to matters ccncerning
export control?
4. Would it not be wiser and would it not be more efficient for government
operation, to transfer the enforcement functions of the Export Control Act of
1979 solely to Customs, with the licensing and administrative provision remain-
ing with Commerce?
This is not a new concept to Customs as it already does the enforcement duties
for the Arms Export Control Act of 1976. State Department (Office of Munitions
Control) administers the Act.
The only answer is a single-agency concept for all export control enforce-
ment. While not faulting Commerce in its attempt to increase its enforcement
posture, it should be noted that Customs already has the necessary authority,
has a foreign presence that has been in place for at least 80 years, has over 60
domestic offices, has over 500 experienced criminal investigators, and has had
experience in export control matters since early in the history of our country.
Concerning additional resources, it has been stated that if Customs should
assume the entire export control enforcement program it would need approxi-
mately 25 additional slots. While this figure may change due to exigencies such
as workload, source development, and foreign liaison, it should be noted that any
new personnel gained because of the resource increase would not be initially
assigned sophisticated critical technology cases, but would be assigned to experi-
enced investigators. The new agents would take up the slack caused in lesser
areas of the Customs enforcement program.
WILLIAM GREEN.
Senator Nuisrisr. Does Senator Garn's bill, the Office of Strategic
Trade, set up a separate department for that or is it under an existing
department?
Mr. ASSELIN. As I understand it, sir, it would be comparable to
Office of Special Trade Representative. It would be independent. It
would not operate within an agency.
Senator NUNN. So what you are saying is, the Commerce Depart-
ment as the agency to carry out the enforcement of the Export Admin-
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
11111
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
100
istration Act has proved itself inadequate for the task over a long
period of time?
Mr. ASSELIN. Yes, sir. As will become apparent when we hear from
Commerce and others, they are now opening an office in Los Angeles
and an office in San Francisco, each of them to have six slots with
supervisors. So they are adding 12 or 13 personnel. That will help.
Tile same people who gave us the Compliance Di vision as presently
organized are the same people who are giving us the two offices in Los
Angeles and San Francisco. I think that is a cosmetic attempt to look
as if they are enlarging and expanding their capability when it is still
inadequate.
Senator NuNN. If Customs took this on, would they have to have a
whole new group of people or could the same people in Customs that
are working now with some organization also have this responsibility?
Mr. ASSELIN. According to the Green memorandum of 1980, that we
read into the record this morning, Customs would have to add 25
persons. They will have to add more than that. However, the capa-
bility is there. That is the point, the law enforcement capability. How-
ever, they have overseas people, they have trained investigators. 'rhe
cost will never be the same, will never equal the amount Commerce
SenatorNuNic. In other words, if Commerce were to do this job
right, they would have to add hundreds of people, they would have
to add administrative staff that knew about law enforcement, they
would have to have top people in the Commerce Department who were
trained for law enforcement which is not the case now. You are simply
saying the Customs agents and Customs Service can do it much more
effectively and sufficiently and utilize what they already have out
there now?
Mr. ASSELIN. Yes, sir, everywhere you have to put this enlarged
Commerce operation, Customs is already there. You would have to
put Commerce people overseas.
Senator NUNN. So Commerce would have to duplicate Customs
to?
Mr. ASSELIN. Almost in every instance. Where there is a Customs
man now, you would have to have Commerce. Why do you have two
agencies in the field even if they were doing a good job, when one
agency would suffice?
Senator NuNN. You are saying there are some good people in the
Commerce and Compliance Division that could be shifted over?
Mr. ASSELIN. Yes; that is certainly true and Rice is certainly one of
them. He would be a good contribution to customs.
Senator NuNN. Senator Cohen; we just had a complete staff state-
ment which is very explicit on the problems in the Commerce Depart-
ment in enforcing this act with a recommendation from the minority
staff the Compliance Division be abolished and put in the Customs
Service. Do you have any questions or observations?
Senator COHEN. What are the total number of inspectors we have
available now?
Mr. ASSELIN. In Commerce?
Senator COHEN, In Commerce.
Mr. ASSELIN. Five.
Senator COHEN. Five inspectors.
Senator NuNN. I think you ought to make a distinction now be-
cause there are three separate parts of the Compliance Division.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
101
Mr. ASSELIN. The Compliance Division has three entities in it. It has
an Inspections Branch which has five or six. It has an Investigations
Branch which has 8 to 11 persons and it has an Intelligence Branch
which seems to have 3 to 5. That is the extent of the professional en-
forcement capability of the Commerce Department.
Senator NUNN. Five or six of all their inspectors are in New York.
Mr. ASSELIN. At the JFK airport.
Senator Ntri.mr. The others they don't visit other ports?
Senator COHEN. How many exit points do we have in the United
States?
Mr. ASSELIN. I don't know, Senator. It is more than they could ever
handle with five.
Senator Cousiv. I understand. I am trying to draw it in its
dramatic?
Mr. ASSELIN. I don't know the answer to that.
Mr. FRY. The customs started a program called Exodus to enforce
violations of the Export Administration Act. It is my understanding
they have a minimum of 7 to 10 special agents at the 10 major ports
throughout the United States assigned to this type of operation. I am
not certain as to the number of inspectors but the inspectors are per-
manently located at these 10 major ports.
Senator COHEN. How many international airports, for example, do
we have?
Mr. ASSELIN. I don't know. I do know these figures: They say 50
percent of the traffic goes out of JFK, so it is not surprising they put
their principal focus at JFK. But they cover no other airport.
Senator NuNN. You have more international airports now than you
did. They are expanding. A lot of international flights go out of At-
lanta, out of Boston, they are out of Dulles, they are out of San Fran-
cisco, Los Angeles, and Chicago.
Senator Con-Eisr. Bangor.
Senator N-crmsr. Bangor is next on the list.
Mr. ASSELIN. There is a paragraph I deleted in shortening my
statement, if I may read it. The Acting Director of the Compliance
Division acknowledged to us there were problems in the operation of
the Division. He said the problems could be corrected but that such a
process takes time. Elaborating on this point, he said the Government
has slowly changed. He said the Compliance Division was organized
more than 30 years ago at the time when the challenge of export con-
trols is not as great as it is today. But he said as export controls became
more of an urgent problem to the United States in recent years, the
Compliance Division tended to remain about the same.
We asked the Acting Director if the Nation could afford to wait
while the Commerce Department and its Compliance Division adjusted
to the new challenges in export controls. He had no answer to that in-
quiry but he did say it was a valid question. So it is true, the problem
has risen and gotten much bigger but Commerce has not risen with the
problem.
Senator NtmTN. Senator Cohen, one other interesting thing I found
astounding when I first heard about it several months ago and I kept
asking the staff to check on it and check on it because I couldn't believe
it. Staff testified today that the Commerce Department, which was re-
sponsible for investigation of violations of President Carter's grain
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
102
embargo, had one person working on that and it turns out there was
100 percent compliance with the grain embargo according to statistics.
If we could get that one guy over there in the Internal Revenue
Service, we could balance the budget.
Senator ConEN. Well, he may have had the same inflated reporting
system we have as far as projecting what the inflation is, I believe. Let
me just ask one other question since I don't know whether the staff
covered this in your presentation, are there any restrictions on what
can be labeled as protected under diplomatic pouch?
Mr. ASSELIN. Senator, we didn't get into that. I don't know the an-
swer to that.
Senator COHEN. It seems to me I have been seeing some reports
about how easy items can be shipped under the protection of diplo-
matic pouch. I just wonder if you had any information on that?
Mr. AssEinic. I don't know the answer, sir.
Senator COHEN. That is all.
Senator NUNN. Mr. Fry?
Mr. FRY. Mr. Chairman, my name is Glenn Fry, staff investigator
for the minority. I would like to summarize my statement if I could
but I would request the entire statement be entered into the hearing
record as if read.'
Senator NUNN. Without objection.
Mr. FRY. The Commerce Department's ineffective response to the
challenge of technology transfer is an illustrative example of the fail-
ure of the Government, in general, to organize itself effectively to
remedy this national security problem.
We have learned of the shortcomings in the Commerce Department's
efforts to investigate violations of the Export Administration Act
thereby causing a serious deficiency in its abiity to enforce the statute
and its regulations. The law enforcement effort, although critical, is
only a part of the overall effort to prevent the harmful flow of U.S.
technology. Even if the law enforcement operation were professionally
administered with sufficient resources, its effectiveness would continue
to suffer due in part to deficiencies within other executive branch
agencies.
The Commerce Department is mandated to administer and enforce
the Export Administration Act; however, matters concerning this act
which involve national security interests, require the consultation of
the Department of Defense, and the intelligence community as well as
Commerce. Ineffective control of the transfer of U.S. technology and
the enforcement of export laws will prevail if the Department of De-
fense and the intelligence community continue to provide less than
their best efforts to support this national security mission. Despite
several previous congressional investigations and hearings conducted
on these matters, dating back to 1974, the responsible executive branch
agencies continue to have difficulty in organizing an effective
operation.
Technology transfer can occur through the illegal export of con-
trolled or embargoed commodities; however, it can also occur with
See p. 426 for the prepared statement of Glenn W. Fry.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
103
equal damage, because of inadequate control and protection of critical
information and through ineffective handling of legiLimate export
licensing cases. The minority staff has made preliminary findings that
the technology transfer programs of the Department of Defense and
the Intelligence Community contain basic deficiencies which impair the
Government's overall effort to control the flow of critical American
technology.
The following are areas within the Defense Department's program
that demand attention and ultimate resolution if the Government
intends to control the flow of U.S. technology:
First, the Freedom of Information Act is a legal tactic available
to U.S. citizens, foreigners, and even Soviet surrogates to obtain
critical dual-use technology. Dual-use technology, which can be used
commercially and militarily, is not excluded from Freedom of In-
formation Act requests. There is no protection or means to control the
harmful transfer of technology that does not fall within the exclusions
prescribed by the Freedom of Information Act.
Second, there have been instances where classified information has
been prematurely declassified in accordance with an automatic declas-
sification schedule. In other instances, critical technologies which
have military significance are never classified. In either case, the end
result is that such information, although not readily distributed, be-
comes available to anyone.
The Department of Defense's Office of Research and Engineering
and International Security Policy are responsible for the review of
export licensing requests for national security interests. Presently,
Defense reviews predominantly those export cases involving the
Soviet Union or Warsaw Pact nations. There is very little review of
free world license requests except for cases involving very advanced
computer technology. The program presently administered within
the Department of Defense suffers from several fundamental
deficiencies.
First, on August 26, 1977, the Secretary of Defense issued an
interim policy statement for the export control of U.S. technology.
Today in 1982, there has yet to be any followup to this interim
policy. This is representative of the weak overall priority afforded
the technology transfer issue throughout Government. Sources within
Defense has indicated that there is ambiguity regarding which DOD
office has overall accountability for technology transfer decisions.
Second, the Office of Defense Research and Engineering does not
have an adequate number of permanent staff specialists to effectively
conduct its technology transfer mission. Temporary personnel have
been assigned to this office; however, there is an annual turnover.
Consequently, much valuable time and resources are continually used
to train and familiarize new personnel rather than attend to its
primary responsibilities.
Third, military and Department of Defense research laboratories
who are tasked by Defense Research and Engineering to review licens-
ing cases lack a charter delineating export control or techifology
transfer responsibilities. There is also no specific funding for this type
of operation. Consequently, technology transfer issues are not a prior-
ity and do not receive appropriate attention.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
11
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
104
Fourth, there is no adequate data base of information available
to all participants in the technology transfer program within our
Government. This deficiency is analogous to prosecutors working with-
out the benefit of a legal library. There has to be a centralized reposi-
tory of information that maintain available data relevant to the deci-
sions to grant exports.
Fifth, the Department of Defense does not review a sufficient num-
ber of free world export license cases. Exports to free world nations
many times are improperly or illegally reexported or diverted to East
bloc nations. This has been demonstrated by recent export violations
involving nations such as Switzerland and West Germany that were
used as conduits for the illegal reexport of high technology commod-
ities to the Soviet Union. The United States trades with many nations
such as India and Pakistan who have open trade policies with the
Soviet Union. To blindly export critical technologies to nations such
as those without the benefit of the DOD's review could run the risk
of having U.S. technologies end up in the Soviet Union.
Sixth, Defense Research and Engineering has not devoted sufficient
resources to the program which reviews foreign technical visitor pro-
grams. Defense Research and Engineering is responsible for determin-
ing militarily critical technology that requires export control. This
effort is being done in concert with U.S. industry. In this light, De-
fense Research and Engineering has devoted tremendous resources to
the development and understanding of new dual-use technologies;
however, there is not an adequate operation within D.R. & E. to assess
what areas visitors are concerned with and what technology is ob-
tained by these visitors. Therefore, due to this inadequate oversight,
Defense Research and Engineering has little control over the potential
loss of U.S. technology. Consequently, there is no way to assess what
critical technologies have been obtained by our adversaries thereby
making it virtually impossible for the intelligence community to
determine how the loss impacts on our national security.
The effective control of critical dual-use technology is largely
dependent on the proper gathering, dissemination, analysis, and use of
intelligence. It is the view of the minority staff that the Soviets, in
many cascs, are precise about what technology and equipment they
want from the United States. It follows then, that if the United States
can determine what the Soviets desire, where they are deficient, what
they need and what direction their technological efforts are aimed, we
are in an improved position to prevent them from obtaining our tech-
nology which may meet their needs.
At the very least the United States could create delays in the Soviets'
efforts which will impede their progress and maintain our lead time in
critical areas of technology. Testimony will be given which describes
the Soviets as having an enormous, systematic and organized effort to
obtain United States and other Western technology. The United
States, however, does not have a mechanism equal to the Soviets' task.
There has been no overall coordinated, systematic and organized pro-
gram in the United States to effectively prevent loss of our technology
to the Soviets.
Intelligence is the key to anticipating the technology on the Soviets'
"shopping list." U.S. law enforcement authorities can mount effective
enforcement strategy directed toward illegal exports when they are
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
105
apprised of what the Soviets are looking for. Department of Defense
and Commerce representatives who review export licensing cases would
be in a better position to render proper decisions based on national
security interests if they had the most available intelligence. But, after
reviewing information obtained from law enforcement and technology
specialists in the executive branch, the minority staff has reached the
preliminary finding that the U.S. intelligence effort regarding export
controls is insufficient. Coordination among affected agencies is inade-
quate. Commitment of needed resources is lacking. The intelligence
community is not organized to use information to block prohibited
diversions.
Specifically, the minority staff found the following deficiencies
within the intelligence operations of the technology transfer control
effort:
First, the Export Administration Act mandated Commerce to deter-
mine the foreign availability of critical dual-use technologies. The
foreign availability of technologies is an important ingredient in the
decisionmaking process for granting or denying export licenses. How-
ever, authorities within the executive branch assert that current for-
eign availability determinations are not adequate.
Second, the intelligence community has not been utilized sufficiently
by either Commerce or the Department of Defense. Sources within the
intelligence community state that they have virtually no communica-
tion with Commerce's Compliance Division regarding ongoing inves-
tigations of export violations. One representative of the intelligence
community indicated that there is little feedback from Commerce
regarding the intelligence information it provides. The information is
submitted to Commerce's Office of Intelligence Operations and it is not
known whether it is disseminated to the Compliance Division or other
divisions as well. Conversely, the Compliance Division rarely seeks the
expertise of the intelligence community regarding investigations.
Moreover, once the intelligence apparatus is strengthened, then
methods should be devised that enable sensitive information to be sani-
tized and passed on to law enforcement personnel in a form that will
assist them. Several experienced law enforcement investigators pointed
out that frequently intelligence on technology transfers has such a
high classification that many agents working export controls cases
cannot set it.
Third, Defense Research and Engineering tasks the Defense In-
telligence Agency to conduct end user investigations. Essentially, De-
fense Intelligence Agency is to determine whether the end user of an
export is not a national security risk. Defense Intelligence Agency per-
forms this task as a support function to Defense Research and Engi-
neering?its license review procedures. Historically, DIA has been
utilized infrequently in this capacity. Within the last 18 months DIA
has been tasked more frequently; however, it does not have sufficient
resources to conduct end user determinations that are necessary.
Fourth, there is no mechanism or organized program which con-
ducts followup investigations of foreign exports or reexports of U.S.
technology. In fact, there is no adequate system to accurately deter-
mine what has been exported, reexported, where it is used, and how
it is used. There is no way to accurately determine the adverse impact
to the United States of that dual use technology that has been obtained
by our adversaries.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
106
Officials working in the technology field are troubled by the fact
that our Government has difficulty determining a current assessment
of the state-of-the-art of American technology. Given such a fact, the
difficulty in assessing what technology has been lost and its impact
on U.S. national security seems almost insolvable given the current
resources and policy.
In summary, the U.S. Government, at present, has no high level in-
teragency task force or entity comprised of senior Cabinet-level of-
ficials addressing the problem of export control and technology
transfer. All past and current efforts along this line have been done
by lower echelon Government officials who can merely make recom-
mendations rather than needed changes.
Senator NUNN. Thank you very much, Mr. Fry.
I want to thank you and Mr. Asselin for not only your testimony
this morning but your investigative efforts over a long period of time.
You have both done an excellent job. We appreciate it very much.
Senator Cohen, do you have any questions?
Senator COHEN. Just one question.
Has anything at all been done since we held the hearings on Sen-
ator Garn's bill on September 24, and 25, 1980? It seems to me, Mr.
Chairman, we are going over the same issues time and time again for
the past 3 or 4 years. We keep talking about it, but nobody does any-
thing about it.
Mr. FRY. Senator, that was our finding, that very little has been
done. They have made some efforts. The interim policy, to the credit of
theD i
epartmentof Defense, is the only policy n this area of export
control technology transfer put out by any executive agency.
However, it is still an interim policy.
Senator COHEN. Do you come to the conclusion that we ought to
create a separate office of strategic trade, an independent power such
as the Federal Reserve Board?
Mr. FRY. I think it is a viable alternative.
Senator COTTEN. Because the essence of that is, as far as Senator
Garn is concerned, that there is a tremendous bias within Commerce
to promote exports and sales. The State Department has its own diplo-
matic or political biases or preferences that it might seek to achieve
and then you have the responsibility of the Defense Department.
So, we have three major departments each having perhaps a differ-
ent objective. If you left it up to DOD, they may say don't export
anything.
If you left it up to the State Department to have the final decision,
they would say it depends on what we are trying to achieve in a period
of detente or no detente.
If you leave it up to the Commerce Department, then you would
promote the sales in order to invigorate our own domestic industry.
It seems to me that our whole process is caught in a crossfire between
these three separate departments with Congress sort of on the side-
lines having some interest, but only peripheral at best, in terms of be-
ing able to do anything about it. So, I would think, based on what I
have heard, Senator Nunn, that something ought to be done in terms
of consolidating the responsibility of the jurisdiction in one office that
can weigh the conflicting pressures that are inherent in our system.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
107
Frankly, this whole issue of dual use goes back to the Kama River
Plant, in terms of whether or not that sale should have been author-
ized. I am sure you can certify that practically any item that is subject
to classification under this act you can be excepted based upon foreign
availability. Given these problems, I would suggest that some initia-
tive ought to be taken to consolidate responsibilities into one office and
perhaps really enhance and increase the enforcement capability of
that office.
Senator NUNN. We need to look at the licensing function in a dif-
ferent vein from the enforcement. I think there is real merit in creat-
ing a strategic trade office and Mr. Asselin had the recommendation
that the Gain bill be considered. Is that what you recommended?
Mr. ASSELIN. We recommended that members of the subcommittee
certainly consider that. As a long-term solution, it is the best thing
we can think of.
Senator NuNN. But you also are saying, from the way I read your
conclusions, that we may very well want one group to do the licensing
and another group to do the enforcement. If Customs already is out
there in every port of exit in the United States, the question must be
asked of whether it makes sense to have anybody else out there en-
forcinfft' the law. Enforcement and licensing are two different func-
tions. Under the Arms Export Control Act, the State Department
does the licensing, Customs does the enforcing. It seems to me there
is a real case to be made for the approach like Senator Gam has, in
the case of the licensing and have the Customs agency do the enforce-
ment.
Does that make sense?
Mr. ASSELIN. Yes, sir. It was our recommendation that for the short
term, the problem is serious and requires immediate relief. It will take
some time if the Congress in its wisdom Wants to create the Office of
Strategic Trade.
In the short term, the problem is serious enough. That is why we
recommended for immediate relief that the Compliance Division be
abolished and the Customs have the enforcement function very similar
to what they have in the Arms Export Control Act.
Senator NUNN. But until something like a Garn bill passed, you
would recommend that the Commerce Department still do the licens-
ing? Somebody has got to do the licensing?
Mr. ASSELIN. Yes; that is the point. That will leave the licensing
in the Commerce for the time being.
Senator NUNN. Temporarily unless something like the Gam bill
passes?
Mr. ASSELIN. Yes; I don't think Customs wants the licensing func-
tion.
Senator NUNN. You are also implying congressional wisdom takes
time; right?
MT. ASSELIN. Yes, sir.
Senator NUNN. What is the day of the Gam hearings?
Senator COHEN. The days of the Garn hearings were September 24
and 25, 1980.
Mr. ASSELIN. I spoke with a member of Senator Garn's staff who
said the Senator was planning to reintroduce the bill sometime either
95-999 n _ P9 _ p
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
108
just before our hearings or sometime after them. I don't know if he
has done it yet.
Senator Nurric. The problem is always whether you need to create
a new agency and the proliferation of agencies, you run into that
argument over and over again. The question is whether there is any
other logical thing to do.
Senator COHEN. The other issue you raised during those hearings,
as I recall, is that if we don't have a fundamental restructuring of the
classification system, a definition of exactly what we are about, it
doesn't make any difference if we create a new office. With all of the
same conflicting standards and rules and exceptions, you really have
not accomplished anything other than consolidating the mess all in
one place.
It seems to me we have got not only to have a new structure institu-
tionally but we have got to define classification.
Senator Nunn, you mentioned this yesterday how we classify items,
how we determine which ones will in fact be put on a list. Should
we have the Cocom list, for which historically the United States
has requested more than 50 percent, closer to 60 percent of all the
exceptions for Cocom.
So we can hardly expect our European allies to be following a
hard line and not exporting items of national security importance
to the Soviet Union and Warsaw Pact countries.
The other issue is, should we include all Warsaw Pact countries if
we are going to prohibit the sale and distribution to the Soviet
Union; does that not include by necessity putting a restriction on all
countries under the Soviet bloc?
Senator NUNN. I guess the other question that I would like to get
your opinion on here, Mr. Asselin, and Mr. Fry, what about putting
the export licensing function under the State Department? State
already has arms export licensing. In other words, put both licensing
functions in the same agency.
Mr. FRY. I don't want to address that.
Senator NUNN. Do you have any idea about that? If you don't
just say so.
Mr. ASSELIN. No; I would be against that. I think Commerce is the
proper place for the licensing function if the Department were prop-
erly organized. But we interviewed the present Acting Director of the
Compliance Division. He was formerly the Chief of the Office of Ex-
port Administration for 1 year. His name is William Skidmore. He
admitted that there were problems in the Compliance Division.
He acknowledged, yes; there are problems there but when he was
head of 0EA, he spent all his time trying to straighten out the licens-
ing section. Our staff didn't look into the licensing section. All we
looked into was the Compliance Division. We found that to be inade-
quate, to say the least. If he felt his real problems were in licensing and
he thought it was more important to straighten out licensing than it
was Compliance, then that gives you an idea what an inadequate oper-
ation licensing possibly may be.
Senator NUNN. Even under the best of circumstances as Senator
Cohen pointed out, licensing is always difficult because you have dif-
ferent views. I think the point that was made yesterday about having
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
109
an assessment of what the Soviets are really after is the beginning
point.
It seems to me that your policy needs to be driven somewhat by that.
We are right now trying to review everything, instead of going down
the list to those items they really need in their technology. As the wit-
ness testified yesterday from Los Alamos, the technical capability to
really analyze what it is the Soviets need weuld be a good starting
point for aLy licensing procedure.
Mr. ASSELIN. Yes. Dr. Baker made quite a point of the fact that the
Commerce Department is very good in licensing to this extent. They
are very good at saying whether a particular piece of equipment needs
a validated export license. Where they are not very good, were they
are not very adequately trained is in the determination of what uses
that piece of equipment can be put to overseas in the hands of an ad-
versary. That is where the technical expertise falls short in Commerce.
That was his basis for his recommendation for that center of technical
expertise.
Senator COHEN. Along those lines, given the jurisdiction to the
State Department over arms sales, what would be done about ceramic
tiles, for example? Ceramic titles might seem fairly innocuous and
have a nice household use. The first witness yesterday, however, indi-
cated that very little if any technology that is transferred to the Soviet
Union ends up in the household. Ceramic tile is also important in terms
of the Epace shuttle.
To what extent could you put a prohibition?I see a gmtleman in the
audience shaking his head. But the fact of the matter is we have some
rather extensive improvements in the field of ceramic tiles which
Rockwell does in fact use for the space shuttle.
It is very difficult to classify that as being an item of strategic value
in the abstract. So I think it lends more support to what can in fact
be converted because almost any item that we export could be con-
verted to another use.
Senator N17NN. I certainly agree.
Whatever the situation is with licensing, you have concluded with-
out any doubt that compliance is beyond the Commerce Department
institutional capability?
Mr. ASSELIN. Yes; very definitely.
Senator NuNisr. Do you agree with that?
Mr. FRY. Absolutely.
Senator NUNN. Thank you both.
Our next witness is Dr. Jack Vorona, Director, Scientific and Tech-
nical Information, Defense Intelligence Agency, Department of
Defense.
Dr. Vorona, we appreciate your being here. We swear all of our
witnesses in.
Do you have anyone accompanying you?
Dr. VORONA. Alone.
Senator NuNN. Will you hold up your right hand?
Do you swear the testimony you will give before this subcommittee
will be the truth, the whole truth, and nothing but the truth, so help
you God?
Dr. VORONA. Yes, sir.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
110
TESTIMONY OF DR. SACK VORONA, DIRECTOR, SCIENTIFIC AND
TECHNICAL INFORMATION, D:EFENSE INTELLIGENCE AGENCY,
DEPARTMENT OF DEFEASE
Senator NUNN. Dr. Vorona,, why don't you go ahead?
Dr. VORONA. Thank you, Mr. Chairman.
I welcome this opportunity to talk to the issue of technology trans-
fer and its principal beneficiary, the Soviet Union. Because truth like
beauty is in the eyes of the beholder, I will say at the outset that my
views are conditioned by over 20 years in scientific and technical intelli-
gence, most of which time was devoted to assessing Soviet military
capabilities.
One of the basic tenets of my profession is never to mirror image?
unless, of course, all else fails. That is, one must refrain from a mind-
less attribution to others of capabilities developed and sought by the
United States. What is becoming more apparent, however, is the delib-
erate, massive, and longstanding effort by the U.S.S.R. to acquire
Western technologies for direct incorporation into their military and
defense-related industry.
It would appear they are hardly at all afflicted with the not-in-
vented-here syndrome, but, on the contrary actively seek out, acquire
and implement our developments to a degree, even today, not fully
appreciated.
If I were to characterize the Soviet effort to acquire U.S. technology,
I would say that it enjoys very high priority, is centrally directed,
specifically targeted, and employs every collection means imaginable.
All in all, a very comprehensive program.
Seen on this chart is the organizational structure of Soviet R. & D.
at the all-union level. 1 hose organizations marked in red are directly
involved in technology transfer.
[The chart referred to follows:]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
State
Construction
Committee
Communist
Party of the
Soviet Union
USSR
Council of
Ministers
State
Committee for
Science and
Technology
ORNT
State
Planning
Committee
GOSPLAN
USSR
Supreme
Soviet
,IMMININ=MMMM???????????111?0
State
Security
Committee
KGB
Higher
Attestation
Commission
State
Supply
Committee
Ministry of
Finance
Military-
Industrial
Commission
VPI(
Presidum of
USSR
Academy of
Sciences
State
Inventions
Committee
Ministry of
Defense
GRU
Defense
Industrial
Ministries
Civilian
Industrial
Ministries
USSR
Academy of
Sciences
USSR Ministry
of Higher and
Specialized
Secondary
Education
R&D Performer Organizations
Institutes
IResearch Higher Schools I Design Bureaus
Industrial Plants
ORGANIZATION STRUCTURE OF SOVIE; RaD
AT THE ALL-UNION LEVEL
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Niel'
II
III
IV
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
112
Senator NuNN. What do you mean by "the all-union level"?
Mr. VORONA. At the national level, sir. You see that they reach the
highest political levels?a fact which underlines how importantly
Western technology is viewed from Soviet eyes.
I would like now to describe for you this program's basic modus
operandi. First comes their exploitation of the world's open scientific
literature. This involves tha annual acquisition and translation of about
35,000 publications from 125 different countries in 65 different lan-
guages?roughly 1.5 million articles. This massive effort clearly serves
as an excellent guide to the world's technical state-of-the-art, where it's
being done and by whom.
This data is at the disposal of the State Committee for Science and
Technology or GKNT---the organization responsible on the one hand
for ascertaining Soviet technological and industrial weaknesses, and
on the other, for their remedy. Thanks to the open literature, the
GKNT knows exactly where to go to overcome their deficiencies.
The open literature itself answers some of their needs; many others
are met by legal purchase. But they also invoke a wide variety of il-
legal maneuvers. These include evasion, diversion and the use of U.S.
chartered but Communist-owned firms to acquire material normally
denied them under export control laws.
Espionage is yet another tool--not only are the KGB and GRU
heavily involved in acquiring our technology, so are the intelligence
services of the pact nations, all centrally directed by the Soviet Union.
I would also mention the role of the Soviet Academy of Sciences in
this beautifully orchestrated effort to acquire critical U.S. and West-
ern technologies. There should be no doubt that this prestigious aca-
demic organization is a key and willing participant which, via such
mechanisms as scientific and student exchanges, contributes signifi-
cantly to the total take.
The Soviets in the post World War II period began a huge effort
to acquire the industrial and technological wherewithal to support
their military ambitions. For example, the impressive Soviet radar ca-
pabilities of today had, their genesis with World War II lend-lease
equipment sent them by the United States.
This along with the unclassified MIT radiation laboratory volume
on radar theory were the basic ingredients for the early generations of
Soviet radar design.
The Soviets are excellent radar theorists and have since added their
own refinements. I would note, however, that the acquisition of U.S.
microcircuitry very probably enabled them to package sophisticated
radar concepts into a weight and volume suitable for the militarily
critical airborne application.
I specifically refer to their look-down/shoot-down interceptor, the
modified Foxbat, whose entry into the Soviet inventory was no doubt
expedit ed thanks to acquisition of embargoed U.S. microelectronics.
Of course, we haven't begun to see the repercussions of the recent
espionage case involving Mr. Bell and the Polish Intelligence Service.
The classified data transmitted is no doubt right now being investi-
gated to further Soviet radar capabilities and countermeasure our
own.
Their initial chemical warfare capability came from Germany after
the war. They simply transported two nerve-agent factories from Ger-
many back to the Soviet Union.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
_
113
Their TU-1 bomber was a direct copy of our B-29. Their first jet
engine was from Rolls-Royce?the Nene?it powered their MIG-15
fighter.
The U.S.S.R. and East European family of general purpose com-
puters known as the RYAD series are based substantially on IBM
3ti0 and 370 computers that were illegally diverted into the U.S.S.R..
Their decision to emulate U.S. computer design eliminated the time
and risk associated with indigenous development.
It had the equally important effect of making available to them a
tremendous library of computer software that was RYAD compatible.
Since the early seventies, the Soviets and East Europeans have
legally purchased more than 3,000 microcomputers, some of which
are being used in military-related organizations. They are also pro-
ducing minicomputers that are direct copies of Western models.
Nuclear weapons design information clandestinely provided them
by Klaus Fuchs was undoubtedly a key ingredient in their achieving
workable weapon designs as early as they did. When the Soviets were
unable to produce the fissionable material, U-235, in the post World
War II period owing to inferior gaseous diffusion technology, they
brought in a German scientist, Peter Thiessen, who was able to rectify
their problem.
As a result, they were able to detonate their first 11-235 bearing
weapon years earlier than if left to their own devices.
These, and numerous other examples, we considered as but stop-gap
measures by the Soviets?until their burgeoning indigenous R. & D.
resources were able to pick up the slack. hat we are coming to rec-
ognize, however, is a continuing and deliberate program to acquire
Western technology which is integrated with or used in lieu of their
own.
The acquisition of Western technologies and developments is thus
a conscious Soviet policy which, in my estimation, has been extra-
ordinarily successful. They have derived significant military gains
from these acquisitions particularly in the areas of computers, micro-
electronics, signal processing, manufacturing, communications, guid-
ance, and navigation, structural materials, radars and sensors of
various types.
The extensive Soviet acquisition program has allowed them and
their allies to save untold hundreds of millions of dollars in R. & D.
costs alone and years in R. & D. development lead time, to reduce
engineering risks by copying proven western designs, and to develop
countermeasures to U.S. and western weapons, in some cases before
our weapons have been fielded.
Most of the technology of direct and immediate military conse-
quence has been clandestinely acquired by Soviet intelligence assets
and their East European surrogates. However, the bulk of their
acquisitions fall under the heading of dual use technologies, that is,
technology having both military and civilian applications.
Because of the primacy of Soviet defense industry over the civilian
sector, there is no doubt who will be the ultimate recipient, despite
Soviet assurances to the contrary. By purchasing these capabilities,
the Soviets are able to focus their own resources upon the strictly
military undertakings.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
114
For example, the Soviets recently bought two huge floating dry-
docks from the West which have already been put to use servicing
their Kiev-class aircraft carriers as well as nuclear submarines.
Senator NUNN. Were those bought from Japan?
Dr. VORONA. One was from Japan, sir, and one was from Sweden.
They are negotiating for others from those two countries.
Senator COHEN. I am sorry?
Dr. VORONA. They are negotiating for other drydocks from those
two countries.
Senator COHEN. I was under the impression that Japan had learned
the lesson about, on the one hand, complaining to the world that
they are concerned about the Soviet buildup off their shores and, on
the other, they have been providing them with the kind of assistance
that will allow them to have those ships off their shores.
Dr. VORONA. One of these 1,000-foot-long drydocks is in the North-
ern Fleet, one in the Pacific Fleet. There is no doubt they themselves
could have designed and constructed such a structure, but it would
have taken longer and used resources that could otherwise be devoted
to other needs.
However, despite their notable successes in acquiring Western tech-
nology, the Soviets for some time to come will be hard pressed to main-
tain their relative position to the West in the technical sophistication
of their weapons.
Therefore, they will continue to seek Western technology. The Soviet
Union will especially need equipment and technology for their elec-
tronics, aerospace, and shipbuilding industries. Future Soviet and
Warsaw Pact acquisition efforts are likely to concentrate on the sources
of such component and manufacturing technologies, including defense
contractors, general producers of military-related auxiliary manufac-
turing equipment, and small and medium size firms and research cen-
ters that develop advanced component technology and designs.
I believe this last category of small companies to be a specially en-
ticing target because it is where many of the emerging technologies are
first discovered. Because of their newness they have not yet been in-
corporated into military programs and are thus unclassified and
vulnerable.
In my estimation, the United States R. D. establishment is viewed
by the Soviets as a mother lode of important and very frequently,
openly available S. & T. information.
In fact, they tap into it so frequently that one must wonder if they
regard U.S. R. & D. as their own national asset. They have enjoyed
great success in this endeavor with minimal effort, primarily because,
as a nation, we lack the awareness of what they are about.
Senator NUNN: Let me ask you one question there.
Suppose we did have, let's say, reverse engineering on the Soviet
espionage, overt and covert efforts to acquire 'Western technology.
In other words, we had a group of scientific experts within the Gov-
ernment who sat down, looked at what we had, looked at what was
being developed, looked at what the Soviets had, their needs, spare
parts, so-called half life, things they have already gotten from us and
so forth and drew up a rather tight list of high priority items and sup-
pose the Government went out and, first of all, distributed those lists
within the. agencies and, second, went out on a periodic basis and dis-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
li15
tributed those lists to the small businesses, the technical industries of
the country.
Don't you think that that in itself would alert a whole lot of Ameri-
can businesses who are basically honest and patriotic as to what kind
of technology would be most suitable to the Soviet Union?
Dr. VORONA. Yes. I certainly do. And, as a matter of fact, such an
effort is already underway.
As you are well aware, the Congress directed the Department of
Defense to develop a militarily critical technology list. This has been
done. I cannot say exactly when, but I suspect in the very near term it
will be distributed to people such as you just mentioned. This fist
should give them a (rood appreciation of what technologies are mili-
tarily critical to the '-'United States. Conversely, I would note that this
list also reflects what the Soviets are targeting.
Senator NUNN. Is that going to be a standing effort by the Depart-
ment of Defense to do this on a periodic basis to keep it updated or
is that a one-time effort?
Dr. VORONA. It will be periodically updated.
Senator NUNN. Does this include dual use technology or is it mili-
tary technology mainly?
Dr. VORONA. I believe it is primarily dual use technologies.
Senator NUNN. Dr. Baker from Los Alamos yesterday testified that
he thought it would be a good idea to put a permanent standing group
of 25 people at a cost of $4 million or $5 million a year in one of our
labs for highly technical evaluations that would do this on a continu-
ous basis.
Do you think that suggestion has merit?
Dr. VORONA. I would think that it ought to be done through a com-
bination of efforts involving the intelligence community and the De-
partment of Defense.
I cannot imagine a group of 25 people or so becoming expert in all
the fields necessary for this.
Senator NUNN. He wasn't suggesting that. He was suggesting it
was a clearing house a central location so that all the defense intel-
ligence community fed into there and that any inquiry, anything that
people asked for, they would either be able to produce it there or be
able to know where to get it.
In other words, a clearinghouse, not a comprehensive group.
Dr. VORONA. I would have to look at this proposal further, sir, to
look into its ramifications. However, I believe we will soon have this
capability within the intelligence community.
Senator NUNN. We would like to get your opinion on that as we
deliberate some of these suggestions.
Thank you.
Dr. VORONA. We know the Soviets receive each of the 80,000 Govern-
ment reports deposited with the National Technical Information Serv-
ice?NTIS--of the Department of Commerce-75 percent which are
from the DOD, DOE, and NASA.
In addition, classified Government research reports are subjected td
automatic downgrading and declassification, so that, barrin7g addi-
tional caveats, they are fully declassified in 6 to 8 years, inUnediately
sent to NTIS and released with no consideration given to the possi-
bility the report may still be of military significance.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
111111
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
116
The recent Executive order will substantially rectify this situation
? by giving to the report originator the ability to determine whether or
not release should be made.
I should like to offer perhaps a less well known example, but one
which both highlights the lack of awareness issue and Soviet ability to
take advantage of it to our national detriment.
Specifically, two Soviet Embassy officials in 1979 went to the public
library in Milan, Tenn., to reproduce pages from an environmental im-
pact statement on file there concerning Government construction of a
plant to manufacture military explosives, in particular, RDX/HMX.
As a result of this episode, an investigation was conducted to deter-
mine what the Soviets might have gleaned from the environmental
impact statement. It was found that the document contained a wealth
of technical detail which, when combined with already published ma-
terial, would allow them to duplicate the entire manufacturing process.
This was clearly not the intent of writing the environmental impact
statement. However, an awareness of the efficiency of the Soviet tech-
nology vacuum cleaner could have precluded such an occurrence.
In the past several hundred years, the Russians have upon various
occasions imported "Western technology. These were sporadic attempts
to create an economy capable of supporting their foreign policy ambi-
tions. But these efforts were not sustained and the economy lapsed into
relative backwardness. Such is not the case today. The huge military
R. & D. infrastructure they are creating, expressed both in terms of
facilities and technically trained manpower, already the world's larg-
est pool of scientists and engineers, indicates they are in this for the
long haul.
And as the infrastructure matures, it becomes increasingly capable
of extracting from and building upon Western developments, not to
mention their own. For this reason, I believe it erroneous to conclude
as some have, that Soviet efforts to acquire our technology somehow
relegates them to a position of inferiority.
In closing, I would simply say that the Soviet leadership appre-
ciates and has ofttimes noted tile casual relation between science and
technology and strategic superiority. To them, technology transfer is
an important means to that end.
Mr. Chairman, this concludes my statement.
Senator Nuivi.r. Thank you, very much, Dr. Vorona.
We appreciate all of your cooperation and we hope to keep in touch
with you as we try to develop our recommendations growing out of
these hearings which I hope will be in the very near future.
Senator Cohen.
Senator COHEN. Thank you, Mr. Chairman.
I assume you consider U.S. technology to be a national asset and
that you have indicated, I think, even beyond that that the Soviet
Union probably considers it to be their national asset as well.
Dr. VonoxA. That is correct.
Senator COHEN. What is your evaluation of the U.S. leadtime of
the Soviet Union in the area of technology?
Dr. VORONA. I believe in general the United States leads the Soviet
Union in technology and has a distinct advantage, measured in years,
in certain very critical military technologies, specifically computers,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
117
microelectronics, signal processing and in general, production know-
how.
This has to be maintained. Unfortunately, the Soviets through the
various mechanisms we talked about have made significant inroads
into this lead and one of these days we are going to find that the
technological superiority which we have taken for granted is no longer
going to be there.
Most importantly, once they acquire a technology, it is immediately
incorporated into their military forces or defense-related industry.
So, measured in terms of which sides military forces have the
superior technology our lead is diminishing even more rapidly and
might even reverse in some instances as we go into this decade.
Senator COHEN. There is an old expression that a pigmy standing
on the shoulders of a giant can see further than the giant. And, of
course, that expression has been used in the past in terms of each of us
being able to stand upon the accumulated body of wisdom from gener-
ations in the past. Therefore, we do not have to repeat the same errors
and mistakes or learn the same lessons of the past and are able to
look further into the future as a result of the benefit of collective
experience. And what you are suggesting is that this is being trans-
lated into a new dimension, namely that the pigmy is now standing on
the giant's shoulders, the giant being the U.S. technological develop-
ment and capability and will be able to see that much further into the
future by combining it with their own indigenous assets and
development.
Dr. VORONA. Precisely.
Senator COHEN. What in addition to the list that is being put
together, or has been put together, by the Defense Department can we
do to alert the private sector about the dimensions of the problem
and the extent to which they may be unwittingly contributing to it?
Dr. VORONA. As DIA's effort in that direction, Senator, we have
since 1977 given 220 briefings to various groups throughout the coun-
try, including those in the Department of Defense, Department of
Commerce, academic and industrial organizations. This was done in
the hope of increasing their awareness of just how serious the Soviets
are in this effort, how vulnerable we are, and the wide variety of mech-
anisms used by the Soviets to aquire our technology.
I believe that this effort has had some salutary effect.
Senator COHEN. The agencies who now have the responsibility for
managing our export control operation, what sort of a data base. do
they have, what sort of corporate memory do these agencies maintain?
Dr. VORONA. I am not at all sanguine about the comprehensiveness of
the data base resident in any particular agency concerning technology
transfer.
I believe this is one of our serious shortcomings. However, we are
making significant strides within the intelligence community and the
Department of Defense to rectify this very shortfall. But unless and
until we have the kind of data base to which you refer, any truly mean-
ingful assessment of technology transfer and its impact on the Soviet
military posture is merely arm waving.
Senator COHEN. What assessment do you make of our efforts to in-
vestigate the end users of the exports?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
118
Dr. VORONA. This may be contrary to the conventional wisdom or
some of the things that you have heard but in my estimation, our abil-
ity to determine whether or not dual-use technologies are being di-
verted for military purpose in the Soviet Union or in any closed society
is woefully inadequate.
Furthermore, I am not at all optimistic that even with additional
resources, could we significantly redress that situation.
Senator COHEN. Let me take it one step further.
Assuming you had the resources, significant resources to make that
kind of determination, in your judgment, would it make any
difference?
In other words, suppose you were to tell other countries, including
our own exporters, that this technology would have a dual use.
Whether it is the Kama River Plant, the Brazil plant or whatever it
might be, do you think that would really be an inhibiting factor to a
nation selling such technology to the Soviet Union?
Let me use Japan by way of example.
Do you think there is any doubt in the minds of the Japanese as to
what use the Soviets will put to that large drydock?
Dr. VORONA. I'll probably never know the answer. I do know that
the Soviets specified it was going to be for civil purposes. Of course
they immediately diverted it for military purposes.
Senator COHEN. Now you are telling me that the Japanese and the
Swedish Governments are considering selling even more?
Dr. VORONA. At least the Soviets have made overtures to them. I
Senator COHEN. guess what I am asking you is when it comes
down to the choice between profits and national security, what has
been the history that we have witnessed to date?
Dr. VORONA. It has not been terribly reassuring?it has been a
concern.
Senator COHEN. It is all well and good for us to sit up here and
talk about how we are going to possibly create a new agency to con-
solidate all the functions of analyzing the export value, commercial
value, the diplomatic value and the defense value for a particular
item. Then we talk about alerting the business world to the conse-
quences of allowing that technology to be exported beyond our own
boundaries. Then we have a more fundamental problem; that is, how
do we weigh that against the experience of nations in the clear face
of demonstrated conversion to military purposes since the motive for
profit for export has overwhelmed whatever doubts may have been
held by that particular firm.
I know time after time when Members of Congress have raised
concerns about sale of computer technology to the Soviet Union, those
companies will come to me and to others and say, how can you do
this? How can you prohibit the sale of this particular computer
technology to the Soviets where if we don't do it, the Japanese will
do it or the Germans will do it, the British, surely the French, who-
ever has an opportunity to start a stampede for this technology, will
pick it up. We will lose the profits from the sale of this system, the
profits of which we could then reinvest into greater R. & D. to keep
5 or 6 years ahead of the Soviet Union?
How are we going to measure up to that particular problem?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
119
Dr. VORONA. I don't know, Senator Cohen, but I would hope that
in making countries aware of what the Soviets are about and how the
technologies that they acquire are in fact enhancing Soviet military
posture would have some sobering effect.
Senator NuNN. Senator Cohen, on that point, I don't think there is
an easy answer to that. I think you put your finger on a very difficult
question. But I do believe within the NATO structure itself, the mili-
tary side of it, they ought to have a small group of people that inter-
relate to the backhome group so that NATO, when there is an impend-
ing sale, would be able to comment on it.
It is handled more or less at the Cocom level and it is not working.
I think the same thing; we have a standing group with the United
States-Japanese defense treaty of people that are in charge of making
planned programs there.
I think we need a smaller group there, that don't do anything but
alert the two nations. They have got to raise it to a decision level at an
early stage. But right now,/he Cocom arrangement simply isn't
working.
Senator COHEN. I agree with that, Mr. Chairman. I am not trying to
undermine the effort. I think you ought to be commended and I want
to support every effort that can be made to change the way in which
we do business. In another context, I am also perhaps realistic
enough?perhaps even cynical enough?to look at what is taking place,
for example, with the pipeline, which has nothing to do with the crit-
ical technologies list.
In my judgment, there is a classic case of where our European allies
are undertaking a venture which is going ultimately to be detrimental
to their future security because I believe that pipeline will be used as a
lever against NATO taking any trade action, diplomatic action or
potential military action. I have said this before and tried to pose it in
deliberately dramatic terms, but it is my judgment that our European
friends are marching toward the Berlin Wall with their eyes closed.
I think if we continue to follow the procedure they have, they will be
behind the Berlin Wall with their hands up.
That is the direction, I think, they are going. To me the Yamal pipe-
line closes in this most dramatic form exactly the point I am raising,
namely providing technology to the Soviet Union which it doesn't
have. Then you have to ask the question, why is the West 15 years
ahead of the Soviet Union in oil drilling or gas drilling capabilities
and technology?
The answer is pretty simple; they have been putting 15 percent of
their money into military uses. And so what we are doing in effect is
subsidizing their own domestic deficiencies or inefficiencies, allowing
them to continue to spend the money for drydocks or for SS-18's,
whatever it might be, while we supply the technology to ease their par-
ticular commercial difficulties. And I think given that sort of formula,
then there is little prospect of the United States breaking out of this
force which is almost centrifugal in the way in which it operates, pull-
ing all of the technology into the Soviet Union.
Let me ask you, Dr. Vorona, what is the working relationship that
you have, DIA and the Commerce's Office of Intelligence Operations?
Dr. VORONA. We do have a good working relationship with them,
although it's essentially a one-way street. We provide them with what-
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
120
ever information they ask for. On the other hand, we have had precious
little interaction with the Compliance Division.
Senator COHEN. How many times have you been called upon to use
your own expertise with Commerce, Customs, or FBI to deal with
export cases?
Dr. VERONA. To my knowledge, once, and that was to provide an
analyst as an expert consultant to the Justice Department in the Spahr
Optical case.
Senator COHEN. Before I go any further, I would just like to clarify
something with respect to my comments about our European allies.
I don't think the United States, frankly, myself included, is in any
position to lecture the Europeans since we ourselves should b3 charged
with the same sort of avarice. or greed for consideration of our own
national markets. I point specifically to the grain embargo as an exam-
ple. It is very difficult for me to go to any of our allies in Europe and
say you are making a fundamental mistake building the pipeline when
in fact we are unwilling to forego the same sort of profits that we our-
selves are seeking.
I don't think I am in the position to lecture the Europeans when
we ourselves are unwilling to bear some of the pain that is necessarily
involved in dealing with the Soviet Union. It is still my opinion that
even if we were to shut off our supplies of grain, which I would sup-
port, that the Europeans at this point are still going to be buying gas.
I think that is almost irreversible at this point.
Had different action been taken earlier, we might have diverted that.
Any nation willing to feed the Soviet Union cannot lecture anyone
who wants to derive gas from them.
Senator NUNN. Thank you, Senator Cohen.
In an editorial of April 12, 1982, the New York Times commented
on technology transfer to the Soviet 'Union. The Times expressed the
opinion that lowering the barriers to the flow of technology to the
U.S.S.R. is not necessarily a bad thing. The Times editorial put it
this way, and let me quote directly from that:
A more relaxed policy would serve the West's best interests because a steady
supply of foreign technology saps the Soviet Union's incentives to develop its
own. It is better to have the Soviets stealing, copying and following a few steps
behind than working independently in becoming able to deliver a technological
surprise.
What is your response to that opinion in the editorial?
Dr. VORONA. Mr. Chairman, in a nutshell I think it is divorced from
reality. The Soviets are bent upon achieving world preeminence, domi-
nance, if you will, in science and technology and are building a huge
R. & D. infrastructure with that goal in mind. The technology they
are acquiring from the West is an important input to that process be-
cause it allows them to compare and build upon the best of both worlds,
and they do.
A more relaxed export policy, rather than condemning them to sec-
ond place as the editorial seems to imply, would only hasten their
achieving world class status.
As a separate but related matter, I would again point out that our
technological advantages may or may not find their way into military
hardware but you may rest assured that if the Soviets go to the trouble
to acquire a particular technology, it will post-haste be translated into
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
121
a military capability. As a result, the technological superiority we en-
joy in the civil sector is significantly eroded when military hardware
is compared. The concept proposed by the Times would exacerbate
that situation as well.
Senator Ntrismr. Thank you very much, Dr. Vorona.
Senator COHEN. Yesterday, Dr. Vorona, I mentioned my unhappi-
ness with the kind of rules under which we have to operate in terms
of international athletics, specifically that our amateur athletes have
to go up against the Soviet professionals, because they are, in fact,
professional athletes in the Soviet Union and Warsaw Pact coun-
tries. They are supported by the state whereas our own athletes do
come out of college and go into professional basketball or whatever
the sport might 13'3 and support themselves through their contracts.
It was suggested yesterday by our first witness that the Soviets also
have professional students who come into this country. You touched
upon this just briefly in your own testimony. In other words, we send
our amateur students to the Soviet Union to study humanities and the
classics while they send professional students, people who are mature,
would not be so taken in by what attractions our society might offer.
Furthermore the students and that they already are well trained
and are looking for certain technology.
Would you agree with that assessment, that in essence what they
are sending here are professional students who are interested in ac-
quiring the information from an academic institution that otherwise
might be prohibited for sale or distribution or export to the Soviet
Union?
Dr. VORONA. Yes, Senator, I completely agree with that assessment.
Senator COHEN. Thank you.
Senator NuNisr. Thank you very much. We would like to be able to
pose other questions to you for the record, if we may?
Dr. VORONA. Certainly, sir.
Senator NuNN. Thank you very much, Dr. Vorona.
Our next witness is John Maguire, president of the Software AG,
Reston, Va.
It is the Custom of this subcommittee to swear all witnesses appear-
ing before it.
Do you swear the testimony you give before the subcommittee will
be the truth, the whole truth, and nothing but the truth, so help you
God?
Mr. MAGUIRE. I do.
TESTIMONY OF JOHN MAGUIRE, PRESIDENT, SOFTWARE AG, OF
NORTH AMERICA, INC.
Senator NuNisr. I know you have a statement. Thank you for all your
cooperation. We appreciate you being here today. We look forward to
hearing your statement.
Mr. MAGuirtE. Mr. Chairman, Senator Cohen, as a member of Amer-
ica's high technology industrial community, I note with great interest
the subcommittee's concern over the increasing loss of American tech-
nological know-how to the Soviets. I am pleased to be here this morn-
ing to share with you my personal experiences in confronting this
problem in the computer software industry.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
122
I am currently both president and chairman of the board of Soft-
ware AG of North America, Inc., located in Reston, Va. Our company
focuses on the production and sale of computer software, as opposed
to computer hardware. Computer hardware, including microprocessor
chips, can be and has been reverse engineered. As a result of Soviet use
of that technique, Soviet hardware technology is now nearly equivalent
to U.S. hardware technology.
By contrast, software cannot be so easily deciphered and duplicated.
Software remains the key to future computer development as opposed
to hardware where Jordan is even ahead of us now. Yet given the
inability to reverse engineer, current Soviet efforts at software devel-
opment are antique by comparison to those in the United States.
Even the Japanese are many years behind the United States in devel-
opment of computer software. Last year I met with the Minister of
Information for Japan. I don't know how you would measure it, it is a
figure of 8 years behind the United States in computer software.
The United States undoubtedly has both an enormous investment
and a substantially important national resource in its technology lead
in the software field.
In that context, my company has proven itself as a leader in the
software field. Specifically, we have been responsible for the develop-
ment and manufacture of ADABAS, a Data Base Management Sys-
tem, we use the expression DBMS, which constitutes the present state-
of-the-art for this very important aspect of software technology.
DBMS is the implementation tool used by programers to implement
computerized information systems?with an increase in productivity
of approximately 1,000 percent?as compared to conventional com-
puter software technology. Between 1960 and 1980 I estimate over $1
billion has been spent on hundreds of projects to solve the DBMS
problem. The current ADABAS source code represents the highest
level of sophistication yet achieved in DBMS technology. It now
includes over 200,000 detailed instructions.
Like other software, ADABAS is not susceptible to copying by the
technique of reverse engineering. By analogy, one might consider
ADABAS as the Coca-Cola formula of the computer software in-
dustry. It is, deservedly, a closely guarded secret: Possession of the
source code, like the Coca-Cola formula, could only be obtained by
competitors by the quirk of an identical, independent invention, sale,
or theft of that source code itself.
Unfortunately, our task in guarding the source code as a private
company does not stem only from the economic rigors of the com-
petitive domestic marketplace. The most blatant and obvious attempts
to secure the secrets of ADABAS have come, not from our American
competitors, but from the Soviet Union.
Although the ADABAS source code is not classified, it is considered
to be sensitive technology requiring a validated license for export. My
story to you this morning will detail not one, but two, focused
attempts to secure our computer software know-how for use in the
Soviet Union.
In 1979 a Belgian national by the name of Marc DeGeyter con-
tracted our marketing representative in the State of California.
DeGeyter wanted the name of the most technologically expert individ-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
123
ual in our company. He was referred to Jim Addis of our Reston,
Va. office. Jim is one of two individuals in our company who have
access to the ADABAS source code. DeGeyter personally approached
Addis, offering him $150,000 cash for the purchase of the ADABAS
source code on behalf of the Soviets. Addis told DeGeyter that he
would have to discuss the offer with his superiors. When Addis told
me about the approach by DeGeyter, I immediately contacted the FBI.
At their request, I agreed to cooperate by personally dealing with
DeGeyter. As part of that cooperation. I agreed to the tape recording
of my conversations with Addis, DeGeyter contacted me, confirming
the original offer of $150,000 for the source code. He told me that he
had many business dealings with the Soviets in their country; in
order to insure continued good business dealing with them on other
matters. he needed to obtain the ADABAS source code for them.
Working with the FBI, I negotiated with DeGeyter for a period
of approximately 7 months. finalizing arrangements whereby I would
transfer the source code to him for a price of $150,000. During those
months. I had numerous telephone and personal discussions with
DeGeyter. I personally met with him in Washington, as well as tele-
phoning him in Belgium and vice versa.
There were a lot of calls around the United States?California, St.
Louis, Silicon Valley area. I spent a lot of time there.
I recall that, in at least one conversation, DeGeyter told me that
the Soviets had approached him with a specific "shopping list" of
technological items needed from American sources. He told me that,
as early as 3 years previously, they had included the ADABAS
DATA Base Management System on that list.
Since he could not at first figure out a way to obtain the code, De-
Geyter had initially bypassed it and gone after other technolocry items
on the list. The Soviets had evidently changed their priorities and
were now insisting that DeGeyter secure ADABAS on their behalf.
My own knowledge of DeGeyter was consistent with his description
of his efforts for the Soviets. I knew that DeGeyter had personally
approached software expert Charles Matheny- some 2 or 3 years pre-
viously, attempting to hire him to steal selected IBM technology on
his behalf. I later learned from a software representative in Amster-
dam that DeGeyter had been caught stealing trade secrets and prints
from their Belgian plant several years -earlier. DeGeyter had taken
the items while employed at the plant. Although he had been initially
charged in the Belgian courts, he was never convicted of the offense
in that country.
I also know that DeGeyter moved constantly in high technology
circles. During my negotiations with him, he traveled in and out of
California's Silicon Valley on numerous occasions. Certainly Silicon
Valley might well have been the home of many of the items on the
requested shopping list. When DeGeyter was eventually arrested at
Kennedy Airport, Federal agents searching his briefcase found, among
other things. numerous telexes from DeGeyter to individuals and com-
panies in Moscow.
One such telex dealt with a payoff to DeGeyter. In connection with
the payoff, the telex included nomenclature assigned to a new micro-
processor chip in the process of development at Intel in Silicon Valley.
95-929 0 - 82 - 9
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
124
The chip was not, of course, publicly marketed at that time. In his
conversations with me, DeGeyter made no bones about his technology
efforts on behalf of the Soviets. He told me that he was not alone in
doing so; rather, technology transfer was simply their?the Soviets?
way of doing business.
In discussing the sale of ADABAS source code, I voiced to De-
Geyter my concerns that the source code might eventually be disclosed
to our American competitors, in addition to the Soviets. In the contest
of a highly competitive American market for computer software, it
was certainly realistic to treat the threat of American companies ac-
quiring ADABAS source-code knowledge as more economically
frightening than Soviet development.
DeGeyter assured me that the source code would not be coming back
to the States or to American competitors anywhere. He told me that
he was purchasing the code on behalf of Techmash Import, a Soviet
trading company and that the Soviets had no interest in furnishing
the code to my competitors.
During the course of my negotiations with DeGeyter, I attempted
to arrange for the delivery and sale of ADABAS source code to him
in the United States. A planned delivery in this country was necessary
in order to successfully prosecute DeGeyter under our export laws.
Unfortunately, he insisted that I fly to Brussels for delivery of the code
where he would make arrangements for payment of the cash price
through a Swiss bank account. When I voiced hesitation to him about
delivery abroad and, consequently, the entire transaction, DeGeyter
upped the case price from $150,000 to $200,000 plus some California
real estate, and later to $450,000. Of course, by comparison to the U.S.
investment of $1 billion in DBMS technology over the years, the So-
viets were still talking in terms of "bargain basement" prices.
Eventually, our negotiations broke down, due to his unwillingness
to agree to delivery in the United States. DeGeyter later contacted
Charles Matheny, the owner of a computer company in our building,
and asked him if he knew of any other way to secure the ADABAS
code on DeGeyter's behalf. The FBI again stepped in and, through
the use of undercover operatives, eventually arranged a planned de-
livery of a dummy source code in New York. As a result, DeGeyter
was eventually charged and sentenced for his efforts to steal the source
code. I understand that Mr. Greenberg, the Federal prosecutor in that
case, will describe that matter in detail for the subcommittee.
When the DeGeyter case ended, I assumed, perhaps naively, that
ADABAS was relatively secured from Soviet attempts to buy or steal.
In other words, keep it, in a 1,500-pound safe on the 11th floor of the
building out in Reston.
Senator COHEN. Don't tell us any more.
Mr. MAGUIRE. I forgot the combination.
The ADABAS was relatively secure from Soviet attempts to buy
or steal. In the spirit of American free enterprise, I even used the
fact of the Soviets' efforts for the potential economic advantage of
Software AG. We subsequently purchased magazine advertisements
boasting "ADAMS. The Russians weren't smart enough to invent
it?but they knew enough to want it."
A copy of that I will show you in a few moments.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
125
Senator NUNN. What would they be able to do with it once they
goi, it? You say reverse engineering is?
Mr. MAGUIRE. It is impossible. It hasn't been done yet. The source
code that the dttail micliine language and construction representing
the basic logic for handling automatically all the information in a
large data base, we take that source code and run it through the com-
puter, what is called an assembler process, to create the machine object
code which is just millions of bits and that is what we deliver, we sell
a license for that and it works and it runs on a computer but no one
can look at those millions of bits and figure out the logic.
What they wanted was the source code to understand the detailed i
logical steps n the logic, just like a chemical formula, the logic un-
derneath the technology. Once they understand that, they could bring
that logic to other computers or anything they want, but they would
learn what has evolved to be a very successful technology, a value, dual
use military and commercial.
Senator NuNN. Thank you.
Senator COHEN. It is subject to reverse engineering?
Mr. MAGUIRE. No, but you have to have the source code. You can
get a silicon chip and reverse engineer and just peel away those layers
and take a look at it with a microscope and there is the detail logic.
Senator COHEN. What the chairman was asking about, as I under-
stood it, is why would they want that if in fact they couldn't dupli-
cate it. If they get the source code which they attempted to pur-
chase, they could go back and reconstruct the formula and use it
to 'develop future systems.
Mr. MAGUIRE. It is worse than that. By having the source code, there's
the secret.
Senator NUNN. That is the formula?
Mr. MAGUIRE. That is the technology right there.
Senator NUNN. You say no reverse engineering is necessary if they
get back. What they can't reverse engineer, is what you sell?
Mr. MAGUIRE. That is correct.
Senator NUNN. Using the analogy of Coca-Cola, if you get the
Coca-Cola, you can't get the formula. If you get the formula, you
know how to make the Coca-Cola. Is that right?
Mr. MAGUIRE. Yes; we sell the license for $160,000 currently.
Senator NUNN. The FTC maybe ought to be called in on this. You
said $450,000. Your add says $500,000.
Mr. MAGUIRE. I was replaced by the F131 agent eventually and then
DeGeyter upped it up to $500,000. No; that is correct.
Unfortunately, despite DeGeyter's conviction, I soon discovered
that the Soviets still wanted ADABAS and our other software and
are, in fact, still trying to secure it. As with other technology com-
panies, Software AG participates in trade shows on a regular basis.
In 1981 a Russian diplomat named Georgiv V. Veremey visited the i
Software AG booth in at least two separate trade shows n the Wash-
ington area. Since he was registered with the show and also provided
us with his business card, we have a formal record of the trade show
contacts. In both instances, Veremey asked numerous questions con-
cerning ADABAS, internal logic of the system and the source code.
After the trade show contacts, Veremey personally visited the Soft-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
326
ware AG offices in Reston, Va. On September 25, 1981, Veremey
arrived, introducing himself as a member of the Soviet Embassy
stall in Washington, D.C., and requesting to see various documenta-
tion on our products. He spoke to Sunday Lewis, a senior executive at
the Reston office. He told Lewis that he wanted a complete bibli-
ography of all Software AG products and their documentation. He
disclaimed any particular purpose for the request, saying that he was
just interested. He was extremely vague about the nature of his work
with the Soviet Embassy. After Lewis gave him a standard bibliog-
raphy and an order form, he left.
On September 26, 1981, Lewis told me about the incident. I told
her that, as company policy, we would not sell products to the Soviet,
even the object code. Moreover, I told her that to do so without a
license was prohibited by Federal law.
On October '2, 1981, Veremey again arrived at the Software AG
offices. While waiting for Lewis to return from lunch, Veremey con-
tinually wandered in and out of the Software offices despite the recep-
tionist's request that he be seated. When Lewis arrived, Veremey gave
her an order for all of Software AG's documents. At a price of about
$400, the documents would fill about 12 boxes. This type of technical
documentation tells one how to use various systems produced by our
company. One would have no use for this unless you have the system
or are planning on acquiring it; or you are attempting to develop the
system via knowledge of user techniques.
In response, Lewis told Veremey that she could not sell him the
documentation. She added that, if he insisted, she would have to first
go to the appropriate Federal agency to secure the necessary licensing.
Veremey laughingly asked Lewis, "What license was issued for the
U.S.-U.S.S.R. wheat deal?" He left and, to my knowledge, has not
returned since.
Our experiences with both Mr. DeGeyt,er and, most recently, Mr.
Veremey, have increased my frustrations with the current lack of ade-
quate legal protections for American high technology. Despite the fact
that software technology is the recognized key to future computer
development?and we have the lead?the United States has no current
statute which, in my opinion, adequately protects this technology.
To the average businessman, the Export Administration Act and its
concomitant regulations are, simply speaking, a terrible hassle. Most
industry representatives know that a license is required for trade with
the U.S.S.R. Few, however, know which other nations, if any, require
export licenses from the Commerce Department. The U.S.S.R. is not,
of course, alone in efforts to transfer technology: Our own company
has also reecived inquiries on ADABAS from Hungary and Poland.
In both instances, we have declined to transact any business.
As for the controlling export lists, when approached by DeGeyter
I did not know if any of my products were specifically included on
those lists; I strongly suspected, however, that they might well have
been. The information currently available to business on U.S. export
laws, regulations, and policy in this area is negligible, despite the fact
that businessmen are the real key to detection and enforcement.
Senator NUNN. Based on your experience, do businessmen in this
area have much knowledge of what the Commerce Department is
doing?
Ap roved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
127
Mr. MAGUIRE. No; and I am very active in the Trade Association
and my knowledge is very limited but I deal with my peers and their
knowledge is negligible.
Senator NUNN. Do most of them know about the law limiting
export ?
Mr. MAGUIRE. Most of them. They know about the existence of a law.
While a few large firms like IBM may be extremely familiar with
the lists and regulations, those firms account for only 40 percent of a
software market of $2.5 billion annually?estimated 1985 sales of $8
billion?the remaining 2,500 companies have 60 percent of the market.
I suspect that representatives of most of those companies are no more
aware of these laws and lists than I was.
Last, when businessmen such as I do get involved in the enforce-
ment process, the results are oftentimes even more frustrating. In
the DeGeyter case I spent nearly 7 months dealing with a man openly
working for the case,
to purchase one of the most significant trade
secrets in the U.S. software industry. Despite that fact, he was even-
tually charged only with misdemeanors under commercial bribery
statutes. In my mind, it is entirely incomprehensible that the man was
finally sentenced to a jail term of merely 4 months.
By comparison, I read newspaper reports of a Celanese Corp. em-
ployee who in June 1979 was convicted and sentenced to a term of
40 years for selling trade secrets to Mitsubishi Plastics Co., a Japanese
competitor of Celanese. From the scant newspaper reports, I can
glean no evidence of national security interests or Soviet involve-
ment. In sum' a businessman receives 40 years for selling trade secrets
to a competitor while a Soviet agent receives 4 months for attempt-
ing to transfer one of our most guarded technology secrets to the
U.S.S.R. It is, indeed, a sad state of affairs if those cases accurately
reflect his country's priorities on technology transfer.
I would like to also point out in our industry the major trade
association is called the DAPSA and they have put together a paper
addressing the problem of trade secret protection and the difficulties
with the current U.S. Copyright Act. We are submitting that position
paper to the House Subcommittee on Courts and Civil Liberties, but
I would be happy to make it available to your staff also because I
think it is the kind of thing that we are looking for in terms of pro-
tecting?the basic problem is the new copyright law raises some issue
as to whether we really have protection under trade secrets and to
get a copyright we have to file the source card. Once you disclose,
then you lose your rights under the trade secrets laws.
I don't have it with me today but I will forward it.
Senator NuNN. We would like to see that. It will be very helpful.
Thank you very much, Mr. Maguire. You mentioned the Software
AG, your company, received inquiries on your source card from both
Hungary and Poland. Were those made after the DeGeyter incident ?
Mr. MAGUIRE. Yes. I have some thoughts on it. The Hungarian
attempts were threefold. Initially the Hungarian Embassy in Wash-
ifigton, D.C., contacted our Reston office. We declined their request to
purchase a license. I next learned that the Hungarian Diplomatic
Corps in Germany contacted our German branch. In Germany, the
Hungarians offered to pay up front the full license fee in advance for
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
128
a copy for license of ADABAS. Our company refused to sell. Finally,
the Hungarian Embassy in Tokyo, Japan, contacted our Japanese
distributor and made the same request. The distributor, on my instruc-
tions, declined to sell.
.Senator NuNN. After that experience, was there any doubt in your
mmd the Soviets were working with the Hungarians and Polish in
this effort?
Mr. MAGUIRE. There is too much of a coincidence. In a concentrated
effort, this all happened within a period of 4 or 5 months, so when
we refused here, it popped up in Germany and a couple of months
later it popped up in Japan. The fact DeGeyter told me of the existence
of a priority list that the Soviets were after and the source code of our
program had been on there 3 years and the priorities just changed and
they were pressuring him.
Senator Nurric. Thank you very much.
Senator Cohen.
Senator Comic. Art observation, Mr. Chairman. What is so striking
about your testimony, Mr. Maguire, is that the fact the cynicism is so
deeply ingrained and almost richly deserved. Apparently the Soviets
and their agents, in this case, believed that you were prepared to sell
out your company in order to beat out your competition. In other
words, what I am saying is, you dangled out to Mr. DeGeyter the fact
you were concerned about not letting this information get out to your
competition. He apparently went along with you for some 7 months
during the negotiations under the belief that eventually you would
sell the ADABAS to the Soviet Union provided it wouldn't get out to
the competition in this country.
What I am suggesting to you is the cynicism is so deep in the Soviet
Union, to go back to the statement about they will sell us the rope to
hang us, it just struck me as I sat here listening to you. They were
under the belief that you would eventually sell out your country in
order to beat out your competition provided your competition didn't
get the system.
That is to me one of the most striking aspects of your testimony in
addition to your own honesty and patriotism which I commend you
for. We have seen, for example, another witness who did, in fact, sell
out his country in order to achieve some measure of personal gain and
you are to be commended for resisting that particular temptation.
Mr. MAGUIRE. Thank you.
Senator NUNN. Do you have any suggestions other than those you
have made in your testimony about how the Government can better
work with the private sector in protecting our technology?
Mr. MAGUIRE. The technology is changing very, very fast. It is very
difficult to keep up with it in spite of the discussion this morning here
about a group, a clearinghouse staying on top of it. But I think Gov-
ernment communication with high technology companies is the best
way to spread this information about the risk to the national security
and direct through trade organizations and specialized markets.
The computer industry happens?the ADAPS headquarters are
right over in Rosslyn. I doubt whether that headquarters has had any
dialog at all with Commerce.
Senator COHEN. I just make one other point, it is not only something
that afflicts small businesses within the field. If you really want an edu-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
129
cational experience, you ought to read the book called "The Snowman
and the Falcon" which details the activities of one Christopher Boyce
and friends of his who were successful in getting some of our most
treasured secrets. The Rhyolite and the the ARGUS, are two satellite
systems we spent a good deal of money on in terms of research and
development and they ended up in the hands of the Soviet Union
through their embassy in Mexico. That might be an educational ex-
perience to show you to what extent and how easy, how absolutely easy
it was to penetrate the so-called black vault at TRW, one of our major
companies in this field.
Mr. MAG calm. Thank you.
Senator NUNN. Thank you, Mr. Maguire. We appreciate all your help
and we commend you for your alertness and for your patriotism and
willingness to cooperate with not just this subcommittee but the execu-
tive branch in preventing this kind of transfer from taking place in
your case.
Mr. MAGI7IRE. Thank you.
Senator NUNN. Our next witness is Mr. Theodore Greenberg, Assist-
ant U.S. Attorney, Eastern District of Virginia, Alexandria.
Mr. Greenberg was the prosecutor in the DeGeyter case we just
heard about.
Mr. Greenberg, will you be accompanied by anyone else testifying or
just you?
Mr. GREENBERG. Yes. I have John L. Martin from the Internal Secu-
rity Section with me.
Senator NUNN. Of the Justice Department?
Mr. GREENBERG. Yes.
Senator NUNN. Will both of you be testifying? If so, I will have
both of you hold up your right hand.
Do you swear the testimony you will give will be the truth, the whole
truth, and nothing but the truth, so help you God?
MT. GREENBERG. I do.
TESTIMONY OF THEODORE GREENBERG, ASSISTANT U.S. ATTOR-
NEY, EASTERN DISTRICT OF VIRGINIA; AND JOHN L. MARTIN,
CRIMINAL DIVISION, U.S. DEPARTMENT OF JUSTICE
Senator NUNN. We heard about the DeGeyter case, and of course,
you were prosecutor in this case. I know you have got a long statement
which we will put in the record giving all the details on this case. We
would hope you would be able to summarize it, tell us what you know
about it, and then we will go to questions.1
Mr. GREENBERG. I have picked some significant parts of the state-
ment, Mr. Chairman, and I would like to point them out to you.
On May 22, 1979, the Federal Bureau of Investigation received in-
formation from John Maguire, president Software, A.G., Reston, Va.,
regarding the attempted bribery of one of his employees by Marc
Andre DeGeyter, a Belgian national, who stated that he was acting
on behalf of the Russian Government. DeGeyter wanted to steal Soft-
ware's trade secret, the ADABAS source code.
I See p. 432 for the prepared statement of Theodore Greenberg.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
1130
An FBI investigation, which included the use of an undercover
agent and consensual monitoring, resulted in DeGeyster's arrest at
John F. Kennedy international Airport on May 18, 1980, when De-
Geyter gave an undercover agent a check for $500,000.
The investigation was monitored primarily by the Internal Security
Section of the Department of justice. Prosecution of the case was
directed jointly by the U.S. Attorney's Office for the Eastern District
of V.rginia, and the Internal Security Section.
The investigation was originally conducted as a foreign counterin-
telligence operation and then as a criminal investigation.
DeGeyter was indicted on June 9, 1980, for violating title 18, United
States Code, section 1952(a) (3), interstate and foreign travel in aid
of an unlawful activity; that is, commercial bribery, in violation of the
laws of the State of New York and the Commonwealth of Virginia.
Because of significant governmental considerations, DeGeyter was per-
mitted to plead guilty to misdemeanor violations of the Export Ad-
ministration Act and the Virginia commercial bribery statute. He was
incarcerated prior to the hearing in the Alexandria City Jail and
served his Federal sentence at the Federal Correctional Institution,
Petersburg, Va. He served a sentence of 4 months, was fined $500;
and as part of the plea agreement paid a $10,000 civil penalty to the De-
partment of Commerce.
Senator COHEN. Mr. Greenberg, we can almost get that amount of
fine and penalty for shooting a deer out of season in Maine.
Senator NUNN. I agree with that observation. You heard Mr. Ma-
guire's testimony about how frustrating it is to be working on this
problem for as long as he did, cooperating completely with the Gov-
ernment and DeGeyter ended up with a 4-month sentence.
We recognize there may be reasons that we do not know about in
that respect. Could you tell us what the reasons are for switching from
a felony to misdemeanor?
Mr. GREENBERG. There were significant governmental considerations
which I would be happy to disclose to the subcommittee in a closed
session.
Senator INTuNN. We will respect that and any further questions about
why we will go into closed session.
But I think it is very important for people like Mr. Maguire and
others who have cooperated to the maximum extent possible to know
what happened and whv. After all, they are out there protecting the
governmental secrets. He spent a lot of his time, and I am sure be felt
at certain periods of time it might have been at his own risk financially,
as well as otherwise, to bring this case. The Government has a lot of
interest. One area of overwhelming interest is to get businesses to
cooperate like Mr. Maguire did. So you have to weigh that against all
the interests that the Government has.
We certainly would be interested in hearing that in closed session
at the appropriate time.
Mr. GREENBERG. The interests were weighed. One of the things that
we look to, in prosecuting, is the sentence that is given; which in the
federal system is the sole prerogative of the district court. There was
a 1-year penalty which could have been imposed. The court declined to
do that. Nevertheless, there are other benefits from the prosecution.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
131
The public becomes aware of it. There is a deterrent effect arising
from the prosecution, and there is publicity and the public is
informed.
Senator COHEN. I am not going to delay this too long. I know we
have some time constraints. Frankly, I am aware of a young man
who is being charged with tampering with an automobile vehicle
right here in the District. He faces a $1,000 fine and 1 year in jail
just for taking a tire off an 'automobile. I would say there is a much
different level of threat to our society in terms of stealing an auto-
mobile tire and taking major trade secrets of this country.
You are not part of this, Mr. Greenberg, but Senator Nunn has
been sitting on hearings in front of this subcommittee for a number
of years now. We have had hearings on chop shops where we have a
vast network of organized crime operating in this eountry. We have
had hearings on illegal drugs coming into the country and we have
had hearings now on technology transfer and there is a commonality
of issues involved, Mr. Chairman, as you know. There is, very little
iisk of being detected, little risk of being apprehended in the com-
mission of a crime; even if you are apprehended and charged, there
is little risk of conviction; and when you are finally convicted, there
is very little risk of getting a substantial penalty, all of which has
contributed to the increase in crime in this country. It seems to me
we have the same situation here where you have got a major attempt
to acquire a very sophisticated system and you end up with a penalty
that is less than you would get for taking a deer out of season in
Maine.
Mr. GREENBERG. Senator, we share those concerns. The indictment
exposed Mr. DeGeyter to 40 years in prison, had he been convicted on
all counts, and a substantial fine.
As I indicated, in this case there were interests which required us
to dispose of the case other than through a trial.
Senator COTTEN. I understand. The same interests were also present
during Christopher Boyce's trial. There was very serious considera-
tion given to dismissing the trial altogether because they didn't want
to get into disclosing the ways in which they apprehended the individ-
uals. It is always the situation when you apprehend somebody who
is engaged in espionage in this country that you might disclose the
methods used to acquire that information. But it does not serve as
much of a deterrent I wouldn't think, to a responsible businessman
to spend 7 months, maybe more than 1 year of his time, cooperating
with the FBI. It would certainly be frustrating then to have this
individual who might have tempted somebody within his organiza-
tion or another company that had access to that software and to
realize that you can spend 1 year of your time and still see a fellow
come out of jail 4 months from now with a $500 fine. That is not much
of a deterrent.
Senator NUNN. Let me just add to that.
I agree with what Senator Cohen has said. I also recognize that in a
case like this the policy is made at higher levels and that you have your
own responsibility to comply with whatever the Department of Justice
decides.
I also recognize the Department of Justice has to coordinate with
other intelligence agencies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
.132
My frustration is directed toward the overall policy. When we get
into closed session, which we will, we will he looking very carefully at
that because I am sure that there are overriding reasons in many of
these cases involving perhaps sources, methods, and other things that
have to be kept secret. But if in the final analysis the citizens of the
country and the businesses of the country lose faith in the judicial
system then the damage done to the overall protection of America's
secrets and technology would probably be far greater than disclosure
of a particular classified bit of information at that time. So there has
been an overriding kind of protection of sources and methods or some
overriding intelligence reason in my view to warrant the kind of very
minimum sentence that came out in this case.
But again we repeat, .1 know that decision was not made at your level
and we will talk to you about it and we will trace it right on up the
line, see where the decision is made and we may agree with it when we
get through. But we very well may not. I think Congress has a role to
play in this overall kind of policy, too. Certainly not while the case
is going on, but certainly after it is over we do and as far as policy in
future cases.
Mr. GREENBERG. Senator, I would like to add, if I may, that there
was consideration given in our internal deliberations as to whether or
not the case should be dismissed in its entirety. We decided to proceed
as set forth in the plea agreement. So I guess on balance it is not a
total loss, as you would view it.
As I understand it, DeGeyter was the first individual to actually
serve a prison term for violation of the Export Administration Act.
Senator COHEN. If I had that choice, I would make it a tough one.
I would give him the maximum, just to make sure that the jail sen-
tence is a deterrent; don't give him a 4-month sentence, give him a
tougher one.
Mr. GREENBERG. The plea agreement did not permit the Government
to choose the sentence. That was left to the discretion of the court.
Senator NuNN. Speaking of that, what was the bail in this case? I
understand your original indictment was for a felony. Is that right?
Mr. GREENBERG. That is correct.
When DeGeyter was arrested in New York, the Government re-
quested that the New York magistrate set bail at $500,000. When he
was indicted in the Eastern District of Virginia, bail was also set at
$500,000. When DeGeyter was arraigned on the felony charges, that is,
the Travel Act, the bail was reduced over the Government's objection
to $100,000.
Senator NUNN. Would you give me the name of the judge in New
York? Was there a bail originally set in New York?
Mr. GREENBERG. Bail was originally set on the New York complaint.
Senator NuNiv. That was $500,{)00?
Mr. GREENBERG. Yes,.
That was set by a magistrate in New York, by the name of John L.
Caden.
Senator Ntricx. When bail was set, was it transferred to Virginia,
was this a separate account?
Mr. GREENBERG. In New York, they filed a Travel Act complaint. We
decided that venue was more appropriate in the Eastern District of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
133
Virginia; and we filed a complaint with the U.S. magistrate in Alex-
andria, Va. An arrest warrant was issued on that complaint; and bail
was set by the Virginia magistrate at $500,000. DeGeyter was afforded
a removal hearing in the Eastern District of New York; and ordered
removed to Virginia.
At arraignment on the indictment the U.S. district judged reduced
the bail upon motion of the defendant's counsel to $100,000.
Senator NUNN. Who was that judge?
Mr. GREENBERG. That was Judge Albert V. Bryan, Jr.
Senator NUNN. Was there a reason he gave for making that reduc-
tion to $100,000?
Mr. GREENBERG. He stated that the Government had not charged
DeGeyter with espionage and therefore he didn't feel that 000,000
was warranted.
Senator NUNN. What was the defendant charged with?
Mr. GREENBERG. The defendant was charged with eight counts of
interstate travel to carry on an unlawful activity, in violation of laws
of the State of New York and Virginia, that is, commercial bribery.
The underlying offense of commercial bribery in both New York and
Virginia is a misdemeanor. Nevertheless, the Federal statute provides
in part, that if you travel in interstate commerce to violate certain
State laws, including bribery, the travel constitutes a Federal felony.
We pointed out to the judge the circumstances of the arrest and the
fact that this individual was a foreign national with absolutely no ties
to the eastern district of Virginia or to any community in the United
States; and that he had no American national who would speak on
his behalf. Nevertheless, the judge made the determination that in his
view $100,000 was sufficient.
Senator NUNN. Did you reveal anything else to the judge?
Mr. GREENBERG. No, sir.
Senator Nu/cc. What is that?
Mr. GREENBERG. No. sir. Not at that time. Subsequent to the judge
setting the bail at $100,000 DeGeyter's attorney arrived, the actual
dates are set forth in the statement, arrived in the clerk's office with
a cashier's check for $100,000, just about the same time that I had re-
ceived information from the New York office of the FBI, that
DeGeyter had indicated that he was a KGB agent and that he would
flee the United States if he was able to raise bail money.
I went to the judge?
Senator NUNN. Where did you get that from?
Mr. GREENBERG. That came from the FBI, informant information
which was?the source of the information was never disclosed in court.
What I am telling you now is a part of the public record.
I arrived at the courthouse about the same time that the $100,000
check did. I asked the judge to hold what is called a "Nebbia" hearing.
Nebbia was a case decided by the Second Circuit Court of Appeals
which deals with a judicial inquiry by the court to determine the
sources of funds when cash is being used so that the court can assure
itself that the money is sufficient to insure that the defendant will
return for further proceedings.
The mere circumstances of somebody posting a large amount of cash
in an anonymous fashion raises questions as to whether or not he will
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
134
flee the jurisdiction of the court. So there is a procedure to have a
hearing. We asked for the Nebbia hearing as well as an increase in
the bond.
The. judge denied our request for an increase in the bond and held
a hearing in winch he allowed Mr. DeGeyter to explain that he would
not flee the jurisdiction, but the judge would not permit me to make
the defendant prove what the source of his funds was.
All we knew is that it was cash.
Senator NUNN. What happened after he was told that you had the
informant or confidential source revealing DeGeyter himself was a
KGB agent?
Mr. GREENBERG. We had a hearing on that. I put on an FBI agent
who related that information to the court.
Senator NUNN. Before he got out?
Mr. GREENBERG. Yes.
DeGeyter took the stand, denied making the statement. The judge
let him go.
In this particular case DeGeyter remained within the jurisdiction
of the court and returned for further proceedings.
Senator NUNN. Are judges reluctant to grant those Nebbia hearings?
Mr. GREENBERG. It has been my experience in the Eastern District of
Virginia that the judges have not been granting our requests for full
Nebbia hearings.
Senator NUNN. Why is that?
Mr. GREENBERG. They don't feel that it is necessary. They really
don't give us a reason for the denials. But the Nebbia hearing is a good
idea. It would be my personal opinion?and the subcommittee might
want to study an amendment to the Bail Reform Act which would
require a judge to hold a Nebbia-type hearing where you have a foreign
national who may flee the United States. That is something you might
want to consider.
Senator NUNN. We certainly will consider that.
We have got a lot of legislation pending on that very subject. I don't
know whether you are finished summarizing or not. We interrupted
you.
Mr. GREENBERG. No; I didn't get very far. I wanted to set forth a
number of points which are in my statement. I will just go through
them quickly.
DeGeyter dealt both in the United States and outside of the United
States through a number of corporations; he primarily dealt with a
corporation called Commercial Engineering and Sales Agency, or
CESA. He listed himself as the president of the TVS Broadcast Sys-
tems. All DeGeyter's corporations, with the exception of two Califor-
nia cntities, which I will mention, are located at the same address in
Belgium.
So we have TVS Broadcast Systems; he listed himself as the presi-
dent of Afrabel, African-Belgium, a corporation from Brussels; man-
aging director of Softelectronics in Brussels, then in the United States
through investigation we determined that he was a partner in a joint
venture called In-Mark Associates, in Irvine, Calif., and another joint
venture called Invitee in Laguna Beach, Calif.
We have heard the testimony of Mr. Maguire. Just in summary, I
would say that DeGeyter constantly upped the ante, if you will, they
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
135
started at $150,000, went to $250,000, talked about $400,000, DeGeyter
finally offered them $500,000. It is absolutely clear from reviewing all
of the evidence, including the transcripts of consensually monitored
conversations, that DeGeyter wanted Maguire to steal from his own
company and from himself a trade secret which we have determined
through discussions with Mr. Maguire was worth about $10 million.
For instance, on July 20, DeGeyter is talking with Maguire and
they are discussing how the payments should be made. He says "Want
a check in Zurich You got it. It's yours. I couldn't care less. I'm not
involved." Later in the same conversation, he says to Maguire, "It's
a one-time shot. No paper, no contract, nothing." Be straight, under
the table. What he was saying was that the source code was going to
Russia, that Maguire's competitors would never know about- it. He
insisted upon having the source code brought out of the United States.
He explained to Maguire that it would be examined or verd by a
Russian computer expert in Brussels, then the tape would be Sent to
Moscow.
Through subsequent investigation we determined that he said on
another occasion that he intended to give the tape either to a Russian
employee at the Embassy in Brussels or to an _Aeroflot employee for
direct transfer to Moscow.
He explained to Maguire that after the source code was verified
he would take Maguire to Switzerland and Maguire could have the
payment in any fashion he wanted it. He could put it in a bank
account, he could have cash, DeGeyter even suggested that he could
arrange for the transfer of land in California.
Anything that Maguire wanted, he would do. He suggested that if
Maguire wanted to, he could even negotiate through Techmashimport,
which is a Russian trade corporation which I will get into later, on
whose behalf DeGeyter said that he was dealing for.
Maguire constantly raised a concern about whether or not this was
a proper thing to do, the export of this source code and whether or not
it, could ever be traced to him. The transcript of one of the conversa-
tions, it is instructive on this point.
On August 7, 1979, there was a conversation between Maguire and
DeGeyter. Maguire says:
This source code, my understanding is that as far as moving something out of
the United States, you know is maybe an administrative technicality. Do you
know about the export licenses and everything? What if you get caught with that
source code?
DeGeyter responded:
I don't think there should be any problem in that. I would then take the whole
responsibility for that. You are not supposed to know where it goes to and what
I'm going to do with it.
MAGUIRE. OK, is there any way they can trace II
DEGEYTER. No.
MAGUIRE [continuing]. Back to us?
DEGEYTER. No, no way whatsoever. There is really no way, nothing. But you
know you have to trust me on it. I am telling you there is no way.
Then he goes on to say they will test it in Brussels and go to Zurich.
There comes a point in time where the negotiations between
DeGeyter and Maguire break down. This is toward the end of 1979.
The transaction is not going to take place. There is an impasse.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
136
On February 4 and 5, 1980, special agents of the Federal Bureau of
Investigation interviewed DeGeyter in his hotel room in New York
and told him that they were investigating possible violations of the
Foreign Registration Act.
Subsequent to that, DeGeyter changed his approach, if you will,
and he goes to an individual by the name of Charles Matheny, who is
in the same office complex as Maguire's software company. Matheny
is president, and chairman of the Board of CENTC, which is a Vir-
ginia corporation. Matheny immediately reports the contact to the
FBI. Like Maguire, he agrees to cooperate with our investigation by
recording conversations and meetings with DeGeyter. DeGeyter uses
a different approach this time. He now says that he is dealing with a
Saudi Arabian sheik, that he has become involved in an Arab bank,
and that they are going to implement a large-scale computer
operation.
Senator NUNN. Was this before or after ABSCAM ?
Mr. GREENBERG. This is before ABSCAM. In fact, there is no Arab
sheik. What he does is he changes his approach in order to mask his
efforts. He wants Matheny to act as a middleman. He wants Matheny
to go out and compromise one of Software's employees and he offers
Matheny a finder's fee, if you will., for doing that.
Matheny and Maguire sit down with the FBI and it is agreed that
an FBI agent by the name of Timothy Klund will pose in an under-
cover capacity as an employee of Software AG. Mr. Klund used his
own name, and posed as a computer expert working for Software.
Thereafter on April 16, 1980, April 18, and some additional dates,
Klund met with DeGeyter at various places in northern Virginia and
the same scenario, unfolds with Klund as had with Maguire. DeGeyter
starts to escalate the price, starting with $200,000, and as Klund indi-
cates his reluctance to go along, we finally have an offer of $500,000.
DeGeyter insists again that the transaction take place overseas. Klund
refuses.
It is finally agreed to meet in New York on May 18, at which time
DeGeyter is supposed to be arriving from overseas with $500,000 in
cash; although he had earlier expressed concern about coining through
customs with that much cash. But he tells Matheny that he will come
with the cash.
In preparation for that meeting, the FBI laboratory produced a
set of dummy computer tapes in order to make the exchange. On
May 18, DeGeyter arrived at JFK International Airport from
Brussels, Klund and DeGevter met. The meeting was surveilled by
other special agents of the FBI. The exchange was made, except in-
stead of $500,000 in cash, Mr. DeGeyter gave the agent a $500 000
check. Subsequent investigation showed that there was only $800 in
that particular account.
Again, a clear intent to steal, even from another thief, the source
code.
DeGeyter was arrested by the FBI and in my statement I set forth
the chronology of subsequent legal
Senator COHEN. Which account was that drawn on?
Mr. GREENBERG. That was drawn, it is attached as exhibit 1, I be-
lieve, to my statement., page 17. It was drawn on the Swiss Credit
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
137
Bank and it is a personal check of Mark DeGeyter. He put a signature
across the front of the check to make it appear to be some sort of a
bank check or cashier's check. But it comes from his personal account
and when we made inquiries with Credit Bank's New York office, they
advised us that at the time of the transfer there was only $800 in the
account.
Senator Nuisrisr. I am going to turn it over to Senator Cohen.
I am going to have to break until 1 o'clock at which time L will come
back and Senator Cohen, if you could finish up Mr. Greenberg, what-
ever you would like to do, Mr. Southard is our next witness. I would
think if you have to leave at that time, it would be better if we could
come back at 1 o'clock for the next witness, Mr. Southard, deputy
district attorney from Santa Clara, Calif.
Just a couple of questions. Was the Commerce Department involved
in an investigation and prosecution of the DeGeyter case?
Mr. GREENBERG. No, Senator. They were not.
As I indicated before, the investigation was predicated first upon a
foreign counterintelligence interest; it then moved into criminal viola-
tions of the Travel Act and Registration Act. The Commerce Depart-
ment does not have jurisdiction under these criminal statutes. They did
not become involved until the plea was taken. The plea included a
provision for the Commerce Department to commence denial pro-
ceedings against DeGeyter.
Senator NUNN. Was the fine as part of the plea that Mr. DeGeyter
was supposed to pay, payable to the Commerce Department?
Mr. GREENBERG. Ultimately, yes. The plea agreement worked out
with the U.S. Attorney's Office, provided that he would pay a $10,000
fine. That was subject to the administrative mechanism of the Com-
merce Department, actually assessing that fine. He deposited with
the U.S. Attorney's Office a $10,000 check, payable to the Treasurer of
the United States. That was done in August. In December the Com-
merce Department formally assessed the $10,000 penalty pursuant to
their administrative regulations and the check was forwarded to
them.
Senator NUNN. So they did collect the money?
Mr. GREENBERG. Yes.
Senator NUNN. After how many months?
Mr. GREENBERG. Between December and?they collected it, I think,
December 24.
The money had been deposited, the actual documents are in my
statement, but my recollection is on or about August 1.
Senator NtrisTN. Did DeGeyter have to have an export license to
operate in the field he was operating in?
Mr. GREENBERG. It is my understanding that the source code would
have required a validated export license. It was not a classified item.
So he would not have needed a munitions control license to export.
But he would have had to check, because licensing is on an item-by-
item basis.
Senator NUNN. If a foreign citizen engages in the export, do they
have to get a personal account for an exporting license? Is he a licensed
export agent ?Js that the way he would be licensed, or is he licensed
at all?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
138
Mr. GREENBERG. I can't answer you directly, Senator.
Senator NUNN. Does the Commerce -Department have any kind of
list of export privileges.
Mr. GREENBERG. It is my understanding they have a published list of
people denied export.
Senator NUNN. For various reasons?
Mr. GREENBERG. Yes, sir. I never examined the list myself. I don't
know the form which it takes. I do know in this particular case, they
intended to put him on the denial list.
Senator NUNN. Do you know if they put him on the denial list?
Mr. GREENBERG. It is my understanding that as of April 22, 1982, he
has not been put on the denial list.
Senator NUNN. When was he co:avicted ?
Mr. GREENBERG. August 1, 1980.
Senator NUNN. That is what, a year and a half later?
MT. GREENBERG. Yes, sir.
Senator NUNN. And he is still not on the Commerce Department de-
nial list as of August 22, 1981.
Mr. GREENBERG. Yes, sir.
Senator NUNN. That means DeGeyter can come back into this coun-
try and begin doing business again, as far as you know?
Mr. GREENBERG. As far as I know, he could come back into the United
States. If he wanted to export something, he would have to apply for
an export license and he is not on the denial list so I assume they would
handle it in whatever procedure they follow.
Senator COHEN. What; if he just wants to steal something?
Mr. GREENBERG. If he wanted to steal something again?
Senator COHEN. Didn't you recommend he be deported from this
country?
Mr. GREENBERG. Yes, sir, I did.
Senator COHEN. What was the response to that?
Mr. GREENBERG. After he completed his sentence in Petersburg, he
was released to an Immigration and Naturalization detainer which had
been lodged because while he was incarcerated, his visa had expired.
I requested that he be immediately involuntarily deported. INS ad-
vised me that because he had been convicted of a misdemeanor offense,
not involving moral turpitude, that he was not required to depart the
country involuntarily.
Senator COHEN. And then reenter the country voluntarily.
Mr. GREENBERG. That is my understanding.
Senator NUNN. What is your experience in dealing with the Com-
merce Department in this whole area? Do you have any observations,
any personal viewpoint on that subject? Are they capable of handling
the Export Administration Act as now charged by law?
Mr. GREENBERG. I don't think I would be the proper one to answer
that, Senator. I just had the one case come up and I am currently
assisting on another Export Act case. I just don't have a sufficient
basis to answer that.
Senator NUNN. We have Justice Department representatives here
this morning. Does the Justice Department have any comment on
whether the Commerce Department is the right agency
Mr. MARTIN. No, MT. Chairman,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
139
Senator COHEN. Let me ask you what your experience is in dealing
with the Commerce Department as to whether the source code was even
on the list?
.No. 1, you were reluctant to prosecute the case under the Export
Control Act, weren't you?
Mr. GREENBERG. The initial decision to charge under the Travel? Act
was made because we felt that at that time it would give us the greatest
charging flexibility. During the course of the investigation, the penal-
ties under the Export Act changed. Part of the penalties changed from
a misdemeanor to a felony.
Senator COHEN. What did you originally charge him with initially?
Mr. GREENBERG. He was initially charged with violations of the
Travel Act which carries a penalty of 5 years imprisonment and/or
$10,000 or both. We felt at that time that gave us the greater flexibility
in terms of proving the case.
Senator COHEN. Why did you avoid proceeding under the Export
Administration Act?
Mr. GREENBERG. At the time the initial decision was made, we had
some concerns about whether or not there was a sufficient factual predi-
cate to show whether or not there was an export. As I say, the law was
changing, it was complex, we had a number of different factors going
at once and we just decided it was best to proceed under a different
statute.
[At this point, Senator Nunn withdrew from the hearing room.]
Senator COHEN [presiding]. Was there any question in the minds of
the Commerce Department as to whether or not the ADABAS source
code was on the list of controlled items?
Mr. GREENBERG. It is my understanding through the FBI, the Com-
merce Department had told us that?in order to export the ADABAS
source code, DeGeyter would have had to have a validated export li-
cense, and they make that determination on an item-by-item basis with-
in the broad rubric of the definition set forth in the Export Adminis-
tration Act which, as I recall, has a definition of technology, and so
they made a determination that the ADABAS source code was high
technology.
So to export it you would need a validated export license. If you look
down the list of things for which you need an export license, you don't
see the ADABAS source code, you see broad categories and then you
have to ask them to make a determination, licensing determination, if
you will.
Senator COHEN. Was there any hesitancy on their part to include the
ADABAS as part of the controlled items?
Mr. GREENBERG. I don't think there was.
Senator COHEN. So from the very beginning they said it was subject
to export license control?
Mr. GREENBERG. That is my understanding. When we in the investi-
gative family finally understood ourselves what the source code was,
the source code as opposed to the object code, the Commerce Depart-
ment indicated to us it would require a validated license.
Senator COHEN. As I understand it, the negotiations broke down on
the place of delivery, that it was to be delivered out of this country
rather than in this country. Obviously you had been in touch with Mr.
95-929 0 - 82 - 10
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
140
Maguire to be sure he hesitated and refused to go along with that
aspect.
Why is that so?
Mr. GREENBERG. Once we decided that it should be pursued as a
criminal matter we made a determination that it would be necessary
to arrest him in the United States because if he left the United States,
we would then have to. deal with the problems of extradition; and
extradition would depend upon which country he went to and what
he was charged with. It is time consuming, and costs a lot of money to
get somebody back. The offense was complete when they met at the
airport and when the money was exchanged for the tape, we just de-
cided to arrest him at that time rather than chase him over Europe.
Senator COHEN. I think it has been said this morning that our export
laws are fairly outdated in view of today's level of technology. Spe-
cifically, it is very difficult to detect microchips. So assuming we create
a new Office of Strategic Trade, assuming we put the control for in-
spection in the hands of the customs officials, assuming we enhance our
inspection personnel at all exit points, what are the chances of those
personnel detecting something as small as this or the tape in the case
of Mr. Maguire?
Mr. GREENBERG. It is my understanding from talking with Maguire
and other computer experts that it would be virtually impossible for
anybody to detect the information contained in the computer tape
being taken out of the country. Obviously, if on exit from the United
States, a border officer opened the briefcase and saw the tape, he would
know that it was a computer tape, but he would have absolutely no
way of knowing what was on the tape. Even if he put the tape on a
computer, it still would have only shown him a series of numbers.
Senator COHEN. You seized some other items in Mr. DeGeyter's
possession indicating ties with the Soviet Union. What were those
items?
Mr. GREENBERG. I will submit Xeroxed copies to the subcommittee.
We seized, pursuant to search warrant, numerous items from his brief-
case. One including his Belgium passport which had a Soviet visa in it
which showed that he was traveling to the Soviet Union for commer-
cial purposes; that the agency sponsoring him was the "Ministry of
Internal Technology, Technical Machine Import," located in Moscow
and that it was valid until May 11,1980.
In addition to that, we found a number of telexes in his possession
mostly to an individual known as Bolshakov. in the Soviet Union.
Our understanding is that the telexes were directed to Techmash-
import.
For example, one of the telexes is,
Money has been received by my bank this morning. I need the money for
Item 6 as agreed in Switzerland no later than May 5th in order to guarantee
the replacements May 11. Best regards, Marc.
Another of the telexes sent to Mr. Bolshakov, read,
Dear Sir, due to the holidays your embassy will provide my visa only by May
14. I will arrive in Moscow on May 19. Hope to catch you for dinner as usual.
Best regards, Marc.
These were all in the time he was dealing with Maguire and Ma -
theny. Another telex, again to Bolshakov,
Dear Sir, 60 kilo samples will arrive May 15, flight."
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
- 141
And he lists the flight number.
Freight to be paid by you. Best regards, Marc.
July 24, 1979, again to Bolshakov.
Dear sir, after my last visit to the supplier, could you agree to accept ilex
week? Release 3.1.4 regarding Item 4? Please confirm. Best regards.
And then there is one additional one, as I recall.
? We also seized from him a copy of a contract in English between
his company, CESA, on the one hand, and Techmashimport in Moscow
on the other hand, and it called for the delivery of certain pieces of
computer equipment. We seized from him what appears to be a credit
document from the Swiss Volksbank showing that on March 19, 1979,
in Zurich there was on deposit for his use $450,000 U.S. money.
We also seized from him what he called a "delivery acceptance
protocol" dated April 11, 1979, showing that certain items were de-
livered to Russia and that he was to be paid $250,000 for that.
We also seized from him a number of airplane tickets which con-
firmed his travel to Moscow. In fact, one dated April 15, 1980, showed
travel, Moscow to Vienna to Brussels to New York and to Washing-
ton.
Senator COHEN. Do you believe he was, in fact, a KGB agent?
Mr. GREENBERG. We will never know that, sir. All we know is what
the documents
Senator COHEN. I am just wondering. It seems to me kind of incon-
sistent, frankly, that any agent would be carrying these documents in
his possession.
Mr. GREENBERG. We know he was in contact with the Russians and
with this particular corporation. Exactly who or why they asked him
to get these items we were not able to discover.
Senator COHEN. What have you done with respect to the other com-
panies that are listed as his contacts?
Mr. GREENBERG. In going through his papers there were a number
of other corporations we discovered, in particular six.
Senator COHEN. Would you identify them?
Mr. GREENBERG. Tritel Corp. and Flair Leasing, formerly Compu-
file in Irvine, Calif. During the time of our investigation, DeGeyter
approached them and wanted to purchase what is called a Rolm,
R-o-l-m, computer which has been identified to us as a military specifi-
cation computer which is embargoed from export. He also wanted to
purchase a microprocessor chip, and was known by that company to
buy such things over the counter in cash, no sale was completed.
He approached Systems Magnetic Corp. in Anaheim, Calif., and
wanted to purchase from them magnetic tape recorders which we have
been told are used for satellite information retrieval. Each one of these
recorders sell for $90,000-some odd dollars. The sale was not completed
because the company was unsatisfied with his credit references.
He also approached a Keronix Corp. in Los Angeles, Calif. He ap-
proached Corland Corp. and Pay Television Corp. Both of those com-
panies cooperated. They immediately advised the FBI, cooperated in
our investigation and provided us with a taped conversation of a
meeting.
He also approached the Industrial Machinery Division of Pas-
sauant Corp. in Birmingham, Ala. That was for the purchase of a
magnetic tape slotting machine. My understanding is the corporation
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
142
did sell that machine to the Soviet Union and one of their officials
traveled to Moscow and met with Techmachimport officials. DeGeyter
was not present at the meeting but received a fee. He also approached
the Intel Corp. in Norwich, Conn., and requested permission from
them to represent their corporation at a trade show in Moscow; they
declined.
Senator COHEN. With respect to each of those companies, I assume
you have since contacted them to alert them to further attempts by
people other than DeGeyter in contacting them for access to their
technology?
Mr. GREENBERG. Yes, sir.
Senator COHEN. In your dealings with those particular companies,
did DeGeyter indicate he was acting on behalf of the Soviet Union?
Mr. GREENBERG. He indicated he was acting for Techmashimport.
He was quite open about telling everybody that he was working for
this Russian corporation. What he made clear to Maguire, and I think
it is instructive, is that if Maguire did not deal with him, there would
be somebody else right behind him; somebody else coming along, and
dealing for the Russians, who wanted to buy the same things. De-
Geyter was saying, essentially, look, you might as well deal with me
because there is going to be somebody, next place, next time.
Senator COHEN. What seems too brazen about it all, why didn't he
just say he was representing a Belgium corporation or a Polish com-
pany or a Hungarian subsidiary?
MT. GREENBERG. I think what he wanted to do, especially with the
ADABAS code, about which he was talking about something that was
a priority item. It was clear there was no way Maguire was going to
release that thing in such a fashion so that it might fall into the hands
of his competitors. By playing upon the fact that he was taking it be-
hind the Iron Curtain, over to the Eastern Bloc, he sought to assure
Maguire that he didn't have to worry about it. I think that was his sell-
ing point. Look, fellows, you don't ever have to see this stuff again.
They are just going to use it over there and nobody will know about it,
because if it was thought it was Leing sold to one of -Maguire's com-
petitors, it is clear a deal wouldn't even have been a possibility.
Senator COTTEN. That is what I mentioned before about the cynicizan
being so deeply rooted that they would even approach it on this basis,
sell out your country to beat out your competitor.
Tell me quickly about the Techmashimport, is it? Are they regis-
tered with the Justice Department and bow does that operate?
Mr. GREENBERG. Yes, sir. Techmashimport is registered under the
Amtorg Trading Corp. The Amtorg Trading Corp. serves as an
umbrella for approximately 45 different Russian corporations.
Amtorg's head office is in New York City. Their most recent registra-
tion statement was filed in April 1974. That has been reported in the
Attorney General's submission to the Congress.
Techmashimport is listed on its registration statement as a foreign
trade corporation which imports equipment and machines of various
types. We can submit a copy of the registration statement.
Senator COHEN. Just for my own edification, are these private com-
panies or are they arms of the state?
Mr. MARTIN. They are Soviet corporations.
Senator COHEN. What does that mean?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
143
Mr. MARTIN. Corporations are independent entities formed under
the Soviet law, but for all practical purposes, they are formed by or
under the auspices of some of the ministries, the Ministry of Trade,
Ministry of Finance.
Senator COHEN. I was under the impression that accumulation of
capital wealth was not permitted in the Soviet Union.
Mr. MARTIN. I don't think they are capitalistic oriented, Senator.
They are entities for the purposes of carrying out business, such as the
export-import business.
Senator COHEN. But on behalf of the Soviet Union?
Mr. MARTIN. On behalf of the Soviet Union.
Senator COHEN. So, in fact, any company doing business with this
particular Soviet corporation or any one of the 46, whatever, should
be put on notice, in fact, they are doing business on behalf of theSoviet
State?
Mr. MARTIN. That's correct.
Senator COHEN. Those are all the questions I have, gentlemen. I am
just determining whether we need to hold you for any private briefing
of the staff or members on the plea bargaining aspect.
I am advised at some future time we would like to have the briefings
as far as the aspects involved in the plea bargaining but that won't be
necessary this morning.
The subcommittee is going to stand in recess until the hour of 1
o'clock.
[Whereupon, at 12:23 p.m. the subcommittee recessed, to reconvene
at 1 o'clock the same day.]
ATTER RECESS
[Member present after the taking of recess: Senator Nunn.]
Senator NuNN. The subcommittee will come to order.
Our next witness is Mr. Douglas Southard, deputy district attorney,
county of Santa Clara, Calif.
We appreciate you being here today. We appreciate all of your
help and all of your splendid work in this very important area.
I followed it with interest through the staff for some time. We
swear in all of our witnesses. So if you will hold up your right hand,
do you swear the testimony you will give before this subcommittee
will be the truth, the whole truth, and nothing but the truth, so help
you God?
Mr. SOUTHARD. I do.
TESTIMONY OF DOUGLAS SOUTHARD, DEPUTY DISTRICT ATTORNEY,
COUNTY OF SANTA CLARA, CALIF.
Senator Nuisrx. Thank you.
You have a statement.1 We will ask you to proceed.
Mr. SOUTHARD. Thank you, Senator.
My name is Douglas K. Southard. I am deputy district attorney for
the county of Santa Clara, Calif. I have been employed by the district
attorney's office, the chief prosecuting agency in that county, for a
period of 5 years. Prior to that I practiced general civil law for a
See p. 475 for the prepared statement of Douglas Southard.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
144
period of 2 years in a small law firm in the county. I am a graduate
of Stanford University with a degree in philosophy, and of Hastings
College of the Law, the University of California, having attained a
J.D. degree in 1975.
Like many people in law enforcement, I have no technical back-
ground in the area of semiconductor manufacture or electronics in
general, but have, of necessity, learned some of the basics of the indus-
try which was necessitated by my involvement in high-technology-
theft prosecutions.
In the district attorney's office, I have been assigned for a period
of 31/2 years to felony prosecutions. For the last 2 years, my primary
assignment has been high technology thefts, including trade secrets
thefts, integrated circuit thefts, electronic equipment thefts and the
investigation and prosecution of related criminal conspiracies.
In learning the technical necessities of this area, I have been greatly
assisted by numerous people in law enforcement and in the industry
itself; and particularly, have received training and assistance from
Intel Corp., Signetics Corp., National Semiconductor, Synertek Corp.,
Hewlett-Packard Corp., and the NBK Corp.
Investigation agencies with whom I have closely worked investigat-
ing and prosecuting these cases primarily have been the organized
crime and criminal investigation section of the Santa Clara County
Sheriff's Office, the Federal Bureau of Investigation, and the Santa
Clara County Police Department, with notable assistance from the Los
Angeles and Orange County Sheriff's Departments, U.S. Customs
Service and the Department of Commerce.
The preeminent police expert on these matters in our county is De-
tective Patrick Moore of the sheriff's office.
In the last 2 years, we have investigated literally scores of tech-
nology-related theft cases, resulting in numerous convictions, but also,
sadly, numerous unsolved thefts or thefts wherein the property was
never recovered.
Like you, we in local law enforcement are very concerned with the
national security implications of .the technology thefts that we have
seen. However, as our expertise Is in the field of investigating and
prosecuting these crimes, and not in the international ramifications
thereof, I will limit myself in my comments to the problem as seen by
the local investigator and prosecutor and some suggestions as to where
law enforcement has to go to help stem the tide.
Senator NUNN. I know we have Mr. Wu in the room. He has co-
operated with our staff. He was scheduled to be our witness. The prob-
lem is we have got to get out of this room at 1 :30. That means we will
not have another witness today.
I also understand the Justice Department has problems with cer-
tain questions that we had planned to ask Mr. Wu. For that reason,
I think what we will do is just put his statement in the record and we
will dismiss Mr. Wu from being a witness today or in this hearing.
Senator NUNN. We do appreciate your being here. We appreciate
your patience in waiting. I didn't want you to have to wait around
to no avail. I understand Mr. Wu just walked in. I was just saying
he was scheduled to be our next witness. We have got to give up. this
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
145
room at 1 :30. Therefore, we will not have time to have but one wit-
ness and I understand .also the Justice Department had certain prob-
lems with questions we planned to ask Mr. Wu, particularly some of
his personal opinions.
I don't want to put him in an untenable position. This was contrary
to what my understanding was as far as his testimony. I think it is
also contrary to what we had discussed with the Justice Department
officials.
Nevertheless, I don't want to put Mr. Wu in that position. We will
put his statement in the record and we will not need him as a witness.'
Mr. MARTIN. Thank you, Mr. Chairman.
Mr. SOUTHARD. Senator, I assume that the subcommittee might like
to have some technical information regarding semiconductors devices.
I have included in my written statement the brief overview of the
processes.
For present purposes, however, I will omit that discussion. I would
however like to present to the subcommittee for their inspection a
board showing the brief example of the different types of materials
which are used in the integrated circuit manufacturing process.
I also have a photograph about 100 times magnification of a stand-
ard integrated circuit memory chip. I would point out to the Senator
the particular integrated circuit package that is in the bottom center
of that board. Significant numbers of these were stolen in a recent $3
million theft in Santa Clara County. Those particular parts are spe-
cifically made for military application.
The integrated circuit was invented in the late fifties and is a
uniquely American development. It was first marketed in 1961 com-
mercially and now the sales worldwide of this type of device are over
$5 billion per year.
Continued development of integrated circuit memory chips have
reduced the cost of information storage in computers 100-fold in the
last 10 years.
In the late 20th and early 21st centuries, integrated circuitry will be
as basic to industrial society as steel was in the 19th and early 20th
centuries. Leadership in this technology will be vital to any nation
who would seek to be a world leader of economic and military power.
In the wake of this new technology has sprung an industry centered
in what has come to be known as Silicon Valley, that is, Santa Clara
County, Calif., which is amongst the most fast moving and competi-
tive in the world.
An individual who can build a better electronic mousetrap using
this technology has potential immediate access to great wealth and
recognition. Companies oftentimes spring up overnight based on one
good idea and sometimes die just as quickly when that idea is overcome
in the marketplace.
In fact, the leading semiconductor manufacturers in this country
and in the world are often companies which didn't exist 15 years ago.
Now some are billion dollar corporations. 17p to now, in my view,
the rapid growth of these companies have prevented a proper assess-
ment of their security operations and has caused a substantial lag in
public and official appreciation of the national security implications of
the new technology.
2 See p. 510 for the prepared statement of Theodore Will Wu.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
146
According to the available evidence, in the past 5 years alone, a con-
servative estimate is that $100 million or more in electronic technology
and product has been stolen in the Santa Clara alone. We in law en-
forcement have only recently almost stumbled over the problem. At
the .time we were not totally prepared to deal with it. Now we are
beginning to make some headway.
Most of the thefts that we are talking about are perpetrated by or
with the assistance of employees. Cases we handle involve technicians,
inventory clerks, draftsmen and engineers. Quite commonly, security
personnel are involved. They steal circuit designs, process informa-
tion, precious metals and the chips themselves. There is also increasing
propensity finished goods such as computer disk drives and desktop
computers.
The modes of thievery are many. Sometimes burglary is resorted
to. Sometimes truck highjackings or even armed robberies. The most
common fashion is merely to walk out the door of one's company with
a tape or a set of glass plates upon which a chip designed is etched or
the chip themselves in one's coat.
The interesting thing here is that with, for instance, the reticles or
computer tapes, which depict these circuit designs upon them, a com-
pany or country which has not developed the technical expertise to
actually design these products effectively from scratch, such as Eastern
Europe, can get them by theft where otherwise, they would not be able
to make them at all.
The most common problem we have is much more crude and direct,
however, and this is the employee taking things out in his lunch bucket,
in the lining of the jacket or whatever. He sells to a marketplace which
has come to be known as the gray market. He can sell these parts that
are stolen from 5 to 50 cents on the dollar to numerous fly-by-night
independent distributors operating out of low-rent office suites, their
homes or even the back seats of their cars.
Usually, no questions are asked.
As often as not, the buyer purchasing the stolen parts is otherwise
respectable appearing businessmen. He uses his business as a front for
criminal activity or just cannot pass up the opportunity to make some
fast money.
In one recent case, in Santa Clara County, resulting in the convic-
tion of two persons, an u:ndercover officer offered to sell a local distribu-
tor purportedly stolen Intel memory chips which were in very high
demand.
The officer flat out told the businessman these chips were stolen.
After snapping up the parts for $10,000 in cash, which is the common
method of payment, the defendants in the same day shipped these
parts via air freight to Werner Bruchhausen, the nortorious interna-
tional chip broker.
The principle in this particular case is no back alley crook. He.is
the handsome three-piece suited president of a successful parts dis-
tribution firm and, all in all, a very typical American success story.
Yet here he was selling stolen integrated circuits to an internationally
known fence. The reason is the same as always, greed. Greed has
spawned what we think of as the gray market and to understand, I
think, briefly, we will talk about the hierarchy in electronics commerce.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
147
In between the manufacturer and the end user are middlemen.
Usually we are talking about franchised distributors which are rep-
utable firms dealing directly with the manufacturers but beneath the
franchise directors has grown a market populated by the independent
distributors.
They obtain their product either from a company which manu-
factures it when a surplus occurs or from franchised distributors or
even end users when they have surplus parts.
What is created by this system is an "anything goes" marketplace
where, especially in times of high demand and short supply, such as
occurred in the 1977 to 1980 time frame, speculation runs rampant.
It's really no different from pork belly futures. Brokers buy large
quantities of parts at fire sale prices, hoping to be able to turn them
over quickly if a need is found elsewhere. Numbers of these people
made a lot of money doing just this sort of speculation during the
parts shortage of 1977 to 1980.
An example of the gray market is a case which has been success-
fully prosecuted recently. This is the case of Larry E. Lowery. Larry
Lowery first came to the attention of law enforcement in January
1978. In that month an employee of TAM Electronics, a distributor,
was observed to steal $100,000 worth of late model circuits and trans-
port them to one, David Henry Roberts. Roberts in turn delivered
them to Lowery's house. Because of a series of miscues by law enforce-
ment, he escaped prosecution. But, again, in 1979, Roberts, the
middleman here was rearrested and convicted for two integrated cir-
cuit thefts. Again, he named Lowery as his instigator and fence but
the police were able to acquire evidence other than Robert's statement
with which to prosecute.
In April 1980, an undercover investigation was initiated which
ultimately led to the arrest of Lowery in the search of his premises.
Over 11,000 stolen integrated circuits valued at between $100,000 and
$150,000 was seized. Legwork and forensic examination disclosed that
the records that Lowery kept relating to his acquisition of these parts
were entirely phony. Handwriting experts determined that in fact
all the records were authored by the convicted thief, David Roberts.
While the prosecution was pending and just prior to a preliminary
i
hearing in the matter, a key witness n the prosecution was lured out
of his home, attacked and severely beaten.
Later on, the eve of the jury trial, Roberts himself, then under
subpena by the prosecution, was murdered execution style and his
body dumped in a shallow grave in the Santa Cruz Mountains.
Lowery was convicted in November 1981. Notwithstanding his
sentence to prison, however, while he was still out on bail pending
sentencing, another theft occurred from Monolithic Memories, Inc., in
Sunnyvale, Calif.
That theft occurred over Thanksgiving weekend in 1981?$3.4
million worth of late model high tech integrated circuits were stolen,
including a great number of the samples that you see on the board
before you. Senator.
Many of these circuits were specially designed units with direct
military applications. In all, about a ton of boxed, first line parts were
taken, necessitating at least two truckloads to make off with all the
booty.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
148
Ultimately, three subjects were arrested and evidence was seized
implicating both Lowery and his partner, Larry Kizer.
There was insufficient evidence to charge Kizer or Lowery.
The parts themselves have not been located or recovered and frankly
it is feared they have been already transported overseas, most likely to
a European location. It is worthy of note that Lowery had reportedly
bragged to associates of his .that he was the biggest fence in northern
California and the evidence suggests he also made new European con-
tacts with which to market his goods.
To date, the trial of investigation in this case is littered with dead
bodies, assault, sophisticated thefts, drug sales and more. Scores of
criminal conspirators appear to be involved. It represents the largest
case of consistent, habitual, organized criminal activity aimed at
Silicon Valley.
Another case worthy of note involves some characters already men-
tioned before to the subcommittee.
John Henry Jackson is a five-time convicted felon who, for the last
3 or 4 years, has been the proprietor of a P.C. board "stuffing" house
and aspiring computer maker, with a parts brokerage business in the
Santa Clara area.
Around November 1979, again, around Thanksgiving time, Intel
Corp., a maker of the state-of-the-art type products, suffered a million
dollar theft of approximately 10,000 units. These were state-of-the-art
memory devices in very high demand throughout the world at that
time.
After the theft, corporate inevstigators had no leads as to how these
items had been stolen but shortly thereafter, it came to their attention
a large number of these products had surfaced in Germany.
Specifically, Siemons A. G. of West Germany, a hugh electronics
manufacturer, and one of Intel's best customers, had apparently just
received a large shipment of 10,000 parts which were established to be
the stolen parts.
Siemons purchased approximately 10,000 parts from E.V.B. Corp. of
Munich, West Germany. E.V.B. received the parts from two sources,
Republic of Virginia, here in Arlington, Va., and another parts
broker, Mormac, Inc. of Torrance, Calif.
Each of these companies in turn purchased their portion of parts
from Space Age Metals in Los Angeles who obtained it from John
Jackson.
Luckily an employee of Jackson's came forward spurred in part by
continuing revelations in the press regarding the seriousness of the
stolen chip problem. The witness told, in a period of less than 11/2 years,
of having counterfeited tens of thousands of integrated stolen circuits
for Jackson, primarily, Intel products.
With the cooperation of this informant, an undercover operation
was instituted and eventually Jackson and one of his associates were
arrested. His associate had been an Intel employee.
Concurrent with these arrests, extensive search warrants were pre-
pared and served on various parties. In one business letter discovered
at Space Age Metals, a Republic vice president told a Space Age offi-
cial that he was amazed at the quantity and price of this product that
was being offered, given their scarcity in the marketplace, but that he
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
149
wanted to close the deal and was not stupid enough to ask any dumb
questions.
The Jackson case points out the difficulty of proving knowing receipt
of stolen circuits, once we do uncover the theft case.
Although business records of the affected companies did indicate
transactions among them and the particular kind of product involved,
it is impossible to prove which particular items they sold to one another
and, therefore, the chain of circumstantial evidence is very strained.
The recordkeeping systems employed by the brokers are not suffici-
ently specific to be able to trace the particular part, nor are knowing
thieves likely to keep such records.
Another aspect of the theft problem which is potentially much more
serious for national security purposes is the trade secret thefts, since
such thefts provide the very means of obtaining the technology upon
which to establish an industry and develop competitive expertise. I
have heard authoritatively stated that the United States at one time
possessed a 10-year lead over the Soviet Union in microelectronics
technology, but that that lead has already shrunk to maybe 5 years
based primarily on the easy access the Soviets have to our technology.
I am not in a position to attest to the veracity of that proposition
but certainly what I have seen would not negate it. By their very na-
ture, trade secret theft is the most difficult type of theft to detect and
solve. What is taken is generally not a physical thing, but an idea.
Original documents, computer tapes, reticles, masks and technical
drawings can be easily copied by any number of photographic or
electronic means without anything corporeal ever being taken.
Hence, nothing is missed.
California, at least, is among the few States who have a criminal
trade secret theft statute. I set it forth in my statement but won't
repeat it here. I think it important to note a statute makes it a crime
either to take an article representing a trade secret or copy an article
representing a trade secret. It also makes it a crime to offer a bribe in
order to obtain a trade secret.
Unfortunately, very few States have criminal trade secret theft
laws.
I discovered that most of the Western States in this country where
significant semi-conductor and defense plants exist, have no trade
secret laws whatsoever.
I think this is a serious deficiency which perhaps can be addressed by
legislation.
An example of a trade secret theft case of some importance is the
case of Peter K. Gopal. Peter K. Gopal first came to the attention of
industry security personnel in approximately January 1978, in con-
nection with National Semiconductor Corp.'s unauthorized possession
of a computer data base tape containing the design for a late model
Intel microprocessor chip.
After an inconclusive investigation, the matter was put on the back
burner. Thereafter, however, in September 1981, one Andrew Moore,
an independent manufacturer's representative, indicated in conver-
sations to a national semiconductor employee that he represented a
principal who owned the original Intel design information available
for sale. The national employee immediately contacted his superiors
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
150
and law enforcement authorities and an investigation ensued. During
undercover negotiations, Gopal indicated that he had past and con-
tinued access to proprietary Intel design via insiders within Intel
Corp. He stated he already sold his designs in Europe and customers
were quite satisfied with their performance and authenticity.
The undercover operation culminated in late September with
Gopal's arrest during a sale of Intel chip designs. Search warrants
were prepared and served leading to the seizure for Gopal's business
premises of hundreds of computer tapes, masks and other design
materials for Intel, National, Semiconductor, Zilog, and other
corporations.
The values of the items seized ran well into the millions of dollars.
Some of the items seized were still in the research and development
stage, and had never been marketed by their owners.
Also seized were personal and business record of Gopal's indicating
trips to Europe in 1977 and 1978, including trips to the Soviet Union
and Poland.
Business cards of numerous Soviet consular level and ministry offi-
cials dealing in technology exchange and purchase were found. I won't
try to list them all because they are contained in my statement on
pages 40 and 41. I will note there are two individuals there named
Pavlov, which is the same name mentioned yesterday. One card bears,
in Gopal's handwriting, the phrase: "Terms of contract negotiation."
Business records seized also indicated continuing international
transactions between Gopal and Austrian and Swiss firms. The pri-
mary Austrian firm, Sacher-Gesellschaft AG, of Vienna Austria,
was headed by Dr. Rudolf Sachem. He was also a one-half shareholder
with Gopal in Gopal's business, Semiconductor Systems, Interna-
tional, Inc. Subsequent investigation of the Swiss firms indicated they
were probably nothing more than shell corporations, serving as mid-
dlemen for the transactions in which they were involved. Efforts to
track the course of the transactions past the Swiss firms were fruitless.
Gopal has refused to cooperate with the authorities.
The investigation continued after Gopal's arrest, however, and a
business associate was located who told authorities that Gopal bragged
of having purchased certain integrated circuit testing equipment and
selling it to Poland via one of his Swiss intermediaries.
A check of business records confirms Gopal indeed acquired the
equipment in question and sold it, but it's ultimate purchaser could
not be determined,
My understanding is the Department of Commerce, after an investi-
gation, concluded that it was unable to prove a violation more serious
than a misdemeanor for which the only penalty was suspension of
export licensing privileges.
By that time, Gopal had been blackballed in the industry and his
license matter was rather moot.
Senator NUNN. Did Gopal ever go to jail?
Mr. SOUTHARD. He was convicted after a 6-month-long court trial.
He was sentenced to 2 years, 8 months in a State prison in California.
I might note his prosecution was unusually difficult. Neither the
prosecution nor defense was willing to risk a jury trial because the
issues were so complicated.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
151
At one point a judge threw out most of the physical evidence because
the police officer serving search warrants were so ignorant as to what
they were looking for they had to take technical people along with
them just to identify what was stolen and what was not. Thankfully,
the court of appeals reversed that, but the complexity of the case ne-
cessitated, for instance, actual court hearings and testimony being
taken in the computer room at National Semiconductor. We had to
adjourn and go to the massive rooms filled with computers just to view
the evidence.
He was sentenced to 2 years, 8 months in State prison. He is, how-
ever, currently free on bail pending appeal which does not seem to
be terminable in the foreseeable future. After a year and a half, the
court reporter hasn't even finished making the transcript.
I have addressed the suggested responses, some suggested responses
in my written statement, Senator. I won't reiterate those here except to
mention generally it is the feeling of myself, as a representative of the
law enforcement community in Santa Clara County, that we need in-
creased investigative personnel in export regulatory agencies and the
FBI to help us.
These matters are matters which are international in scope And just
are not appropriately dealt with by a local sheriff's office with its
limited background and limited resources.
I also believe the creation of a national regional high technology
crimes task force or at least the information clearinghouse would be
quite valuable in this context.
Senator NUNN. Do you agree with Dr. Baker's general suggestion
there or did you hear him testify?
Mr. SouTHARD. I did hear him testify and found his testimony very
enlightening and I do agree with his suggestion; yes.
I have also suggested a system of mandatory crime reporting which
would be similar to what currently exist in banking law as something
that might be helpful. I have noticed a reticence on the part of some
manufacturers to become involved in law enforcement.
Also, electronics broker regulation is a subject I think that should
be investigated, and the possible enactment of Federal trade secrets
laws to complement the Secrecy Acts, the Espionage Act. These, of
course, are suggestions on my part seen from my perspective. It is for
the subcommittee to put all the pieces of the jigsaw puzzle together
and come up with its recommendations.
Thank you.
Senator NUNN. Thank you very much. You have been helpful and
have a very impressive record in law enforcement particularly in this
area.
From what I am told, you have had probably more experience in
this area than most Federal people.
Mr. SOUTHARD. Unfortunately, I think that is true ? yes.
Senator NUNN. You are saying there really is clearly a Federal role
that is beyond the scope of what local law enforcement officials can
handle?
Mr. SOUTHARD. Absolutely. For instance, in the Jackson case, which
is still pending, if we were really going to go all the way to prove out
the chain of evidence, tracing the parts from Germany back to their
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
theft source in California, it would require the exhaustion of entire
witness budget of my county for the whole year.
Frankly, the public, who is more concerned about violent crime,
doesn't want us chasing all over the world after white-collar crime.
Senator NUNN. Why would the mandatory crime reporting you sug-
gest be needed for the national clearinghouse? What would be the
advantage of this?
Mr. SOUTHARD. It is just a matter of gaining intelligence
information.
What we have found since we started an active investigative role,
which includes sting operations and continual undercover monitoring
efforts, is you have to establish patterns here and there to know what is
going on. I think it and mandatory crime reporting help us to estab-
lish patterns, recognize who the real thieves are, and therefore, estab-
lish priorities for enforcement.
Senator NUNN. How valuable and necessary is it for prosecutors,
Federal and State, to have a technological background when prosecut-
ing these advance technology type cases?
Mr. SOUTHARD. For someone in my position, it is not, certainly,
absolutely necessary. It might be desirable. I certainly would not have
the technological background. What you will find, however, is that
industry, once aroused, is very interested in helping and will provide
all of the training that is really necessary to understand what is basi-
cally a new vocabulary.
Senator NUNN. The general thievery amounted to $100 million in
the last 5 years in Santa Clara County from high technology firms?
Mr. SOUTHARD. That is correct.
.Senator NUNN. How much of it would you estimate comes from
foreign sources trying to gain access as opposed to just cutthroat,
unscrupulous competition of stealing secrets from competitors?
Mr. SOUTHARD. Frankly. I think most of the kind of thing over
which our county has jurisdiction comes from normal street level
thieves and a hierarchy of brokers who are criminally involved.
The important thing, however, is this provides a mode of acquiring
products for illegal export.
We have seen it on numerous occasions. Mr. Bruchliausen. for in-
stance, who was previously mentioned, had contact with three of the
people I previously mentioned.
Mr. Gopal was concerned almost exclusively with overseas export of
technology.
Senator NuNN. When you look at the overall problem. wouldn't it
be more effective to have a concentrated law enforcement effort at the
source, that is, at the manufacturer's level, rather than at the borders?
Mr. SOUTHARD. Obviously that would seem the simpler solution. We
have given a lot of criticism to industry in terms of the lack of self-
policing they have done. However, these products are designed for
the marketplace. They are going to get out into the marketplace one
way or the other. Therefore, if there were more security guards on the
doors of the manufacturers it wouldn't help.
We need an effort to keep these from going over the borders.
Senator NUNN. Is there any way businesses and companies can be
notified about people like Gopal, whose activities are known to law
enforcement and many times are not known to businesses?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
153
Mr. SOUTHARD. I think this is where the central clearinghouse or
task force idea will come in handy.
Of course, they can be notified. They have to be, discreetly. They
are not, so far as I know, on any regular basis.
Senator NuNN. What suggestions would you make to high tech-
nology businessmen who are patriotic and want to protect national
security?
Mr. SOUTHARD. I think we have seen some such businessmen testify
before this subcommittee.
You have got to question about the validity of the firm you are
dealing with, especially a foreign firm. Go to the FBI, ask questions.
The FBI has recently sought to publicize their efforts in this problem
in our particular area by putting up billboards similar to the World
War II type of thing about the walls having ears.
Senator Nuivrr. When you mentioned having an electronic broker's
license, what do you think the resistance level would be to this in
terms of business people saying this is just another Government
regulation, and so forth?
Mr. SOUTHARD. I'd sympathize with them if they said that. On the
other hand, the legitimate brokers are already doing business in a
proper fashion. I don't believe it would be unduly negatively influ-
enced by that kind of legislation.
What I am proposing is nothing different than the type of control
that is almost everywhere already imposed upon pawnbrokers. You
have to identify it as an area which is a type of enterprise which is
particularly easy to abuse. Once you have done that, I think you can
rationalize the controls.
Senator NuNisr. How does law enforcement have any way of protect-
ing lmowhow ? That being a very special part of what America has
today that the Soviets don't have, how in the world can you devise a
law enforcement mechanism or codify an overall approach to protect-
ing knowhow ?
Mr. SOTJTHARD. I don't know that law enforcement activity in that
particular area is what is most needed. In that particular area,
on-site
security by the manufacturers should be effective and, in fact, know-
how or trade secrets tend to be more closely guarded than actual phys-
ical product because you can insure the physical product against
theft. You can't insure the know-how. But the type of organization
proposed by Dr. Baker, I think, would be very helpful in giving the
Federal law enforcement community the appropriate technical input
to understand whether know-how is really involved.
Senator NuNN. Do you think the companies in the Silicon Valley
area are aware of the military significance of what they are developing
in most cases?
Mr. SouTHAan. I think somehow subliminally they are aware of it.
Frankly, most of the market is the commercial market.
Recently one of the leading minds and figures in the area, the vice
president of Intel was asked about that particular question, and his
basic response was, "Hey, we're in the chip-making business. That's
the Fed's problem to worry about where it goes afterwards." I was
kind of surprised at his relatively callous answer there, but I think
that may be somewhat representative of the field.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
154
Senator NUNN. What would the Soviet Union have done with the
technology Gopal was stealing? How would it be useful to them?
Mr. SOUTHARD. Nothing he had had direct military application.
The same kind of chip that can be used in a Pacman game can also
be used in a cruise missile. What was interesting about what he had
was lie had very voluminous design information about current memory
and microprocessor chips. What he had, if possessed by somebody else
with the appropriate equipment and process information that is the
chemical process type of magic that goes into making these chips?if
you had those two precursors and designs, you could have gone into
immediate mass production of these chips and modified them for spe-
cific military use.
Senator NUNN. You have been involved in this area a good bit. Have
you had any contact or liaison with the Commerce Department?
Mr. SouTHARD. Only with respect to the Gopal case. They sent an
agent out for a few days who went through records in my files. Evid-
ently he also made trips to Europe investigating the case, but they
were unable to find a felony violation.
Senator NuNN. Have they encouraged you to coordinate with the
internal information when you have it in this area?
Mr. SOUTHARD. There has been no encouragement other than this
one agent. There has been no communication officially other than that.
Senator NUNN. Mr. Southard, we really appreciate your good work
in this area. You are a credit to law enforcement; you are a credit to
prosecuting attorneys. You have been a great help to our subcommittee.
We appreciate the summary you gave considering the time elements
we were working against here today. We hope you will continue to
keep in touch with us and give us the benefit of your views.
Mr. SOUTHARD. I certainly will.
Senator NUNN. Thank you very much.
Mr. SOUTHARD. Thank you, Senator.
Senator NUNN. Tomorrow morning at 9 :30 we will resume the hear-
ing. At that time we will hear from the Honorable James L. Buckley,
State Security Assistance, Department of State; Edward O'Malley,
Assistant Director, Intelligence Division, Federal Bureau of Investi-
gation; Arthur Van Cook, Director of Information Services, Depart-
ment of Defense, Chairman of National Disclosure Policy Committee;
William Von Raab, Commissioner, U.S. Customs Service, accom-
panied by Mr. George Corcoran, Assistant Commissioner.
We will resume these hearings at 9 :30 a.m. tomorrow.
[Whereupon, at 1 :42 p.m., the subcommittee recessed, to reconvene
at 9:30 a.m., Thursday, May 6, 1982.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
THURSDAY, MAY 6, 1982
U.S. SENATE,
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
OF THE COMMITTEE ON GOVERNMENTAL AFFAIRS,
Washington, D .0 .
The subcommittee met at 9:30 a.m., in room 3302, Dirksen Senate
Office Building, under authority of Senate Resolution 361, dated
March 5, 1980, Hon. Sam Nunn presiding.
Member of the subcommittee present: Senator Sam Nunn, Demo-
crat, Georgia.
Members of the professional staff present: Eleanore J. Hill, chief
counsel to the minority; Katherine Bidden, chief clerk; Gregory Bald-
win, assistant counsel to the minority; Jack Key, Glenn Fry, and Fred
Asselin, staff investigators to the minority; and Kathleen Dias, execu-
tive secretary to the minority chief counsel.
[Senator present at convening of hearing: Senator Nunn.]
Senator NuNN. The subcommittee will come to order.
[The letter of authority follows:]
U.S. SENATE,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
Washington, D.C.
Pursuant to rule 5 of the Rules of Procedure of the Senate Permanent Sub-
committee on Investigations of the Committee on Governmental Affairs, permis-
sion is hereby granted for the chairman, or any member of the subcommittee as
designated by the chairman, to conduct open and/or executive hearings without
a quorum of two members for the administration of oaths and taking testimony
in connection with hearings on the transfer of U.S. high technology to the Soviet
Union and Soviet bloc nations, to be held May 4, 5, 6, 11, and 12, 1982.
WILLIAM V. ROTH, Jr.,
Chairman.
SAM NUNN,
Ranking Minority Member.
Senator NuNN. Senator Roth is going to be coming in later this
morning. He asked me to go ahead and begin the hearings.
Mr. Secretary, we are delighted to have you this morning returning
to the Senate. We are pleased to have your associates.
If you plan to have testimony from all three of you here today, I
will ask all of you to rise and take the oath. We swear in all of our
witnesses before the subcommittee.
Do you swear the testimony you will give before the subcommittee
will be the truth, the whole truth, and nothing but the truth, so help
you God?
Mr. BUCKLEY. I do.
Mr. JOHNSTON. I do.
Mr. BRYANT. I do.
95-929 0 - 82 - 11
(155)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
156
TESTIMONY OF JAMES L. BUCKLEY, UNDER SECRETARY OF STATE
FOR SECURITY ASSISTANCE, SCIENCE AND TECHNOLOGY, DE-
PARTMENT OF STATE, ACCOMPANIED BY ERNEST JOHNSTON,
DEPUTY ASSISTANT SECRETARY OF STATE FOR ECONOMIC AND
BUSINESS AFFAIRS, AND CLYDE BRYANT, CHIEF, SUPPORT SERV-
ICES DIVISION, OFFICE OF MUNITIONS CONTROL, STATE DEPART-
MENT
Mr. BUCKLEY. Thank you, Mr. Chairman.
I will be the only one giving the statement, but Mr. Clyde Bryant on
my right is thoroughly familiar with the munitions control apparatus
and Mr. Ernest Johnston on my left is familiar with some of the
technical details of Cocom.*
Senator NUNN. Good.
I know you have a statement, so we will be delighted to receive it.
Mr. BUCKLEY. Mr. Chairman, it goes without saying that I am de-
lighted to have this opportunity to testify on the role of the State
Department in controlling the transfer of militarily critical tech-
nology to the Soviet Union and the Eastern bloc. Whatever the record
of prior administrations, Republican as well as Democratic, it is clear
that this administration has placed a very high priority on improving
the effectiveness of the executive branch in enforcing export controls.
It has launched important initiatives which we believe will greatly
improve their overall effectiveness while sharpening the focus on
those elements of advanced technology and process know-how which
are of the most critical importance to the Soviet bloc.
We freely acknowledge that much more needs to be done; and we
are actively working with other agencies to improve coordination over
a range of issues.
It will take time, however, for all these efforts to take hold in
particular areas, especially because of the large amount of new data
that has had to be gathered by various agencies.
In your letter inviting me to testify, you asked the State Department
to respond to six specific questions. I have done so in the attachment
to my prepared statement, which I would appreciate your including
in the proceedings.
Senator NUNN. Without objection, they will be admitted into the
record as if read.1
Mr. BUCKLEY. National security export controls are a basic element
in overall U.S. policy toward the Warsaw Pact countries.
To put it plainly, these controls are a recognition of the fact that
the global objectives of the Soviet bloc are inimical to our own, and
threaten every value for which our Nation stands. Therefore, it is sim-
ply harmful for us to provide those nations with Western, militarily
useful technologies, to be turned against us.
As most of these sensitive technologies are not within the sole con-
trol of the United States, it has been essential from the outset to achieve
among the major Western industrialized powers fundamental agree-
* COCOM stands for Coordinating Committee for Multi-Lateral Export Controls?to
which Japan and all NATO countries except Iceland belong.
1 See p. 533 for Secretary Buckley's prepared statement with attachments.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
157
ment as to what technologies are militarily critical and how their
transfer to the Soviet bloc should be controlled.
The instrument that has been developed for this purpose is the co-
ordinating committee for multilateral export controls, or "Cocom"
to which Japan and all NATO countries, with the exception of Ice-
land, belong.
Cocom was created in 1949 by informal agreement among its mem-
bers, and has thus been in existence for more than three decades.
Cocom has three major functions:
The first is the establishment and updating of lists of embargoed
products and technologies. Although Cocom lists are not published,
they become the basis for the national control lists administered by
each member government. The member governments are now prepar-
ing for a major review of these embargo lists, which will begin in
October.
Second, Cocom acts as the clearinghouse for requests submitted
by the member governments to ship specific items to specified end users
in the proscribed countries. ( The Cocom-proscribed countries are the
the Soviet Union, the other Warsaw Pact countries, China, and the
other Communist countries in Asia.)
Third, Cocom serves as a means of coordinating the administration
and enforcement activities of the member governments.
The Cocom lists set up fairly specific limits on the technical char-
acteristics above which member governments agree that they will pro-
hibit exports to proscribed countries, unless Cocom itself approves
exceptions.
In agreeing to a national request to export items on one of the con-
trol lists, Cocom works on the principle of unanimity. No application,
in short, is approved if any member state objects.
One of the evolved strengths of Cocom is that in over 30 years of
operations, there have been very few cases in which a government has
exercised its sovereign right to go ahead with exports over Cocom
objections.
Senator NUNN. Mr. Secretary, when you say no application, in short,
is approved if any member state objects. Does this mean that no tech-
nology is left off the excluded list?
In other words, there is no restriction unless everybody agrees, or
does it mean just the reverse?
Mr. BUCKLEY. It means once a technology is on the list, any one
member nation has a veto over its transfer to a proscribed country.
Senator NUNN. I see. So it is really a veto that protects the export of
technology?
Mr. BUCKLEY. That is right.
Senator NUNN. One country can block all the rest.
Mr. BUCKLEY. With respect to those items on the list.
Senator NUNN. The crucial thing is what is on the list?
Mr. BUCKLEY. Exactly, yes.
This self-discipline is all the more remarkable given the absence of
any treaty or executive agreement undergirding the organization.
Over those decades, Cocom has generally been successful in inhibit-
ing the overt flow of strategic technology to our adversaries.
During the 1970's, however, in the honeymoon days of detente, the
United States and the West relaxed controls over a number of em-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
1
bargoed commodities. It was believed that wide-ranging trade would
somehow alter the international behavior of the Soviets and moderate
their military investment.
During this period, the United States went from being the least, to
the most frequent, seeker of exceptions to multilateral controls. Cocom
itself came to reflect such attitudes, and exceptions to the embargo
were allowed to thrive.
We now know this was a mistake. During the period of detente, the
world stood witness to the greatest military buildup in history, along
with the increased Soviet adventurism that grew out of an increased
self-confidence.
The Reagan administration came to power 15 months ago deter-
mined to stem the flow of the technology that the Soviet Union and its
Warsaw Pact allies were using to improve their already vast warmak-
ing capabilities. It was clear that the West's crucial qualitative edge
in military systems was being undermined by the Soviets' increasingly
aggressive efforts to buy or steal our militarily relevant technologies
and equipment.
More precisely, we saw this well-orchestrated acquisition program
giving the Soviets:
First, a very significant savings in time and money in their military
research and development programs;
Second, rapid modernization of their defense industrial infrastruc-
ture;
Third, the opportunity to accelerate the closing of gaps between our
weapons systems and theirs; and
Fourth, the chance to develop, with alarming speed, neutralizing
countermeasures to our own technological innovations.
As a consequence, the administration has initiated efforts to fill in
gaps in the multilateral export control system. At the Ottawa summit
meeting last July, President Reagan raised the problem of Western
technology transfer to the Soviet Union. An agreement at Ottawa to
consult on this issue culminated in a high level meeting in Paris dur-
ing January, the first ministerial level Cocom meeting since the late
1950's. The other Cocom governments have asked that the results of
that meeting be kept confidential, as indeed are all Cocom proceedings.
I chaired the U.S. delegation to that meeting, however, and I can
say that there was a concrete consensus that the member governments
should increase their effort to improve Cocom effectiveness. We have
been encouraged by what appears a new and more constructive atti-
tude of other Cocom governments, and feel that this meeting forms a
basis for a revitalization of the Cocom system.
Such a revitalization will take much hard work and it will take time,
among other reasons because Cocom depends on the national adminis-
tration of controls by 15 individual governments. But some specific
steps are under way. Effectiveness, for example, requires precise defini-
tions of many complex technologies. We have made progress toward
agreement on a number of specific, technical proposals in this area to
tighten the embargo.
Second, the United States is now working on proposals that will ex-
pand Cocom control lists of new priority industries. These include
gas turbine engines; large floating drydocks ; certain metallurgical
processes; electronic grade silicon; printed circuit board technology;
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
159
space launch vehicles and spacecraft; robotics; ceramic materials for
engines; certain advanced composites; and communications switching
and computer hardware and software technology and know-how.
This process will continue into the triennial Cocom list review, which
will take place this October, when a general reappraisal of everything
on the control lists will take place.
Senator NUNN. Who is actually doing this reappraisal for our gov-
ernment, for instance? What group of people carry out our national
input into that process?
Mr. BUCKLEY. We have the military, of course, and we also had a
tremendous input from the intelligence services who are examining
new concepts of what is really critical, what are the choke points, and
what is it that the Soviets are most anxious to have. We also have a
great deal of cooperation from industry in helping us in this process.
Senator NUNN. Is there a central clearinghouse on this ? Is there
one location that everything feeds through, or is it a rather, diffused
effort?
Mr. JOHNSTON. No, sir. We have something called the Economic
Defense Advisory Committee which is chaired by the State Depart-
ment. Under this committee there are 12 technical subcommittees de-
pending on the kinds of products that we are talking about, that is
where the decisions will be made on exactly which products we will
try to have added to the list.
Senator NUNN. Are those people State Department employees?
Mr. JOHNSTON. Some of them are.
The chairman of the organization is. But there are members of the
Defense Department, the Commerce Department, and the intelligence
community.
Senator NUNN. So the central location is in the State Department,
but you are bringing in other agencies on that?
Mr. JOHNSTON. That is right.
Senator NUNN. Is that both for the items on the export control list
as well as export arms control list?
Mr. JouNszoN. No. The arms control list is controlled by another
section of the State Department. That is done essentially in collabora-
tion with the Defense Department.
Senator NUNN. So this is a group that deals with the
Mr. JOHNSTON. Export Administration Act.
Senator NUNN. Export Administration?
Mr. JOHNSTON. Right.
Mr. BUCKLEY. We have also developed workable proposals for har-
monizing the export licensing procedures of the 15-member states so
as to make Cocom decisionmaking more efficient. What we are seeking
are ways to bring national enforcement practices to a level of equal
effectiveness. These two matters will be addressed at a special Cocom
meeting which will convene in Paris later this spring?and the fact
that all partners have agreed to that special meeting is testament to
our shared goals.
We have been cooperating with our Cocom allies to improve
enforcement and investigative capabilities of illegal diversions.
The State Department, working closely with our intelligence and
investigative agencies, has been channeling appropriate information
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
160
to other governments to alert them to potentially illegal activities
within their borders. We have also encouraged them to increase the
investigative resources and the sanctions available for export control
enforcement. Commerce, and in turn customs, have detailed officers to
the State Department to support this overseas compliance effort.
Cocom has thus, we believe, made measurable progress toward
strengthening strategic export controls since this administration came
into office. But it is also clear that the continuing revitalization process
will be long and hard.
In attempting to strengthen controls on strategic exports to the
Soviet Union and the other Warsaw Pact countries, we are faced with
the perennial problem of securing agreement with all the other Cocom
allies on just where to establish the technical cut-offs for commodities
and technologies under embargo. 'Determining in many scores of dif-
ferent technical areas what is sufficiently strategic to warrant control
is not an easy task. We do not always agree on what are militarily
critical technologies, yet the purpose of the organization is limited to
such technologies. Members exercise considerable care to avoid con-
trols whose principal impact would be economic rather than military,
and each has its own views and perspective.
Western European and Japanese economies would generally speak-
ing, be affected more than the U.S. economy by sweeping controls
on manufactured products. But such differences between ourselves
and our Cocom allies should not be over-emphasized.
We should remember that our allies have cooperated with us for
over 30 years to control significant amounts of equipment, material
and technologies through Cocom. That is, first and foremost, because
we share a common belief that such controls constitute an important
element in our mutual defense.
As you know, the State Department is also responsible for adminis-
tering munitions export controls which cover defense articles and
services. Munitions are not approved for export to Warsaw Pact
countries. Accordingly, the main issue in administering these controls,
relate to security concerns and our foreign relations with other
countries.
Your letter of invitation mentions that, in an executive branch more
effectively organized to shape and enforce export control policy. you
envisage a principal and expanded role for the Department of State.
We too, envisage such a role for the Department.
Upon taking office, this administration undertook a full review
of our policy concerning the transfer of strategic technology to the
Soviet Union and the other Warsaw Pact countries.
The State Department was a major participant in this review,
which culminated in the Cocom high 'level meeting. The State Depart-
ment led our delegation to that meeting. Since then, on a number of
other occasions, senior officers at the State Department have discussed
with our allies security concerns related to technology transfers.
We are persuaded that improved allied cooperation on sensitive
technology transfer issues is a realistic objective. There will, of course,
continue to be some differences on the details of controls and their
application to individual cases. But, with hard work to identify
clearly and to justify persuasively what needs to be controlled, and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
101
how controls should be enforced and administered, such differences,
we believe, will be the exception rather than the rule.
Senator NUNN. Thank you very much, Mr. Secretary.
We also appreciate your furnishing the material answering specific
questions at the end of your testimony. We will study this with great
care as we come up with any recommendations we may make for
improvement.
I have a few questions I would like to pose to you and I will be glad
for you to farm them out here in the particular area of expertise.
I will direct them to you. You handle it from there.
Are you generally satisfied with the level of cooperation we are
getting from Western Europe and Japan in high technology area
today?
Mr. BUCKLEY. Yes; we are.
One thing that we sensed was a really heightened awareness of the
part of those countries as to the impact of technology purchases on
actual military capabilities. And I would give high credit for that to
briefings conducted by the CIA at the various Cocom capitals, in which
highly classified detailed information opened lots of eyes to the impact
of technologies to which people were not paying any attention. I think
that has had the effect of increasing cooperation to a very significant
degree.
Senator NUNN. Is it necessary for the United States to always be a
leader in this respect? I am sure we want to be. But let's assume, for
instance, we get rather sloppy in our administration. Have we had any
instances of cases where the allies came to us and said, "Look, you are
transferring technology which we think is useful in military applica-
tion by the Soviet Union and we want you to crack down," or is it
always the United States who has to save our allies?
Mr. BUCKLEY. My institutional memory is rather short, in this case,
15 months. I do know I can speak of one ally, I can't give names, be-
cause of the Cocom ground rules, that has begun to take on a role of
leadership in these areas. The United States, I think, historically has
been the key. But Ernie, do you know of other instances?
Mr. JOHNSTON. It is essentially the United States. I think that is
right.
This subject comes up primarily in the review that we conduct. There
we have also had suggestions from other countries about items that
ought to be added to the list.
Senator NUNN. In other words, you could say it is a pretty general
rule that based on historical experience that export controls are not
going to be any tighter in any of the countries than they are in the
United States?
Mr. JOHNSTON. I think that is generally true.
Senator NUNN. We are the leader and we are going to have to con-
tinue to lead?
Mr. JOHNSTON. That is right.
Senator NUNN. The State Department is not a law enforcement
organization in the usual sense. When administration of the Arms
Export Control Act was handed to the State Department, why did
the Department give enforcement to the Customs Service?
Mr. BUCKLEY. First of all, customs is an organization in place with
the people at all the points of export. Second, there is a rather easy
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
162
means of communication between bureaus and that is to require that
licenses that are issued be filed at the relevant customs office before
the actual shipment has taken place, and this facilitates the ability
of customs to match the documents against what is being exported.
Senator NUNN. What is the relationship between the Export Admin-
istration Act, which regulates nonmilitary-type technology, and the
overall Arms Export Control Act? Do you have two separate groups
of people dealing with that all together?
Mr. BUCKLEY Yes.
Mr. JOHNSTON. Yes. The Defense Department and the State Depart-
ment work together to decide what goes on the munitions list. This is
something defined, if you will, as an instrument of war or something
which is related directly to making war. However, there is always a
series of goods which could have a dual use. They can have a civilian
application, or they could have a military application for example,
computers. These are the main things controlled by the Export Admin-
istration Act.
Senator NUNN. Of coarse, Commerce is responsible for that?
Mr. JOHNSTON. Yes, sir.
Senator NUNN. How much input does the State Department have
with Commerce regarding the Export Administration Act?
Mr. JOHNSTON. On the list of strategic ffoods, which is essentially
what we are talking about, the Defense Department and the State
Department work very closely with the Commerce Department.
The Secretary of Commerce has the final authority, but the Defense
Department and the State Department work very closely both in re-
gard to deciding what gets on the list and what the licensing policy
ought to be.
Senator NUNN. The munitions list has to consider certain gray areas,
I am sure.
Mr. JOHNSTON. I would like to ask Mr. Bryant, who is our expert on
munitions.
Mr. BRYANT. In compiling the U.S. munitions list, we, the Depart-
ment of State, consult with the Department of Defense as required
by Executive order, to determine what should be on the munitions list.
There are occasions when there are debates as to whether or not a
specific item is on the list. The determination, generally speaking, is
made on the basis of what that item was specifically designed to do.
Senator NUNN. When you examine that munitions list, do you go in
the gray area, things that are really not what we would call conven-
tional munitions, but which do involve high technology?
How much overlap is there between the Export Administration list
and the munitions list?
Mr. BRYANT. There should be no overlap at all, either an item is con-
trolled under the Export Administration Act or it is controlled under
the Arms Export Control Act. In certain fields, particularly military
electronics, the basic technology involved in both civil and military
electronics may be the same.
For example, computer chips and the integrated chips are both used
in military and nonmilitary items. When incorporated into a military
item, the chips take on the characteristics of that item. The chips
themselves, when exported, are not subject to our control, unless spe-
cifically designed for inclusion in a military item.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
163
Senator NUNN. When you are getting your munitions list, your
arms export list, do you have feed-in from the Defense Department?
MY. BRYANT. Yes sir.
Senator NUNN. I.343 you have feed-in, from some of the intelligence
agencies?
Mr. BRYANT. Yes, sir.
Senator NUNN. The State Department makes the final decision?
Mr. BRYANT. That is correct, sir.
Senator NUNN. In the Export Administration Act, the Commerce
Department makes the final decision?
Mr. BRYANT. I have to defer to Mr. Johnston.
Mr. JOHNSTON. Yes, sir, except that I do think there is a pretty close
collaboration on a subject like this. The three agencies are working
very closely together.
Senator NUNN. Do the Defense Department and the State Depart-
ment both have a feed-up and input into Commerce on that?
MY. JOHNSTON. Yes.
Senator Nuisrx. Does the division in the State Department that deals
with the munitions list have a feed-in to the Commerce Department in
terms of the export list?
Mr. JOHNSTON. If an item is taken off the munitions list, and occa-
sionally there are bills in Congress which do this, we pick them up on
the list that is administered by the Department of Commerce.
Senator NUNN. What group in the State Department feeds into the
Commerce Department in terms of the Department's final decision-
making on the export control list?
Mr. JOHNSTON. It is the Bureau of Economic and Business Affairs.
Senator NiaNN. That is a separate group from the group on the
munitions list?
Mr. JOHNSTON. Right.
Senator NUNN. You say the Bureau of Economic Affairs?
Mr. JOHNSTON. Yes.
Senator NUNN. Does that group also feed into the Cocom delibera-
tive process?
Mr. JOHNSTON. Yes.
Senator NUNN. The same group?
Mr. JOHNSTON. Yes. It is essentially the same. It is the same office.
We have an Office of East-West Trade which devotes, I would say,
probably 75 percent of its efforts to this.
Senator NUNN. The State Department does not try to enforce the
Arms Export Act as such. You make the decision about what goes on
the list and then you leave the enforcement up to customs; is that
right?
Mr. JOHNSTON. That is correct.
Senator NUNN. The State Department does not have investigators
go'ng around to determine if compliance is taking place?
Mr. BRYANT. No, sir. Whenever we receive an allegation of willful
wrongdoing, we refer the allegation to the U.S. Customs Service for
investigation.
Senator NUNN. How does that work? Is that working well?
Mr. BRYANT. We find that that is working quite well.
Senator NUNN. Do you find any disadvantage, any big disadvantage
in having the enforcement of the Arms Export Control Act under
customs whereas the licensing is under State?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
164
Mr. BRYANT. No, sir. Rather we find it an advantage. Willful viola-
tions are investigated much more rapidly, we think, than would be
the case if we were doing our own investigations.
Senator NUNN. In other words, you think you are getting along
well with that divided kind of responsibility?
Mr. BRYANT. We think the coordination between the two offices is
excellent, sir.
Senator NUNN. What level of technical expertise do you need in
licensing at State in that function, in the Arms Export Control Act?
What kind of person and background do you have to have in that
function
Mr. BRYANT. The licensing officers are generalists, sir. We draw
upon the technical expertise of the Department of Defense whenever
we have questions as to the level of technology of an item.
Senator NUNN. Is there a certain group in the Department of De-
fense that you look to for that?
Mr. BRYANT. We have a central office to whom we refer everything
and then they refer out to the various services as the need arises.
Senator NuNN. So you do not try to provide all the technical experts
in the State Department and you have people with broad policy-type
experience?
Mr. BRYANT. No; in the Department of Defense we can draw on
defense research and engineering and the technical expertise in the
services.
Senator NUNN. Do you have a computerized operation in your muni-
tions function?
Mr. BRYANT. The present system is to some extent computerized and
we are now in the process of installing what is called a data-based
management system computerizing our whole operation.
Senator Nu-NN. When will that be operative?
Mr. BRYANT. It is hope that will be operative before the end of the
fiscal year.
Senator NUNN. What will that do for you?
Mr. BRYANT. Any application coming into our office will be assigned
a number, as it is now. That application enters through a terminal into
a minicomputer, and is tracked throughout its whole period of time in
the office where it is, what is being done with it, what problems may
have arisen with regard to that particular application and when it goes
out, what action we took with regard to that application and why.
Senator NUNN. What number of applications would you handle on
your munitions control, say, in a year?
Mr. BRYANT. 36,000.
Senator NUNN. That would be the gross number that you look at?
Mr. BRYANT. That would be the gross number of all types of
applications.
Senator NUNN. Of the gross number, how many different items will
end up being on the munitions list?
Mr. BRYANT. Approximately 95 percent of them, perhaps higher
than that.
We deal with a very small community.
The applicants come to us generally speaking, knowing that the item
that they are seeking to export is on the U.S. munitions list.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
165
Senator NuNTN. What does a manufacturer do if the item is not on
the munitions list? What is the difference in what they have to do if
it is on the list and if it is not?
Mr. BRYANT. If it is not on the U.S. munitions list, that he goes to
the Department of Commerce to seek authorization for export.
Senator NUNN. Then that would get into their function on licensing
export?
Mr. BRYANT. That is correct.
Senator NuNN. If it is on the list, they have to go through the State
Department?
Mr. BRYANT. They have to go through the Department of State.
Senator NUNN. What about the operation in the Bureau of Economic
Affairs? Is that computerized?
Mr. JOHNSTON. We do not really computerize the operations that we
do. I should explain to you that the Department of Commerce receives
very large numbers of license applications. I do not have the number,
but I think it is in the neighborhood of 50,000 to 60,000. They do not
call all of these cases to the attention of the State Department or to the
Defense Department. There are criteria which are set down and only
if those criteria are met are those license applications furnished to one
or the other Department. Accordingly, the number of specific licens-
ing requests that we look at is small compared to the number that the
Department of Commerce receives.
Senator NuNN. Has the State Department generally been able to
work well with the Customs Service in coordinating enforcement
efforts under the Arms Export Control Act, both in this country and
abroad?
Mr. BUCKLEY. Yes; we have.
As I mentioned in my testimony, they have assigned people to us
abroad. All of these mechanisms, of course, are under review to make
sure that we get the most effective enforcement possible.
Senator NuNN. Is the United States requesting many exceptions
from the Cocom list?
Mr. BUCKLEY. We have an odd phenomenon. Because the Commerce
Department put in a very special effort to clean up the backlog, we
have a bubble of items before the Cocom at the present time. This is
compounded by the fact that where we are most competitive in our
trade with the Soviet Union and in the Eastern bloc is in some of the
high technology level of dual uses, particularly the computer area.
So combining these two factors, we have a large number of excep-
tions relative to the number of cases that are up for discussion.
I would say this, though, that we do not ask for an exception except
where we have very good evidence to our satisfaction that it has. a
commercial end use and we have the knowledge that these items will
not be used for military purposes.
Senator NuNisr. Have we approached Cocom for any exceptions since
the Polish crisis came up?
Mr. JoHNsToN. Yes; we have, but not for the Soviet Union.
Senator NUNN. What countries are involved? Or is that a confiden-
tial matter?
Mr. JOHNSTON. No; it is not.
The Cocom control list applies to the Soviet Union, to the European
Communist countries, with the exception of Yugoslavia, and to China.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
166
We have approached the Cocom for exceptions in regard to those
countries other than the Soviet Union.
Senator NUNN. Briefly what countries are included in the restric-
tions for Cocom? In other words, if you have got a list of things that
Cocom agreed to, what countries are excluded from being able to
receive those items?
Mr. JOHNSTON. The countries to which the Cocom directs its efforts
are the Soviet Union, the Eastern European countries, China, and I
believe the other Asian Communist countries.
Senator NUNN. Those are the ones that are on the restricted list?
Mr. JOHNSTON. That is right.
Mr. BUCKLEY. Albania, North Korea, Vietnam, Kampuchea, and
Mongolia.
Senator NUNN. Do we have any agreement in Cocom on any non-
Communist country?
Mr. BUCKLEY. They are all Communist.
Senator NUNN. So the question of shipping goods to Libya, coun-
tries of that nature, would be strictly a national decision?
Mr. JOHNSTON. That is right.
Senator NUNN. Where is that national decision made on those kinds
of shipments?
Mr. JOHNSTON. The Export Control Act has three grounds for
refusing to let goods out of the United States. One is for strategic
purposes, and those are the items that we have been talking about.
Those are directed mainly toward the Communist countries. The sec-
ond is short supply, if we decide that we need a good to stay in this
country because we don't have enough of it. That is another possi-
bility. The third is for foreign policy reasons. It is the foreign policy
controls which you are talking about with respect to Libya. In those
foreign policy controls we have got a number of subdivisions. One is
if there is a regional problem because of some military activity that is
going on; the second one is human rights controls, if we think that a
country has not been behaving as well as it should on human rights:
a third is terrorism control.
Senator NUNN. Mr. Secretary, if you had to point out two or three
weaknesses in our present policies that you are most concerned about,
how would you list those? What areas of improvement are you most
concerned with?
Mr. BUCKLEY. I think that there is room for improvement in coordi-
nation and we are working on that. In fact, just yesterday we had a
meeting of a number of involved agencies, to address precisely those
questions. There are 12 different agencies in the Government involved
in this area, 42 groups. And a lot of them are very specialized.
We need to have a better idea of what each one of us is doing.
Another area, and this is what I had in mind when I referred to
some of the inevitable delays, is in having a better idea of what really
is critical. One of the dangers we have to avoid is that we put too much
into these lists. Then you have two things: First, you splinter time for
enforcement; second, you raise resistance on the part of our allies. An
innovative industrialist such as Fred Bucy of Texas Instruments has
been very useful in emphasizing the importance of things like manu-
facturing processes, not the goods, but how the devil do you make those
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
167
goods?right. We have asked our intelligence services to focus in these
areas and also to focus on the techniques by which the Communists
sniff out what we are doing. Here is another area of a more precise
definition of what it is we should be controlling. Finally, an area we
have under discussion is the person to person transmission of ideas and
technologies, the visitors who come to this country and attend univer-
sities, and so on.
There is the leakage that comes out of businessmen going around
the world, not being conscious of how precious their concepts are. So
I think this is another area where we have to come up with procedures
and mechanisms for enforcing policies; in heightening the understand-
ing of the American manufacturing community and foreign manu-
facturing communities of the dangers of leakage through observation
of manufacturing processes and also trying to figure out that delicate
line between pure academic, research, science, and applied scien-te in
the potential military area. This thought leads me to a final area
where I think we have yet to come to grips with sufficient precision;
that is, identifying the emerging technology that usually starts out
with the commercial use but nevertheless predictably will have mili-
tary applications.
Senator NuNic. There was a suggestion earlier in the week in our
hearing by Dr. Lara Baker of Los Alamos that a group of technical
experts away from Washington could serve as a strictly technical non-
policy clearinghouse where everything could channel through there in
terms of technical questions without any reference to policy. I know
that there are some people in the intelligence and defense communities
doing that. I am not certain where that should be housed. There was
a strong opinion it ought to be done away from Washington so it
doesn't get caught up in the Department of Defense policy versus the
Department of State policy, or the Commerce policy on export versus
the others.
That is an idea that ought to be looked at. The feeling was there
wasn't any one central clearinghouse for technical expertise, not that
they would all be housed there, but that they would serve as the focal
point for that.
The estimate was it would take about 20 professional people and
about $5 million a year and that an awful lot of the expertise would
already be there in working in other areas.
There also was a suggestion made by Dr. Lara Baker exactly what
you just alluded to, that we ought to spend more time narrowing down
the list of what is critical to the Soviet Union; in other words, sort of
reverse engineering espionage efforts so that we would have a much
narrower list and try to do what we do well, rather than trying is
con-
trol too much and not controlling anything well. I think that s what
you are saying.
Mr. BUCKLEY. Yes.
Senator NUNN. I would bring that suggestion about one central
clearinghouse on technical information to your attention.
Mr. BUCKLEY. I would appreciate that.
Senator NUNN. I am not looking for another agency, but it might be
the voice for any policymaking kind of persuasion. DOD always is
willing to take a more restrictive approach. That is their job. Corn-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
fierce is going to take a more export-minded approach, which is nat-
ural. That is the business they are in. The State Department is going
to look from the foreign policy aspects.
All of these agencies, as good a job as they do, are very much in-
volved in the policy type application.
I would throw that out for your consideration.
Mr. BUCKLEY. It is a very interesting idea. We should follow up on
it.
Senator NUNN. Mr. Secretary, I want to thank you and your asso-
ciates for being here this morning. We appreciate the good job you
are doing. I know that this administration is very much concerned
about the policy in this area.
The purpose of these hearings is not so much to determine policy, but
rather to determine how it is we carry out that policy and how does the
Government work once the President makes his pronouncements.
One of the interesting things we had early in the week was a pretty
thorough examination of the Commerce Department's own internal
numbers of people dealing in each one of these agencies. They are try-
ing to revoke the license and enforce the law with a very small number
of people. Another thing you would find of interest is that after former
President Carter announced the grain embargo, the people responsi-
ble for going out and investigating violations and pursuing those
totaled one person in the Department of Commerce. Interestingly
enough, I guess it follows that having one person involved in that
whole investigative effort that there was 100 percent compliance, ac-
cording to the statistics. No one violated the grain embargo.
Mr. BUCKLEY. I think, Mr. Chairman, that this last, area is one that
ought to be looked at, the resources to do the job.
Senator Nuicx. Thank you very much.
Our next witness is Mr. Edward J. O'Malley, Assistant Director,
Intelligence Division, Federal Bureau of Investigation.
Mr. O'Malley, we swear in all witnesses before our subcommittee.
Would you hold up your right hand?
Do you swear the testimony you will give before the subcommittee
will be the truth, the whole truth, and nothing but the truth, so help
you God?
Mr. O'MALLEY. I do.
TESTIMONY OF EDWARD S. O'MALLEY, ASSISTANT DIRECTOR,
INTELLIGENCE DIVISION, FBI
Senator NuNN. We know you have a statement. We will ask you to
proceed with that.
Mr. O'MALLEY. Thank you very much, Senator.
I appreciate the opportunity afforded me to appear before you today
to review the FBI's role and responsibilities in the area of technology
transfer.
As you are aware, we covered some of this ground in our previous
correspondence with you. I will expand on those issues and respond to
any other specific questions you may have concering the FBI's role.
My responses and comments here today will, of course, be unclassified.
Much of the counterintelligence activity we engage in to counter the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
109
activities of the hostile intelligence services to acquire our tecnology
is classified. Therefore, to be more specific and responsive to your
interests, I have furnished to you certain written comments which are
classified.
We, in the intelligence community in general and in the FBI in
particular, are acutely aware of the legitimate concern of the various
congressional committees in this area of technology transfer and ap-
preciate the efforts you are expending to bring these concerns out
front and before the public.
We hope that by the additional exposure of this issue through these
public hearings the magnitude of this problem will be more fully
understood.
Basic to the understanding of this issue is the need to recognize and
acknowledge the nature of the U.S. society?a free and open society.
It is within the framework of this openness that the FBI must operate
to counter the activities of the hostile intelligence services to acquire
U.S. technology.
Our counterintelligence activities are conducted in accordance with
a recently signed Executive order?E.O. 12333?and within the frame-
work of the Attorney General guidelines which are currently being
revised.
There is nothing contained within the parameters of those two docu-
ments which adversely affects our ability to carry out our counter-
intelligence responsibilities. Being a law enforcement agency, our agent
personnel are thoroughly trained in the judicial process necessary to
successfully prosecute a case.
We realize the importance and necessity of obtaining sufficient evi-
dence to prosecute a case if that, in fact, is the ultimate objective of
a particular counterintelligence investigation. Prosecution resulting
from a counterintelligence investigation would normally be under the
espionage statute. Though the espionage statute does not stipulate that
only cases involving classified information can be prosecuted, legal
precedent has established such a requirement.
Diplomatic immunity, of course, precludes prosecution; therefore, in
those counterintelligence investigations involving officials with immu-
nity the counterintelligence objective against such officials would prob-
ably be to have the subject declared persona non grata.
Naturally the elements of proof for such action are not as stringent.
There are, of course, benefits other than prosecution and personal non
grata action that accrue from other counterintelligence investigations.
These include the identification of intelligence officers, their agents and
contacts, modus operandi of the hostile intelligence services, and their
targets?all meaningful counterintelligence objectives.
The Soviets correctly view the United States and several other West-
ern countries as a continuing source of important and openly available
scientific and technical information, to which they take every opportu-
nity to obtain access.
Some of the unclassified documents so acquired are previously classi-
fied materials which had been declassified through U.S. procedures pro-
viding for automatic declassification after a stipulated period. When
collected on a massive scale and centrally processed by the Soviets, this
information becomes significant because it is collectively used by Soviet
weapons designers and weapons countermeasures experts.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
170
The Soviets also regularly attend high-technology trade shows and
visit commercial firms in the West, particularly small- and medium-
sized firms that are active in developing new technologies. These ap-
parent trade promotion efforts often mask Soviet attempts to acquire
emerging Western technological know-how before its military uses
have been identified and Government security controls have been ap-
plied. Emerging technologies are particularly vulnerable to foreign
collection efforts of this type.
Because of the ease by which unclassified technology and proprie-
tary information is obtained, the gain is very substantial. Soviet ac-
quisition efforts are massive, involving many Soviets traveling outside
the Soviet Union.
Literally thousands of Soviet bloc persons enter this .country each
year?trade delegations, students and other academic exchange par-
ticipants, diplomats, and seamen--and all have the potential to collect
information/technology, most of it open source and unclassified.
Those efforts are well rewarded and in an open society such as ours
there will undoubtedly be no degradation of those efforts. The acquisi-
tion of classified information falls more to their trained and experi-
enced intelligence officers.
It is in this area that the FBI's counterintelligence activities are
mainly concentrated.
Illustrative of those collection efforts of unclassified information
is an incident that occurred Ely? Nev., in late 1979, and comments
which appeared in the Washington Post. (Additional information
concerning this is being made available to you in classified form.)
In October 1979, two Soviets, dressed in jeans and sport shirts and
almost 2,500 miles from their posts in Washington, D.C., visited Ely,
Nev., a potential basing site for some MX missiles. They identified
themselves as Vladimir'"Kvasov and Vladimir Militsyn, listed respec-
tively by the Soviet Embassy as a lieutenant commander/assistant
military attache and as a civilian employee of the attach? office. The
assistant librarian at the Ely Public Library was previously notified
by the FBI as to a possible visit by them. They showed up at the li-
brary dressed very casual and described themselves as travelers from
Washington.
The younger Russian went to the newspaper rack while his friend
asked for books on industry in Las Vegas. Las Vegas is a restricted
area for Soviet Embassy personnel because of its proximity to Nellis
Air Force Base and the Nevada nuclear test site.
After browsing, they both came back with a book on the Nevada
sites?a 300-page environmental impact statement for the Nevada site
where the U.S. Government conducts underground tests of its nuclear
weapons. They received permission to copy the volume which was done
at a cost of $47 at a nearby store. The Russian who did the copying
identified himself as an energy engineer from Washington. The two
Russians subsequently made several other stops inquiring about the
area and the kinds of industry in the area.
An important aspect of our counterintelligence approach to limit
or attempt to negate technology loss is the need to develop an aware-
ness of the problem?the threat posed by the activities of the hostile
intelligence services.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
171
We in the EBI have a dedicated program which we call DECA?
development of counterintelligence awareness?which was instituted
some 4 years ago to address this issue.
This awareness program is targeted at defense-related companies
involved in U.S. classified contracts?at the secret and top secret
level?some 11,000 throughout the United States. These firms are
identified to us through the Defense Logistics Agency. We work closely
with the Defense Contract Administration Services regions through-
out the United States in coordinating our awareness programs. Each
of our field offices has at least one special agent who is responsible for
this program.
The essence of the program is to alert company management and
security personnel of the possible threat to that company?because of
its classified contract?posed by the hostile intelligence services.
Senator NuisTN. Do you take the initiative in contaoting these com-
panies or do you go through trade associations?
Mr. O'MALLEY. We contact the companies directly. We have identi-
fied the companies in each one of our field divisions which have classi-
fied contracts and we then approach them directly.
Senator N17NN. What kind of cooperation are you getting?
Mr. O'MALLEY. It has been excellent. We are there in a sense that
we are not concerned about the legitimate approved trade they have
with the Warsaw Pact countries but to alert them to the threat posed
by the services especially the hostile intelligence services of these coun-
tries, their efforts to obtain illegally, clandestinely, their technology.
Senator NuNN. Do you have a list when your agents call on them?
Do you have a list of critical technology that may be involved?
Mr. O'MALLEY. It depends on the industry. We are aware of what
technologies the other side is looking for. If -we approach somebody in
the aerospace industry, we will alert them as to our knowledge of what
the other side is seeking which may be relevant to their particular
company.
It is hoped that the threat information imparted will be incorpo-
rated into the routine security briefings each of those companies is
required to give its employees. Additionally, articles such as one pre-
pared by the FBI entitled "Secrets, Spies and Citizens" are made
available to the company for distribution to its employees.
In addition to the field level participation, senior Bureau Head-
quarters personnel including Director "Webster and me address this
awareness issue in speeches to senior industrial management person-
nel throughout the country. A recent example was Director Webster's
comments to the Electronic Industries Association at Boca Raton,
Fla., in January of this year.
Electronic expertise in Silicon Valley is widely recognized in the
United States and abroad. Technology transfers within and from
Silicon Valley can occur in different manners. The Santa Clara Coun-
ty sheriff discovered a vast black market in stolen electronic chips.
Many of these stolen chips are sold and used in the United States,
but some find their way abroad. When illegal exports have been un-
covered in Silicon Valley, Federal agencies become involved in the
investigations.
Federal involvement can result in several ways. If the technology
is classified for national security purposes, the FBI will investigate
95-929 0 - 82 - 12
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
12
charges of espionage. If unclassified technology, valued at more than
$5,000 is stolen and transferred across State lines, the FBI can inves-
tigate under Interstate Transportation of Stolen Property statute.
The U.S. Department of Commerce and the U.S. Customs Service
investigate violations of the Export Administration Act, which nor-
mally involve the sale and export of technology listed on the com-
modity control list without obtaining specific authorization from the
Department of Commerce. The U.S. Customs Service also investigates
violations of the Arms Export Control Act, which normally involve
the sale and export of arms, ammunition, weapons platforms and
special military equipment without obtaining specific authorization
from the State Department.
Although the FBI does not initiate investigations of violations of
the Export Administration Act or the Arms Export Control Act per
se, foreign counterintelligence and other authorized criminal investi-
gations can uncover violations of these acts. When a foreign counter-
intelligence investigations uncovers such a violation, it can be easily
integrated into the ongoing investigation. Our primary interest in
these cases is the activity of foreign intelligence services in the United
States.
Senator NuNN. What if the Commerce Department picks up the
phone and tells them they have an Export Administration Act viola-
tion, do you have jurisdiction over this?
Mr. O'MALLEY. It is clearly an export violation, we don't have any
jurisdiction.
Senator NUNN. Let's say they suspect it may eventually be going
to a Warsaw Pact country?
Mr. O'MALLEY. In that case we would have an interest from the
counterintelligence standpoint. We do have foreign counterintelligence
cases where we have developed information which would also be a
violation of the Export Administration Act.
Senator Nurrisr. Even if it is not classified, you still have jurisdiction
if it involves foreign?
Mr. O'MALLEY. If we investigate the activities of all hostile intelli-
gence services in the United States, we do not have to wait until there
is a violation of some law to initiative an investigation of these hostile
services. We are interested in whatever they are doing in the United
States and if it involves sensitive but unclassified technology we cer-
tainly would be interested in that.
Senator NUNN. Suppose it is a citizen of West Germany with a
legitimate export license, on a nonclassified, item. Commerce tells you
they suspect that eventually this may find its way to the Soviet Union.
What is your justification in that?
Mr. O'MALLEY. In a case like that we would be interested in the
sense of a counterintelligence investigation that the odds are that if
something is being transshipped, something that has been legally
exported to a Western European country is being transshipped to the
Soviet Union, the odds are that there is some involvement by a hostile
intelligence service. Within that context, we would certainly have
interest.
Senator NurNiv. When you say you have an interest in it, does that
mean you would actually pursue it, investigate it? Do you think you
have the jurisdiction?
Mr. O'MALLEY. Yes; we would. We would pursue that.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
173
We have an excellent day-to-day relationship with the Compliance
Division of the Department of Commerce.
Senator NuNisr. Are you saying the relationship is being upgraded
and expanded with the Commerce Compliance?
Mr. O'MALLEY. I am saying our relationship with the Compliance
Division, Department of Commerce, is being enhanced at the current
time. I understand that measures are being taken within the Compli-
ance Division to expand its own capabilities.
We also enjoy an outstanding working relationship with the U.S.
Customs Service.
In the Boca Raton speech, Mr. Webster called the William. Holden
Bell-Marian Zacharski case a "textbook example of espionage, or the
illegal transfer of technology."
The scenario of the "textbook example of espionage" as depicted by
Mr. Webster in his Boca Raton speech in general terms, was vividly
seen in the development of the William Holden Bell-Haman Zacharski
case.
The chance social meeting took place at the Cross Creek Village
apartment complex Playa Del Rey, Calif. in the fall of 1977. Both
Bell and Zacharski resided at this complex with their wives. A
personal friendship between Bell and Zacharski developed. A mutual
interest in tennis which resulted in almost daily sessions contributed
greatly to the relationship.
During the next few months Zacharski skillfully cultivated Bell,
a man 30 years his senior. This cultivation process was so thorough
that it even included their tennis activity. Zacharski insisted on play-
ing Bell regularly despite the fact he was a far superior opponent,
and he purposely adjusted his game to match Bell's lower level of
ability.
More importantly, he discovered that Bell had experienced a costly
divorce in 1976 and had declared bankruptcy the same year, making
him a most vulnerable recruitment target. During the sounding out
period, Zacharski learned that Bell was privy to a great deal of classi-
fied information concerning airborne radar systems and related mili-
tary equipment. Zacharski requested and received from Bell copies of
a Hughes Aircraft Co. newsletter entitled "Hughes News" and another
Hughes publication called "Vector," both publications unclassified
and available to the public.
The "moment of truth" for Bell occurred in late 1978, when the
apartment complex converted to condominium status. Because of his
precarious financial situation Bell was unable to produce a down pay-
ment to purchase his unit. At this point Zacharski offered to help in
the form of cash in return for more technical documents generated by
Hughes Aircraft.
Although reluctantly, Bell accepted the offer and the illegal transfer
of technology began. The rest of the story reads like a spy novel?
special camera provided by Zacharski to photograph classified docu-
ments, secret meetings between Bell and Polish intelligence officers
abroad, cryptic telephone contacts using code names and payment in
gold. Bell testified to having been paid almost $170,000?a sum for
which he sold out his company and his country.
I might add that it is my understanding that Mr. Bell testified
earlier this week that the FBI had sat around for 2 or 3 years and
watched him pass classified documents to the Poles. I categorically
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
174
reject that. We would certainly not stand by and watch anybody pass
classified documents to any hostile intelligence service or to anyone
else for that matter.
In conclusion, I would like to state that the FBI will continue to
pursue the counterintelligence implications of technology transfer and
provide intelligence support to those law enforcement elements outside
the FBI that have statutory responsibilities for export control. Tech-
nology loss can be reduced through these concerted and coordinated
efforts even within the framework of our open society and current
operating procedures.
Senator NuNN. On that latter point, I think what Mr. Bell was say-
ing was that he was under surveillance at the time he passed certain
valuable information. Are you denying that?
Mr. O'MALLEY. I am not denying that he was under surveillance.
What I am saying is that it was our observation that he was not at any
time passing classified documents where we had no information at the
time of our surveillance that he had passed any classified information.
What we need, Senator, as you are well aware, is proof, hard proof that
he has passed those documents and the instant we had such proof, of
course, we prosecuted him and Mr. Zacharski.
Senator NuNrf. Of course only a law enforcement agency can make
that judgment. We are not here trying to make that judgment. We are
certainly not being critical of the FBI in the Bell case. But as I under-
stood it, what he was saying was that he was under surveillance while
he was passing that information. Also I understand there had been a
wiretap on him for some time during the period when he was passing
information. The wiretap doesn't necessarily tell us that he was
passing it.
Mr. O'MALLEY. There are ramifications of what you are asking now.
I would be happy to talk to you in closed session.
Senator NUNN. I am not even asking you. That is not a questionmark.
Nevertheless, I know it is a difficult thing in getting proof. The point
that he did make, though, that should have come through pretty loud
and clear is that there were all sorts of suspicious circumstances that
someone should have known during the entire period of time that this
was going on.
I think he was somewhat amazed with all the circumstances that he
wasn't caught sooner. I think it is a lesson to be learned. I don't know
by who. Perhaps the FBI did everything possible in the case. Perhaps
the private companies involved could do more in alerting law enforce-
ment on specific circumstances when it comes up.
I don't think there is any doubt about the fact though that Mr. Bell
did pass certain critical information.
Mr. O'MALLEY. No doubt at all.
Senator NuNrf. How important is it for the law enforcement agen-
cies, in cases like the Zaeh,arski case and the DeGeyter case, to have a
presence abroad and liaison with the foreign law enforcement
authorities?
Mr. O'MALLEY. It is absolutely crucial. We have had a long history
of such relationships with intelligence agencies and law enforcement
agencies abroad. I think it is particularly important in the area of
technology transfer, but I think it is well established that more and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
critically. in Europe, that more and more of the illegal technology
transfer is occurring through these European countries. Technology,
equipment, dual use products that may be legitimately licensed to
European countries are being diverted to Warsaw Pact countries. I
think with that in mind it is absolutely crucial that we have close re-
lationships with our counterparts abroad.
Senator NuNN. The FBI is primarily domestic in terms of the
overall jurisdiction and enforcement. What is the nature of your
relationship with the foreign governments and foreign agencies?
Mr. O'MALLEY. We have no investigative jurisdiction abroad, Sen-
ator, but we do have a legal attach?ystem and those individuals who
operate in our behalf in foreign countries have strictly a liaison re-
sponsibility. If we determine there is information say in the United
States that a certain crime has been committed or about to be ,com-
mitted in Europe we will furnish that information to our counterpart
service through our legal attache. He will conduct no investigation
himself but will furnish the lead, if you will, to the local service 'and
the results of that investigation will be furnished back to him to be
given to us if it involves U.S. interests.
Senator NuNN. You say you are very pleased so far with your in-
formational program to the business community. Do you think that
is working well?
Mr. O'MALLEY. Yes, sir. It is.
Senator NuNN. Could you furnish for the record some statistics
that would indicate the degree of briefings that go on between the
FBI and private companies?
Mr. O'MALLEY. Yes; for the record I can say that the 11,000 com-
panies that we identified which have or may have secret or top secret
contracts, we have so far have talked to 6,000 of them.
Senator NUNN. 6,000?
Mr. O'MALLEY. 6,000.
Senator NuNN. That is by personal visit?
Mr. O'MALLEY. Personal visit.
Senator NuNN. Do you try to contact people who are head of secu-
rity in those companies primarily?
Mr. O'MALLEY. Yes; particularly the security people or other senior
officers who are in the position to pay attention to what we say and
to listen to our suPgestions and implement them within the company.
Senator Ntricx. How many referrals of evidence indicating criminal
activity does the FBI receive from the Department of Commerce
Compliance Division in a year? Do you have any statistics on that?
Mr. O'MALLEY. I don't have any statistics at hand but I checked and
to my knowledge we have not gotten any criminal referrals from the
Department of Commerce in the past year.
Senator NuNN. In the past 12 months?
Mr. O'MALLEY. Yes.
Senator Nuiciv. Would that be calendar year 1981?
Mr. O'MALLEY. I responded to the question I thought you had asked
within the past year. But I am not sure in the past few years that we
have gotten any criminal referrals.
Senator NuNN. So your records don't reveal any or at least. :you
don't know of any criminal referrals from the Compliance Divisioti
of Commerce to the FBI?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
1178
Mr. O'MALLEY. That is true.
Senator NUNN. How about criminal referrals by the U.S. Customs
Service?
Mr. O'MALLEY. We have a very close working relationship with
Customs, both at headquarters and with their field divisions through-
out the United States and there has been, although I don't have sta-
tistics on it, a number of referrals from us to Customs and vice versa.
At the current time we have a number of very, I would say, defined it
as substantial cases that; we are working jointly with Customs in the
technology transfer area.
Senator NUNN. Do you have an established procedure for liaison be-
tween the FBI and the Commerce Department in high technology
cases?
Mr. O'MALLEY. It is riot a written document as such but we do have,
I think, fairly well structured relationship with Commerce. We have a
liaison officer. We also have, I think, excellent liaison from the very
highest levels of Commerce down to the lower levels, and with several
different divisions within Commerce. Particularly in the last year we
have had a number of meetings between the FBI and Commerce at
fairly senior levels, to brief them on our responsibilities, particularly
in the counterintelligence area, and to exchange ideas on the whole
technology transfer issue in general.
I think they have been very worthwhile. At the present time we are
in the process of negotiating with the Department of Commerce a mem-
orandum of understanding which will, I think, enable us to avoid
problems that we have experienced in the past of I2-C of the Export
Administration Act where we ask for certain information and accord-
ing to that particular section it was either not forthcoming or there
were lots of delays. I think, though, as a result of the meetings that 1
have been talking about, and the relationship that we have today, that
hopefully at least there will be a memorandum of understanding that
in the future when the Bureau approaches Commerce requesting cer-
tain, particularly licensing-type information that that request each
time does not have to go all the way up to the Secretary of Commerce
but can be handled let's say at a routine but albeit
Senator NUNN. You mean at the present time under the present
procedures any FBI requests for information have to go all the way
to the Secretary of Commerce?
Mr. O'MALLEY. That is required by the Export Administration Act.
Senator NUNN. That is the law?
Mr. O'MALLEY. Yes.
Senator NUNN. What provision of the law is that?
Mr. O'MALLEY. 12-C of the Export Administration Act.
Senator NUNN. Is that proprietary information?
Mr. O'MALLEY. It basically says, licensing information or requests
for licensing information cannot be made public without the expressed
authority of the Secretary of Commerce unless he decides that it will
be in the public interest I gather to release such information. The
problem is?
Senator Nrinciv. Making it public is giving it to the FBI
Mr. O'MALLEY. That is the way the Commerce has interpreted it in
the past, that making it public is synonymous to giving it to other
agencies within the Federal Government.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
177
Senator NuNN. Does the Justice Department to your knowledge
agree with that interpretation of the present law?
Mr. O'MALLEY. They do not agree with that.
Senator NuNN. So the Justice Department believes that the Com-
merce Department without changing the law could actually share that
information with the FBI?
Mr. O'MALLEY. Yes; I believe the Justice Department has prepared,
the Office of Legal Counsel, has prepared a study on that and com-
municated the results of that study to the Department of Commerce.
Senator NuNN. I am informed by staff that that law was amended
last year, in December specifically to permit that information to be
passed for investigative purposes. Are you familiar with that?
Mr. O'MALLEY. I am not.
Senator NUNN. Could you ask the Justice Department to furnish us
their position on the current law, whether there is a change in the law
needed to permit that kind of cooperation?
Mr. O'MALLEY. I will ask the Department.
Senator NuNN. I will pose the same question to the Commerce De-
partment when they testify next week. Your own view is so far as you
know the Justice Department believes the Commerce Department has
it within their authority to permit that under existing law?
Mr. O'MALLEY. Yes.
Senator NuNic. Do you know how many technology transfer cases
have been worked jointly in the last year by the FBI and the
Commerce Department?
Mr. O'MALLEY. I don't believe we have worked any cases jointly.
We normally contact the Commerce Department where we have a
question regarding certain licensing information or whether or not
a given item is on the commodity control list and therefore embargoed
for transport abroad, particularly to a Warsaw Pact country.
Senator NUNN. How about the Customs Service? Do you have cases
that you work jointly with them?
Mr. O'MALLEY. We certainly do. We have a substantial number of
such cases going on at the present time.
Senator NuNN. How do you explain the lack of having any referrals
from the Compliance Division of the Commerce Department to the
FBI and how do you explain the lack of having any joint cases you
are working with the Compliance Division? Is there a reason for
that that is not readily apparent?
Mr. O'MALLEY. I think it is probably because in the past Commerce
has been understaffed. They do not have, compared to Customs, the
number of investigators out in the field or the people with the same
kind of law enforcement training, that people in the field in terms of
Customs would have. We have a tradition which transcends the tech-
nology transfer issue of working very closely with Customs. They
have a large presence as the Department of State indicated through-
out the country of all the key ports. So I think these are the general
reasons why we exchange information more frequently with Customs
than we would with Commerce.
Senator NuNN. Are you familiar with the DeGeyter case?
Mr. O'MALLEY. Yes ; I am.
Senator NuNN. Was that an FBI case?
Mr. O'MALLEY. Yes.
Senator NuNN. Did you work with Commerce on that?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Mr. O'MALLEY. No. We did not work the case jointly information
being
Com-
merce. We consulted Commerce as to whether or not the
being sought by Mr. DeGeyter was on the commodity control list, or
something within that data base management system would have
qualified it as sensitive enough to bring it within the parameters of
the Export Administration Act.
Senator NUNN. So the Commerce Department simply answered
inquiry by you on that case?
Mr. O'MALLEY. That is right.
Senator NUNN. Were you aware that the DeGeyter case was listed
in the Commerce Department's annual report as a 'criminal proceed-
ing handled through the Compliance Division"?
Mr. O'MALLEY. I have been told that it was. I am a little mystified
as to why it was said, perhaps there is a reason why they said that.
I am not sure. I haven't discussed it with them.
Senator NuNN. What; areas would you point out where coordination
can be improved between the FBI and the other Federal agencies in
this area?
Mr. O'MALLEY I think an awful lot has been done in the past year,
18 months, Senator, on this issue, both within the intelligence com-
munity itself and between the intelligence community and the export
control community. There are a number of committees in the intel-
ligence community and outside the community that we all sit on and
I think that it is working very well. Commerce sits on it, State sits on
it, Customs, all the export control community agencies as well as ours
and other members of the intelligence community, includinc, Defense
and CIA. So I think a lot has been achieved in terms of coordination,
but I think like anything else, there still can be more achievements.
I think even more coordination in the future.
But I can say, with a fair degree of certainty, that there is no issue
of greater importance in the intelligence community today than the
technology transfer issue.
Senator NuNic. I certainly agree with that. Do you have any diffi-
culty getting people in the Commerce Department who have security
clearances so you can deal with them in your counterintelligence in-
formational exchange?
Mr. O'MALLEY. There was a problem in the past on that issue. We
brought it to the attention of the Commerce Department and appro-
priate clearances were obtained for people within the Compliance
Division.
Senator NurNic. So you think that problem has been smoothed out?
Mr. O'MALLEY. I think it has been.
Senator Nui.ix. We were told during the grain embargo that at one
of the high level meetings someone was excluded from the meetings
because of clearance?
Mr. O'MALLEY. That :happened initially. That is the exact situation
I was discussing with you. That happened in the initial meeting. We
found out he did not have appropriate clearances. We brought it to the
attention of Commerce and they saw to it that these people were given
clearances and thereafter they sat in on our meetings.
Senator NuNri. So you don't think that is a problem at this point
in time?
Mr. O'MALLEY. I do not. I think the Commerce Department has
tightened up its security substantially over the past 2 years.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
179
? Senator NUNN. Do you feel in your personal opinion that the Com-
merce Department is capable of?the Compliance Division in the
Commerce Department?is capable of effectively enforcing the Export
Administration Act as it is presently constituted?
Mr. O'MALLEY. I mentioned earlier some of the problems that Com-
merce, would acknowledge themselves in terms of a lack of sufficient
personnel, a lack of training, a lack of presence throughout the United
States and abroad. There is one or two ways that that can be resolved,
either increase or improve the capabilities of Commerce in the areas
that I mentioned or consider transferring it to another agency.
Senator NuNN. Would the Customs Service be better able to handle
the enforcement of the Export Administration Act than the Com-
pliance Division?
Mr. O'MALLEY. The only thing that I can say in regard to that ques-
tion, Senator' is that the Customs Service does have a larger presence,
both here in the United States and abroad. Their training is better.
They have law enforcement powers which Commerce people do not
have. I believe it would be inapproprate for me to publicly? .
Senator NuNN. I understand, but your relationship with the
Customs Service in this overall area is very professional, very good?
Mr. O'MALLEY. It is excellent.
Senator NuNN. What about the Silicon Valley problem? We have
heard testimony that there is a huge theft problem in the Silicon
Valley. An awful lot of the enforcement in the past has been left up
to both police and sheriffs and local prosecutors and so forth. Has the
FBI moved into that area in recent months?
Mr. O'MALLEY. Senator, I understand what you are saying, that
there has been a tremendous amount of work done by the local author-
ities in the Silicon Valley area. But I must add also that there is a
substantial Federal presence in that area also in terms, of our own
operations and the operations of customs. Silicon Valley is a cause
of concern for us. It is of obvious interest to the Warsaw Pact coun-
tries. As serious as it is, it is one of many problems that we have
throughout the country in the technology transfer area.
Our presence there as I indicated is substantial and I would be, I
think, very happy to go into closed session with you for the details on
that presence.
Senator NuNN. Fine. We are going to need to have a closed session
because we had certain questions that came up yesterday about mis-
demeanor pleas on a very serious case that involved national security
and we are going to have to hear that in closed session. So we would
like to talk to you in closed session on the other too.
I want you to understand that we have not taken a look at the Bell
case from the point of view of determining whether law enforcement
efforts were excellent, good, or fair. We are making no finding or impli-
cation. Nothing I said should indicate that we are in any way criticiz-
ing the FBI on the Bell case. We did hear testimony from him
yesterday.
Mr. O'MALLEY. I understand that, Senator, but I saw the newspaper
piece regarding Mr. Bell's testimony. That is the only reason I
responded to that, not because of anything that you have said or
anyone else.
Senator NuNN. The implication I got from his testimony was that
there were a lot of signs there that his own company should have
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
180
caught or someone should have caught earlier. But I certainly am not
making any statement to that effect. We just haven't looked at it in
that aspect. We have looked at it in the aspect of whether this tells us
something about our overall capability in this area and whether the
business community can do more themselves.
Have you been a member of a working group on export controls?
Mr. O'MALLEY. Yes; I have.
Senator NtrisTN. What is that group?
Mr. O'MALLEY. It was a group, as a matter of fact, you mean the
FBI or me personally?
Senator NuNN. Both.
Mr. O'MALLEY. The FBI is currently a member of four or five such
groups on export control. As I said, both within the intelligence com-
munity and combined with the intelligence community and the export
control community. I also chaired a committee about 3 years ago look-
ing into the entire problem of export control.
Senator NuNN. Has that group had recommendations?
Mr. O'MALLEY Yes; it has.
Senator NuNN. Whom did the recommendations go to?
Mr. O'MALLEY. Those recommendations went to the National Secur-
ity Council.
Senator NTJNN. When did they go to the National Security Council?
Mr. O'MALLEY. If my recollection serves me it was in December 1979.
Senator NUNN. December 1979?
Mr. O'MALLEY. Yes.
Senator NONN. Have those recommendations or some of those rec-
ommendations been acted on?
Mr. O'MALLEY. Yes; they have.
Senator NuNN. Have some of them not been acted on?
Mr. O'MALLEY That is also true.
Senator Nurric. Are these classified recommendations?
Mr. O'MALLEY. Yes, they are.
Senator NuNN. At the appropriate time in a closed session, are you
permitted to go into that?
Mr. O'MALLEY. No; that is a national security document and I can-
not comment even though I chaired the committee, I cannot comment
on anything that is in that report and the only thing I would do would
be to recommend that you approach someone in the National Security
Council for that document.
Senator NENN. You are familiar with it?
Mr. O'MALLEY. Yes.
Senator NtrivN. But you have to get permission from them?
Mr. O'MALLEY. I cannot discuss it.
Senator Num,r. We will pursue that with the National Security
Council and perhaps go into that in closed session also. It is certainly
relevant to the hearings, if you have an expert group of people looking
at it and coming to conclusions. We will pursue that. We appreciate
very much your being here. We appreciate the cooperation of the FBI.
Mr. O'MALLEY. Thank you, Senator.
Senator NuNN. Thank you.
Our next witness is Mr. Arthur Van Cook, Director of Information
Security, Department of Defense, and Chairman, National Disclosure
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
181
Policy Committee. Do you have anyone else with you this morning?
Mr. VAN COOK. I have one of my staff.
Senator Nmsnsr. We would be glad for him to come up. If he is going
to testify, I will swear him in.
Mr. VAN CooK. He is not going to testify.
Senator NuNN. Will you hold up your right hand? Do you swear
the testimony you will give the subcommittee to be the truth the
whole truth, and nothing but the truth, so help you God?
Mr. VAN COOK. I do.
Senator Muir% We appreciate you being here this morning. We ap-
preciate your cooperation. We look forward to getting your testimony.
You go right ahead.
TESTIMONY OF ARTHUR VAN COOK, DIRECTOR OF INFORMATION
SECURITY, DEPARTMENT OF DEFENSE, AND CHAIRMAN, NA-
TIONAL DISCLOSURE POLICY COMMITTEE
Mr. VAN COOK. Thank you, Mr. Chairman. I do hold the position
of Director of Information Security in the Department of Defense.
I am also designated as the Chairman of the National Disclosure
Policy Committee and I am the U.S. representative to the NATO
Security Committee.
In these capacities and with these titles I am responsible for policy
development and oversight of DOD activities in the areas of informa-
tion security and foreign disclosure.
Senator Nurrx. What did you say your position was in terms of
NATO?
Mr. VAN COOK. I am the U.S. representative to the NATO Security
Committee, sir.
Senator NUNN. Does that committee interrelate with Cocom?
Mr. VAN COOK. No, sir.
Senator Nummr. It has no relationship with that?
Mr. VAN COOK. No.
Senator Nuisrx. Is there a body in NATO that has any feed into the
Cocom decisions on export?
Mr. VAN COOK. Not to my knowledge, sir. As a NATO body.
Senator NuNN. I would like to pursue that with you. But go ahead
with your statement. We will get to it.
Mr. VAN COOK. Yes, sir.
I welcome this opportunity to discuss the problem of technology
transfer to the Soviet Union and other Soviet bloc nations. The Depart-
ment of Defense has been concerned for some time about the virtual
unremitting flow of unclassified defense information to our adver-
saries. This hemmorrhage of information to hostile nations, particu-
larly technology and technical data with military applications, is one
of the more serious problems confronting the Department.
Soviet bloc acquisitions of unclassified national security related
publications greatly enhances their capabilities to design, produce and
field weapons systems of all types, as well as develop measures to
counter U.S. weapons systems. It cuts their production costs, shortens
their production times, and improves the quality of their product.
A Soviet scientist who defected several years ago and others told
Congress that the majority of Soviet information collection require-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
182
ments can be openly obtained in the United States. The Federal Bureau
of Investigation has estimated that as high as 90 percent of the Soviet
collection requirements can be satisfied through open sources. A recent
unclassified CIA report states that Soviet intelligence organizations
have been so successful at acquiring Western technology that the man-
power levels allocated to this effort have increased significantly since
the 1970's to the point where there are now several thousand technology
collection officers at work.
We are painfully aware of Communist bloc efforts within the United
States to obtain technology, mostly through legal means, that is,
through open literature, which we are powerless to stop. Prior to
February 1980, for example, we stood helplessly by as the Soviet Union
purchased 80,000 technical documents from the National Technical
Information Service (NTIS). Although their access to the NTIS has
now been officially terminated, their surrogates undoubtedly continue
to exploit this source of extremely valuable information.
Members of Congress, industry spokesmen, and the media fre-
quently lament this state of affairs, and ask is there nothing that can
be done. Generally, these activities are carried out overtly and do not
violate existing U.S. law. In fact, it has always been presumed that
little could or should be done to limit such acquisitions, relying instead
upon the ability of the publishers of such documents to properly secure
sensitive information by using the existing security classification sys-
tem. However, much of this information is not classifiable under exist-
ing rules. The existing classification criteria does not provide adequate
protection to a large body of sensitive national security information,
particularly militarily critical technology and operational data devel-
oped solely for the use of our Armed Forces.
Classification of such information has been neither possible nor
practical. Although such sensitive national security information fits
the categories permitted to be classified, it does not rise to the level of
the "damage" standard of the Executive order governing classification.
Disclosure of the technical characteristics of electronic components
used in a missile guidance system, for example, may not appear to
damage the national security, and yet may well provide our adversaries
with precisely what they need to produce a more effective missile. It
is this "damage" standard that is applied by originators in deciding
whether to make their documents unclassified or to protect them by
security classification. Uppermost in their minds is the realization that
the test for classification could receive judicial review.
Consequently, if a determination is made not to classify, this in-
formation is vitlm?,rable under the Freedom of Iniormation Act
[FOIA] since the information does not fall within one of the non-
security exemptions to mandatary disclosure. It therefore becomes
available and this valuable technological and operational information
can be utilized by our adversaries to their military benefit.
Senator NUNN. Is it correct that foreign citizens have access to in-
formation in America under the Freedom of Information Act?
Mr. VAN COOK. Yes; they do, sir.
Senator NITNN. If President Brezhnev sends over a freedom-of-
information request to the Department of Defense and it is not classi-
fied, what is the law on that?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
183
Mr. VAN Com. The law would be if it is not exempt under the
nine exemptions of the Freedom of Information Act, classification
being one, that he would get the information he asked for.
Senator NUNN. So if the President of the Soviet Union sent over a
request for 100 different items under the Freedom of Information Act,
signed his own name, signed as President of the Soviet Union, he
would be entitled to that information under present law?
Mr. VAN COOK. It would be interpreted to be a member of the public
under that act.
Senator NUNN. Have there been any recommendations made by the
Department of Defense or any other agency in respect to access of
foreign citizen to that?
Mr. VAN COOK. There have been by the executive branch. The Pri-
vacy Act provides that the information can be asked for by a U.S.
citizen or permanent resident alien and that same language was pro-
posed for the Freedom of Information Act. My view would he that
it would be helpful to have that language in the act if in the initial
request the individual is identified as a foreign national. But I think
it would be very difficult to enforce.
Senator NUNN. Why is that?
Mr. VAN COOK. Any citizen or anyone who wrote in we would be in
the position of probably asking them for their birth certificate to prove
that they were a U.S. citizen.
Senator NTJNN. Shouldn't there at least be a prima facie showing
of citizenship on the application
Mr. VAN COOK. It would be very difficult to enforce. I think it would
be helpful nevertheless. There are
Senator Nurri.r. We are saying right now if Fidel Castro wrote in to
the Department of Defense and said he wanted 200 items that were
unclassified, that you would have to send them to him?
Mr. VAN COOK. That is correct, sir. If the items were not covered
by the exemptions.
Senator NUNN. Qadhafi in Libya. Is that correct?
Mr. VAN COOK. That is right.
Senator NUNN. The ayatolla of Iran?
Mr. VAN COOK. Yes, sir.
Senator NUNN. Don't you think on the face of it that is ludicrous?
Mr. VAN COOK. Yes, sir. I do.
Senator NUNN. So do I.
Suppose there is a hypothetical spy trial going on in West Germany.
Two or three East Germans are being tried for espionage. Suppose
during the course of that trial they write into the Department of
Defense and ask for certain information under the Freedom of In-
formation Act. What would be the law under that circumstance?
Mr. VAN COOK. The law would be that they would be entitled to the
information that they requested but we would certainly be reluctant
to give it to them with the knowledge that they were on trial for
espionage in their own country.
Senator NUNN. You would be slow. You would put that request at
the bottom of the pile?
Mr. VAN COOK. I think we would handle that very carefully, sir.
Senator IsTuNN. Let's say the situation developed in this country
where there were people who were charged, as being spies and were
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
184
being tried under the Espionage Act. Would they still be entitled
to the Freedom of Information requests?
Mr. VAN. COOK. Yes; they would.
Senator NUNN. How about the case we heard earlier this week, the
Bell case? He is convicted of violating American law and giving away
national security secrets and he says very openly that he did and so
forth. What is his status under the Freedom of Information Act?
Mr. VAN COOK. He would be eligible to request information under
the Freedom of Information Act and if it could not be withheld under
the provisions of this statute, he would receive it.
Senator NuNN. So if he were to write in, ask for certain high tech-
nology items and so forth, that are not classified, he would be entitled
to that?
Mr. VAN COOK. Yes; he would be entitled to receive it under the
Freedom of Information Act. Yes, sir, if there were no other restric-
tions, no restraints under the act.
Senator NUNN. Are there any other restraints under the law?
Mr. VAN COOK. There are nine exemptions under the Freedom of
Information Act, the first of which is classification.
Senator NUNN. But it relates to the material itself and not to the
applicant?
Mr. VAN COOK. That is correct, sir.
Senator NuNN. So, Mr. Bell, a convicted felon, would have the same
rights under the Freedom of Information Act as the New York Times
reporter or the Washington Post reporter?
Mr. VAN COOK. Yes; we have the experience of a Norwegian citizen,
I believe the name is Gletich, who was an access professional you
might say. He asked us on 23 different occasions for information
under the Freedom of Information Act. This man was put on trial
for espionage in his own country and was convicted. To some of those
requests we did respond favorably and some we did not.
But this is an example?
Senator NuNN. Would you have responded favorably on some after
he was convicted?
Mr. VAN COOK. No; this was prior to the time that he went on trial.
Senator NuNN. But he has been convicted now?
Mr. VAN COOK. He has been convicted.
Senator NUNN. Would he still be entitled to get the information?
Mr. VAN COOK. Now that we know that the individual is tried and
convicted, I would suspect that we would work that case very care-
fully but nevertheless I believe under the law
Senator NUNN. If he had a good lawyer he could go to court and
get it?
Mr. VAN COOK. He could go to court and get it; yes.
Senator NUNN. Go ahead.
Mr. VAN COOK. As Admiral Inman has remarked, a "cottage in-
dustry" has been created by the Freedom of Information Act. Access
professionals and data brokers use the act to gather information, re-
package it, and market their information product in the United States
and abroad. Openness is a desirable social and economic commodity,
but we must not lose sight that such openness comes at .a cost. It has
been presumed that the rapid dissemination of information is socially
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
1.85
and economically good because it avoids duplication of effort, fosters
competition, and beneficially spreads technology.
But, there is a hidden cost. While it may be argued, for example.
that a full and free exchange of information is necessary if the United
States is even to maintain its technological world leadership, it is my
concern that it is this very full and free exchange of information
that may be causing that technological lead to wane.
I have just mentioned a case where we received requests under FOI
from the Norwegian access professional who was, at the time of his
request, being tried in court in his country for espionage. This
dramatically illustrates the point.
Senator NUNN. Is there any other country in the world that has
this same kind of law, that foreign citizens are entitled to request
information? Could you, as a U.S. citizen, request information in
Britain and be entitled to it?
Mr. VAN COOK. I would expect not, sir. In Britain, they have an
Official Secrets Act. The information, official information, in gov-
ernment records is the property of the Crown. In our country, our
Government records are the property of the people, the public. We
are just protecting those records for the people.
Senator NUNN. There presumably would be the people of this
country, not the people of the Soviet Union?
Mr. VAN CCX)K. That is correct, people of this country.
Senator NUNN. Have you ever heard an argument that would have
the logic to it that the President of the Soviet Union or the ayatollah
in Iran, or Qadhafi in Libya ought to have access to information
under the Freedom of Information Act, does anybody have an argu-
ment that that is necessary to protect our own right to know in this
country?
Mr. VAN COOK. No, sir, I have never heard such an argument.
Senator NUNN. If you hear it, let me know. I am really curious
about what the argument would be.
Mr. VAN COOK. I share your curiosity, sir.
The Soviets view the United States and several other Western
countries as a continuing source of important and openly available
scientific and technical information. In some cases, according to an
unclassified CIA report, their acquisitions satisfy deficiencies in
Soviet technology such as smart weapons, electro-optical and signal
and information processing technology for Soviet air defense systems.
Also, the Soviets appear to have concentrated their tactical systems
acquisitions on Western tank, antitank, and air defense related tech-
nology to benefit their weapons programs and to design counter-
measures to Western systems.
Even with classification there have been instances of difficulty caused
by judicial review of such determinations pursuant to FOIA litiga-
tion. A requester sought access to records entitled "Technical Abstract
Bulletin" [TAB] indexes produced by the Defense Technical Informa-
tion Center. The TAB is a bibliographical reference document that in-
dexes technical reports prepared for the Department of Defense. It was
an entity classified confidential. Most of the reports indexed in the
TA_B were unclassified and although some of the reports indexed in
the TAB were in themselves classified, their titles had been rewritten
so that each title was unclassified. The basis for its overall classifica-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
186
tion of confidential was that the compilation of research and develop-
ment information contained in and revealed by the TAB index would
allow a foreign nation to develop, improve or refine similar items of
war potential, or would provide such a nation with a base upon which
to develop effective countermeasures or weaken or nullify the effec-
tiveness of a defense plan, project or system which is vital to the na-
tional security.
The, court ruling in this so-called Florence case did not even reach
to the question of whether the documents were in fact properly classi-
fied, and thus not subject to disclosure. In the court's opinion, other
provisions of the FOIA were overriding. The FOIA stipulates that:
"Any reasonably segregable portion of a record shall be provided to
any person requesting such record after deletion of the portions which
are exempt." The effect of the court's opinion and its order to release
the segregable portions resulted, in this instance, in the release of the
entire document.
In 1980, Senator Sasser brought into focus the problem of unlim-
ited dissemination by making inquiries into the international exchange
program. It was discovered that a large number of unclassified 'U.S.
Government publications were being automatically distributed to for-
eign governments such as the Soviet Union, Cuba, and Iran under this
exchange program. A large portion of these documents were defense-
originated publications including field manuals and technical manuals
developed for the use of the Armed Forces.
The international exchange program is under the direction of the
Library of Congress, and the distribution of these unclassified docu-
ments is made pursuant to law and in accordance with some 55 bilateral
agreements negotiated by the Department of State and foreign govern-
ments. The laws governing the supply of U.S. official publications for
international exchange are section 1718 of title 44 of the United States
Code, "Distribution of Government Publications to the Library of
Congress," and section 1719 of title 44, "International Exchange of
Government Publications."
The intent of this legislative policy is to make the widest range of
U.S. official publications available for exchange. The only documents
considered in this process are those published by the Government
Printing Office, and the publications made available for the e,m1tange
program are generally identical to those that are made available to
designated public and academic libraries in the United States under
the depository library program established by section 1902 of title 44.
The trend toward openness in Government has run virtually un-
interrupted for the past 30 years. It is a trend that the Department
of Defense certainly has supported over those years. It has lonrr been
the Department's policy not to constrain information the public re-
quires to be informed sufficiently about the activities and operating
functions of the Department. We were concerned, however, that there
appeared to be no compelling reason for permitting Government pub-
lications that are required solely for official use or for strictly ad-
ministrative or operational purposes to be freely transferable to all
countries participating in the exchange program even though the
publications were not classified for reasons of national security.
Therefore, the military departments and defense agencies were
asked to revise their policies and procedures with respect to the ap-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
187
proval and issuance of unclassified field manuals, technical manuals
and other publications containing valuable technical data to assure
that these publications required solely for official use or for strictly
administrative or operational purposes were clearly identified.
Further, the Library of Congress and the Government Printing Office
agreed not to include defense documents so identified in the inter-
national exchange program. Our aim was not to exclude all defense
documents from the program but to provide more positive control
over a certain class of such documents. This we did.
Senator NUNN. You are really saying that you took these documents
out of the circulation list that were automatically sent abroad; is
that right?
Mr. VAN COOK. By identifying those documents as those which had
technical data and operational data for the use of the Armed Forces,
by identifying them with a notation, the effect of it was that we did
take them out of the exchange program.
Senator NUNN. But that doesn't mean they aren't obtainable under
other methods?
Mr. VAN COOK. They could be reached under the Freedom of Infor-
mation Act for example, yes, sir.
Not satisfied that we had done all we can within the Department
to Fmk the availability of such unclassified information, General
Stilwell, Deputy Under Secretary of Defense (Policy), established
a DOD working group on technology transfer. This group which I
was asked to chair, was directed to address: (1) what the Department
of Defense can do now to effect more positive control of such defense
information, (2) what Department policies and procedures ought to
be changed to effect more positive control, and (3) what can we ask
others outside the Department to do to assist in these efforts.
The issues involved in such an undertaking are not unfamiliar and
center around the countervailing principles of openness in Govern-
ment and the Government's legitimate need to protect from disclosure
certain information in the interest of national security. What we are
seeking is a more equitable balance between the need to protect certain
information and the competing need to keep the public properly in-
formed about the activities of its Government.
One of the initiatives that has emerged as a result of the technology
transfer working group was a proposal to authorize the Secretary of
Defense, by Executive order, to classify at a level lower than confi-
dential, defense information the unauthorized disclosure of which
could reasonably be expected to be prejudicial to the national security
because it would result in the loss to the United States of a military,
technological, or operational advantage. This proposal did not receive
broad executive branch support, however, and has been abandoned.
Another initiative appears in the defense legislative proposal to
amend the Freedom of Information Act where it has been recom-
mended to exempt from disclosure technical data that may not be
exported lawfully outside the United States without an approval, au-
thorization, or a license under Federal export laws. This recommenda-
tion is now a part of the administration's proposal to amend the act.
Senator NUNN. Are you saying that under the existing law and
interpretations that something under the Export Administration Act
has to have a license and approval from the Commerce Department
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
188
or otherwise it can't go out of the country, would be obtainable, the
same information would be obtainable under the Freedom of Infor-
mation Act
Mr. VAN COOK. Yes. That is entirely possible.
Senator NuNN. I don't understand that. I don't understand how we
get to that spot.
Mr. VAN Coos. Under the Freedom of Information Act, there is
no exemption that deals with technical information. There is an ex-
emption, the third exemption, under the Freedom of Information Act
which provides that information can be withheld from public release
because it is exempt from disclosure by statute. So if something is
subject to export control laws under the Munitions Act or under the
Export Administration Act, I would think that could be withheld
under the B (3) exemption under the Freedom of Information Act.
But there may be certain elements of information not clearly covered
by statute that might be released under the Freedom of Information
Act. I say it is probable, possible.
Senator NuNN. You are saying that if someone were careful in
applying that exemption that relates to the statutory restrictions that
the Freedom of Information Act could not reach that material?
Mr. VAN COOK. That is correct.
Senator NuisTN. You are saying it needs to be clarified?
Mr. VAN COOK. I think it needs to be clarified.
Further internal proposals to provide more positive control of this
type of information that is allowable under existing policies and pro-
cedures are being developed, but it would be premature to discuss them
at this time since they have not yet been fully considered by the
Department.
Thus far I have been dealing with the problem of technology trans-
fer from an information security perspective. However' in 1978, in
addition to my responsibilities as Director, Information Security for
the Department of Defense, I also became responsible for the imple-
mentation of the national disclosure policy. I should like now to
discuss technology transfer from my other perspective, that of the
chairman of the National Disclosure Policy Committee.
Under the basic national disclosure policy issued in 1971 by the Na-
tional Security Council, with Presidential approval and each subse-
quent President's reaffirmation, the Secretaries of State and Defense
are jointly responsible for controlling the dissemination of classified
military information to foreign governments. The interdepartmental
committee which I chair was established to implement the national
disclosure policy and includes representatives of the Central Intelli-
gence and Defense Intelligence Agencies, the Department of State,
the Organization of the Joint Chiefs of Staff, and the three military
departments.
The most important aspect of the national disclosure policy is the
realization that classified military information is a national asset, an
asset that must be conserved and protected. In determining whether
classified military information, including technology, will be pro-
vided to a foreign government five policy objectives or criteria must
be considered. The first is that the disclosure must be consistent with
the U.S. foreign policy toward the recipient nation. The second ob-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
189
jective is that the disclosure must not seriously jeopardize U.S. na-
tional security.
Third is the assessment of the foreign recipient's ability to protect
the information as we protect it. Fourth? is whether the information
to be provided is sufficiently limited to only that which is necessary to
accomplish the purpose of disclosure. And finally, the benefits to the
United States must be at least equivalent to the value of the informa-
tion disclosed.
Each year there are approximately 10,000 disclosure decisions
made in the Department. Obviously the National Disclosure Policy
Committee itself cannot handle this volume. Consequently disclosure
authority is delegated to principal Department of Defense officials as
the Secretaries ot the military departments, the Chairman of the Joint
Chiefs of Staff, the Director, Defense Intelligence Agency and a few
others.
These are, in turn, authorized to redelegate this authority to the
levels that they believe are necessary to meet operational requirements.
People authorized to make decisions with respect to the release of
classified military information to foreign governments are guided in
their decisions by the National Disclosure Policy Document issued by
the Secretary of Defense. This document lays out in clear terms the
criteria for disclosure which must be met and specifies the levels of
eligibility for each country with whom we exchange classified military
information.
In those cases where the criteria cannot be met for one reason or
another or the information to be disclosed exceeds the level of eligi-
bility for the country concerned, an exception to the national disclo-
sure policy must be considered before the disclosure is authorized.
The role of the National Disclosure Policy Committee is to consider
and act upon any request for exception to policy.
To assist in keeping track of the Department's disclosure decisions
we have an automated data system called the Foreign Disclosure Auto-
mated Data System or Fordad.
Four types of data are recorded in the Fordad system:
1. All delegated disclosure decisions of documentary information or
material that are normally made within the guidelines for the national
disclosure policy.
2. All decisions on requests for exceptions to policy initiated because
the disclosure falls outside the normal guidelines for disclosure.
3. All disclosures involving top secret information.
4. All DOD decisions on munitions license applications.
This data base is used on a routine basis to provide decisionmakers
with the background of previous, similar cases by weapon or country.
However, in a 1979 study, we found that this system had significant
problems of completeness, timeliness, quality, and accessibility. In
May 1979, the Deputy Secretary of Defense tasked the military depart-
ments and other agencies to assist the Deputy Under Secretary of
Defense (Policy) (my boss) in improving the system. We then initi-
ated a project to develop the Foreign Disclosure and Technical In-
formation System (Fordtis). The objective of Fordtis is to assist
the U.S. Government in meeting its national security responsibilities
in the disclosure of classified military information, import and export
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
190
control, international armament cooperation, and assessment of U.S.
technology posture.
Analysis has shown that automation can be effectively applied to
the caseworking process by providing caseworkers a common frame
of reference within which to make decisions. We f mnd that the system
must include foreign military sales and munition licenses to give a
complete picture of munitions leaving this country. We also found
that commercial commodity licenses sent to DOD by the Department
of Commerce and Cocom cases sent to DOD by the Department of
State must be included in order to make rational decisions on the ex-
port of militarily critical technologies.
In addition to these historical files, the caseworkers need reference
information such as the militarily critical technologies list, country
assessments, and weapon systems reference lists. Fordtis will con-
tain this information and will interface with the Department of State
systems and one Department of Commerce system.
We expect an initial operating capability this month with a full
operating capability supporting a network of users 1 year later. We
anticipate that Fordtis will reduce staffing of routine cases and
allow more time for precedent-setting critical cases. Fordtis will
allow the U.S. Government an unprecedented capability to control
the export of information, munitions, and technology.
Mr. Chairman, this concludes my prepared statement. I shall be
happy to respond to any questions you or your subcommittee may have
at this time.
Senator NuNN. Thank you very much, Mr. Van Cook.
We appreciate your excellent statement. Because of the Soviets'
activities in Afghanistan the United States will not allow the Soviets
to obtain information from the Technical Information Service. Does
this mean the Soviets really are locked out of this or can they find
other ways to get to it ?
Mr. VAN COOK. The Soviets directly are locked out of it but we ex-
pect that their surrogates are certainly providing the information to
them and using the service.
Senator NuNN. Is this more of a symbolic act than it is something
that can really be enforced?
Mr. VAN COOK. Yes, sir.
Senator NuNN. You mentioned the so-called "cottage industry"
that has sprung up regarding the Freedom of Information Act. Would
you tell us how you define a cottage industry? What do you mean
by that?
Mr. VAN COOK. These are organizations that have been in the
business of accessing Government records under the Freedom of In-
formation Act, asking for a wide range of Government records, repro-
ducing them, and selling them, here and abroad.
Senator NuNN. They are actually in the business?
Mr. VAN COOK. They are in the business, yes, brokers.
Senator N17NN. Do any of these so-called cottage industries have
computerized operations that you know of?
Mr. VAN COOK. Yes. They do, sir.
Senator NIETNN. Would you describe that
Mr. VAN COOK. You know, in this age of microfiche and microforms
and computers, the data bases are easily organized and they can be
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
191
accessed in minimum time, within a matter of minutes. So that these
data bases are utilized by industry throughout the United States, cer-
tainly by these people, where they have a complete data base of all of
that which they have obtained through their requests under the
Freedom of Information Act.
I believe there is one outfit called INFODOC overseas that makes
great use of these data bases. I have an example of some of their publi-
cations which I will be glad to provide for the subcommittee's review.
Senator Nurnv. Do you regard our technology as a national asset as
you do our military information
Mr. VAN COOK. I believe that there should be no question in anyone's
mind that the U.S. technology and technical know-how is the best in
the world. It should be treated with a sense of worth. Yes, I believe
it should be treated as a national asset.
Senator Numv. Regarding the Freedom of Information case in
which an individual was able to obtain the technical abstract bulletins
index, is this really an equivalent to a road map of U.S. technology,
directions, capabilities, advancements, and future intentions ?
Mr. VAN COOK. Yes. In that particular case, Senator, we classified
the document, the total document, the index on the basis that it would
give an indication of our level of effort because it did outline. in some
detail, although each entry being unclassified, the subject matter that
was in existence. So the compilation we felt revealed a level of effort
and classified on that basis. The court made a decision that it did not
need to reach to the validity of the classification but merely get to that
portion of the Freedom of Information Act which says that the re-
questor is entitled to the unclassified segregable portions and the court
ordered that he be provided with all of the unclassified entries. Conse-
quently, we provided him with the document.
Since, based on that court decision, we have since declassified that
document. It is no longer a classified document. So it is available.
Senator' NurrN. So that was the combination of the Freedom of
Information Act plus the court decision?
Mr. VAN COOK. That is correct, sir.
Senator Nurnsr. Is this administration going to have any recom-
mendations on the Freedom of Information Act?
Mr. VAN COOK. Yes. There is a legislative package in the Congress
at this time.
Senator NuNN. Now pending?
Mr. VAN COOK. Now pending, yes.
Senator NuNN. Does that cover any of these areas we have talked
about? Does it cover the access by foreign citizens?
Mr. VAN COOK. My understanding is that it is in that package. Yes,
sir.
Senator NUNN. COLTH you furnish that package to us for the record?
We can get it?
Mr. VAN COOK. I will be glad to.
[The material referred to was marked as "Exhibit No. 32," for
reference, and may be found in the files of the subcommittee.]
Senator NuNN. Has the Department of Defense participated in that?
Mr. VAN COOK. Yes.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
192
Senator NUNN. Do you think this package does plug up most of the
loopholes that you are dealing with?
Mr. VAN COOK. The one that we are principally concerned with now
and which we are addressing today, technology transfer, we think it
would go a long way if under the Freedom of Information Act we
would have the authority to withhold that type of information. I think
it would help considerably, sir.
Senator NUNN. What about the index of military specifications? Is
that currently available under the Freedom of Information Act?
Mr. VAN COOK. Yes. The index of military specifications and stand-
ards is a two-part document, alphabetical listing and numerical list-
ing of our military specifications and standards. It is for sale by the
Government Printing Office. By subscription, $40, I think, domestic
and $50 foreign.
Senator NUNN. Is this something that should be classified?
Mr. VAN COOK. It is very difficult to classify this, Senator, to reach
the damage criteria for one thing. For another thing, it sometimes
is not practical to classify. Example, you might take a military
standard and specification of a Jeep tire which is listed in this book
and if you went to the classification route, the fellow who has to
change tires would have a clearance, you know, you get into all of those
safeguard rules and it is just impractical to do it.
Senator NUNN. So this is something no matter how we change the
law, regulation, something like this is going to always be available.
Right?
Mr. VAN COOK. Not a matter of how you change the law and
regulations. I think if the laws were such that if we could withhold
this information properly and use it for the people who need to use
it, in the Department of Defense, in the Government in fact, possibly
the contractors, that is what we are looking for.
Senator NUNN. Is there any kind of proposal by the administration
that would allow you to do that?
Mr. VAN COOK. Yes. I think this amendment to the Freedom of
Information Act would give us that license.
Senator NUNN. But I thought you were saying that this is a docu-
ment that is printed by the U.S. Government Printing Office and can
be subscribed to?
Mr. VAN Coox. Under the Freedom of Information Act, if we could
withhold it, under a statute, under the Freedom of Information Act,
for example, we would stop that, that would no longer be available
for subscription.
Senator NUNN. One of the huge problems in classification is that
the people at the top, or even the second echelon or third echelon, don't
have time to go through all of these documents and classify. Conse-
quently any comprehensive system of classification has people way
down the line making those determinations. Is that correct?
Mr. VAN COOK. Sir, in the Department of Defense we make very
extensive use of what we call security classification guides. so the
people down the line that you are speaking of work under these guides.
They don't make original classification decisions. nor do they have to.
They merely need to determine that the information they are deal-
ing with fits this guidance and they mark it as the original classifier
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
193
wants it marked. We have over 1,200 such guides in the Department of
Defense covering classified programs, projects, plans and systems.
Senator NuNN. We thank you very much for your cooperation and
your testimony. We want to stay in touch with you as we begin to
make suggestions in these areas.
Mr. VAN COOK. Thank you, Senator.
Before I go I would like to say I have 39 years in the Government
service and I have dealt with many of the committees, both in the
House and the Senate side. But I just want to say that the coopera-
tion that was extended and the courtesies that were extended to us by
the staff people on this subcommittee was above and beyond. I think
they are truly professional and specifically Mr. Fry of your staff,
Mr. Asselin who dealt with us on the preliminary inquiries, were com-
pletely cooperative and the Department expresses its appreciation to
the subcommittee for that.
Senator Nurrs. Thank you very much. We appreciate that. I know
the staff appreciates that. I agree with your evaluation of them and
I am delio:hted that they were received that way in the Department of
Defense. We hope to have some constructive recommendations and we
certainly have benefited very much from your input.
Mr. VAN COOK. Thank you, sir.
Senator Nio-xx. Our next witness is Mr. William Von Raab, Com-
missioner, U.S. Customs Service. I believe Mr. Von Raab is going to
be accompanied by Mr. George Corcoran, Assistant Commissioner?
border operations?U.S. Customs Service.
Mr. Vox RAAB. That is correct. One other individual possibly. We
have some charts.
Senator NUNN. That will be fine. If the people who are going to
testify, if you could introduce them for the record, then we will ask
all of them to be sworn in.
Mr. VON RAAB. George Corcoran is at my right, Assistant Commis-
sioner for border operations; Pat O'Brien, who is our Director of
General Investigations under which most of these activities take place.
They may be asked a question.
Senator NuNN. If you will all hold up your right hand, do you swear
the testimony you will give before this subcommittee will be the truth,
the whole truth and nothing but the truth, so help you God?
Mr. VON RAAB. I do.
Mr. CORCORAN. I do.
Mr. O'BRIEN. I do.
TESTIMONY OF WILLIAM VON RAAB, COMMISSIONER, U.S. CUSTOMS
SERVICE, ACCOMPANTED BY GEORGE G. CORCORAN, ASSISTANCE
COMMISSIONER?BORDER OPERATIONS?U.S. CUSTOMS SERVICE;
AND, PATRICK O'BRIEN, DIRECTOR, GENERAL INVESTIGATIONS,
U.S. CUSTOMS SERVICE
Mr. VON RAAB. I brought a few charts here which might make
my presentation a little clearer' if it is all right with you.
Senator NuNN. That will be fine.
Go right ahead.
Mr. VON RAAB. Let's make sure that the Senator can see them over
there.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
194
Senator, I appreciate this opportunity to discuss with you the prob-
lem of Soviet acquisitions of critical technology. Since you are all well
aware of the magnitude and seriousness of the matter, I will take this
opportunity not to discuss the critical technology issue but rather what
the Reagan administration and Customs is doing to address it.
Historically, the Customs Service has played a role in export con-
trol enforcement since the birth of our Nation. In 1793, President
Washington, in order to avert American involvement in the French
Revolutionary Wars, issued the first proclamation of U.S. neutrality
and directed enforcement by officers of the Customs Service.
Since that time,
numerous proclamations and statutes have been
promulgated involving neutrality and other areas of export control.
Some of these enactments were for specific political or policy purposes,
such as bans on the export of critical technology to the Soviet Union
and others were for general purposes such as the licensing of all muni-
tions for export whatever their destination. Regardless of their nature,
Customs has always played a principal role in the enforcement of
these provisions.
Until 1973, Customs investigations regarding illicit exports were
mostly reactive and centered around various exile groups in the United
States, who, at times, would try to organize expeditions to invade
their former homeland.
Cases involving other areas of export control were almost non-
existent and, of the few that were conducted, most concerned the
export of stolen articles or commercial goods. During the mid and late
1970's, more and more emphasis was placed on export control enforce-
ment and several significant investigations were successfully culmi-
nated, including some cases involving the illicit transfer of critical
technology. These critical technology cases have been provided to your
staff in written summation.
Under the Reagan administration, a strong emphasis has been
placed on thwarting the flow of high technology to the Soviet bloc
and other unfriendly nations. In response to this mandate, I directed
the U.S. Customs Service to launch new initiatives aimed at com-
bating the trafficking in illegal exports.
The result of these efforts is called by us in Customs Operation
Exodus, a national enforcement program which integrates the various
operational units of the U.S. Customs Service. The program has three
distinct objectives, each of which is essential to the national interest.
The first objective is to halt, to the maximum extent possible, the
illicit flow of critical technology to the Soviet bloc and other un-
friendly nations. By critical technology, we in Customs means those
items which represent technological advances to the Soviet bloc
whether they be revolutionary or merely evolutionary in nature. This,
of course, is necessary if we are to regain and retain military parity
with the Soviet Union.
The second objective is to disrupt the flow of high technology to
the Soviet Union. By high technology, we mean those items which
the Soviet Union can manufacture themselves but choose to acquire
from the 'United States in order to reduce costs and improve ouality.
By intercepting such shipments, the Customs Service can significantly
disrupt the Soviet military complex.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
195
The Soviets will eventually be required to produce their own high
technology rather than relying on ours and will thereby be forced
to divert resources from other military areas.
The full significance of this becomes apparent when one realizes
that the Soviet Union does not have the massive civilian market for
this technology and must absorb the entire cost of building and operat-
ing Manufacturing facilities without being able to offset the expense
through large-scale commercial sales.
The final goal of the program is to intercept shipments of other
commodities which are being exported in violation of various sanc-
tions and embargos, such as the present embargos against Cuba, and
Libya, as well as the recent sanctions against Argentina. Effective and
credible enforcement is essential if the sanctions are to achieve their
desired end.
Operation Exodus is being coordinated from the national com-
mand center located at the Customs headquarters in Washington. The
command center is staffed with special agents and intelligence analysts
who coordinate the interdependent intelligence, inspection, and investi-
gative activities both here and abroad. The effective correlation of
these three disciplines has been one of the prime underlying factors
contributing to the early success of Operation Exodus.
In our intelligence efforts, we have been very fortunate. We have
found that most manufacturers and exporters are also importers
amongst whom we have developed sources in relation to our import
smuggling and fraud programs.
Likewise, the sources we have among shippers, brokers' and freight
forwarders as well as our extensive network of contacts within the
foreign Customs Services have all been very productive in the? area
of illegal technology transfer.
We have also clone very well with U.S. Government agencies. Here,
our reputation in investigating illegal exportations and the focus pro-
vided by Operation Exodus have combined to play a critical role in
the administration's efforts to block the transfer of technology to the
Soviet Union.
Due to the fine efforts of Assistant Secretary Lawrence Brady, we
have been able to establish an analytical unit within the Department
of Commerce. This unit which is headed by a special assistant to
Mr. Brady and staffed by Customs and Commerce employees, has de-
veloped an innovative intelligence approach dependent upon the appli-
cation of link-analysis techniques to the Department of Commerce
license application files.
The analyses produced to date have been outstanding in identifying
firms engaged in diverting critical technology to the Soviet Union
and in pinpointing new diversion routes. This intelligence is being used
in developing profiles for the Exodus inspection teams and as the
basis for major criminal investigations into Soviet diversions.
The Department of State has given us extensive access to their files
both in their Office of Munitions Control and their Office of East-West
Trade, where the sheer volume of information available has required
us to place a full-time analyst. We are also receiving maximum sup-
port from the U.S. intelligence services and the FBI who is providing
intelligence and participating in joint investigations with us through-
out the country.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
196
Our inspectional activities are progressing equally as well. The
Exodus teams are now operational throughout the Nation examin-
ing cargo at airports, seaports, and land borders. What they encounter
most are fraudulent exportations. That is goods being misdescribed to
lead the shipper and Customs officials to believe that they do not re-
quire a license; or goods being shipped under either a fictitious license
or one that covers a different commodity or different destination.
When one of our inspection teams locates a suspicious shipment they
contact the command center to determine whether the shipment re-
quires a license, whether any license associated with it is valid, and
whether the firms or commodities involved are suspicious and should be
monitored overseas for potential diversion.
In addition, to facilitate matters further, two special agents and two
import specialists have been detailed to the Department of Commerce
to assist in responding to licensing inquiries. This not only improves
the efficiency of our operation but also minimizes delays of legitimate
exportations.
The inspectional teams also on occasion encounter goods being clan-
destinely smuggled out of the country or being diverted to third coun-
tries, however, by and large, smuggling and diversions are detected
only through good intelligence and thorough investigations.
The results of our Exodus inspections have been outstanding. The
chart on display indicates the number of shipments being detained
by our inspection teams since we established our Exodus Command
Center.
These figures, we have found to be an accurate measurement of our
field activity. You will notice the sharp increase in early February,
this is when formal Exodus teams became operational.
The high level of activity in March, on the other hand, is the result
of the President's Libyan embargo which became effective in stages
between March 12 and March 28.
The next chart indicates the export seizures being made. The high
number of seizures in March is again due to the Libyan sanctions. So
far this fiscal year, we have made over 300 export seizures valued at
more than $20 million. The more notable seizures have involved lasers,
computers, and highly sophisticated military technology destined for
the Soviet Union either directly or through other nations.
We have also made numerous seizures destined to Libya and
other nations against which this Nation has imposed sanctions and
embargos.
In just the last week, we seized a, shipment of 32 military aircraft
engines destined for Argentina and have also placed several ship-
ments, including a high performance helicopter under detention.
As I previously stated, our most significant results can be expected
in the area of investigations. The intelligence being provided by the
CIA, FBI, and other Government agencies, both foreign and domestic,
the information being provided by Commerce and gathered from our
contacts in the import/export and shipping industry, again both here
and abroad, and the leads being developed through the efforts of our
inspectional teams have led to numerous significant investigations in-
volving the diversion of technology to the Soviet Union and other com-
modities to Libya, Cuba and other sanctioned nations.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
197
Our investigations are aimed at criminal prosecutions which we
hope will provide an effective deterrent to those engaged in this
illicit trade. The techniques we use, that is confidential sources' sur-
veillances, data base analyses and foreign investigations are those
that we have always used in smuggling and fraud investigations.
At this moment, we are conducting over 40 major criminal investiga-
tions involving illegal diversions and are monitoring several signifi-
cant shipments abroad which we believe are intended for the Soviet
bloc.
While I cannot publicly discuss the details of most of these investi-
gations, I am free to discuss one of the more significant ones with you,
due to the nature in which the investigation has progressed.
Early last month, the Custom attach?Mexico City, acting upon
information from a confidential source, located a multispectral scanner
which had been smuggled out of the United States on a corporate jet
belonging to a Los Angeles-based firm.
The scanner is designed for use by the military in tracking the
movement of troops and supplies by airplane and satellite. It works
by emitting infrared and thermal light waves that strike objects on
the Earth and transmit electronic data to computer equipment at a
ground station which converts the data into photographs.
Using false documentation describing the merchandise as photo-
graphic equipment from Panama, the violators booked the shipment
to Zurich, Switzerland on KLM Airlines. A rapid investigation in
Europe quickly determined that the consignee had only a mail drop
in Switzerland and was actually located in East Germany.
Consequently, the Customs attach?n Mexico City determined that
the shipment was placed on a flight that stopped in the United States
enroute to Zurich.
When the plane landed in Houston, the cargo was off-loaded, seized
by Customs agents and replaced with sandbags. The shipment was
permitted then to proceed to Zurich via Amsterdam.
Two days later, special agents in Los Angeles executed a search
warrant at the exporter's premises, and seized two sophisticated com-
puters also destined to the same customer as well as documentation
establishing the true destination as Moscow. This investigation and
many others equally important, are being pursued this very moment
by Customs special agents.
Consequently, from an almost nonexistent and purely reactive
Federal export control program focusing on illegal arms exports;
Customs, with the support, cooperation, and encouragement of the
entire export control enforcement and intelligence communities, has
successfully launched a major initiative to combat the illicit transfer
of technology and other commodities to hostile nations.
We attribute this success to our unusual role in the international
enforcement community. Our authority, structure, contacts, and ex-
perience in smuggling and fraud investigations have placed us in the
position of being able to reach out and almost instantly provide to
the Nation a capability which is sorely needed.
I believe that in the coming years, the U.S. Customs Service can
continue to be very effective in addressing the problem at hand and
disrupting, the Soviet acquisition attempts which the intelligence com-
munity has projected throughout the 1980's.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
198
Thank you for this opportunity to describe briefly some of our
efforts to stem the loss of critical and high technology and I would
be happy to answer any questions as would Mr. Corcoran or Mr.
O'Brien that you may wish. to put to us.
Senator NUNN. Thank you, very much, Mr. Von Raab. Is the en-
forcement of the Export Administration Act a long-term priority
of the Customs service? I gather from what you have said here today
it is.
Mr. VON RAAB. Yes, sir.
Senator NUNN. Can you provide to the subcommittee an approxi-
mation of the amount of resources devoted to controlling the export
of critical technology by the Customs service?
Mr. VON RAAB. At the present we have approximately 125 Customs
inspectors, 50 special agents, and 25 support personnel, who are as-
signed exclusively to Operation Exodus. We are also drawing upon
on a regular basis the daily responsibilites of almost 4,000 other
Customs inspectors, and just under 600 other agents where and when
the need arises.
Senator NuriN. Plus all your people out there in the field, I guess,
are theoretically available when the need arises?
Mr. VON RAAB. That is about all our people. I would say as far as
our inspectors and agents are concerned, there is not a single one of
them who has not spent a fair amount of time, if not just being trained
in Operation Exodus, having some personal experience with that.
Senator NUNN. To what extent does Customs have liaison with the
Department of Defense in this technology area?
Mr. VON RAAB. We have a number of contacts with the Department.
We have individuals who are identified to work with the Department
of Defense. We have excellent liaison with the Department of Defense.
Senator NUNN. Where do you go for your expert technical opinions
when you run across a technology case?
Mr. VON RAAB. If we can't answer it ourselves?we are getting
better at doing that?we then make an inquiry of the Commerce De-
partment and we consult with them over the telephone if we can
handle it that way. If not, we will go into it in more detail in person
or bring a sample or documentation with us. Therefore, we receive the
ultimate technological support from the Commerce Department.
Senator NUNN. You say that you have assigned certain personnel
from Customs to the Commerce Department?
Mr. VON RAAB. Yes.
Senator NUNN. How many?
Mr. VON RAAB. Seven.
Senator NUNN. What is the reason for that? What do they do?
Mr. VON RAAB. The reason is simply to merge where possible our
expertise and theirs. We are experts on the way cargo is passed across
borders. They are experts on the particular requirements involved in
licensing of particular matter. We are often faced with a question of
whether something needs a license at the border.
It is easier for us to have people in the Commerce Department who
can deal directly with the Commerce experts and to be able to ask
them those questions.
It saves us time and energy and we get better answers as a result.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
199
Senator NUNN. Mr. Von Raab, if you were given total responsibility
under the law, to enforce the violations of the Export Administration
Act, would Customs be able to carry out that mission in your view?
Mr. VON RAAB. Yes; we would. We would continue however to
rely heavily on Commerce's expertise to provide us with assistance.
Senator NUNN. In terms of what expertise that they have?
Mr. VON RAAB. They make the decisions as to whether something
should be licensed.
Senator NUNN. If they were doing the licensing that would be where
you would get your information as far as what should be enforced?
Mr. VON RAAB. Yes; often we are asking the question of ours at the
border as to whether something requires a license. Often, it is a
difficult question. Therefore we do rely on them.
Senator NUNN. Would the Customs Service have to employ addi-
tional people in order to handle the enforcement part of the Export
Administration Act?
Mr. VON RAAB. As I indicated, we have exactly what the munbers
were, but between 200 and 300 individuals already assigned direetly to
that with the ability to call on the rest of our forces. We would not heed
to hire additional individuals because I don't believe that Commerce
really has more than 20 or so that would have to be replaced.
Senator NUNN. Do you think it is possible for the Commerce De-
partment to have a viable export control program in terms of enforce-
ment with 8 to 12 investigators and 5 inspectors in the compliance
division?
Mr. VON RAAB. No, sir. Obviously, those numbers are much too low
for a reliable enforcement effort. I would say, however, that those indi-
viduals do make an important contribution to the enforcement effort.
Senator NUNN. How can Customs insure that violators of the Export
Administration Act will adhere to the administrative sanctions such
as denial of export privileges?
Mr. VON RAAB. The way?I don't fully understand you.
Senator NUNN. Let's assume you took over the enforcement end. How
would you insure that when there is a violation that the administrative
sanctions can be administered? Would that be a Commerce function?
Mr. VON RAAB. We would refer that to Commerce.
Senator NUNN. Commerce would handle that end of it?
Mr. VON RAAB. Yes, sir.
Senator NUNN. Could you in Customs, if you were reouired to by
law, assume the administration of the Export Administration Act such
as conducting licensing operations in adjudication of noncriminal vio-
lation? Would that be something you could also undertake?
Mr. VON RAAB. I would not like to ever say that the Customs Service
is not canable of doing anything. but I think it is reasonable to say that
that activity certainly fits much better into Commerce with its close
association with the business community.
Senator NUNN. If there was a determination to give you jurisdiction
over the enforcement end of the Export Administration Act, you think
it makes sense to continue to have the licensing in the Commerce
Department?
Mr. VON RAAB. Yes, sir.
Senator NUNN. We understand that in the CTC case that West Ger-
many cooperated and that was facilitated through the establishment of
Annroved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
200
a working agreement between the U.S. Customs attache in Bonn and
West German Customs; is there as specific agreement on that?
Mr. VON RAAB. On the case? We have mutual assistance agreements
with Canada, France, Austria, Mexico, and West Germany; I think
that is it.
There are five. There are five specific mutual assistance agreements
that the Customs Service does have with the proper agency or govern-
ment of five other countries. I don't know if I gave you five or not. But
there are five.
Senator NUNN. You have the authority under the law in certain
cases to make arrests without warrants; do you not?
Mr. VON RAAB. Yes, sir.
Senator NUNN. What kind of cases do you have that authority in?
Mr. VON RAAB. Those are typically border searches, mostly on in-
coming border searches.
Senator NUNN. Incoming?
Mr. VON RAAB. Yes, sir.
Senator NUNN. Do you have any authority on outgoing?
Mr. VON RAAB. We have no specific statutory authority on outgoing.
However, we have received a succession of favorable cases implying
that we have very, very strong authority in that are under State stat-
utes or under, in sonic cases, posse comitatus.
Senator NUNN. How about large amounts of cash being taken out of
the country? Is that something that you can make an arrest in when
it violates the law without a warrant?
Mr. VON RAAB. We require probable cause in the case of currency
seizures.
Senator NUNN. But you don't have to have a warrant?
Mr. VON RAAB. Only on search, not on the arrest.
Senator NUNN. What about the export control cases? Do you have
authority to make arrests without warrants in these cases?
Mr. UBRIEN. I am Pat O'Brien, Director of General Investigations
with the Customs Service.
While not having needed explicit search or arrest authority we have
done very well in the courts and they have ruled that we have implied
authority to conduct the searches and the arrests.
The difference in the.currency area is that the currency statute it-
self says that searches will be conducted pursuant to a warrant based
upon probable cause.
So, the currency statute actually limited our authority beyond what
we had prior to the statute.
Senator NUNN. DO you need authority under the law to conduct
searches of persons leaving the country as well as coming into the
country?
Mr. VON RAAB. We have implied authority to conduct searches of
those individuals.
Senator NUNN. So you don't need any changes in the law in that
regard?
Mr. VON RAAB. Of course we would prefer to have wherever explicit
statutory authority to conduct those searches. We have been success-
however, in receiving as Mr. O'Brien indicated, very good and
supportive decisions based upon our implied authority.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
201
We would certainly like to have the issue of the currency seizure
cleared up and we would like to have the level required to reduce the
suspicion as it is in most others.
Senator NUNN. Is there a pending bill on that? I thought Senator
Proxmire had a bill on that; do you know?
Mr. CORCORAN. Yes, there is a bill on the arrest authority, but not
on the search and seizure.
Mr. VON RAAB. The Treasury is preparing some legislation and
I would expect that if we can move it through OMB, we will probably
make it up here at some point.
Senator NUNN. We understand that Customs has experienced diffi-
culty in receiving information due to a restricted interpretation of
section 12(c) of the Export Administration Act by the Department
of Commerce.
Could you tell us what?
Mr. VON RAAB. In the past, Customs Service has had some prob-
lems receiving information from the Commerce Department. How-
ever, a recent decision by the Secretary made, I believe, some time
during March has opened up our access to the files with respect to
specific cases that we may be working on. So Commerce has shown
a tremendous amount of increased cooperation, I believe largely
through the intercession of the Assistant Secretary Brady, who has
been working very hard to improve our working relationship.
Senator NUNN. Are you familiar with the Richard Mueller case
and the Volker Nast case?
Both of those cases, I think, were made by Customs? The II
batteries case?
Mr. CORCORAN. Yes.
Senator NUNN. We understand that both of these men were indicted
and are now in West Germany ; is that right?
Mr. CORCORAN. They have both been indicted and that is right, two
of the individuals are in West Germany. This was one case we jointly
worked with the Commerce Department.
Senator NUNN. Was this a violation of the Export Administration
Act?
Mr. CORCORAN. Yes, they were indicted for the violation of the
Export Administration Act and found guilty of exporting semicon-
ductor manufacturing equipment.
Senator NITNN. Who was found guilty?
Mr. CORCORAN. Three individuals and the company in southern
California, II Industries.
Senator NUNN. Are these extradictable offenses under the Export
Administration Act?
Mr. CORCORAN. They are not for American citizens.
Senator NUNN. How about foreign people?
Mr. CORCORAN. I don't think so, sir. I would have to check.
Senator Nmsrx. Could you furnish something in the record on that?
Mr. CORCORAN. Yes.
Senator NUNN. ParticularlyThese two cases.
Mr. CORCOT?AN. The company was fined $10,000 and the three indi-
viduals were fined $25000 aniece in addition to being found guilty.
[The information follows :J
Violations of the Export Administration Act and the Arms Export Control
Act are not extradictable offenses.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
202
Senator NUNN. Mr. Von Raab, we understand that customs has
experienced certain difficulties with the Commerce Department in
criminal investigations. These difficulties were outlined in an October
30, 1980, memo from William Green, Deputy Assistant Commissioner
of the Office of Border Operations. That was to Mr. Robert Keuch,.
who is the Associate Deputy Attorney General and Chairman of the
Interagency Group on Export Control.
This is the memo that we have on that subject and I quote from it:
What is particularly significant is Commerce's 0EA CD continued action to
impede cooperation and investigation even while it states that it wishes to
fully participate in all cooperative ventures.
Commerce continues to take unilateral and uncoordinated action concerning
either joint or Customs initiated investigations by requesting foreign inquiries
through various U.S. embassies and consulates without consulting with either
Customs attaches or headquarters. Such action is causing serious problems.
These problems are not limited to hampering instant investigations but also
compromising the U.S. Customs foreign government sources, damaging the
previously close and long relationship between the United States Customs
Service and their foreign counterparts and directly impacting on national
security.
'Senator NUNN. This memo is October 30, 1980. Have you seen that
memo?
Mr. VON RAAB. No, sir. I have not. But I have spent a lot of time
discussing the problems that have existed in the past between the Cus-
toms Service and the Department of Commerce, both with the individ-
uals at Customs who are responsible and also with the number of offi-
cials at Commerce.
As I indicated, Assistant Secretary Brady and I have taken this as
a personal campaign to improve the cooperation of the two services
and particularly to improve the Commerce Department with respect
to our activities.
I believe that he has made a number of changes within the Commerce
Department. He is trying very hard. It takes a long time to turn
around a bureaucracy like the Commerce Department. I, fortunately,
am lucky enough to have an enforcement organization of extremely
responsive and extremely dedicated individuals and therefore we have
been able to respond to Exodus very quickly.
But I would like to indicate that the environment between Commerce
and the Customs Service has improved immeasurably. And I have
great hopes for the developing relationship.
With respect to foreign investigations, I do believe that there are
problems with Commerce conducting certain foreign investigations.
Customs does have much better connections with the police agencies
that these investigations would typically use.
Unfortunately, Commerce is burdened with a number of other re-
sponsibilities that other nations find offensive, particularly antitrust,
some antitrust investigations but more particularly some of our anti-
boycott as a result of which it is very difficult for a Customs or for
Commerce officials to work effectively with police agencies and in other
parts of the world where they fear that the Commerce officials are not
only interested in stemming the flow of critical technology which they
regard as a legitimate exercise but they are also afraid that the Com-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
203
merce officials may be visiting certain businesses for purposes of en-
forcing some of the U.S. laws that those countries do not like.
So it is a real problem for Commerce abroad in my opinion. Occa-
sionally we stumble over each other but I think the bigger problem is
that the police organizations don't like the Commerce attaches.
Senator NUNN. In your personal opinion doesn't it make sense to
shift the enforcement part of the Export _Administration Act to the
Customs Service leaving the licensing in the Commerce Department?
Mr. VON RAAB. We are already doing a large part of the enforce-
ment. I don't know that it is necessary that only one agency have the
total responsibility for enforcement.
Senator NUNN. If you were trying to devise an efficient method,
though, you wouldn't split the same responsibility between two agen-
cies, would you, one with an overwhelming capability and the other
with very little capability at all?
Does that makes any sense at all from an administrative point of
view
Mr. VON RAAB. I unfortunately do not know enough about the uni-
verse of Commerce's responsibilities. I have to assume that there are
certain aspects of investigations or enforcement that they do bring
particular expertise to bear on. I certainly wouldn't suggest that they
need to increase their forces in any way. But if I were Assistant Secre-
tary Brady, I would hate to lose any power I had over enforcement
because there are particular cases in which I feel that I might find it
necessary.
Senator NUNN. You are not Assistant Secretary Brady. We will
hear from him later. I am asking for your opinion.
Mr. VON RAAB. I have to agree with him on this. I think he will
probably say that to you. I think we should carry the major share,
the 95 percent, but I don't believe that it is necessary to snatch it
totally from Commerce.
Senator NI:wig. Would you see that there would be any damage done
to our overall export capability in enforcing the law by putting it all
into Customs?
Mr. VON RAAB. As I indicated before, I have great faith in Customs.
So my answer to that would be, No, I don't see that it would cause
a problem.
Senator NUNN. But because of your fondness for Mr. Brady and
your sensitivity to the Commerce's Department's feelings in this sub-
ject, you would not advocate shifting?
Mr. VON RAAB. That is correct.
Senator NUNN. Is Mr. Corcoran free to give his opinion?
Mr. VON RAAB. Absolutely.
Senator NUNN. He can give his own personal view without being
in any difficulty? Is that right?
Mr. VON RAAB. Yes, sir.
Senator Numsr. Mr. Corcoran
Mr. VON RAAB. At least for now he is.
Senator NUNN. Do you think it makes sense, Mr. Corcoran, to have
two different agencies responsible for enforcement under this?
Mr. CORCORAN. I think on the basis that you mentioned of effective-
ness and efficiency it makes sense to have one agency when we are so
predominantly involved.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
lit
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
204
Senator NUNN. You think it makes sense to put it all in Customs?
Mr. CORCORAN. Yes.
Senator NUNN. Is Mr. O'Brien free to give his opinion?
Mr. VON RAAB. They are both free to.
Senator NUNN. For the time being?
Mr. VON RAAB. They don't have control over this decision.
Senator NUNN. What is your personal view on that?
Mr. O'BRIEN. Being under oath, I must give my personal view.
I believe it can only improve the effectiveness and efficiency opera-
tions to centralize it.
Senator NUNN. Put it all under Customs?
Mr. O'BRIEN. Yes.
Senator NUNN. You don't believe it would damage our overall
ability to enforce the Export Administration Act to take it out from
under Commerce altogether except leaving the licensing there?
Mr. O'BRIEN. Absolutely.
Senator NUNN. Would you agree leaving the licensing there makes
sense?
Mr. O'BRIEN. Yes; I think it is important to keep the administra-
tive, especially the policy determinations separate from the enforce-
ment function. They make their determinations based on national
interest rather than enforcement.
Senator NuNN. I have a memo here the origin of which I will not
give at the moment but it says:
The Commerce Department has to wear two hats. On the one hand, it must
serve the interest of the exporting community by assisting them in opening for-
eign markets, by advising them on proper procedures for exporting, by offering
advice, making determinations concerning export licenses and in general assisting
exporters.
On the other hand, however, the Commerce Department must police the same
group to ensure the laws and regulations have been complied with and take puni-
tive action. This, of course causes a somewhat incongruous situation which can
lead to conflicting internal policy and management decisions.
Customs now enforces the Arms Export Control Act with the delegation of the
Department of State and has done so for many years
and so forth.
Do you, Mr. Corcoran, agree with that?
Mr. CORCORAN. I think my feeling is that very much as Pat O'Brien
just mentioned, I think that we as the enforcement agency should be
the factfinding agency.
I do think that even though there seems to be a conflict there that
Commerce should retain the licensing and administrative function.
I think overall policy and considerations in the Commerce and the
oversight of the movement of products in and out of the country
Senator NUNN. Should retain the licensing function?
Mr. CORCORAN. Yes; I think they should retain that function and
the policy and administrative actions involved in the licensing. I think
we should be just a factfinding enforcement agency.
Senator NUNN. I think Mr. Von Raab, you mentioned in your state-
ment that or in answer to the question that you didn't believe the Com-
merce Department couldn't really do the job with the number of people
they have there now?
Mr. VON RAAB. The point I am trying to get across is I am not sure
that to deprive Commerce, the ability to do any enforcement in this
area is a good idea.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
205
I say that only because we live with a similar problem with respect
to drug investigations in which we are deprived by the Reorganization
Act of 1972 from conducting drug investigations. DEA has that
responsibility.
Senator N17NN. What I am puzzled about, I have been through all
of that?
Mr. VON RAAB. Therefore I think it is a mistake to prohibit a depart-
ment from conducting certain activities which are very closely related
to other matters that it deals with. I am not suggesting in any way that
Customs shopld not, in effect it is. but should not remain and grow as
the primary if not almost total enforcement arm.
It makes me nervous to remove any enforcement authority from the
Commerce Department. That is my concern.
Senator NuNN. But if you just remove the people, left the authority
there, that would solve it, wouldn't it?
Mr. VON RAAB. You will get to it one way or the other.
Senator NUNN. What I am puzzled about is you don't believe they
could properly enforce
Mr. Vox RAAB. Certainly not with that number of people.
Senator NUNN. But then you added you don't think they should
increase the number of people.
Mr. VON RAAB. I don't think they need a large enforcement effort. I
just think it is probably important for them
Senator NuNN. What you are basically saying is we should leave
some authority and maybe a few people in the Commerce Department
for sensitivity and prestige purposes and then shift the main respon-
sibility to the Customs Service?
Mr. Vox RAAB. That is probably true.
Senator NuNN. I want to thank all of you for appearing, not only
appearing here today, but also cooperating with us so well here in this
whole investigation.
The staff has informed me of your excellent cooperation. We appre-
ciate it. Mr. Von Raab, if you could reduce those charts to be this size
so we could put them in the record, we would appreciate it.
Mr. VON RAAB. We have a few sets. We will send them up.
[The charts referred to follows:]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
WE
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
206
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
207
PROBLEM:
FOREIGN ACQUISITIONS
O Critical Technology
O High Technology
O Other Commodities
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Z-17000Z91-001-001179?001A198dCl-V10 1-1-/Z1-/LOOZ eSeeiei -10d penaiddV
118Z.Lg
no
SL8ORW 69.59AUID 0
38.sk.q 0
93L1196flieZ
t I
sna
3 NOLLVE3d
80g
rik
Z-17000Z91-001-001179?001A198dCl-V10 1-1-/Z/LOO Z eSeeiei -10d penaiddV
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
209
INSPECTIONS
O Fraudulent Exports
O Smuggling
O Diversion
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
210
EINTELUG EXCE
O Manuffacturers/Expo ers
O SMppers/Brokers/F
rward rs
O Forerign Customs Senfic
O Commerc
/Stat
O U.S. Dnte[INgenc
4."
E"
Sendoes
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
211
INVESTIGATIONS
O Criminal prosecutions
O Techniques ? smuggling/fraud
O Sources
O Surveillances
O Data base analyses
O Foreign investigations
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
212
CIINCLUSI Iii
O Disru
t flow of critical tech
O impede military badup
Lor
n military ec
O Enforc
sanctions
O Dtrrr
rot/compHanc
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
213
uc7,
0-
ty),?p,c9,c2cogRir92,g?re9,4,9
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
214
1-
ss
In
1
co
0
0
c'1
0
It)
r?
o
L n
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
215
Senator NuNN. Thank you, very much. The subcommittee will be
back here at 9 o'clock Tuesday, at which time we will hear from Adm.
Bobby R. Inman Mr. Lorenzo, Deputy Under Secretary of Defense,
and Mr. Bryen, Deputy Assistant Secretary of Defense as well as Mr.
Lecht, former chairman, president of the board, of Advanced Com-
puter Techniques Corp.
[Member present at the time of recess: Senator Nunn.]
[Whereupon at 12 :30 p.m., the subcommittee recessed, to reconvene
9:08 a.m., Tuesday, May 11, 1982.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
TUESDAY, MAY 11, 1982
U.S. SENATE,
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
TV a8hington, D.0 .
The subcommittee met at 9:08 a.m., in room 3302, Dirksen Senate
Office Building, under authority of Senate Resolution 361, dated
March 5, 1980, Hon. Sam Nunn presiding.
Members of the subcommittee present: Senator William V. Roth,
Jr., Republican, Delaware; Senator Sam Nunn, Democrat, Georgia;
and Senator Lawton Chiles, Democrat, Florida.
Members of the professional staff present: S. Cass Weiland, chief
counsel ? Michael C. Eberhardt, deputy chief counsel; Eleanore J.
Hill, chief counsel to the minority; and Kathy Bidden' chief clerk;
Gregory Baldwin, assistant counsel to minority; Jack Key, Glenn
Fry, and Fred Asselin, staff investigators to the minority; and Kath-
leen Dias, executive secretary to the minority chief counsel.
[Members of the subcommittee present at convening: Senators
Nunn and Chiles.]
Senator NuNN. The subcommittee will come to order.
Senator Roth is coming in a few minutes but has asked me to begin
in his absence.
Our first witness this morning is Michael Lorenzo, Deputy Under
Secretary of Defense, International Programs and Technology, De-
partment of Defense.
Mr. Lorenzo, do you have some associates with you? If they are
going to testify, I will ask all of you to take the oath.
Mr. LoRENzo. I have a lot of supporters, Mr. Chairman.
Do you want them to take the oath? I don't know if I will call on
them or not.
Senator NUNN. We can have them come up later, if you need them.
Do you swear the testimony you give before the subcommittee will
be the truth, the whole truth, and nothing but the truth, so help you
God?
MT. LORENZO. I do.
Senator Ntrxx. Mr. Lorenzo, we appreciate you being here this
morning. We appreciate your cooperation with the subcommittee. You
can introduce your associates and I will ask if either of you are going
to testify, you go ahead and take the oath now.
Do you swear the testimony you give before the subcommittee will be
the truth, the whole truth, and nothing but the truth, so help you God?
(217)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
218
Dr. KAPPER. I do.
Dr. LOIVIACKY. I do.
Senator NUNN. We swear all our witnesses before the subcommittee
without exceptions. It is a long tradition.
Mr. LORENZO. Nothing like starting with a common base line, Mr.
Chairman.
Senator NUNN. That's right.
Mr. LORENZO. It is indeed a Pleasure, Senator Nunn. I guess I have
the go ahead, do I not?
Senator NUNN. Yes, sir, you go right ahead.
STATEMENT OF MICHAEL LORENZO, DEPUTY UNDER SECRETARY
OF DEFENSE, INTERNATIONAL PROGRAMS AND TECHNOLOGY, DE-
PARTMENT OF DEFENSE, ACCOMPANIED BY DR. FRANK KAPPER,
DIRECTOR OF MILITARY TECHNOLOGY SHARING AND DR. OLES
LOMACKY, DIRECTOR OF THE OFFICE OF TECHNOLOGY TRADE
Mr. LORENZO. Mr. Chairman, in the interest of time, and I might
say the thorough work we have done with your wonderful staff, Glenn
Fry and others, and going over the issues, the substance, I would like
to submit my prepared statement for the record as if I read it and
make a brief opening statement to summarize the statement, and I
would like to hit, a few highlights and be prepared, perhaps, for some
questions you may have.'
Senator NUNN. That will be fine.
Mr. LORENZO. I mentioned earlier, I have Dr. Frank Kapper here
on my left. He is the Director of Military Technology. He handles
munitions cases, FMS cases, MOU's, national disclosure policy,
mainly what is known in the vernacular as West to West trade.
On my right is Dr. Lomacky. As you know, he has the very difficult
and unpopular job of being in charge of dual-use technology trans-
fer, which comes under the Export '-Administration Act of 1979 and
which is the primary thrust of the hearings today, commonly known
as East:West trade, which I think is a misnomer.
It is really West to East trade we are concerned about.
The statement goes into the defense roles and responsibilities, and
accomplishments to date, of which there have been some. We would
like more and are working hard with some of our concerns related
to export control.
Limited by an unclassified hearing you have here, of course, we
stand prepared to go into closed session in subsequent hearings, if you
so desire, and, of course, classified sessions which you may desire to
do to get down to a lot of the nitty gritty, et cetera.
I looked over and I have read the statements of a lot of my col-
leagues who have already testified before this subcommittee and some
of them to follow.
Senator NUNN. Mr. Lorenzo, if you prefer to go through your whole
statement, we would be delighted. It is not that long. I am sure that
might be more comfortable for you. We have time this morning.
We will be delighted to hear all of it.
a. See p. 552 for the prepared statement cf Michael Lorenzo.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
210
Mr. LORENZO. Rather than read word for word, I was going to hit
the hightlights.
Senator Nuxisr. Whatever you prefer.
Mr. LORENZO. Really, we do two functions for the Under Secretary
of Defense Research and Engineering, Dr. DeLauer.
One is the technical policy and the other one is technical assessment.
This combined with strategic policy that is going to be covered by
my successor, Dr. Bryen, generally constitutes the DOD decision or
position that we go back to Commerce as our response to anybody's
request for technology transfer.
Technical policy becomes very difficult, like policy in general, to
define. We define it as pertinent to technical performance, operational
parameters and the acquisitional aspects of technology transfer. Dr.
DeLauer himself has established a new technical policy. Since we are
both rather fresh and recent from the private sector, it goes like this.
We have discovered and observed that on a case-by-case review basis,
we do an excellent and outstanding job in turning down cases.
However, it is our opinion that we do not do a job commensurate
with telling industry what they can do and can sell. We are working
on that and will give you some examples later, if you so desire.
There are many, many cases.
Let me take one now. A CAT scanner which is headed for a hospi-
tal. Everybody wants to help a hospital. I think maybe Larry Brady
uses this example, too.
I have a little different rationale than he does, but that is all right.
The OAT scanner is going to be roughly a million-dollar piece of
equipment. So that means a lot to the people manufacturing and sell-
ing. However, in that CAT scanner is imbedded a general purpose
computer, an array processor, display and signal processing equip-
ments both in hardware and software.
Obviously, the imbedded equipments only amount to around $35,000
to $10,000. However, they are accessible and normally through engi-
neering practices they are readily accessible, to be used off-line for
other things that we don't want them used for.
They are high powered computers. Well, first, the usual harangue
and argumentation goes on. The case of course should be considered
on its pure merits that is whether it could contribute a significant
enhancement to the military capability of a potential adversary,
either the country receiving it or another country who gets it on a
third party transfer.
In looking at this very deeply, we find out that we have not and
really should use technology to help solve technology transfer leak-
age, or so-called hemorrhaging.
This we can do, and I am glad to report to you though with a
humble and rather primitive beginning, that efforts are underway,
because we do want to protect the trade, the economy of our country
which, of course, we all know needs help now more than any other
time and sell, but protect the critical technology so it cannot be used
for off-line uses. And this we can do by changing the engineering
design to make the software, you might say, difficult to reverse engi-
neer, change the writing and change the mechanical accessibility.
And so we would like to work with you in the months to come and
95-929 0 - 82 - 15
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
220
I think we can make great strides in letting a lot of our advanced
technology go out but it will not?in unmodified form?let's say
modified form, I am sorry, be a contributor to the military enhance-
ment of a potential adversary.
That, as you heard, is costing us a lot of money in defense today.
The Soviets obviously have built up tremendously over the last 15
years with a lot of technology from our side and they depend on
Western technology.
I think with approaches like this, as an example, we can at least
make it very difficult for them and hopefully keep down the amount
of defense money expended in countering their threat which is being
built on Western technology to a great extent.
I might say in passing a very important message, I would like to
leave with the subcommittee is that we are getting great cooperation
from American industry. It is a good thing.
I will cite two examples. You take John Young, chief executive
officer of Hewitt-Packard. We sat down with them in detail, also with
Dr. Matt Sutton, Minneapolis Honeywell. They do not want to trans-
fer their advanced critical technology to do anything conflicting with
defense desires. We have to tell them what it is we want them to do
and what they can do, instead of all this back and forth work we are
going through now.
Of course, we are in the learning period of controlling critical
technology and we will get there, I am sure.
Senator Ntrxx. Do you have a group of people under your jurisdic-
tion who really sit down and conceptually with their scientific back-
ground and knowledge. try to come up with a list of what the Soviets
really need, what is critical to them in the defense arena, what kind
of dual use technology they could employ in their defense efforts?
Mr. LORENZO. I think the answer to your question, Mr. Chairman, is
essentially yes. A military critical technolopy list, which was called
for in the Export Act, is a step in that direction. We have revised it
twice and it is being- revised again.
The first time it was aimed for products predominantly. As you
know, the first submission was October I, 1980, in accordance with the
act.
The second round, we infused in that revision, you might say a Bucy
report type of description. The end products themselves are not too
bad because we give it to somebody who has to reverse engineer and
that takes time.
However, in the Bucy report, and he was 10 years ahead of his time,
he dealt, with Keystone equipment, in other words, something that
could be. done to the design, production, and manufacturinp; process.
Those are the kinds of technology that would hurt us most if it falls
in the hands of an adversary.
I would say the military critical technology list is one step in that
direction.
Senator NuNN. Does it cover dual use technology and commercial
applications?
Mr. LORENZO. Primarily that is what it covers right now, dual use
technoloTy. As everybody knows on this subcommittee, that is tech-
nology and products predominately made for the civilian market, but
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
221
which have critical military applications. The majority examples are
computers, including the software and that kind of product.
Senator NUNN. IL you ever get the feeling we are trying to control
too much and by trying to control too much we aren't able to do a good
job with controlling anything?
Mr. LORENZO. Personally, I think the answer to your question is yes.
When I came from the private sector 7 months ago, I had the feeling
we were unnecessarily controlling too much, like the CAT scanner I
mentioned.
We get in an argument and say, yes, that imbedded computer is crit-
ical and could help, but let me go off on a little philosophy, and I am
going to leave another paper and introduce it for the record which you
can keep.1
Technology really is an international language. When you get all
done, the physical scientific laws of nature were imbedded in all people,
with all ethnic backgrounds, almost from the beginning of the Earth.
Everybody knows what they are in every language. I go around the
world, I talk to the Turks, I talk to the Japanese and when you start
talking about such things as Carnot's laws of thermodynamics law,
they all know what you are talking about "in English."
You do not, as you know, need an interpreter. Being a research tech-
nologist and working at the graduate level, I have no difficulty com-
municating. We have to understand that they all know the physical
scientific laws of nature very well in every language and they know
what the parameters are for key payoffs. What we fail to realize in this
country is that if we can control and classify things to the ultimate,
we can impede progress, but they will eventually know what we do.
The classical example of that is nuclear energy.
That is enough motivation for them to know where to put their
resources.
Yes we can control critical technology, and I think we can identify
such fairly well. However, the best control in the world is short-lived
at best so we shouldn't use a lot of discretion on what we control be-
cause it goes contra to our economic development, open society, free
trade, understanding with foreign nations and also building up mutual
respect with foreign nations to meet your military obligations.
The bottom line is this: If you buy everything said, and I think you
do, I think you will also buy that the physical scientific laws of nature
are in the hands of everybody and always will be. Of course, we being
an open society, just by definition, our findings get in our research
and development findings, particularly at universities where we share
knowledge to help out the whole world. But we have bad people in
the world here and there who use it for other things. We can and will
control critical technology.
Let me come to the bottom line. There are two things we can do:
One, we can be smarter as in the example of the CAT scanner I talked
about?another is keeping our technology base out in front and ahead
of everybody else and I think we are doing that very well in this coun-
try and spending approximately $20 billion in fiscal year 1982 R. & D.
dollars?I won't get into exact numbers?just for other than research
and development, or let's just say the technology base in DOD.
1. See p. 562 for the material referred to by Mr. Lorenzo.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
222
Being smarter, I think, is where we as a nation have failed in tech-
nology transfer, not doing things like I described, as in the CAT
scanner.
Let's back off, and I am answering your question in the affirmative,
yes, I think we sometimes, and this is a personal professional opinion
of my own, are controlling things maybe too much. If we modify
them slightly and make them inaccessible for uses we don't desire, I
think we will go a lot further in obtaining our national goals and
objectives.
I am sorry to give you such a long answer.
Senator NuNN. Is DOD the proper place to do that? Without any
doubt, DOD ought to have a major input and, of course, I joined
Senator Jackson in his efforts to give DOD much more input than they
had formerly. But is DOD the place where you should get an objective
technical analysis, let's call it a Soviet wish list, a list that we compose
of what the Soviet Union really needs? Certainly DOD should have an
input, but I wonder if DOD or State or Commerce, each with their
own perspective, is the proper place for that kind of list to be found.
Mr. LORENZO. You pretty well answered all your questions, Mr.
Chairman. DOD can give you the major, critical inputs for what the
critical technologies are, what the Soviet Union needs for military
use. But you have to remember of the total electronic capability in
this country. DOD uses less than 5 percent.
So you will need somebody, some organization with a scope bigger
than DOD to handle the total problem. I think you pretty well
answered your own question by the way you stated it. I am in agree-
ment.
Senator NUNN. Theoretically the final decision will be made at the
White House on any dispute, but as a practical matter dealing with
thousands of different items, where should the technical part of the
equation and policy part come together for a final decision after
receiving the input from the various agencies?
Mr. LORENZO. That is a very difficult question for me as an individual
to answer. I will answer you very truthfully and honestly, I don't
know where it is. I don't think you have it.
Does that answer your question?
Senator NUNN. Not any single place.
Mr. LORENZO. That is correct. I don't think DOD should be the total
picture, but I think DOD is very critical and a very major contributor.
When I say DOD, I say all of its intelligence agencies and all the
intelligence agencies we work so well with, like the CIA, DIA, so
forth.
That working relationship is very good, very critical and very vital.
Senator Nuwx. Go ahead.
Thank you.
Mr. LORENZO. I would like to just cover one more thing here. There
is a trend, and this goes back to what I said earlier, Mr. Chairman,
we are turning down more cases or rejecting more requests for tech-
nology transfer.
For example, just to give you and the subcommittee a feel, for the
munitions cases or West-West trade, let's say, in the 1981 calendar
year, we handled or processed about 8,000 cases in our office in DOD.
That was just a part of the 28,000 we delegated, you might say, by
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
223
mutual agreement, that Bill Robinson and the Munitions Board
handles and that working relationship with the Munitions Board in
State and Defense is outstanding.
It has been very good for years. We do get together and solve our
problems very well, but let's just say this: Less than a couple years
ago, the turndown rate was less than 1 percent. In 1981, the turndown
rate was 5 percent, but that is sort of misleading. It's apples and
oranges a little bit. Well, the turndown rate was 5 percent on the 8,000
cases we said we wanted to see as examples, you might say to set
technical policies with the Munitions Board.
On a lot of the approvals we gave, on the 95-percent approvals, a lot
of them have "fences" and "gates" and no no's here and there, or modi-
fications to make things inaccessible or parts of it.
I don't like to see that high turndown rate increasing because that
implies we have gone back to the other points I have made. We are not
communicating too well with our friends in private industry. We are
spending a lot of money. But we do offer and have offered more advice
through what we call a defense advisory service.
The State Department works with us very closely. Instead of a con-
tractor or an applicant submitting a total case, he submits just a draft.
We give an advisory, sit down and talk it over with them and back
they go. We don't waste a lot of time and create a lot of friction and
irritation. Technology transfer, by and large, in our open society, I
think is communications, making it known to all sectors that are in-
volved an awareness of the impact of certain critical technologies. If
we do that, and I am talking about university research which we are
working very closely with, a lot of studies, National Academy of Sci-
ence and all around the country, I think we will get there better in our
open society.
As Dr. Guy Steven recently said, we get confused in this country of
having too much of a matrix organization where we hear everybody
from all sides. It is known to the Soviets and we have been accused by
them in international fora having an "ad hoc" form of government.
Everybody speaks and everybody does everything, but by and large,
I think if we keep on that approach, and we have no other choice than
to do that, that is our way of life.
I think once we get there, we are going to be in better shape than our
potential adversaries.
On dual use technology, which this committee is primarily interested
in today, working with Commerce and looking over the numbers, it
seems like we had a rejection rate of less than 2 percent on the defense
process cases and that was, about 2 years ago. And this past 1981 cal-
endar year, that reject rate was up to 15 percent. There the job is very,
very difficult because you are dealing with people who have made a
product primarily for the civilian market and it does have defense
application.
Of course, that was a sample of 3,500 cases we did, taken from the
commodity control in Commerce which approximated something like
77,000 cases in 1981.
So I have covered here just the highlights, the MCTL. We are im-
proving it. And I might just say, with a very small staff we do interface
with a lot of people. There are over 300 key technically qualified people
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
224
we interface with in the rest of the Department of Defense, such as
all the military agencies, predominantly the research and acquisition
people, counterparts and all the intelligence agencies and many, many,
thousands in the private industry.
To give you an example of private industry and our interfaces with
it, MAPAG alone, a multiassociation reviewing our MCTL right now,
has over 80 company members, but a staff person gave me an estimate
of over 90,000 people in American industry.
So we have underway, have done and have a tremendous educational
process for technology transfer.
I might go a bit further, Senator Nunn, and I know you are well
aware of our four power meetings where we meet with Germany,
France, and England twice a year. Dr. DeLauer is the principal rep-
resentative for the United States and I am the alternate.
We also meet with CNAD, the Conference of National Armament
Directors, of 15 nations in Brussels, Belgium, twice a year, and since
I have been aboard, I may not have become unpopular but I have in-
troduced on the agenda or at least I have helped introduce it. It has
also been introduced in the NATO technology transfer study and
others, which is a very good thing, and Dr. Bryen's statement is going
to uncover that very important study, underscoring to the allies: "Hey,
you are very nice people, we need you; we need a mutual military
capability but we want to help you close your doors on letting dual use
critical technology out to potential adversaries or places where they
can do harm."
And this is very, very effective. The bottom line on the NATO tech-
nology transfer study, in my opinion, is to get the respective Minister
of Defense, counterpart to our Secretary of Defense, involved in their
government infrastructure on all technology transfer, particularly
dual use, going from their civilian contractors into the East-West bloc.
And a lot of progress has been made and I don't want to steal the
thunder of my colleague, Steven Bryen. He is probably going to talk
about France. France has a new law where the MOD gets into this
process and the law went into effect October 9 but it is on the agenda
now and all of these international fora are getting attention.
They know and I give credit to our intelligence community net-
works, that we have good networks. They also have a lot of good net-
works, not comparable to ours. They are asking us now in meetings,
and they bring the subject up themselves. They say if we get. some-
thing leaked, let us know. So I think our savior with our allies is
their MODS and I say they are working the problem and they have
a long way to go and I will defer the rest to Dr. Bryen to get into
that area.
I am pretty much through with my statement, Mr. Chairman.
You can go ahead and shoot questions. We do have the DOD tech-
nical data base we outlined. The foreign disclosure technological in- ,
formation system is a massive effort. Just the supporting documen-
tation is over 10,000 pag-es.
On foreign availability, which you sort of alluded to in your ques-
tion. Let me say this. True DOD may not be the agency to put it all
too-ether, but certainly with the intelligence agencies, T think we can
'like a significant contribution. If for military enhancement of a
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
225
potential adversary, I think DOD is definitely the main arm and also
should play a major part but I cannot answer your question, who is
that total agency.
May I suggest you go talk to Senator Garn, he may have some
ideas on that point.
Senator Nrr,NN. Thank you very much. When you make up the
militarily critical technology list, the MCTL, does that in effect deter-
mine it for even availability of technology?
Is that a key part of the process?
Mr. LORENZO. The MCTL is concerned with availability in the
adversary countries. If they already have something in great bunches,
or certain technologies' it is pretty hard for us to say to our allies
that we have to control it. There is definitely a corollary or strong
relationship.
Senator NUNN. We have heard in previous testimony that diver-
sions of U.S. technology occur through free world nations. In light
of this, do you think D.R. & E. reviews an adequate number of free
world export licensing cases?
Mr. LORENZO. We need to do more in the free world area. Since this
is an unclassified session, I won't cite the countries that cases are
going to. We are on record now in daily dialog, you might call it,
in an argument with the Department of Commerce. We do want more
cases.
The answer to your question is, no; I don't think we are doing
enough cases to the free world because technology goes into the free
world. There are all kinds of international trade houses, all kinds of
multinational hookups, all kinds of companies that are multinational;
some are part or totally owned by the Communist bloc---yes; to an-
swer your question, we should look at more free world cases and I
think when the act, the Export Administration Act of 1979 is read-
dressed, when it comes up in 1983, that should be incorporated in the
revision, or updating of the new act. We will be glad to make recom-
mendations for you at that time.
Senator NuNisr. Thank you very much. Does Defense Research and
Engineering have a presence in the enforcement activities or do you
strictly have the input in the policy level licensing or does DOD in
any way enter into the enforcement?
Mr. LORENZO. We don't have I guess you would call a direct or
substantive impact on enforcement, but we are consulted at all times.
We are now preparing in connection with our colleagues on the policy
side of Defense, Dr. Bryen, the "Mushroom Book," in other words,
a book Dr. Lomackv on my right and I are preparing to help Customs
identify high technology.
In other words, when they are out checking shipments and so
forth, what is it they are looking for, how should they look for it?
We should be more involved and we have been talking informally
with both State and Commerce and they have expressed a desire for
us to be more involved. We just have to develop the people and I fore-
see where we are going to have to provide people probably onsite to
help out as this enforcement activity grows. This is something that has
come up in the last 6 months or a year. Customs has put more people on.
Project Exodus is underway and they are revealing more. Yes; we
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
226
have to get with it. I think we have to provide more input and def-
initely we can help them in the technological and engineering aspects
and particularly in training of their agents on what to look for, what
it is when they have it, and how to handle it, and what to do about it.
Senator NUNN. We heard testimony from Dr. Lara Baker of the
idea to establish a technical expert group somewhere away from Wash-
ington divorced from policy to :function as a technical evaluation
center, not that all the people would be housed there, only a small
group, but that the technical information would be cleared through
there. Would this be an advantage or do you see it as just adding one
more layer in the process?
Mr. LORENZO. If I said yes, I would be shooting myself in the foot,
Mr. Chairman. Dr. Baker is doing a very good job tor us right now.
He has a lot of good people and they contribute tremendously from
their background in nuclear weapons development in that the major
technology used is you might say supercomputers. He is doing a very
good job. So from a selfish point of view, I would say no, I don't want
him to do that, I would want him to do what he is doing right now,
but if he decides to do it, of course that is his business in our free
society.
I would like, if a group was going to start like that. and we essen-
tially have parts of that right here; to see it in Washington. We are
looking at?my bosses and I are right now permanentizing my staff,
making it more professional, making it more career oriented and per-
haps we are looking at alternatives, to set up you might say situations
he has. His idea is good. But from the selfish point of view I am not
going to shoot myself in the foot and bless him to do it in Albuquerque.
I want him to work right now for me, which he is, and he is doing one
mighty fine job.
Senator UNN. How many people in your office are actually dedi-
cated to what you call West-East trade functions? What is the staffing
you have dedicated to that purpose?
Mr. LORENZO. I took a count very recently, as a matter of fact last
night.
I have taken many counts since I have been on board. We have a
total, you might say, on East-West trade which I think is a misnomer
because we are talking from West-to-East trade, of 12 professionals
and 4 secretarial. But of those 12 professionals we only have really 4
that you might say are deeply highly technically qualified people and
1 administrator. Then I have more technically qualified. I am sorry,
I should have said 4, of a permanent nature and I am fighting for more
and have gone down to my bosses for more and I am promised that
I am going to get more permanent because this cadre of 11 people?
we have 1 schedule C temporary, trainee, involves a lot of trainees
coming and going. They are very good. That is part of the educational
process.
We consider and I have gone to the mat on this, 11 truly technically
qualified people to form a minimum critical mass in a centralized loca-
tion because we are dealing, as I have mentioned before, with 300
highly qualified technical people in the rest of defense, and intelligence
agencies, 90,000 in industry, and also you might say 5,000 in foreign
governments.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
227
I have never counted the number of R. & D. people we are dealing
with in foreign governments. So I have drawn the line you might say.
I don't think we could be any smaller and having gone through many
recent exercises in the last 2 months, you cannot delegate any more
of the responsibilities to the military services. We need a minimum
critical mass just like an atomic weapon. You cannot get anywhere
unless you have a certain minimum critical mass and from a manage-
ment point of view I think that is a very logical point.
I would like to enhance them, make them career oriented, get rid
of the temporary label. Qualified people are very important, but you
have got to automate the data and use other management techniques
that we are doing very fast, such as entering our data base into
FORTDIS. I think that pretty well answers your question. Yes, we
are small. I think as the job gets bigger we have to get smarter with
more automation or have more permanent people, and we are using
a lot of contract help, too.
I might mention the Institute for Defense Analysis, headed up by
Dr. Alex Flax. They have been supporting us particularly on the
MCTL, and many other things and are doing a very outstanding job.
Senator Nuicsr. Do you or either of your a5.sociates have any recom-
mendations about changes in the law that we should consider?
Mr. LORENZO. We have several recommendations. They are kind of
detailed. We would like to document them for you and submit them
for the record at a later date.
Senator NUNN. All right. Are those recommendations in the form
of administration proposals or just DOD proposals at this stage?
Mr. LORENZO. The majority of them will be from the DOD perspec-
tive. But we will give you recommendations on the overview when the
act is to be revised in 1983.
Senator NUNN. I also have a number of proposals I am going to
probably make at the close of the hearings that I would like for you
to review and what I will be doing is making recommendations to the
subcommittee. There may be several of us individually, Senator Chiles,
Senator Roth, and others, that would like to make recommendations
to the subcommittee. But that is not an official final view of the sub-
committee. We would like your input about those recommendations.
Mr. LORENZO. We will be very happy to participate, Senator Nunn.
We have in the past. I have looked over the record. I want to congratu-
late you on the Culver-Nunn RSI law as well as other things. I think
you are very internationally oriented. You are looking at the total
picture.
I think technology transfer is a very difficult problem. We would be
glad to work with you.
Senator NUNN. It is certainly not simple.
Mr. LORENZO. It is a very tough job?technology transfer?you are
going against the tide you don't have the big dollars a lot of the other
programs have like a lot of the strategic and tactical programs. You
are taking things away from people. You have got to know all the
technologies. You have got to have highly qualified people. You have
to tell people no. On top of it all, it is the most thankless job prob-
ably in the Department of Defense today.
Senator NUNN. Of course, we operate in an alliance also and if we do
not coordinate in the alliance, if we don't have commonality, standard-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
228
ization, interoperability, those things in the alliance, we deplete our
resources to the point we can't defend against the Soviet Union.
The only way you get those things is to cooperate more at the R. & D.
stage, at every stage which means you have got to have probably more
technology transfer at least within the alliance. So this is not exclu-
sively an American problem. America can't solve it. It has got to be
an international approach as you have already said.
Mr. LORENZO. You are so correct. It has to be multilateral. You
can't go unilateral on the controls, You are so correct. You have said
it so well. I called it the "delicate balance" of giving friends?allies?
technology and controlling critical technology that might leak to the
adversaries' atmosphere.
Senator NUNN. The key to it is to get that list of the things you are
going to control down to a manageable level and not having it so
broad and so long that in an effort to control everything you don't
control anything.
It is like classification, too. If your classification gets so broad, if
everything is classified, in an effort to protect everything, you end up
causing such disrespect for the system you don't protect anything and
then you leak out information every day that is very, very important.
So I think here the answer administratively is illusive, but at least
in concept we have got to find a way to hone down what it is we con-
trol as the most important element and do a darned good job of that
as I see it.
Mr. LORENZO. You are so right.
Senator NUNN. The challenge is how do you do that. We have got
a lot of agencies involved. There is certainly no simple answer to it.
But I appreciate very much your testimony. Do either one of your
associates want to add anything at this point? We would be delighted
to hear from them? Any suggestions, recommendations?
Mr. LORENZO. Fire their boss.
Senator NUNN. Do either one of you want to make any statement at
this point?
Mr. LoarracKY. Senator Nunn, I think Mr. Lorenzo has outlined
very well the kind of work that we do and the difficulties that we face.
One of the major efforts that we have underway now is to achieve
precisely what he alluded to; namely, to get our allies to cooperate
with us in technology and export control. But we have a very intensive
effort underway in Cocom. We have taken the critical technologies list
and we are making very good progress and getting that list accepted
in the negotiations on the Cocom list.
I am very encouraged by the attitude of our allies in that we were
told over the years, no, they cannot control technology, this is strictly
a U.S. kind of thing. I am very pleased that we have made some
very important progress in that area. I might also add that as in
the past so it is today they are extremely careful to demand and rightly
so the kind of precision which you have alluded to; namely, they want
to make sure that we have made a good intelligence assessment of the
other side. They want to make sure that what we want to control is
described in such a way that it has a minimum unnecessary impact
on commercial trade.
I think with these criteria is they are presented to them properly
I think the chances are that they will accept our proposals. If we do
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
229
not follow these rules I think we will have a very difficult time. Thank
you.
Senator NuNN. Thank you.
Thank you very much, Mr. Lorenzo. We appreciate all of your co-
operation, you and your associates. We know you have a tough job.
We look forward to your giving us your reaction to the recommenda-
tions we will be making next week.
Mr. LORENZO. It is a tough job and it is a challenge. But with people
like you on our side we will get there.
Senator Nuivisr. Thank you very much.
Our next witness, Admiral Inman, is coming in just a few minutes.
I believe Mr. Charles Lecht is here. If you would kindly take the chair
we will go ahead and hear from you and then we will hear from Ad-
miral Inman. I think it is really fortunate we are going to hear from
you first in a way because I have read your statement and find some
very interesting points there that I think could be addressed later with
questions from other witnesses.
We swear in all witnesses before this subcommittee. It is a matter
of practice before the Investigations Subcommittee. So before you
start your testimony, if you will stand and take the oath.
Do you swear the testimony you will give will be the truth, the
whole truth, and nothing but the truth, so help you God?
Mr. LECHT. I do.
Senator NowN. Thank you very much. We appreciate your coopera-
tion with the subcommittee. We appreciate your meeting with the staff
and discussing these areas. We know you are highly qualified in this
whole area of technology. We look forward to having your statement.
TESTIMONY OF CHARLES LECHT, FORMER PRESIDENT AND CHAIR-
MAN OF THE BOARD, ADVANCED COMPUTER TECHNIQUES CORP.
Mr. LECHT. Thank you very much, Senator Nunn.
I have my prepared statement which I submitted to the subcom-
mittee. I will summarize it if you would like.1
Senator NuNN. Your statement is not too long. We would be de-
lighted to hear it, whatever you prefer to do. I might acid, Mr. Lecht
is the former president of the Advanced Computer Techniques Corp.
in New York.
Mr. LEciErr. Yes, sir.
Senator NuNN. Whatever you desire.
Mr. LECHT. I agreed to testify to this subcommittee on the issue
of international trade of computer technology because I believe the
goals to which this subcommittee is directed are correct ones and
important ones for the national defense and security of this country.
I have spent many days abroad for the last 15 to 20 years and I
have had occasion to work with both Socialist and Western countries.
I have some different conclusions regarding Soviet or should I say
Soviet bloc attempts to acquire a U.S. technology. I have reached
conclusions as to why this is going on which differ from those which
I have previously read about or heard about in the media or in
Washington.
See p. 570 for the prepared statement of Charles P. Lecht.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
230
Primarily I have come to the conclusion that the concept that the
Soviets want U.S. technology because they can't make it themselves
or they can't buy it themselves is a fallacious one. I have concluded
that the Soviet technology establishment?in the country which pro-
duces more scientific literature than any other country in the world?
is capable of producing what it wants. I have thus concluded that
the Soviets have been looking for U.S. technology primarily because
they want to find out how our military materiel work, our missiles,
our aircraft, our radar, our sonar, and the like. Since most highly
advanced military technology is driven by dual use embedded com-
puter systems to be found in both the private as well as the Defense
sectors, the acquisition of these systems by the Soviets reveals infor-
mation on how to jam our technology-driven military devices?how
they operate or what their shortcomings are.
My prepared statement supports this thesis.
Furthermore, my experience abroad in dealing with a variety of
companies, both American and foreign, has led me into direct con-
tact with Soviet military on one occasion?I have been called at my
hotel room by a Soviet general asking me to come have a drink with
him, an event which I refused to do for my health and welfare, and
loyalty to this country.
I have found that the notion of creating lists of items to guide
what may be traded and what may not be traded and which can be
used by persons at the borders of our country won't work in the high
tech, area, especially around computer systems technology. Much of
this high tech stuii has elements which vanish into the microscopic
world, has no metal thus are not detectable by machinery. For ex-
ample, computers for the future are being experimented with as
creatable in test tubes? protein based devices which are at the fore-
front of the technology. But, even today's metallurgical, chemical,
and electronic-based devices which are at the developmental fore-
front, allow for the creation of systems which are extremely powerful
and extremely small and almost nondetectable. These are the devices
being used in our embedded weaponry.
I thought I would call this to the subcommittee's attention to indi-
cate that I really believe the concept of border policing and lists which
may be looked at by, say, border patrolmen or the like is an untenable
one in this age of high science in and about computer and communica-
tion systems technologies.
Senator NUNN. You are saying the advanced technologies are so
sophisticated, so small and involve know-how in many cases and that
border control is not the answer to controlling that kind of high
technology?
Mr. LECHT. For the most part I don't see how it could be controlled
that way at all. But I also don't believe that the capacity to create
these is the privileged commodity of the U.S. scientific community. I
think the chairman of Control Data Corp. and others have testified in
the past that U.S. dominance in the high tech area is no longer a
reality. Japan, countries like France, England, Russia, and even Soviet
bloc countries have the capacity to make exactly what we are making
now.
So I wonder about the Cocom lists and our ability to police these
lists and whether this preoccupation was not causing us to focus in the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
231
wrong direction, so that we cannot see that the Soviet desire to ac-
quire our technology has more military meaning than anything else.
Senator Nu-NN. What do you think we ought to be doing? You
acknowledge it is a serious problem, I think. You would narrow it
down more to the pure military analysis part of it. You are saying
border control in this sophisticated age is not adequate, maybe not
even relevant. What is it that we should be doing in this country in
your view to begin to address the problem as you see it?
Mr. LECHT. First of all, I believe the establishment of a subcommit-
tee like this one to identify the problem is very relevant and extremely
important because up until this point I am not sure that we have
identified the problem in the United States. Certainly cooperation at
the source of these high technologies is probably the beginning point.
I have here a list of the American microprocessor companies and their
foreign involvements and it is quite astounding. You've got compa-
nies for example, like American Microsystems, Inc. It is a Gould Co.
It is a U.S. owned company recently bought back from a West German
company which has involvements in Austria. We know that Austria
has been a center of technology transfer in trade for many years now.
If you go through this list, and you see companies like Fairchild Cam-
era, Analog Devices, you see Motorola, Nixdorf, Solid State Scientific,
all with foreign involvements, with foreign staff on site at plants
abroad. Even if these are U.S. companies they are worked in by for-
eign people in various locations around the globe.
Some of the devices that they are working on are so small that you
can carry 1,000 of them out in your pocket and still not be detected.
Senator NUNN. When you say controlled at the source, do you mean
much more governmental business involvement and coordination? Is
that what you mean?
Mr. LECHT. Yes, but better focused. As I said earlier, if you buy the
idea that we are no longer the country which has a privileged position
in solid state large-scale integrated circuit technologies. Then we don't
have as our primary worry controlling trade in those technologies.
They can be bought elsewhere. We have to control those particular
technologies that relate to our national defense?the plants that make
these technologies, the data describing them and the way they are em-
ployed.
Senator NUNN. We go a step further. How do you go about doing
that? What do you do that we don't do now? I think you have made
it plain that some of the things we do now you don't believe are rel-
evant, but when you really hone it down, trying to control the defense
technologies and as you have described it, what steps do you think
could be taken that are not now being taken?
Mr. LECHT. It should start with an education program that de-
lineates between those items which are peculiar to our national defense
and those items which are not. We do not need a blanket embargo on
all high tech going abroad. Such an embargo doesn't have any mean-
ing. We do need better identification by the Defense Department of
those technologies which are key to our national defense 21 nd then a
campaign to educate source management who are creating these tech-
nologies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Z32
Senator NUNN. Both in this country and in our allied countries?
Mr. LECHT. Yes, sir.
[At this point, Senator Chiles withdrew from the hearing room.]
[The letter of authority follows :1
U.S. SENATE,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
Waahington, D.C.
Pursuant to Rule 5 of the Rules of Procedure of the Senate Permanent Sub-
committee on Investigations of the Committee on Governmental Affairs, permis-
sion is hereby granted for the Chairman, or any Member of the Subcommittee as
designated by the Chairman, to conduct open and/or executive hearings without
a quorum of two members for the administration of oaths and taking testimony
in connection with hearings on the Transfer of United States High Technology to
the Soviet Union and Soviet Bloc Nations, to be held May 4, 5, 8, 11 and 12, 1982.
WILLIAM V. ROTH, JR.,
Chairman.
SAM NUNN,
Ranking Minority Member.
Senator NtrigN. You believe that, if the list is properly made up and
kept current and changed with the state of the art, that that kind of
education campaign between the Department of Defense and the other
departments and high technology industry would be more meaningful
than all the law enforcement we could muster?
Mr. LECHT. Yes, I believe it would be a good start. Certainly in the
United States you have a lot of sympathy for Defense requirements
and the requirements for maintaining secrecy around high technology
affecting that defense. But abroad, I am afraid our partners don't have
the same sense of urgency with regard to the handling of our high tech
products. For example, I have seen Russian computers sitting along-
side American computers running the same software in some of our
allied countries. I have concluded that in other country locations of our
plants producing high tech there really isn't a lot of sympathy for our
secrecy needs.
I have seen Communists working in American plants in high tech
in northern Italy for example.
Senator NuNN. Communists actually working in the plant?
Mr. LEcirr. Yes; card-carrying Communists and proud of it, en-
couraging others to attend their meetings in the evening.
Senator NUNN. Are these American companies operating abroad?
Mr. LECHT. Yes.
Senator NUNN. Dealing in high tech?
Mr. LECHT. Yes.
Senator NUNN. Dealing in items that you think might be crucial
to the national security?
Mr. LECHT. No question about it, sir.
Senator NUNN. You travel quite a bit. Does your company do busi-
ness in several foreign countries?
Mr. LECHT. We have just about worked in every Western country,
in the Far East, Australia, Japan, South Africa, and black African
countries. We have also worked in Yugoslavia and in the Soviet Union,
in Hungary, Czechoslovakia, and the like.
Senator NUNN. What is the general attitude of American businesses
toward this problem? Do you find them generally anxious to cooper-
ate or are they very skeptical about governmental efforts?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
233
Mr. LECHT. No; I think that any serious businessman in this coun-
try is compelled to cooperate with the Government's requirements on
the transfer of technology abroad. I think that they generally are sym-
pathetic. The problem is it has been so overstated in the past that at
times they become suspicious that it is going to in some way impact
their capacity to trade anything.
Senator NUNN. In other words, by overstating the problem if the
Government does that, and by having too many items on the list that
perhaps do not have the significance that you have described, you
create skepticism among businesses and less cooperation rather than
more?
Mr. LECHT. Yes, the American businessmen who are going abroad
and who see large-scale integrated chips of the most modern variety
coming out of the Soviet Union, wonder what the flak is about in
the newspaper which says we shouldn't trade with them.
Senator NUNN. You mention in your statement that the General
Electric Co. trains Soviet personnel in computers in Milan. Would
you tell us a little more about that?
Mr. LECHT. I mentioned that they trained them in the latter sixties.
The General Electric Co., as well as IBM and all the other manu-
facturers, have been selling high technology to the Soviet Union of
one kind or another, I should say, over the past 20 years off and
on with various periods of time where restrictions prohibited this.
And with the sale of computers, frequently there is training as part
of the package of the sale of these devices. This involves taking the
client's staff into a classroom to train them on how to operate,
program, and, in general, how to use the machines.
Well, if you sell to the Soviet Union, they need the training also.
I have seen Soviet staff in classrooms in Italy being trained by com-
puter manufacturers' representatives from the United States of
America.
Senator NUNN. When you actually sell the computers, the training
goes with it, though; doesn't it?
Mr. LECHT. Frequently it does, sometimes they will buy it.
Senator NUNN. The critical decision is whether they sell the com-
puters at all.
Mr. LECHT. I don't think that stopping the sale of computers will
benefit anything though. They hardly buy anything from us anyway i
in the computer area n the Soviet Union. The demand statistics don't
seem to justify the concern so often expressed that they cannot manu-
facture or obtain high tech without U.S. involvement. What they are
i
more concerned with in my opinion is high tech that finds its way ntc
the nose cone of a missile.
Senator Nurix. So you are saying the kind of computers that have
been sold you don't think are damaging?
Mr. LECHT. Most of the computer technology the United States has
sold to the Soviet Union could have been bought anywhere else or
made themselves. It is the stuff they stole, sir.
Senator NUNN. There are export control lists that our Government
has. Are these widely distributed in industry, in your view? Does
industry appear to be cognizant of what the Government believes is
critical?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
234
Mr. LECHT. These export control lists, I think, spend more time in
the Government files than they do in the hands of people doing inter-
national commerce. I have never seen a recent export control list until
your subcommittee started. I should say, I haven't seen one in years.
I had seen one earlier. I don't think the past or current export control
lists portray a deep knowledge in current high tech by those who
prepared these.
Senator NUNN. Could American private businesses and people in the
high tech area play a role as an advisory kind of committee in this
area and be helpful or would there be such inherent conflict of interest
that it would not be feasible?
Mr. LECHT. You have to start somewhere. I think bringing some
high tech advisers into the Government to better help define the prob-
lem and better help create the guidelines is absolutely mandatory at
this point in time.
For example, some of the lists at the present time are influenced by
the notion of size of the machines. Well, size today means old, not
new. The bigger they are the older they are, the newer they are, the
littler they are. So on occasion we hear that we can't sell big machines
but we can sell small ones. It frequently turns out that the smaller
machine the more powerful it is, the larger, the less powerful. Thus,
there are a lot of conceptual revisions needed and I think the scientific
community ought to be brought in on these revisions.
Senator NUNN. Have you had any dealings with the Department
of Commerce in enforcing American technology transfer?
Mr. LECHT. Well, the Department of Commerce once helped me
transfer some of my technology over to Italy to demonstrate it at an
Italian fair. but other than that dealing, I have had none.
Senator NuNx. Have you seen them create much of a dialog with
industry about what should and should not be on the list? Is there
any kind of educational effort going on from the Commerce Depart-
ment that you have personally seen?
Mr. LECHT. No, sir, I haven't.
Senator NUNN. We appreciate very much your being here, Mr. Lecht.
Your testimony has been very helpful and very heartening and we
thank you for your cooperation with the subcommittee.
-Mr. LECHT. Well, I was heartened to see this subcommittee formed,
Senator Nunn. I wish you good luck and great success.
Senator NUNN. We hope to continue to bounce ideas off of you.
Mr. LECHT. It will be a pleasure, sir.
Senator NUNN. Thank you.
At this point, Admiral Inman is our next witness and we will take
about a 5-minute break while we wait on him to arrive.
[Member present at the time of recess: Senator Nunn.]
iBrief recess.]
[Members present after the taking of a brief recess: Senators Roth,
Nunn, and Chiles.]
Senator NUNN. Our next witness is Adm. Bobby Inman. Admiral
Inman, we appreciate, the excellent job you have done for your country
in every area and I particularly appreciate the interest you have dis-
played in the technology transfer area. I don't know of anybody in
government that has concentrated on it more and given it more em-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
235
phasis in the last couple of years than you have. I also appreciate your
cooperation with our staff in preparing for these hearings.
We are delighted you are here. We swear in all the witnesses before
the subcommittee so if you would take the oath we will be glad to get
your statement.
Do you swear the testimony you give before the subcommittee will
be the truth, the whole truth, and nothing but the truth, so help you
God?
Admiral INDIAN. I do.
Senator NuNN. Thank you.
Why don't you go ahead and proceed and then we will have
questions.
TESTIMONY OF ADM. BOBBY R. INMAN, DEPUTY DIRECTOR,
CENTRAL INTELLIGENCE AGENCY
Admiral INMAN. Thank you, Mr. Chairman. I have a statement that
I will submit for the record, if I may, including as a part of it the
unclassified version of the intelligence community's look at Soviet
acquisition of Western technology.
Senator NUNN. That will be admitted, without objection.1
Admiral INMAN. The origin of that study really begins with this
subcommittee and its staff, as you will well recall, from dialogs that
go back a year and a half, the questions asked about the general status
of Soviet technology transfer and inadequacy of the answers we
had--
Senator Nuivisr. If you could pull that mike up a little closer.
Admiral INDIAN. Bow is that?
Senator NuNN. That's good.
Admiral INMAN [continuing]. And the inadequacy of the answers
we had available. The whole question of technology transfer had not
been a priority topic. Out of the dialog between this subcommittee, its
staff, and the Senate Select Committee on Intelligence, we were asked
in March 1981 to do an interagency study to pull together all we knew
about the Soviets success in acquiring Western technology and their
use of it in their military buildup.
A 6-month effort was undertaken. The results were startling to
those of us inside the intelligence community as well as to the users.
It was clear that we had a great deal of information about the nature
of the Soviet efforts, their use of their Eastern European allies to
support it and the general outcome. We provided that study in its
full classification level to the Senate Select Committee last October,
and then we proceeded in the ongoing dialogs within the administra-
tion and with the staff both of this subcommittee and of the Senate
Select Committee to try to refine what we knew to improve our
capabilities to track the problem better in the years out ahead but
most of all to try to help assess the impact of the damage and what
might be done in response.
I would point out two or three highlights from that knowledge for
our discussion today. First, is we look at the militarily useful, mili-
See p. 577 for the prepared statement of Adm. Bobby R. Inman.
95-929 0 - 82 - 16
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
236
tarily related technology that the Soviets have acquired from the West,
about 70 percent of it has been accomplished by the Soviets and the
East European intelligence services. They have used clandestine,
technical, and overt collection techniques in the process. They are
trying to get technologies of proven Western weapons and component
designs that can be applied directly to Soviet weapons research and
development, and industrial needs.
They concentrate their efforts through open purchases, legally
accomplished where that is possible and where it is not successful,
through illegal purchase and when that is not successful, through use
of espionage.
The sources of the technology may be Government classified or
unclassified reports, private company's proprietary reports, open
source technical documents from companies and Government organi-
zations?much of the embargoed equipment falls in this category as
well. The Soviets have undertaken a thorough vacuum cleaning of
everything in the public sector which will let them better target their
espionage activities. Of the remaining 20 to 30 percent of the acquisi-
tions of information of potential military value to the Soviets, most
comes through legal purchases and open source publications acquired
by other Soviet organizations, such as the Ministry of Trade and
related international bodies.
A very small percentage of it comes from direct technical exchanges
conducted by scientists and students.
As we look out. into the later 1980's, we believe that future Soviet
and Warsaw Pact acquisition efforts are likely to concentrate on the
sources of such components and manufacturing technologies, such
as defense contractors in the United States, Western Europe, and
Japan who are responsible for military technologies, general pro-
ducers of military related auxiliary manufacturing equipment, again,
in the United States, 'Western Europe and Japan, and small- and
medium-sized firms and research centers that develop advance com-
ponent technology and designs, including advance civil technologies
with future military applications.
Since the early seventies, and Soviets and their surrogates have in-
creasingly used their national intelligence services to acquire Western
civilian technologies, for example, automobile, energy, chemicals, and
even consumer electronics. Since the midseventies, the Soviet's Euro-
pean intelligence services have been emphasizing collection of manu-
facturing-related technology in addition to weapons technology.
And since the late seventies, there has been an increased emphasis
by these intelligence services on the acquisition of new Western tech-
nologies emerging from universities and research centers.
I can only conclude from all of these efforts that the Western secu-
rity services will be severely tested by the Soviet intelligence services
and their surrogates during the eighties.
I am pleased to say that coordination within the intelligence com-
munity and intelligence support. for the executive branch, the various
departments and agencies which have responsibilities in this area, is
substantially better than it was a year ago. In the wake of the study
document, the DCI has established a Technology Transfer Intelligence
Committee along with a dedication of analytical resources which had
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
237
not previously been committed to the problem and new mechanisms to
coordinate how the intelligence community pursues intelligence col-
lection, analysis, and reporting, and new subcommittees to support the
activities of the other departments as they try to bring better coordina-
tion and better formulation of policy.
There is still a great deal of work to be done.
Mr. Chairman, rather than proceeding further with the formal
statement, I think it would be better to use the time to try to field
questions of members of the subcommittee.
Senator NUNN. Thank you very much, Admiral Inman.
I will take just a few minutes and, Senator Roth, I defer to you
and Senator Chiles.
We just heard testimony from Mr. Lecht who is in the software
side of the high technology business. His statement, if I could para-
phrase it without trying to quote it, is essentially that the high tech-
nology critical lists that he has seen are very broad and tend to be
very severely outdated.and do not aim themselves toward state-of-the-
art technology, small computers, and that sort of thing. I understand
from other witnesses, too, that there seems to be a consensus that we
ought to really make an all-out effort to narrow the list and to try to
find the areas that are critical to the Soviets rather than trying to do
a job of controlling more and more, poorer and poorer.
Do you generally share that sentiment or do you disagree?
Admiral INMAN. I do not sign up to it entirely, Senator. I think
we have to stay focused on the larger problem of trying to do the
best job across the broadest range of technologies. I agree one ought
to prioritize the activity. Clearly the critical technologies ought to get
the immediate priority attention. But what I worry about in that
formulation is that one would then conclude that is the end of the
problem and that one does not need to pursue the whole broad range
of activities.
There is no doubt in my mind that the highest priority ought to go
to the direct weapons-related technology, the ones where we have
classified research underway.
The mechanisms may not have worked well in the past, both to up-
date those lists and to have the kind of dialog with industry that lets
you know what is coming along as the newest area of technology.
I suspect improvements are doable and prioritizing ought to be under-
taken regularly, but as a broad general national problem, we ought to
look to try to preclude the broadest range of acquisition by the Soviets
of Western technology which feeds that continuing military buildup.
It is from looking at the scope of that buildup across the whole range
of strategic conventional forces, manufacturing capabilities, that I am
persuaded this is a challenge that is going to be with us for another
decade.
Senator Nuisrx. When you look back?you have been involved in the
intelligence area for some time now without regard to any administra-
tion, Democratic or Republican, but if you look back at the last decade,
how would you rate our greatest failings in the technology transfer
area?
Admiral IrimAN. I have to conclude from simply the accumulation
of evidence and Soviet success that our performance has been very
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
238
poor, indeed, in the whole area of limiting technology transfer, but
I think, Senator Nunn, that you really have to look at that and in the
climate of times. For a decade, the country at large, as well as the
Government, put its faith in total broad terms in detente as an ap-
proach that was going to bring us peace, that was somehow going to
slow down the military threat we were going to have to face?a general
optimism that all exchanges were inherently good, that whether they
were scientific or technical or simply economic, business, that that
would produce from our principal adversaries a greater willingness to
work with us rather than to feed the military threat that we are going
to have to face.
That was also a climate when we were pulling down our whole na-
tional security apparatus with the basic question of what can we do
without? That impacted heavily on the intelligence community where
we lost a great deal of manpower to pay for new technological collec-
tion opportunities. As we gave up what we could do without, one of
the many things we gave up was any kind of coordinated collection or
reporting efforts against the Soviet acquisition of technology in this
country.
It had its own impact in trying to assess the success of the Soviets
R. 86 D. efforts. One of the small side benefits of this latest study is
that we now recognize the Soviets did not embark, as some had feared,
on the major investment in R. & D. to find breakthroughs in areas
that we were ignoring. Rather they used the clear technique of taking
whatever the West was developing, adapting it to their own needs
and getting it into production in very impressive timeframes.
When one looks back, what you get is a reflection of activity all
across the Government and the general attitude of the country not to
worry about the loss of outflow, it is kind of a security blanket comfort
that any kind of trade or exchange was inherently going to be favor-
able for us. When one looks at the results 10 years later and looks at
Soviet activity, I think it would be very hard to come to those same
conclusions at this point in time.
Senator NUNN. If you had to rate our problems now addressing the
most critical for the next decade in this area, how would you rate
the major challenges?
Admiral INMAN. I have read a lot of writings, I have listened to a
lot of speeches, both inside the Government and in the private sector
over the last decade in describing Soviet economic problems. I can re-
member 10 years ago listening to a learned authority tell those of us
who were in his audience that within 5 years, the state of the Soviet
economy would be so bad and the problems with the minorities would
be so difficult that we didn't really need to worry about the Soviet
military buildup. They would be turned inward to deal with their
problems and they would not be a challenge.
I have heard the same authority say almost exactly the same thing
last spring, almost 10 years later. But, in fact, I am still looking for
that change. The economy is in bad shape, cost of the empire is high,
but they have continued to protect a steadily increasing investment
across their whole military structure for the last 17 years. The result
is that we now face a qualitative challenge as well as a quantitative
one.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
239
The qualitative one that we didn't face at all 11 years ago, an ability
to stay and fight, with a whole range of weapons systems which have
very impressive standoff capabilities.
Much of that growth in the Soviet side, in manufacturing techniques,
in weapons systems, in design, has come about from their acquisition
here. As I look out for the next 10 years I don't see anything on the
horizon that is going to change those priorities on the part of the
Soviets. I think they are going to continue to have economic problems.
The major pressure on them right now is the agricultural failure
and the hard currency they have to spend to buy grain. But they have
continued to protect the investment in the military sector and I think
they will continue to do so. Therefore we must pay very high propriety,
I believe, to outflow of technology which will let them quickly adapt
and bring into use of more sophisticated weapons systems, standoff,
longer range, better guidance systems?accuracy is going to be increas-
ingly a problem we have to deal with in their strategic weapons as well
as their conventional weapons and, again, a good deal of the technology
for that has come out of the West.
So I would rank efforts to preclude Soviet access to high technology,
to things that would improve the firepower, the acquisition, recon-
naissance capabilities very high in our own national priority interest.
We have got a very long way to go in our own rebuilding program.
Senator NUNN. In that rebuilding program, what are your
priorities ?
Admiral INMAN. Let me split that into two categories. I can speak
Pretty easily about the Priorities in the intelligence community side.
There I believe the challenge that we are going to face in the decade
ahead is going to find its greatest prominence in challenges all over
the Third World, competition for raw materials, natural resources,
Problems with access to markets, and countries with political instabil-
ity. A great change that faces us is Soviet mobility, mobility of the
Soviet power to the degree that we have never had to worry about in
the past.
Thirty years ago, when we looked et the Soviet Union as an adver-
sary, their forces were primarily designed for use perhaps 200 miles
from the periphery of the Soviet Union. By the mid 1950's, it was
a 600-mile line. By the early 1960's, and the exercises, it was a L500-
mile line. But was still largely in their own discussion a defensive po-
sition and a defensive structure.
By 1975. that had changed abruptly. Theer waz no longer a 1,500-
mile line. They looked to use their forces wherever they saw the in-
terest ef the State involved. But they were still cautious and therefore
in the late 1975 time frame, in the move to Angola. they used Cuban
troops?not their own?with Soviet airlift and Soviet equipment. In
Ethiopia in 1977, the same pattern evolved. It was Vietnam's man-
power. Soviet equinment, that moved into Kampuchea in 1978. The
watershed came in 1979 with the Soviets willingness to use their own
forces in Af0thanistan.
? We had watched a massive airlift exercise into Mongolia in April of
1979. And that turned out to be a precursor for a massive movement
of force into Afghanistan on the Christmas date of 1979.
When one thinks out to the next decade, with a new generation of
leaders who may not be as cautious as these old Bolsheviks that we have
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
"4.40
dealt with for the last 17 years, I believe one has to worry a great deal
about whether those new leaders will be as reluctant to use Soviet mili-
tary capabilities beyond their own shores.
It is not beyond the realm of possibility that we will find a decade
out, or sooner, an unstable situation and sudden quick movement of
Soviet military forces into the arena and we are then confronted as the
British are now confronted in the Falklands with the fact of military
presence and trying to contemplate what to do about it. But it is going
to be vastly different than dealing with Third World nations using bor-
rowed military equipment, with sophisticated capabilities, with the
ability to use that high technology at very substantial distance.
The country has to contemplate whether we have the mobility, the
range of conventional forces that can deal with that kind of challenge.
It is a very long winded answer to what are the priorities for the
future, but we are going to need to know a great deal about countries
all over the world, to try to anticipate in advance where the instabilities
are developing that might offer the opportunity for our adversaries to
take advantage of the opportunity.
We are certainly not going to be able to do less in following the
threat in the Soviet Union itself, to the peripheral nations, particu-
larly in Eastern Europe and across the central European plain.
Senator NUNN. Getting it down to the high technology area, what is
it that we should do better than we are doing now? What should be
our emphasis in high technology?
We have heard a good many suggestions over the last 4 days of hear-
ings and we are really searching for priorities. If you had to name the
priorities of ways which can improve, what would you list?
Admiral INMAN. Senator Nunn, I am not the best witness to answer
that, since I have spent most of these last 30 years looking out at what
others do, not at what is happening' in the United States.
Senator NUNN. Let's look at the intelligence area then.
Admiral INAIAN. In the intelligence area, we clearly need more
analytical personnel, dedicated to a range of problems, particularly to
problems like technology transfer. I am less certain what we need in
the counterintelligence area. I am less certain because we have had a
long time, a number of delays in getting underway with the kind of
detailed examination of our long-range needs in that area that has
already been completed in the foreign intelligence area.
True, there is a major component in technology transfer avoidance
that falls to the FBI, to the other organizations that operate in the
United States. There is a study now underway which should be fin-
ished by July which will define with a great deal more clarity, both
the threat that is faced, the methodology being used by various for-
eign intelligence services to extract, informatiorr from this country and
the kinds of resources that are necessary to deal with it. So, you will get
a much better answer on this question along about late August 8 or
early September.
My guess to you is that the first priority is a pretty substantial input
of manpower into the Federal Bureau of Investigation. Also less
expensive and easier to do these days are going to 1:. some additional
steps to automate files available to Customs, Immigration. to increase
the speed with which they can correlate information available to them,
and make it available to the enforcement agencies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
241
From my own cursory examination, and your detailed one in these
last days probably now already exceeded my knowledge, most of these
agencies have had very little help in the last year or so, either in the
way of manpower to deal with the increasing foreign presence in this
country?
Senator NuNN. The FBI has had a real cutback in this area.
In the last 6 years they have had substantial cutbacks.
Admiral INmAN. It is an area that I don't believe there is a substi-
tute for manpower to deal with the problem.
Senator Num.'. Senator Roth?
Chairman ROTH. First, let me publicly say what a splendid public
servant I think you have been, Admiral Inman, and as a member of
the intelligence committee I regret very much your decision to depart.
I think these hearings initiated by Senator Nunn are extremely
valuable and ones that are at least to me very complex and troubling.
If I understand your answer to an earlier question of Senator Nunn,
you disagreed with the idea that we should concentrate on select areas
to prevent the transfer of high technology but instead, have a broader
approach.
Admiral INMAN. I disagree, Senator Roth, only if that means you
are simply going to concentrate in the high technology area and then
give up the efforts on the other areas.
I have no difficulty at all with the prescription that would say the
highest priority, the maximum concentration of effort in the interven-
ing months should be to try to stop the outflow in the highest technol-
ogy area. And we should be able to rapidly define that from inside the
Government and we ought to get the new mechanisms established very
quickly that let Defense stay right at the front edge of what is coming
along in industry. Most of it, I believe, will be coming out of advanced
research in any case. So it ought to be feasible to have a very rapid
updating and change of focus of where your highest priority is, but I
believe we should never lose sight of the breadth of the Soviet efforts
and I take the view that it is in our long-term national interest to im-
pede as much of that as it is feasible to do.
Chairman ROTH. That is the point I would like to get at. To me it is
troubling because looking at it from the one perspective I agree with
you. But at the same time, as a democracy we take great pride in having
an open and free community, so that once we start talking about pre-
venting the transfer very broadly, you come in to conflict with other
goals of this county.
I have been told that particularly in the area of research and develop-
ment, the free flow of information among the scientists is fundamental
and that one of the reasons for our success is that you do have this free
discourse between the universities, Government and the private sector,
all which makes it seem to me extraordinarily difficult to have very
effective controls in a broad sense of the word unless we make some
sweeping changes.
Then there is the other aspect of the problem and that, of course, is
trade which is important to this country and on which our future pros-
perity and strong economy depends.
Often one hears that if one shuts off this technology we are shutting
off sales and that means that we cannot compete not only with those
behind the Iron Curtain, but other democracies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
242
So that I wonder if we can realistically shut off all technology with-
out impeding some of these other efforts. Would it make sense that we
should export no technology, not only from the military point of view,
but from the competitive point of view?
Would that be a practical approach to try to shut off the transfer of
all technology?
Admiral INMAN. Senator, I don't think it even feasible to consider
shutting off all of it. I have been spending a lot of time tugging at this
problem since the committee first started asking me questions about it
2 years ago.
I have a perception that the leakage from basic research is minimal.
There is a little. But that the Soviets themselves have difficulty in
applying that. That burns up time; that it is in applied technology
where the gains are quickest; where the applications are fastest, where
one can also make sure judgments about the impact on our own case if
we make an effort to impose additional restrictions.
I would set out for your several basic ground rules with the ease of
one who is departing that is not going to be responsible for a great
deal of it.
First, that before one enacts additional legislation or establishes new
controls the first emphasis ought to go on insuring that the ones we
have now work well. I think we will clearly document in the next
several months that in dealing with the espionage problem we have
simply provided far too few people with too little support here in this
country, to let the job be done the way it needs to be done.
I suspect when one examines closely the implementation of the
Commerce export controls, the efforts by the State Department in the
international trafficking and arms regulations, and looks at the De-
fense critical technologies list, you are going to find several things.
You will find a measure of protection of bureaucratic turf. That
al ways happens when organizations are being pulled down in size.
The first priority becomes protecting turf. I think you will find prob-
ably some shortfalls in manpower and in automation and perhaps not
as close working relationships among the various organizations as
really ought to occur.
I would put first priority on trying to improve the performance of
the existing mechanisms.
There may be a need for some additional legislation. I would go
very slowly in that category where one is dealing with the open pub-
lication of basic research. There I have been trying since last January
to spur the academics into addressing that problem themselves. I have
a basic faith that if they put some effort on the problem, they are
probably far more likely than those of us in Government to come up
with some thoughtful ideas on how one impedes the outflow and I
choose that word very carefully.
I don't believe the idea of a total cutoff of outflow is achievable and
I am not sure it is even a useful goal. But I think one ought to con-
sciously look at the whole range beginning with advanced technology
as the area where the highest payoff is likely to occur and look at all
the measures that one can undertake to impede Soviet access to tech-
nology which they can use for production of military hardware.
Chairman ROTH. Admiral, to what extent has the Soviet Union
been successful in securing this technical information from our allies
and partners?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
243
Have they been better, about the same, or less effective than we have
in protecting the technology of national security?
It seems to me this is important from a number of standpoints, first
of all, to what extent we are going to exchange technology; second,
many of us think that it is important that because of the increasing
costs of weapons that they should begin to purchase agreed-upon weap-
ons on an alliancewide basis.
It would be increasingly difficult if we couldn't share technology
because one or the other of us were less reliable.
Would you care to comment on that?
Admiral INNIAN. We are too far down the path to try to walk back
from sharing technology with our allies. I would not want to walk it
back because I think commonality of weapons systems and capabilities
over the long term is going to be a greater plus than the potential
drainage. But in any case, we are too far down that path. But there
are components that are not subject to immediate Government con-
trol in any case. With the growth of the multinational corporation,
there are many subsidiaries that are not only manufacturing, but file
for patents back in this country from foreign subsidiaries. And we
sat about consciously to help our former enemies as well as our former
allies rebuild their economic health.
We have been successful beyond our wildest dreams and now some
of that competition is very intensive. One cannot seriously talk about
being completely successful in denying Western technology to the
Soviets without including our allies as close partners. That means it
is a much more complex problem. Where we can impact is on the direct
access for equipment, hardware that is being developed; particularly
in the military sphere where clearly we are the leaders still.
In response to part of your question about how much do the Soviets
acquire from the various components, I don't have a certain figure on
the percentage of the success that has come out of Western Europe or
out of Japan. I do know that they have intense efforts in those areas
just as they have here. We have had some particularly good reporting
in the last year from a defector in the Far East who documented very
substantial efforts the Soviets made in Japan to acquire technology.
Again, in Western Europe and Japan, as here, they have been
successful in buying a good deal of it. They haven't had to steal it.
What is clear is that the Soviets to this point in time are very depend-
ent on the totality of that vacuum cleaning and purchasing for this
massive military buildup that we have watched occur.
Chairman ROTH. My last question, Senator Nunn, you said in answer
to a question that the Russians, the Soviets, have not tried to imple-
ment or fill out those areas that we have not provided to do work our-
selves. There was a recent editorial in the New York Times comment-
ing on technology transfers to the Soviet Union in which it expressed
the opinion that lowering the barriers to the flow of technology to the
U.S.S.R. is not necessarily a bad thing.
It editorialized that "a more relaxed policy would serve the West's
best interests because a steady supply of foreign technology taxes the
Soviet Union's incentive to develop its own better to have the Soviets
stealing and copying, following a few steps own,
than working inde-
pendently and becoming able to deliver a technological surprise."
What would be your response?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
244
Admiral INMAN. It will not surprise you that I do not agree. It is
wishful dreaming. To say that it has sapped the Soviet efforts, I am
afraid portrays a lack of understanding of the state of the Soviets and
how far they have come in building up an R. & D. structure.
You worry me a little in the first part of the question. I hope I did
not mislead the committee in my wandering answer. We have not found
evidence thus far of a Soviet breakthrough in a critical technology
area that they have pursued on their own or indeed that we have ig-
nored.
There clearly is apprehension in fields like charged particle beams
and lasers, where they were clearly investing large sums of money in
research and development and test facilities that they might in fact
have that prospective breakthrough.
We have not seen evidence that they have achieved any. But what
is clear at this point is that the primary path the Soviets took was to
acquire what was obviously easily acquirable, technology from the
West and to adept that to their needs.
They have done that ranging all the way from manufacturing tech-
niques or technology to the guidance systems, to improve the accuracy
of ICBM's and SLBM's and cruise missiles.
Chairman ROTH. Thank you.
Senator NUNN. Senator Chiles?
Senator CHILES. Admiral, I want to add my voice publicly to thank
you for your outstanding service and to say that I hope your leave is
going to be temporary, and that you will be back giving us your serv-
ices.
You mentioned that the Soviets had a problem in agriculture and
that they have had to expend their hard currency to obtain grain and
food.
Argentina has been the principal supplier to the Soviet Union of
grain. For that, the Soviets have paid hard currency.
Given the present situation in the Falklands, do you see the Soviets
getting the possibility of not having to use hard currency, but, being
able to trade off weapons, which they seem to have a large capacity to
manufacture, for grain?
Admiral INMAN. Over the past decade, the Argentines have turned
largely to Western Europe as a source for their military hardware.
That is expensive. They have not previously indicated any interest in
procuring Soviet hardware, even though Peru was acquiring a great
deal of it. But you have fingered a very major worry that I have, that
the outcome of this crisis will be a decision on the part of the Argentine
Government to embark on a substantial program of acquiring new
military hardware from the Soviet Union.
I think you will find the Soviets very eager to sell at a bargain price
and particularly if that means they can lower the amount of hard cur-
rency they have to spend to get access to get wheat and beef.
It is a major cause for worry in the months ahead.
The only thing that stood between that to this point has been lack of
Argentine interest in turning to them as a major military supplier.
Senator CHILES. Of course with those weapons could also go the
advisers, spare parts and all of the--
Admiral INmAN. Dependence.
Senator CHILES. Yes, dependence will go at the same time.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
245
I would like ask you another followup question on an issue that
greatly concerns me and a number of my colleagues in the Senate, the
Soviet threat. We even had a closed session of the Senate to go into the
Soviet threat. There had been a briefing by the intelligence community
for many of us prior to that, but the feeling was that, because only 25
or 30 had availed themselves of that briefing, all of the Senate should
have that opportunity.
For that reason we went into a closed session. That is not done very
often in the Senate.
I and many of my colleagues feel that that briefing we received was
so sobering. It was alarming to see the tremendous buildup, and to
compare what actually happened every 5 years with what we thought
would happen. We now see the Soviets achieving a momentum that
would be very, very difficult for them to stop and reverse. A large por-
tion of their GNP now is going into the war machine; it has got to
make up so much of their employment. I feel that is something that
should be more available to the U.S. public. There is no perception on
the part of the public as to actually what that buildup is.
We are continually told that all of this is classified. My concern is:
Are we going so far as to classification of this information that we are
prohibiting the ability of really forming a public understanding in
this country that is necessary to do something about this Soviet weap-
ons buildup?
I wonder the way that we collect some of this information is classi-
fied. How much about those methods do the Soviets really care about
now?
The information we collected is something that is available to the
Soviets. But, ironically, the information is a secret from our people
as opposed to being a secret from the Soviets. I understand that how
we collect some of this information is classified. However, from your
perspective how are we going to be able to show this alarming build-
up to the American people in sufficient detail to convince them that
this is not rhetoric, that this is not one of those statements that will be
discounted later? How can be made the public understand this threat?
Admiral INMAN. Senator Chiles, let me try to stumble my way
through a response to that in an open, unclassified session.
Senator CHILES. I understand this.
Admiral INMAN. I happen to be a great admirer of John Hughes
and of the presentation of the Soviet buildup which would help a lot
of people. It was put together a number of years ago and I have
watched the impact on Republican and Democratic Congressmen, Re-
publican and Democratic administrations, and our foreign allies. It
has in every instance been a very sobering presentation because of the
accumulation of data before your eyes on the full scope of the buildup,
the infrastructure, the building of shipyards, the building of airplane
factories, the building of tank plants, the clear fact that they are using
those facilities substantially less than their capacity at this point in
time even when we have worried in our own defense buildup of
whether we have the industrial capacity to do the job that needs to
be done.
The complications in releasing that information, or in declassifying
it are substantial. One is the question of the impact of the Freedom of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
246
Information Act. If you declassify satellite information to use for that
specific purpose, is all of it, thereby, open and accessible and thereby
knowledge of what you targeted, how frequently you acquired. it,
available under the existing terms of the Freedom of Information
Act.
There are considerations one must carefully take into account on
national technical means of verification of treaties and the whole arms
control process and if one believes that we do need an arms control
track as well as the rebuilding track for our defense capabilities, then
you have to think very carefully about whether you endanger con-
tinued access.
The Soviets have an antisatellite capability now. Many of the
systems which provide this information are very suspectible to its use.
There is the question, when do you cross over the line between that
which is accepted under treaty for national technical means and when
is it a challenge to the secrecy in that closed society that they are not
willing to accept. But I must admit those of us who have been inclined
to support the use of the imagery had a real setback a couple of
months ago when we did use imagery to describe the buildup in
Nicaragua and the press coverage, at least some of it the next morning
talked about the claimed, alleged, reported information and it was
very clear that what to John Hughes and Bobby Inman was enor-
mously persuasive information from photomterpretation, was instantly
challenged. The average man in public is not a photointerpreter, able
to make their own independent judgments. If the views of the profes-
sionals are not to be accepted as credible, then I have great reserva-
tions that, taking any risks about future access is worth the cost.
Indeed, it has been the credibility that John and others of us have
had with these committees which I think has been a central factor in
the weight that that briefing has.
So we are on the edge here of some deeper and more complex prob-
lems of the general attitude that the media brings to the validity of
information provided by the Government and specifically by the
intelligence community on issues. If one doesn't want to believe that
there is a Soviet buildup, you can find all kinds of questions to ask
to divert attention.
I am grateful for the expressions of support that have come from
the members here and I have enjoyed enormously my working relit-
tdonships with you over the years. Rather than saying that this is a
temporary departure I would rather phrase it a different way. As I
go off to my second career, I hope I am still going to be able to help
in addressing a great many of these issues from the private sector.
But. even there, credibility, a willingness to accept the honesty and
integrity of the professionals in providing information is absolutely
key to building public understanding. A very good publication was
put together with a lot of hard work last year called "Soviet Military
Power." It does not have all the dramatic impact that you got, that
many of your colleagues have gotten, as have I, from watching the
full classified briefing, but all of the essence is there in that publication.
Senator NUNN. That publication was primarily done for NATO?
Admiral INMAN. Yes, sir.
Senator NUNN. An interesting thing about that publication if I
can interrupt Senator Chiles for just a moment is the overall view
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
247
was it was enormously helpful in European circles. I was over there
shortly after it was put out. But there were a substantial number
of critics that kept talking about the fact this was simply expressed
in gross terms, this is what the Soviets had, one, two, three, four
with no effort to make a net assessment, with no effort to say what
the American capability was, what the NATO capability was. Of
course, when you get into net assessments you are getting into subjec-
tive judgments that would take 15 or 20 years for the Department
of Defense to agree on, never mind the ones that go to the National
Security Council.
I know the difficulty of putting out that kind of information.
There is a totally different group of people dealing with it. That
is where the skepticism goes. There is a great desire on the part of
the people in the media and the public, I might add, to have some-
one digest the American-Soviet-NATO-Warsaw Pact balance in 30
seconds or less, in one page or less.
Tell us whether we are stronger or weaker, tell us who is superior
and I think that is a very fallacious kind of approach but that is
what you are dealing with and that is what, of course, we are all
dealing with.
Admiral INMAN. I think we have gotten enchanted in this last 20
years, at least the public debate has gotten drawn too much to charts,
graphs, trying to compare everything by numbers. The systems ana-
lysts love it. I am very skeptical about the ultimate value of making
judgments about need in that way. I doubt if any systems analysts
would have put the Falklands or the kinds of forces one needs to
impact on the Falklands in the charts or in racking up the kind of
capabilities one needs to deal with the troubled world of the decade
ahead.
Senator CHILES. I am sure that is true. I would say one comment I
have, I see the problem which you are raising. I have a feeling if you
give the American people sufficient information and detail, they won't
allow the media to interpret for them. They will make their own
interpretation.
Admiral INMAN. I don't want to leave any doubt at all that I believe
the Soviet buildup over these last 17 years has brought us to a perilous
state. That there is now vastly greater military power in the hands
of a very few leaders who certainly are not chosen by public mandate
than have ever been in the hands of any of the czars in the time
before.
There are several components. Ultimately whether those new leaders
are willing to use those military powers in ways that are directly
threatening to us or our interests will lie partly on our own military
forces but partly on judgments about our national will. And clearly
they will become very sophisticated at looking at public debate in
the United States, but I am afraid sometimes they may conclude
that there is less will to deal with problems than in fact I believe
exists in the country at large.
Senator CHILES. I agree, that they could miscalculate.
Admiral INMAN. Yes, sir.
Senator CHILES. Thank you.
Senator NuNx. You made reference in the past and again this morn-
ing about scientific exchanges and your desire to stimulate the aca-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
248
demic community and scientific community to take their own action.
You are about to move into the private sector. We heard over and over
again about how the Soviets send middle-aged scientists over as stu-
dents, we send students of Soviet history over in an exchange program.
One is after technology, the other is after some form of legitimate
literary or historical endeavor.
[At this point, Senator Chiles withdrew from the hearing room.]
Senator NuNx. There is nothing wrong with the latter, but what is
it you would like to see the scientific and intellectual community do in
this regard and I stress voluntarily without Government dictating, I
am sure that is what. you mean?
Admiral INMAN. Happily what I wanted to see is now underway.
In anticipation that the Government was going to eventually come to
grips with the major technology outflow for which there are laws that
ought to be effective and organizations that ought to be effective in at
least making that very difficult, it was clear that there was a segment
of this outflow that was not regulated, that was not controlled and in
thinking ahead, I was trying to spur the scientists into giving atten-
tion to that area themselves and coming up with thoughts about what
one could voluntarily do to deal with it.
That got interpreted as proposals for censorship, for threatening to
put controls in places, to try and somehow turn the intelligence com-
munity loose on academicians and other things. They were just flatly
false. What T hoped to get was an honest broker in the scientific com-
munity to put together a forum to discuss the problem and come up
with recommendations. The National Academy of Sciences and Na-
tional Academy of Engineering are now jointly sponsoring such an
effort.
It is a study group that is going to take about 12 months to deliber-
ate the problem very carefully. They were fortunate to have gotten the
former president of Cornell University to head the group. They have
had one meeting. They have another one coming up in a month. They
need to be left alone. They don't need a lot of people peering over their
shoulders either from the Government or from the media, but I have
substantial optimism based on my earlier experience that they will
define areas that are of concern where there are approaches that are
entirely acceptable.
There will be some grumbling, but I believe it will be possible to
determine what it really impacts on the free growth and exchange of
science, and to recognize things that do not impact on that, that will
nonetheless let us throw some barriers in the path of the Soviets to
make their acquisition harder.
I would finally make a pitch that there are some exchanges that are
clearly in our national interest. We are going to need in this decade out
ahead scholars and students with genuine area study capability, with
language skills who can watch the actions of our adversaries and give
us sound advice, whether they are working in the intelligence com-
munity as analysts or whether they are working in the Foreign Service'
or other parts of the Government.. And so we should be cautious as we
go about assessing the value of exchanges that we don't underplay the
value to this country of various area studies and language training as
part of the exchange structure.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
240
Senator NuNN. In other words, you are not here advocating a new
law on scientific and technological exchanges?
Admiral INMAN. I am not. I think it would be an area well serviced
to stay away from for a while and see what they can develop on their
own.
Senator NuNN. Thank you very much. We appreciate your coopera-
tion. We look forward to your views on some ideas we have in the next
couple of days. What is your expected departure date?
Admiral INMAN. It depends on the confirmation of Mr. McMahon.
I would hope that would go smoothly without difficulty and, therefore,
in early June, he will be ready to take office and I will retire.
Senator NuNN. I hope you are accessible in the future to the Con-
gress and to those of us who have come to respect you so much for your
advice and wisdom and experience. We will certainly continue to call
on you as if you had never left.
Admiral INMAN. Thank you very much.
Senator NuNN. Thank you.
Our next witness is Dr. Stephen Bryen, Deputy Assistant Secretary
of Defense, International Economics, Trade, and Security Policy.
Dr. Bryen, if you have other people with you this morning, if you
would introduce them, if any will be answering questions we direct to
you, we can have them take the oath also. Would you raise your right
hand.
Do you swear the testimony you give will be the truth, the whole
truth, and nothing but the truth, so help you God.
Dr. BRYEN. I do.
TESTIMONY OF DR. STEPHEN D. BRYEN, DEPUTY ASSISTANT SEC-
RETARY OF DEFENSE, INTERNATIONAL ECONOMICS, TRADE AND
SECURITY POLICY, DEPARTMENT OF DEFENSE
Senator NuNN. Dr. Bryen, we appreciate your cooperation, your
office's cooperation with this subcommittee and our staff as we have
undertaken a rather lengthy, detailed examination in this technology
area.
[At this point, Chairman Roth withdrew from the hearing room.]
Senator NUNN. We know you have prepared testimony today and
will be glad to hear from you before we begin asking questions.
Dr. BRYEN. Thank you, Mr. Chairman. I will try and summarize
my testimony a bit. Since you have the full text, it can be entered
into the record.
Senator NUNN. Without dbjection your whole text will be entered.'
Dr. BRYEN. I welcome the opportunity to speak with you today
concerning what we in the Department of Defense believe to be a
most serious national problem, the control of technology which is
being transferred to the Soviet Union and its allies. My discussion will
focus on what we have achieved so far, what we have now in the works,
what we have yet to do. Previous testimony has gone to considerable
length to illustrate the scope of the problem. It would be very difficult
to estimate the real damage done to American national security by the
Bell case, which you have already looked at.
1 See p. 583 for the prepared statement of Dr. Stephen D. Bryen.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
250
That loss consists of both military damage in making those weapons
systems vulnerable to countermeasures and the cost to the taxpayers
to overcome the vulnerabilities that those compromises entail. But the
same kind of damage is done in more subtle ways by a variety of
mechanisms that are essentially directed by the Soviet Union to the
detriment of the United States.
Undoubtedly you have heard or hear in the future of those who say
only by constant investments in the technology base upon which our
defense is founded can the United States hope to remain ahead of its
strategic adversary.
Senator NUNN. Will you pull that mike up a little. Thank you.
Dr. BRYEN. Likewise, you will hear that it is impossible to constrain
knowledge and to do so, in fact, is counter to the efforts to advance the
onward progress of technology. We believe it would be imprudent in
the extreme to shrink f'.roifi the difficult task of devising and enforcing
reasonable controls to preclude the use by the Soviets of the fruits of
our technological genius to destroy the very system by which it is
nourished.
It is our attempt to structure within the Department of Defense,
reasonable controls over technology, controls which will effectively
inhibit the flow of technology contributing to the growth in Soviet
military capability.
Now it is a truism there is no substitute for case-by-case review of
proposed exports, legal exports. Only by careful and objective assess-
ment of the facts of each case can the operational, technical, and prece-
dential impact of an export be properly assessed. We have no intention
whatever of eliminating this vital element of our contribution to the
Government's export control of technology. However, the case-by-case
approach functions best within a framework of guidelines and criteria,
proven standards by which judgments can be made.
In the past, our individual judgments were made in so flexible a
fashion that we were overly subject to the vagaries of the moment. The
effect has generally been to advance the margins of acceptability of
exports through the gradual accretion of precedential approvals, by
the way encouraged to some extent by the Export Administration Act
without particular regard to the basic standards by which exports
should be judged?the Nation's security.
Accordingly, we are engaged in a major effort to develop in a cogent
fashion, a framework of policy within which the Department of De-
fense can provide its advice and counsel to the ultimate licensing
authorities in our Government.
My office started with four people a year ago. We have expanded
since then to a staff of 12. We have intensified our role in the export
review process while. at the same time undertaking a major effort to
objectively develop policy. I would like to share with you some of the
things we have done to date and I would like to solicit your suggestions
for our future efforts.
First, an augmentation team composed of representatives of the
military services has been assigned to my office and is preparing for the
Secretary of Defense's signature a policy statement on control of tech-
nology transfer. This, we hope, will replace and improve a 1977 interim
policy that is signed by Secretary of Defense Brown.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
251
We hope that our new policy will reflect several changes that have
occurred since 1977. One of the most important ones being the enact-
ment of the 1979 Export Administration Act. This is the basic role
under which we today operate.
In addition, this team is providing management assistance to my
office in three basic forms.
The first of these is technical assistance to automate some of the
routine administrative tasks involved in determining policy and proc-
essing cases. The second is to assist the integration of existing data
bases used in routine case processing. And the third is the creation of
a central library to provide the basic documents required for develop-
ing policy.
This subcommittee should know a year ago when I came on board,
there were not available coherent records on past DOD determina-
tions, or for that matter any determinations by previous administra-
tions, nor was there any single source to appraise the result of past
activity. And we are slowly correcting this deficiency. It takes time
because we have to reconstruct records and try and determine exactly
what has gone forward in the past and to base our new judgments on
those records as best we can.
We are also working very hard to train our people, to develop rigor-
ous standards and try to follow more disciplined procedures as pos-
sible.
In the long run, I think these efforts will pay off in that we will
develop a solid core of professionals who will understand as best they
can the problem and will work in a consistent and predictable way.
If we can do this in the Department of Defense, we have to do it in
a broader way with the public, with the business community and with
our allies and friends abroad and to further this effort, we have under-
taken with our augmentation team the development of a white paper
on this entire subject of ,technology transfer, which we hope will be
published this summer.
The goals of the paper are to detail the importance of dual-use
technology to our defense support industries, promote as much as we
can a voluntary compliance with the export process and we hope to se-
cure support for and assistance in developing methods which more
closely review defense-related technology proposed for export.
The paper will attempt to present the roles and contributions of
both our Department, State, Commerce, Treasury, and Justice, and the
Bureau of Customs.
Another major effort is our attempt to work closely with both State
and Commerce and seeking to strengthen strategic trade controls in
Cocom, the coordinating committee, and thus to stem the flow of West-
n technology to the Soviet Union and its allies. As you know, Cocom
is an informal nontreaty organization established in the early 1950's.
It is comprised of the NATO countries, less Iceland, but it does include
Japan, a very important member. It has, however, no formal link to
NATO.
Senator NuNx. Is there a case to be made that there should be a more
formal relationship with NATO or would that be a negative kind
of development?
Dr. BRYEN. There is a good case to be made for it. I think the prob-
lem is a political problem in that Japan is a member of Cocom, of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
252
course does not view itself in the NATO system. Under those circum-
stances, those institutions will probably have to remain separate.
Senator NUNN. Does NATO have a way of getting its input in
through the various Department of Defense inputs and the respective
NATO countries?
Dr. BRYEN. You just put your finger on the very major issue and
problem and one we have been working very hard on. If I can step
away from my testimony, maybe T can try and elaborate on it a bit.
In the past, with the exception of the United States and to a lesser
extent Great Britain, defense ministries, surprisingly played a very
minor role in the technology control business. Surprisingly because the
whole point of the effort is to deny strategic technology to our adver-
sary. Our tradition was just very different from the tradition of our
European colleagues and Japan as well.
What we have been trying to do is to turn that around and develop
far more participation by defense ministries abroad in this entire
process. We have (rone to achieve this objective through two routes.
One is through Cocom. We have not achieved this yet but we have
asked for a, military subcommittee in Cocom to meet on a regular basis
where military experts from different participating countries could
get together, exchange information, evaluate proposals for export
based on the strategic implications both for the individual countries
and for the collective defense effort. As I said. we didn't get that. We
did get agreement to expand use of Cocom to include military experts
which we considered a step forward.
On a separate track, we have, and this is very much Mr. Weinber-
ger's recommendation which was approved by NATO, undertaken a
study within NATO of the whole impact of technology transfer on
the NATO military missions. The purpose was twofold. First, we have
tried often enough to relate the impact of technology transfer on Amer-
ica's national defense programs, but not so much how that cut into
our allies programs. So it is a very ambitious effort and we have gone
through the first 6 months of it now and quite successfully.
Second, it brings together defense ministry participants to consider
the study of technology transfer and to take that information back
home to their own governments.
The next point is, how do you get from NATO to Cocom?
Senator NUNN. So there is an effort to get NATO to begin consider-
ing this as a body.
Dr. BRYEN. Yes. It is more than an effort, to begin. They are doing
it. It will continue. T have learned that just today. We are very
enthusiastic about it. We think it will be very helpful to all of us. It
will create the kind of interrelationship and understanding that we
ne"cl in other governments to get this job done.
Senator NUNN. Is that going to be a standing group in NATO?
Dr. BRYEN. We have asked that it be a standing group.
Senator NUNN. Of people that will be responsible for that and will
get input from their own ministries.
Dr. BRYEN. That is how it has worked so far and that is how we
want it to work in the future.
Senator Nu-vr,r. Then bring it up to the NATO representative level?
Dr. BRYEN. That is right. Again it was largely at the suggestion of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
253
Secretary Weinberger that we undertook this effort. We supported it
very fully. I must tell you that we had many barriers to cross to get
the basic themes agreed on.
One of the aspects of this whole problem is that people didn't do
this kind of analysis in the past, either here or anywhere else. When I
came a year ago to this job and asked how technology transfer im-
pacted military programs, there was very little available.
It wasn't that the evidence wasn't in the system. No one was putting
it together and really attempting to evaluate it and do the right kind
of impact study. We have done a good deal of that. We have got a lot
more to do.
Senator Nurmr. What are you going to call that standing group in
NATO?
Dr. BRYEN. So far it has been called by the brilliant name AC 314
which means nothing at all, but it will be called the Technology Trans-
fer Group as it has been known colloquially among those of us who
have worked on the issue.
Senator N-crNiv. That sounds suspicious and covert enough to get it
some attention.
Dr. BRYEN. We think it has already gotten some attention. It has
been a process. We expect it to be a process. I must say that we have
had excellent support among all our agencies who help us get the job
done at NATO.
Senator NUNN. You were going to say that once NATO gets to be
cognizant of the problem and a working group, what do they do to
feed into Cocom?
Dr. BRYEN. Principally NATO will feed into the governments but
what we want to see, obviously, is far more defense participation in
the Cocom study as well and in each nation, a chance for the defense
ministries to review proposals for export before they occur.
There has been one very positive development in that regard, if I
can mention it today because I think it is an important contribution.
This was the decision by the French Government to give its defense
ministry a role quite similar to the one we play here.
We believe it has had a very positive result already and it has helped
a great deal. We are very grateful for that step by the Mitterand gov-
ernment.
I was talking about Cocom and let me just elaborate one step further.
This administration asked for it. It was actually the President last year
at the Ottawa meeting who asked for a high level meeting of Cocom
to see if we could strengthen the organization, to see if we could give it
a new strategic purpose.
His request was accepted, a high level meeting occurred last Janu-
ary, and I think an important start was made in terms of reaching a
concord with our allies on those items that we need to control and why
we need to control them.
We are now in the process of following up that initial high level
Cocom meeting?by the way, the first one in nearly 30 years, which
gives you an idea of the problem right there. Now the issue is to get
specific proposals adopted. In that connection we had a handful of very
high priority, what we call quick fix, proposals which we will be pre-
senting in June in Paris at the Cocom meeting.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
254
We have every anticipation that these proposals will be accepted and
we think they will go a long way to plugging some of the gaps and
loopholes in the system that have persisted for some time.
Beyond that, we have a major list review coming up in the fall which
will try to go even more broadly into areas where coverage by Cocom
has been less than adequate.
I am skipping ahead because I have already covered the NATO and
Cocom parts of the testimony.
I do want to mention, I think Mike Lorenzo this morning and Ad-
miral Inman mentioned it, but a point that we feel very strongly about
in the Defense Department, and which the administration feels very
strongly about, and that is improving enforcement of both the legal
and illegal transfers of technology.
There are two dynamics to the enforcement process, the domestic one
and again the international one.
At the international level, one of the conclusions of the high level
meeting WPS to explore how enforcement could be strengthened in
Europe and in Japan.
We expect specific measures to be shortly negotiated at Cocom and
we are looking forward to see the national implementation. of that
effort.
For our own part, Defense itself doesn't exactly participate directly
in enforcement. We try to support our enforcement people with a num-
ber of efforts. One of them is to try to target and identify areas, sensi-
tive areas where we think a special emphasis should be made by the
enforcement people, whether it is the Customs people, Justice or people
of Commerce.
A second one is to try to help our own Customs officials better
identify materials and equipment that are embargoed. It is not a
simple thing, not today, in the age of Atari and Pac-Man.
The Customs effort has been stepped up as you have already been
told, I am sure. Behind that we are trying to provide the supporting
assistance. We call it a "mushroom book." It is to give our Customs offi-
cials a fast and useful way to precisely identify the materials they are
looking at.
Senator NUNN. Where did you get the name "mushroom book"?
Dr. BRYEN. I don't know, myself. I suspect it was in the discussions
we had with the Customs people as we explored this idea in the initial
phase. There was a suggestion made and we took it. Whether it applies
to mushrooms hiding under, in a dark place, I suspect that is where it
comes from. But once you adopt the term, well, it is somewhat like the
plastic palace in the Senate.
Once the name is assigned, people forget why.
Let me deal with one final aspect, if I may, and then I will get to the
questioning stage.
One of the things we can do in the Department of Defense, one of
the efforts that I have taken a lot of responsibility for, because I think
it is so important, is better management of our own technology.
The program that I started with and one that is very important to
us in the future is the very-high-speed integrated circuit program.
The VHSIC program has very great prominence for our military sys-
tems because it will enable us to improve existing systems and develop
new ones with far greater capability.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
255
The VHSIC product will be used in advanced-signal processing
applications for weapons systems, electronic warfare, communications,
radar, precisely guiding munitions.
It will enable us to do these things at a lower cost, we think; it will
be smaller in size, with greater power than anything we currently
possess.
Obviously, the protection of this technology is of highest priority.
Congress, when it authorized the VHSIC program asked that we make
efforts to protect VHSIC.
To date, a full system of controls has not been implemented and I
think regrettably so. The task force I am heading now is designed
to try to remedy this situation, to get this program under a system
of control.
Part of it involves putting VHSIC under the ITAR, the interna-
tional traffic and arms regulations, as the Congress intended. We are
working with the State Department which has the authority and we
believe we will soon accomplish this goal.
Our immediate task is to protect the technical data, the military
hardware that is now being developed, before it is too late to prevent
the dissemination of these technologies to our adversaries.
In addition to putting the VHSIC under the ITAR, we have to
also deal with the problem of the wide amount of literature that has
already been out on VHSIC, some of it covering the circuit design,
some of it covering the hardware associated with the program, some
of it covering the software.
Neither the ITAR nor the export regulations really will protect
this kind of data from compromise. I don't need to tell you about the
Freedom of Information Act.
Senator NuNisr. Do you know of any reason why people other than
American citizens or people who are legally in this country should be
given access to the Freedom of Information Act?
Is there any reason why the Freedom of Information Act should
be as broad as to allow foreign citizens to obtain information just as
if they were American citizens?
Dr. BRYEN. That is a question you probably ought to ask the Justice
Department specialists. I am -not an attorney and I won't make any
effort to explain it.
It occurs to me though that one of the things that we want, of
course, when we are abroad is some reciprocal protection of rights. So
one has to be a bit cautious In this area. But so long as we publish
materials we have to expect, I think, that one way or another they
are an open resource for anyone that wants to get their hands on it.
We have proposed, as you know, special kinds of classification called
restrictive.
Frankly, sir, I think the answer is a very careful attempt on our
side to classify what we think really is important and what we are
going through now, 2 years later, I am afraid to say, but we are still
going through the process, is trying to find those forthcoming aspects
of this program that, if we can protect, we can thereby protect the
whole program.
We are making a major effort in that regard. We hope that this
? exercise in fact will be a prototype for control of other Department of
Defense programs both in the emerging technologies field and to a
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
256
certain extent in more mature areas, where design, where circuit design,
where specifications information, really tells the tale to the adversary.
It is a tough thing but it is one we regard as very important.
I think those are the main points I wanted to touch on this morn-
ing. I have some testimony about the Siberian pipeline. We have
expressed concern and we continue to express concern about that be-
cause of the increment in hard currency earnings capability over a
25-year period at least that will accrue to the Soviet Union.
It will give them far more economic clout than they may now have.
It will enable them, I am afraid, to have even greater access to the
technology which we are trying to protect.
Admiral Inman did a superb job of describing the problem for you,
both in the broad brush sense and in the narrow sense.
It is a terribly important issue. It is one that the administration is
taking very seriously. It is one that we have to be successful in.
I cannot in confidence at this moment predict that we are going to
be successful but I think what we need is a period of time to try out
the effort on an organized basis.
I think we need 5 years minimum . before we are going to see real
impact of the mature technology effort. We need our allies to cooperate.
We are working hard on that. We are going to need more resources to
do the job. We have already put Congress on notice about that. We
need to do some things :in our own house to operate more effectively, to
try to take those steps. We are to a certain extent feeling our way
along.
Senator NUNN. Do you generally agree with the suggestion that has
been made that the most effective way to control technology, know-
how, small, very small sophisticated electronic computer equipment,
and so forth, is to try to control it at the source with the Government-
to-business education program rather than control it as it is going out
of the country? I am not saying you don't try both, but I am saying
which is the most efficient, which is the one that ought to be given the
highest priority?
Dr. BRYEN. I guess it harkens back to the Bucy report, in respect
that what you want to watch most of all is the manufacturing tech-
nology. That is the piece of it that hurts you the most. I put all of
my?not all, but a great deal of my emphasis right there. I would be
better off giving you an example rather than trying to speak generally.
In the microelectronics area, there is a small amount of very spe-
cialized equipment that enables you to make microelectronics.
A lot of that equipment is made in this country. Some of it is made
under license abroad. Very little is entirely independent of what we
develop ourselves. If we can control that manufacturing technology
and the design technology that goes with it, we may have a good shot
at certainly inhibiting very substantially Soviet efforts to acquire it.
It is also one of the areas we simply failed to inhibit in the early phase.
But we can do it. It is a last resort to track it on the way out but it has
a very valuable impact.
Senator NUNN. You need to do all the ways but, it seems to me your
most effective enforcement is through a dialog with industry.
Dr. BRYEN. We are doing that. In fact, we just had in representa-
tives of the Semi-Conductor Industry Association.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
257
One of the things we wanted to do was be as direct with them as we
could. So we granted special clearances so there would be no holds
barred. We got that done. We went through an entire briefing. Then we
heard from them. They have some problems, too.
Senator NUNN. Do you do that on a one-on-one basis or do you do it
in trade association seminars?
Dr. BRYEN. This was with a trade association, but it was one of the
most senior representatives of the trade association. It was very much
a prototype of a broader effort we want to undertake.
Senator NUNN. The FBI has a similar program and I am sure that
theirs doesn't get into as much technicality as yours does in terms of
details but they, I think, are going around alerting businesses to vari-
ous covert and overt means of Soviet operations. Do you coordinate
with the FBI?
Dr. BRYEN. We do.
Senator NUNN. Do you sit down and discuss it, talk about who is
going to do what?
Dr. BRYEN. We have a group headed by Gus White at the White
House that discusses all of these issues and we square off on these pro-
grams. But our effort was really designed to highlight for semiconduc-
tor industry people how they have, inadvertently, I might say, been
contributing to Soviet military capability.
It was a very elaborate presentation, but I think a very sobering one.
It is something we cannot do out in public. We felt we ought to experi-
ment with this and see if it would help them to understand our prob-
lem, the national problem, and at the same time to develop some
suggestions.
One of the things we would very much like to see security commit-
tees in our own sensitive industries, policed by the industry itself.
Some of our industries are not known for their internal security.
Senator NUNN. You mentioned in your statement that you were
replacing the 1977 interim policy of DOD for export control. What
is the reason for replacing that?
Dr. BRYEN. We think, if you read the 1977 statement, I happen to
have a copy with me, that it is basically an apple pie kind of descrip-
tion of what we should be doing. The problem is that it apparently had
very little genuine effect either in the Department of Defense or in
the interrelationship of the Department with other agencies.
It was too general. It needs more precision. We liked the part of that
statement that keys on what is called the Bucy report, which I am
sure you heard of already in discussions, the notion of aiming at the
critical manufacturing technologies. But it doesn't get very far beyond
that. It doesn't set out the marching orders in the Department clearly.
So we are doing a front to back scrub of the whole thing. We hope to
make it more precise so that it makes clear what ones' responsibilities,
duties and roles are. That is the purpose.
Senator NUNN. What is our recourse if there is a controlled technol-
ogy on the Cocom list and it is, let's say, transferred by one of the
Cocom nations to the Eastern bloc. Do we have any recourse under
Cocom or is it just a complaint mechanism?
Dr. BRYEN. COCOM is only a voluntary organization.
Senator NUNN. There are no sanctions involved?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
258
Dr. BRYEN. There is no sanction in Cocom. But obviously we have
to pace our cooperation with others on their overall performance, and
technology transfer is an issue of significant enough importance to this
administration that we are actually doing that.
It is a painful process. It is not one that I want to talk in open
session about. But it is one we are very much engaged in and I think
to the betterment of the whole effort.
Senator NuNN. You mentioned that certain technologies can only
be adequately protected by national security classification. Are you
saying there is nothing in between, either it is classified or not, if it is
not classified, it is out there, available and that is it?
Dr. BRYEN. That is pretty much the case.
Senator NUNN, Would there be any need, desire or merit in trying
to find something in between that would not be classified but would be
labeled crucial technology or would that simply be too cumbersome to
get involved in?
Dr. BRYEN. I think you put a big flag on it.
Senator Nuisuc. It ought to be classified or not classified?
Dr. BRYEN. Yes; I think parts of it have to be classified. It is a man-
agement thing as much as it is a security matter.
Senator NUNN. But can you classify dual use technology? Can de-
fense classify technology?
Dr. BRYEN. We cannot classify what we don't know, but we own some
things that we haven't classified.
What we need to do is look at our own house. That is what we are
doing, and we say, are we being careful enough in protecting this pro-
gram? That is the purpose of the VHSIC inquiry and I hope that we
can expand that further in the future.
We are always accused of overclassifying things as a matter of
course.
Believe it or not, there was not a great tradition in the Department
of Defense to manage technology development programs from the
point of view of security precautions. That is the thing we have to take
a much more careful look at and we are.
Senator NuNN. In your statement you refer to the small industry
that has risen in Washington composed of individuals who know how
to play the system within the export control community. What do you
mean by this?
Dr. BRYEN. What I mean by that are people who have become expert
on the export control process, they know where the soft spots are, know
how to characterize items in ways that make them sound perfectly nice
and harmless and they are good at it.
I don't want to get into the moral issues about it. It is to be antici-
pated. It is an interesting point. On the whole we have little trade with
the Soviet Union. When you take away grain, it is not all that much.
Even our European partners don't do that much trade. Sometimes
these issues are cast as if the economy is going to come to a halt if we
stop the transfer of a certain item.
It is very rarely really the case. Of course, one of the things the
Soviets have become quite good at is exploiting sick high-technology
industries, industries that are cash short, need money, need R. & D.
funds' whatever; they look for those companies because they are easy
targets.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
254
Senator NuNN. What specifically is your office doing to coordinate
with the law enforcement community? You mentioned the mushroom
book. Is that the main effort going on?
Dr. BRYEN. That is the main effort we have underway. The other
way we coordinate--but what we try to do on a regular basis is to
make known to, the State Department, that is where most of the action
is, our concern about specific areas, so we can bring those to the atten-
tion of other foreign governments. We don't ourselves have a mandate
for enforcement.
Senator NuNN. We have heard testimony the United States has in-
dicted at least three West German nationals for violations of the Arms
Export Control Act. These individuals are now fugitives and free men
in West Germany, a Cocom nation. Is there any effort within the
Government to make these offenses extraditable offenses?
Dr. BRYEN. I can't answer on the extraditable offenses. There is an
effort to try and get our European allies to upgrade their entire legal
structure. Here in the United States it is a felony to be involved in
transferring the technology. In European countries, it is a misde-
meanor at best. People calculate the cost. How much fine there is
against the how much profit there is?
That is the wrong way to go about it. You need some positive dis-
incentives and jail terms, or something severe like that. That is why
we come back to your earlier question, that of customs catching these
things and then making sure Commerce follows up. It is a very impres-
sive way to get people to understand export controls.
Senator NuNN. We heard testimony from William Holden Bell,
former Hughes Aircraft executive, who sold secret military informa-
tion to Polish agents. He testified last week. How serious a security
breach, in your opinion, was there in the Bell case?
Dr. BRYEN. I wouldn't comment on that except to say it was serious,
but I wouldn't want to comment in open session. I think we can pro-
vide you in closed session with a real evaluation. That is not the kind
of evaluation to make in public.
Senator NuNN. We may very well.
Dr. Bryen, you made reference in your testimony to the effort by the
Soviets to build and equip a semiconductor plant using equivalent
know-how from the United States.
Could the Soviets have built and equipped such a plant in the late
1970's and early 1980's without U.S. machinery, equipment and know
how?
Dr. BRYEN. My answer is they could not. That doesn't mean that
equipment necessarily came from this country. It could have been
transferred from Europe or elsewhere. In fact, it could have been
transferred from another country that bought that equipment?it
could have been on the secondary market. There is a secondary mar-
ket in this sort of machinery. These are terribly difficult things to
trace.
What we know in the first instance is that a lot had to be U.S.
equipment, that the system was full of holes, it was porous, it was
easy for them to get it and they got it.
The microelectronics area has enabled the Soviets to upgrade their
military equipment. Again, in my testimony, there is a kind of ques-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
260
tion and commentary about where all this leads. I think where it
leads is that we risk losing the quality edge on which our entire struc-
ture of national defense and alliance depends. I don't think we can
afford to take that risk. I think there are things we can do to protect it.
This is why we are making this effort and we very much appreciate
your support, the support of this subcommittee and the support of
the Congress.
Senator NUNN. Thank you, very much. We look forward to bounc-
ing some of our ideas off you and your people in the next week or so.
Thank you, very much.
Our final hearing on this subject in open session will be tomorrow
morning at 10 o'clock in this room.
[Whereupon at 12:05 p.m., the subcommittee recessed, to reconvene
at 10:05 a.m., Wednesday, May 12, 1982.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
TRANSFER OF UNITED STATES HIGH TECHNOLOGY
TO THE SOVIET UNION AND SOVIET BLOC NATIONS
WEDNESDAY, MAY 12, 1982
U.S. SENATE,
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
OF THE COMMITTEE ON GOVERNMENTAL AFFAIRS,
Wa8hingt076, D.C.
The subcommittee met at 10:05 a.m., in room 3302, Dirksen Senate
Office Building, under authority of Senate Resolution 361, dated
March 5, 1980, Hon. Sam Nunn presiding.
Members of the subcommittee present: Senator William V. Roth,
Jr., Republican Delaware ? Senator Sam Nunn, Democrat, Georgia;
and Senator Warren B. Rudman, Republican, New Hampshire.
Members of the professional staff present: S. Cass Weiland, chief
counsel; Michael C. Eberhardt, deputy chief counsel; Eleanore Hill,
chief counsel to the minority; Kathy Bidden, chief clerk; Gregory
Baldwin, assistant counsel to the minority; Jack Key, Glenn Fry, and
Fred Asselin, staff investigators to the minority; and Kathleen Dias,
executive secretary to the minority chief counsel.
[Senator present at time of convening: Senator Nunn.]
[The letter of authority follows:]
T.T.S. SENATE,
COMMITTEE ON GOVERNMENTAL AFFAIRS,
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS,
Wataington, D.C. ?
Pursuant to Rule 5 of the Rules of Procedure of the Senate Permanent Sub-
committee on Investigations of the Committee on Governmental Affairs, per-
mission is hereby granted for the Chairman, or any Member of the Subcommit-
tee as designated by the Chairman, to conduct open and/or executive hearings
without a quorum of two members for the administration of oaths and taking
testimony in connection with hearings on the Transfer of United States High
Technology to the Soviet Union and Soviet Bloc Nations, to be held May 4, 5,
6. 11 and 12, 1982.
WILLIAM V. ROTH, JR.,
Chairman.
SAM NTJNN,
Ranking Minority Member.
Senator Nim-N. We have just seen a vote go up on the board This
matter has been debated for a couple of days. It makes more sense to
have the votes. I will be back in 10 minutes.
Senator Roth is over there voting now. We will start the hearings
in approximately 10 to 15 minutes.
[Brief recess.]
[Senator present at time of recess: Senator Nunn.]
[Senators present at time of reconvening: Senators Nunn and
Rudman.]
(261)
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
262
Senator RUDMAN. The Permanent Subcommittee. on Investigations
is now in session.
The first witness in the continuation of these hearings on Transfer
of U.S. Technology is Lawrence J. Brady, Assistant Secretary of
Commerce for Trade Administration, U.S. Department of Commerce.
Mr. Brady, we welcome you here this morning.
Lawrence J. Brady is a personal friend, a New Hampshire native,
and I am particularly glad to have you here.
My colleague, Senator Nunn, of Georgia, has been the moving force
behind these hearings and I will ask Senator Nunn if he has any open-
ing remarks this morning.
Senator NUNN. No; we are delighted to have Mr. Brady here.
The only thing I say to Mr. Brady before he starts, how long have
you been on your present job?
Mr. BRADY. I was sworn in in June of last year.
Senator NuNN. I want to make it clear to you and everyone that
the problems we are outlining about the Commerce Department and
the Compliance Division are directed at not just this administration,
but the previous administration and the administration before that.
This is a longstanding problem and has no partisan origin and no
partisan conclusion. It certainly does not relate to you because a good
many things we are talking about have been ongoing problems. We
are afraid they are still ongoing, but we will hear from you on that
subject when we get into questions.
Senator RUDMAN. We have a practice here before the permanent sub-
committee of swearing in all witnesses. Please rise and raise your right
hand.
Do you swear the testimony you are about to give in the course of
this hearing shall be the truth, the whole truth, and nothing but the
truth, so help you God?
Mr. BRADY. I do.
TESTIMONY OF LAWRENCE J. BRADY, ASSISTANT SECRETARY OF
COMMERCE FOR TRADE ADMINISTRATION, U.S. DEPARTMENT OF
COMMERCE
Senator RUDMAN. Mr. Brady, your entire statement will be put in
the record, and you may summarize it or handle it in any way you are
comfortable with it.1
Mr. BRADY. Mr. Chairman, I would like the written statement I
have provided the subcommittee to be inserted in the record. I would
like to summarize the statement which I think puts this entire problem
into focus.
First, I would like to commend the subcommittee for the work it has
done in this area. I think one of the problems we have in dealing with
the whole technology transfer problem is one of public awareness.
And although we have some reservations about some aspect about the
minority staff report, these hearings certainly will have the result of
focusing the public's attention, the business community's attention
on the problem. And I think that is a very positive step.
[At this point Senator Roth entered the hearing room.]
3 See p. 596 for the prepared statement of Lawrence J. Brady.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
263
Mr. BRADY. Mr. Chairman, it is a privilege for me to be here again.
I have testified before this subcommittee previously. As a matter of
fact, it is 3 years ago this month that I testified over on the House
side before the House Armed Services Committee in which I dis-
agreed with the political appointees of the Carter administration and
inicated that the technology which we were licensing to the Soviet
Union, specifically for the Kama River plant, was being diverted to
the Soviet military. It is 10 years ago this month that the President
of the United States inaugurated the era of detente with a trip to
Moscow.
A central component of that historic trip was the hope that greatly
expanded trade ties between the East and the West would lead to
mutual cooperation and understanding.
Obviously, those hopes have not taken place. In that 10-year period,
as we in the administration have indicated in the last year, we have
been exploited both legally and illegally by the Soviet Union and
Eastern Europe. This technology which has helped the Soviets im-
mensely in their military-industrial infrastructure. Again, 3 years
ago, I personally disclosed the failures of the Commerce Department
in the licensing process, referring to it, as I said in my testimony, as
a shambles.
It is only now that as a nation we are beginning to understand the
extent of these technology transfers during the past decade. Stopping
the extensive acquisition by the Soviets of sensitive, dual-use West-
ern technology in the ways that are both effective and appropriate
in our open society is one of the most complex and urgent issues facing
all of us.
Moreover, Mr. Chairman, only now are we beginning to recognize
that the technology transfer issue is much more than simply an
enforcement problem. Apart from strengthening enforcement, in
order to deal successfully with the increasing Soviet effort to acquire
advanced Western technology, we need to do a number of things.
First, we need to understand what technology the Soviets need;
how such acquisition has helped the Soviet Union achieve its goal of
military superiority and what methods the U.S.S.R. is using to obtain
it; second, on a multilateral basis, we need to marshall the support
and the commitment of our allies to prevent further technology leak-
age to the Soviet Union by Western concerns and by -U.S. subsidiaries
and licensees operating abroad; third, we must build up our counter-
intelligence efforts to counteract the Soviet intelligence organization;
fourth, we must work closely with industry segments involved in the
development and production of high technology to assess ways of re-
tarding the growing industrial security problem; and examine all pos-
4ble avenues for identifying and protecting defense-sensitive tech-
nologies, including technical documents which are not now subject to
our classification system.
Strategically, we need to recognize that the U.S.S.R. is far more
powerful militarily than the nation we faced at the end of World
War II, when these controls were first put in place, and it is far more
capable of procuring and applying our latest technological advances.
However, we in the administration, within the last year, could not
take adequate protective action until we accurately assessed the na-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
263
Mr. BRADY. Mr. Chairman, it is a privilege for me to be here again.
I have testified before this subcommittee previously. As a matter of
fact, it is 3 years ago this month that I testified over on the House
side before the House Armed Services Committee in which I dis-
agreed with the political appointees of the Carter administration and
inicated that the technology which we were licensing to the Soviet
Union, specifically for the Kama River plant, was being diverted to
the Soviet military. It is 10 years ago this month that the President
of the United States inaugurated the era of detente with a trip to
Moscow.
A central component of that historic trip was the hope that greatly
expanded trade ties between the East and the West would lead to
mutual cooperation and understanding.
Obviously, those hopes have not taken place. In that 10-year period,
as we in the administration have indicated in the last year, we have
been exploited both legally and illegally by the Soviet Union and
Eastern Europe. This technology which has helped the Soviets im-
mensely in their military-industrial infrastructure. Again, 3 years
ago, I personally disclosed the failures of the Commerce Department
in the licensing process, referring to it, as I said in my testimony, as
a shambles.
It is only now that as a nation we are beginning to understand the
extent of these technology transfers during the past decade. Stopping
the extensive acquisition by the Soviets of sensitive, dual-use West-
ern technology in the ways that are both effective and appropriate
in our open society is one of the most complex and urgent issues facing
all of us.
Moreover, Mr. Chairman, only now are we beginning to recognize
that the technology transfer issue is much more than simply an
enforcement problem. Apart from strengthening enforcement, in
order to deal successfully with the increasing Soviet effort to acquire
advanced Western technology, we need to do a number of things.
First, we need to understand what technology the Soviets need;
how such acquisition has helped the Soviet Union achieve its goal of
military superiority and what methods the U.S.S.R. is using to obtain
it; second, on a multilateral basis, we need to marshall the support
and the commitment of our allies to prevent further technology leak-
age to the Soviet Union by Western concerns and by -U.S. subsidiaries
and licensees operating abroad; third, we must build up our counter-
intelligence efforts to counteract the Soviet intelligence organization;
fourth, we must work closely with industry segments involved in the
development and production of high technology to assess ways of re-
tarding the growing industrial security problem; and examine all pos-
4ble avenues for identifying and protecting defense-sensitive tech-
nologies, including technical documents which are not now subject to
our classification system.
Strategically, we need to recognize that the U.S.S.R. is far more
powerful militarily than the nation we faced at the end of World
War II, when these controls were first put in place, and it is far more
capable of procuring and applying our latest technological advances.
However, we in the administration, within the last year, could not
take adequate protective action until we accurately assessed the na-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
266,
We recognize the magnitude of the whole technology transfer prob-
lem and pertinent Federal agencies are working closely with the intel-
ligence community and industry.
Since the major Dart of the technology transfer problem is interna-
tional, we turned our attention to that aspect first. We examined the
effectiveness of the multilateral controls because of the technological
advances archieved in Communist countries: It was evident that
Cocom had become obsolete. This administration concluded that while
Cocom prevented many sensitive exports which would have contrib-
uted significantly to the military capabilities of countries, such as
sophisticated computers, it was still far from being totally effective.
We identified the major reasons for this. One the limited scope and
concept of the control list. Weaknesses in the multilateral enforcement,
the availability of goods from non-Cocom countries and inconsistencies
in licensing procedures among Cocom member countries.
Having identified these problem areas, President Reagan, at the
Ottawa Summit in 1981, made a personal appeal to the leaders of Eu-
rope, Canada and Japan to join with us to tighten export controls and
prevent illegal. exports.
As a result, the Cocom high-level meeting, the first, in 25 years, took
place in January of this year. Commerce played a key role both at that
meeting and in serving as a central agency for the preparation of the
materials for the U.S. delegation.
We are now actively following up on the political commitment
achieved among the allies at that meeting. Several bilateral meetings
have been held to discuss specific technical proposals. In addition, a
Cocom subcommittee meetincr6 will be held in Paris soon to review ways
of improving the enforcement on a multilateral basis based on the com-
mitments we received in January and based on the work done since
then.
On another equally critical front, we have been actively engaged in
bilateral discussions with our European allies to discuss the need to re-
strict Government-subsidized credits.
The Western countries have been pursuing a policy of competing
among themselves, to provide efficiently subsidized or guaranteed cred-
its to the U.S.S.R. These were going into a country that would other-
wise at least be required to pay commercial or above commercial rates
for credits.
These concessional credits shield the U.S.S.R. from the realities of
the marketplace and allow them to pursue their military buildup. An-
other bilateral mission headed by Under Secretary Buckley is sched-
uled for next week to pursue further negotiations on this topic.
Also, another technology transfer issue this administration is con-
cerned about is preventing the dissemination of sensitive, technical
data and know-how through academic institutions.
Since 1971, the number of academic exchanges between the United
States and the Soviet bloc countries quickly multiplied. On close ex-
amination of these agreements, it is this administration's view that ex-
changes we have had with the U.S.S.R. and its satellites have not in
the main been reciprocal. Rather, it is apparent the Soviets exploited
scientific exchanges as well as a variety of other means in a highly
orchestrated, centrally directed effort aimed at gathering the technical
information required to enhance military posture. In the area of schol-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
266
any exchanges, for example, the United States sends young masters
and doctoral students to study the humanities. On the other hand, the
Soviets send the equivalent of a Ph. D. to study the hard sciences.
In recognition of the serious technological drain occurring in the
academic arena, Commerce is clarifying the technical data regula-
tions to provide our scientific and academic communities with better
guidance and export responsibility in this area.
We are currently reviewing this issue with other agencies, including
the Departments of Defense, Justice, and State, to be sure the balance
between important constitutional freedoms and legitimate national
security interests is maintained.
In order to control technology transfers, this administration has
further identified the critical need for Commerce to have available
information and technological capabilities in both the free world and
the Communist countries.
Acting on the recommendation of three independent contractors to
establish within the Office of Export Administration a data base in
order to assess foreign availability in conformity with the Export
Administration Act of 1979, Commerce is in the process of developing
research and analytical capability within OEA under a foreign tech-
nical assessment center.
In addition to analyzing foreign availability within a free world, we
are also strengthening our capability to assess Communist-held tech-
nologies through the increased support in the intelligence community.
On the enforcement side, I have established a soecial analytical unit
within the Office of Export Administrition, which is staffed by both
Customs and Commerce employees. This special unit has developed an
innovative intelligence approach that relates the application of export
licenses and analysis techniques to Commerce's license application
files.
The analyses produced to date have been outstanding in identifying
firms engaged in diverting critical technology to the Soviet Union
and in pinpointing new diversion routes.
This intelligence is also being used to develop profiles for the
Exodus inspection teams, and as a basis for major criminal investi-
gations of Soviet diversions.
Our joint efforts with customs in this area have been described by
other law enforcement officials as one of the most cooperative and pro-
ductive relationships that they have witnessed in recent years.
Let me say, Mr. Chairman, that this partnership, which is an invalu-
able step for the enhanced enforcement efforts, resulted in large part
from the enthusiastic backing of Commissioner Von Raab. The con-
tinued support for this cooperative relationship between Customs and
Commerce will lay a cornerstone for future enforcement with the in-
telligence community as a whole. Customs has upgraded the inspection
effort, and I am pleased to announce today a real organizational re-
alinement and enhancement of the Compliance Division. The division
itself is being elevated to the Office status. and together with the Office
of Anti-Boycott Compliance, will comprise a new export enforcement
organization in the Department of Commerce that will be headed by
a Deputy Assistant Secretary reporting directly to me. The candidate
we have selected for that post, Ted WU, is currently an assistant U.S.
attorney for the central district of California. He is a celebrated ex-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
267
pert in the law enforcement community. His successful prosecutions
of two of this country's most notorious export diversion cases render
him highly qualified for this considerable undertaking.
Mr. Chairman, Mr. Wu has accepted this position because he knows
we are strongly committed to enhancing Commerce's enforcement
effort. Among the many changes Mr. Wu will oversee in the enhance-
ment of the Compliance Office will be the creation of an in-house
training program for our agents. This training program will feature
not only instruction of conventional law enforcement such as surveil-
lance techniques, but will also include development of skills associated
with the carrying of weapons, arrest, and seizure search capabilities.
We look forward to the near future when we will have an enforcement
office operating at maximum efficiency with no shortages of manpower
and resources.
might interject, Mr. Chairman, at this point, both Secretary Bald-
rige and Under Secretary Olmer have indicated a thorough commit-
ment to support whatever manpower resources are necessary to do
the job.
I anticipate, Mr. Chairman, that once Mr. Wu has taken office, he
will be happy to report to you on the achievements of Commerce's new
Enforcement Office.
In sum, I believe that we have a sensible, ambitious program to up-
grade and rehabilitate our enforcement responsibilities mandated by
the Export Administration Act.
Our Enforcement Office will remain what it should be, a lean, effi-
cient organization with no other continuing mission than the enforce-
ment of the Export Administration Act. It will be well coordinated
with the intelligence community and other enforcement agencies such
as the FBI and customs; it will also be able to utilize the invaluable
benefits of Commerce's close relationship with the business sector.
Mr. Chairman, Senators, I will be happy to answer your questions.
Chairman ROTH [presiding]. Thank you, Mr. Brady.
Mr. Brady, the members of the subcommittee are, of course, aware
of your personal commitment to this important area but I believe it is
important that the record reflect fully your position on the specific
question of export technology and particularly reference the efforts
some years ago to help the Soviet Union construct some trucking
facilities.
Would you, for the purposes of the record, explain your role in this
matter ?
Mr. BRADY. Mr. Chairman, about 3 years ago, the Export Adminis-
tration Act was up for review for extension. As part of that review,
the House Armed Services Committee decided that it was going to hold
hearings on that extension, in addition to the committee of appropriate
jurisdiction, namely, the Foreign Affairs Committee on the House side.
There were some statements being made on both sides in Congress
that were not totally consistent with the facts. We had intelligence in-
formation that trucks were being produced at the Kama River plant
for the Soviet military and, in fact, being distributed to Eastern
Europe for use in East European endeavors.
An administration witness was asked about that and denied it. I was
asked about it and confirmed it. And, as a result of that. I was labeled
whistleblower and eventually left the Department of Commerce.
Approvedi FOr"Release- 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
268
In point of fact, that was the tip of the iceberg. There had been
apparently intelligence through the 1970's, particularly the latter half
of the seventies, indicating that there was substantial diversion taking
place. I think some of the hearings this committee held in 1980 and
some of the hearings Senator Byrd held in another committee indicated
that, for some reason, that intelligence just didn't get to the top.
So that was my role. I eventually had to leave Government for it.
Senator Nuxx. In February 1980, you recommended the creation of
an Office of Strategic Trade to both license high technology exports but
also provide the compliance function. Do you still believe that such an
office should be created?
Mr. BRADY. I think I would like to make two points, Mr. Chairman.
One, I strongly believe that there must be an enforcement arm with
the licensing function, associated with the licensing function. It should
not duplicate Customs, it should not duplicate the FBI. There must be
a lean, efficient organization that coordinates the intelligence informa-
tion procured from the agencies with the day-to-day impact, commu-
nications, dialog, that the Department or the licensing function has
with the business community. They must be together.
Now, specifically with regard to where that entire function should
be lodged. In 1980, the Carter administration, an administration that,
although some individuals had indicated very serious concern with
technology licensing, such as Dr. Brzezinski and his military attache,
General Odem, as concerned as it should have been with the technology
transfer issue and, to a certain extent, the President's directives were
not being implemented. It is actually in that cross fire that I got in-
volved. So I felt in 1980 that this function could not be administered
by the Department of Commerce, because it was unwilling to give it the
attention and the resources that it needed.
When I took the job I now have, I had a lengthy conversation with
Senator Garn, whose proposal this is. And I promised him that I would
try to run Trade Administration, my office, which is fairly newly
created because we are not now a part of the trade promotion arm
of Commerce, as an Office of Strategic Trade. I think we have done a
pretty good job at doing that.
The only concern that one can still express is not toward the licens-
ing function although, and I accept the criticism made of the Com-
pliance Division. I do not believe that it has been as effective as it
might. Its agents are not as well trained as they should be and I
accept some of what I call the micro-criticism in the staff report. But
I do not believe the trade promotion arm impedes the enforcement. I
do not think that is the problem. I think the problem that we have got
to look at is strategic trade, or the use of the economic power of this
Nation, what has been referred to as the wealth of the Nation. Is it
being factored into the foreign policy process in a manner where. it
becomes as strong a factor as it might in trying to direct the policies
of this Nation vis-a-vis a certain project or a certain policy. I think
that may still be a legitimate criticism. I think we have done a good
job in pivoting, so to speak, what some people would incorrectly call
the elements of economic warfare, for instance, in the foreign policy
structure.
Chairman ROTH. I am sure my colleague. Senator Nunn, will want to
get into it in greater depth, but I am not sure I fully understand why
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
269
policymaking and compliance should be joined together. It seems to me
organizationally you can make a pretty strong argument that it is
better to keep them apart.
One of the problems, it seems to me, is that we go up the hill and
down on this matter of exports depending on the mood, and philosophy
of the Nation at the moment. .A.s a strong believer in trade, I think we
have got to do everything we can to expedite it, but obviously not at
the cost of security risks. Doesn't it make sense to keep compliance sep-
arate as you wrestle with some of these other philosophical and policy
matters?
Mr. BRADY. Mr. Chairman, no I don't agree with that. I don't think
these ideas are philosophical. We have in the last year, immediately
upon taking office, instituted a number of senior interagency groups
that resulted in new policy directions by the President of the United
States with regard to the licensing of high-technology products. We
implemented that and are in the process of implementing that both
domestically and internationally through negotiation with our Cocom
partners.
I would point out that the list of controlled commodities to the Com-
munist world is sophisticated and lengthy. One computer requires a
license and another does not.
The committee states that Customs can easily implement or rather
enforce the munitions regulations. I don't believe that Customs can
enforce dual-use regulations because our list is much longer and more
sophisticated. Military weapons are easily defined and there are fewer
cases in this area.
Our licensing personnel are intimately involved and will have to be
regardless of where the enforcement arm is. This is one very strong
reason to keep it where it is.
Furthermore, the dialog that to a certain extent already exists and
will exist to a much greater extent between the licensing officials and
the business community and the enforcement personnel is the means by
which we get many of our intelligence leads.
As a matter of fact, the major cases we have had in this area have not
been as a result of inspection at the ports. All the major cases that we
have prosecuted in the export control area, both we and Customs, have
been the result of intelligence leads brought up by the business
community.
Furthermore, Commerce has an extensive apparatus both interna-
tionally and domestically of field offices and those field offices are out
impressing upon the business community the requirements of licens-
ing with regard to particular commodities. As a matter of fact, so
much of the field offices time is being devoted to what we a1l the
licensing or enforcement problem, my colleague has asked me to
reimburse him for the people being taken away from the trade negotia-
tions functions.
Chairman ROTH. A final question. I would like to congratulate you
on hiring Assistant U.S. Attorney Ted Wu. He is well known by my
i
staff. He s indeed an excellent choice. Could you elaborate on what his
duties will be?
Mr. BRADY. Mr. Chairman, he is going to be setting up a new
enforcement mechanism in the Department as a Deputy Assistant
Secretary reporting directly to me. That will be composed of two
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
270
units, the Anti-Boycott Compliance as well as the Export Adminis-
tration Act provisions regarding export controls.
Furthermore, we will take the Export Control Office that we have
today and change it drastically. I believe, and Ted agrees, that it is
silly to have 4 or 5 inspectors at a couple of the ports when Customs has
200 and they are much more able than we to do the inspection Junction
and, therefore, we will most probably be abolishing the inspection func-
tion in the Department.
Our objective is to get a highly professional white-collar crime outfit
working with the intelligence agencies and all those from whom we get
leads to pursue in the best way we can with the FBI the illegal acquisi-
tion in the United States. I think we can do that and do it well.
Chairman ROTH. Thank you, Mr. Brady.
Senator Nunn?
Senator NuNN-. Thank you, Mr. Chairman.
Mr. Brady, you mentioned that a good many of your intelligence
referrals and I assume your other referrals to the Justice Department
grew out of a coordination between your Licensing Division and your
Enforcement or Compliance Division, is that right?
Mr. BRADY. I said that the dialog was a necessary one in a number of
things. One, impressing upon the business community what is con-
trolled, how the Soviets are operating and yes, we do get some leads
back from the business community, very definitely, as to where com-
modities are in the Soviet Union. Very often, where a competitor's
commodity has been exported to, with certain indications as to who
may have exported it. So to that extent we do get leads.
Senator NuNisr. How many crimi:nal cases has Commerce worked on
in the last 12 months?
Mr. BRADY. I think for fiscal year 1982, there are four criminal cases
that have been referred to Justice.
Senator NuNN. How many?
Mr. BRADY. Four.
Senator Ntric.r. For fiscal year 1982, the whole year.
Mr. BRADY. I believe that, that's right.
Senator N1TNN. The FBI was not familiar with any.
Mr. BRADY. Mr. Chairman, the FBI wouldn't necessarily be. They
are in the espionage business, they are not in the export control area.
Senator NT:rim You did all the investigative work and referred to
Justice for prosecution.
Mr. BRADY. I am sure we had help in the investigative work but it
would be referred to?
Senator No-NN. Who did you have help from?
Mr. BRADY. I am sure it, was Customs. I have to go over each specific
case but I am positive that we got help, and I don't think there is any-
thing wrong in that.
Senator NuNN. I don't either. The question is, what are you really
doing in the Compliance Division, that is the question we are going to
be coming back to over and over again in the course of my question-
ing this morning. Are you familiar with the DeGeyter case?
Mr. BRADY. Yes. I am. sir. Somewhat.
Senator NuNN. Was that a Commerce Department case?
Mr. BRADY. No, sir, it was not.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
271
Senator Ntricx. In the Compliance Division report, didn't they claim
that was a Commerce Department case?
Mr. BRADY. Mr. Chairman, it is my understanding that the law re-
quires the Export Administration Act to report the cases that have
been prosecuted under that act and that is why that was included in
the report.
Senator NUNN. We can get the exact language of that report but it
was very misleading, I think, in terms of reporting to Congress. When
was that report made, do you know?
Mr. BRADY. Fiscal 1980.
Senator NUNN. Fiscal 1980. Let me just go over a few of these. As I
understand it, you are saying the subcommittee staff investigation is
useful as a historic document, is that right?
Mr. BRADY. I say, Mr. Chairman that the document does not reflect
certainly what we have done in the administration. Let me be fairly
candid. I think one of the problems that I personally have with the
report is that it tends to equate the enforcement of the Export Ad-
ministration Act, particularly the Commerce Department function,
with technology leakage generally, and that is inappropriate, because
the problem is much, much greater than that. It is industrial espio-
nage, it is counterintelligence, it is scientific exchange agreement,
everything I have discussed already.
Senator NUNN. Our hearings have covered the whole scope of all
of that. As you well know, the staff report centered on some criticism
with the Commerce Department and the Compliance Division, but that
doesn't in anyway imply the subcommittee hadn't looked at the broad
scope. If you review the testimony of the witnesses we had, most of
our time has been spent in areas that don't directly involve the Com-
merce Department.
Mr. BRADY. I have accepted some of the criticisms of the Compli-
ance Division.
Senator NuNN. You call them microcriticisms and historically use-
ful. Let me just pursue "the historically useful" for a minute. Does
that mean you are here today saying you have corrected these historic
observations by the staff?
Mr. BRADY. I think we have corrected some of them. I think the
analytical unit that we have created goes a way to correcting some of
that. I think the fact that we are creating a Deputy Assistant Secre-
tary, something we have been working on for months, is going to solve
some of our problems.
As we go through and reshape and rehabilitate the division, reorga-
nize it, I think there is no question?
Senator Nurnsr. How much of this is in the future as to what you
intend to do and how much of it have you already done? Let's just
take each item now. Tell me what has been accomplished so far today
as opposed to what you plan to do? We have an awful lot of plans
when we have a hearing and that is one of the purposes of a hearing,
I think that is useful.
Mr. BRADY. I agree.
,Senator NUNN. I have never had a hearing on any criticism of any
agency where they didn't have plans to correct every item that had
been identified. When you have another hearing a year later you find
out it hasn't been done.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
272
Let's just talk about what has been done now so we can really dis-
tinguish what is historic and what is actual.
Mr. BRADY. Senator, before I go to the specifics, let me make a point
that I mentioned in my prepared remarks: We could not move to
rehabilitate the Division before we had an assessment of what has
happened. That is, what are the Soviets doing, how are they operating,
what, are they targeting. We didn't have that, but we do now. We have
addressed the international aspects of the enforcement. There are five
major agenda items that we will discuss with our allies on Monday.
So it is not only the Compliance Division. That is the point I am
trying to point out in terms of what we have done over the last year.
Senator NUNN. I understand.
Mr. BRADY. Let Inc go specifically to the division.
Senator N uNN. Let me ask you this; do you have to have all of that
before you can determine whether the Compliance Division officials
have proper law enforcement training? It seems to me no matter what
the Soviets have acquired, no matter what the record shows, you are
going to need a group of people with adequate enforcement training
there, would you not?
Mr. BRADY. You are right, Senator.
Senator .NuNN. Do you have people with adequate enforcement
training?
Mr. BRADY. We have some.
Senator NUNN. How many?
Mr. BRADY. I can't answer that because that is a judgment call. If
you look at some of the background. of the agents
Senator NUNN. Your judgment would be the only one we have. How
many people do you have that you think really have adequate law
enforcement experience?
Mr. BRADY. Mr. Chairman, I can't answer that in specific terms. I
can tell you that we were aware, and I was aware obviously before
1 came back to Washington, of the problems in the enforcement area.
I called it a shambles. I was aware of it.
Senator NUNN. What do you call it right now?
Mr. BRADY. Let me--
Senator NUNN. What do you call it right now?
Mr. BRADY. It is in the process of getting new life, let me put it
that way. Let me give you an example, for instance, on how to reshape
the division. I could not have made a decision on that before Customs
decided to put 200 people in the field to do its inspection, and they
did that a few months ago. Now based on that action, and I hope that
it is a permanent action, I don't need those four or five people and
the field people in New York doing inspection. I think it duplicative.
We can take those four or five positions and use them for better
purposes. I have got to be careful in public testimony because the
personnel process we will go through in the next few months is going
to reveal many problems in terms of actions taken to reshape the
division, but that is simply one of the examples that delayed us in
refashioning the organization itself.
Senator NUNN. SO the organization hasn't been refashioned then;
it is in the process?
Mr. BRADY. Well, no, I believe the order has been signed creating
the Deputy Assistant Secretary. Ted Wu will be on board within 4 or
5 weeks as soon as he winds up on the west coast.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
27R
Senator Nurric. How do you deduct from that that the staff report is
historic?
Mr. BRADY. Senator?
Senator Nu/six. It seems to me everything you are saying is none of
these changes has been made, that they are all in the process. So how
do you conclude the staff report is historic when almost all the correc-
tions you have identified are all perspective in nature?
Mr. BRADY. Senator, what I am saying is?
Senator NuNN. You were a candid witness whe,n you were the
whistleblower. Now you are here and it seems to me you have to
maintain that same degree of candor. If you are going to correct these
problems, I think you ought to just candidly say so but to come here
and identify all the things you plan to do and then call the staff
report historic implying you have already made those changes, seems
to me is not in keeping with your past record of candor.
Mr. BRADY. Senator, some of the changes have been made.
Senator Nurrisr. Tell us what has been done?
Mr. BRADY. The analytical unit working with Customs is working
well and it has been working well for a couple of months. It is a major
addition to the enforcement apparatus in this area. The Deputy As-
sistant Secretary position has been created and an individual has been
selected and he will be on board within 4 to 5 weeks as soon as he
can sever his relationship with the Department of Justice.
Senator NuNN. He is not there yet?
Mr. BRADY. That's right.
Senator NUNN. All right.
Mr. BRADY. Third, there have been some major efforts made in the
field offices of the United States Commercial Service of the Depart-
ment of Commerce, to educate the business community as to what the
Soviets are acquiring in the United States and how they are working.
Now that program is not complete.
Senator NuNN. Every witness we had said they never even heard
from the Commerce Department on that. In fact, the amazing thing
is that Commerce is the agency that is supposed to have the liaison
with the business communities. Yet we can't find any witness who has
had a dialog with them on that subject.
We had a lot of witnesses, they talked to the FBI, Defense, but they
haven't heard from Commerce. Maybe you can detail for us what you
have done in communicating with the you
community.
Mr. BRADY. I will be happy to and it goes, Senator, from writing
to all exporters in the particular industry sector to alert them to the
fact that there is a procurement effort under way, to staaing major
conferences in various areas of the country. Ted Wu himself has
addressed. I know. at least two major conferences on the west coast.
Senator NuNN. Is he on your payroll now?
Mr. BRADY. No, but he did it because I couldn't go.
[At this point, Chairman Roth withdrew from the hearing room.1
Mr. BRADY. I specifically remembered those conferences and we had
some across this country. I personally have traveled across this country
dealing with the field offices to impress upon them the need to become
more involved in the diversion problem and they have been. The criti-
cism I have with the report is. I believe, it does not point out what we
have done internationally. It is very relevant to the Compliance Divi-
sion. The enforcement apparatus must be international if it is going to
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
274
be any good. And that is where the large part of the problem lies.
And so I think we have moved in the last year, as I said, systematically
and quite aggressively in dealing with the problem.
And the problem is not only enforcement but it is also licensing.
We have cleaned up a backlog of 2,000 export license applications that
we inherited from the previous administration. We have the process
functioning, the interagency process functioning so we get decisions
on cases and on issues.
Senator NUNN. Have you cleaned up the backlog in the investiga-
tions and intelligence branches?
Mr. BRADY. No; we have not.
Senator NUNN. That was one of the criticisms. Is that historic?
Mr. BRADY. It is a legitimate criticism, yes, sir.
Senator NUNN. Have you really revised your whole law enforcement
training? Do you have people on board now who are capable in the
law enforcement area?
Mr. BRADY. There are announcements out for 15 positions that we
intend to put on the west coast-14 positions I guess it is?in which
we are recruiting for those jobs.
Senator NUNN. But you are not satisfied with what you have got on
board now?
Mr. BRADY. Absolutely not.
Senator NUNN. That is not a historic observation then?
Mr. BRADY. Well, it is in a sense, Mr. Chairman. I would have liked
the opportunity or another policy level official at Commerce, would
have liked the opportunity to comment on the report and to indicate
what we were doing and what we have done and, again, I want to stress
the fact that the Compliance Division specifically is one small part of
the overall enforcement apparatus that this Government directed to
this problem.
Senator NUNN. Mr. Brady, you don't have to convince us of that.
I have been in these 'hearings 5 years on the subiect. We know that, we
know you are not the only one. We don't put all the blame and efforts
on the Commerce Department. We are just simply looking as to
whether it makes sense for the Commerce Department to have a Com-
pliance. Division with a few people on board most of whom don't have
law enforcement experience, when you have a whole agency out there
that is trained in this area. That is the question. You can broaden it
and you are correct in broadening it. it is a much bigger question than
this. This is only one aspect of our whole hearing.
You mentioned that the Inspector General of the Commerce De-
partment has conducted a review of the Compliance Division whose
findings and recommendations will be published later this month; is
that correct?
Mr. BRADY. I believe so.
Senator Nuimt. Have you seen these recommendations yet?
Mr. BRADY. No, I have not.
Senator NuNN. Do you know the Inspector General?
Mr. BRADY. Yes, I do.
Senator NUNN. Have confidence in him?
Mr. BRADY. Yes, I do.
Senator NUNN. Do you think he has a broad perspective?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
275
Mr. BRADY. He is Inspector General. I think it is important that all
factors be put into any assessment of the enforcement arm and that
means the licensing function as well. And I know I may not be stating
this very well, but in this dual use area, you are not dealing with a
tank or an aircraft. You are dealing with a computer that may require
a license or may not. The licensing officer very often has to work very
closely with an investigator in determining whether or not a particu-
lar shipment is illegal, whether blueprints that may be exported require
a license or not.
Senator NUNN. You say you have not seen the Inspector General's
report?
Mr. BRADY. No, I have not. I have a feeling I know what he is going
to recommend.
Senator NUNN. It is our information that that Inspector General
reported started on April 19,1982, less than a month ago.
Is that consistent with your information?
Mr. BRADY. I believe that is correct.
Senator Nurrisr. We understand it was formally concluded on May
11, that is yesterday.
Mr. BRADY. That is not my understanding.
Senator NuNist. Well, in any event, the Inspector General's report
is not historic, is it, it would be rather current.
Mr. BRADY. I would hope that it would reflect the progress that we
have made, yes.
Senator NUNN. It should reflect the progress you have made?
Mr. BRADY. That's right.
Senator NUNN. We have been informed that that report will verify
all the findings, virtually all the findings of our staff. And that report
has taken place in the last 30 days. So once you read the report, we
would like for you to tell us whether that, too, is historic.
Mr. BRADY. I will be glad to, Senator. But I also think, or I would
hope, that the report would take into consideration, one, the broader
picture, and, second, the fact that we are well on our way to solving
the problems.2
Senator NUNN. You mean by the broader picture, you want the re-
port to center on the Department of Defense, Department of State,
Customs Agency.
Mr. BRADY. I want them to center on the fact it is we at the Depart-
ment of Commerce that asked the CIA to prepare this assessment, the
fact that we asked for it to be released because we have problems in
dealing with the business community.
We have problems in dealing with the press to elevate the level of
public consciousness. There are many people out there who still do
not believe that there is a problem. These are all part of an enforce-
ment apparatus.
Senator NUNN. I agree with that, Mr. Brady, but everything you
say, I grant everything you say is correct on that point but that doesn't
answer the question of whether you need a Compliance Di vision in the
Commerce Department.
2 The final inspection report of the Inspector General's Office. Department of Commerce,
regarding the Compliance Division was released to the Permanent Subcommittee on
Investigations on July 16, 1982. The report is reprinted in full beginning on p. 606.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
It doesn't answer the question .about whether you should continue
an operation that under several administrations has demonstrated very
vividly that it is not capable or it is not serious, one or the other, about
enforcing the law of the United States in this respect.
So you can broaden it all you want to and we will agree with every-
thing you say on that but that is irrelevant to the purposes of what we
are asking you, and that is whether the Compliance Division still
should be in the Commerce Department.
Mr. BRADY. Let me give you a statistic. You talk about seizures and
Customs seizures, 89 percent of the seizures made by Customs at the
ports of exit have to be returned because the items do not require a
license. That is the kind of fundamental basis that we hope to over-
come.
I accept the fact that our investigators are not well trained or the
bulk of them are not well trained in law enforcement but I think there
is a compensating factor in some cases that they do have knowledge of
the licensing system and they do have knowledge of the technological
requirements involved in the licensing process. And so I am not using
that as an excuse for not having good trained officials, believe me.
But what I am saying is, the situation is not black and white.
Senator NuNN. You are going to have maybe another 40 percent and
if you add 40 percent to what you have got now, that will get you up to
59 persons and those 59 persons in the Compliance Division, it seems
to me, are woefully inadequate to have any hope of enforcing this law
unless they largely are in a position of liaison between licensing and
Customs.
You are going to have to use Customs and the FBI to do it and the
question is: Do we need a layer between licensing and Customs in order
to communicate?
It seems to me you can shift a few of these people who are trained
in law enforcement into the licensing division.
They are probably very good people in that respect and let them be
liaison with an enforcement mechanism that is already in place and
that has hundreds of agents around the country and around the world
and has intelligence connections in almost every country of the world.
It just seems to me your position about compliance is just not a
logical position.
Mr. BRADY. Senator, you asked me about the backlog of investigative
cases. The Customs Service has 9,000 backlogged investigation cases.
Now I don't understand----
Senator NuNN. In the export area?
Mr. BRADY. No; across the board. But I would also point out that
their priorities. shift on what the crises of the moment are.
I have been informed just in recent weeks that they cannot provide
me the information I need to monitor our steel monitoring mechanism,
basic steel imports pursuant to the steel trigger pricing mechanism we
have and the 75 dumping and countervailing cases we are prosecuting
beca=, of lack of resources. So I think there is a question of going
from the frying pan into the fire with regard to Customs.
What I am trying to say is the issue is not black and white and I
think that a bard core, high level, professional establishment at the
Department of Commerce working with the FBI, the CIA, and Cus-
toms is the best way to attack
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
277
Senator NuisTN. When can we expect that to occur? When can we
expect that high level, competent, professional group at Commerce to
be out there in the field enforcing the law?
What is the date that you are shooting for? Obviously you don't have
that now.
Mr. BRADY. That is right.
Senator NuNN. If you had it now we might not be asking these
questions.
Mr. BRADY. I think within 6 months we will have it.
Senator Nurusr. Six months from right now?
Mr. BRADY. That is right.
Senator RuratAN. We will stand in recess for the time it takes for
the chairman to get back here.
[Members of the subcommittee present at the time of recess: Sena-
tors Rudman and Nunn.]
[Brief recess.]
[Member of the subcommittee present after recess: Senator Roth.]
Chairman ROTH [presiding]. While we are waiting for the ogler
Senators to return, I believe the staff has some documents they want to
put into the record.
Ms. HILL. Thank you, Senator; yes, we do. I have three exhibits we
would like to have printed in the record. They are a signed and sworn
affidavit of John Rennish, special agent with the U.S. Customs Serv-
ice; a signed and sworn affidavit of Mike Dolphin, special agent with
the U.S. Customs Service; a signed and sworn statement of Charles L.
McLeod, special agent, U.S. Customs.
[The documents referred to was marked "Exhibit Nos. 29, 30, and
31," for reference and follows:]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
278
EXHIBIT NO. 29
Affidavit of John Rennish
I, John Rennish, an officer of the U. S. Customs Service headquarters in
Washington, D. C., make the following statement freely and voluntarily to Glenn
Fry, Ray Worsham and Fred Asselin, who have identified themselves to me as being
on the staff of the Senate Permanent Subcommittee on Investigations.
I am a Special Agent with the United States Customs Service. I am
assigned to the Customs Service headquarters in Washington, D. C. I have been a
Criminal Investigator with Customs for 15 years.
As a Criminal Investigator, I was assigned to the investigation of Manfred
Swarovski of Wattens, Austria in 1975. A member of a wealthy and influential
Austrian family, Swarovski, who was then about 34, owned and operated an optical
equipment business in Austria that specialized in manufacturing glass beads used in
reflection devices and paint for night vision purposes. The company was known as
M. Swarovski Ges. Mbh .3c Co. and was located in Amstetten, Austria. The
company's devices were used on highways in Europe and the United States.
Swarovski established two businesses in North America -- Swarolite of
Canada, Ltd., also known as Canasphere Industries Ltd., located in Moose Jaw,
Saskatchewan, Canada, and Swarolite, Inc., located in Columbia, Tennessee. In or
about 1974, Swarovski entered into all agreement with the Soviet Union to
construct a glass bead manufacturing plant in Russia.
In the spring of 1975, U. S. Customs agents were contacted by John Kiel,
president of Photo-Sonics, Inc., of Burbank, California. Kiel said that Swarolite of
Canada wanted to buy from Photo-Sonics a special gunsight camera, model KB25A,
used on the U. S. Air Force F-4 fighter aircraft. Kiel said the order for the camera
had been placed by Rod N. Parker, manager of Swarolite of Canada. Kiel said he
had informed Parker that he could not ship a camera to Canada. To make such a
shipment, Kiel said, would require a validated export license authorized by the U.S.
Department of State.
Kiel said he was bringing this matter to the attention of the Customs
Service because he suspected that Swarolite of Canada intended to ship the camera
from Canada to Austria. Kiel considered it very questionable that Swarolite of
Canada should want such a camera. He wondered what use Swarotite could make
of it. The gunsight camera could be modified so that it would have functions other
than its use on the F-4 fighter. However, even in a modified form, the camera
would still be an item controlled on the U. S. Munitions List and would require a
license for export. Moreover, the State Department did not want the camera
exported anywhere, not even to Canada.
Customs agents instructed Kiel to keep them informed of what Swarolite
of Canada did next. Shortly thereafter, Manfred Swarovski, through his Swarolite
of Canada company, requested that Photo-Sonics sell the camera but, instead of
shipping it to Canada, to send it to his plant in Columbia, Tennessee. Such a
shipment would not require an export license. Following the instructions of
Customs agents, Kiel agreed to ship the camera to Swarolite of Tennessee.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
279
With the assistance of U. S. Postal Inspectors, Customs agents monitored
the mailing of the camera. Rod Parker had indicated that the shipment would have
to arrive in Columbia, Tennessee, by a specific date.
Customs agents controlled the delivery of the package. The camera
package invoice and registered letter accompanying it were marked with these
declarations: "Above items are of U.S.A. origin and manufacture. Above
photographic equipment is under United States Department of State Munitions List
Category No. XIII (a), and as such must be export licensed by the U.S. Department
of State prior to export from the United States." A copy of the letter was also
packaged with the camera.
Customs agents conducted surveillance of the package as it was delivered
to the U.S. Post Office in Columbia, Tennessee. James Sproul, Swarolite manager
in Columbia, received the camera and delivered it to Swarovski, who was staying in
the Holiday Inn Motel at the outer city limits of Columbia.
Swarovski also was placed under surveillance by Customs agents. His
activities in Columbia seemed routine and included dining out and shopping. The
next day Swarovski was again under surveillance as he checked out of the Holiday
Inn Motel and boarded a flight to Chicago. From Chicago he flew to New York
City.
When Swarovski arrived in New York, I personally took full control of the
investigation and coordinated the surveillance activities concerning Manfred
Swarovski. Once in New York City, Swarovski checked into the Waldorf Astoria
Hotel. Customs agents, continuing their surveillance, took a room adjacent to his.
Swarovski spent the next two days in New York City. He seemed to be enjoying
himself considerably, shopping, dining out, frequenting several bars and
entertaining women friends in his room. In the midst of this round of activities,
Swarovski took steps to suggest he might be trying to alter his appearance. He
changed his manner of appearance frequently and began wearing dark glasses and
began styling his hair in a different manner. However, our surveillance went on
uninterrupted. Ultimately, 15 Customs agents were assigned to this detail.
Customs agents learned that Swarovski had reservations on a Lufthansa
flight from Kennedy International Airport to Frankfurt. He decided to leave on an
earlier Pan American flight for Munich. Swarovski checked out of the Waldorf
Astoria Hotel and went to the airport where he checked all his luggage through at
the Pan Am ticket counter. Swarovski then went to the predeparture lounge and
waited for his flight to be called.
Customs agents, operating under 22 U.S.C. 401(a), which gives them the
right to search luggage under these circumstances, went through his suitcases and
found the special gunsight camera among his belongings. Swarovski, who was
unaware that the search had taken place, was then approached by Customs Special
Agent Grattan and myself. In a routine manner, we questioned him as to whether
or not he was transporting anything of value in excess of $250.00 out of the
country. I asked, "Do you have anything that you are taking out of the U. S. that
requires a shipper's export declaration?" He was also asked if he had any
merchandise requiring a U.S. Department of State license. Swarovski said no to all
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
280
three questions. I placed Swarovski under arrest. He was read his rights and given
the Miranda warning in English and German. Customs agents also found several
business cards of Soviet officials on Swarovski's person.
The export violation occurred, according to the U. S. Districts Courts'
interpretation of the law, at that moment when Swarovski checked his luggage
through to Munich at the Pan Am ticket counter in the JFK Airport terminal. We
believed that Swarovski intended to take the camera into Austria and there have
his freight forwarder ship the camera to a destination in the Soviet Union. If we
could have had access to official shipping documents in Austria, we could have
tried to demonstrate that he planned to transfer the camera to the Soviet bloc.
Unfortunately, however, because U. S. Customs agents received very little
cooperation from the Austrian government, we were not able to document or
otherwise establish that Swarovski intended to ship the camera from Austria to the
Soviet bloc. Austria, a neutral country which shares borders with the Soviets bloc
nations of Hungary, Yugoslavia and Czechoslovakia, was not supportive of U. S.
Customs' investigative efforts.
Records of Swarolite of Canada were given to U. S. Customs by a
cooperating co-conspirator. These records revealed that on previous occasions
Swarovski had bought American high technology equipment with military
applications and sought to export it to an Austrian freight forwarder without the
proper licenses. However, once again because the Austrian government would not
provide assistance, the U. S. Customs Service was unable to document or otherwise
establish that these items were shipped to Soviet bloc nations. Further inquiry by
Customs indicated that Swarovski had tried but failed to buy from the National
Aeronautics and Space Administration a NASA moon-mapping lens.
There is no attempt provision in the current export control statutes.
Because of that, the violator can be apprehended only after he actually does the
act of exporting; in Swarovski's case, the act of violating the law occurred at the
moment he checked his luggage containing the gunsight camera through at the Pan
Am ticket counter. It was then that he presented his merchandise for export. This
requirement means that surveillance must be continuous on a suspect until that
moment when he violates the law. The cost of such surveillance can be prohibitive
if it goes on too long. Consider, for example, that instead of staying only two days
in New York City he had stayed two months or longer. At some point, Customs
might have been forced, because of financial considerations involving a 15-man
surveillance team, to curtail the inquiry and hope to detect him at the airport. But
any number of things can go wrong once the surveillance is stopped. Swarovski
could have rented a car and driven to Boston or Newark and flown abroad from
there. The slightest change in plans could have resulted in his escaping Customs
and successfully carrying the camera out of the U. S.
The lack of cooperation in the Swarovski inquiry from Austria was not
unique to this case. U. S. Customs receives poor cooperation from Austria in many
export violations. Another neutral European nation, Switzerland, does not make a
great effort to help in export violations in many cases.
U. S. Customs was fortunate to have had cooperation from the beginning
of the case from John Kiel, president of Photo-Sonics, Inc. Had Kiel not reported
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
281
to us when he did, Swarovski might have taken possession of the camera in Canada
and shipped it from there to Western Europe.
Customs agents enforcing export laws do not have the authority to arrest.
They can Investigate, search and seize but there is no statutory authority under the
export laws to arrest. Arrests can be made if they are in states where Customs
agents are deemed to be peace officers of that state. Customs agents have no
state peace officer certification in New York. Swarovski's arrest by Customs
agents was only one aspect of the inquiry that Swarovski's attorney challenged in
court.
The attorney, Richard H. Kuh, instituted suppression arguments and
appeals which lasted in court hearings for the next 26 months. Swarovski's search,
seizure and arrest were attacked. Ultimately, the suppression and appeals hearings
proved unsuccessful. But the arrest issue went all the way to the Supreme Court
where it was upheld as a citizen's arrest. His appeals exhausted, Swarovski pleaded
guilty and served a two-year prison term.
The judge in the trial, George C. Pratt of the U. S. District Court in the
Eastern District of New York, noted the difficulties U. S. Customs agents must
work under in export cases. Citing the fact that export laws give Customs agents
the right to seize and search in connection with munitions violations, but not to
arrest, Judge Pratt said:
The fault, if there be any, lies with Congress which has
failed to grant Customs officers statutory authority to make
arrests under the Munitions Control Act. Congress passed the
Act with broad powers of search and seizure, and commanded
the Secretary of the Treasury to enforce it. Congress did not,
however, take the additional step and grant to the Customs
agents specific statutory authority similar to that granted to
them to apprehend narcotics and revenue violators. As a result,
Customs agents are powerless to arrest on the scene those
persons who are caught in an attempt to illegally export under
the Munitions Control Act.
The lack of statutory authority to make an arrest described by Judge
Pratt is still a restriction that Customs agents must work under in export
violations.
I would like to append to this affidavit two exhibits:
1. Docket No. 75 CR 795, Memorandum and Order on
Suppression Motions, United States of America against Manfred
Swarovski, U. S. District Court, Eastern District of New York.
2. Docket No. 76-1556, United States Court of Appeals,
Second Circuit, United States of America v. Manfred
Swarovski, September term, 1976.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
282
I have read, reviewed and initialed each page of the foregoing statement,
and I swear to the best of my knowledge that it is true and correct.
:John pennish )
January '-2? , 1982
Sworn?apid/esubscribed to before me
,this day of January, I982
N o fa r y Public
My commis ion expires:
/
7
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
283
7,9CHIBIT NO, 30.
AFFIDAVIT
I, Michael Dolphin, a Special Agent with the U.S. Customs Service,
Baltimore, Maryland, make the following statement freely and voluntarily to
Glenn Fry and Jack Key of the Senate Permanent Subcommittee on Investigations.
I have been a Criminal Investigator with Customs for four and a half
years. I initiated the investigation of Werner R. Hilpert in July 1980.
Later on, I discovered the involvement of Rolf Peter Hems and Volker Nast.
Nast and Hernia, natives of West Germany, conspired to purchase a Microwave
Surveillance Receiver system and smuggle it out of the United States to
Hungary without obtaining a validated export license from the State Department,
Office of Munitions Control. Nast and Hems were assisted in their plan by
Werner Richard Hilpert of Princeton, New Jersey.
The Microwave Surveillance Receiver system, known as the model MSR-903,
is offered for sale by the Micro-Tel Corporation, 6310 Blair Hill Lane, Baltimore,
Maryland. Designed to receive, display, and analyze microwave signals, it is
primarily intended for, military and other surveillance uses. The MSR-903 has
been designated as a defense article by the President of the United States and
is also included on the United States Munitions List under Category XI(c).
For that reason, a special export license or written approval from the Department
of State is necessary to export the MSR-903. An applicant for such a license
is required to reveal the country of final destination, purpose of its use, and
the intended end-user of the equipment.
Customs learned that in June, 1980, Rolf Peter Henna wrote to Werner
Hilpert requesting him to place an order with Micro-Tel Corporation, Baltimore,
Maryland for a MSR-903. Soon thereafter, Hilpert contacted Micro-Tel and placed
the order. Micro-Tel advised Hilpert that he must apply for a license with the
State Department if he intended to export the MSR-903. In August, 1980 Hems
wired $12,000 to Hilpert for a down payment on the MSR-903. Hilpert subsequently
remitted a check to Micro-Tel for a $10,000 down payment. At this time, Micro-Tel
again advised Hilpert, in writing and orally, that a license was required for
export.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
1111111 ?
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
284
Hilpert passed that information to Harms about the export license.
Henna, after consultation with Nast, told Hilpert to go ahead with the purchase
but that an export license would not be obtained.
Before the delivery of the MSR-903 officials of Macro-Tel Corporation
once again advised Hilpert of the export license requirements.
Hilpert told the officials from Macro-Tel Corporation that the export
license would be obtained by someone else associated with the purchase.
It was arranged for the MSR to be picked up in Baltimore by Hilpert in
January 1981 after a motion activated beeper had been installed pursuant to a
Court Order, in the fiberglass suitcase used to transport the MSR-903. The MSR
weighs 78 pounds and is the size of a large suitcase. In January 1981, at the
time Hilpert was to receive the NSR, Customs established surveillance of his
residence, and Micro-Tel's location.
Hilpert's wife and Rolf Henna picked up the MSR at Macro-Tel and paid the
balance of the $47,000 purchase price. It was learned that Vblker Nast provided
part of the funds with which the MSR-903 was purchased. In particular, on
January 15, 1981, Nast purchased Bank America travelers Checks in the amount of
$39,000 in West Germany.
Special Agents of the U.S. Customs Service, with the aid of a Customs
helicopter, followed Mrs. Hilpert and Henna to Princeton, New Jersey to Hilpert's
residence. The Hilpc.rts and Hems spent that evening at Hilpert's residence.
The next morning Mrs. Hilpert and Henna placed a large package in their car and
drove to Mr. Hilpert's office. From the office they went to lunch and proceeded
to New York City. Hems left Mrs. Hilpert's vehicle in New York City with the
package and took a taxi to JFK Airport. Customs continued following Herms until
he checked all baggage with Pan American Airlines at JFK Airport. At that point
Customs agents arrested Hernia, advised him of his rights, and took custody of
the MSR-903 which had been checked in as baggage. After initially denying any
knowledge of the MSR, hex-ins admitted that he was sent by Volker Nast to pick
up the equipment.
From the time of the initial pick-up of the MSR-903 on January 19, 1931,
until Herms arrest the next day approximately eighteen (18) Customs personnel
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
285
were involved. Four separate Customs vehicles from Baltimore followed the
1 ilpert vehicle to the beginning of the New Jersey TUrnpike when surveillance
uas taken over by personnel from the Philadelphia Office. The vehicle was
followed to Hilpert's residence in Princeton, New Jersey, where other personnel
were manning a command post. A fixed video surveillance unit was installed
in the vicinity of Hilpert's residence to monitor the activities. Customs
personnel from Newark, New Jersey, had Mr. Hilpert under surveillance at his
place of employment and followed to his residence.
The surveillance was also aided by a helicopter which followed the
vehicle from Baltimore, Maryland, to Princeton, New Jersey, on January 19, 1981.
On the next day the helicopter followed Hems from Princeton, New Jersey, to
the vicinity of JFK Airport.
Mast is a fugitive from justice residing in West Germany. ,He was
previously involved in the illegal exportation of controlled commodities in
1976 with two U.S. businessmen, Gerald R. Starek and Carl E. Story of I. I.
Industries, Sunnyvale, California.
In the United States District Court in Brooklyn, New York, Rolf Peter
Hems pled guilty on February 27, 1981, to a charge of attempting to export
the MSR-903 without the required license. Mr. Hems was confined in the
Metropolitan Correctional Center in New York from his arrest on January 20,
1981 until his sentencing on May 11, 1981. Chief Judge Jack B. Weinstein,
United States District Court, Eastern District of New York, imposed the maximum
sentence of two years, which was suspended, and placed Hems on probation for
a period of five years. Hems was permitted to return to West Germany.
On May 26, 1981, Volker Nast was charged with a two-count indictment
in Baltimore, Maryland, for conspiracy in violation of Title 18, United States
Code, Section 371, and with aiding and abetting an attempt to violate the Arms
Export Control Act, in violation of Title 18, United States Code, Section 2,
and Title 22, United States Code, Section 2778.
Werner Hilpert pled guilty, pursuant to an agreement with the Government,
on 1,kly 1, 1981, in United States District Court in Baltimore, Maryland, to a
charge of aiding and abetting the attempt to export the MSR-903 from the United
States without the requisite license. He was subsequently sentenced on
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
286 ,
July 9, 1981, and placed on three (3) years probation and ordered to pay a
$10,000 fine. Under his plea agreement, Mr. Hilpert agreed to cooperate with
the Government and to provide any information within his knowledge concerning
the alleged conspiracy.
During the course of this investigation the Customs Attache in Bonn,
West Germany, also played an important role in following up on investigative
leads and responding to the =,e leads within a short period of time. When
the MSR-903 was picked up on January 19, 1981, the Customs Attache in Bonn
was notified and was prepared to coordinate a continued surveillance with
the West German authorities if this was required.
The Department of State Office of Munitions Control had to research
their records in order to determine that an export license had not been issued
for the MSR-903. During the investigation it became necessary to immediately
check the names of individuals and companies which became known. An up to
date review of all applications was necessary in order to be positive that an
export license was not submitted.
The Federal Bureau of Investigation was kept aware of developments in
this investigation and provided excellent cooperation to the U.S. Customs Service.
I have read, reviewed and initialed each page of the foregoing
statement, and I swear to the best of my knowledge that: it is true and
correct.
'1/7',4LAk 7.f5,'.111AL
Miaael Dolphin
April , 1982
hwotin sod subscribed to before me
this _Ls._ day of April, 1982.
)n.-
Nofzu- Public
My comission expires:
_July 31 11/86
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
287
EXHIBIT NO. 31
STATEMENT OF CHARLES L. McLEOD
Special Agent, U.S. Customs Service
For The
U. S. Senate Permanent Subcomrittee on Investigations
ky name is Charles L. McLeod and I am a Special Agent with the
U. S. Customs Service assigned to San Francisco, California. I have been
employed with the Customs Service for eleven years, ten as a criminal
investigator and one as a Customs Security Officer. I am a college graduate
with a B.S. degree in business administration from Babson College, Wellesley,
Massachusetts. I have, as a criminal investigator, attended U.S. Treasury
Department,Criminal Investigator School, Customs Basic School, Customs Fraud
Investigation School and White Collar Crime School. I am thirty-four years
of age:.
During my career as a criminal investigator, I have conducted and
participated in investigations involving smuggling, fraud, theft and violations
of export laws. In 1977, I was the recipient of the Treasury Secretary's Award
for the investigation I conducted of II Industries, an investigation I mill
discuss later in this statement.
I have been involved in export control cases since 1975. During a
period of three years between 1975 and 1978 I worked export control cases
exclusively. In 1980 I was assigned by Customs to set up a program in the
San Francisco office which was to be geared to work export violations that
involved the. Soviet Union or Soviet Bloc nations. The program was headed by
me with the assistance of John Bloom, a Customs Inspector. lifter two months
I concluded that no one agency appeared to have a good intelligence data base.
The FBI Ws willing to cooperate; however, it had no real in-depth information.
The State Department only had information relevant to export license applications.
It had no valuable intelligence data' that could be used ?to get a handle on
violations. There was no reservoir of information because there simply was not
but a handful of prior cases in which to refer. The intelligence community did
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
288
not .communicate, at least to my level, what the Soviets needed regarding
technology or what the Soviets considered a priority.
Customs has been mandated to enforce violations of the Arms Export
Control Act, which is administered by the State Department's Office of Munitions
Control. To this end I can say that Customs has received excellent support
from OMC. OMC has always expeditiously provided me whatever information I
requested during my investigations. To my knowledge and experience there has
been effective coordination and cooperation between Customs and OMC.
The Department of Commerce is mandated to enforce the Export
Administration Act. Customs has delegated jurisdiction to enforce this
statute; however, Customs has been effective and is capable of investigating
violations of both statutes. My personal opinion is that .export control
violations are an area which demand thorough attention and priority,
particularly those which have an impact on national security. It is a
relatively new investigative area that contains inherent problems that few
investtgators have confronted. I would like to relate to you one investigation
I conducted during 1975 and 1976 of II Industries and Kasper Instruments.
The II Industries case related to violations of the Export Administration
Act. Many of the investigative impediments I confronted during my
investigation still exist today.
I first: became involved in the II Industries case in July, 1975
when I assisted the Department of Commerce in a preliminary investigation
of II Industries and Kasper Instruments of Sunnyvale, California. During
March or April of 1975, Commerce received an allegation that certain semi-
conductor manufacturing equipment from II Industries and Kasper was
appearing in the Soviet Union. The equipment was being shipped via an
exporting company named Semi-Con of Mays Landing, New Jersey. Semi-Con
was run by Edward Breslin, a former U. S. military intelligence officer.
It was subsequently learned that Semi-Con was a creation of Richard Mueller,
a West German businessman, whom I will describe in more detail later in this
statement. Commerce's initial action was to telephone officials at II Indus-
tries and Kasper Instruments and inquire as to whether either firm had sold
equipment for use in the Soviet Union. Officials at Kasper admitted to
trading with Semi-Con but not with Mueller or the Soviets. II Industries
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
280
- indicated that they had not conducted business with any of the aforementioned
entities.
In July, 1975, three months later, Commerce sent one investigator to
the West Coast to interivew officials at II Industries and Kasper Instruments.
I and three other Customs agents and an Assistant United States Attorney assisted
Commerce with interviews. Examination of business records revealed that semi-
conductor manufacturing equipment originally destined for Semi-Con in New Jersey
was in fact to be shipped to USA Trade and Semitronics in Montereal, Canada.
Documentation for the equipment disclosed that although the electrical power
usage had been converted for European voltage standards, Canada was to be the
"end use destination. There were even invoices for charges of $175.00 per
unit for the conversion of the electrical systems.
Following the interviews and records examinations, Customs prepared a
report for Commerce concluding that illegal activity appeared probable. Customs
did not pprve:the investigation because, at this point in .time, its role was to
assist Commerce. In August, 1975, Commerce prepared a report which recapped the
activities of the preliminary investigation. The report had no indications of
further actions to be pursued, no conclusions, and no recommendations.
In September, 1975, the import/export manager of II Industries informed
Customs that II Industries and Kasper Instruments had in the past and were
presently exporting, through diversionary means, licensable semiconductor
manufacturing equipment that was ultimately intended for end use in the Soviet
Union. Customs learned that ,Robert C. Johnson, President of Kasper Instruments,
Gerald Starek and Carl Storey, officers of II Industries, and Richard Mueller
conspired to circumvent licensing regulations,in order to. export equipment to
the Soviet Union.
Richard Mueller is a West German buinessman who operated at least two
known businesses in West Germany named Techimex and Semitronic. Mueller was
no stringer to U.S. authorities. He had previously been implicated in 1974 where
he was involved in the illegal diversion of high technology equipment to the Soviet
Union by Honeywell, A.G. of West Germany.
Mueller allegedly established Semi-Con in Mays Landing, New Jersey, as
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
290
a means to export semiconductor equipment to Europe. It was learned that
when Conmerce made inquiries of Semi-Con, Mueller came to the United States
and met with Johnson, Starek and Storey to determine a new export'route for
the II Industries and Kasper Instruments equipment. It was decided that
Montreal, Canada, would be the route in which to export the equipment through
two companies, USA Trade and Semitronics. Canada was an acceptable route in
that export licenses are not required when-shipping products for end use in
Canada. Therefore, equipment originally destined for Semi-Con in New Jersey
was rerouted to Montreal, Canada. Following the July 1975 on-premises inter-
views and records examinations by Customs and Commerce, II Industries and
Kasper Instruments decided to seek another exporting route. It should be
noted that Customs coordinated with the Royal Canadian Mounted Police (RCMP)
and learned that OSA Trade and Semitronics did not physically exist; however,
the address of USA Trade was occupied by Kuhn and Nagel, a Canadian freight
forwarding company. The RCMP investigated Kuhn and Nagel 's dealings with
shipmentsgreirMII'industries and Kasper Instruments and learned that the
equipment was shipped to SeMitronics in Zurich, Switzerland, without validated
licenses. This was a violation of Canadian law and Kuhn and Nagel were
prosecuted by Canadian authorities.
Customs learned that II Industries and Kasper were planning to ship
equipment, ultimately destined for the Soviet Union, via Kansas City, Kansas,
through an intermediary "dummy" company. . II Industries and KaSper recruited
a West German National, Frederick Linnhoff, who resided in the Kansas City
area, obtained and operated warehousespoce in Kansas City and traded as Paul
Allen of Allen Electronics. Linnhoff was to receive II Industries and Kasper
equipment from the West Coast, alter the supporting documentation to misrepre-
sent the description and value of the freight and to change the ultimate
destination to Hamburg,West Germany. Altering the supporting documentation
of freight is a method used so as not to arouse suspicion of Customs or
Commerce Inspectors thereby circumventing export licensing regulations. Once
the freight is shipped to Hamburg, there is little that can be done to prevent
the goods from being forwarded to the Soviet Union.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
291
II Industries sent two shipments of licensable equipment through
Kansas. The first shipment was ultimately traced, due to efforts between
German Customs and the U.S. Customs Attache in Bonn, through Hamburg, West
Germany, and on to East Germany. Through information received, Customs was
able to monitor the second shipment II Industries was sending through Kansas.
This shipment contained a sensitive "state of the art" piece of equipment.
Through coordinationwith Commerce, who did' no6aant the shipment to leave
the U.S., it was decided to substitute the shipment. The state of the art
equipment was substituted with sand bags through the cooperation of the
freight forwarder. The original shipment was seized. The purpose of the
substitution shipment was to trace the export route and determine its
ultimate destination without risking losing the equipment to the Soviets.
Linhoff had changed the inscription on the original shipment (did not exist)
and the destination as Reimer Klimatechnik, Hamburg, West Germany. Reimer,
we later learned, was an alias used by Volker Nast, a West Germany associate
of Richard Mueller-, who was also known to be in the business of procuring
U.S. technology for the U.S.S.R.
While the substitution was being made, searches were conducted of
II Industries, Kasper Instruments, Allen Electronics and Linnhoff's residence.
.Incriminating evidence indicating shipments were going to the U.S.S.R. was
discovered. Indictments were drawn and issued for Robert C. Johnson of Kasper
Instruments, Linnhoff, Starek and Carl Storey of II Industries. Linnhoff fled
to Germany and the others ultimately pled guilty to a felony.
Linnhoff was subsequently interviewed in Germany by German and U.S.
Customs and stated that the shipments were destined for the U.S.S.R. and that
he had been advised by Nast that the Soviets had received a shipment of sand.
During the investigation of II Industries and Kasper, I learned that
Richard Mueller elicited the services of John Marshall through Carl Storey.
Marshall is the former owner of Advanced Micro Devices, Santa Clara County,
California. Marshall, an expert in the semiconductqr manufacturing industry,
agreed to provide consulting services to the Soviet Union on behalf of Richard
Mueller: Marshall visited the Soviet Union on at least two occasions to provide
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
292
consultation for the proposed construction of semiconductor manufacturing
facility. Marshall. eventually stopped providing consultation to the Soviets;
however, his business partner, John McCracken, succeeded him. McCracken made
at least one trip to the Soviet Union, again on behalf of Mueller, to provide
similar consulting services. McCracken, like Marshall, soon stopped providing
any services to the Soviets.
As I mentioned earlier, Richard Mueller played a role in the
diversion to the U.S.S.R. of technology involving Lother Haedicke, a
representative of Honeywell, West Germany. Customs learned that II Industries
and Kasper Instruments were linked to Haedicke during this time. Haedicke
conducted business with a West German, Jerry Gessner, who was the European
sales representative for Applied Materials, a Silicon Valley firm which
produces semiconductor manufacturing equipment. Gessner also acted as the
European sales representative of II Industries and Kasper Instruments. It
was eventually learned that Gessner was also in the employ of Richard Mueller.
Haedicke processed orders through Honeywell to export semiconductor manufac-
turing equipment from II Industries and Kasper. Kasper and II Industries
would export the equipment to Gessner at Applied Materials in Germany who
would work with Haedicke to ship it to the eventual customer. Haedicke was
subsequently prosecuted by the West German authorities for providing the
Soviet Union with information detrimental to its national security.
It is my personal observation that the Soviet Union lacks advanced
technology relating to the semiconductor manufacturing industry. During the
past six to eight years, there has been evidence which illustrates that the
Soviets have made great efforts, at a great expense, to obtain technology
relating to semiconductor manufacturing. The Soviets attempted in 1974 to
obtain, through illegal means, semiconductor manufacturing equipment through
Lother Haedicke of Honeywell, A.G. Further attempts were made in 1975 through
Richard Mueller, Volker Nast, II Industries and Kasper Instruments. Most
recently, it has been documented that from 1976 until 1980, the Soviets
obtained similar equipment through Anatoli Maluta and Werner Bruchhausen,
another West German business intermediary. The Soviets even solicited
consulting services from U.S. citizens, John Marshall and John McCracken.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
293
It seemed evident that the Soviet's aim was to construct a semiconductor
manufacturing facility by using U.S. technology and equipment. The equipment
the Soviets obtained from II Industries and Kasper Instruments comprised only
20% of the equipment necessary for a semiconductor facility. Assuming the
Soviets wanted 100% U.S.. technology for its proposed facility, where were they
obtaining the remaining 80% of the necessary equipment? Our law enforcement
operations, Commerce and Customs, have not assumed a proactive approach to
detecting where the Soviets intend to obtain needed equipment. It would be
possible, however, to more effectively control that which the Soviets have
targeted through adequate intelligence to the agents level of operations and
by devoting adequate resources to the investigation. For instance, if law
enforcement had intelligence that the Soviets were planning to construct a
semiconductor plant using predominatly U.S. technology, those agencies
responsible for export controls could more effectively 'monitor the most
likely.industy to_be approached by them. The Soviets have taken advantage
of the weak export control efforts of the U.S. to obtain whatever they need.
The Soviets, in most instances, know exactly what technology or equipment they
need. They contract to procurement groups such as Mueller, Nast, Bruchhausen
and others to obtain what is needed. Cost is no object to the Soviets, making
it an extremely lucrative line of work for intermediaries. These intermediaries
form companies with the U.S.to purchase equipment which is then exported to a
friendly West European nation or neutral nation (Switzerland, Austria, or
Lichtenstein) and transshipped on to the Soviet Union.
Circumventing or violating the U.S. export controls is a relatively
easy task. There simply has not been enough.attention or priority devoted to
the enforcement of this area. Most federal agencies have little or no juris-
diction in this area: Those that do, Commerce and Customs, have had limited
success. The past efforts made by the U.S. to enforce export control laws
has been weak. Today, I can state that Customs has given high priority to
this area of enforcement and I am optimistic about potential results. Export
violation cases require investigation both domestically and abroad. In the
past, the U.S. had received little cooperation or empathy from our allied law
enforcement agencies when pursuing export violators. Neutral nations strictly
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
294
prohibit U.S. investigations of any kind within their countries whereas
other allies do not appear to consider the violations serious enough to
cooperate. This attitude may possibly be encouraged by our own lack of
priOrity to export violations.
Today, Richard Mueller, Volker Nast, and Frederick Linnhoff are
all fugitives from U.S. justice but are free men residing in West Germany.
Nast was indicted by U.S. authorities a second time, as late as 1981, for
attempting to illegally export a U.S. Munitions list item destined for
Hungary; yet he is still a free man in Germany. Starek, Storey and
Johnson never served prison sentences, and to my knowledge those U.S.
perpetrators in the past received light prison terms and even lighter
administrative sanctions. I believe it is time for our Government to
approach export control with dedication, priority and with the cooperation
and coordination of those agencies who have been mandated with the
responsibilities and jurisdiction.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
295
I have read, reviewed and initialed each of the eight pages of
the foregoing statement, and I swear to the best of my knowledge that it
is true and correct.
Sworn and subscribed to before me
this ic.) day of 1982.
Notary Public
My commission _expires:
CHARLES L McLEOD
Witnessed by me as Acting Special
Agent ln Charge.
-
?.;
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
296
Ms. HILL. Also we have several other statements that I would like to
introduce as exhibits to be filed with the subcommittee.
One is a briefing on duel use technology transfer prepared by Col.
Kenneth Evans with the U.S. Army, a statement prepared for the
subcommittee by the American Society for Industrial Security, a
statement prepared by the Computer and Business Equipment Man-
ufacturers Association, a statement prepared by the Electronics In-
dustries Association and a statement prepared by the Scientific Ap-
paratus Makers Association.
[The documents referred to was marked "Exhibits Nos. 33, 34, 35,
36, and 37, for reference, and are retained in the files of the sub-
committee.]
Ms. HILL. In addition, we have a bulky exhibit which contains
numerous documents and court exhibits which have been received by
the staff durinc, the investigation which I would like to make part of
the record, and, Mr. Chairman, I would ask that the record be allowed
to remain open for about 10 days because we do expect to receive other
exhibits that we have requested at this time.
[The documents referred to was marked "Exhibit No. 38," for refer-
ence and are retained in the files of the subcommittee]
diairman Rom. So ordered.
Mr. WETLAND. Mr. Chairman, just so it is clear for the record, does
minority counsel want to have all of those affidavits and association
statements published or merely the affidavits?
Ms. HILL. We want them all in the record as exhibits. Mr. Chair-
man, we ask that the statements be introduced into the record as
exhibits but we ask that only the three affidavits be printed.
Chairman ROTH. With that amendment, it will be so ordered.
[At this point of the hearing, Senators Nunn and Rudman entered
the hearing room.]
Chairman ROTH. Senator Rudman?
Senator RUDMAN. M r. Brady, I don't know whether the reference
to historic should have been prehistoric but let me just get a few things
straight.
What was the date of your swearing in?
Mr. BRADY. June 13?
Senator RUDMAN. I thought it was last spring.
MT. BRADY. Right.
Senator RUDMAN. Around the 13th of June, which means you have
been on the job now for just a bit short of a year. In terms of results,
actually results of getting things turned around, I think you would be
the first to say that at this point that really hasn't happened, wouldn't
you agree?
Mr. BRADY. In terms of the organizational changes and retraining
the personnel, making the changes we want made, you are absolutely
right. Senator, I think, however, the changes you are implying should
have taken place, do not happen overnight.
Senator RUDMAN. That is exactly what I am getting to. There had
been really two or three major criticisms of Commerce and, of course,
the suggestion, I think, made out of frustration on the part of many of
a transfer.
[At this point of the hearing, Senator Nunn withdrew from the
hearing room.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
.29
Senator RUDMAN. I have read with some interest this February 1980
hearing at which you and others testified, and you, yourself, addressed
some of those very problems in that hearing.
The problem is that you are now here at this hearing and the burden
is on your back. And I think Senator Nunn is probably correct in his
assessment of the Progress made to date. But believe me, lust so we have
the record straight, in those two or three areas that you believe were
problems when you arrived there, which in response to a ouestion just
before we had to leave for that vote, you said would be addressed, you
thought with results within 6 months. Just in terms of getting the rec-
ord very clear at this point in the hearing, let me now just recap those
initiatives which you have undertaken that you think will lead to those
results over the next 6-month period, so that if we have a hearing 6 or
8 months from now we can now go back to the hearing record and
take those items, look at what you have done and see what the results
actually are.
Mr. BRADY. Senator, I would first have to preface my remarks by
saying that without the knowledge of what the threat was. knowing
how the Soviets were operating, we could not take the specific organi-
zational steps that we have taken.
[At this point of the hearing, Senator Nunn entered the hearing
room.]
Mr. BRADY. We have, one, created a deputy assistant secretary for en-
forcement which will vastly upgrade the function in terms of its visi-
bility.
Second, the Compliance Office has already received additional re-
sources in the form of 15 positions for the west coast and we now have
personnel actions in process to hire those individuals.
Third, we have created an analytical unit within the Office of Export
Administration, cutting across a couple of divisions, as a matter of
fact, including the compliance division as well as the licensing division,
that is being tremendously successful in terms of showing us the routes
of diversion, likely diversions, et cetera.
Fourth, we are creating a foreign availability assessment center.
We have an individual on board now and there is recruitment action
out for others.
Within the intelligence agency at the prodding of Secretary Bal-
drige, Secretary Olmer, and myself, there has been created a functional
unit totally dedicated to the technology transfer question in terms of
intelligence information. This information is now being made available
to us.
Every week, and my deputy twice a week, as well as the director of
the Compliance Division, the position that is now vacated, we review
all of the intelligence leads provided.
Very often we have difficulty on sources and we have to wait to use
the information, but nevertheless, we get it. We are using that.
We will be restructuring the office, abolishing positions, abolishing
certain units, and I would wrap this up by saying that the Secretary,
as well as the Under Secretary, have indicated a total commitment to
do whatever is necessary in terms of resources to get the job done.
Senator RUDMAN. So if I understand your testimony correctly, what
you are telling us here this morning is that upon taking over last June,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
298
with the background you have and your knowledge of some of the
problems, but obviously not all, you proceeded to evaluate the threat,
to look at the organization, to meet the threat once you had that evalua-
tion?I assume CIA and DIA probably with their input?and finally
sometime midway into your year., you started these four major initia-
tives, the latest of which has been the hiring of someone who obviously
we have a great deal of respect for who understands the nature of the
kind of litigation which is highly specialized.
Mr. BRADY. Precisely.
Senator RUDMAN. So you took about 6 months to find out what you
really needed. You are now in the process in the second 6 months of
organizing that task to meet the threat, to meet the problem, and you
are telling us sometime between now and the first of the year, you
should be able to come and show us specifically, (a) the evaluation,
(b) the implementation to meet the requirements set forth in the eval-
uation, and (c) the results.
Mr. BRADY. That is right. That is absolutely correct, Senator. I for-
got to add the major impetus that we undertook as an administration
was to deal with the international aspects of the diversion problem,
which are far, far greater than the purely diversion aspects or even the
intelligence, counterintelligence problems domestically. We did this,
beginning a year ago, when the President went to Ottawa. So to say we
have not been very active and very aggressive in the general technology
transfer area is simply not consistent with the facts.
Senator RUDMAN. I think in fairness to your committee staff and
yourself, the report done by the staff is probably historically correct
and it probably is currently correct in some areas because by your own
testimony you have only started to implement during this year what
you want to do.
In fairness to assess whether or not there ought to be legislative
action to change jurisdictional lines, I think we ought to give you
an opportunity to do what you think has to be done and then to look
at it again at some time in the future.
I have one last very brief question, Mr. Chairman.
In your testimony back in February, I believe it was February 20,
1980, one of the things that you referred to, which is quite under-
standable, was the difficulty in assessing the nature of some of the
items that had to be licensed or decisions to be made on licensing
because of their highly technical nature; you were having difficulty
at the grade levels of entry into Government service to hire the people
with the kinds of technical background to look at a particular chip,
microchip, microprocessor, a piece of laser technology, a piece of
grinding technology and you say this has very serious impl:ications.
People have to know what they are looking at. My question is:
Has that become any better?
Mr. BRADY. No; it has gotten worse. As a matter of fact, Senator,
we had thought throughout the Government that the Soviets, or gen-
erally for that matter, even the West, were not able to extract tech-
nology, to any significant extent, from a chip or a number of high
technology practices.
Frankly, we are reassessing it in that respect because they may be
able to do it in a better way than they have which makes, again, the
problem that much more difficult.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
299
I would not be candid if I didn't say today that this problem is
monumental. We are never going to solve it entirely; we are never
going to stop the total leakage of technology to the Soviet Union
simply because we are a free country. We have free borders. It is just
a massive problem, and the things I outline in my oral statement
today, such as the growth of multinational communications, the
mobility of people, the role of the academic institutions are all vast
problems and we will address them, and I think we can make sub-
stantial progress in stopping the leakage but it will never be shut.
Senator RUDMAN. What resources do you have available to you to
give you the kind of advice that you need to make decisions which are
going to be based on the evaluation of highly technical information?
Mr. BRADY. This is one of the areas we have addressed in the last
year, and my deputy has addressed much more directly. We are having
difficulty because of the grade structure to bring the people onboard,
the engineers we need. We have some very good engineers onboard.
We need more and we are recruiting for that.
As a matter of fact, one of the things we have done is to try to shrink
the support arm of the licensing function to get more actual engineers,
people to deliver the product. We have had fairly good success with
that. To address the backlog of the 2,000 applications that we had
when we came into office, we got on loan from the Department of De-
fense, as well as NBS, some technicians and scientists to address that
backlog.
Senator RUDMAN. Do you still have access to them? Is there any
formal or informal working relationship? That is the reason for my
question because over at the Defense Department, NASA, and a few
other agencies, there are very sophisticated scientists as well as engi-
neers who are able to do some assessments.
Do you have accessibility to them?
Mr. BRADY. We use the Department of Defense personnel, including
the people in the labs extensively. I am not sure if there is a formal
agreement. DOD has a veto over some of the actions we might want to
take and, therefore, they have a statutory responsibility. So that we
use them extensively.
Senator RUDMAN. Thank you, very much.
Chairman ROTH. I have no more questions but I would like to make
an observation.
I support both what Senator Rudman and Senator Nunn have said.
The problem, Mr. Brady, has been too often in these hearings that we
hear about plans and then when we hold hearings later, nothing hap-
pens. It is very aggravating and disappointing. I don't think that is
going to be the case here, but I think that the subcommittee has under-
scored a very important need for corrective action.
I would urge you to take that action because one of the things I am
determined in this committee is that we are going to have follow-
through hearings. We are not just going to investigate and forget. I
am sure you will agree with that being appropriate.
So I just want to urge that you proceed as expeditiously as possible
because sometime later this year or early next year we would like to
know what progress has been made.
Mr. BRADY. Mr. Chairman, as you know, the act is up for extension
in September 1983, and so we will be going through an extensive
95-929 0 - 82 - 20
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
300
thought process within the executive branch. I would urge you to take
a very close look at us within the next few months to see whether or
not we fulfill the commitments that I have expressed today.
I assure you I will do everything in my power to fulfill those com-
mitments, and I have the Secretary's support in that. Again, with re-
gard to the report, I am not going to disagree with portions of that
report. I just think that it doesn't tell the whole story.
Chairman ROTH. Senator Nunn?
Senator Ntrxrc. Thank you, Mr. Chairman.
I just have a few more questions.
When you get that Inspector General's report, Mr. Brady, that we
all agree is current, having started in April and ended yesterday, I
would like for you to give us your answers to that.
Mr. BRADY. Absolutely.
Senator Nrmric. Let's get your answers and whether you think it is
historic or micro, little things like whether law enforcement people
carrying out law enforcement tasks, have law enforcement capabilities,
whether that is micro or whether that is macro, I guess it depends on
whether you are running the Commerce Department or the world.
Anyway, we would like to get your evaluation of that report.
Just a few other questions. I know you have heard about section
12(C) of the Export Administration Act. That is the section that deals
with proprietary information, and I know there has been a source of
friction between Customs and Commerce on that.
We got information from Customs that there were about 24 cases
that were held up or could not be completed by Customs because of not
getting information from Commerce on that. I am not suggesting it
is a simple problem and easy answer. But what has been done in that
area?
Mr. BRADY. Senator, with regard to those 24 cases, I have had a num-
ber of people look over those and there are some we simply are not
aware of in terms of any problems. I have to admit that there has been
a problem between Customs and Commerce and Commerce and some
of the other agencies concerning 12?C, business confidential informa-
tion. I think with regard to Commerce and to Customs, that problem
has been primarily at the working level.
I assure you that it has been worked out, that we no longer have
that problem. We have negotiated or are negotiating memorandums of
understanding with all the intelligence agencies and with Customs and
the FBI regarding sharing of information. There is still the problem
that we must, according to our law, (Yet a Secretarial determination if
the information is going to be used in thepublic, disclosed to the public.
[At this point, Chairman Roth withdrew from the hearing room.]
Mr. BRADY. I understand there is a divergence of opinion as to what
we construe as public and what the Department of Justice construes as
public, so we will address that. But the 12?C problem which has
existed, which I concede has probably been used at times by Commerce
individuals inappropriately, is behind us.
Senator NuNN. I am encouraged on that point. We will follow that
with interest.
You have been critical yourself in the past with the licensing func-
tion of the Commerce Department. We have centered so far on the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
401
Compliance Division in questions and so forth. But what has been done
in the licensing areas? What do you plan to do to improve the things
you pointed out in the past yourself?
Mr. BRADY. Basically three things, Senator. One, when we came into
office, we wanted to have a review of the policy, and we got that. So
that the President, before he went to Ottawa and discussed the whole
East-West trade situation with our allies, did so on the basis of an
extensive, indepth policy review which was agreed upon. We have
probably had more NSC meetings in this area in the last year than
have ever been held previously with regard to the whole subject
matter.
We have policy guidance from the highest level, both with regard to
the Soviet Union, with regard to Eastern Europe, with regard to the
PRC, and with regard to the pipeline and the oil and gas question, as
a matter of fact. That is one area.
Second, the interagency machinery that was in existence but had no
life under the previous administration has been put to use and from
the top on down. We have an Export Administration Review Board
i
which s chaired by the Secretary and that has met on a couple of
occasions to decide certain cases and policy elements. The rest of the
structure, namely what we call the ACEP, which is chaired by me at
the Assistant Secretary level, my deputy at the Deputy Assistant
Secretary's level, and staff level is working and working well. The
issues are being resolved and I believe we can verify that with the
fact that we had over 2,000 cases that were over the statutory deadlines
in the process when we came into office a year ago.
They have been eliminated. We have something like 30 or 40 cases,
depending on the particular week we are in which are over the stated
timeframes and,_ frankly, there will always be a handful of those. That
doesn't mean we have done the task in terms of, one, interagency
cooperation, or in looking at what should be controlled, because that is
based on the policy decisions that were made by the President a year
ago.
We went to our allies, both in the NATO framework as well as in
the Cocom system, and we got a political direction in January and we
are now moving to redesign the list of controlled commodities so that
we move away from what was controlled in the fifties and sixties when
we concentrated on products. We are now focusing on technology,
design, manufacturing, and production of technology.
Senator Rudman referred to microprocessor chins. In the final anal-
ysis there is no way we can keep somebody from walking into Radio
Shack or any computer store in the country and buying a handful of
those chips and nutting them in a diplomatic pouch and leaving. We
recognize that. But it's the technology to make that chin or that mi-
croprocessor which is really important to the Soviets, and that is
what we are trying to concentrate on, particularly in nondefense pri-
ority industries.
Senator NuNN-. I certainly agree with that priority, and I think that
one of the most important things is to have a continuing update of the
critical technologies that the Soviets are likely to target and are likely
to need and to really prioritize those. That is not to say that others
are not important, but to concentrate on those and to educate the pri-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
3Cl2
vate sector on those. I don't believe there is any way that the Govern-
ment of the United States, no matter what you do in the Compliance
Division or the Licensing Division, no matter what State, Defense,
Customs, no matter what they do, they are not going to be able to
control this problem without tremendous cooperation from the private
sector.
It seems to me, forgetting our disagreement on compliance right
now, that one of the areas Commerce really can move forward in is
this educational campaign, and you are in contact with businesses.
They do respect you. You do have a little leverage there. They will
come to meetings when Commerce talks. So I think it is very im-
portant for you to carry out this education function.
I consider that the most important function Commerce has got,
even if you have everything ironed out in the Compliance Division,
I think that pales in comparison because of the limitation of the
numbers, and so forth, and because of the ability to try to educate and
stop this stuff at the source rather than at the borders.
Mr. BRADY. Senator, I agree with you entirely.
Senator NuNN. Stuff is not a good word for high technology. We
will strike that word. Just high technology transfer instead of stuff.
Mr. BRADY. What we are talking about is a massive problem. In a
way, industry is behind the times because they are worried about cer-
tain aspects of their security and they have allowed it to go unnoticed.
That is a task in the Department. It is a task we have spent quite a
bit of attention on. Frankly, we are sending out to the field something
like 60 additional Commerce individuals that are associated with our
field offices, who are normally associated with trade activities, but
whose job is also to educate the business community on the needs if
they are exporting.
There is no exporting seminar that is ever given in this country
without either participation from the Office of Export Administra-
tion with regard to the needs of licensing. It is a complex function
and it is one that we are going to try to do a lot more of.
Senator NuNN. Regarding the critical list, you can let business know
in these seminars what is on that list. Then private industry, those who
are loyal and patriotic, and that is 99 percent of them in my view, will,
I think, pay close heed to this. A real educational campaign about in-
ternal security also would be useful. I know the bigger businesses have
it. Sometimes it is not very good. But smaller businesses sometimes
don't even think about it.
A lot of our technological innovation is coming from small business
people. I would say most of them.
Mr. BRADY. That is right.
Senator NUNN. I would hope you would really bear down in the
educational effort. it seems to me that Commerce has a unique kind of
capability in that respect because you do have people out in the busi-
ness community, with your seminars, and other programs. Of course,
I think on the other side, Customs has a real law enforcement advan-
tage because they have people who are naturally involved in that all
the time. But nevertheless, I would hope you would really give top
emphasis in the Commerce Department to that educational function.
Mr. BRADY. We will, Senator.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
306
Senator Nincisr. Assume all your plans take place, everything hap-
pens in the Compliance Division that you have outlined and 6 months
from now you come back here and say we have done all of these things,
we have corrected all the problems, we have all the people, so forth,
what then do you envision as your role with compliance?
For instance, will you have people that visit airports, will you have
people that visit ports? What will the Compliance Division in the Com-
merce Department in a perfect world be doing?
Mr. BRADY. Senator, assuming that Customs continues its inspection
operation, the Exodus operation, I think it would be duplicating that
action for us to be doing inspections for inspections sake. That doesn't
mean we would not send special agents when they are working on a case
to a particular port, but I think it is important that we not duplicate
what, in fact, is done by Customs and can be done better because they
do have the manpower at the ports, as far as inspections are concerned.
Senator NuNN. The same thing would be true with airports?
Mr. BRADY. Yes, sir.
Senator NuNN-. You are saying all ports?
Mr. BRADY. I am saying all ports, water and airport. So I would not
expect us to have an inspection function as such. I would expect us to
have a very strong special agent force that works closely with the CIA
and FBI to get the leads to get at the diversion problem. We do get
them, but there are sometimes problems because we can't use them be-
cause of the sources. To get at the diversion problem, our efforts will
also include an education campaign. That also spills over to other
agencies in Commerce, both in the United States and overseas, per-
sonnel helping us extensively in our enforcement efforts.
When we get a case of licensing and we don't know the end user,
we request information from our personnel overseas.
Senator NUNN. I am going to have a few observations at the close
of the hearings and one of them is going to be that licensing should
remain at the Commerce Department. So my critique of Commerce is
going to be on the Compliance end as well as other things. But what I
am trying to get at, in a perfect world when the Compliance Division
is operating effectively and efficiently as you envision it, what are you
going to be able to do that Customs can't do? That's the central ques-
tion:-If you are not going to have them at ports of exit and you are
not going to inspect and so forth, and I agree with that. I think you
are absolutely right on that, it would be duplicative. But if they are
not going to do that kind of thing, it seems to me that what you are
describing is really a liaison between law enforcement and licensing.
Mr. BRADY. I think it is more than that. Senator, it goes to the fact
that the inspection at the ports of exit which Customs does is a small
part of the problem, a very small part of the problem, and none.of the
major cases we have had have grown out of inspection of crates at the
ports. What we need are special agents who can prosecute investiga-
tive cases.
Senator N'uNN. That is the Justice Department.
Mr. BRADY. I mean prosecute to the point of turning the case over to
Justice.
Senator NuNN. You mean investigate special cases?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
304
Mr. BRADY. Precisely, investigate diversions, work with the FBI
and the CIA to get the information.
Senator NUNN. Why can't the FBI do that? What is it that Com-
merce brings ?
Mr. BRADY. FBI deals with espionage only.
Senator NUNN. This comes darn close to espionage. The Bell case
and other cases it seems to me are very, very close to espionage. I can't
understand what it is Commerce brings to this that the FBI or
Customs doesn't already have.
Mr. BRADY. It brings the entire knowledge and expertise of what is
licensed for dual-purposes. In other words, which computer requires
a license, which doesn't, where they are going, the fact that before we
license cases we must get a rundown on some of the end users.
Senator NUNN. Why can't the FBI or Customs do that?
Mr. BRADY. Because they just don't.
Senator NUNN. They don't
Mr. BRADY. Frankly, the working relationship with Customs has
not been all that high and it is not one sided.
Senator NUNN. I am not shocked to hear that after a year of inves-
tigation.
Mr. BRADY. And I am not pointing fingers. I think the close associa-
tion between what the enforcement arm that we envision with a li-
censing process, as well as with the intelligence community is going
to provide the insight, the expertise to go out and investigate the cases
that are truly the major cases. And the analytical unit that we are
talking about that we have established in recent months, for instance,
is coming up with a substantial number of cases. This is just as a result
of the information we have.
Senator NUNN. Looking back fcr a moment historically, has there
been a major case that you can identify that Commerce has done the
majority or the bulk of the investigative work in and has been suc-
cessfully prosecuted?
Mr. BRADY. Well, I know both the Spawr and Maluta cases, Senator,
were closed out by Customs at one point. If it had not been for a certain
inspector in our Division, there is a very good question as to whether
those cases would have been prosecuted.
They are two of the largest cases we prosecuted in recent years.
Senator NUNN. We have heard testimony that the agent that you
had who handled those cases is an excellent agent and did a very good
job. I think we are in agreement on that. Do you have any others?
Mr. BRADY. There are four cases now?well, there are more than
four cases now. But I understand there are four cases that are either
in transmission to Justice or are there for criminal prosecution so that,
again, the criticism is valid, however--
Senator NUNN. How many years have you had a Compliance Divi-
sion?
Mr. BRADY. I believe it goes back to 1949. Yes.
Senator NUNN. We would like for you to furnish for the record
all the significant cases in which Commerce has played a major?I
won't say the major, but a major investigative role.
Mr. BRADY. OK. Senator, two points. One, I do not think it is
necessarily bad that Commerce, once it discovers a lead or once it
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
305
begins an investigation, has to go to the rest of the Government for
help.
Senator NUNN. I don't either.
Mr. BRADY. I think that is the kind of coordination this Government
desperately needs, and we are trying to accomplish it. I think that I,
Ed O'Malley, Willy Von Raab, and the CIA have made great strides
in this direction.
There is another point, however, which we have not discussed this
morning, and that has been the legislative participation in the whole
technology transfer process. Beginning in 1969, this act was changed
and over the 1970's, every extension was successively liberalized to
not only permit but actually to encourage the executive branch to be
more liberal in terms of its exports. In retrospect, that was a mistake.
But the point is that through the 1970's, there was not a very strong
compliance arm simply because the whole process was not viewed as
all that important because after all, we were establishing detente with
the Soviet Union, and we were going to industrialize them without
technology.
Senator NUNN. I certainly think that is an accurate observation. I
do not think there is any doubt about that. That is an attitudinal
situation that existed for a long time.
Let me ask you a couple of other questions. Have you looked into
the grain embargo enforcement effort by the Commerce Department?
Mr. BRADY. Senator, I am aware?
Senator NuNN. Without asking any leading questions, why don't
you tell us what you think about that since we both agree that is
historic but perhaps also indicative?
Mr. BRADY. The President lifted the grain embargo because he said
that others had moved in and simply taken up the slack that we had
tried to curtail. Grain is an impossible commodity, as you know, to
trace.
I am aware of the criticism in the report that there was one agent
assigned to the enforcement of the grain embargo.
Senator NUNN. In the Commerce Department?
Mr. BRADY. Right.
Senator NUNN. He was responsible for all compliance and enforce-
ment, is that right, for Commerce?
Mr. BRADY. I understand that he worked on an interagency com-
mittee, and he was the Commerce representative.
Senator NUNN. Wasn't Commerce the designated agency to enforce
the grain embargo?
Mr. BRADY. Yes; it would be, butit was an interagency effort in terms
of acquiring information. From what I understand, there are few agri-
cultural exporters. Unlike a computer, it cannot be packaged in a small
box. A ship leaving with a grain shipment is a fairly visible item. I am
not condoning 1 person, and I am not even sure that 15 people can
enforce the grain embargo. I don't know.
Senator IsruNbr. You would be pretty certain one can't; wouldn't you
Mr. BRADY. Absolutely. I do know that as a result of what we call the
"Great Grain Robbery" in the early 1970's, that transactions can actu-
ally, before start and finish, go through 40 different hands before a
grain shipment finally gets to its destination.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
306
I think there is a real problem with trying to enforce that kind of an
effort, and based on the resources that they had, Mr. Chairman, I am
not sure, in view of the high technology concerns and their impact on
the military of the Soviet Union, I would prefer the agents in the high
technology area rather than in the grain area. I was not at Commerce
at the time the decisions in this regard were made.
Senator NUNN. Even if this was a major part of the President of the
United States foreign policy at the time, one of the major moves he
made in the whole 4 years? If you were President Carter and the Secre-
tary of Commerce came over and the President said to him, "Oh, inci-
dentally, Mr. Secretary, how many people do you have working on the
grain embargo enforcement ?" Would you want to reveal to President
Carter at that stage?I am not saying whether, the policy is correct.
That is a macrodecision. Let's talk micro. "Would you want to be the
Secretary of Commerce who came over and said to President Carter,
"We have got one person who is sitting in the Commerce Department
making sure that everyone complies with your grain embargo. He
hasn't had time to leave the office for the last 6 months because he is
so overwhelmed with reports, but we have priorities elsewhere." Would
you want to be the Secretary of Commerce who conveyed that message?
Mr. BRADY. Well, if that Secretary had told the President that it was
unenforceable to begin with, I wouldn't mind being that Secretary.
But I do not know if the President was ever told that it was unenforce-
able.
Senator NUNN. I would doubt very seriously anybody told him one
person was working on it. That becomes a self-fulfilling prophesy if
you only have one person working on it.
Of course, based on Commerce records, there was 100 percent com-
pliance anyway. Maybe we didn't need enforcement.
Mr. BRADY. Senator, I am not going to condone one person being
assigned to the grain embargo.
Senator NuNN. That again, is historic and I hope we can learn by
that.
Whether Presidential policy is correct or not and whether it really
is completely enforceable or not, I do not think is a decision for peo-
ple who are supposed to carry it out to make. I think they have to do
the best job they can with resources.
Let me ask you one other question. Have you heard of the Polam-co
case?
Mr. BRADY. I am aware of it, yes.
Senator NuNic. This is a case where we heard considerable testi-
mony. William Bell, a Hughes Aircraft radar specialist, was con-
victed of selling military secrets to Polish spies. The President of Po-
lamco, or the President-designate of Polamco was convicted and ac-
cording to all information we had was really pretty much admittedly
an agent of the Soviet Union. This was a case made by the FBI.
We understand Polamco is a company that is still not on the denial
list of the Department of Commerce. Is that correct, and if it is cor-
rect, could you tell us how that situation operates?
Mr. BRADY. There is a difference between the denial list, which is the
result of an administrative proceeding where a company is denied ex- ,
port privileges, and a screen where we review license applications
against the possible problem companies. It is my understanding that
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
307
the company is on screen and not on the denial list. It is not denied
export privileges because we do not have the authority to deny it.
Senator NU NN. What is the screen?
Mr. BRADY. The screen is a review. It is a list of the companies of
individuals against which a license application is checked initially
when it comes into the office.
Polamco is on that screen but it is not denied export privileges. It is
my understanding that we do not have "an export administration
case" against the Polamco. As you know, it is, I think a Polish com-
pany chartered under the laws of California or Illinois. That is a
growing phenomena that concerns law enforcement people through-
out this Government.
Senator NErNisr. What do you have to do to have an export admin-
istration case? I assume you are saying to be on the denial list there
has to be a case made?
? Mr. BRADY. That's right.
Senator Ntricx. Will you walk us through that? In order to get a
company on an export denial list, what has to happen?
Mr. BRADY. We either have a criminal prosecution or administrative
prosecution with sanctions being levied. As a matter of fact, one of the
real?
Senator Nurrisr. You had a criminal prosecution here.
Mr. BRADY. But not under the Export Administration Act. It was
an espionage, I believe, prosecution. And there is a difference. We do
not have the legal authority to do what you and others would like us
to do.
Senator Nurrx. Doesn't that law need to be changed, then?
Mr. BRADY. It may well, Senator, it may well. And the whole area of
Communist firms chartered in the United States is, we believe, ripe for
diversion. It is one we are looking at. There are constitutional questions
as to whether we can require Federal Government approval prior to
those companies being chartered in the United States. We are looking
at a reporting requirement.
Senator NuNx. We are talking about two things, as to whether they
are chartered and the second thing is whether they can export.
Mr. BRADY. They can export legally if they come in and get a license
application and we grant it to them, which is a big "if." If they export
illegally, then we can prosecute them. We cannot, however, prosecute
them for first, being chartered here or, second, acquiring technology
within the United States. And that is what is taking place.
In other words, these Communist-owned chartered entities are ac-
quiring U.S. technology and we are concerned that it is one of the
strong vehicles by which it is leaving the country. That is something
that a number of individuals and organizations are looking at and
working on.
Senator NUNN. What do you have to have in order to put somebody
on the denial list? Tell me that again.
Mr. BRADY. Again, a criminal prosecution?
Senator NUNN. Criminal prosecution only under the Export Admin-
istration Act.
Mr. BRADY. Or an administrative prosecution. I will have to turn
to?
Senator NuisTN. If you have a lawyer here, let's have the lawyer ex-
plain the exact state of the law here.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
308
MS. BREED. In order for a company?
Senator NUNN. Give us your name.
Ms. BREED. Pamela Breed.
In order for a company to be placed on the denial list, we would
have to go through an administrative procedure which is a charging
letter alleging certain acts had taken place, give the respondent an op-
portunity to answer the charges and perhaps go to a hearing on the
charges before a hearing commission.
Senator NUNN. That would be a civil proceeding?
Ms. BREED. Civil proceeding.
Senator NUNN. What are the grounds for your bringing that?
Ms. BREED. For a civil proceeding?
Senator NuNN. Yes.
Ms. BREED. A variety. Illegal export, re-export, diversion, causing,
aiding or abetting a violation.
Senator NUNN. Wouldn't the Polameo ease, when the president of
the company has been convicted of espionage?
Ms. BREED. It is a violation of the Export Administration Act.
Senator NuriN. The only thing that you can put them on the denial
list for is for violating the Export Administration Act.
Ms. BREED. That is right.
Senator Nuicx. I thought you fast listed several other reasons.
Ms. BREED. Aiding and abetting in violation of the Export Admin-
istration Act.
Senator Nuiciv. It is a very narrow statute. You can only put some-
one on the denial list if they have been convicted of an Export Admin-
istration Act violation. You bring a proceeding alleging violation of
that act.
Ms. BREED. Alleging violation.
Senator NUNN. even if they committed espionage, that is not
grounds for denial?
Ms. BREED. That is correct. You have to tie in the sanction under an
act to the violations in the act.
Senator NUNN. You are saying there would be a constitutional
problem if we were to amend the law and say if you have been con-
victed of espionage, that there be ground for civil proceedings under
the Commerce Department.
MS. BREED. There could be a problem. We have not studied that
aspect of it.
Senator NUNN. It seems to me this is a very large loophole, Mr.
Secretary.
Mr. BRADY. Senator, yes, it is, and it is one of the things that we are
looking at. I started to say that we are looking at the constitutionality
and legality of a reporting requirement to require that, one, a firm is
chartered when it is reported to us, or when they acquire technology
within the United States, they report it to us. But, again, it is a ques-
tion as to how much enforceability there is to that kind of provision. It
is a that we are all looking at and I think as we go through the
next few months, particularly later this year or early next year, in
lookmr, to the extension of this law., this is very definitely one that we
a 1 I should concentrate on.
Senator NuNN. I certainly agree.
wc,--ld like to formally ask, Mr. Brady, you give us your opinion
aftei consulting with your legal department as to exactly what that
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
309
act provides, and what needs to be done in the view of the Commerce
Department to plug up the loophole if it is as large as it appears to be.
I am going to ask the staff to pose a similar letter to the Attorney
General and have him look at it, too.
Mr. BRADY. Senator, it may be we can actually use as one of the
sanctions in an espionage prosecution the denial of export privileges to
an individual form.
Senator Nuicx. It seems to me that is something that would be logi-
cal. Senator Rudman, I know I have taken too much time.
Senator RUDMAN. Mr. Brady, thank you very much. This concludes
5 days of hearings on this subject.
You will, of course, respond to those questions asked for the record.
Senator Nuicx. Mr. Chairman, I do have a statement.
Senator RUDMAN. Proceed with your closing statement.
Senator NuNN. Thank you, Mr. Chairman. Mr. Secretary, we thank
you for being here today. We don't agree on everything. I know you
are sincere in your efforts and will continue to work on it. We will
continue to follow your progress with a great deal of interest, both in
licensing and in compliance.
I would like to make a statement giving my observations here as to
what we have learned in the last 5 days and at least a partial list of
recommendations that Senator Chiles and I will at least make to the
subcommittee. These are certainly not subcommittee findings. That
will be for the full subcommittee to make a decision on.
The Senate Permanent Subcommittee on Investigations has con-
cluded 5 days of hearings on the transfer of American technology to
the Soviet Union and Soviet bloc nations.
The hearings, in my view, underscored the need for improvement in
U.S. efforts to halt technological drain, both in the governmental and
private sectors.
Based on information developed in the hearings, we believe the sub-
committee should recommend to the full committee and the Senate the
following legislative proposals and corrective actions.
First, the Soviets dedicate substantial resources to highly focused
and increasingly adept attempts to secure American technology. By
contrast, the _American response often has been unorganized.
A restructuring of American efforts to halt undesired technology
transfer is called for. Through improved intelligence, we must deter-
mine what it is that the Soviets want and then model our response
accordingly. Our Government should seek to prioritize the critical
technology the Soviets need for military purposes and devote consid-
erable efforts to education and enforcement of the prioritized items.
No. 2, there is a need for reassessment of the ability of the Depart-
ment of Commerce to carry out its present enforcement responsibilities
under the Export Administration Act. Commerce presently carries
primary law enforcement responsibility, with secondary jurisdiction
resting in the U.S. Customs Service.
Commerce maintains both licensing and enforcement under the act;
by contrast, under the Arms Export Control Act, those functions are
handled separately by the Department of State and the U.S. Customs
Service.
And I might add we understand from both State and Customs that
that arrangement has worked very smoothly.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
310
The enforcement responsibilties under the Export Administration
Act should be altered, first, by delegation of full enforcement respon-
sibility to the U.S. Customs Service, with the licensing function re-
maining at the Commerce Department. In addition, for a long-range
solution, Congress should consider the concept first put forward by
Senator Garn to create an Office of Strategic Trade that, among other
things, would absorb the functions of the Office of Export Adminis-
tration.
I reserve final judgment on that. I certainly think that should be
the focus of another hearing, Mr. Brady, after you get a little further
along with your licensing proposal. Because I can see some real ad-
vantages in having the licensing and education functions that I al-
ready enumerated that I think should be your top priority in one
department.
No. 3, the Export Administration Act should be amended to include
as a criminal offense, the possession or attemped possession of re-
stricted goods with the intent to export such goods unlawfully.
Hearing evidence established the many difficulties law enforcement
authorities encounter in the prosecution and investigation of export
offenses. One problem lies in the absence of any offense until a suspect
actually exports the goods in question.
When arrest is delayed until the moment of export, law enforce-
ment necessarily risks the loss of territorial jurisdiction if the subject
departs the country. In export cases, where the offense is often non-
extraditable, that risk can be fatal to the success of the case.
No. 4, the enforcement tools currently available to the U.S. Customs
Service should be broadened. Consideration should be given to grant-
ing Customs officers express statutory authority for warrantless arrest,
search or seizure in cases of outbound cargo and persons, generally
equivalent to that authority which Customs now possesses in cases of
inbound cargoes and persons. Express statutory authority would em-
brace Customs' effectiveness in full enforcement of the export laws.
This authority has been implied by the courts in some cases.
No. 5, the Federal electronic surveillance statutes should be amended
to permit court-ordered surveillance where there is probable cause to
believe that a violation of either the Export Administration Act or
the Arms Export Control Act is being committed. As with the recom-
mendations to Customs' authority, this revision would enhance law
enforcement's ability to investigate complex export cases.
No. 6, the RICO statute should be amended to include, as predicate
offenses in proving racketeering activity, violations of the Export
Administration Act. Export violations often have been treated as
"minor" offenses, resulting in minimal sentences. Prosecution under
RICO would expose offenders to a possible N year prison sentence.
No. 7, the Freedom of Information Act should be amended to elim-
inate the application of the act to information requests made by for-
eign nationals. Faced with the disclosure of sensitive information to
foreign nationals, "cottage" disclosures industries, and others, such
statutory revisions would inject a reasonable sense of national security
considerations into disclosure practices mandated by the Freedom of
Information Act.
No. 8, the Department of State should seek mutual assistance treaties
between U.S. allies and neutral nations to obtain greater law enforce-
ment cooperation in the enforcement of export laws.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
311
The State Department should seek the inclusion of export violations
as extraditable offenses in agreements with foreign governments.
No. 9, the region in Santa Clara County, Calif.. popularly known
as the Silicon Valley, the heart of America's growing microprocessor
industry, is a prime target of Soviet efforts to transfer sensitive tech-
nology. Yet we were told that a strong Federal law enforcement pres-
ence has been lacking in the Silicon Valley in the past. State enforce-
ment efforts must be supplemented by a Federal interest in the prob-
lem. We note assurances from the FBI that it is aware of this problem
and is taking steps to increase its presence in the Silicon Valley and
other high technology centers. The Bureau is to be commended for its
corrective action in this regard.
No. 10, the technology transfer problem is, by all indications, a mas-
sive one requiring the attention of both the Government and the pri-
vate sector. Law enforcement and industry spokesmen suggested that
many high technology companies remain unaware of the extent of the
problem. Reportedly, industry interaction with the Commerce Depart-
ment is inadequate; unfamiliarity with the lists of controlled exports
is common within the industry. The FBI's DECA program, aimed at
improving the level of communication with the private sector, directly
educates companies involved in Defense contracts with the problem of
technology transfer. The Defense Department has begun a similar pro-
gram with the business community. There is a need for similar govern-
mental programs designed to inform the private sector dealing in sen-
sitive but nonclassified technology.
No. 11, private industry must contribute directly to any effort to halt
the technology drain. There is a lack of sufficient security precautions
at the sources of production in the technology industries. Lax security
measures were cited in some Silicon Valley plants. William Bell, a
Hughes Aircraft engineer convicted of selling military secrets _to
Polish spy Marian Zacharski, had access to sensitive information on
the basis of a security clearance which had not been reviewed in 28
years. The private sector, through the efforts of individual enterprises
and trade and professional associations, should be encouraged to main-
tain more effective security measures in plants producing sensitive high
technology items.
Massive Soviet efforts to obtain our technology resources can be
countered only through vigorous Government and law enforcement
efforts, bolstered by the strong support of America's high fechnology
industries.
I might add, Mr. Chairman, that there will be other recommenda-
tions. We will have some detailed recommendations on the Department
of Defense and I will have others, but et this point in time, I did want
to submit those as initial observations by Senator Chiles and myself.
Senator RUDMAN. Thank you, Senator Nunn.
I am sure there will be other observations and conclusions reported
out by other members of the subcommittee and possible suggestions
that will be joined together.
Certainly I commend the chairman and the minority staff for your
leadership in these hearings which I think are informative and will
lead to improvement on a very serious situation.
This subcommittee will adjourn now subject to the call of the Chair.
rWhereupon at 12:27 p.m., the subcommittee adjourned to reconvene
at the call of the Chair.]
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
_
APPENDIX
PREPARED STATEMENT OF SENATOR WILLIAM S. COHEN
Mr. Chairman, I am pleased to have this opportunity to
7
participate in these hearings to examine the ability of our
government to enforce our export control policy.
Congress passed the Export Administration Act and the
Arms Export Control Act to establish a mechanism for controlling
the export of materials which might damage our national security.
The administration of this policy requires a careful balancing
of competing interests. Our economic goal of promoting exports
must be weighed against protecting our technological lead upon
which our national security is based. And the freedoms of our
academic community. to conduct research without government intru-
sion must be weighed against the extent to which Soviet technology
can benefit from U.S. science.
An area that has been of particular concern to me is
that of academic exchanges. These occur through personal
letters, visits, journal articles, and conferences and can
be beneficial to the well-being of both nations. However, in
certain circumstances, exchanges can be counterproductive
and damaging to our national security. American students
studying in the Soviet Union, for example, study marriage
patterns in that country between 1897 and 1975 and the economy
of Catherinian Russia. At the same time, Soviet students '
in the United States are studying chemistry, physics, laser
technology and applied computer science.
Recent events, however, call into question the adequacy
of existing policy to address these concerns. According to press
reports; the Soviet Union has increased its covert operations
to obtain technology that can be used for military purposes.
Similarly, we must question why, for example, Soviet officials
nearly won approval of an export license for industrial material
until the Defnese Department noted that the same article is
used by the U.S. Air Force to improve the hardness of our con-
crete missile silos. Perhaps most disturbing of all is the dis-
(318)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
314
covery by Pentagon officials of Soviet electronic circuit boards.
The computer chips in this circuit worked perfectly when American
chips were used as replacements, providing evidence that the
technology had been copied. This is the very technology on
which the Pentagon is relying for our future weapons improvement.
would like to commend Chairman Roth for his timely
investigation of this critical issue. I look forward to
examination of how the government's resources and information
could be utilized to promote ,a more effective export control
policy. Specifically, we need to address the current staff
allocations at the Commerce Department where only 25 investi-
gators are charged with the entire responsibility for export
controls even though there are more than 300 exit points
throughout our country. Since the U.S. Customs Service has
more investigative resources, does it make sense to transfer
responsibility for the Export Administration Act to this agency?
And how can-the information collected by our intelligence
agencies be used in a more effective manner in the enforcement
of our export control policy?
I believe that the efforts of the Administration in re-
viewing our export control policy should be commended, and I
look forward to working with them to develop an improved policy.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
315
PREPARED STATEMENT OF SENATOR HENRY M. JACKSON
Mr. Chairman:
I congratulate you, and Senator Nunn, and the Mashers and staff for
holding these hearings. The problem of assessing the loss of our tech-
nology and developing effective treasures to control its transfer is one
of the oust important facing the United States.
Documents and other information made available to the Senate by the
Select Committee on Intelligence, of which I am a uenber, as is the dis-
tinguished Chairman of this Subcommittee and the Committee an Governmental
Affairs, Senator Roth, establish that the Soviets are pursuing a purposeful
and determined campaign in this field. Their activities are nunerous,
diverse, and well-funded. And they have, in far too many cases, been
successful. We nowlcnow, and I believe these hearings will further deMon-
strate, that in many ways the United States has in effect been supporting
the uetastasizing power of the Soviet Union. As I Stated in remarks to
the Senate several weeks ago, "There is no longer doubt that our technology
has materially aided Soviet expansion. It has improved Soviet weapons,
intelligence devices, and economic leverage."
The need for a clpar and comprehensive tedhnology transfer policy
is compelling and urgent -- yet our government atill has a long way to
go.
PRIOR SUBCOMMITTEE RECORD
The hearings we begin today continue this Subcommittee's
distinguished history of investigation and legislation concern-
ing technology transfer problems. Our past activities have
included detailed scrutiny of particular licensing issues, such
.
as the Dresser Industries case, as well as studies of broader
related issues, such as East-West financial credits. The
Subcommittee's review of this latter problem, I might note,
was conducted about five years ago, and it accurately presaged the
Soviet bloc debt issues that are causing such serious concern
today.
95-929 0 - 82 - 21
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
316
The Subcommittee also laid the groundwork for significant
t'
legislation. During the 1970s, the Department of Commerce was
regularly approving licenses for exports of strategic goods and
technologies to Soviet bloc nations without adequate analysis
of the adverse impact on American national security. In 1974,
legislation based on tip= Subcommittee's work helped correct
this problem by amending the Export Administration Act to pro-
vide for Department of Defense review of certain applications
for export licenses and permits. In 1979 this approach was
improved and expanded w4..th further amendments to the Export
Administration Act, again based on Subcommittee work. These
amendments assigned the Secretary Of Defense primary
responsibility for identifying control list items, as well as
military critical technologies and goods.*
The critical technologies concept is intended to lead to
tighter control over transfers of design and manufacturing
know-how and production capabilities while relaxing control
over products not transferring such knowledge. A related
element of legislation requires that the implementing regula-
tions take into consideration the difficulty of devising
effective safeguards to prevent diversions of critical tech-
nologies to military use, to protect critical goods such as
computers, and to prevent the se-export of critical technol-
ogies to third parties.
Another 1979 amendment to the Export Administration Act
was designed to correct a major deficiency that the Subcom-
mittee's work had identified in U.S. licensing procedures.
Except under special circumstances an export to adversary
nations may not be denied if comparable goods or technology
is available from foreign sources in substantial quantities.
But it was found that determinations of foreign availability
had been predicated on unsubstantiated assertions by exporters
and superficial analysis.
I might add that Senators Nunn and Cohen of this Committee, as
well as Senator Moynihan, the Vice Chairman of the Intelligence
Committee, joined me in 1979 in sponsoring these and other key
amendments.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
317
The 1979 legislation dealt with this problem in three
ways. First, it requires that any determination of foreign
,availability must be made in writing and be supported by reliable
evidence, which specifically excludes uncorroborated repre-
? sentations by an exporter. Second, it indicates Congressional
intent that the President initiate negotiations with other
potential suppliers when he has reason to believe that they
may make controlled items available to an adversary nation.
Third, the legislation mandates that all departments and agencies
that have export control responsibilities share foreign avail-
ability information.
CURRENT PROBLEMS
Despite this effort, it has become clear that Soviet
actions to acquire our technology have seriously outstripped
our preventive undertakings.
In recent months there seems to be greater public concern
about this problem. Such concern is a promising development,
because there are so many ways that Soviet acquisition efforts
exploit our open society. Our first defense here is public
awareness. These hearings can help substantially by further
documenting the Soviet threat to our technology and providing
a better base of public information about this subject.
These hearings will, I am sure, identify many of the
improvements needed in our transfer control policies and
procedures and develop the basis for appropriate remedies. In
this context, I want to highlight five matters that strike me
as continuing sources of weakness in our national efforts.
One is the slowness in implementing the critical technolo-
gies approach called for in the 1979 legislation, In large
part, this delay has been due to inadequate funding of the
Defense Department's undertaking. In addition, the policy-
related activities in Defense -- particularly those dealing with
such crucial matters as relations with allies in NATO and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
318
COCOM -- are serioUsly lacking in permanent staff and support'.
These shortcomings have impeded progress on major policy matters
as well as the day-to-day processing of licensing cases. A
related problem is that current regulations do-not require
license approval for exports of most critical technical data
to most non-Communist destinations. This loophole, of course,
presents significant opportunities for leakage of our tech-
nology to the East.
Second, the government's current approach to qUestiOns of
"foreign availability" remains a source of weakness. The
Commerce Department has primary responsibility for monitoring
and gathering of foreign availability information, but its
capabilities to do so appear to have been and to remain seriously
inadequate. It is also not clear that the intelligence community's
role in these matters has been sufficiently strong, wide-ranging,
or coordinated. On the other hand, when it has been evident
that foreign availability does substantially exist, the govern-
ment has not vigorously implemented the 1979 Congressional
intent regarding negotiations for cooperative controls. Too
often, it seems, U.S. export licenses have been granted based
on untested assumptions that our allies would not cooperate
with us in controlling the items in question.
A third major weakness of current U.S. controls is the
government's willingness to accept end-use representations
to permit the export of dual-use technologies and items even
when those certificates are essentially unverifiable. The
current Administration, better attuned rhetorically than its
predecessor to the dangers of technology loss, approved the
sale of pipelayers to the Soviet Union with the understanding
that those machines would not be used on the Siberian gas pipeline
proposed for Western Europe. But because there is simply no
way that national technical means can differentiate a pipelayer
from that sale under those assurances from one that was sold a
year earlier under no such assurances, and because there is no
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
319
on-site inspection of engine block numbers, end-use repre-
sentations are irrelevant if not downright sham. Computers
provide another example of items in which such representations
are irrelevant or spurious. There are no functionally related
observable differences in a computer when it is working on
military problems rather than civilian ones; even on-site con-
stant observation of the machine will not reveal whether it is
being "diverted" in part or in whole to military tasks.
The fourth weakness is that current U.S. controls fail to
include all equipment and technologies relating to oil and gas
development in the national controls list of strategic defense
industries. I have twice written President Reagan on this matter;
in the more recent letter, on 8 March, I urged that the Adminis-
tration act "to finally recognize the strategic importance of
energy supplies and to start treating technologies and end-
products related to them accordingly. Procedurally, this would
mean giving the Secretary of Defense the same review over exports
of oil and gas equipment that he now has over strictly military
exports." (I ask unanimous consent that the text of this letter
and supporting materials be included as part of the Record.)
The immediate problem that prompted this letter is the
proposed East-West gas pipeline between the Soviet Union and
Western Europe -- a pipeline which, when completed, would provide
the Soviet Union with huge amounts of hard currency, estimated by
some to reach $6 to $8 billion, .which in all likelihood will be
used in significant part to acquire and exploit further
Western technology for Soviet aims. In the face of such strategic
consequences, it would be disastrously short sighted to permit
the transfer of pipeline-related technology on the grounds that it
has no immediate military applications.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
320
Fifth, the strategic trade policy of the United States
does not include credit controls. Current Soviet and Warsaw
Pact shortages of hard currencies suggest that those countries
would be getting a lot less of our technology if they had to
pay for it on a cash-and-carry basis. The Subcommittee, as I '
noted earlier, has been a pioneer in terms of Senate attention
to the matter of Western credits for the East. Today the debt
of the Warsaw Pact countries to the West is about $80 billion.
Poland is unable to service its $26 billion share of that debit,
and there are increasing signs that Moscow's hard currency
shortages are mounting. The export of Western capital through
extensions of credit permits the Soviets to fortify their
military-industrial system every bit as much as the transfer of
technology. We need to develop comprehensive controls on credits
to the East and work with our allies to forge an effective multi-
lateral approach.
Chairman, there are other improvements that should be
made promptly in our national system of export controls; I
have not touched, for example, on the complex problem of enforce-
ment. I understand that our.hearings will address this matter,
But there is one aspect of the enforcement matter I should
mention. During the course of its oversight studies of tech- -
nology transfer and loss, the Intelligence Committee staff has
found that responsible intelligence and law enforcement agencies
have encountered significant difficulty in obtaining relevant
information from the Department of Commerce. The Department of
Commerce has asserted that, before this information can be
released, the Secretary of Commerce must make a special finding
in each case. The 'delays involved in these case-by-case determi-
nations by the Secretary of Commerce have significantly impeded
effective counterintelligence and law enforcement investigations,
particularly those. of the FBI. I understand that this problem is
still unresolved after months of inter-Departmental negotiation,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
321
' NEED FOR COMMITMENT
Mr. Chairman, this set of hearings will help focus top-
level attention by the Administration on these technology
transfer matters. There is, I believe, no single step that
would have greater consequences for improving our national
posture. It is unfortunately still true that there is much
that could be done here -- what is lacking, in large measure,
is the political will to do it.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
322
,-!_31afc,c; ,-5citate
WASDINGT011. D.C.
_
A/it...DI/Et, VICE,
GOVD/N,,,ITAL., Al/e/r.
1111,1_1_1C/D,C
March 8, 1982
The President
The White House
Washington, I). C.
Dear Mr. President:
Some seventeen months ago, on November 14, 1980, I
sent you a letter questioning the Carter Administration's
policy of excluding the oil and gas industry from the list
of strategic defense industries, and its policy of presuming
that licenses would be granted for the export of oil and gas
equipment. I urged you to reassess this position as part
of an overall national security assessment of the world
energy situation. As I received no acknowledgment or
response to my original letter, I am presuming that you did
not see it. It may have been held at the staff level.
Meanwhile, the potential catastrophe of Moscow's gas
pipeline to Europe underlines what I was warning about.
Tn view of the serious threat of that pipeline to U.S. and
allied interests and future security, and given your own
current consideration of U.S. policy toward the pipeline,
I want to be sure you see my original letter to you and my
recent speech to the Senate on the issue of technology transfer
and loss, during which I made that letter public.
In my speech, I summarized the danger of the pipeline as
follows:
"Only on the surface is this deal an economic
one, whereby the Western Allies provide funding and
technology in exchange for Soviet natural gas. Both
sides, in fact, are fully aware of the significant
political relationships involved. The pipeline deal
will provide Moscow with a substantially increased ?
flow of hard currency and political leverage for
years to come, and we would be reckiess to gamble
that these resources will not be used against us
and our European allies. For one thing, Moscow's
revenues from the pipeline will facilitate acquisition
in the West of sophisticated technology useful in
strengthening the Soviet military. Even without direct
Soviet action, the project creates the possibility that
significant portions of allied economies and societies
could fundamentally shift away from the West toward the
Soviet Union. There would be massive diversion of
energy-related capital, talent, and effort away from
Western economic development."
I know that at Ottawa you made known your own concerns
with the Siberian pipeline, but for one reason or another the
Administration did not get itself together for an effective
follow-up. You must be aware of the widespread dismay in
Congress that our government is still hemming and hawing about
a project that would indefinitely profit our adversary some
$7 to $8 billion in hard currency annually. This dismay on
the Hill has now boiled over into threats to "bring the boys
home from Europe," and into other isolationist portents which
you and your colleagues should be taking with utmost?seriousness.
I believe there is still time for the Administration to
rally itself against the pipeline.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
323
Specifically, I urge you to prohibit the use of any
American technology in Connection with the pipeline, to press
American lending institutions not to extend credits or other
financial assistance that might be related to this deal, and
to use your personal authority to persuade the American multi-
national oil companies involved not to participate in the
project.
We must recognize that in talking about opposing the pipe-
line we are talking about energy self-sufficiency for the
industrialized West, and so we are talking about protecting the
Western alliance, not damaging it. Therefore, I urge that you
promptly convene meetings at the highest allied levels to
develop alternatives for Western European energy. The United
States should provide substantial assistance in developing such
alternatives, including technological and financial measures.
And we should provide strong incentives for our allies to
develop Western energy supplies rather than Soviet ones.
Also, this strikes me as an opportune time to finally
recognize the strategic importance of energy supplies and to
start treating technologies and end-products related to them
accordingly. Procedurally, this would mean giving the Secretary
of Defense the same review over exports of oil and gas equipment
that he now has over strictly military exports.
It is my hope that this-letter and the enclosed material
will further encourage your personal involvement in the critical
current issues of technology transfer.
With best wishes.
Since ely yours,
Henry M. Ja kson, .S.S.
Enclosures
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
324
V. tut
xtlt C- 0?44?E,ccbi. tmo.
K "t-It Cuo.t Vt.CI..??01...
Ot.r. tGlitt
orICIt
Wt....??? V. *XII, It,
Crtifeti-,`-fcries -S err-ate
COMMITTEE ON
GOVERNMENTAL AFFAIRS
SENATE PERM ANENT SUBCOMMITTEE
ON INVESTIGATIONS
WASHINGTON. D.C. 20510
C?Jr/1.
C.:110.7.0,
ICtl.
C1Clt.stly }NI /A I...VW
November 14, 1980
The Honorable Ronald Reagan
President-elect
of the United States
901 South Highland ?
Arlington, Virginia 22204
Dear Mr. Reagan:
For several years now, the Senate Permanent Subcommittee
on Investigations has been concerned with the transfer of
technology, directly and through third parties, to the Soviet
Union and other Warsaw Pact members. Evidence adduced in the
Subcommittee's studies and hearings has demonstrated that our
policies in this area have been seriously flawed and have enabled
the Soviets and their allies to acquire technology which has
contributed significantly to their military-industrial capabilities.
The protection of our technological lead times is crucial
to the maintenance of strategic parity with the Soviets. To
achieve this objective it is necessary that the U.S. develop a
coherent, consistent and effective policy to prevent the transfer
of security-sensitive technology to our adversaries.
During the past two years, some steps have been taken in the
right direction. In 1979, Congress adopted certain amendments to
the Export Administration Act which are designed to strengthen
national security controls. Also, subsequent to the Soviet invasion
of Afghanistan, the Carter Administration took some long overdue
actions to restrict exports of high technology to the Soviets.
However, these efforts are only in their early stages. Much work
remains to be done before years of mismanagement and neglect can
be corrected. In the following I have outlined my major concerns.
1. A Clear and Comprehensive Policy
During the past decade, our strategic trade policy has
been maae on an ad hoc, license-by-license basis,, generally at a
fairly low level ingovernment. Top level policy guidance has
consisted largely of short-sighted notions of detente or trade
promotion which were not grounded in a thorough national security
assessment of technologies and their relative importance in the
military balance between the U.S. and the Soviet Union and other
adversary nations. Indeed, the government has lacked an adequate
ongoing assessment capability. As a consequence, evaluations of
technical criteria such as the military significance of the
technology and foreign availability were shaded in order to justify
license approvals or were otherwise inaccurate. The quality of
analysis has also suffered due to chronic shortages of qualified
personnel who must process over 70,000 license applications annually
within statutory deadlines.
The lack of a clear and effective policy has resulted in
other problems such as U.S. government agencies working at cross-
purposes, inconsistent decisions, uncertainty for U.S. exporters,
and the weakening of COCOM as an effective multilateral control
mechanism.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
325
- Deficiencies in controls on technology transfer have not
-been limited to the export licensing area: The U.S. has engaged -
in educational and other technical exchange programs in which the
benefits have flowed almost exclusively to the Soviets and their
East European allies. Moreover, there has been inadequate official.
review or control over the hature and extent of technology transfer
in these arrangements.
In addition, the U.S. has not had an adequate program to
enforce our export control laws, despite aggressive Soviet efforts
to acquire controlled and classified technology through clandestine
and illegal means both in the U.S. and abroad. For example, the
Defense Intelligence Agency recently told the Senate Committee on
Governmental Affairs that the Soviets and some of their allies
have acquired interests in or have established businesses in the
U.S. in order to acquire restricted technical data and equipment.
An *portant task for your Administration will be to
develop a clear export control policy based upon a comprehensive
technological assessment and to communicate that policy downward
to the officials charged with its implementation. My views as to
additional elements of this policy are discussed below.
2. The Critical Technologies Approach and the Department
? of Defense
In response to the foregoing problems, a bi-partisan
group of Senators co-sponsored my amendments to the Export
Administration Act of 1979 which gave the Secretary of Defense
the primary responsibility for identifying, militarily critical
technologies and goods and formulating controls to prevent their
transfer to our adversaries. The critical technologies approach
is intended to lead to tightened controls on know-how and to the
relaxation or modification of controls on products which do not
-transfer technology or have significant intrinsic military capability.
On October 1, 1980, the Department of Defense published its initial
version of a critical technology list. On the same day, the
Department of Energy separately published its significant input '
to the list. Significant additional technical analysis and
regulatory work is necessary before the critical technology list
can be fully integrated into the export control system, as contain-
plated by Congress.
This work should be completed on an expeditious basis so
that we Can have the kind of assessment capability necessary for
an effective policy. To do so, DoD will require adequate funding
and staffing as well as the active support of the Energy Depart-
ment and other governmental agencies and the business community.
In its fiscal year 1981 budget request, DOD asked for $2.5 million
to continue support work on this project. I am concerned by
reports that DoD is planning to allocate only half the funds
requested. I am also concerned by the failure of DoD to adequately
staff its export control activity. In view of DOD's significant
responsibilities in the strategic trade area, I believe it would
be helpful if DOD established a separate budaet line item for this
activity.
My views concerning the critical technologies project are
discussed in more detail in my letter of October 1, 1980, to the
Secretary of Defense, a copy of which is enclosed.
3. Foreign Availability-
An'important factor in determining whether to export an
item to an adversary nation is whether the item would be available
from foreign sources in sufficient quantity and quality that
denial of export would be ineffective. My 1979 amendment to the
Export Administration Act requires that any determination of
foreign availability which is a basis of a decision to approve a
license or remove a-control.on the export of a good or technology
shall be made in writing and be supported by reliable evidence.
This provision should be gtringently enforced. "
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
326
At the time of enactment, the Export Administration Act
in September 1979, neither the Commerce Department nor any other
agency of government had an adequate foreign availability assess-
ment capability. Unfortunately, this continues to be the case
today. Although the Commerce Department is assigned the primary
responsibility for coordinating the collection and monitoring of
information on foreign technology, this responsibility of necessity
must be shared by DOD, the intelligence community, and other
agencies with export responsibilities. In order to carry out
Congress's mandate, the agencies need to be mobilized and adequately
staffed and budgeted (including provision for travel funds to
investigate allegedly competitive technology).
When a good or technology which would make a significant
contribution to the.military potential of an adversary is determined
to be available from foreign sources, this should pot lead to
automatic approval of the export as has been the case too often in
the past. Instead, negotiations to secure cooperation in restricting
availability should be initiated immediately. .
If the United States resumes its position of leadership,
-I believe that our allies and friends will be inclined to cooperate
in multilateral control efforts. Should a nation refuse to cooperate
with the United States in denying alternative sources it hardly
enhances U.S. credibility to compete to sell the very item we had
argued would be contrary to our security interests for the other
nation to sell. If you determine that you need additional authority
to encourage other nations to cooperate in multilateral controls,
I would be happy to support appropriate legislation.
4. Exchange Programs
Since the invasion Of Afghanistan, the Carter Administra-
tion has imposed more stringent control on a nuaber of government-
to-government technical exchange programs with the Soviet Union.
There currently is an informal interagency body which reviews
some aspects of certain exchange programs. The scope of the body's
responsibilities needs to be expanded to assure that Soviets and
other adversaries are not gaining access to critical technologies
in private and commercial exchange programs, as well as in govern-
mental arrangements. To achieve this objective, I believe the
new Administration should formulate a policy to. guide the decision-
making of the review body. In this regard, the Soviet Union and
other adversaries should be denied technologies, if the Secretary
of Defense determines that such access would adversely affect
national security, subject, of course, to the final decision of
the President. This is consistent with the intent of Congress in
the Export Administration Act which gives the Secretary of Defense
such a veto in the licensing and control list area.
5. Enforcement
During the past several Months, the Carter Administration
has been conducting various interagency studies of-problems in
the enforcement of export control and other-laws which protect . .
controlled and classified technologies. Recently, the Department
of Commerce announced that it has stepped up its enforcement of
the Export Administration Act. However, that Department .still does
not have an adequate investigative and support staff to enable it-
to carry out an effective program. A thorough assessment of our
government-wide enforcement program is required, including the
adequacy of (a) 1-esources, (b) coordination of the U.S. agencies
internally and with foreign governments; and (c) existing legisla-.
ticn.
6. Post-Afghanistan Developments in Export Policy Toward the
Soviet Union
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
327
Since the invasion of Afghanistan, there have been a number
of changes in U.S. strategic trade policy toward the Soviet Union.
These changes are generally steps in the right direction, but I
have had some reservations. One of my broader concerns is that
the Carter Administration has suggested that these steps are
intended as a short-term response to the invasion, rather than as
part of the development of tighter control policy for the long-term.
For example, President Carter stated that he hoped that, if the
Soviets withdraw from Afghanistan, we can restore normal trade
relationship with the Soviets.
A firm and consistent policy is essential if we want our
friends and allies to take us seriously when we ask for their
cooperation. The reluctance of our COCOM allies to give specific
or formal support.to some of the recent U.S. proposals may be
attributable in important part to questions about the seriousness
and steadiness of U.S. intentions. I think it would be helpful
to the successful implementation of the new policy, if you would
tell our allies that these new policy directions represent a long-
term strengthening of U.S. controls on the transfer of security-
sensitive technology. .
I also have a number of concerns about the substance and
implementation of the new policy. -
(a) The Administration has stated that it will not
approve exports to the Soviets of items which are under
COCOM control and which require formal COCOM permission,
prior to export. But the policy provides for possible
exceptions on a case-by-case basis for spare parts for
computers and other previously exported items. -A large -
'number of spare parts cases have been held in abeyance.
I see no persuasive basis for granting exceptions for
spare parts for items which we would not presently export.
(b) The new policy provides for tightening criteria
used in reviewing applications for the export of technology,
including process know-how for plants in militarily relevant
industrial sectors (e.g., trucks, aircraft, metallurgy).
A large number of significant technology cases have not
been decided because of delays in formulating specific
criteria. Development of interim criteria should proceed
as quickly as possible so that these cases .can be decided:
Long-term criteria should be developed in the critical
technologies project.
(c) The new policy provides for careful review of
proposed exports to Eastern European countries to assess
the risk of diversion to the Soviet Union. The implementa-
? tion of this policy should be carefully examined.
(d) The Carter Administration has established a presump-
tion of denial for exports of technology for manufacturing
oil and gas production and exploration equipment. However,
I understand that no effort has been made to enlist the
support of our allies for this policy. Although the U.S:
has dominance in certain oil and gas technologies, a
multilateral approach would make the policy more effective.
The Administration has also continued its policy of
presuming approval of exports of oil and gas equipment.
I believe that the equipment policy should be reassessed
by your Administration as part of an overall national
security assessment of the world energy situation.
I am gratified by your letter of October 24, 1980, expressing
support for the Jackson-Vanik Amendment. I very much hope that
you also share my basic point of view concerning our strategic
trade policy and that your new Administration will accord this
matter a high priority.
Sincerely yours
/7)-'7
Henry M. _flacks
Vice Chairman
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
328
SENA TO
JACKSON
ews
U.S. Senator flenry M. Jackson of Washiny,ton (202) 22,19378
FOR RELEASE: P.M. 's
Thursday, February 11, 1982
TECHNOLOGY TRANSFER POLICY -- THE HIGH STAKES
Address by Senator Henry M. Jackson
U.S. Senate Floor - Thursday, February 11, 1982
Mr. President, as my colleagues are aware, my concern for the
flow of security-sensitive technology to the Soviet Union and its
allies is of long standing. For several years, the Senate Permanent
Subcommittee on Investigations, which I chaired, demonstrated through
its studies and hearings that our policies in this area have been
seriously flawed. Moscow and its associates have acquired the West's
latest technology and thereby significantly enhanced their military-
industrial capabilities. I and several others have repeatedly pressed
for tighter controls on technology transfer.
NEED FOR A CLEAR, COHERENT POLICY
On November 14, 1980, I wrote President-elect Reagan calling his
attention to this problem and suggesting several measures that merited,
his prompt consideration. I noted the lack of a clear and comprehensive
policy regarding technology transfers which had led to inadequate
technical analysis, weaknesses in export controls, serious imbalances
in rash-West exchange programs, inconsistent governmental decisions,
uncertainty for U.S. exporters, and a weakening of COCOM. I urged that
he act quickly to strengthen the government's work on critical tech-
nologies, foreign availability assessments, natiolial security safeguards
in exchange programs, cooperation with allies, and enforcement.
In the fifteen months since that letter was sent, events have
reinforced my ealier conclusion: there is much we can do, if only we
will. But we have a long way to go.
There is no longer doubt that oar technology has materially aided
Soviet expansion. It has improved Soviet weapons, intelligence devices,
and economic leverage. We are still much too far away from a vigorous
program to effectively meet the danger.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
329
MOSCOW'S GAS PIPELINE TO EUROPE
As proof, Mr. President, we need only consider the Administration's
handling of the Siberian gas pipeline project.
In my November 14, 1980 letter to President-elect Reagan, and my
enclosed letter of October 1, 1980 to Secretary of Defense Harold Brown,
I questioned the policy of excluding the oil and gas industry from the
list of strategic defense industries, and the policy of presuming that
licenses would be granted for the export of oil and gas equipment. I
urged the new Administration to reassess this position as part of an
overall national security assessment of the world energy situation.
Yet the Administration started off by approving a first shipment
of Caterpillar pipelayers to the Soviet Union. It is claimed that
these pipelayers will not be used on the West Siberian pipeline, a
generous supposition given Soviet practice of violating end-use
representations. More importantly, in licensing this equipment, the
Administration sent the signal that in principle the export of technology
and products relating to oil and gas production and shipment are not
considered strategic items.
- President Reagan at Ottawa made known U.S. concerns with the West
Siberian pipeline, but the Administration didn't get itself together
for an effective follow-up. It took the crackdown in Poland to
energize the government. And even now high officials are talking abut
the decision regarding U.S. technology and the pipeline in terms of
"weighing the damage to the Soviet Union against the damage to the
alliance."
What accounts for the confusion and the footdragging?
Because this pipeline project is supposed to be a strictly
economic arrangement? Nonsense. If it is, why have the Germans so
steadfastly.rejected serious consideration of any alternatives to
dealing with the Soviets? The United States has offered some alterna-
tives, and a pipeline to exploit Norwegian gas was also proposed. The
price of Siberian gas promises to be quite high. Furthermore, the deal
requires an enormous amount of Western credit, at a time when the German
government is joining many others in complaining about the price of
money.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
:330
Only on the surface is this deal an economic one, whereby the
Western allies provide funding and technology in exchange for Soviet
natural. gas. Both sides, in fact, are fully aware of the significant
political relationships involved. The pipeline deal will provide
Moscow with a substantially increased flow of hard currency and
political leverage for years to come, and we would be reckless to
gamble that these resources will not be used against us and our European
allies. For one thing, Moscow's revenues from the pipeline will
facilitate acquisition in the West of sophisticated technology useful
in strengthening the Soviet military. Even without direct Soviet action,
the project creates the possibility that significant portions of allied
economies and societies could fundamentally shift away from the West
toward the Soviet Union. There would be massive diversion of energy-
related capital, talent, and effort away from Western economic develop-
What we should be doing is quite plain.
?
First, we should recognize the strategic importance of energy
supplies and treat technologies and end-products related to them
accordingly. Procedurally, this means giving the Secretary of Defense
the same review over exports of oil and gas equipment that he now has
over strictly military exports.
Secondly, we should recognize that in talking about energy self-
sufficiency for the industrialized West we are talking about protecting
the alliance, not damaging it. The Administration should immediately
prohibit the use of any American technology in connection with the
pipeline. It should promptly convene meetings at the highest allied
level to develop alternatives for Western European energy. It Should
provide substantial assistance in developing such alternatives, including
technological and financial measures. And it should provide strong
incentives for our allies to develop Western energy supplies rather than
Soviet ones.
RECENT IMPROVEMENTS
Mr. President, certain developments of the past months encourage
me to hope that some effective steps will be taken, both on the
Siberian pipeline and for broader issues of technology transfer.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
331
Most importantly, key assumptions about the importance of trade
to detente are now critically questioned. During the past decade,
three Administrations acted on the assumption that increasing economic
ties with the Soviet Union would moderate Soviet behavior in ways that
would improve our security and build a peaceful world order. With this
assumption came a consistent effort to relax controls on strategic trade
with the East and to define quite narrowly what we meant by "strategic"
trade.
Today, we can view those years as a costly experiment. The results
included an increasingly adverse military balance, both strategic and
conventional; renewed Soviet military expansionism; increased Soviet
subversion in the Third World; a sharp escalation in the anti-U.S.
Soviet political offensive around the globe; and a dramatic increase in
Soviet espionage and clandestine operations against the West. Our
technology, acquired and exploited by Moscow, contributed to each of
these developments. There is now a growing awareness that our
technology in Soviet hands is a threat to our security.
Also of importance, there is a broader appreciation that the Kremlin
is determined to try to get our technology by any means available. The
public press, as well as government reports and defense estimates, have
reported how Western developments in design, materials, components,
and production have been acquired by our adversaries. The techniques
have included classical espionage as well as the evasion of export
controls through diversion, re-transfer, and the use of foreign-owned
but U.S.-chartered front corporations. The result has been weapons
aimed at us that are higher in quality, greater in quantity, more lethal
in effect, and quicker in the field than would likely have been the
case if Moscow had to rely solely on its own technical/industrial base.
The present Administration has begun some remedial action. The
Department of Defense is taking the export control problem more
seriously than before and is beginning to improve its ability to
evaluate and control critical technologies. There seems to be more
awareness in licensing decisions about the need to safeguard national
security as well as to advance commercial interests abroad. And the
intelligence community has sharpened its awareness of this threat and
has begun implementing new procedures to monitor, evaluate, and report
on technology transfers and developments.
95-929 0 - 82 - 22
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
332
CONTINUING SHORTCOMINGS
Mr. President, these new beginnings are a fragmentary start. What
is needed is a clear, comprehensive government-wide policy that frontally
addresses the hard, central issues of technology transfer and loss.
To date, the Administration has lacked the top-level conviction and
participation needed to shape such an overall policy.
Time Perspective
For one, it is not yet clear that the Administration's efforts
have deeper roots than a concern to impose sanctions. They should.
Technology transfers involve vital long-term issues of our national
security, and they should not be turned on and off for foreign policy
considerations of the moment. It may be appropriate to use normal
commercial exchanges of butter and grain to reward and punish Soviet
behavior. But national security concerns must be protected in times
of cooperation as well as strain, and judgments about the wisdom of
transferring certain technologies should be separate from the prevailing
winds of foreign policy advantage. I am not sure that we yet have a
Lire national conviction on this matter, and I am worried that our recent
efforts will not outlast the current sanctions resulting from events in
Pciland.
National Security Perspective
In this regard, it is important to emphasize that national security
involves more than strictly military considerations. The notion of
"strategic" trade needs a much broader interpretation than it received
the past ten years.
The Siberian gas pipeline is a salient example.
Even purely civilian/commercial transfers can indirectly help
increase the Soviet threat to our security. By acquiring and exploiting
Western technology, Moscow has been able to fill selectively gaps in
its industrial base and to profit from the modernizing effects of, for
example, Western microelectronic and computer technologies. It has been
able to concentrate funding and manpower on other priority projects, and
to alleviate consumer dissatisfaction. By taking Western "proven designs"
as road maps, Soviet research and development activities have saved
funds and important developmental time.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
333
Itie point is not that all trade should be stopped on national
security grounds. Many of our exchanges with the Soviets are only
remotely linked with security threats, and the level and quality of such
exchanges are the appropriate province of commercial and foreign policy
considerations. But the fact that a particular exchange involves
nominally commercial/civilian technologies does not ipso facto mean that
national security is unaffected. The key here is informed judgment
the United States needs to examine carefully the possible effects of
each proposed transfer.
Dual-use Technologies
This is particularly true for transfers involving "dual-use" tech-
nologies, items proposed for sale for civilian/economic purposes but
which could readily find military applications as well. There is now
a clear pattern of such diversions once Western technologies are in
Moscow's hands. The U.S. government allowed American business to build
the Soviets a truck plant at Kama River, somehow assuming that only
civilian trucks would be built there. As we all know, that plant builds
military vehicles as well -- some of which carried Red Army units into
Afghanistan.
Our experience with several other cases is similar. For example,
American bearing grinders licensed for sale to the Soviet Union contri-
buted greatly to various Soviet military programs:. In other cases,
we have seen that there is no real control over the use to which a
computer is put once it is under Kremlin control; that another "truck"
plant supported by American' technology produces missile launchers; and
that Soviet plants to produce farm machinery also produce weapons.
But requests for U.S. export licenses are still processed under a
system that is biased against protecting national security. The
political pressure exerted by commercial interests together with our
governmeAt's structure and system for processing such licenses
effectively create a presumption of license approval. The onus of
disapproval then falls on small, underfunded governmental units that
are asked in effect to prove that such transfers will be diverted to
military ends -- definitive proof that is often' only available once our
security has in fact been breached. Experience suggests reversing this
approach -- the risks of diversion are high, and great caution is
necessary.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
334
Allied Cooperation
I am also concerned that we have not achieved more progress toward
effective controls with our allies in COCOM. Recent discussions led
to several agreements in principle which appear to promise more vigorous
cooperation in the future. But it is particularly true of these matters
that the "devil is in the details." Alliance-level mechanisms for
oversight and harmonization of national efforts on technology transfers
are still inadequate. National-level procedures are also still quite
wo,lk: among our allies, only France has a national approach to export
licensing similar to ours in providing formally for military advice
and review.
At the same time, the inadequacy of COCOM measures has helped
corrupt our national control systems. Arguments based on the "foreign
availability" of even dual-use technologies are repeatedly and
successfully pressed within our government to permit transfers. There
is little sense in permitting transfers that could threaten our security
merely because the items could be obtained elsewhere; logic like this
would have parents supplying heroin to their children. A punitive
unilateral approach, however, risks creating a system of penalties
that would have the effect of driving high-technology firms abroad.
Daaling effectively with this type of problem requires strong allied
cooperation, which the Administration should do much more to encourage.
Other Measures
Furthermore, there is too little recognition of the fact that
problems of technology transfer and loss require more than effective
export controls. Moscow's campaign to acquire our technology is
sophisticated, diverse, and well-coordinated. opportunities are fully
exploited: visits and exchanges, exploratory contract discussions,
academic meetings and programs, public information services, and appli-
cations under the Freedom of Information Act. Covert and clandestine
methods, however, have virtually become the method of preference for
the Kremlim, apparently because they are so effective. A host of
espionage techniques are involved, including intercepting communications,
suborning or otherwise recruiting personnel, and theft and black-market
operations. And all of these techniques are in addition to the methods
I noted earlier to avoid and evade our export controls -- illegal
diversions, front and dummy corporations, and foreign re-transfers.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
335
ACTION NEEDED
.Specifically, Mr. President, I urge the following improvements and
innovations in government programs:
First: The role of the Defense Department needs to be considerably
strengthened. Responsibility for defense concerns with technology
transfer should be centralized in a policy level office with adequate
resources to discharge DOD's responsibilities regarding license appli-
cations as well as intelligence monitoring arid cooperation with our
allies. In previous years, DOD failed to'?fund its technology transfer
offices adequately to perform its statutory role. Congress should
consider this need specifically in reviewing the FY'83 budget and
earmark funds for it, preferably by establishing a separate line item.
Second: The role of the Intelligence Community should also be
strengthened. The Senate Select Committee on Intelligence, of which I
am a member, has been particularly interested in problems of technology
transfer and loss. Initiatives to improve our intelligence process in
this area have recently been undertaken by the Administration, and we
will look carefully at their budget requests and performance. Here
again, earmarked funds might prove helpful. Particularly important is
the structuring of the policy process so that coordinated, current
intelligence from the community as a whole can be brought to bear on
policy judgments about technology transfer and loss. Sound information
and analysis cannot alone ensure prudent policy decisions. but it will
help considerably.
Third: All U.S.-Soviet exahanges and agreements need to be
carefully reviewed for full reciprocity -- not just on paper, but in
practice. Academic exchanges, for example, should involve people of
comparable professional level and interests as well as simply equal
numbers. It is particularly important that we keep in mind the
difficulties posed by such exchanges and agreements for our foreign
counterintelligence programs, and that we strive to reduce the exploita-
tion of our political freedoms by hostile intelligence services.
acre, too, Congress should investigate how legislation could help to
accomplish genuine reciprocity in our dealings with the Soviet Union
and its allies. An important part of full reciprocity would be requiring
the disclosure of ownership for communist-owned U.S. chartered commercial
entities.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
336
Fourth: More far-reaching public awareness ograms need to be
imclemeuted. The FBI and Defense Department have begun awareness
programs of the hostile intelligence threat for U.S. defense contractors,
and various concerned officials have been cooperating with the press
in bringing this story to the public. Much more needs to be done,
however, particularly to make the academic community aware of the
threat from hostile intelligence agencies. Information and awareness
are more secure safeguards than censorship.
Fifth: Consistent and determined U.S. leadership is required to
forge an effective consensus on these matters within COCOM. Sustained
evidence of a serious U.S. conviction to control transfer and losses
is the key to effective allied coopiration. Both our government and
thoi governments of our allies can be victims of "union-busting"
pressuro from large commercial interests. Congress should undertake
.ngs and investigations aimed at reducing this and other obstacles
to improving COCOH'a effectiveness.
Sixth: Strategic trade polisy_ should include credit controls.
The Soviet lack of hard currency means that a great deal of the
hemorrhage of our technology might be restricted if the Soviets and
their allies had to pay for their acquisitions in cash at time of
surchase. Today the debt of the Warsaw Pact countries to the West is
ahaiL $30 billion. Poland is unable to service its $26 billion share
that debt, and there are increasing signs that Moscow's hard currency
shortages are mounting. The export of Western capital through extensions
of credit permits the Soviets to fortify their military-industrial
system every bit as much as the trassfer of technology. The United
Sfates, in concert with its allies, should begin now to develop a
multilateral approach to comprehensive controls on credit to the Soviet
daiou and its allies. This might he done under the aegis of COCOM.
Seventh: Technology transfer control considerations should be
incorporated into the design and production of sensitive advanced
products. For years, the United States government and others have
struggled with the probloms of controlling loss of selected technologies
by political and diplomatic means. Many of these problems could be
obviated at the engineering stage. Semi-conductors and integrated
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
336
Fourth: More far-reaching public awareness ograms need to be
imclemeuted. The FBI and Defense Department have begun awareness
programs of the hostile intelligence threat for U.S. defense contractors,
and various concerned officials have been cooperating with the press
in bringing this story to the public. Much more needs to be done,
however, particularly to make the academic community aware of the
threat from hostile intelligence agencies. Information and awareness
are more secure safeguards than censorship.
Fifth: Consistent and determined U.S. leadership is required to
forge an effective consensus on these matters within COCOM. Sustained
evidence of a serious U.S. conviction to control transfer and losses
is the key to effective allied coopiration. Both our government and
thoi governments of our allies can be victims of "union-busting"
pressuro from large commercial interests. Congress should undertake
.ngs and investigations aimed at reducing this and other obstacles
to improving COCOH'a effectiveness.
Sixth: Strategic trade polisy_ should include credit controls.
The Soviet lack of hard currency means that a great deal of the
hemorrhage of our technology might be restricted if the Soviets and
their allies had to pay for their acquisitions in cash at time of
surchase. Today the debt of the Warsaw Pact countries to the West is
ahaiL $30 billion. Poland is unable to service its $26 billion share
that debt, and there are increasing signs that Moscow's hard currency
shortages are mounting. The export of Western capital through extensions
of credit permits the Soviets to fortify their military-industrial
system every bit as much as the trassfer of technology. The United
Sfates, in concert with its allies, should begin now to develop a
multilateral approach to comprehensive controls on credit to the Soviet
daiou and its allies. This might he done under the aegis of COCOM.
Seventh: Technology transfer control considerations should be
incorporated into the design and production of sensitive advanced
products. For years, the United States government and others have
struggled with the probloms of controlling loss of selected technologies
by political and diplomatic means. Many of these problems could be
obviated at the engineering stage. Semi-conductors and integrated
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
338
TALKING NOTES FOR DR. LARA H. BARER, JR., TO THE SENATE PERMANENT
SUBCOMMITTEE ON INVESTIGATIONS
In my testimony today, I would like to follow up on Senator Nunn's
opening statement in which the senator constructed, for purposes of
discussion, a composite of a department within the Kremlin whose sole function
is to obtain strategic and dual-use technology from the United States, Japan,
and from other Western democracies.
In an interview published in US News and World Report on March 8, 1982,
the Director of Central Intelligence, Mr. William Casey, said:
We have determined that the Soviet strategic advances
depend on Western technology to a far greater- degree than
anybody ever dreamed of. It just doesn't make any sense for as
to spend additional billions of dollars to protect ourselves
against the capabilities that the Soviets have developed
largely by virtue of having pretty much of a free ride on our
R&D. They use every method you can imagine--purchase, legal
and illegal; theft; bribery; espionage; scientific exchange;
study of trade press, and invoking the Freedom of Information
Act--to get this information.
We found that scientific exchange is a big hole. We
send scholars or young, people 4o the Soviet Union to study
Pushkin poetry; they send a 45-year-old man out of their KGB or
defense establishment to exactly the schools and the professors
who are working on sensitive technologies.
The KGB has developed a large, independent, specialized
organization which does nothing but work on getting access to
Western science and technology. They've been recruiting about
100 young scientists and engineers a year for the last 15
years. They roam the world looking for technology to pick-up.
Back in Moscow there are 400 or 500 assessing what they might
need and where they might get it--doing their targeting and
then assessing what they get. It's a very sophisticated and
fat-flung operation.
Thus, Senator Nunn's composite is basically accurate. There are offices
and bureaus within the Kremlin, throughput the USSR, and throughout the Soviet
Bloc, whose principal purpose is to transfer high technology from the West to
the Soviet sphere of influence. I will describe several of the vehicles the
Soviets use in their efforts to obtain our strategic technology, and then give
some examples of how successful these efforts are.
Classical Espionage
The newspapers are full of accounts of how Soviet and Soviet Bloc
individdals, some of whom have diplomatic immunity, have been involved with
traditional hand-in-the-safe spy rings. We have all seen photographs in
national magazines about the communications intercept apparatus at the Soviet
embassies and consulates. These traditional methods are used primarily to
obtain high-priority technology that cannot be obtained through less risky
techniques. The effectiveness of these methods is shown by the amount of
effort the Soviets put into them and by the amount of priority they give these
activities. Such traditional theft methods are most effective at obtaining
technology that is considered most sensitive by our side.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
339
A recent trial in California gave public evidence of the extent of
Soviet Bloc efforts in acquiring information on a proposed US satellite system
at TRW, Inc. The trial of two US citizens, Christopher Boyce and Andrew
Dalton Lee, showed the extent and effectiveness of the Soviet espionage
activities. In this case, the Soviets supposedly acquired the Top Secret
details on a proposed communications system for the CIA. I an not
.knowledgeable about the classified details of the system. In this case, all I
know is what I read in the newspapers. Regrettably, such Soviet espionage
efforts are not rare.
Open Literature and the Freedom of Information Act
We live in a free society and are proud of that fact. One of our
greatest strengths is the information transfer that our Constitution allows
and that we encourage among our .own people. Tapping into this information
flow is an extremely fruitful technique for the Soviets to use. The United
States government is the focus for much of the information flow on sensitive,
high-technology items. Through use of the US government repositories set up
to handle unclassified documents and through use of the Freedom of Information
Act (FOIA) to retrieve formerly classified or currently classified documents,
foreign agents have been able to acquire information of significant strategic
value. Also of high importance is the fact that they have been able to tie up
a significant quantity of US government resources. These resources are
dedicated to answering Freedom of Information Act requests, checking for
downgrading and classification of documents, and evaluating national security
implications of compilations of documents. Many US government agencies have
had to set up offices to handle these requests and divert highly competent
people from analysis activities to evaluation of FOIA requests, some from
foreign nationals.
In our society, one of the most treasured freedoms is free speech. This
reaches its epitome in the freedom of organizations to produce periodicals
covering whatever they wish to talk about. As a result, magazines in this
country, such as Aviation Week and Spare Technology, carry a large quantity of
information of particular defense interest. While these publications do serve
an extremely useful purpose in keeping the defense community informed about
the complex activities going on in the Free World, they also provide a conduit
for information to the Soviets. Information suggests that the Soviets place a
very high priority on Western technical journals, including providing
translations in near real time with publication. In many cases, the
information available in these journals is of higher quality than that
available in government documents.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
340
Student Exchanges
As part of the spirit of detente, the US and the Soviet Union entered
into student exchange programs. This was a particular coup on the part of the
Soviets, since the best technology transfer organization in the world is the
United States university system. In the US universities, a very large number
of highly qualified, highly motivated, superbly trained people spend their
working lives trying to come up with better way5 to transfer technology to
their students. These people are called university professors. Its their
job, and they do it very well.
Currently, approximately one-half of the graduate students in the United
States are not US citizens. The non-US fraction for many science and
engineering programs is higher. Projections indicate that by 1985 at some
universities, such as the University of California at Berkeley, up to 90% of
the graduate students may not be US citizens. This is particularly worrisome'
when one considers the quality of graduate education available in the United
States.
While there are US Government restrictions on Soviet participation in
graduate programs, these restrictions are not applied as stringently to Soviet
Bloc students. Strong evidence indicates that information that is transferred
to the Soviet Bloc is immediately available to the Soviet Union. Thus, the
best in US graduate studies is available, albeit indirectly, to the Soviets.
This helps alleviate the Soviet problems with training really first-rate
engineers.
As an example of the kind of information that is available, let us
examine some Electrical Engineering programs. At several United States
universities, including MIT and Cal Tech, one can start a particular program
in Electrical Engineering with a blank notebook; at the end of one year, the
successful student will leave this particular set of courses holding in his
hand a microprocessor chip, a microprocessor being a computer on one
integrated circuit. During that year, the student will have used
computer-aided design to design the microprocessor, he will have used
computer-aided layout to lay out the processor on silicon, manufactured the
chip either in the laboratory or in collaboration with a manufacturer, tested
the circuit, packaged the circuit, mounted the microcomputer on a printed
circuit board, and made the resulting computer work. Thus, in one year, the
student will have been exposed to an intense, carefully orchestrated program
covering the United States integrated circuit industry. This would have been
done under the supervision of experts, with careful hand-holding throughout
the program to make sure that the student understood his activities.
Fortunately, evidence indicates that the number of foreign students who have
gone through these programs so far is minimal.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
341
Foreign-Owned Corporations
The tangled web of ownership of many US corporations obscures the
identity of their true owners. In the event Eastern Bloc or Soviet
corporations exist in the United States, they can be recipients of US
technology without the donors of that technology realizing that the
information is going to a foreign government. This kind of foreign ownership
of US corporations presents a potential serious hazard. I have not delved
Into this particular topic enough to give detailed examples.
Scientific Exchanges
Again, as part of detente, the US entered into several bilateral
agreements with the Soviet Union on various scientific and technical subjects,
including atomic energy. As part of these agreements, the US furnished
technical information and equipment, such as a superconducting magnet for a
Soviet magnetohydrodynamics (MHD) system. This magnet was produced with
state-of-the-art US machining and quality control equipment, and was far
beyond anything the Soviets could build for themselves. It was loaned to the
Soviets as part of an exchange agreement in return for participation in the
MHD experiments.
The loan of the magnet to the Soviets was approved after review by the
DoD, the DOE, and various intelligence agencies. It was felt that the US
would acquire, experience operating the magnet in a facility whose equivalent
would not exist in the West before 1986 or 1987. Since all the US technical
reviewers agreed that the Soviets could not reverse-engineer the magnet to
acquire the critical manufacturing ,techniques, the loan was approved.
We received some return, but, as often happens in scientific research,
not all that we had hoped for. This kind of transfer, wherein we loaned a
multimillion dollar magnet in return for intangibles, provides a source of
technical equipment to the Soviets.
Business Intermediaries
As a final area for consideration, business intermediaries--that is. US
corporations that act as intermediaries for Bloc firms without the
manufacturers being aware of such arrangements--are a major source of Soviet
covert technology acquisition. The use of these companies provides an open
conduit, lubricated by greed, for transferring immense quantities of materiel
and technology to the Bloc.
The use of business intermediaries is an especially attractive device
for the Soviets. Much of the strategic and dual-use high technology the
Soviets obtained from the US is obtained through this particular approach.
The best known--and certainly one of the most successful for the Soviet Union,
and perhaps one of the most damaging to the US--was a business intermediary
syndicate headed by a 34-year-old West German named Werner J. Bruchhausen.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
342
The Bruchhausen scheme was based on his ownership of more than. ten
electronics firms in southern California and West Germany and his close ties
to other firms elsewhere in western Europe. He would meet with Soviet and
Sr.,,iet Bloc high-technology customers, they would discuss what specific
high-technology components the Soviets needed, and Bruchhausen would then have
his companies in California buy the desired goods. Then, by use of false
shipping declarations, Bruchhausen's organization would ship the goods,
illegally, out of the United States into Western Europe. From there, they
were transshipped into the Soviet sphere.'
In 1981, the west coast part of the Bruchhausen syndicate, after at
least four years of very successful operations, was immobilized, and two of
its principals brought to trial.
Of particular interest to me in the Bruchhansen case is the information
it gives us about Soviet intentions. We delude ourselves if we think the
.Soviets enter the black market in search of strategic components in a
helter-skelter style, buying up dual-use commodities without rhyme or reason.
The truth of the matter is that the Soviets and their surrogates buy nothing
they don't have specific, well defined need for. They know exactly what they
want--right down to the model number--and what they want is part of a
carefully crafted design.
As an example of this kind of acquisition, among the strategic
components that Bruchhausen directed his accomplices at the Continental
Technology Corporation (CTC) in Southern California to buy for the Soviets
were the following:
The above list of Soviet acquisitions includes many examples, but, by no
means, is it exhaustive. The equipment detailed above was a fraction of the
exports--part of the fraction used in preparing for litigation. From personal
examination of the air-waybills, I believe that there were about six times as
many illegal exports by CTC over a 3-year period.
Because my specialty is advanced computer systems, I can see an obvious
pattern. Let's consider overall what the Soviets obtained and what use they
can make of it.
The Soviets are having serious problems. developing their integrated
circuit/microcomputer industry. These problems are centered around the areas
of process control and quality assurance. The result of such problems is a
serious lack of reliable hardware for developmental systems. The
above-mentioned items alleviate this lack by significantly contributing to the
Soviet availability of hardware for developmental and production systems. In
addition to miscellaneous, but important, hardware, the categorization of the
larger hardware--test equipment, etc.--that is in the above list, is clear.
'There is no question in my mind that the major pieces of hardware
purchased from Continental Technology Corporation over the last four years of
the corporation's operation, taken together, include at least one complete
integrated circuit processing plant. This conclusion is ineluctable when you
examine the totality of information available on the case. The Soviets
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
343
purchased everything they needed for such a plant, including: saws for
cutting silicon crystals, equipment for making masks for integrated circuit
production, plotters to draw the circuits, basic computer-aided-design systems
for integrated circuit design, diffusion ovens for circuit production,
ion-implantation systems for circuit production, photo-lithographic systems
for integrated circuit production, scribers for separating integrated circuits
on wafers, testers for testing integrated circuits on wafers, bonding
equipment for bonding connecting leads to integrated circuits, and packaging
equipment for packaging the circuits. As a result, they have purchased
clandestinely all the hardware they need for equipping a good integrated
circuit production plant. They showed minimal interest in purchasing
production hardware that was not state of the art. In summary, they showed
very good taste.
High-quality integrated circuits are the heart of modern military
electronics. Integrated circuits form the basis for military systems which
are more flexible, more capable, and more reliable than systems using discrete
electronic components. The production tooling and equipment obtained by the
Soviets from Continental Technology Corporation will significantly improve the
Soviet's capability to produce such circuits.
The Soviets purchased everything they needed for their plant, among the
many other things they bought. The sequence in which they purchased things
and the quantities indicate the production plant would be of medium size and
should be capable of delivering a 'high-quality product. There is a
significant question in my mind as to whether or not they have enough trained
people available to use this plant 24 hours per day, 7 days per week, but they
do have the hardware.
' Because of Werner Bruchhausen and his associates, the US gave up
technology, much of which the Soviets could not have obtained elsewhere. It
would have taken them considerably longer to equip the plant, if they could
have equipped it at all, with indigenous capabilities.
What is lost is lost; we cannot get it back. But there is a positive
side to the case: it is in what we can learn from it. There is a wealth of
intelligence to be learned from the Bruchhausen case. It tells us much about
Soviet shortcomings and Soviet strengths and their long-term strategic.
objectives.
Technological Development
In general, the development of a technology can be broken into several
areas: theoretical research, applied research, development, and production.
Let us examine these areas separately.
The Soviets have historically spent a large amount of their efforts
supporting theoretical research. The Academy of Sciences in the Soviet Union
is heavily populated with theoreticians. As a result, the Soviets have the
theoretical basis for almost any technology they wish to exploit. In
addition, the theoretical bases for technology in the West exist in the minds
of the theoretical scientists who develop it. Much, if not most, of this
technology is put in the open literature. Scientists would not be doing their
jobs if they didn't like to advance the cause of human knowledge. There are
many more lucrative ways to spend your life than doing theoretical research.
You don't do it if you don't want to. The way to survive doing theoretical
research is to publish. Scientists do.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
344
Experimental research has very slightly less support in the Soviet Union
than theoretical research but still, by Western standards, extraordinarily
good support. Again, experimental research in the West is done by people who
are advancing the cause of science and, for that and personal reasons, want to
and do, publish thoroughly. The Western literature is available to the
Soviets. Although their literature is carefully censored, much of it is
available to us. In the theoretical and experimental research areas, to
varying degrees, the two countries support each other.
In the area of development, the West has a tremendous lead. This lead
is enhanced by the flexibility inherent in the Western political and economic
system. Western countries are encouraged, by tax advantages and simple
self-interest, to do research into appropriate areas in order to increase
their profitability. In the Soviet system, on the other hand, the incentive
for doing broad-ranging and possibly risky research is low. The penalty for
failure is high. The penalty for failure in the US is economic and
professional, at worst. (It isn't always even that, of course.) The ready
availability of components and technology in the West encourages wide-ranging
developmental efforts. There is a true pyramiding effect--we build on each
other's work.
The Soviet system in preproduction can manage to produce a few of almost
any product they want, provided they are willing to devote the resources to
it. The best example of this would be the Soviet "civilian" space program, in
which they managed to put people in orbit before the US did, but at a high
cost.
In the area of serial production, i.e., the day-to-day production of
large quantities of a product, the differences between the two systems become
most obvious. The US is world renowned, and justifiably so, for the quality
of its serial production facilities. Other parts of the world, notably Japan,
are approaching the US quality and quantity in this area. The Soviet Bloc,
however, is not.
Serial production is the Achilles heel of the Soviet Bloc. Especially
in high technology areas, the big problem the Soviets have is quality
assurance. 'There may be aspects of the Soviet system which encourage poor
quality in their production--or rather, provide no incentive for high quality
in production. The Soviet system counts products, not quality products. The
monopolistic, centralized control inherent in the Soviet system provides no
incentive for the broad range of industrial workers to become better than
adequate at their jobs. One of the things that characterizes high-technology
fields is the need for superb manufacturing control. It is in this area that
the Soviets exhibit weakness and need the most help. As a secondary part of
this, they have serious problems manufacturing the tools to manufacture other
high-technology equipment. . This is what the Bruchhausen case helped alleviate
by providing a full complement of high-quality working production equipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
345
Available Manpower
One of the serious problems afflicting the Soviet economy is the lack of
qualified, highly-trained, technical people in the areas of computers and
microelectronics. One cause of this is the lack of enough computing and
electronic equipment to train the next generation of scientists/engineers.
They simply don't have enough equipment to allow students sufficient
"hands-on' practice at an early stage in their education. The Soviets are
trying to alleviate this problem by producing large, for them, numbers of RYAD
computers--copies of the US IBM System 360's and 370's.
Many of the export license requests, both in the US and elsewhere, are
for computer systems going to universities or scientific research institu'es
in the Soviet Bloc. It is, difficult to turn such requests down on the basis
of end-user since such organizations support the Soviet war machine only
indirectly. Cases like the Bruchhausen organization are more obvious.
Unfortunately, we are not making the most of the kinds of information
that result from episodes like the Bruchhausen case. When I brief various
parts of the Executive Branch on Soviet Bloc Computing, I find a suprising
lack of knowledge of the Bruchhausen case. Thus, one of the few examples of
effective compliance action is not widely understood.
Analysis
It is necessary that the US Intelligence Community coordinate
information derived abroad with data that surfaces here in the US. With
expert analysis, we can discern Soviet objectives in the area of strategic
commodities. When we know their objective, we can estimate what strategic and
dual-use items they are going to be in the market for, overtly or covertly,
and when we know what they are buying, we can make far better efforts to make
sure that such equipment and technology is not available to them. We need to
Integrate the data and, from our conclusions, we can then predict with a
satisfactory level of accuracy where the Soviets will be trying to tap into
technology.
One cannot prevent the dissemination of data forever. One can only slow
down a transfer and thereby make it more expensive for the adversary to
acquire the data. Eventually, the adversaries get any information they want
badly enough.
In the United States, the most advanced technology is often used in the
civilian sector. Fielded US military equipment is often many years behind its
civilian counterpart because of the need for greater reliability, delays in
the acquisition process, or for other reasons. On the other hand, the Soviet
military gets the best, most modern equipment as soon as it is available.
Thus, delays in the transfer of high technology to the Soviet Bloc affects the
military more seriously than it affects the "civilian' sector.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
346
I would like to emphasize that there is no real "civilian" sector in the
Soviet economy--it is all a State enterprise. If a plant produces civilian
shoes, and the military needs shoes, the plant's output will be modified to
fulfill the military's needs. We delude ourselves when we accept the Soviet
assurances about the "civilian" characteristics of an enterprise.
The fact that, in the long run, the information will be transferred does
not mean that we should not control it. Any obstacle we can place in the path
of technology transfer increases the amount of resources the Soviet Bloc must
devote to acquiring the information and decreases the total quantity of
information they receive. Such increases in demand on resources, albeit
increases on the seemingly inexhaustable resources of the Soviet intelligence
apparatus, are a drain on the Soviet system.
The Soviet system has difficulty in flexibly responding to new
information. As a result, the longer information is delayed, the harder it is
for the Soviets to integrate it into their production cycle. Their planning
goes on many years in advance, and the inclusion of new technology does not
automatically cause a revision in the plan. It may cause an addition to the
plan, but not necessarily a reduction in other, less productive, areas. The
highly structured environment in the Soviet Union often has a self-defeating
result: factories or enterprises will produce obsolete equipment because they
were ordered to although they have the ability to produce more modern
equipment and know about the demand for that equipment but have no authority
to produce it.
When we know better what the Soviets are attempting to acquire, we can
more effectively prevent them from succeeding. That situation is reversed
now. Many of our control efforts seem to be based on the assumption that we
can control everything. We cannot. A more thoughtful enforcement approach is
to decide which items are most important to the Soviets and focus our
attention and resources on those items.
Let as return to the Bruchhausen case for a moment. A key ingredient in
the Soviet acquired integrated-circuit manufacturing plant is a high-pressure
oxidation system. One model of this kind of system is called by the
trademarked name "Hipox." No modern integrated circuit production plant can
operate without an accurate, effective, oxidation system. The Hipcx system is
an example of the state of the art in this area. It is basically a complex
oven that precisely controls the atmosphere and temperatures involved in the
conversion of a wafer of crystalline silicon into a wafer containing several
hundred integrated circuits. Highly sophisticated integrated circuits cannot
be produced without this kind of technology.
Most high-technology components wear out over time. In fact, engineers
commonly refer to this cycle by use of the term "half-life." The half-life is
the time after which half the systems in the field will require spare parts
and/or extensive maintenance. In general, the higher the technology involved
in the system, the shorter the half-life and therefore the greater the demand
for spare parts.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
347
The Hipox systems, so essential to the new Soviet integerated circuit
factory, should begin to require spare parts within a few months after they
are installed. Such an integrated circuit plant is useless without working
high-pressure oxidation systems and the Hipox system does not work accurately,
if at all, if more than a very few of its components need repair. Such an
integrated circuit plant would be an integral part of ?the Soviets' economic
system for years into the future, and if the Hipox and other critical systems
cannot be serviced, that factory will slow down or be otherwise negatively
affected.
That tells us that the Soviets will soon be in the market for spare
parts for the Hipox systems, among others. Only a very few companies in the
world manufacture high-pressure oxidation systems. They are all in the West
and include, for example, Gasonics Corporation of Mountain View, California.
If our nation's investigative and enforcement apparatus were working as
effectively as it might, each of these companies could be put on notice to be .
on the alert for false documentation and other signs of a Werner Bruchhausen-
type business intermediary activity.
I do not mean to ?imply by my earlier remarks that many, or even more
than a few, of the US industrial manufacturers are venal or unpatriotic enough
to close their eyes to this kind of technology theft. However, they are very
busy; given prima-facie evidence of respectability, they do not often
investigate further. I have every reason to, believe that, given a proper
warning, the companies would report suspicious inquiries promptly and
effectively. In addition, suppliers to these companies can be alerted to
potential unusual requests.
This kind of precision targeting for export control requires the
availability of accurate technical evaluations of the components and systems
involved in an export or diversion. The expertise needed for these
evaluations is a scarce commodity. It is for this reason that the Department.
of Commerce continually calls upon technical experts from other agencies to
review complex export cases.,
The Assistant Secretary for Defense Programs, Department of Energy,
provides technical expertise and policy guidance to other regulatory agencies
with regard to export control matters; this service was also provided by the
DOE's predecessor agencies. For example, I am the chairman of the Technical
Task Group that is responsible for rewriting the US proposals to the
Coordinating Committee (COCOM) for international control of exports of
computers. Other National Laboratory experts chair other committees. My
group is devoted to computers and directly related items. Also, Department of
Commerce licensing officers call Laboratory experts, on a regular basis, to
request technical advice on complex export cases.
In other forums, I have proposed the establishment of a Center of
Expertise to provide a source of technical information for the various
government agencies involved in technology transfer/export control
activities. This will go far to help alleviate the scarcity of available
technical expertise.
95-929 0 - 82 - 23
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
348
In any decision to allow or to prohibit the export of a piece of
equipment, or a technology, three factors come into play.
- First are the procedural considerations: Are the forms filled
Out correctly? Are proper concurrences received? Are the overall
characteristics of the equipment within appropriate limits, etc.?
' Second is the technical evaluation of the item to be exported.
Is the system truly appropriate for the stated end-use? Are the
statements about the end-use/end-user true?
As I have previously stated, the technical evaluation of an export case
is a very complex task-,requiring a particular expertise. The technical
evaluation is best made by an individual who is technically competent in the
field and who understands the state of the art in the West and in the Soviet
Bloc. Such individuals are rare.
The third factor in implementing export controls is policy. The
policy sets the rules: what we are allowed to export, what we are not
allowed to export.
The key consideration among the three factors--procedure, technical, and
policy--is the technical evaluation. In fact, policy is usually the result of
technical evaluation. For example, a policy that includes a prohibition
against the export of certain oscilloscopes is based on the technical
evaluation of what national security uses the adversary could make of
oscilloscopes. The US is frequently criticized for having a poorly
articulated policy on export controls or, at best, an uncertain policy.
That point may not be as clear as I would like to make it. Let me try
to say it another way. I cannot overstress the importance of having an
effective system of technical evaluation. To achieve the goal of such an
effective evaluation, we must optimize three functions.
First, we must be able to look closely at a commodity and be able to
assess its capabilities in both the commercial and the military sectors.
Obviously, the knowledge of its military uses is critical. That question can
be answered only by competent technical evaluation--implying an evaluation
done by 4 technically competent analyst.
Second, we must decide whether or not the stated end-user is who the
purchase documents and export documents purport him to be. For example, is
the end-user really a tractor factory, or is it a tank factory? That question
can be answered only with competent intalligence data. The analysis of such
intelligence data requires intelligence expertise as well as technical
expertise.
Third, we must assess the adversary's capability to use the commodity in
a manner that cound harm us. That question can be answered only with detailed
technical knowledge and competent intelligence data about the adversary's
system.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
34?
I would like to conclude my prepared testimony with the recommendation
that, in evaluating export controls, the Committee take into account the very
important distinction between strategic and dual-use equipment versus
strategic and dual-use know-how. Even if our investigative and enforcement
capabilities were near-perfect, they would still be directed primarily against
equipment. In both the law, and in the Federal regulations, controls should
be strengthened with reference to the know-how that accompanies a product.
If the Soviets clandestinely acquire a piece of equipment, and the
equipment works, they have acquired a capability that presumably they did not
have before. Along with that equipment, especially if it is high-technology
equipment, they need the technical data that goes with it. They need the
technical manuals that support the product; they need the technical art that
enhances the equipment. ,In many ways, it may be difficult to control the
shipment of technical manuals that accompany manufactured equipment. However,
I believe that we can control the art and the support that goes with legally
acquired equipment. Showing the Soviets how to make the rope with which to
hang us does not strike me as a reasonable approach for the US to take.
I thank you very much for the opportunity to testify, and I hope that my
testimony has been useful to you.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
350
RESUME' OF DR. LARA H. BAKER, JR.
He received a Bachelor of Science in Civil Engineering, Master
of Science in Civil Engineering, and Doctor of Science Degree in
Environmental Engineering, all from New Mexico State University,
the last degree being granted in 1970. He is a Registered
Professional Engineer in the State of New Mexico. Since 1968 he
has been employed by the Los Alamos National Laboratory in the
Engineering Department and in the International Technology
Office. Since 1975 he has been involved half-time or more in the
area of Critical Technologies and Technology Transfer. Since 1972
he has been involved in the detailed study of Soviet Computing
Capabilities, and the study of Soviet Bloc Computing
Capabilities. He is a member of the Computer Systems Technical
Advisory Committee, a statutory committee which reports to the
Department of Commerce and to the United States Congress on
matters involving the export control of digital computers and
digital computer components. He is the DOE representative on
technology tasks groups which define the US position on the export
control of computers and which define and evaluate the rationale
for the US position.
Since 1975 he has been actively involved in export case
determinations, both for the Department of Energy and the
Department of Commerce, and in evaluating the technical risks and
merits of various export proposals. These cases, at the rate of
200 to 400 per year, involve everything from integrated circuits
through spare parts and components, through complete computer
systems, through supercomputer systems.
He has been an Adjunct Professor of Electrical and Computer
Engineering at the university of New Mexico since 1969. He
teaches Graduate Computer Science, Computer Architecture, Computer
Programming, and Computer Graphics. He has presented invited
papers at the National Computer Conference and other national
conferences. He is a member of the Association for Computing
Machinery, of the Computer Society of the Institute for Electrical
and Electronic Engineers, and various other professional and
honorary organizations. He has presented briefings on Soviet Bloc
Computing to staffs and members of Congress, throughout the
Executive Branch of the US Government, and to non-government
agencies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
351
RESPONSES OF LARA H. BARER, JR., TO THE CUSTOM BUREAU, REGARDING THE
CONTINENTAL TECHNOLOGY CORPORATION CASE
CTC Invoice Number: 21 021
Manufacturer: INTEL Corporation
x
The commodity on this invoice is the INTEL System 80/20-4, a single
board microcomputer. Single board computers/microcomputers have many
commercial applications, principally in original equipment manufacturer (OEM)
applications where they are used as the controlling part of other equipment
such as a sophisticated sewing machine, a sophisticated machine tool, or a
sophisticated piece of automatic test equipment. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 037
INTEL Corporation
The commodity on this invoice is a Programmable Read Only Memory (PROM)
expansion board for single board computers. The board provides 16K (K = 1024)
bytes of programmable, non-erasable, memory for a microprocessor system.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products would match the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
Unknown
INTEL Corporation
The commodity on this invoice is an optical isolator board, i.e. a
printed circuit board containing circuitry to isolate the input from the
output electrically. This kind of circuitry is normally used in a very high
noise environment, such as a real time military system or a civilian system
involved with aircraft or other transporation equipment.
This board is used with single board computer microprocessor systems.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 010
Manufacturer: Unknown
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
352
The commodities on this invoice are involved with single board
computers. They are the central processor with 4K (K = 1024) bytes of
read/write memory, analog input/output, that is boards for connecting to
non-digital environments, and a Direct Memory Access (DMA) controller. These
commodities are used as parts of single board computer systems. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
1194
INTEL Corporation
The commodity on this invoice is an analog input/output board which is
used to connect single hoard computers to the outside world. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 004
Manufacturer: INTEL Corporation
The commodities on this invoice are a single board computer with analog
input/output to connect to the outside world and with Direct Memory Access
(DMA) for high speed memory access. These particular commodities taken
together provide the basis for a workable control system for a relatively
small piece of equipment such as a gun firing system or a radar. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 033
INTEL Corporation
The commodity on this invoice is a universal prototype board which is
used in the design and development of applications for microcomputer systems.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 016
INTEL Corporation
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
353
The commodity on this invoice is a high speed arithmetic board used with
single board computers. It has particular application in military and
civilian signal processing applications. Single board computer/microcomputer
systems are used in most advanced weapons systems throughout the free world,
particularly in missile and aircraft systems. Their use provides a
significant increase in effectiveness with an equally significant reduction in
weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 064
Manufacturer: INTEL Corporation ?
The commodity on this invoice is a relatively small single board computer
with 1K (K S. 1024) Bytes of random access memory (RAM) and 8K Bytes of
programmable read only memory (PROM). Single board computer/microcomputer
systems are used in most advanced weapons systems throughout the free world,
particularly in missile and aircraft systems. Their use provides a
significant increase in effectiveness with an equally significant reduction in
weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 066
INTEL Corporation
The commodity on this invoice is a 64K (K = 1024) byte random access
memory (RAM) with a speed of 700 nanoseconds (ns) per access. This board
would be used in the design, development, and use of microcomputer systems.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 065
Manufacturer: INTEL Corporation.
The commodities on this invoice are equipment for use in developing
microcomputer systems. They include an interface and execution modeling
package as well as a universal PROM (programmable read only memory)
programmer. Single board computer/microcomputer systems are used in most
advanced weapons systems throughout the free world, particularly in missile
and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 011
Manufacturer: INTEL Corporation
The commodities on this invoice are peripherals and equipment used with
microcomputer development systems. They would be embargoed because of their
direct applicability to microcomputer development systems, an embargoed
function. Single board computer/microcomputer systems are used in most
advanced weapons systems throughout, the free world, particularly in missile
and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
354
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 043
Manufacturer: INTEL Corporation
The commodities on this invoice are peripherals and equipment to be used
in developing microcomputer systems. They include an in-circuit emulator,
universal PROM (programmable read only memory) programmers, and a chassis for
mounting the above equipment. Single board computer/microcomputer systems are
used in most advanced weapons systems throughout the free world, particularly
in missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 006
Manufacturer: INTEL Corporation
The commodities on this invoice are used in microcomputer design and
development. One of the commodities is a very high speed (60 nanosecond) 46
(K 1024) bit Programmable Read Only Memory (PROM). One is a programmable
interface for a microprocessor development system, the others are accessories
for this effort. Single board computer/microcomputer systems are used in most
advanced weapons systems throughout the free world, particularly in missile
and aircraft systems. Their use provides .a significant increase in
effecti.eness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 009
Manufacturer: INTEL Corporation
The commodities on this invoice are peripheral integrated circuits for use
with microprocessor/ndcrocomputers. These circuits are particularly useful
for increasing the utility of microprocessors of the 8080 Family. Single
board computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21-017
Manufacturer: INTEL Corporation
The commodities on this invoice are microprocessors and other circuits.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
CTC Invoice Number:
Manufacturer:
355
21 002
INTEL Corporation
The commodities on this invoice are peripheral integrated circuits for use
with 8080 microprocessor systems. Single board computer/microcomputer systems
are used in most advanced weapons systems throughout the free world,
particularly in missile and aircraft systems. Their use provides a
significant increase in effectiveness with an equally significant reduction in
weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 007
Manufacturer: Motorola Incorporated
The commodity on this invoice is a very high speed (15 nanosecond cycle)
64 bit capacity random access memory (RAM). This speed of RAM would normally
be used in the central processor of a general purpose computer for civilian
applications, or in military hardware that probably incorporates a
microcomputer and is used particularly for signal processing. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: Unknown
Manufacturer: INTEL Corporation
The commodity on this invoice is a 2K (K = 1024) bit erasable programmable
read only memory (EPROM) which is rated for military temperature ranges (minus
650C to plus 1250C) and is packaged in a metal can. The components with
this kind of temperature range and packaging have essentially no civilian
applications; their military applications tend to be aerospace uses. Single
board computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 005
Motorola Incorporated
The commodities on this invoice are extremely high speed memory devices
used in the design and development of military microcomputer controlled
equipment. The random access memories (RAM's) are 256 bits in capacity and
15-26 nanosecond speeds. The quantities involved in this shipment imply use
in a production system, rather than in a development system. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
356
CTC Invoice Number: 8019
Manufacturer: INTEL Corporation
The commodity on this invoice is a 2048 bit, one microsecond cycle,
erasable programmable read only memory (EPROM). This equipment is designed
for use in developing microcomputer systems. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would match the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also match the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 051
INTEL Corporation
The commodities on this invoice are integrated circuits of differing
compositions. The HM-1-7460-5 is a 4096 bit, 60 nanosecond cycle programmable
read only memory (PROM). This circuit: is extremely fast and is designed for
production versions of microcomputer systems. Civilian use of a circuit of
this speed would be unusual, except in systems with extraordinary speed
constraints. Single board computer/microcomputer systems are used in most
advanced weapons systems throughout the free world, particularly in missile
and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 087
Manufacturer: Motorola Incorporated
The commodity on this invoice is an extremely high speed random access
memory (RAM). The devices have a capacity of 64 bits and a speed of 15
nanoseconds. The quantity, 5,000, implies their use in a production system,
rather than in a development system. Such devices are normally used as
registers in general purpose computers and in military systems as part of
signal processing hardware. Single board computer/microcomputer systems are
used in most advanced weapons systems throughout the free world, particularly
in missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 8007
Manufacturer: INTEL Corporation
Tho commodity on this invoice is a 2048 bit erasable programmable read
only memory (EPROM). At a cycle time of 650 nanoseconds, this EPROM is
normally used in microprocessor development systems. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products match the state of the art of new designs in the destination country,
as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
357
CTC Invoice Number: 1196
Manufacturer: Motorola Incorporated
The commodity on this invoice, a 64 bit capacity, 15 nanoseconds cycle,
random access memory (RAM), is normally used as high speed registers in the
central processor of a general purpose computer or for high speed data storage
in military signal processing computers. The extremely high speed of this RAM
implies equipment of significant processing capability. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 031
Manufacturer: INTEL Corporation
The commodities on this invoice are integrated circuits used in' the design
and development of microcomputer systems. Both pieces of hardware are
extremely fast, one being a 4096 bit programmable read only memory (PROM),
with a cycle of 70 nanoseconds, the other a 4096 bit random access memory
(RAM) with a cycle of 250 nanoseconds. Both these devices are used in
microcomputer systems. Single board computer/microcomputer systems are used
In most advanced weapons systems throughout the free world, particularly in
missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 015
Manufacturer: INTEL Corporation
The commodities on this invoice are microprocessors and integrated
circuits associated with microprocessor development systems. Some of the
integrated circuits are particularly fast, 70 nanoseconds, 4096 bit
programmable read only memories (PROM's), most of the rest are peripheral
circuits designed to support microprocessor systems. Single board
computer/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21-013
Manufacturer: INTEL Corporation
The commodities on this invoice are integrated Circuits of varying
capacities. One of the circuits is a military-temperature-range-approved
integrated circuit in a ceramic package, a circuit particulary designed for
immediate use in military systems. Another circuit is an extremely fast (70
nanosecond) 4096 bit programmable read only memory (PROM) which is used in
microcomputer systems and microcomputer systems developments. The other
integrated circuits are faster than would normally be approved for export.
Single board computer/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
358
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1152
Manufacturer: Various, including INTEL Corporation
The commodities on this invoice are integrated circuits and other
components, principally high speed, low powered, devices used in
microprocessor/microcomputer systems, but also used in several other kinds of
electronic hardware. The variety of the equipment in this list suggests it is
a list of spare parts for other equipment. Most of the integrated circuits on
the list are not approvable for export.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. Some of
the products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
CTC Invoice Number: 21 032
Manufacturer: Rockwell International
The commodity on this invoice is used in the design and development of
bubble memory systems. These memory systems are used in microcomputers as
mass storage and in aircraft, and spacecraft as replacements for tape
recorders.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also match the state of the art of new designs in the destination
country, as of the time of shipment.
The technical data snipped with these bubble memory boards is not
approvable for shipment under the technical data regulations.
CTC Invoice Number: 1146
Manufacturer: Unknown
The commodity on this invoice is used in the manufacture of computer discs
and would be embargoed for that reason. The equipment is within the state of
the art of the equipment being manufactured in the destination country, as of
the time of shipment. It has no direct civilian or military application
outside of the manufacture of computer equipment.
CTC Invoice Number: Unknown
Manufacturer: Unknown
This equipment appears to be spare parts and tooling for use in
manufacturing computer disc drives and, as such, is embargoed. The equipment
is within the state of the art of equipment being manufactured in the
destination country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
1137
Unknown
The commodity on this invoice is used in the manufacture of magnetic discs
for use on computer systems, and as such, it is embargoed under CCL 1355.
lhis equipment matches the state of the art of equipment being manufactured in
the destination country, as of the time of shipment.
The equipment has no direct military or civilian application except in the
manufacture of computer discs.
CTC Invoice Number: 7039
Manufacturer: Various, including Hewlett Packard
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
359
The commodities on this invoice are equipment used in the manufacture and
test of integrated circuits. As such, it is embargoed under CCL 1355. They
are applicable to microcomputer systems. This type of equipment is often a
bottleneck on a production line for integrated circuits. The lack of fast and
accurate test equipment can virtually shut down a production facility. Often,
the throughput of the test equipment is the controlling factor in the
productivity of a plant. The test equipment can test integrated circuits for
military use equally as well as it can test circuits for civilian use.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
22 005
Unknown
The commodity on this invoice is used in checking the integrity of coaxial
cables. Coaxial cables have extensive use in radar and in signal processing
systems for the military. The need for ensuring the integrity of these
systems is very high. As a result, these commodities have direct military
application. They exceed the state of the art of equipment being manufactured
in the destination country, as of the time of shipment.
CTC Invoice Number: 8015
Manufacturer: Gasonics Corporation
The commodities on this invoice are a high pressure oxidation system used
In the manufacture of integrated circuits. This is the standard method of
high speed, high quality integrated circuit production in the United States.
Integrated circuits are used in virtually all modern civilian and military
high technology systems. The technology to produce integrated circuits is
embargoed because of the inability to differentiate between equipment that
produces civilian integrated circuits and equipment that produces military
integrated circuits, principally because there is no difference in the
equipment.
The products on this invoice far exceed the state of the art of equipment
being manufactured in the destination country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
8014
Gasonics Corporation
The commodities on this invoice are a high pressure oxidation system used
in the manufacture of integrated circuits. This is the standard method of
high speed, high quality integrated circuit production in the United States.
Integrated circuits are used in virtually all modern civilian and military
high technology systems. The technology to produce integrated circuits is
embargoed because of the inability to differentiate between equipment that
produces civilian integrated circuits and equipment that produces military
integrated circuits, principally because there is no difference in the
equipment.
The products on this invoice far exceed the state of the art of equipment
being manufactured in the destination country, as of the time of shipment.
CTC Invoice Number: 8021
Manufacturer: Gasonics Corporation
The commodity on this invoice is the technical data for the Hipox
oxidation ovens referred to in the previous two entries. This technical data
is embargoed by technical data regulations and far exceeds the data available
on production or design systems in the destination country, as of the time of
shipment.
CTC Invoice Number: 2049
Manufacturer: Rockwell International
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
360
The commodities on this invoice are bubble memory chips and bubble memory
controller chips. These integrated circuits are used in equipment as mass
memory for microcomputers and as replacements for tape recorders in military
and space related systems. Single board computer/microcomputer systems are
used in most advanced weapons systems throughout the free world, particularly
in missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 044
Manufacturer: INTEL Corporation
The commodities on this invoice are microcomputer development systems.
They are used to develop microprocessor/microcomputer systems for civilian and
military applications. Single board computer/microcomputer systems are used
in most advanced weapons systems throughout the free world, particularly in
missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 035
INTEL Corporation
The commodities on this invoice are microprocessor development systems.
They are used to develop microcomputer/microprocessor systems for civilian and
military applications. Single board computer/microcomputer systems are used
in most advanced weapons systems throughout the free world, particularly in
missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 012
Manufacturer: INTEL Corporation
The commodities on this invoice are microcomputer development systems.
They are used to develop microcomputer/microprocessor systems for civilian and
military applications. Single board computer/microcomputer systems are used
in most advanced weapons systems throughout the free world, particularly in
missile and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
21 024
INTEL Corporation
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
361
The commodities on this invoice are microcomputer development systems.
These are used for the development of microprocessor/microcomputer systems for
civilian and military applications. Single -board computer/microcomputer
systems are used in most advanced weapons systems throughout the free world,
particularly in missile and aircraft systems. Their use provides a
significant increase in effectiveness with an equally significant reduction in
weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1155
Manufacturer: INTEL Corporation
The commodities on this invoice are microcomputer development systems.
These are used for the development of microprocessor/microcomputer systems for
civilian and military applications. Single board computers/microcomputer
systems are used in most advanced weapons systems throughout the free world,
particularly in missile and aircraft systems. Their use provides a
significant increase in effectiveness with an equally significant reduction in
weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
.products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
8051
Fairchild Instrument Corporation
The commodity on this invoice is a test system for the production testing
of integrated circuits. This test system is necessary and critical for the
test of civilian or military microcircuits. This is an area in which the
destination country falls far behind the United States in capability, and the
test system is applicable to integrated circuits for military applications.
Single board computers/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1014
Manufacturer: Fairchild Instrument Corporation
The commodities on this invoice are spare parts and extensions for the
Fairchild Xincom test systems referred to on CTC Invoice number 8051, among
others. As such they continue and enhance the capabilities of the
microprocessor test system previously referred to.
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
CTC Invoice Number: 1016
Manufacturer: Fairchild Instrument Corporation
The commodities on this invoice are spare parts and extensions for the
Fairchild Xincom test systems referred to on CTC Invoice number 8051, among
others. As such they continue and enhance the capabilities of the
microprocessor test system previously referred to. ,
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
362
CTC Invoice Number: 1017
Manufacturer: Fairchild Instrument Corporation
The commodities on this invoice are spare parts and extentions for the
Fairchild Xincom test systems referred to on CTC Invoice number 8081, among
others. As such they continue and enhance the capabilities of the
microprocessor test system previously referred to.
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
CTC Invoice Number: 8071
Manufacturer: Fairchild Instrument Corporation
The commodity on this invoice is a test system for the production testing
of integrated circuits. This test system is necessary and critical for the
test of civilian or military microcircuits. This is an area in which the
destination country falls far behind the United States in capability, and the
test system is applicable to integrated circuits for military applications.
Single board computers/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1091
Manufacturer: Fairchild Instrument Company
The commodity on this invoice is a test system for the production testing
of integrated circuits. This test system is necessary and critical for the
test of civilian or military microcircuits. This is an area in which the
destination country falls far behind the United States in capability and the
test system is applicable to integrated circuits for military applications.
Single board computers/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1040
Manufacturer: Fairchild Instrument Corporation
The commodity on this invoice is a test system for the production testing
of integrated circuits. This test system is necessary and critical for the
test of civilian or military microcircuits. This is an area in which the
destination country falls far behind the United States in capability, and the
test system is applicable to integrated circuits for military applications.
Single board computers/microcomputer systems are used in most advanced weapons
systems throughout the free world, particularly in missile and aircraft
systems. Their use provides a significant increase in effectiveness with an
equally significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 073 -
Manufacturer: California Computer Products
Incorporated
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
363
The commodity on this invoice is a complete off-line high-precision flat
bed plotter system. The plotter involved, the CALCOMP-748 plotter, is precise
enough and big enough to directly draw the masks needed for integrated circuit
production. For that reason the plotter associated equipment is embargoed.
The integrated circuits produced with masks drawn on this plotter can be used
for civilian or military applications and as such are embargoed.
The products exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 074
Manufacturer: California Computer Products
Incorporated
The commodities on this invoice are accessories for the high precisionc
plotter referred to on CTC Invoice number 21 073. As such they are embargoed
for that application. These particular pieces of equipment are within the
state of the art of the country of destination, however, they could not be
shipped as part of the plotter system.
CTC Invoice Number: 21 075
Manufacturer: California Computer Products
Incorporated
The commodities on this invoice are spare parts for the plotter referred
to on CTC Invoice number 21 073. As such they would be embargoed because of
the direct military application of the plotter. The parts themselves may be
embargoed because they contain embargoed technology. These products would
exceed the state of the art of equipment being manufactured in the destination
country as of the time of shipment.
CTC Invoice Number: 22 004
Manufacturer: Tektronics Incorporated
The commodity on this invoice is an extremely high speed (350 megahertz)
oscilloscope with direct military applications in nuclear weapons testing, in
high speed signal processing systems, and in other high speed electronic
applications. This product exceeds the state of the art of equipment being
manufactured in the destination country as of the time of the shipment.
The product matches the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1188
Manufacturer: Tektronics Incorporated
The commodities on this invoice are accessories for the high speed
oscilloscope referred to on CTC Invoice 22 004. As such they are embargoed.
These products exceed the state of the art of equipment being manufactured in
the destination country as of the time of shipment. The products also exceed
the state of the art of new designs in the destination country, as of the time
of shipment.
CTC Invoice Number: 1003
Manufacturer: Data General Corporation
The commodity on this invoice is a complete Data General Eclipse S/230
digital computer with substantial peripheral and input/output communication
equipment. This general purpose computer could be licensed if a license were
apdlied for and certain characteristics of the computer were deleted. As a
general purpose computer it is applicable to many civilian and military
applications. This particular configuration seems applicable to the control
and monitoring of the manufacture of integrated circuits.
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
CTC Invoice Number: 21089
Manufacturer: Data General Corporation
g5-g29 0 - 82 - 24
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
364
The commodities on this invoice are accessories and spare parts for the
Eclipse 5/230 computer referred to on CTC Invoice Number 1003. They would be
embargoed as spare parts for an embargoed computer. These products are within
the state of the art of equipment being manufactured in the destination
country as of the time of shipment.
CTC Invoice Number:
Manufacturer:
1131
Data General Corporation
The commodity on this invoice is a complete Data General Eclipse 5/230
computer with a very large amount of accessory hardware and software. This is
a medium size general purpose computer that is applicable to large numbers of
civilian and military general purpose applications. This size machine, with
the standard characteristics of the Eclipse 5/230, would not be approvable for
export. It contains characteristics such as a writeable control store, which
are not within the allowable limits because of the direct military application
of redesigning the system. This product exceeds the state of the art of
equipmrit being manufactured in the destination country, as of the time of
shipment.
CTC Invoice Number:
Manufacturer:
1186
Unknown
The commodity on this invoice is a time delay reflectometer (TOR) cable
tester. As such it is used for testing the integrity and utility of coaxial
cables. Coaxial cables are intergral parts of military systems such as radars
and military avionics systems. These cables are also used in civilian
applications involving high frequency electronics.
This product would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
product also exceeds the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 1201
Manufacturer: Rockwell International
The commodities on this invoice are bubble memory and bubble memory
controller circuits. Bubble memories are used as replacements for tape
recorders on military aircraft and satellites. Bubble memories are also used
as bulk memory for microprocessors/microcomputer systems. Single board
computers/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number: 21 029
Manufacturer: Rockwell International
The commodities on this invoice are bubble memory and bubble memory
controller circuits. Bubble memories are used as replacements for tape
recorders on military aircraft and satellites. Bubble memories are also used
as bulk memory for microprocessors/microcomputer systems. Single board
computers/microcomputer systems are used in most advanced weapons systems
throughout the free world, particularly in missile and aircraft systems.
Their use provides a significant increase in effectiveness with an equally
significant reduction in weight and power consumption.
These products would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. The
products also exceed the state of the art of new designs in the destination
country, as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
365
CTC Invoice Number: 21 086
Manufacturer: Rockwell International
The commodity on this invoice is bubble memory chip. Bubble memories are
used as replacements for tape recorders on military aircraft and satellites.
Bubble memories are also used as bulk memory for microprocessors/microcomputer
systems. Single board computers/microcomputer systems are used in most
advanced weapons systems throughout the free world, particularly in missile
and aircraft systems. Their use provides a significant increase in
effectiveness with an equally significant reduction in weight and power
consumption.
This product would exceed the state of the art of equipment being
manufactured in the destination country, as of the time of shipment. This
product also exceeds the, state of the art of new designs in the destination
country, as of the time of shipment.
CTC Invoice Number:
Manufacturer:
2059
Memorex Corporation
The commodities on this invoice are very high speed, high capacity disc
storage modules and controllers. These controllers are used as auxiliary
storage on general purpose computers. Because their speed and capability make
them applicable to nuclear weapons design, and to other large hydrodynamics
calculations, such equipment is not available for export. These products far
exceed the state of the art of equipment being manufactured in the destination
country as of the time of shipment.
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
CTC Invoice Number: 4004
Manufacturer: Tamarack Scientific Corporation
The commodity on this invoice is a contact printer used for reproducing
the masks used in integrated circuit manufacturing. It includes ultraviolet
lighting systems, which are at the state of the art of United States
production equipment. This product is used directly in the manufacture of
integrated circuits for civilian and military applications. It is not
exportable because of the direct military utility of the equipment produced by
the product. These products far exceed the state of the art of equipment
being manufactured in the destination country as of the time of shipment.
The products also exceed the state of the art of new designs in the
destination country, as of the time of shipment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
366
STAFF STATEMENT OF
FRED ASSELIN, INVESTIGATOR
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
UNITED STATES SENATE
MAY), 1982
Mr. Chairman, I am Fred Asselin. I am an investigator on the Minority
staff of the Senate Permanent Subcommittee on Investigations. Since 1969, I have
been associated with the Subcommittee either on a full time basis as a Staff
Investigator, or on loan from the personal staff of former Senator Ribicoff.
Under the Export Administration Act, the U. S. Department of
Commerce, through its Office of Export Administration, has jurisdiction over most
non-classified exports from the United States, its territories and possessions.
The Export Administration Act was passed in 1949 and has been renewed
several times since then, the most recent instance being passage of the Export
Administration Act of 1979. The Act will expire on September 30, 1983.
Mr. Chairman, 1 request that the Export Administration Act of 1979 be
received as an exhibit to these hearings and that it be printed as an appendix to the
hearing volume.
Enforcement of the Export Administration Act is carried out by the
Compliance Division of the Office of Export Administration.
The Compliance Division has three Branches -- Investigations, Intelligence
and Facilitation (Inspections).
The Minority staff of the Subcommittee has made an evaluation of the
effectiveness of the Compliance Division. An assessment of Compliance Division
resources and procedures was made. The Minority staff interviewed current and
former executives of the Division, and current and former Special Agents of the
Division. Also interviewed were law enforcement personnel from other agencies,
government intelligence officials and officials of agencies whose mission brings
them in contact with the Compliance Division.
Uppermost in our minds as we made this evaluation were the national
security implications of the responsibility vested in the Compliance Division. The
Export Administration Act itself spells out that national security responsibility
when it says that export controls shall be used?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
367
. . . to restrict the export of goods and technology which
would make a significant contribution to the military potential
of any other country or combination of countries which would
prove detrimental to the national security of the United States
The national security implications of the enforcement mechanism are
stated at another point in the statute when it is asserted that:
Exports of goods or technology without regard to whether
they make a significant contribution to the military potential of
individual countries or combinations of countries may adversely
affect the national security of the United States.
In addition to measuring the effectiveness of the Compliance Division in
terms of its role as an organization pledged to protect the national security, the
Minority staff evaluated the Compliance Division in terms of its being a law
enforcement entity.
It is apparent that the Commerce Department views the Compliance
Division as a law enforcement organization. Its professional personnel, who carry
the title of Special Agent, are classified as Series 1811 federal criminal
investigators. The 1811 series of federal criminal investigator is the classification
that Customs Service and drug enforcement agents and many other federal
criminal investigators are under.
The information that the Minority staff has gathered about the
Compliance Division was compared to official pronouncements which the
Department of Commerce has made about the Division -- in testimony before
Congress and in annual reports to Congress. In this regard, sources included, but
were not limited to, 1) the testimony of William V. Skidmore, Director of the
Office of Export Administration, before the Subcommittee on International
Economic Policy and Trade of the House Committee on Foreign Affairs, on March
26, 1982; 2) the Export Administration Annual Report for Fiscal Year 1980,
submitted to the Speaker of the House and the President of the Senate in February
of 1981; and 3) the Export Administration Annual Report for Fiscal Year 1981
submitted to the House and Senate in February of 1982.
Mr. Chairman, I request that these three documents be received as
exhibits to these hearings.
The investigation, which lasted more than one year, resulted in a series of
preliminary findings, which are now submitted to Subcommittee Members for their
consideration. It is our recommendation that subsequent witnesses to these
hearings from the law enforcement and national security fields be asked to
comment on the Minority staff's preliminary findings.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
368
1. Past Departmental Statements To Congress
In the staff inquiry we found that the Commerce Department has
overstated the effectiveness of the Compliance Division to the Congress. Whether
through deliberate action or through inadvertence, the Commerce Department has
portrayed the Compliance Division as if the Division were competently organized
and adequately staffed to enforce the Export Administration Act export controls
provisions. By contrast, our investigation found that the Compliance Division is not
effective. It is an understaffed and poorly equipped and, in certain instances,
undertrained and unqualified investigative and intelligence unit.
In his testimony before the House Subcommittee, Skidmore said that
Commerce Department officials "regard the enforcement program as an integral
part of the export control system," and that his Department's policy was to
"marshal our limited resources to exact maximum compliance with the law."
It is useful to note Mr. Skidmore's reference to "limited resources"
because the staff also will underscore the limited nature of the Commerce
Department's commitment to enforcing export controls. Moreover, the staff
inquiry concluded that the Department's commitment to export controls
enforcement is so limited, in fact, that it is impossible to expect "maximum
compliance with the law." It is optimistic to expect very much compliance at all.
In his testimony, Mr. Skidmore described the Facilitation or Inspection
Branch of the Compliance Division as being "staffed by inspectors, export control
specialists and document examiners." Then he added:
Inspectors examine cargo about to be exported from the
United States. If a suspected violation is identified, the
shipment is detained until our export control specialists can
make a determination about the legality of the export. If there
is no violation, the goods are released. Generally, those
shipments found to be in violation of the law are seized by the
U. S. Customs Service at our request. This Branch also reviews
Shipper's Export Declarations forwarded to the Compliance
Division from the Bureau of the Census. All illegal exports
detected by the Facilitation Branch are referred to the
Intelligence Branch for evaluation to determine whether further
investigation is necessary.
Our staf f investigation revealed the number of inspectors for the entire
nation is five or six ? and five of them are located at the John F. Kennedy
International Airport in New York. On a rotating basis, one of the five inspectors
is on travel much of the time, trying to conduct inspections for the rest of the
nation. Some airports and seaports never are visited by Commerce Department
inspectors in the course of a year. Other exit ports are visited one week a year. A
sixth inspector is in the Washington, D. C. area.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
369
The Compliance Division's five inspectors are grades 5, 7 and 9.
In fiscal year 1980, according to the Export Administration's annual report
to Congress, the Compliance Division reviewed 190,484 Shipper's Export
Declarations, or SEDs. The next year, according to the FY 81 report to Congress,
the number of SEDs reviewed increased to 230,154. These figures need to be seen
in perspective. The Department could have pointed out that about 9 million SEDs
are filed a year. That means that, while Commerce Department inspectors
reviewed 230,154 SEDs in the reporting period, they did not review about 8.7
million more.
Nor is it apparent the manner in which the SEDs were reviewed. Mr.
Skidmore testified about the SEDs being forwarded to the Compliance Division
from the Census Bureau. SEDs that arrive at Commerce through that route are at
least one month old; it takes that long for Census tabulators to key the data from
the SEDs into computers. With information from the SEDs being at least a month
old, it is likely that most shipments already have departed and been taken custody
of by the ultimate consignee overseas.
Conversely, the Chief of the Inspection Branch told the Subcommittee
staff that SEDs are reviewed by his inspectors at the airports and ports. His
explanation is more in keeping with this language from the FY '81 annual report to
the Congress:
. . . the Compliance Division reviewed 230,154 Shipper's
Export Declarations and identified 10,649 apparent
discrepancies requiring further inquiry or inspection; 10,369 of
these resulted in the physical examination of export cargo.
If the SEDs are reviewed after they are referred to Commerce from the
Census Bureau, it is very unlikely that any of the reviews could have resulted in
physical examination of cargo. By the time the SEDs arrive at Commerce, most of
the shipments will have reached their destinations. The report to Congress leads
the reader to understand that the review of the SEDs led directly to the discovery
of discrepancies and that discovery led to the physical examination of the cargo.
Mr. Skidmore's description of the Intelligence Branch of the Compliance
Division was as follows in his House testimony:
The Intelligence Branch is staffed with criminal
investigators, intelligence reporting officers and other support
personnel who develop and maintain intelligence information
regarding possible export control violations. Branch personnel
review all incoming allegations, voluntary disclosures and
referrals from the Facilitation Branch to determine whether
referral to the Investigations Branch is warranted.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
370
The testimony suggests a much larger operation than actually exists. The
Intelligence Branch has a Branch Chief, a Deputy Branch Chief, two fulltime
professionals and one delailee from the Drug Enforcement Administration.
The Intelligence Branch Chief, who is unique among the three Branch
chiefs because of his considerable background in law enforcement, told the staff in
a pre-hearing interview that his office is so overwhelmed with its workload and so
understaffed that it is impossible for him to provide the kind of intelligence
analysis needed for the Division's national security - law enforcement - mission.
The Intelligence Branch is supposed to be able to process and assess
sensitive information. Yet the Branch has no secured telephone. None of its
professionals has a clearance higher than top secret.
Intelligence Branch personnel often are bogged down in relatively
insignificant assignments and do not have the time to collate and synthesize
information in an effort to anticipate violations. For example, the Bruchhausen
case, one of the most important technology diversion investigations ever conducted
? and one which will be discussed in detail later in this statement -- was
investigated for the first time in an active manner by the Commerce Department
in 1980. But the existence of the network of companies in the U. S. and Western
Europe was brought to the attention of the intelligence Branch two years before in
the form of two anonymous letters. The Intelligence Branch did not see to it that
the serious allegations in the anonymous letters were checked out.
In his testimony before the House Committee, Mr. Skidmore went on to
describe the Investigations Branch of the Compliance Division. He said that it?
. . . is also staffed with criminal investigators and
conducts full-scale investigations into alleged violations. If it
determines that a violation has occurred, but does not find the
elements of a criminal offense, either a charging letter is
recommended or a warning letter is issued to the alleged
violator, depending on the circumstances. If we believe the
elements of a criminal offense are present, and our Office of
General Counsel concurs, we refer the case to the Department
of Justice for prosecution. (emphasis added)
Mr. Skidmore's use of the adjective full-scale to describe investigations
suggests a substantive effort. However, the Subcommittee staff was informed by
the Chief of the Investigations Branch and by a former Director of the Compliance
Division that a full-scale investigation can be a phone call or a letter. In its use of
the term full-scale with reference to investigations in the two reports to Congress
and Mr. Skidmore's testimony before the House Committee, no definition was given
to further explain more precisely what is meant by full-scale.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
371
Carrying the concept of full-scale investigation a step further, both the
FY '80 and FY '81 reports to Congress speak of "full field investigations." In 1980,
Compliance Division Special Agents conducted 61 full field investigations; and in
1981, an undisclosed number of full field inquiries were made, according to the two
reports to Congress. The Branch has about eight investigators. With such limited
resources at its disposal, the Compliance Division would be very hard pressed to
conduct 61 full field investigations in a 12-month period. The Chief of the
Investigations Branch told the Subcommittee staff that 61 full field investigations
might not have been the meaning that the report to Congress intended to convey
and that there might have been a misunderstanding due to poorly constructed
writing in the report.
The exact language from the report was as follows:
At the beginning of the reporting period, 193 preliminary
inquiries were pending, and 139 more were initiated. Further
investigation was not warranted in 50 instances; in 61 others,
sufficient information was developed to justify full field
investigations. (emphasis added)
In his testimony before the House Subcommittee, Mr. Skidmore also
noted:
A principal focus of the Investigations Branch is
preventive enforcement. We try to thwart illegal transactions
before they occur to avoid possible irreversible harm to
national security. (emphasis added)
Our investigation revealed that preventive enforcement is far removed
from the realistic objectives of the Investigations Branch. The Branch has about
eight Special Agents, some formally trained in traditional law enforcement, some
untrained. Most of their work they do on the telephone or by mail. There is some
travel but the bulk of the work is done in the Washington headquarters of the
Commerce Department. Investigative support is provided by a three-man field
office in New York. In law enforcement, the term "preventive enforcement"
suggests something quite different than an 8-member Investigations Branch that
does most of its work from the office. Preventive enforcement means sending
agents into the field, staying in close and frequent contact with the many segments
of the affected community. Preventive enforcement is aggressive police work.
Equally important, preventive enforcement means having an imaginative and
resourceful intelligence capability as well. The Compliance Division has none of
these. Nor does it practice anything even approaching preventive enforcement.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
372
The official pronouncements of the Commerce Department reports
to Congress and Congressional testimony are sharply different from the views
expressed by experienced law enforcement personnel who are familiar with the
operations of the Compliance Division. In pre-hearing interviews, one Special
Agent currently employed in the Compliance Division had served for more than 20
years as an Army criminal investigator and has well established credentials as an
investigator. He said the Compliance Division is "totally ineffective" in preventing
dual-use technology from being shipped to the Soviet Union and Warsaw Pact
nations. He said the Kremlin's spy organization, the KGB, could not have organized
the Compliance Division in a way more beneficial to Soviet interests. This agent's
view was not contradicted by'persons in the law enforcement and national security
field. Unfortunately, it was virtually impossible to persuade these persons to speak
for attribution.
As will be noted later in this statement, the result of this reluctance to
criticize constructively the Compliance Division in public session leads to the
current situation in which the only evaluation the Congress hears is from the
Commerce Department, which houses the Division and which is less likely to make
a candid and forthright evaluation of the shortcomings of one of its own
components. For that reason, it seemed important to the Minority staff that
Congress be informed of the widespread dissatisfaction that exists in the Executive
branch concerning the Compliance Division and the principal reasons for that
dissatisfaction.
2. Commerce Principal Objective Is Trade Promotion, Not Regulation
The Department of Commerce has as its major focus the promotion of
domestic and international trade. It is the finding of the Minority staff, based on
interviews with officials of the Department and other agencies, that Commerce is
not comfortable with the task of limiting the sale of anything, whether it is dual-
use technology or some other commodity.
As a result, the Commerce Department has devoted insufficient resources
to the Compliance Division. In 1967, for example, the Intelligence Branch of the
Division had six or seven professional analysts. Today -- 15 years later -- the
Intelligence Branch has two analysts and one detailee from another agency. This
statistic was given the Subcommittee staff by the man in charge of the Intelligence
Branch, who is deeply troubled by it. The Department of Commerce, therefore,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
373
has reduced its commitment of resources in the intelligence field at the very time
when the problem of technology diversions has become more pressing for the
country.
The Minority staff is not the only entity that has questioned the depth of
the Commerce Department's commitment to regulating technology transfers. In
introducing legislation to create an Office of Strategic Trade, Senator Jake Garn
of Utah said in Senate remarks on April 24, 1980 that the Commerce Department
can be criticized for its work as "lead" agency in combatting diversions. Senator
Garn said the Commerce Department had a "trade promotion bias" that prevented
it from effectively protecting the country's national security interests. The
Commerce Department has shown itself to be preoccupied with the goal of more
and more trade with the Soviets to such an extent that the Department has become
blind to national security considerations stemming from the sale of certain kinds of
high technology data and machinery, Senator Garn said.
The result of the Commerce Department's inadequacies in controlling
diversions has been an historic erosion in American technological pre-eminence,
Senator Garn said, adding:
What remains of our once vaunted military superiority, on
which our national security increasingly depends, is in part
being whittled away through a wide variety of technology
transfer mechanisms. It is well documented that technology
which the Soviet Union cannot develop will be bought from the
West, and technology which the Soviets cannot buy will be
stolen.
Mr. Chairman, I request that Senator Garn's bill, his floor remarks in
introducing it and a May 8, 1980 "Dear Colleague" letter be sent to other Senators
regarding the bill be received as exhibits to these hearings.
3. Commerce Department Has Limited Law Enforcement Tradition
The Commerce Department has limited tradition and limited expertise in
traditional law enforcement. Yet the Compliance Division is perceived and
described by the Department as being a law enforcement organization. Its
personnel include Special Agents, whose titles alone suggest law enforcement
assignments. The Special Agents are classified as Series 1811 federal criminal
investigators.
The Compliance Division asserts its "lead" role in enforcing export
controls for the entire government. The Division undertakes exercises requiring
specialized law enforcement skills and capabilities such as the conduct of
surveillances of suspected export controls violators.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
374
But, because of its lack of tradition and expertise in law enforcement, the
Commerce Department does not require that its Special Agents meet established
standards of formal training. "On the job" training is common at the Commerce
Department; yet there is no requirement that newcomers to the investigative ranks
undergo formal training in the enforcement of export controls or in the most
fundamental aspects of police work.
It may be a valid procedure to prepare new Special Agents by giving them
"on the job" training. But the question must be asked: from whom are the new
agents receiving their "on the job" training? If the training is provided by agents
who themselves are marginally qualified, how valuable is the instruction?
The Agent's Manual is a basic instructional document in most law
enforcement organizations. Each agent is given a copy of the Agent's Manual and
is expected to study it and be fully and currently informed about it. The Agent's
Manual describes proper procedures for the agent in every aspect of his
professional life -- on points ranging from proper dress to the opening and closing
of cases to the writing of reports of investigation.
We asked for a copy of the Compliance Division's Agent's Manual. Its
status is not clear. We asked the Acting Director of the Division if we could see it.
He gave us a bulky, loose-leaf binder and explained that it was the only such
document in the building. We did not think that it was suitable for distribution to
and retention by his Special Agents for frequent referral and updating; he
concurred.
Another executive of the Division, asked if there was an Agent's Manual,
described it as "a semblance of an Agent's Manual."
The absence of a comprehensive, compact and readily available Agent's
Manual is reflective of a procedurally uncertain law enforcement environment in
the Compliance Division.
The Chief of the Investigations Branch described the Compliance Division
to us as a "non-traditional law enforcement organization." Our staff inquiry
concurs in that judgment. In more traditional law enforcement organizations, each
investigator must meet certain standards of investigative experience and training;
and each investigator is supposed to be thoroughly versed in procedures as spelled
out in an Agent's Manual.
The Acting Director of the Compliance Division acknowledged that there
were problems in the operations of the Division. He said the problems could be
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
375
corrected but that such a process took time. Elaborating on this point that the
government is slow to change, the Acting Director, a veteran of 25 years in federal
service, said the Compliance Division was organized more than 30 years ago at a
time when the challenge of export controls was not as great as it is today. But, he
said, as export controls became more of an urgent problem to the United States in
recent years, the Compliance Division had tended to remain in its previous
configuration, making it inadequately equipped for the current technologically
competitive world scene. We asked the Acting Director if the nation could afford
to wait while the Commerce Department and its Compliance Division adjusted to
new challenges in export controls. He had no answer to that query but he did say it
was a valid question.
Executives in the Compliance Division have had insufficient law
enforcement background and training to be supervising investigators on how to
proceed in their inquiries. (By traditional criminal law enforcement training, the
Subcommittee Minority staff means that the adequately trained official has been
instructed formally on 1) collection and preservation of evidence; 2) interview
techniques, including the handling of witnesses and confidential sources; 3) arrest
procedures, including techniques used in searches, hand-cuffing and transportation
of persons in custody; 4) criminal statutes; 5) issuance of, and training in, the use
of firearms on a continuing basis; 6) courtroom procedures, trial preparation and
testifying; and 7) surveillance techniques, including the use of electronic and
photographic equipment. In addition, most federal criminal law enforcement
agencies have specialized training courses in that area of the law they are
responsible for enforcing. Refresher courses and programs aimed at keeping
personnel informed of new developments in the law and enforcement also are
offered.) The Director of the Compliance Division from 1963 to 1979 was a former
Customs Appraiser in Chicago with limited experience and limited formal training
in law enforcement before he got the job. He told the Minority staff that he did
not believe experience or formal training were required for law enforcement work.
He was replaced in the office of Director of the Compliance Division by a
person who also had limited traditional law enforcement experience. At this time,
the position of Director of the Division is formally vacant. It is being filled on a
parttime basis by William V. Skidmore, whose permanent position is Director of
Anti-Boycott Compliance. Mr. Skidmore has limited traditional law enforcement
experience.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
376
The former Director of the Compliance Division told the Minority staff
that on several occasions from 1979 through the first quarter of 1982 she
recommended to senior officers of the Commerce Department that steps be taken
to increase the effectiveness and numerical strength of the Division. The
Department rejected many of her recommendations, she said.
4. Five-man Inspection Staff Is Too Small To Cover Entire Nation
Compliance Division inspectors have limited resources at airports and
seaports to detect the export of controlled high technology commodities. The
Chief of the Facilitation (Inspections) Branch told the Subcommittee staff that the
number of inspectors -- five or six -- was insufficient. Most of the work they do is
performed at the John F. Kennedy International Airport in New York.
The former Director of the Division informed the Minority staff that
several of the inspectors were parttime employees, working about 32 hours a week
and that they put in some overtime to compensate for their shorter work time.
Compliance Division inspectors are not authorized to search and seize
suspected cargo. They must rely on U. S. Customs Service personnel. Similarly,
unlike Customs agents and inspectors who have kindred and formalized working
relationships with customs employees throughout many parts of the world,
Commerce inspectors have no counterparts on any foreign soil.
5. Compliance Division Special Agents Not Required To Undergo Formal Training
Compliance Division Special Agents working in the Investigations Branch
are not required to have any formal training in investigative techniques, law
enforcement or the Export Administration Act. The approximately eight
professional members ? the Special Agents ? of the Investigations Branch have
varying degrees of law enforcement background. Some have extensive law
enforcement background. Others have limited background in law enforcement.
One Special Agent's previous job experience was secretarial.
The Chief of the Investigations Branch acknowledged that the Special
Agents in the Compliance Division were not required to attend law enforcement
training schools and that, while such educational programs were encouraged, the
Special Agents had not attended them recently. What training in law enforcement
the Compliance Division Special Agents had, he said, was what they had obtained
before joining the Compliance Division. The Chief of the Investigations Branch
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
377
who had served for about two years as Acting Deputy Director of the Division,
himself had come to the Division with no law enforcement training whatsoever,
except for the fact that he is a lawyer.
As an introduction to their work in the Compliance Division, the
Investigations Branch Chief said, newcomers were expected to read the Export
Administration Act and were then encouraged to engage in frequent conversations
with other more experienced agents to learn what they needed to know. He said
major emphasis was placed on "on the job" training.
6. Size of Investigations Branch Backlog Is In Doubt
Most of the investigative work of the Investigations Branch is done in the
office. Agents are expected to conduct inquiry on the telephone and by mail. The
most frequent response to allegations of violations of the Export Administration
Act is to send the alleged violator a letter of warning. In its FY '81 report to
Congress, for example, the Commerce Department summed up the Compliance
Division's work this way:
The Compliance Division of the Office of Export
Administration completed 258 full-scale investigations during
October 1980 through September 1981. Of these, 33 cases were
referred to the Department's Office of General Counsel for
initiation of administrative proceedings; 145 cases resulted in
warning letters to the parties involved for various violations
considered not serious enough to warrant criminal or
administrative proceedings; in three instances, educational
advice was given to the firms; and 77 investigations were closed
after a determination of no violation or insufficient evidence.
In addition to the foregoing, three cases were referred to the
Department of Justice for possible prosecution of criminal
violations. The Division had 153 cases pending at the beginning
of the period, of which 258 have been assigned to investigators,
and had 311 cases pending at the close of the period.
The reference to 311 cases pending at the close of the period possibly
would indicate that a backlog of 311 cases existed. However, it was not possible
for the Subcommittee staff to determine the actual size of the backlog.
The Chief of the Investigations Branch said he was not sure how large the
backlog was. The previous Director of the Division said the backlog was possibly as
large as 300 or 400. The new Acting Director said he thought it was about 200
cases. However, he added that it had been the Division's policy in recent years not
to close many cases for fear the Department would be criticized for closing out
cases prematurely; this policy would lead to the conclusion that the backlog was
bigger than it actually was, he said.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
378
The staff inquiry concluded that a backlog of 200 or 300 or 400 with an
investigative staff of eight agents seemed to be inordinately large. So many cases
hovering over a relatively small investigative staff could create pressure on Special
Agents to close cases without sufficient inquiry.
7. Intelligence Branch Has Backlog Of 600 'Matters'
The Intelligence Branch also has a significant backlog of unfinished
business. When the Minority staff interviewed the Chief of the Intelligence Branch
in March of 1982, he said he had a backlog of about 600 cases. He said that by the
end of the calendar year, he could have a backlog of 1,000 cases.
The Acting Director of the Compliance Division said the backlog in the
Intelligence Branch was about 600 but that it was 600 "matters," a large number of
which did not qualify as actual cases. Therefore, he said, the backlog was
considerably smaller than it might appear.
It is the view of the Subcommittee Minority staff that the backlog ?
whether it is 600 "matters" or 600 cases ? is too large and its size has an
important bearing on the efficiency of the entire Division. That is because many
cases begin in the Intelligence Branch. A serious backlog there can cause delays
throughout the system. Large backlogs prevent the entire Compliance Division
from moving in a timely fashion against suspected violators.
S. Compliance Division Special Agents Lack Most Law Enforcement Tools
Compliance Division investigators have no authority to search and seize
shipments suspected of being in violation of the export controls statute. They may
detain cargo; however, as the Chief of the Investigations Branch admitted to the
Minority staff, if the persons in possession of the suspected cargo resist having
their shipment detained, Compliance Division personnel have no measure of
established force to enforce their decision to detain.
For, coupled with their inability to search and seize is Compliance
Division Special Agents' lack of authority to make arrests. In addition, Compliance
Division agents have no authority to carry firearms and have no mobile
communication equipment. Yet they carry out surveillance operations of suspected
violators.
Several surveillances have been staffed and directed by Compliance
Division personnel not extensively trained in the techniques of surveillance work.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
379
Trained law enforcement personnel have told the Subcommittee staff that
surveillance is one of the most difficult of all law enforcement exercises. They
said they worked on many of them before they felt confident of themselves in this
kind of pursuit; and before they felt they could direct others.
In addition, sending unarmed agents on surveillances is a procedure which
some law enforcement officials question. Moreover, to conduct its surveillances,
Compliance Division personnel have had to borrow mobile communication
equipment from the U. S. Marshals Service and other agencies.
Untrained, unarmed, poorly equipped personnel conducting surveillances
under the direction of inexperienced executives is a practice inherently risky. It
also demeans and trivilizes the efforts of formally trained, properly equipped law
enforcement agents whose surveillance work is performed according to established
procedures. It is the finding of the Minority staff that if a surveillance is worth
doing, it is worth doing in a professional, procedurally sound manner.
9. One Agent Had Job Of Investigating Grain Embargo Violations
In 1980, the Compliance Division received an assignment of national
consequence in addition to its dual-use export controls work. The Division was
given the responsibility to investigate violations of the grain embargo called for by
President Carter in response to the Soviet Union's invasion of Afghanistan. This
responsibility stemmed from language in the Export Administration Act that says it
is the policy of the government?
? to restrict the export of goods and technology where
necessary to further significantly the foreign policy of the
United States or to fulfill its declared international obligations
In his letter to the President of the Senate and the Speaker of the House
of January 21, 1980 regarding "Shipments of Agriculture Commodities to the Soviet
Union," President Carter said the Soviet invasion of Afghanistan "requires a firm
and vigorous response from the United States." President Carter went on to say
that he had directed the Secretary of Commerce to restrict exports and reexports
from the United States to the Soviet Union.
Under the heading of "Enforcement," the President's message added:
No unusual problem is anticipated in enforcing the control
on United States direct sales of agricultural products. With
respect to reexports from third countries to the U.S.S.R., the
fungible nature of the commodities makes it somewhat difficult
to control their destination. The Department of Commerce and
95-929 0 - 82 - 25
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
380
other agencies will watch this situation closely and will take
enforcement action in case of violation.
Mr. Chairman, I request that the President's message to the Congress be
received as an exhibit.
A former Compliance Division investigator told the Subcommittee
Minority staff that he was given the assignment of investigating embargo
violations. He said no other agents in the Compliance Division were assigned to
assist him.
At several interagency meetings of high level officials working on
implementation of the grain embargo, the agent, himself a GS-12, was the sole
representative of the Commerce Department. His security clearance was at the
secret level and this meant that on some occasions he was not allowed to enter the
meetings until issues requiring higher classification were discussed.
The other agencies ? USDA, CIA, State Department, Navy ? felt the
matter was important enough to send senior officers while Commerce was
represented by a GS-12, he said. The agent said he was embarrassed but was
unable to persuade his supervisors than their agency was proceeding improperly by
not sending a more senior spokesman.
As for the agent's principal assignment -- the investigation of alleged
violations of the grain embargo ? the agent said he did the best he could with the
limited resources he had.
The agent said that for the most part, the majority of his investigative
work was from the office, as he relied on long distance telephone calls, cables to
American embassies overseas and assistance from the Department of Agriculture
and the Customs Service.
Not having law enforcement-minded counterparts in foreign nations was a
problem for him, the agent said. He found cooperative U. S. embassy personnel on
some of his requests for information on grain shipments. But, in other instances,
he was met with delayed responses.
I spoke with the Agriculture Department official who was chairman of the
high level inter-agency group which monitored the agricultural exports during the
grain embargo. He said the group was formed early in 1980 when it became
apparent that the Commerce Department was committing insufficient resources to
assembling information about compliance and investigating allegations of
violations. He said it was his understanding that "one or two" persons were
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
381
representing the Commerce Department in this task and that he saw that as
"terribly limited" dedication of personnel. He said information assembled by the
high level inter-agency group reflected a much broader base than the Commerce
Department could have supplied by itself. He said, however, that "the hard core
business of proving violations " ? that is, the actual investigation ? was the
responsibility of the Commerce Department. He said members of the inter-agency
group he chaired talked openly of the unsatisfactory commitment of resources by
the Commerce Department. He said he recalled that the Commerce Department
sent representatives to the inter-agency group meetings whose security clearances
were not high enough to enable them to be there. He said in certain instances the
Commerce Department representative had to wait outside the room until more
sensitive issues were discussed.
In addition, the General Accounting Office, in a report of July 27, 1981,
entitled "Lessons To Be Learned From Offsetting The Impact Of The Soviet Grain
Sales Suspension," said the Compliance Division of the Commerce Department was
charged with investigating allegations of illegal grain shipments to the Soviet
Union. "At the outset," GAO said, "Commerce did not anticipate taking any other
actions to monitor shipments."
However, GAO went on to say, "USDA officials believed that a more
comprehensive monitoring program was necessary to ensure that U. S. grain was
not being illegally shipped to the Soviet Union." This concern led to the formation
of two groups in January of 1980 whose purpose was to provide more information.
One group was largely an internal organization within USDA. GAO said the second
group was "comprised of policy-level officials from USDA, State Department, CIA,
Navy and Commerce," GAO said.
Mr. Chairman, I request that the GAO report of July 27, 1981 be received
as an exhibit.
The Minority staff inquiry found that the inadequate response of the
Compliance Division in enforcing the grain embargo demonstrates the serious
government operations problem in which the most senior officers of the executive
branch, from the President on down, shape policy and promulgate directives on the
mistaken premise that the affected agencies have the necessary means to turn the
policy and directives into reality. President Carter's grain embargo speech might
have been received in a different light had he also announced the Commerce
Department would assign one man ? a GS-12 in the Compliance Division ? to
investigate alleged violations.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
382
10. Lack Of Harmony Between Compliance Division And Customs Service
A lack of close cooperation existed between the Compliance Division and
the U. S. Customs Service. The result was that effective enforcement was
reduced. Part of the tension between the two agencies stemmed from the
Commerce Department's interpretation of Section 12-C of the Export
Administration Act. The Department interpreted the Section in such a way as to
preclude sharing proprietary information with other law enforcement
organizations. In interviews with Minority staff, Customs personnel complained
bitterly about the Commerce Department's interpretation of 12-C. Section I2-C is
as follows:
(c) Confidentiality.--
(1) Except as otherwise provided by the third sentence of
section 8(b)(2) and by section 11(cX2XC) of this Act,
information obtained under this Act on or before June 30, 1980,
which is deemed confidential, including Shippers' Export
Declarations, or with reference to which a request for
confidential treatment is made by the person furnishing such
information, shall be exempt from disclosure under section 552
of title 5, United States Code, and such information shall not be
published or disclosed unless the Secretary determines that the
withholding thereof is contrary to the national interest.
Information obtained under this Act after June 30, 1980, may
be withheld only to the extent permitted by statute, except
that information obtained for the purpose of consideration of,
or concerning, license applications under this Act shall be
withheld from public disclosure unless the release of such
information is determined by the Secretary to be in the national
interest. Enactment of this subsection shall not affect any
judicial proceeding commenced under section 552 of title 5,
United States Code, to obtain access to boycott reports
submitted prior to October 31, 1976, which was pending on May
15, 1979; but such proceeding shall be continued as if this Act
had not been enacted.
In Customs and in other offices of the executive branch -- both in law
enforcement and in national security affairs -- there is an unwillingness to say
anything critical in public about the effectiveness of the Compliance Division. The
reluctance to criticize the Compliance Division exists amid a widespread sense
throughout affected areas of government that the investigative capabilities of the
Compliance Division are inadequate.
The failure not to criticize the Commerce Department ignores the fact
that because of the inadequacies of the Compliance Division significant amounts of
dual-use technology that contribute to Soviet military strength are being shipped to
the Soviet Bloc.
The Minority staff should not be the only entity to make an evaluation of
the effectiveness of the Compliance Division. It was our hope that other law
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
383
enforcement organizations would come forward and critique the Division in a
constructive and professional manner. In this pursuit, we were met with
resistance. Working agents and senior officials alike would be candid, while
insisting on their anonymity.
The Subcommittee staff did obtain a copy of a memorandum written by a
senior Customs Service official who was critical of the Compliance Division's
procedures. The memorandum, dated October 30, 1980, was written by William
Green, Deputy Assistant Commissioner in the Office of Border Operations. The
memorandum was sent to Robert L. Keuch, Associate Deputy Attorney General and
Chairman of an Inter-Agency Working Group on Export Control. Green had this to
say about the Compliance Division of the Commerce Department:
. . . . What is particularly significant is Commerce's
(OEA/CD) continued action to impede cooperation in
investigations even while it states that it wishes to fully
participate in all cooperative ventures. Commerce continues to
take unilateral and uncoordinated action concerning either joint
or Customs initiated investigations by requesting foreign
inquiries through various U. S. embassies and consulates without
consulting with either Customs Attaches or Headquarters. Such
action is causing serious problems. These problems are not
limited to hampering instant investigations, but also the
compromising of U. S. Customs and foreign government
sources, damaging the previously close and long relationships
between U. S. Customs and their foreign counterparts, and
directly impacting on national security.
These unilateral actions taken by Commerce are not
limited to investigations initiated solely by Commerce and
being worked only by them; but more importantly, include
investigations initiated by Customs and now being either jointly
worked by both agencies, or by Customs alone....
While Customs acknowledges that, under the Export
Administration Act of 1979, OEA/CD is the agency primarily
responsible for administration and enforcement of the Act,
OEA/CD is not at this time adequately staffed to enforce the
Act. OEA/CD has stated that it is planning to establish foreign
offices, together with adequate staffs, and assume those duties
related to export control enforcement which the EDO's and
Customs Attaches now perform. Once again, OEA/CD is not
adequately staffed to assume these duties and does not have
experience concerning the conduct of investigations abroad.
OEA/CD is also at a distinct disadvantage in that they have no
foreign counterparts with whom they can relate and/or work.
They will not have access to Customs mutual assistance
agreements on which they can rely to gain access to
investigative data and/or other desirable information, nor is it
anticipated they will be able to establish such agreements. The
U. S. Customs Service is in a much better position to conduct
export control investigations and inquiries abroad because we
do have foreign counterparts with whom we work and relate; we
do have formal and informal agreements with our foreign
counterparts; we have established foreign offices with a staff
of experienced investigators and have conducted export control
investigations and inquiries abroad since at least before 1900....
The only answer is a single-agency concept for all export
control enforcement. While not faulting Commerce in its
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
384
attempt to increase its enforcement posture, it should be noted
that Customs already has the necessary authority, has a foreign
presence that has been in place for at least 80 years, has over
60 domestic offices, has over 500 experienced criminal
investigators, and has had experience in export control matters
since early in the history of our country. Concerning additional
resources, it has been stated that if Customs should assume the
entire export control enforcement program it would need
approximately 25 additional slots. While this figure may change
due to exigencies such as workload, source development, and
foreign liaison, it should be noted that any new personnel gained
because of the resource increase would not be initially assigned
sohisticated critical technlogy cases, but would be assigned to
experienced investigators. The new agents would take up the
slack caused in lesser areas of the Customs enforcement
program.
Mr. Chairman, I request that Mr. Green's memorandum be received as an
exhibit.
11. CTC Case Demonstrated Shortcomings In Compliance Division
The many shortcomings of the Compliance Division as a law enforcement
organization are apparent in the investigation of a syndicate of businesses, known
as the CTC group, owned, controlled or utilized by a West German named Werner
J. Bruchhausen. Mr. Chairman, I have prepared a summary of the CTC case
which was drawn from information provided the Minority staff by Commerce
Department agents, Customs Service agents, the Department of Justice and other
sources. It is rather lengthy. I request that it be printed in the hearing record as if
read and that I be allowed to give a brief description of what occurred in the CTC
case.
From 1977 to 1980, the CTC network of companies in the U. S. and
Western Europe bought dual-use technology under false pretenses in the U. S. and
then exported it to the Soviet Union and Warsaw Pact.
As will be pointed out in the testimony of Dr. Lara Baker, a computer
scientist from the Los Alamos National Laboratory, the CTC syndicate of
companies was not buying up high technology equipment at random. They had been
given a precise shopping list by the Soviets. As Dr. Baker will point out, the
equipment the CTC syndicate bought was for the specific purpose of building and
equipping a semi-conductor plant in the Soviet Union. Moreover, a businessman
who served briefly as a consultant to the Soviet Union will testify during these
hearings that it was apparent to him during a visit to Moscow that such a semi-
conductor plant had been built in the U.S.S.R. and the Soviets were in the process
of equipping it with American-made machinery.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
385
The existence of the CTC network of companies was first brought to the
attention of the authorities in 1977 and 1978 when two anonymous letters were
received at the American Consulate in Dusseldorf. The State Department
translated the letters into English and referred them to the Compliance Division in
the Commerce Department. The Minority staff has established that the letters
were received by the Compliance Division in 1978 and that insufficient effort was
made to investigate the allegations.
Subsequent to the receipt of the letters, two U. S. producers of dual-use
technology reported to the Commerce Department that they were suspicious of the
CTC companies. Insufficient inquiry was conducted in response to the first letter.
A Commerce Department Special Agent did interview CTC's principal
executive in Los Angeles, a naturalized Russian-born American citizen named
Anatoli Maluta, also known as Tony Maluta and Tony Metz. Maluta told the Special
Agent from Compliance that he did not know anything about export controls, or the
need to have validated export licenses to ship certain controlled commodities. But,
Maluta said, because of the agent's interest, he was cancelling the suspicious order.
Maluta's cancellation of the suspect shipment should have triggered
increased curiosity in the agent's mind to want to investigate further. But there is
no evidence that he did. No further investigation of the CTC network was
conducted until a second letter arrived at the Compliance Division, this time from
another high technology producer who also voiced suspicions about the CTC
companies.
Early in 1980, a second Compliance Division agent, Robert Rice, was
assigned to the case and conducted the kind of comprehensive preliminary inquiry
that was called for. Rice, the most senior agent in the Division, came upon
considerable information indicating widespread violations of export controls.
Rice presented the evidence to the Office of the U. S. Attorney in Los
Angeles in March of 1980. A major inquiry was begun by the U. S. Attorney's
Office, under the direction of Assistant U. S. Attorney Theodore W. Wu and the
U.S. Customs Service. Customs ultimately assigned about 15 agents to the case in
California, Texas, New York and Western Europe. Compliance Division Special
Agent Rice was the only Commerce Department representative assigned to the
case on a regular basis.
Indictments were brought against Bruchhausen and Dietmar Ulrichshofer,
both of whom remained in Europe and are fugitives from American justice, and two
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
386
Los Angeles accomplices --- Maluta and Sabina Dorn Tittel. Maluta and Tittel both
were convicted.
The CTC case demonstrated technology diversions of about $10 million
and is considered by law enforcement and national security specialists to be one of
the most important export control case ever brought to trial.
The inquiry showed that:
1. The Compliance Division did not move quickly to establish the value of
the anonymous letters.
2. The Compliance Division did not connect the anonymous letters to the
allegations that were reported by two U. S. manufacturers.
3. When Compliance Division Agent Rice turned over the results of his
inquiry to Assistant U. S. Attorney Wu in Los Angeles, it was apparent to Wu that
considerable expenditures of resources would be needed. Trained investigators
would be required to conduct interviews, evaluate shipping documents, surveil
suspected violators and carry out other aspects of a traditional law enforcement
full-scale, full field investigation. Commerce's contribution to that effort was
Agent Rice, a competent investigator in whom Wu had confidence. But he needed
more than one agent. He enlisted the assistance of the Customs Service. Later
assistance was provided by trained criminal investigators from the Internal
Revenue Service.
4. At an early point in the inquiry, it was necessary to seize shipments.
Commerce had neither the authority nor the manpower to seize shipments.
Customs did it.
5. At another point in the inquiry, it was necessary to search premises of
CTC companies and the quarters of certain of his employees in the U. S. and
Europe. The Compliance Division had insufficient resources to implement
simultaneous search warrants. The Compliance Division had no law enforcement
capabilities in Western Europe to work with German Customs in coordinating the
searches abroad. Customs executed the warrants in the U. S. and, through its
agreements with West Ger man customs, arranged for the execution of the warrants
in Germany.
6. To substitute sand for one of CTC's shipments to Moscow, a sizable
expenditure of funds was needed. The Compliance Division balked at the shipment
substitution strategy and refused to pay the cost of recrating the sand and air
freight. Customs officials approved of the substitution and agreed to pay the cost.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
387
7. Extensive overseas coordination, in addition to the search warrants,
was called for with West German Customs and other foreign officers. Commerce
Department's Compliance Division had no overseas law enforcement contacts. U.
S. Customs' contacts were used.
8. Extensive surveillance was necessary. Armed Customs agents and
armed Internal Revenue Service criminal investigators and an unarmed Compliance
Division Special Agent Rice provided it. Two suspects under surveillance had
firearms in the backseat of their car. The firearms were not used. But it was an
important law enforcement advantage for the agents on surveillance to be armed
as well.
9. Experienced supervisors with law enforcement background and training
were needed to direct the inquiry in the field. The Office of the U. S. Attorney for
the Central District of California, working with supervisorial personnel in the
Customs Service, provided the needed direction. Contact with supervisorial
personnel in the Compliance Division, who remained in Washington, was made on
the telephone and the persons who worked the case in California did not consider
such communication to be satisfactory.
10. When the appropriate time came to apprehend Anatoli Maluta and
Sabina Dorn Tittel, IRS agents made the arrests. Customs agents, like the trained
IRS criminal investigators, are authorized to make arrests. Even had the
Compliance Division dispatched sufficient numbers of agents to assist in the
inquiry, they could not have arrested the suspects.
It is noteworthy that in its Fiscal Year 1981 report to Congress, under the
heading "Criminal Proceedings," the Commerce Department described the CTC
inquiry, listed the charges in the indictments, identified certain companies in the
CTC network of companies which were denied export privileges and then concluded
by taking credit for the case. The report said:
The order (to deny export privileges) was issued to protect
national security and the public interest in view of the facts
revealed in the investigation of these parties by the
Department.
In fact, the CTC case does not qualify as a Commerce Department
investigation. Customs Service agents did most of the work; and executive
supervision was provided by Assistant U. S. Attorney Theodore Wu and Kenneth
Ingleby, the Chief of the Customs Service Investigations Office in San Pedro.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
388
In participating in the inquiry on a fulltime basis and in conducting
himself in a competent, professional manner, Compliance Division Special Agent
Robert Rice was handicapped in not being able to do the things Customs agents can
do routinely -- search and seize suspicious freight, make arrests and carry a
weapon. Capable and resourceful as he was, Rice cannot be considered to have
been essential to the CTC inquiry. It could have succeeded without him. It could
never have succeeded without the Customs Service. Customs contributed
necessary manpower and fundamental law enforcement tools. Commerce's
contribution was Robert Rice.
After the CTC case was brought to Wu, the Compliance Division played
no essential role in the inquiry. That recognition leads to the Minority staff's final
finding, which is that the Commerce Department should not have the enforcement
function under the Export Administration Act.
It is the finding of the Minority staff that the national security
implications of enforcement of the Export Administration Act are too important to
be entrusted any longer to the Commerce Department as presently organized.
For three decades the enforcement function has resided in the Commerce
Department -- through Administrations controlled by Democrats and Republicans.
Three decades is sufficient time to allow reasonably capable officials to perfect
the most challenging task. But serious procedural and operational problems still
exist in the Compliance Division of Commerce. We find the conclusion
inescapable, therefore, that effective enforcement of the Export Administration
Act is beyond the institutional capabilities of the Commerce Department.
Moreover, from a government operations and executive organizational standpoint,
the mere existence of the Compliance Division is an impediment to efficient and
effective enforcement of the Act. Understaffed, flagrantly short of resources, the
Division cannot do the job effectively; but, by its presence, prevents other
components of government from taking on the task.
It is our view that two solutions ? one short term, one long range -- are
available. Immediate relief could be found if the Compliance Division were
abolished and all its functions placed in the U. S. Customs Service. This action
would insure that competent, professional agents, trained in formal, traditional law
enforcement procedures, would be assigned to investigate alleged violations of the
Export Administration Act; that they would work under the supervision of
executives who also would have formal, traditional law enforcement backgrounds;
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
389
and, perhaps most important of all, the entire function would exist in a Cabinet-
level Department with longtime experience in and commitment to traditional law
enforcement. It is the staff's recommendation that Subcommittee Members
consider that concept as an immediate solution as these hearings proceed.
In addition, in terms of longer range considerations, it is our
recommendation that Subcommittee Members consider the proposal put forward by
Senator Garn to create an independent Office of Strategic Trade that, in summary,
would absorb the Commerce Department's Office of Export Administration and its
components.
Mr. Chairman, that concludes my portion of the staff presentation. I
request that the summary of the CTC case be printed at this point in the hearing as
if read.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
390
The following summary of the CTC case was written by Fred Asselin of
the Subcommittee Minority staff. It is based on information provided by
Commerce and Justice Department, U. S. Customs and other sources.
CTC Network Was Formed In 1977
On October 23, 1974, Werner Jurgen Bruchhausen, a 34-year-old West
German residing in Los Angeles, incorporated four companies in Southern
California for the purpose of buying and selling sophisticated electronic equipment.
The firms all used the address of 4676 Admiralty Way in Marina Del Rey.
Subsequently, Bruchhausen incoporated eight other entities in Southern California.
Bruchhausen, who was born on November 5, 1939 in Dortmund, West
Germany and who listed his home as being D8019 Niederseeon 21 in West Germany,
enlisted the aid of two associates in setting up his firms -- Anatolij T. M. Maljuta
of 231 Calle Mayor, Redondo Beach, California; and Sabina Dorn Tittel of 30605
Cartier Drive, Rancho Palos Verdes.
Maljuta, who was born in Kharkov, Russia on January 25, 1920, was a
naturalized American citizen. He used three aliases -- Anatoli T. M. Maluta, Tony
Maluta and Tony Metz. Tittel was born on January 13, 1950 in Gumbsheim, West
Germany. Divorced, Titrel was unmarried, as was Bruchhausen. Maluta's wife was
named Aida.
Of the four companies Bruchhausen created in 1974, the principal
enterprise was CTC California Technology Corporation. From its inception
through 1980, CTC utilized 18 other trade styles, 12 of which were incorporated in
California. In the four-year period of 1977 to 1980, CTC and its variants, under
the direction and supervision of Anatoli Maluta and Sabina Dorn Tittel, purchased
high technlogy electronic equipment, perij)herals and components valued in excess
of $10.5 million. Most of the items they purchased were classified as strategic
commodities, controlled for national security purposes and requiring United States
export licenses granted by the Departments of State and Commerce.
In the same four-year period, CTC exported from the United States to
Germany, the Soviet Union, or the Soviet Bloc more than 300 shipments consisting
of strategic commodities. None of the commodities had proper export licenses.
The shipments were documented with fraudulent U. S. Shipper's Export
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
391
Declarations (SED's). Most of the exports were sent to West Germany consigned to
companies controlled by or associated with Werner J. Bruchhausen. From West
Germany, most of the commodities were transshipped to Switzerland or Austria or
to other intermediate countries and then transported to the USSR or to a Warsaw
Pact nation.
The entities located in Southern California that comprised the
Bruchhausen or CTC group were as follows:
Interorga International Components.and Equipment Sales
Organization
4676 Admiralty Way, Marina Del Rey, California
Incorporated: October 23, 1974, file No. 740201
Statement of domestic stock corporation, filed August 31, 1977,
file No. 77198790
Chief executive officer: Werner J. Bruchhausen, Marina Del
Rey
Secretary: Anatoli Maluta, Marina Del Rey
Chief Executive officer: Anatoli Maluta
Directors: Werner Bruchhausen, Anatoli Maluta, Aida Maluta
Interebdo Ebdo International Inc., dba ADT International Inc.
Post Office Box 9076, Venice, California
4676 Admiralty Way, Marina Del Rey
Incorporated: October 23, 1974, file no. 740203
Statement of domestic stock corporation, filed December 2,
1974, file No. 74180292
Dissolved: February 26, 1979
President: Volker Brandlmeier, Marina Del Rey
Vice President: Barbara Brandlemeier, Marina Del Rey
Secretary/Treasurer: Barbara Brandlmeier
Directors: Herbert Abrams, Marilyn McCumber, Volker
Brandlmeier
The name of this corporation was changed to ADT
International, Inc., on March 24, 1975, file No. 153552.
CTC California Technology Corp.
4676 Admiralty Way, Marina Del Rey, California
Incorporated: October 23, 1974, file No. 740200
Statement of Domestic Stock Corp., filed December 2, 1974,
file No. 74190291
Dissolved: February 26, 1979
President: Volker Brandlmeier, Marina Del Rey, California
Vice President: Barbara Brandlmeier, Marina Del Rey, CA
Secretary/Treasurer: Barbara Brandlmeier
Directors: H. Abrams, Marilyn McCumber, Volker Brandlmeier
MTL Measurements and Test Laboratories, Inc.
4676 Admiralty Way, Marina Del Rey, California
Incorporated: October 23, 1974, file No. 740200
Statement of Domestic Stock Corp., filed December 2, 1974,
file No. 74190291
Dissolved: February 26, 1979
President: Volker Brandlmeier, Marina Del Rey, California
Vice President: Barbara Brandlmeier, Marina Del Rey, CA
Secretary/Treasurer: Barbara Brandlmeier
Directors: Herbert Abrams, Marilyn McCumber, Volker
Brandlmeier
Electronic Continental Industries, Inc.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
392
4676 Admiralty Way, Marina Del Rey, California
Incorporated: June 30, 1977, file No. 820513
Statement of Domestic Stock filed August 29, 1977, file No.
77186369
Dissolved: February 26, 1979
Chief Executive Officer: Werner Bruchhausen
Secretary/Chief Financial Officer: Anatoli Maluta
Directors: Werner Bruchhausen, Anatoli Maluta, Aida Maluta
Interorga Europe, Inc.
4676 Admiralty Way, Marina Del Rey, California
Incorporated: October 25, 1977, file No. 830539
Statement of Domestic Stock Corp., filed December 29, 1977,
file No. 77271373
Dissolved: February 26, 1979
Chief Executive Officer: Werner Bruchhausen, Marina Del Rey,
California
Secretary: Anatoli Maluta, Marina Del Rey, California
Chief Financial Officer, Sabina D. Tittel, Marina Del Rey, CA
Directors: Werner Bruchhausen, Anatoli Maluta, Sabina D.
Tittel
Atlantic Universal Supply, Inc.
4804 Macafee Road, Torrance, California
dba: AUS, 21515 Hawthorne Boulevard, #646, Torrance, CA
Incorporated: July 3, 1978, file No. 868824
Statement of Domestic Stock Corp., filed November 19, 1979,
file No. 79310442
Chief Executive Officer: Tony Maluta, Redondo Beach, CA
Secretary: Sabina D. Tittel, Torrance, California
Chief Financial Officer: Sabina D. Tittel
Directors: Tony Maluta, Sabina Tittel
Consolidated Protection Development Corp.
21515 Hawthorne Boulevard, #646, Torrance, California
Incorporated: July 3, 1978, file No. 868822
Statement of Domestic Stock Corp., filed December 10, 1979,
file No. 79324737
Chief Executive Officer: Tony Maluta, Redondo Beach, CA
Secretary: Sabina D. Tittel, Torrance, California
Chief Financial Officer: Sabina D. Tittel
Directors: Tony Maluta, Sabina D. Tittel
American Data Technology Corp.
231 Calle Mayor, Redondo Beach, California (2)
Incorporated: July 12, 1978, file No. 869313
Statement of Domestic Stock Corp. filed: December 10, 1979,
file No. 79324736
Chief Executive Officer: Tony Maluta, Redondo Beach, CA
Secretary: Sabina D. Tittel, Torrance, CA
Chief Financial Officer: Sabina D. Tittel
Directors: Tony Maluta, Sabina D. Tittel
Digital Security Corp.
231 Calle Mayor, Redondo Beach, California
Incorporated: May 25, 1979, file No. 931745
Statement of Domestic Stock Corp., filed August 21, 1979, file
No. 79231486
Chief Executive Officer: Rainer Hildebrand, Bonn, West
Germany
Secretary: Eric Roos, Dusseldorf, West Germany
Chief Financial Officer: Tony Maluta, Redondo Beach, CA
Directors: Rainer Hildebrand, Eric Roos, Tony Maluta, Sabina
Tittel
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
393
Continental Technology Corp.
21515 Hawthorne Boulevard, #646, Torrance, California
23868 Hawthorne Boulevard, #100, Torrance, California
Incorporated: May 25, 1979, file No. 931746
Statement of Domestic Stock Corp., filed August 21, 1979, file
No. 79231485
Chief Executive Officer: Roland Sturm, Munich, West Germany
Secretary: Rainer Hildebrand, Bonn, West Germany
Chief Financial Officer: Tonyt Maluta, Redondo Beach, CA
Directors: Roland Sturm, Rainer Hildebrand, Tony Maluta,
Sabina D. Tittel
Universal Digital Corp.
4804 Macafee Road, Torrance, California (3)
1843 Lincoln Blvd., Suite 202, Santa Monita, CA (4)
Incorporated: May 25, 1979, file No. 931741
Chief Executive Officer: Eric Roos, Dusseldorf, West Germany
Secretary: Rainer Hildebrand, Bonn, West Germany
Chief Financial Officer: Sabina Tittel, Torrance, California
Directors: Eric Roos, Rainer Hildebrand, Sabina Tittel, Tony
Maluta
CTC Group Used Companies Overseas
In addition to the California-based entities comprising the CTC group,
Bruchhausen also controlled or was associated with several other enterprises,
including entities in West Germany, Austria and Switzerland.
The CTC group's associates in West Europe included Dietmar
Ulrichshofer, Hans-Jurgen Koenig, Sybille Ziogas, and Frank and Karin Nassauer.
Ulrichshofer, born in Austria on May 27, 1940, owned electronics supply
companies in Vienna and Bad Reichenhall, West Germany. Koenig, who lived in
Bonn, was born on May 12, 1940, and was general manager of electronics supply
firms in Dusseldorf, and the West German capital.
The foreign entities utilized or owned by the Bruchhausen group were as
follows:
ADT Analog Und Digital Technik
D-8019 Neiderseeon 21, West Germany
Commenced Business: 1978
General Manager: Werner Bruchhausen
Operation: Import, export, distribute and manufacturer
electronic building parts and equipment
Elubat Vertriebsgellschaft Fur Elektronik Und Batterien Mbh
Goethestrasse 11, 4000 Dusseldorf, West Germany
Commenced Business: December 30, 1977, under Registry
number HRB 595, dated April 7, 1978
Managers: Detlef Lackmann, Werner Bruchhausen
Ownership: ADT Analog and Digital Technik Bauelemente and
Gerate-Vertrieb, Gmbg - 50%, Detlef Lackmann - 50%
Operation: Wholesale of electronical elements, batteries and
similar articles
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
394
Techma Technische Maschinenhandels - Gesellschaft Mbh
Koeingstrasse 10, D-4000 Dusseldorf, West Germany
Commenced Business: February 27, 1978, under Registry
Number HRB 13228, dated February 27, 1978
General Manager: Hans-Jurgen Koenig
Ownership: Hans-Jurgen Koenig - 100%
Operation: Distribution, import and export of machine and
products of the mechanical engineering, as well as
electric devices
Elmasch Vertriebsgesellshaft Fur Produkte Der Electrotechnik
Und Des
Maschinenbaues Mgh Bergstrasse 185, 5300 Bonn 1, West
Germany
Commenced Business: February 27, 1978, under Registry
Number HRB 2478, dated June 19, 1979
General Manager: Hans-Jurgen Koenig
Ownership: Hans-Jurgen Koenig - 90%, Stefan Wagner - 10%
Operation: Distribution, import and export of electrotechnical
and mechanical products
Electronic Elektronechnische Bauelmente Handelsgesellshaft
Mbh
4951 Ameisasse, 1140 Vienna, Austria
Commenced Business: October 30, 1974, under Registry
Number B-9060, dated November 23, 1964
Managers: Dietmar Ulrichshofer, Helmut Hartner
Ownership: Dietmar Ulrichshofer
Operation: Distribution of electronic component parts and
apparatus as well as other technical articles, mainly in
Eastern Europe (80%)
Ing. Ulrichshofer, Dietmar Vertrieb Electronischer Bauelmente
Und Elektronischer Gerate
Baderstrasse 5, 823 Bad Reichenhall, West Germany
Commenced Business: November 1974 under Registry Number
HRA 3530, dated 1976
Sole Proprietor: Dietmar Ulrichshofer
Ownership: Dietmar Ulrichshofer
Operation: Wholesale in (5%) import of (20%) and export (75%)
electronic components, mainly semiconductors. Exports
to European countries.
Solid State Electronics SA
DBA: SSC Solid State Commerz AG, Zurich, Switzerland
Comrnenced Business: April 26, 1971
Director: Dr. Juraj Tamas Zabratzky
Operation: Trade in products of the electronic industry and
related products, take-over of agencies of all kinds, rendering
of commercial services of all kinds, acquisition of
participations and real property as well as acquisition,
registration and exploitation of patent rights of all kinds.
Intra-engineering, GmbH
Goethestrasse 11, D-4000 Dusseldorf, West Germany
Commenced Business: December 30, 1977, under registry
HRB 13197
General Manager: Ing. Gerhard Drost
Operation: Development, planning and construction of plants.
Universal Transport GmbH
Cologne, Dusseldorf and Munich, West Germany
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
395
Commenced Business: July 19, 1968, under Registry No. HRB
2296, dated July 27, 1978
Operation: Forwarding and transports of all kinds (air, road and
water); especially international forwarding for import and
export; customs clearance and air freight.
Panalpina AG
Zurich, Switzerland
Commenced Business: 1920
Operation: Freight forwarder to all parts of the world.
Wholesale trade with various butcher articles, such as
sausage machines, guts, etc. The firm does mainly transit
trade, and there is practically no activity in Switzerland.
Copex Air B. V.
Subsidiary of shipping and forwarding "SAFF" B. V.
Schiphol, Metherlands
Commenced Business: January 18, 1977
Managers: G. H. F. Smit, A. M. Hageman
Operation: Air freight forwarding.
1977, 1978 Anonymous Letters Accused CTC Syndicate
In June of 1977 and February of 1978, the United States Consulate in
Dusseldorf received anonymous letters alleging that entities in the CTC syndicate
were violating U. S. export control laws prohibiting the sale and delivery of certain
high technology items to the Soviet Union and Warsaw Pact.
Signed "former employee," the June 20, 1977 letter alleged that the CTC
group of companies in the United States were falsifying export documents as they
shipped commodities from the U. S.; or were routing their cargos to Western
European transshipment points through Mexico and South America.
Among the items which "former employee" alleged CTC had exported
. illegally was an underwater sonar system and accessories with a total value of
$200,000. Presently, the letter went on to say, CTC executives were working with
Intra-Engineering of Dusseldorf in assemblying for subsequent illegal sale a
"complete system for the manufacture of semiconductors, ICs, for an embargoed
system, and which will be purchased in the USA and delivered via circumvention of
export laws."
The anonymous letter said the CTC group first purchased the high
technology equipment through an enterprise in Los Angeles known as "ADT
International Interorga & CTC." The European firm that received the products and
transshipped them to embargoed nations was identified as "ADT Analog and Digita
Technik Bauelemente und Geraete Vertrieb GmbH, Talstrasse, 22, Dusseldorf."
95-929 0 - 82 - 26
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
396
The head of the CTC network was described as being a German citizen who
maintained an apartment near Dusseldorf but whose home was in the U. S. in a
community called "Marinabay."
The name "Schneider" was signed at the bottom of the February 11, 1978
anonymous letter to the American Consulate in Dusseldorf. Much more detailed in
its allegations, Schneider's letter said the CTC syndicate included five firms --ADT
International, Interorga and CTC, all of Los Angeles; Solid State Electronics of
Locarno, Switzerland; Int ra-Engineering of Dusseldorf and Analog and
Digitaltechnik of Dusseldorf.
Using the network of six firms, CTC employees were said to arrange for
the shipment from the U. S. to West Germany of high technology products. From
Germany, Schneider wrote, the products were transshipped to embargoed nations
through a Zurich company known as Panalpina, the latter enjoying "a handsome
profit from the business."
Schneider described one series of transactions this way. In December of
1970, he said, CTC bought Watkins-Johnson electronic components for $60,000.
Schneider said the component was resold for $105,000 and the $45,000 profit "was,
according to our observations, never taxed."
Schneider went on to say that in 1976 and 1977 CTC shipped to Horst
Jonas in Dusseldorf high technology components that included controlled products
manufactured by Tektronic, Hewlett-Packard, RCA and Varian Palo Alto.
Schneider also said Horst Jonas sold an IBM high speed printer to an embargoed
country late in 1977 through a Stuttgart firm doing business as Datenverarbeitung
Klaus Huebner, GmbH.
CTC executives were bringing suit in Dusseldorf to force Horst Jonas to
pay for electronic goods shipped to him, Schneider said, adding that CTC had
realized great profits from illegal sales of controlled commodities. Schneider said
the CTC group had obtained a loan commitment from a bank in Dusseldorf to build
a German-based plant, stocked with American equipment, for the manufacture of
semiconductors.
Anonymous Letters Were Referred To Commerce Department
The two anonymous letters were referred to the Bureau of East-West
Trade in the Department of State. There, the letters were translated into English
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
397
and, in April or May of 1978, they were sent to the Compliance Division of the
Office of Export Administration in the Department of Commerce. The Compliance
Division has the responsibility to enforce the Export Administration Act and to
investigate violations. No investigation was initiated as a result of the letters.
Perkin-Elmer Contacted Commerce In 1979
On April 19, 1979, George Hunter, a Special Agent in the Compliance
Division of the Office of Export Administration in the U. S. Department of
Commerce, was contacted by Robert Markin, director of Administration in the
Perkin-Elmer Company of Wilton, Connecticut.
Markin told Hunter that CTC California Technology Corporation of
Marina Del Rey had placed a purchase order with Perkin-Elmer on July 7, 1978 for
a sophisticated piece of semiconductor testing equipment commercially named
"Micralign," valued in excess of $150,000 and requiring a validated export license to
be shipped overseas and not licensable for shipment to Soviet Bloc countries.
Markin told Hunter that he had learned that the Soviets were offering
several million dollars for the system. It was this information, Markin said, that
had prompted him to conduct his own background check into CTC California
Technology Corporation. Based on his inquiry, Markin said, he suspected that
California Technology corporation was a "front" company whose intention was to
divert the Micralign system to East Bloc countries.
Commerce Interviewed Maluta In 1979
On April 27, 1979, Walter Blackhall, a Special Agent in the Compliance
Division at Commerce Department, interviewed Anatoli Maluta in the CTC offices,
which were then located at 21515 Hawthorne Boulevard in Torrance, California.
Blackhall arranged the interview as a result of information provided by Robert
Markin of Perkin-Elmer Company regarding the Micralign system.
Maluta told Blackhall that he had become president of CTC California
Technology Corporation in 1978. Maluta said he then renamed the firm
Consolidated Protection Development Corporation. Maluta said the founder of the
company was Joe (Volker) Brandlemeier.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
398
Maluta said his firm's export business was small and that it specialized in
serving as a broker for foreign companies and in locating spare parts and
components. Maluta said his company did not export the parts and components, but
rather identified for foreign clients those American enterprises that could sell the
desired items.
Concerning the Micralign system,, Maluta said the order for the equipment
had been requested by a salesman for a Dusseldorf firm known as Elubat, GmbH.
Maluta said Elubat planned to resell the system in West Germany.
Maluta said his West German purchasing agent did not order commodities
by means of formal purchase orders but placed orders by telephone instead.
Blackhall asked Maluta for documentation on the purchase of the Perkin-
Elmer Micralign system. Maluta replied that he kept no such records and that he
had no notes on his telephone conversations with Elubat representatives. Maluta
did have a purchase order, a copy of which he gave Blackhall.
Blackhall asked Maluta if he knew that the Micralign system required a
validated export license issued by the Commerce Department and an import
certificate from West Germany to export the system from the United States.
Maluta replied that he knew little about export regulations. Blackhall then said
that because of the possibility of an attempted diversion of the Micralign system,
he wanted copies of all documents relative to any license application submitted by
Maluta. Maluta replied that because of the Commerce Department's interest in his
desire to buy the Micralign system he would cancel the order with Perkin-Elmer.
Maluta Cancelled Micralign Order
Commerce Department Agent George Hunter contacted Elmer-Perkin on
May 21, 1979. Hunter was informed that Consolidated Protection Development
Corporation, formerly CTC California Technology Corporation, had cancelled its
order for the Micralign system.
Fairchild Warned Commerce About CTC In January of 1980
Fairchild Test Systems Group of San Jose, California, wrote to the
Commerce Department on January 31, 1980, to express concern about the export
activities of Consolidated Protection Development Corporation. As a result of its
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
399
concern, Fairchild had decided to hold up delivery of several Fairchild/Xincom
semiconductor memory test systems with a total value of $740,000 and ordered by
Anatoli Maluta.
Lane Smith, manager of Fairchild's export administration, said in the
letter to Commerce that Maluta and Consolidated Protection were very secretive
about their activities. Smith went on to say:
We have sold several Xincom Memory Test Systems to
CPCD in the past, but due to very tight security requirements
at their manufacturing plants they have not purchased
installation or maintenance contracts.
They have supplied us with the proper certifications
corresponding to U. S. export regulations (DIB 629 and Purchase
Order) but, again, because of very strict security, they refuse
to allow Fairchild representatives to physically audit the
equipment.
Smith said, however, that two Fairchild executives had met at length with
Maluta and concluded that he was not violating export laws. Smith explained:
present this information to you in hope that we might
rapidly reach a decision as to whether we can conduct business
as with a normal domestic customer.
I would appreciate a call if you have any information that
would prevent us from shipping our test system to this
customer.
A January 15, 1980 letter from Paul Andre Deschenes, senior sales
manager of Fairchild in El Segundo, to Richard Noren and Jack Barnes of the
Fairchild Test Systems Group in San Jose revealed the extent of the background
data Fairchild had obtained on Maluta and his company.
Deschenes said that on the basis of the inquiry and his interview with
Maluta he felt Fairchild could no longer justify holding up delivery of the Xincom
memory system. He said he had come to this conclusion because of Maluta's
assurances that his company was a manufacturer of "perimeter protection systems"
used by the air forces of nations comprising the free world and by atomic energy
plants and by high technology equipment factories. Deschenes said:
This suggests that because of its purpose, the Protection
System must have a security of at least one order of magnitude
greater than that of the installation it is designed to protect.
Deschenes then went on to give the results of his inquiry into Anatoli
Maluta's background and character; both, he said, were good. He explained:
Mr. Tony Maluta is a naturalized United States citizen,
who has served with the United States Air Force in Berlin,
Frankfurt, Munich and Edwards Air Force Base. He held a top
secret clearance file in the military. His military obligation
completed, he accepted a position with National Cash Register.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
400
...With the unsolicited approval of Mr. Maluta, an
investigation was requested through the office of Defense
Intelligence in Washington and the Federal Bureau of
Investigation in Washington and Los Angeles. I personally met
with both agencies to insure the accurate transmittal of
information. Upon completion, both agencies reported that
from their investigation and information available in their files,
they see no reason why Fairchild Test Systems Group should
refuse to sell Xincom Systems to Consolidated Protection
Development Corporation.
Paul Andre Deschenes added:
In summary, gentlemen, it appears as though the decision
to hold shipment was proper . under the then existing
circumstances, but with the lack of concrete evidence as
pointed out in action 2) (the DIA and FBI checks), it is no longer
justifiable. It is my recommendation that a prompt
rescheduling of system deliveries to Consolidated Protection
Development Corporation is in order.
As further demonstration of his law-abiding intentions, Fairchild officials
pointed out, Maluta had been asked to give certification attesting to the fact that
he would make end-use application of the Xincom system in accordance with
federal laws and regulations. Maluta accommodated Fairchild, asserting in a
signed Commerce Department form:
This is to certify that all the equipment purchased from
FTSG (Fairchild Test Systems Group) if ever is resold will be in
compliance with all the rules and regulations of the United
States Department of Commerce.
Deschenes attached a copy of the certification to his letter to Noren and
Barnes.
Watkins-Johnson Told Commerce About CTC In February 1980
In a letter dated February 19, 1980, Phillip Gohr, security manager of the
Watkins-Johnson Company of Palo Alto, California, asked the Commerce
Department about the Continental Technology Corporation of Torrance. Pointing
out that Watkins-Johnson had been doing business with Continental for several
yers, Gohr wrote:
Since they have changed names frequently, we are
concerned that there may be a reason. Could you please check
on their current name and past identities and advise me by
telephone.
Gohr attached to his letter a list of names the firm had used on different
dates ? January 16, 1975, California Technology Company; September 3, 1975,
California Technology Corporation; September 16, 1975, CTC California Technology
Corporation; January 20, 1976, California Technology Corporation; December 11,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
401
1978, Consolidated Protection Development; and January 29, 1980, Continental
Technology Corporation.
Gohr also quoted from a Dunn & Bradstreet report on January 18, 1980,
which, he said, described the Anatoli Maluta firm as being a manufacturer of
surveillance equipment for area protection for the Air Force, Army and the Atomic
Energy Commission and that the enterprise had sales in the U. S., Europe and
Japan.
Commerce Interviewed Gohr In March 1980
Robert Rice, a Special Agent in the Compliance Division of the
Commerce Department, interviewed Phillip Gohr on March 3, 1980. Gohr said a
Dunn & Bradstreet report of January 18, 1980 raised questions about the end-use of
the products Anatoli Maluta bought from Watkins-Johnson. In addition, Gohr said,
the firm's many name changes, its undercapitalization, unusual credit arrangements
and the highly sophisticated nature of the products it bought raised more questions.
Gohr told Agent Rice that Consolidated Protection Development
Corporation -- the name the Malua company was using at the moment -- then had
four pending orders with Watkins-Johnson totalling $983,663. The largest order
was for a Model W7 1240 microwave receiving and antenna system valued at about
$700,000. Gohr said that the system would be used mainly for communication
surveillance.
Gohr said another order was for a Model W7 940 microwave receiving
system valued at $258,000. Gohr said that Anatoli Maluta had indicated that the
Model W7 940 was to be used in an intrusion detection system in Arizona at Fort
Huachuca, site of the U. S. Army's Communication Command and an Army
intelligence school. Gohr said he doubted that Fort Huachuca needed such a
complex system as the Model W7 940 microwave receiving system. Gohr feared
the system might be destined for diversion to a foreign nation.
Commerce Began CTC Inquiry In March 1980
Rice called Fort Huachuca on March 13, 1980 and spoke to John
Templeton, assistant chief of staff for intelligence and security in the Army
Communications Command. Templeton checked Fort Huachuca records and those
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
402
of the nearby U. S. Immigration and Naturalization Service facility, and found that
neither Maluta nor his firm had any previous or current contracts for goods or
services.
Maluta Ordered Eight Fairchild/Xincom
On March 4, 1980, Special Agent Robert Rice of Commerce interviewed
R. Lane Smith of Fairchild in the firm's office in San Jose. Smith said that in
August of 1979 Consolidated Protection Development Corporation ordered eight
Fairchild/Xincom systems valued at more than $1.3 million. Smith said Maluta had
claimed that the machinery was for Maluta's own use in Arizona or in the San
Fernando Valley in Los Angeles.
Smith told Rice that Fairchild's records revealed that between 1977 and
December 1979 Consolidated Protection Development Corporation, and its
predecessor firm, CTC California Technology Corporation, had purchased seven
Xincom systems and other semi-conductor testing instruments and accessories, all
of which were subject to export control restrictions for national security reasons.
Smith said Anatoli Maluta would not allow Fairchild's salesmen on the
company's premises for installation or repair of equipment. Smith said that
because he suspected Maluta of exporting the equipment to prohibited destinations
he asked Maluta for written certification that, in the event of resale, no laws or
regulations would be violated. Sabina Dorn Tittel, Maluta's associate in the CTC
organization, signed some of the certification documents. One such declaration
was signed by Tittel on December 21, 1978 in a letter to Roy L. Jones, a Fairchild
representative in the company's office at 888 North Sepulveda Boulevard in
El Segundo. The letter said:
Dear Roy:
This is to certify that all the equipment purchased from
FTSG if ever it is resold will be in compliance with all rules and
regulations of the United States Commerce Department.
Tittel signed the letter as "Purchasing Manager" of Consolidated
Protection.
Fairchild's Lane Smith told Agent Rice that he asked for the
certifications from Maluta and Tittel to release Fairchild from the responsibility of
obtaining export licenses if the machinery was resold for foreign use; and to serve
the purpose of advising Maluta and his c:olleagues that the products could not be
shipped overseas without export licenses.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
403
Wu Brought Customs Service Into Case
It was at this approximate stage in the investigation that Commerce
Special Agent Robert Rice went to the Office of the U. S. Attorney in Los Angeles
where he reported on the progress of the Bruchhausen case to Assistant U. S.
Attorney Theodore W. Wu, a federal prosecutor who was experienced in technology
transfer investigations. At the moment Rice reported on what he knew of the
Bruchhausen inquiry, Wu, in fact, was in the process of putting together the
government's successful prosecution of Walter Spawr and his Spawr Optical
Research Company of Corona, California for having sold high energy laser optics to
the Soviet Union.
Rice, who also was involved in the Spawr inquiry, briefed Wu on the CTC
network. Wu was of the opinion that the inquiry was potentially too big for Rice to
handle alone. When it became apparent that insufficient additional resources could
be dedicated to the CTC case by the Commerce Department, Wu and Kenneth
Ingleby, Special Agent in Charge of the Customs Investigations Office at Terminal
Island, California, worked out an arrangement allowing Customs Service personnel
to take part in the investigation. Customs Special Agents assigned to the CTC
case at various times and for various lengths of time included Stephen Dodge,
Robert Olson, Kelly Wilson, Shelley Altenstadter, Leighton Duffus, James Stanley,
Cliff Wilson, James Lindsey, Donald Buynack, Richard Kellogg, Cornelius
Lauridsen, Frank Orrantia, Michael Peel, Thomas King, Roger Urbanski, and others.
Robert Rice remained on the case and another Commerce agent, Frank Deliberti,
assisted on the inquiry for one week.
Maluta Cancelled Fairchild/Xincom Order
Kelly Wilson, a U. S. Customs agent, and Robert Rice interviewed Anatoli
Maluta on March 7, 1980. In discussing the orders he had placed with Fairchild,
Maluta said the delays had gone on toe long. Maluta said he had cancelled the
orders.
Seized Documents Revealed CTC Plans
Documents seized in May of 1980 by U. S. Customs and German Customs
agents revealed that the Xincom machinery was to have been shipped to the Soviet
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
404
Union. The documents were seized by Customs in court-authorized searches of
businesses of the CTC group in the U. S. and West Germany in May, June and
October of 1980.
A telex from Maluta to CTC executives in Dusseldorf dated January 10,
1980 said:
....In the morning, FSC Xincom salesman will bring a
special form for me to sign. Do not know what is on that form.
After that, sales manager and division manager will decide if I
get more Xincoms. Estimate 10 days for final answer.
Items listed on a three page, August 9, 1979 "Quotation" seized in the
offices of CTC's Techma Technische Maschinenhandels - Gesellschaft in Dusseldorf
on May 16, 1980 included reference to a Fairchild/Xincom 5581 memory test system.
Under the category of "prices," the document stated: "To be understood CIF
Moscow."
Also seized in the raid on Techma was a three page contract of August 9,
1979 between Techma and an entity known as Vsesojuznoje Objedinenije
ElectroniOrgtechnia of 32/34 Smolenskaja Square, Moscow. The contract
stiputlated the terms for the sale of a Fairchild/Xincom 5581 memory test system.
Sale price was put at $1.5 million and, the contract said, "The prices are understood
c.i.f. Moscow." The contract said payment for the goods would be made through
the Bank for Foreign Trade of the USSR.
In the raid on Techma, also seized was an August 9, 1979 telex from CTC
employees in Dusseldorf to Anatoli Maluta in which four more Fairchild/Xincom
memory test systems were ordered.
Another wire seized from Techma -- this one dated August 15, 1979 -- was
from Hans-Jurgen Koenig to a "Mr. Kedrov" of Electronorgtehnika for additional
orders of Fairchild/Xincom memory test systems.
In the raid on Techma, a four-page "order acknowledgement" of
September 15, 1979 was seized. The document, sent by Techma to
Elektronorgtehnika in Moscow, spelled out the compoments that had been sold that
constituted the Fairchild/Xincom 5581 memory system.
Maluta Wanted Two HiPox Systems
Agent Rice of the Commerce Department interviewed Robert
Chamberlain, director of international marketing operations for Applied Materials,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
405
Inc., of Sunnyvale, California, on March 3, 1980. Chamberlain said Applied
Materials was sales representative for Gasonics, Inc., of Mountain View, California.
Gasonics manufactured sophisticated "HiPox" high pressure oxidation systems used
in semiconductor manufacturing.
Chamberlain said that in February of 1980, Anatoli Maluta, using
Continental Technology Corporation purchase orders, tried to buy two HiPox
systems with a total value of about $261,000. Chamberlain was suspicious because
Maluta refused to provide any information regarding the end-use of the machinery
or its intended destination. The purchase orders were dated February 6, 1980.
Because he believed Maluta intended to ship the HiPox equipment abroad in
violation of federal law, Chamberlain decided to add as a condition of sale an
executed end user's certificate.
Accordingly, Brad Beaty, product manager in the marketing division of
Applied Materials, wrote to Maluta on February 13, 1980 to request an end-user's
certificate. Beaty noted that "the ultimate consignee must be the person who is
actually to receive the material for use. A bank, freight forwarder, forwarding
agent, or other intermediary is not acceptable as an alternate consignee."
Beaty also requested a copy of the export license for the HiPox systems.
He pointed out that the ordered equipment would not be sent to Maluta until the
requested certificates were received.
Maluta sent a memorandum dated February 25, 1980 to Monte Toole,
president of Gasonics, in which Maluta asserted that the end-user of the HiPox
systems would be CTC Continental Technology Corporation of Torrance. Maluta
also stipulated that the equipment would not be exported but would be used in
manufacturing processes in the United States. Maluta signed as "vice president" of
CTC.
On January 9, 1980, in a telex to his CTC superior in Dusseldorf, Maluta
said he had had a "long meeting" with a representative of Gasonics and that the
man was "very interested" in where the HiPox systems would be used. He added,
"May even have a Perkin Elmer problem here. Get plenty for this."
In the same telex, Maluta made reference to "Uli," a nickname for
Dietmar Ulrichshofer, who owned electronics distributing businesses in Vienna,
Austria and Bad Reichenhall, West Germany, and purchased electronic equipment
from the CTC group for sale to the Soviets, the Soviet Bloc and other nations.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
406
On March 3, 1930, Agent Rice interviewed Monte Toole, president of
Gasonics. Toole said Maluta refused to give him any information about the
destination of the two HiPox systems or their intended end-use. Maluta would only
sayd that the systems were to be used in a top security installation at Fort
Huachuca, Arizona.
Hans Witten Was CTC Frieght Forwarder
On March 6, 1980, Agent Rice interviewed Hans Witten, vice president of
Kamino International Transport, Inc., an international air freight forwarder located
at 613 South Hindry Avenue in Inglewood, California. Witten said he had known
Maluta and Tittel since 1978 and that Kamino International had served as freight
forwarder for Maluta's multi-named businesses on many occasions.
Witten had doc:uments in connection with 19 international shipments
Maluta had instigated from November of 1979 to February of 1980. Maluta
purchased the shipped goods in the United States through Continental Technology
Corporation and Consolidated Protection Development Corporation and exported
under the names of Universal Digital Corporation and Atlantic Universal Supply,
Inc. Of the 19 shipments, 16 were exported to West Germany and three to India.
None of the shipments to West Germany were made with a validated export
license. All shipments to India were made with validated export license issued by
the United States.
Commerce Asked Customs For Help In CTC Case
On March 20, 1980, Sharon Connelly, Director of the Compliance Division
of the Office of Export Administration in the Department of Commerce, asked the
U. S. Customs Service for help in the CTC investigation. Surveillance needed to be
performed on a CTC entity and its employees and a search warrant might have to
be served. Commerce Department investigators did not have the resources or
authority to utilize these law enforcement tools.
In her letter to Kenneth Ingleby, Special Agent in Charge of Customs
investigations office at Terminal Island, California, Connelly said:
During the week of March 24, it is anticipated that
Special Agents Frank Deliberti and Robert Rice of my staff will
be in Los Angeles on an investigation of potential violations of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
407
the Export Administration Act by Consolidated Protection
Development Corporation, 21515 Hawthorne Boulevard,
Torrance, California. Agents Deliberti and Rice will be
conducting a surveillance of a freight shipment expected to be
exported from Los Angeles to an unknown destination in the
latter part of that week. We expect that the surveillance will
culminate in a seizure of the equipment, and various interviews,
with the possibility of the service of a search warrant on the
subject firm.
It is possible that assistance from your office will be
required, at lest insofar as the anticipated seizure of the
equipment is concerned. Due to the tentative nature of the
expected events, we are unable at this time to request
assistance for a specific date, but it is anticipated that March
26 and 27 are the dates that assistance will most likely be
requested, if required.
Thank you for your cooperation in this matter. I will have
Agents Deliberti and Rice contact you as soon as they arrive in
Los Angeles.
Cal Comp Shipment Was Stored Wtih HiPox
On March 23, 1980, Rice and Customs Agent Stephen Dodge interviewed
Hans Witten. Witten said the Gasonics HiPox system cosigned to Continental
Technology Corporation in care of Kamino International had been delivered earlier
in the day. Witten said he was storing another shipment belonging to Maluta. The
second shipment was from California Computer Products of Anaheim, California,
an enterprise referred to as CalComp. Witten said he was holding both shipments
pending the arrival of shipping instructions from Maluta and Sabina Tittel.
Gasonics Delivered CTC Two More HiPox
On March 25, 1980, Rice again interviewed Monte Toole of Gasonics in the
firm's offices in Mountain View. Toole said that on that very day Maluta had
accepted delivery of the two HiPox systems. Toole said Maluta told him that
Maluta's plant in the San Fernando Valley had recently suffered fire damage and he
was unable to use the HiPox systems in that facility. However, Maluta said he
would take possession of the systems and store them at Kamino International in
Inglewood or use them at a facility he maintained in Arizona.
Agents Inspected CalComp, HiPox Shipments
On April 1, 1980, Agents Dodge and Rice returned to Inglewood and met
again with Hans Witten, who showed them the HiPox and CalComp shipments.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
408
Witten explained that earlier in the day he had called Sabina Tittel and asked her if
the CalComp shipment required an export license. Tittel had replied that she did
not know, but that she would find out from Maluta.
Fort Huachuca Was Termed CalComp Destination
On April 2, 1980, Agent Rice interviewed Richard Kempster, a CalComp
sales representative. Kempster said that on January 21, 1980, Anatoli Maluta had
placed an order for a $90,360 CalComp Model 7000 high performance computerized
drafting system. Kempster said Maluta told him that Continental Technology
Corporation intended to use the system to design semiconductor devices used in
electronic security systems manufactured by Kamino, Inc., of Inglewood, and that
the system would later be sent to Fort Huachuca, Arizona.
True Destination Of CalComp Was Germany
On April 2, 1980, Witten informed Customs Agent Stephen Dodge that the
CalComp shipment was to be forwarded to Techma Technische Maschinenhandels -
Gesselschaft, GmbH, Dusseldorf, West Germany. Witten said the shipper's letter of
instruction, invoices and U. S. Shipper's Export Declarations (SED's) submitted to
Kamino by Continental Technology Corporation described the CalComp systems as
"meters" valued at $14,035.64. The documentation indicated that the exporter was
Universal Digital Corporation of 4804 Macafee Road in Torrance. The SED's were
signed by "S. Dorn," Dorn being Sabina Tittel's maiden name.
W-7 Receiver Reportedly Was Shipped To Germany
Rice interviewed R. G. Orman on April 7, 1980. Orman, district sales
manager for the Watkins-Johnson Company in El Segundo, said he had known
Anatoli Maluta for about five years and had conducted a substantial amount of
business with him. Orman said Maluta had once told him that one of the Watkins-
Johnson radio receiver systems he had bought had been shipped to his contact in
West Germany.
Orman showed Rice two Watkins-Johnson internal reports in which Maluta
was quoted as having said that a recent order from his firm would be assembled in
Arizona and then shipped to an unidentified facility in Alaska.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
409
HiPox Systems Reportedly For Car Bumpers
On April 11, 1980, Witten told Agent Rice that he had spoken to Anatoli
Maluta. Witten advised Maluta that the CalComp and HiPox shipments required
export licenses. Maluta indicated he would obtain export licenses for them.
Maluta also said the HiPox systems were to be used for tasks such as the metal
plating of car bumpers.
Documents Show CTC Undervalued Shipments
On April 24, 1980, Hans Witten turned over to Customs Agent Dodge
shipping documents which Continental Technology Corporation had submitted in
connection with the CalComp and HiPox systems.
Regarding the CalComp Model 7000, there were two shipper's letters of
instruction. They revealed that the exporter was Universal Digital Corporation of
1843 Lincoln Boulevard, suite 202, Santa Monica. The agent was Kamino
International. The ultimate consignee was Techma GmbH of Dusseldorf. The
freight forwarder was Universal Transport of Dusseldorf. The country of ultimate
destination was West Germany. The CalComp machinery was described as being
typesetting parts and tables. Signator for Universal Digital was "T. Metz," an alias
used by Maluta. Declared customs value was listed as a total of $4,091.16.
The two invoices for the CalComp shipment gave Universal Digital's
address as 4804 Macafee Road, Torrance. They indicated that the destination was
Techma GmbH of Dusseldorf, that the total value of the shipment was $4,090.64
and were signed by "T. Metz" and "M. Maynard" and initialed "ST." Marcia
Maynard was a clerical employee who worked for Maluta. ST stood for Sabina
Tittel.
The shipper's letters of instruction were carbon copies of shipper's export
declarations (SED's), certification required of all exports. Searches were made at
Customs Services files at the John F. Kennedy International Airport in New York in
March of 1980 ? the site and time the CalComp shipments left the U. S. -- and no
copies of the SE D's were found.
Customs Service estimates concerning the CalComp shipments were that
the exporter ? Universal Digital Corporation, also known as Continental
Technology Corporation -- had underestimated the total value by more than
$86,000.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
410
Regarding the HiPox shipment, the two shipper's export declarations
indicated Universal Digital of Santa Monica was the exporter, Kamino International
of Inglewood the agent and the ultimate destination was Dietmar Ulrichshofer's
electronics business in Bad Reichenhall, West Germany. The products were
described as furnaces with a declared total customs value of $3,445. The HiPox
invoices listed the exporter as Universal Digital of Torrance and gave a customs
value of $3,444.85. The SED's were signed by "M. Maynard" and initialed by "ST."
The shipments were undervalued in the amount of $259,129.81.
CalComp System Shipped To Dusseldorf
On May 1, 1980, the CalComp shipment was forwarded from Los Angeles
to the JFK International Airport in New York on American Airlines flight No. 842.
In New York, the shipment was transferred to Lufthansa flight No. 461 scheduled
to depart for Dusseldorf on May 4. The CalComp shipment was allowed to be
exported, although German and U. S. Customs authorities tracked it. On May 7,
German Customs Agent Ulrich Schulz, working with U. S. Customs Agent Roger
Urbanski, identified the CalComp shipment as being in the Dusseldorf airport
marked for forwarding to Zurich by Universal Transport, a freight forwarder based
in Dusseldorf. A new consignee, Panalpina A. G., had been stipulated on the
shipping documents. Panalpina is a freight forwarder with offices at the Zurich
airport.
Sand Substituted For HiPox Systems
Meanwhile, in the U. S., the HiPox shipment was delivered to the Los
Angeles International Airport on May 5. Shipping instructions called for the cargo
to be loaded aboard a Lufthansa flight for Munich. However, Customs authorities,
working with Assistant United States Attorney Theodore W. Wu, and with
Commerce Department Agent Rice, established that the shipment was in violation
of the Export Administration Act. Wu, after advising the Department of
Commerce's Compliance Division of his operational intent, directed U. S. Customs
to seize the HiPox machinery and substitute two similar looking crates that
contained sand.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
411
The cost of air freight and substituting the sand shipment was estimated
to be about $10,000. Officials of the Compliance Division of the Commerce
Department in Washington opposed the shipment substitution concept and refused
to put up the money. Ingleby and Wu arrived at a solution in which the Customs
Service paid for the sand substitution, the cost of which eventually amounted to
considerably less than the original estimate.
Fake HiPox Shipment Scheduled For Moscow
The fake HiPox shipment was flown to Munich. On May 23, it was shipped
by truck to Vienna under authority of a freight forwarder named Spediton Poseidon.
Roger Urbanski, a U. S. Customs agent assigned to the American embassy in Bonn,
went to Vienna where Austrian Customs officials told him that Poseidon had
booked passage for the HiPox systems aboard a KLM Royal Dutch Airline, flight
No. 940, from Vienna to Amsterdam. In Amsterdam, the cargo was to be
transferred to Aeroflot flight No. 702 for Moscow, departing on July 7. In
scheduling these flights, Poseidon was representing Electronic Elektrotechnische
Bauelemente GmbH of Vienna, a firm owned and managed by Dietmar Ulrichshofer.
Scheduled to receive the shipment in Russia was an entity known as
Mashpriborintorg of Moscow, a Soviet state purchasing agency.
Dietmar Ulrichshofer Discovered Crates of Sand
On the evening of June 3, Dietmar Ulrichshofer went to the Vienna
storage area where the cargo was being held prior to its shipment to Amsterdam
and then Moscow. Unaware that the two crates contained not HiPox systems but
sand, Ulrichshofer opened one of them to insert an operating manual which had
been forwarded to him earlier. He discovered that the shipment had been
substituted. At 1:10 AM on June 4, Ulrichshofer cancelled the shipment to
Amsterdam.
German Customs Seized CalComp Shipment
German Customs agents seized the CalComp shipment on May 16, 1980 as
it was stored in a staging area at the airport in Dusseldorf. A court-authorized
95-929 0 - 82 - 27
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
412
/ search of Techma offices in Dusseldorf revealed documentation proving that the
cargo was destined for Moscow where Elektronorgtehnika was to have received
delivery.
Information Showed Ties to Ulrichshofer
In late May of 1981, U. S. Customs Agent Roger Urbanski developed
information indicating that Dietmar Ulrichshofer, through his Vienna firm,
Electronic Elektrotechnische Bauelemerite GmbH, had ordered the HiPox systems
from a CTC entity in Dusseldorf.
In early June of 1981, Ulrich Schulz of German Customs, U. S. Customs
Agents Stephen Dodge and Roger Urbanski and Commerce Agent Robert Rice
developed information indicating that Ulrichshofer's firm in Bad Reichenhall was a
purchasing agent for Electronic of Vienna, which represented various firms in the
Soviet Union and the Warsaw Pact nations. Ulrichshofer reportedly bought
electrical equipment from the CTC syndicate and CTC reportedly was able to
supply equipment which was very difficult to obtain from anyone else.
Ulrichshofer reportedly sold and delivered Watkins-Johnson microwave
receiving systems and associated parts and accessories to the Yugoslavian Defense
Ministry. CTC California Technology Corporation purchase orders revealed that
Watkins-Johnson 940 series equipment was exported from the U. S. consigned to
Dietmar Ulrichshofer in November of 1977, February of 1978 and February, April
and October of 1979. All the shipments were in violation of the Arms Export
Control Act.
Ulrichshofer reportedly sold and delivered three Fairchild/Xincom 5581
memory test systems to the firm Tungsram of Budapest, Hungary. CTC purchase
orders revealed that Fairchild/Xincom 5581 memory test systems were shipped to
Ulrichshofer by California Technology Corporation in May of 1978 and May and July
of 1979.
Ulrichshofer reportedly received a Watkins-Johnson TN-600 V/3 940 tuner
for the Watkins-Johnson 940 microwave receiving system from Mashpriborintorg in
Moscow in late 1979. The equipment had broken down and the Russians wanted it
repaired. Ulrichshofer reportedly turned the tuner over to Bruchhausen's ADT
company in Dusseldorf. The tuner was shipped back to the U. S. for repair and was
seized on October 22, 1980 by U. S. Customs agents at Computer Peripherals
Industries in Chatsworth, a suburb of Los Angeles.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
413
Sales To Dr. Guenther Forgber
German Customs Agent Ulrich Schulz and U. S. Customs Agent Roger
Urbanski developed information on June 23, 1981 indicating that the Watkins-
Johnson 940 microwave receiving systems had not been sold to the Yugoslav
Defense Ministry but directly to Mashpinborintorg in Moscow. It was reported that
only one of the Fairchild/Xincom memory test systems was sold to Tungsram of
Hungary and three had been sold to Dr. Guenther Forgber of East Germany.
Schulz and Urbanski obtained documentation from Ulrichshofer's sales of
American manufactured electronic equipment to Soviet and Soviet Bloc customers
including the sale to Dr. Guenther Forgber of Narda microwave amplifiers and
power dividers and a Fairchild automatic testing system and Xincom manuals; and
to Mashpinborintorg of Moscow of Watkins-Johnson 940 microwave receiving
systems, manuals and tuners.
Koenig Described Work In CTC Syndicate
On June 6 and 12, 1981, Hans-Juergen Koenig was interviewed in the U. S.
Embassy in Bonn, West Germany by Stephen Dodge of the U. S. Customs Service,
Robert Rice of Commerce and Theodore Wu, an Assistant U. S. Attorney in Los
Angeles.
Koenig, reciting his recollections in fluent English, said that he first went
to work for the CTC group of companies in June of 1977, serving as general
manager of Analog and Digital Technik, or ADT, of Dusseldorf.
Koenig said ADT's sales were largely electrical components to West
German firms but one department of the enterprise, managed by Sybille Ziogas,
was devoted exclusively to the sale of electronic equipment to the Soviet Union.
Ziogas worked in ADT from August of 1977 until late 1978 when she joined another
CTC entity.
His tour at ADT lasted six months, Koenig said. While he was not trained
in technical matters, Koenig did learn the technical side of the business and how
the CTC enterprises operated. Koenig came to realize that ADT had two principal
interests ? sales to West German firms, and sales to the Soviet Union.
CTC executives explained to Koenig that all sales by ADT to the Soviet
Union were made through Electronorgtechnika, also known at Elorg, the Soviet
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
414
state purchasing agency for electrical components, test equipment for components
and computers. Koenig said he learned while working for ADT that the CTC group
bought most of the electrical components and computers for the Soviet Union from
the United States. Koenig said CTC was managed by Tony Maluta, a Russian born
American who spoke English, German and Russian and who had technical
experience and knowledge of high technology equipment. Maluta was assisted by
Sabina Dorn Tittel, a German woman whom Koenig met for the first time in
Dusseldorf in 1977 shortly after he joined ADT.
It was the opinion of CTC executives in Germany that ADT's sales of
American manufactured high technology to the Soviet Union did not violate
German laws because the goods never formally entered West Germany but instead
were only "in-transit" -- or passing through ? in route to Switzerland and then on
to the U.S.S.R., Koenig said. They felt they were breaking no law when they
shipped high technology freight through West Germany and on to the Soviet Union
with no German export licenses.
But Koenig doubled this legal interpretation, pointing out that export
licenses were required for freight shipped 'in-transit through West Germany and
that it was apparant that West German authorities never knew about CTC's sales to
the Soviets.
West German executives of CTC also held the legal opinion that Tony
Maluta's shipments out of the U. S. did not require American export licenses
because Maluta declared the shipments in a deceptive way, describing them in
deliberately vague terms such as "electricals." Because their destination was West
Germany, CTC's shipments were undetected.
However, Koenig said, CTC officials knew that if they had listed the
Soviets as recipients of the goods, export licenses would have been refused. Koenig
said Tony Maluta declared Fairchild/Xincom computer equipment as being
"electricals" when he knew the machinery was more sophisticated than that.
Because of Maluta's "deceptive methods," Koenig said, he believed that Maluta
recognized the legal requirement for proper export licenses was being
circumvented.
While he was learning ADT procedures, Koenig said, he had differences
with management over how the firm should be run. The differences led to Koenig's
quitting ADT. However, he remained on good terms with ADT. In fact, company
officials put up 50,000 Deutschemarks of their own money to enable Koenig to
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
415
establish another enterprise, Elmasch, GmbH. The founding of Elmasch enabled
Koenig to put into practice an idea he had of selling electrical and computer
components to the Warsaw Pact nations. Koenig explained how and why Elmasch
came into being:
By early 1978, I was knowledgeable of ADT's methods of
doing business with the Soviet Union. During this period, I
discussed...my ideas about doing business with the other Eastern
Bloc nations. As part of my attempts to establish business
contacts with the Soviet Bloc customers after the
establishment of Elmasch, I attended a trade fair in Hannover,
West Germany, in April, 1978. At that time, I anticipated
selling electrical components and semiconductors to my
customers, but I learned that certain electric components were
very easy for Soviet Bloc customers to obtain from West
Germany and Austria. I determined that....the price for such
components was relatively low and their sale to Eastern Europe
was not profitable. In about June, 1978, I obtained from
Bulgaria an inquiry for U. S. ball-bonding , die-bonding and
etching equipment used in semiconductor manufacturing, and
this inquiry became an official order in September, 1978. This
inquiry was sent by me in Bulgaria to ADT then to Maluta at
CTC.... Later on, less than a week after my return from
Bulgaria, ...I talked with Tony (Maluta) about this inquiry by
telephone from ADT's office, using a telephone loud speaker.
While Koenig was in the process of setting up Elmasch, GmbH, he
established another business, Techma, GmbH, to take over ADT's transactions with
the Soviet Union. ADT officials wanted to have no further sales to the Soviets.
Koenig was listed as Techma's general manager but Sybille Ziogas, who had
supervised ADT's Soviet sales, took on the same assignment with the new entity.
CTC executives held a party in April or May of 1978 near Dusseldorf
which was attended by about 20 persons, including Maluta and Koenig. Koenig and
Maluta were told to get to know each other and to be on good terms.
Koenig discussed an order he had received from Czechoslovakia for Intel
2708 integrated circuits and an Intel microcomputer develoment system model
MDS231. Maluta's judgement was that Koenig was on the right track in planning to
use Elmasch, GmbH, as a vehicle to supply Eastern Bloc orders. Maluta told
Koenig to accept orders from Warsaw Pact nations and to transmit them directly
to him at CTC in California. Maluta said there would be "no problem" with CTC
delivering U. S. machinery to Elmasch.
Koenig said he frequently heard CTC officials talking long distance with
Maluta. They talked about the availability of machinery and prices. It was obvious
what they were talking about, Koenig said. CTC executives in Germany were
afraid their telephones were monitored and were careful not to mention Soviet
Bloc customers by name.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
416
Koenig remembered one telephone conversation between one CTC
executive and Maluta that he overheard on the loud speaker. The two men
discussed a possible order from Bulgaria which Koenig knew about. But neither
man referred to Bulgaria or the prospective buyer by name.
The circuitous nature of the telephone conversations did not prevent
Maluta from knowing what was happening, Koenig said. Maluta knew that all the
orders from Elmasch were from Eastern Bloc nations.
The Soviets invasion of Afghanistan in late 1979 triggered new U. S.
government assurances that the flow of high technology to the Soviet Bloc would
be made more difficult. The grain embargo was imposed and, Koenig said, there
were indications that illegal shippers like Maluta were likely to face stronger U. S.
export controls.
To prepare for such an eventuality, the CTC group called a meeting with
Koenig and Maluta for London in February of 1980. Maluta said a tightening of
export controls might be attempted but that they would not succeed, Koenig
recalled. Moreover, Maluta added that he had noted no increase in efforts by the
U. S. government. In short, Maluta declared, there was no need to devise a new
method for shipping high technology out of the U. S. because no new safeguards
had been set up. But, Maluta did say that a Commerce Department agent had
visited him, a recollection by Maluta which was doubted by both Koenig and other
CTC representatives. They believed Maluta was exaggerating the "dangers
involved in ordering U. S. goods" as a ploy to get the CTC syndicate to pay him
more money, Koenig said.
Horst Jonas, a customer of CTC, was suspected by the West German
national police (Bundes kriminal amt or BKA) of having illegal dealings with the
Soviet Bloc. The BKA interviewed CTC executives about Jonas. The encounter
troubled them to such an extent that they moved ADT to new quarters in
Dusseldorf in 1977 and then moved the company offices to Munich in 1979, Koenig
said. Jonas was arrested and imprisoned for 18 months by German authorities for
alleged espionage activities.
Referring to his contention that Tony Maluta was well aware of the
activities of the West German businesses, in the CTC syndicate, Koenig recalled a
conversation he had during the London meeting with Maluta. He told Maluta that
Bulgaria was Elrnasch's biggest customer. To conceal the true destination of the
Bulgarian shipments, Elmasch gave them the order code of 7200. Maluta knew all
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
417
7200 codes were for Bulgarian customers, Koenig said. Similarly, Maluta also knew
that Techma, GmbH, was selling to the Soviet Union, Koenig said. He added:
1 am of the opinion that Maluta knew all orders from
Elmasch and Techma were for Eastern European and Soviet
customers, except for a very small portion of Techma orders
for Zabel, a West German firm. My opinion is based on the fact
that I told Maluta in May 1978 that Elmasch was set up
specifically to do business with Eastern Europe other than the
U.S.S.R., and Maluta had to know Techma was selling primarily
to the U.S.S.R. because it followed ADT in the Soviet business,
and simply was a change of name for business with the Soviet
Union already being conducted by ADT.
Early in 1980 CTC executives began to suspect that Maluta and his
assistant, Sabina Dorn Tittel, were cheating them, charging them exorbitant prices
for U. S. equipment.
On a Monday morning in May, Werner J. Bruchhausen and Koenig made an
unexpected visit on CTC in Los Angeles. Their arrival caused tension between
Bruchhausen and Maluta. Later that day the two men quarreled. When Maluta left
the offices, Bruchhausen and Koenig searched the files and found evidence that
Maluta was overcharging his employer 10 to 20 percent. Bruchhausen fired Maluta
and Sabina Tittel.
Maluta's pay, Koenig said, had been $2,000 to $3,000 a month but he was
given another $25,000 a month by charging the CTC entities through a fictitious
advertising account which CTC executives had agreed to. The CTC executives set
aside another $150,000 to be used by Maluta should he be arrested and face big
legal fees. Suspicions that Maluta was stealing from CTC were well founded and
Koenig estimated that Maluta embezzled about $800,000 from CTC entities.
Koenig recalled his first meeting with Sabina Dorn Tittel, saying he met
her in August of 1977 while she was on vacation in Dusseldorf. He said Tittel may
not have known about ADT's Soviet sales at the time but that it was his "common
sense assumption that Maluta must have told her at some time."
Koenig Listed Communist Customers
In his interview with U. S. government authorities, Koenig gave detailed
information about the sales and deliveries of equipment to Soviet, Soviet Bloc and
Communist Chinese customers. The customers included:
-- China National Foreign Transportation Co. of Mainland China.
? Electronic-Export Import; and Veb Carl Zeiss Jena (Import Kontor Viw)
of East Germany.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
418
? Unitra Foreign Trade Enterprise; and Metronex of Poland.
Kovo Aubenhandelsunt-Ernehmen of Yugoslavia.
? Tungsram of Hungary.
Isotimpex; and Inco, lndustrial-Ernehmen of Bulgaria.
? Technoimportexport, of Romania.
Ilona Seibert Recalled Maluta's Employ
Ilona Seibert, who worked for Maluta from June of 1978 to February of
1979, told Customs Agent Shelley Altenstadter and Commerce Agent Robert Rice
that CTC bought equipment under the name of California Technology Corporation
and exported it through the company known as Interorga. Later, she said,
purchases were made through Consolidated Protection Corporation and Atlantic
Universal Supply, Inc. did the exporting.,
The use of different enterprises to buy and export was a ruse to enable
the CTC companies to prevent vendors from readily figuring out the fact that their
goods were being shipped abroad, Seibert said. She also noted that duplicate or
double invoices were prepared by CTC entities but she never asked why.
Marsha Maynard Kept Books For CTC
Similar information was provided to Customs Agents Stephen Dodge and
Shelley Altenstadter by Marsha Maynard, a CTC secretary. Maynard, who had
jointed the CTC entities in July of 1979, did clerical work and kept the books for
Continental Technology Corporation and Universal Digital Corporation.
Maynard, recalling that the CTC entities kept three sets of books, said
equipment was bought by Consolidated Protection Development Corporation and
Continental Technology Corporation and was exported by Atlantic Universal
Supply, Inc. and Universal Digital Corporation.
It was explained to her by Sabina Tittel that the CTC group of firms used
differently named firms to buy and export to prevent vendors from realizing that
the products they sold Maluta were being shipped overseas, Maynard said. Maluta
and Tittel both told Maynard that if any vendor asked where the equipment was to
be used, she was to say it would be shipped to a facility in Arizona. Maluta and
Tittel both admitted to her that the Arizona plant did not exist, Maynard said,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
419
adding that her instructions also included hiding all documents referring to
Universal Digital whenever a vendor visited the CTC office.
Two sets of invoices were maintained, Maynard said, explaining that one
set gave accurate dollar values and product descriptions and the second set carried
false data.
Scott McKay Was CTC Shipping Clerk
Scott McKay, a shipping clerk at CTC from October of 1978 to October of
1979, told Customs Agent Altenstadter that he prepared duplicate commerical
invoices, one listing the actual value and description of the shipped commodities
and the second stating false values. McKay said one invoice was mailed to the
CTC group in Dusseldorf, the other accompanied the exported item on its journey,
but he could not remember which went where.
Sharon Engelman Was CTC Receptionist
Sharon Engelman was a receptionist at CTC from February through July
of 1979. She told Customs Agents Altenstadter and Duffus that about once a week
CTC offices in Dusseldorf sent by wire transfer about $100,000 to the CTC entities
in California.
U. S. Customs Searches CTC Quarters
Shortly after Anatoli Maluta and Sabina Dorn Tittel were fired in early
May of 1980, the investigation into the activities of the CTC entities heated up.
The U. S. Customs Service, acting upon court-authorized warrants, on May 19, 1980
searched the premises at:
--Continental Technology Corporation, Suite 100, 23868 Hawthorne
Boulevard, Torrance.
?Sabina Tittel's residence at 30605 Cartier Drive, Rancho Palos Verdes.
?Universal Digital Corporation, Suite 202, 1843 Lincoln Boulevard, Santa
Monica.
--Continental Technology Corporation, Suite 646, 21515 Hawthorne
Boulevard, Torrance.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
420
--Sabina Tittel's former residence at 4804 Macafee Road, Torrance.
--Werner J. Bruchhausen's safe deposit box in the Bank of America branch
at 21615 Hawthorne Boulevard, Torrance.
On May 20, a court-authorized search was conducted by U. S. Customs
agents on a safe deposit box assigned to Consolidated Protection Development
Corporation in a Torrance Bank of America branch.
On May 30, U. S. Customs agents made a court-authorized search of
Sabina Tittel's home at 30605 Cartier Drive in Rancho Palos Verdes.
The final court-authorized search in California occurred on October 2,
1980 when Customs agents seized documents from the Computer Peripherals
Industries, 10836 Bothwell Road, Chatsworth.
German Customs Made Additional Searches
Beginning on May 16, 1980 and continuing through October 8, 1980, German
Customs agents, using court-authorized warrants, searched the premises of
Techma, GmbH of Dusseldorf, West Germany; Elmasch GmbH of Bonn; the
residence of Hans-Juergen Koenig in Bonn; ADT Analog and Digital Technik,
Neiderseeon; the residence of ADT accountant Ursula Tinte in Dortmund; Ing.
Ulrichshofer, GmbH, Bad Reichenhall; Dema Computertechnik, GmbH, Munich; and
the residence of Frank and Karin Nassauer in Bad Homburg.
Detlef Lackmann Represented CTC
Customs Agent Stepten Dodge interviewed Dance Garrett, an employee
of California Technology Corporation on June 3, 1980. Garrett said Detlef
Lackmann, a CTC representative from Dusseldorf, had flown to the United States
from Germany to begin disposing of equipment still held by the CTC group of
companies.
Dodge arid Commerce Agent Robert Rice located Lackmann on June 4 and
interviewed him in his room at the Plush Horse Inn in Redondo Beach. They
interviewed him again on June 6 in the U.. S. Customs house at Terminal Island.
Lackmann, explaining that he was an officer of Elubat, GmbH, and an
employee of ADT, said there was no doubt that the CTC companies sold products
of U. S. origin to the Soviet Union and might also do the same for Bulgaria. He
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
420
--Sabina Tittel's former residence at 4804 Macafee Road, Torrance.
--Werner J. Bruchhausen's safe deposit box in the Bank of America branch
at 21615 Hawthorne Boulevard, Torrance.
On May 20, a court-authorized search was conducted by U. S. Customs
agents on a safe deposit box assigned to Consolidated Protection Development
Corporation in a Torrance Bank of America branch.
On May 30, U. S. Customs agents made a court-authorized search of
Sabina Tittel's home at 30605 Cartier Drive in Rancho Palos Verdes.
The final court-authorized search in California occurred on October 2,
1980 when Customs agents seized documents from the Computer Peripherals
Industries, 10836 Bothwell Road, Chatsworth.
German Customs Made Additional Searches
Beginning on May 16, 1980 and continuing through October 8, 1980, German
Customs agents, using court-authorized warrants, searched the premises of
Techma, GmbH of Dusseldorf, West Germany; Elmasch GmbH of Bonn; the
residence of Hans-Juergen Koenig in Bonn; ADT Analog and Digital Technik,
Neiderseeon; the residence of ADT accountant Ursula Tinte in Dortmund; Ing.
Ulrichshofer, GmbH, Bad Reichenhall; Dema Computertechnik, GmbH, Munich; and
the residence of Frank and Karin Nassauer in Bad Homburg.
Detlef Lackmann Represented CTC
Customs Agent Stepten Dodge interviewed Dance Garrett, an employee
of California Technology Corporation on June 3, 1980. Garrett said Detlef
Lackmann, a CTC representative from Dusseldorf, had flown to the United States
from Germany to begin disposing of equipment still held by the CTC group of
companies.
Dodge arid Commerce Agent Robert Rice located Lackmann on June 4 and
interviewed him in his room at the Plush Horse Inn in Redondo Beach. They
interviewed him again on June 6 in the U.. S. Customs house at Terminal Island.
Lackmann, explaining that he was an officer of Elubat, GmbH, and an
employee of ADT, said there was no doubt that the CTC companies sold products
of U. S. origin to the Soviet Union and might also do the same for Bulgaria. He
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
422
The indictment cited specific high technology systems and components
which the group allegedly had exported from the U. S. illegally including:
--Watkins-Johnson Model MF 100/W7 940 main frame microwave receiver
system.
--Fairchild Systems Technology Xincom Parallel Operation Memory Test
Systems, Model 5531.
--Data General Corporation Model Eclipse S/230 computer systems.
--Watkins-Johnson Company Model TN-600 microwave tuner.
--Fairchild Xincorn Systems Model 5580 Basic Test System.
--Memorex Corporation Disk Drive System.
--Intel Corporation Single Board Computers.
--Intel Corporation and Motorola, Inc., microcircuits.
--Tamarack Scientific Company Model 142 Contact Printer.
?Intel Corporation Microcomputer Development Systems.
--Intel Corporation microcircuits.
--Analog Devices, Inc., microcircuits.
--Watkins-Johnson Company Model W7 8640 Manpack Receiver with five
tuning heads and battery chargers.
The indictment alleged that Bruchhausen, Ulrichshofer, Maluta and Dorn
conspired to export various high technology commodities from the U. S. to West
Germany and elsewhere without export licenses.
Maluta, Bruchhausen and Ulrichshofer were alleged to have exported
electronic communications systems, computer components and other commodities
with knowledge that they would be used for the benefit of the Soviet Union or
Eastern Bloc countries.
As early as 1977, the indictment alleged, Maluta and Tittel received
purchase orders for electronics commodities from Bruchhausen and Ulrichshofer
and procured the commodities from U. S. manufacturers for shipment abroad.
Maluta and Tittel were accused of 13 counts of illegally exporting to West
Germany. Maluta was charged in 23 other counts with exporting various
commodities with knowledge they would benefit the Soviets.
Maluta and Tittel were accused of filing false Shipper's Export
Declarations (SEDs) and other false documents submitted to the U. S. Customs
Service. Maluta and Tittel were also charged in nine counts with various income
tax violations involving hundreds of thousands of dollars.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
423
In addition, Maluta was charged with perjury, having allegedly lied to the
grand jury on June 7, 1980.
Bruchhausen and Ulrichshofer were both outside the United States when
the indictment came down. Maluta and Tittel were apprehended by agents of the
Internal Revenue Service in Palm Desert, California on August 19. Bail for each of
them was set at $800,000. The IRS had joined the investigation in April 1981 at the
request of Assistant U. S. Attorney Theodore Wu.
Maluta and Tittel were in a car when arrested and had three pistols in the
back seat. They did not resist arrest, although one of them seemed to be reaching
into the back seat just before they surrendered. Tittel's attorney told reporters
that Tittel owned a condominium in Palm Desert and sometimes went shooting in
the desert.
Disposition of Maluta and Tittel Cases
Anatoli Maluta was found guilty of conspiracy, filing export documents
containing false statements, unlawful exportation of Munitions List items,
exporting without a license, tax evasion, subscribing to a false tax return and
exporting without a license to countries barred because of national security
considerations. Sabina Dorn Tittel pled guilty to making false statements,
exporting without a license, tax evasion and subscribing to a false tax return.
In his sentencing memorandum submitted to the court, Assistant U. S.
Attorney Wu, who prosecuted the case, said the export offenses committed by
Maluta and Tittel involved more than three years of "continuous and deliberately
designed, and systematically executed criminal conduct of a serious nature."
Wu said Maluta and Tittel variously were guilty of exporting goods in
violation of the Export Administration Act, the Commodity Control List of the
Export Administration Regulations, the International Traffic in Arms Regulations
and the Arms Export Control Act.
Wu went on to say:
There is no doubt that both Maluta and Tittel at the time
of the commission of the offenses knew exactly what they were
doing was contrary to law, e.g., that the exports were
knowingly effected without obtaining the necessary licenses;
that the contents of the shipments were falsely described and
undervalued, and that the defendants' income obtained from the
illegal export operation were falsely stated to evade income
tax.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
424
Maluta was aware that certain of the goods they arranged to be exported
would and did go to the Soviet Union, Wu said, adding that what motivated Maluta
and Tittel was greed and that their desire for fortune was quickly satisfied.
Maluta, for example, was able to buy in 1979 alone $185,000 in gold and silver
coins. According to an affidavit given by Robert A. Lyon, an officer of Jonathon's
Coin, Inc., of Inglewood, Maluta made 17 cash purchases of coins in the months of
February, March, April, May, June and August during 1979 for a total of
$190,358.66. His purchases, all of which were made in cash, included one for
$79,974, another for $20,000 and a third for $19,987.
From 1978 through April of 1979, Tittel acquired a single family dwelling
in Torrance, California for $92,000, with a down payment of $19,400; a
condominium in Palm Desert for $125,995, with a down payment of $49,345; a
single family residence in New Cuyarna for $33,000, with a down payment of
$15,700; a single family residence in Rancho Palos Verdes for $295,000, with a
down payment of $198,400; and in 1979 a new Mercedes-Benz 450 SLC automobile
for $41,595.56, for which she paid $10,500 in cash and $31,095.56 with a cashier's
check.
Wu added:
To the defendants, it was not enough to get rich quickly
through the unlawful export operation; they were driven to do
more -- evade income tax. That was greed upon greed. Also, it
is clearly apparent that the defendants, especially Maluta, had
to know that the high technology products exported by them
illegally and the laws they breached implicated the national
security interest of this country. The defendants purposefully
ignored the risk of running afoul of the law and the risk of
compromising controlled U.S.-origin technology to governments
whose interests are inconsistent with those of the United
States.
Considering the seriousness of their crimes, Wu said, it was his
recommendation to the court that Maluta receive a prison term of six to eight
years and a fine of at least $100,000.
As for Tittel, Wu said, she told the court that she entered into the illegal
export scheme because she was in love with Maluta and, therefore, under his
influence and control. But Wu did not believe her love for Maluta excused her
conduct, as he explained:
While she may well have been "in love" with Maluta and
thus susceptible to his persuasion, the government contends
that Tittel was more "in love" with the glowing prospect of a
quick rise to affluence....
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
425
Acknowledging that Tittel's responsibility for the exporting conspiracy
was somewhat less than was Maluta's, Wu's recommendation was that she receive a
prison term of three to four years and a fine of $100,000; along with a five-year
probation term to begin on her release from prison.
Maluta, who appealed his conviction on the grounds that he was the victim
of selective prosecution by the government, is still involved in the appellate
process at this time.
Tittel received a two-year prison sentence and was fined $25,000. She is
incarcerated at the Federal Correctional Institute in Pleasanton, California. She
has filed a motion to reduce sentence which the court has taken under
consideration.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
426
STAFF STATEMENT OF
GLENN W. FRY, INVESTIGATOR
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
UNITED STATES SENATE
MAY 5, 1982
The Commerce Department's ineffective response to the challenge of
technology transfer is an illustrative example of the failure of the Government, in
general, to organize itself effectively to remedy this national security problem.
We have learned of the shortcomings in the Commerce Department's
efforts to investigate violations of the Export Administration Act thereby causing
a serious deficiency in its ability to enforce the statute and its regulations. The
law enforcement effort, although critical, is only a part of the overall effort to
prevent the harmful flow of U. S. technology. Even if the law enforcement
operation were professionally administered with sufficient resources its
effectiveness would continue to suffer due in part to deficiencies within other
executive branch agencies.
The Commerce Department is mandated to administer and enforce the
Export Administration Act; however, matters concerning this act which involve
national security interests require the consultation of the Department of Defense
and the Intelligence Community as well as Commerce. Ineffective control of the
transfer of U. S. technology and the enforcement of export laws will prevail if the
Department of Defense and the Intelligence Community continue to provide less
than their best efforts to support this national security mission. Despite several
previous Congressional investigations and hearings conducted on these matters,
dating back to 1974, the responsible executive branch agencies continue to have
difficulty in organizing an effective operation.
Technology transfer can occur through the illegal export of controlled or
embargoed commodities; however, it can also occur, with equal damage, because of
inadequate control and protection of critical information and through ineffective
handling of legitimate export licensing cases. The Minority staff has made
preliminary findings that the technology transfer programs of the Department of
Defense and the Intelligence Community contain basic deficiencies which impair
the Government's overall effort to control the flow of critical American
technology.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
427
The following are areas within the Defense Department's program that
demand attention and ultimate resolution if the Government intends to control the
flow of U. S. technology:
(1) The Freedom of Information Act is a legal tactic available to U. S.
citizens, foreigners and even Soviet surrogates to obtain critical "dual use"
technology. "Dual use" technology, which can be used commercially and militarily,
is not excluded from FOIA requests. There is no protection or means to control the
harmful transfer of technology that does not fall within the exclusions prescribed
by the FOIA.
(2) There have been instances where classified information has been
prematurely declassified in accordance with an automatic declassification
schedule. In other instances, critical technologies which have military significance
are never classified. In either case, the end result is that such information,
although not readily distributed, becomes available to anyone. In effect, if the
specifications of a grenade launcher were not classified then such information
would be available to anyone. There is no effective system to accurately
determine whether information should be classified, declassified or remain
classified.
The Department of Defense's Offices of Research and Engineering and
International Security Policy are responsible for the review of export licensing
requests for national security interests. Presently, Defense reviews predominantly
those export cases involving the Soviet Union or Warsaw Pact nations. There is
very little review of "free world" license requests except for cases involving very
advanced computer technology. The program presently administered within the
Department of Defense suffers from several fundamental deficiencies.
(3) On August 26, 1977, the Secretary of Defense issued an "interim"
policy statement for the export control of U. S. technology. Today in 1982, there
has yet to be any follow-up to this "interim" policy. This is representative of the
weak overall priority afforded the technology transfer issue throughout our
Government. Sources within Defense have indicated that there is ambiguity
regarding which DOD office has overall accountability for technology transfer
decisions. There is apparent confusion as to who has overall accountability on the
issue of transfer of technology between the offices of the Deputy Under Secretary
of Defense for Research and Engineering and the Deputy Under Secretary of
International Security Policy. Sources have stated that this confusion has caused
95-929 0 - 82 - 28
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
428
unnecessary and costly delays in the resolution of export license reviews, resulting
in the export of various technologies that are potentially not in the best interests
of our national security. On May 19, 1979, the Deputy Secretary of Defense issued
a directive delineating specific areas of responsibility within the Department of
Defense. Defense Research and Engineering was designated as the responsible
office for technological matters and processing and coordination of export
requests. It was also designated to serve as the DOD focal point on all aspects of
export technology, including COCOM, with the Department of State and other
Federal agencies. International Security Affairs (later renamed International
Security Policy) will be responsible for policy and political considerations. It
stated that disagreements should be recorded and referred to the Deputy Secretary
for resolution. Sources within Defense have explained that, to date, neither office
has overall accountability. There are instances when DR&E makes final decisions
and instances when ISP makes them; however, there is inadequate coordination or
communication between the two offices.
(4) The Office of Defense Research and Engineering does not have an
adequate number of permanent staff specialists to effectively conduct its
technology transfer mission. Temporary personnel have been assigned to this
office; however, there is an annual turnover. Consequently, much valuable time
and resources are continually used to train and familiarize new personnel rather
than attend to its primary responsibilities.
(5) Military and Department of Defense Research laboratories who are
tasked by DR&E to review licensing cases lack a charter delineating export control
or technology transfer responsibilities. There is also no specific funding for this
type of operation. Consequently, technology transfer issues are not a priority and
do not receive appropriate attention.
(6) There is no adequate data base of information available to all
participants in the technology transfer program within our Government. This
deficiency is analogous to prosecutors working without the benefit of a legal
library. There has to be a centralized repository of information that maintains
available data relevant to the decisions to grant exports.
Presently, there are data bases within various agencies; however, they
have not been consolidated and there is little coordination between agencies on
available information. Much of what is known about technology transfer lies solely
on the reliance of corporate memory. In a sense, the present system lends itself to
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
429
the cliche that the right hand doesn't know what the left hand is doing." One DOD
research lab could review an export license case and raise no objection to its
ultimate export. Another DOD lab might receive a similar case and deny the
export based on information it independently had at its disposal. A mechanism is
needed to consolidate all available data so that all participants are aware of
relevant information.
(7) The Department of Defense does not review a sufficient number of
"free world" export license cases. Exports to free world nations many times are
improperly or illegally reexported or diverted to East Bloc nations. This has been
demonstrated by recent export violations involving nations such as Switzerland and
West Germany that were used as conduits for the illegal re-export of high
technology commodities to the Soviet Union. The U. S. trades with many nations
such as India and Pakistan who have open trade policies with the Soviet Union. To
blindly export critical technologies to nations such as those without the benefit of
the DOD's review could run the risk of having U. S. technologies end up in the
U.S.S.R.
(8) Defense Research and Engineering has not devoted sufficient
resources to the program which reviews foreign technical visitor programs. DR&E
is responsible for determining militarily critical technology that requires export
control. This effort is being done in concert with U. S. industry. In this light
DR&E has devoted tremendous resources to the development and understanding of
new dual use technologies; however, there is not an adequate operation within
DR&E to assess what areas visitors are concerned with and what technology is
obtained by these visitors. Therefore, due to this inadequate oversight, DR&E has
little control over the potential loss of U. S. technology. Consequently, there is no
way to assess what critical technologies have been obtained by our adversaries
thereby making it virtually impossible for the Intelligence Community to determine
how the loss impacts on our national security.
The effective control of critical dual use technology is largely dependent
on the proper gathering, dissemination, analysis and use of intelligence. It is the
view of the Minority staff that the Soviets, in many cases, are precise about what
technology and equipment they want from the United States. It follows then, that
if the U. S. can determine what the Soviets desire, where they are deficient, what
they need and what direction their technological efforts are aimed, we are in an
improved position to prevent them from obtaining our technology which may meet
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
430
their needs. At the very least the U. S. could create delays in the Soviets efforts
which will impede their progress and maintain our lead time in critical areas of
technology. Testimony will be given which describes the Soviets as having an
enormous, systematic and organized effort to obtain U. S. and other Western
technology. The U. S., however, does not have a mechanism equal to the Soviets'
task. There has been no overall coordinated, systematic and organized program in
the U. S. to effectively prevent loss of our technology to the Soviets.
Intelligence is the key to anticipating the technology on the Soviets'
"shopping list." U. S. law enforcement authorities can mount effective
enforcement strategy directed towards illegal exports when they are apprised of
what the Soviets are looking for. DOD and Commerce representatives who review
export licensing cases would be in a better position to render proper decisions
based on national security interests if they had the most available intelligence.
But, after reviewing information obtained from law enforcement and technology
specialists in the executive branch, the Minority staff has reached the preliminary
finding that the U. S. intelligence effort regarding export controls is insufficient.
Coordination among affected agencies is inadequate. Commitment of needed
resources is lacking. The intelligence community is not organized to use
information to block prohibited diversions.
Specifically, the Minority staff found the following deficiencies within the
intelligence operations of the technology transfer control effort:
(1) The Export Administration Act mandated Commerce to determine the
foreign availability of critical dual-use technologies. The foreign availability of
technologies is an important ingredient in the decision making process for granting
or denying export licenses. However, authorities within the executive branch
assert that current foreign availability determinations are not adequate.
(2) The Intelligence Community has not been utilized sufficiently by
eith?.r Commerce or the Department of Defense. Sources within the Intelligence
Community state that they have virtually no communication with Commerce's
Compliance Division regarding ongoing investigations of export violations. One
representative of the Intelligence Community indicated that there is little
feedback from Commerce regarding the intelligence information it provides. The
information is submitted to Commerce's Office of Intelligence Operations and it is
not known whether it is disseminated to the Compliance Division or other Divisions
as well. Conversely, the Compliance Division rarely seeks the expertise of the
Intelligence Community regarding investigations.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
431
Moreover, once the intelligence apparatus is strengthened, then methods
should be devised that enable sensitive information to be sanitized and passed on to
law enforcement personnel in a form that will assist them. Several experienced
law enforcement investigators pointed out that frequently intelligence on
technology transfers has such a high classification that many agents working export
controls cases cannot see it.
It is the view of government experts in law enforcement and science and
engineering that until the intelligence capability is upgraded, law enforcement will
suffer.
(3) Defense Research and Engineering tasks_ the Defense Intelligence
Agency to conduct "end user" investigations. Essentially, DIA is to determine
whether the end user of an export is not a national security risk. DIA performs this
task as a support function to DR&E -- its license review procedures. Historically,
DIA has been utilized infrequently in this capacity. Within the last 18 months DIA
has been tasked more frequently; however, it does not have sufficient resources to
conduct end user determinations that are necessary.
(4) There is no mechanism or organized program which conducts f ollow-
up investigations of foreign exports or re-exports of U. S. technology. In fact,
there is no adequate system to accurately determine what has been exported, re-
exported, where it is used, and how it is used. There is no way to accurately
determine the adverse impact to the U. S. of that dual use technology that has
been obtained by our adversaries. Officials working in the technology field are
troubled by the fact that our government has difficulty determining a current
assessment of the "state of the art" of American technology. Given such a fact,
the difficulty in assessing what technology has been lost and its impact on U. S.
national security seems almost insolvable given the current resources and policy.
In summary, the U. S. Government, at present, has no high level
interagency task force or entity comprised of senior cabinet level officials
addressing the problem of export control and technology transfer. All past and
current efforts along this line have been done by lower echelon Government
officials who can merely make recommendations rather than needed changes.
1/
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
432
pwrintent ii ,Itutirt
STATSMENT
OF
THEODORE STEWART GREENBERG
ASSISTANT UNITED STATES ATTORNEY
EASTERN DISTRICT OF VIRGINIA
BEFORE
E
COMMITTEE ON GOVERNMENTAL AFFAIRS
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
UNITED STATES SENATE
CONCERNING
TECHNOLOGY TRANSFER
AND
UNITED STATES v. MARC ANDRE DeGEYTER
ON
MAY 5, 1982
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
433
TABLE OF CONTENTS
I. SUMMARY
II. STATEMENT OF FACTS
Page
1
2
A. The Cast 2
B. The Approach
C. The Offer 4
D. The Ante Raised 5
E. The F.B.I. Interviews 7
F. Discovered - The Approach Changes -
DeGeyter and the Arab Shiek
G. Summary of District Court Proceedings
11
EXHIBIT 1. Copy of $500,000 check 13
2. Complaint (New York) 14
3. Search Warrant Inventory 16
4. Complaint (EDVA) 19
5. Indictment 21
6. Motion of the U.S. to Hold a Bail
Justification Hearing
7. Motion of the U.S. to Increase Bail
and to Hold a Bail Justification Hearing 26
8. Plea Agreement 26
9. Information JO
10. Sentencing Memorandum 31
10A. Judgment and Probation/Commitment Order 34
11. Proposed Commerce Letter 35
12. $10,000 Civil Penalty 36
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
434
I. SUMMARY
On May 22, 1979, the Federal Bureau of investigation
received information from John Maguire, President, Software,
A.G., Reston, Virginia, regarding the attempted bribery of one
of his employees by Marc Andre De Geyter,. a Belgian national,
who stated that he was acting on behalf of the Russian
Government. DeGeyter wanted to steal Software's trade secret,
the ADABAS source code.
An FBI investigation, which included the use of an
undercover agent and consensual monitoring, resulted in
DeGeyter's arrest at John F. Kennedy International Airport on
May 18, 1980, when DeGeyter gave an undercover agent a check
for 8900,000.
The investigation was monitored primarily by the Internal
Security Section of the Department of Justice. Prosecution of
the case was directed jointly by the United States Attorney's
Office for the Eastern District of Virginia, and the Internal
Security Section. I/
The investigation was orginially conducted as a foreign
counter-intelligence operation and then as a criminal investi-
gation. DeGel,ter was indicted on June 9, 1980, for violating
Title 18, United States Code, Section 1952(a)(3), interstate
and foreign travel in aid of a rackeetering enterprise, i.e.,
commercial bribery, in violation of the laws of the State of
New York and the commonwealth of Virginia. DeGeyter was per-
mitted to plead guilty to misdemeanor violations of the Export
Administration Act and the Virginia Commercial Bribery Statute,
because of significant governmeraal interests. After incarceration
in Alexandria and FCI, Petersburg, Virginia, DeGeyter was permitted
to voluntarily depart the United States.
1/ Then Deputy Section Chief John Martin and Department
Attorney George Matava handled the case on behalf of the
Internal Security Section.
1.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
?
435
II. STATEMENT OF FACTS
A. The Cast
1. ADABAS (Adaptable Data Base System), a data base
management system. The source code is deemed to
be a trade secret worth approximately $10,000,000.
It would not be sold in the normal course of Software's
business; and, in any event it would require a vote
of the Directors to before it could be sold. It was
maintained in a safe in the corporate offices and only
selected individuals had access to it.
2. James Addis, Salesman, Software, A.G.
3. Special Agent Robert H. Bates, Federal Bureau of
Investigation
4. Marc Andre DeGeyter - Following is a description
of DeGeyter obtained through interview and observation:
Full Name:
Other names used:
Birthdate:
Nationality:
Residence:
Marital Status:
Passport:
Alien Registration:
Language:
Marc Andre DeGeyter
Marc A. DeGeyter and Marc De Geyter
February 6, 1949, Tielt, Belgium
White male, 510", 185 lbs., curly
brown hair, receding in front and
bald on top, sideburns, ruddy
complexion, Protruding stomach.
Belgium
St. Huberstuslaan 15, Schilde,
Belgium 2232
Married, three children
Holds Belgium passport number
N147192; issued 13,71 visa'in
Brussels, Belgium for travel to
U.S.
P147192
Speaks and understands German,
English and Russian
Corporations: President, Commercial Engineering and
Sales Agency (CESA), Rue de Geneve, Box 7, Brussels,
Belgium 1140, Telephone (02) 242-3660; President, TVS,
Broadcast Systems Division, Rue de Geneve 10, Box 7,
Brussels, Belgium 1140, Telephone (02) 242-3660; President,
afrabel (Africa-Belgium), Rue de Geneve 10, Box 7,
Brussels, Belgium 1140, Telephone (02) 242-3600; Managing
Director, Softelectronics, Bodegemstreet 82-A, 1000 Brussels,
Belgium, Telephone (02) 513-2692; In-Mark Associates
(International Marketing Associates, a joint venture)
Irvine, California; Inutec (joint venture) Laguna Beach,
California.
5. Special Agent Timothy B. Rlund, Federal Bureau of
Investigation
6. John Norris Maguire, President, Software, A.G. of North
America, Reston, Virginia
7. Charles Metheny, Chairman, CENTC, Inc., Reston,
Virginia.
2.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
436
8. TECHMASHIMPORT - principal address USSR, Moscow.
Registered in the United States by Amtorg Trading
Corporation, N.Y.C., N.Y. Techmashimport is a USSR
foreign trade corporation which imports equipment and
machines for the chemical and oil-refining industry,
for the production of basic chemical products, for
organic synthesis, for the manufacture of chemical
fibres and plastics, synthetic rubbers, rubber, and
rubber goods, dyestuffs, lacquers, and paints, plant
protection means as well as equipment for the manufacturing
of plastic goods, refrigerating. A Registration Statement
was filed with the Department of Justice on April 1,
1974.
B. The Approach
? Sometime during the week of May 14-18, 1979, Marc Andre.
DeGeyter (hereafter DeGeyter) ccntacted James M. Addis,
salesman for Software AG of North America, Inc. (Hereafter
Software), Reston, Virginia which wholesales an adaptable data
base management system (ADABAS), at Addis' residence in
Reston, Virginia. DeGeyter told Addis that he had a 'business
proposition to discuss. They met at the Reston Sheraton,
Virginia on May 18, 3979.
Depeyter identified himself as President, Commercial
Engineering and Sales Agency, Brussels, Belgium. At this
meeting, DeGeyter indicated that the Russian Government had
retained him to obtain the "source code" (the mathematical
formula behind a computer program) to Software's adaptable
data base and computer programming technology, ADABAS, and
offered Addis $150,000 for it. DeGeyter stated that he would
give the money to Addis in $100 bills, or set up a Swiss bank
account. Addis told DeGeyter that he would have to discuss
this offer with Software's President, John Maguire. DeGeyter
then said he would be in Los Angeles and New York City until
May 25, at which time he would call Addis from New York.
DeGeyter called Addis at home on May 24, 1979. Addis
told DeGeyter that he had spoken with John N. Maguire, 2/
2/ Maguire reported DeGeyter to the FBI on May 22, 1979 and
agreed to cooperate in an investigation of DeGeyter.
3.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
437
president, major shareholder 3/ and one of the three directors
of Software, concerning DeGeyter's offer and related to him
that Maguire wanted to speak with DeGeyter. DeGeyter then
stated that he would call Addis during May 28-30 to arrange
for a meeting with Maguire. DeGeyter called on the 29th, but
no meeting was scheduled.
C. The Offer
On June 20, Maguire called DeGeyter in Brussels. Maguire
expressed interest in talking with DeGeyter and made some
tentative arrangements to meet. DeGeyter called Maguire on
July 18 and 20 from Missouri.
On July 20, DeGeyter flew from St. Louis, Missouri to
National Airport, Arlington, Virginia, where he met with
Maguire. DeGeyter indicated that the Soviets were interested
in obtaining the source code and that he would purchase it for
5150,000. In discussing the method of payment DeGeyter said,
"Want a check in Zurich? You got it. Its yours. I couldn't
care less. I'm not involved." Later in the conversation, he
stated, "It's a one-time shot. No paper, no contract.
Nothing." It was absolutely clear that DeGeyter wanted
Maguire to steal the source code from his own company.
DeGeyter called Maguire from Brussels on August 7 to work.
out details of the transfer.
Maguire expressed concerns that the source code would be
obtained by him competitors. DeGeyter assured him it was
going to Russia, and nowhere else.
DeGeyter wanted 'Maguire to travel to Brussels where
DeGeyter would have the source code authenticated. Thereafter,
payment was to be made in Zurich, Switzerland. Maguire said
that he wanted to be paid in cash in the United States.
DeGeyter was hesitant about traveling with large sums of money
because of customs searches.
3/ Maguire and his immediate family own approximately 82% of
Software's stock.
4.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
438
During this conversation, Maguire asked, "Do you know
about export licenses and everything? What if you get caught
with that source code?" DeGeyter responded, "I don't think
there should be any problem in that. I would then take the
whole responsibility for that. You are not supposed to know
Where it goes to and what I'm going to do with it."
On August 27, Maguire called DeGeyter in Brussels and
told him that he (Maguire) was losing interest in their
initial deal. Maguire expressed nervousness about dealing
with a Swiss Bank. DeGeyter then indicated that he was
considering raising his offer to $200,000.
On September 5, DeGeyter called Maguire from Brussels.
Maguire again expressed uneasiness about the deal. DeGeyter
responded that he was ready to pay a higher price for the
information. Arrangements were made for DeGeyter to call
Maguire from New York City on September 12.
D. The Ante Raised '
DeGeyter called Maguire on September 12 from New York
City and offered to pay $250,000 for the source code. The
money was to be placed in a Swiss bank account, or the title
to an equivalent amount of real estate in California was to be
placed in Maguire's name. DeGeyter indicated that he wanted
to avoid bringing that much money into the United States.
Maguire again stated that he wanted cash paid directly to him.
DeGeyter replied that he would probably terminate the deal.
On October 1, DeGeyter telephoned Maguire and indicated
that the Soviets had authorized additional payments, and that
he would contact Maguire when he arrived in New York City.
On October 2, DeGeyter called Maguire from Reston,
Virginia and arranged for a meeting.
On October 3, the two met for breakfast at the Sheraton
Motel, Reston, virginia. DeGeyter said that he flew in from
London for the meeing. DeGeyter told Maguire that he had
been authorized by the Soviets, to offer $450,000 and that
5.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
439
Maguire could negotiate through Techmashimport, a company
owned by the Soviet Government, and responsible for negotiating
contracts for importing technology to Russia. DeGeyter
commented that Techmashimport is represented through the trade
arm of the Soviet Embassy.
Maguire asked DeGeyter during this conversation whether
he felt that exporting software technqlogy without an export
license from the Commerce or State Departments was illegal.
DeGeyter replied that it was not. Maguire said that he would
have to contact the State Department to verify this information.
DeGeyter responded that it was not necessary; that the trans-
action could be ligitimatized on paper by Maguire's licensing
one of DeGeyter's California corporations to use the source
code.
Maguire again brought up the question of the payment
for the information, noting that he was still wary about Swiss
bank accounts and land transactions. DeGeyter said that he
was unable to have the source code verified in the United
States because a Soviet computer expert would test the source
code in Brussels. He said that after the source code was
authenticated, he and Maguire could fly to Switzerland, where
they would put the source code on a Swissair flight to
Moscow. DeGeyter claimed he only wanted the information for
Tachmashimport.
DeGeyter insisted on handling this transaction either by
way of a Swiss bank account, selling the license to one of his
United States firms, or handling the matter through a Soviet
company, which would take 45 days. Maguire re-emphasized he
would not travel to Brussels, nor deal with a Swiss bank
account. DeGeyter remarked he was taking all of the risks
and did not want to go to jail. He further noted that if the
deal was not completed, his business ventures in Belgium with
the Soviet Government would suffer millions of dollars in lost
business during the next five to ten years. He commented that
if he could not get the required information, then the Soviets
would assign another businessman or agent to obtain the
technology. DeGeyter said he would contact Maguire on October
11, 1980.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
440
On October 5 DeGeyter called Maguire from Belgium and
told him that the offer of $450,000 was final. Maguire
rejected the offer because DeGeyter was not willing to pay in
cash.
E. The F.B.I Interviews
On February 4, 1980, the F.B.I. interviewed DeGeyter at
the Sheraton Hotel in New York City. DeGeyter was told that
he was being interviewed regarding allegations that he was
acting in the United States as an agent of the Soviet Union
without registering with the Attorney General. DeGeyter
replied that he was unaware of the regulations.
During this interview, DeGeyter mentioned that he was
formerly employed at Memorex Corporation in Stuttgart,
Germany. He noted that during his tenure at Memorex, he was
head of program engineering. He dealt with representatives of
the Soviet Union, who expressed an interest in updating their
computer technology. DeGeyter remarked that the Soviet Union
was attempting to alter and modify its computer system to
make it compatible with the systems in the United States.
DeGeyter remarked that shortly after his resignation from
Memorex, he formed his own company, known as Commercial
Engineering and Sales Agency (CESA), Reu de Geneve, Box 7,
Brussels, Belgium 1140, Telephone (02) 242-3660. He noted
that this firm was formed as a public relations organization;
intended to act as a go-between in business dealings with
other countries.
DeGeyter stated that in or about February, 1979, he was
asked by a representative of Techmashimport if he would
contact appropriate individuals at Software AG to obtain their
source code. He contended that he was not offered any money
and assumed that his payment would be a 15% commission he
would receive from the seller.
DeGeyter recounted that during the early part of 1979, he
contacted Addis and explained to him that he (DeGeyter) was
7.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
441
interested in obtaining software technology for the Soviet
Union. DeGeyter stated that Addis introduced him to Maguire
who also was informed of the Soviet's interest in Software's
source code. Degeyter said he did not offer Maguire any
money, but did refer to the 158 commission from the seller
when the deal was final. DeGeyter stated that his offer to
Software was still open, although he flet that Softwar was
becoming disinterested.
DeGeyter said he had been asked by Maguire how he
(DeGeyter) would export this information to the Soviet Union.
DeGeyter said that he told Maguire that Maguire would
have to handle any problems arising out of obtaining an export
license.
DeGec,ter was reinterviewed by F.B.I. agents on the
following day. During this interview, he elaborrated further
on his negotiations with Software. He stated that he had
received a $450,000 letter of credit from Techmashimport,
Ministry of Foreign Trade, Moscow, Russia, in February, 1979,
to be utilized in contracting for the purchase of the source
code from Software.
DeGeyter said that he had been in contact with Maguire to
whom he offered an introductory price of $150,000. DeGeyter
said he later offered $250,000 and made a final offer of
$450,000 two months prior to the interview. He stated that he
had notified authorities at Techmashimport that ?the deal with
Maguire was still open and that he was fervently negotiating a
sale.
DeGeyter said that he left the method of payment to the
satisfaction of Maguire; however, he suggested to Maguire that
the money could be placed in a bank accunt in Switzerland to
be obtained by Maguire when the deal was finalized. DeGeyter
told Maguire that Maguire could travel to Brussels, Belgium
where the source code would be authenticated by an experienced
individual. An unidentified company in Brussels was to be
utilized for authenticating the Software's source code. If it
were found to be legitimate, it would be placed in an envelope
and mailed to appropriate representatives of the Soviet Union.
Maguire would be given some type of guarantee that the formula
would not be duplicated and sold to his competitors in the
United States.
8.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
442
DeGeyter said that Maguire questioned him as to the
proper procedures for exporting the formula out of the United
States. DeGeyter answered that this matter should be handled
by Maguire. Maguire told DeGeyter that he knew someone at the
Department of State whom he could contact regarding this
matter.
DeGeyter said that he was advised by Soviet authorities 4/
that he could offer up to $450,000 to Software for the source
code and if he could obtain the item at a lower price,
DeGeyter could pocket the difference.
F. Discovered - The Approach Changes -
DeGeyter and the Arab Shiek
On February 6, DeGeyter called Charles Matheny, Chairman
of the Board of CENTEC, Reston, Virginia and told him that he
was flying into National Airport on the following day. 5/
Matheny picked up DeGeyter at National Airport on
February 7 and brought him to a hotel in Reston. At the hotel
DeGeyter told Matheny that he wanted to discuss a deal involv-
ing an Arab bank which was headed by a Saudi Arabian shiek.
Be stated that the bank intended to implement a large scale
computer system to handle its business and that he had agreed
to assist the bank in that effort in return for free billing
for one of DeGeyter's businesses. He then said that the bank
wanted to put together a team et computer experts to monitor
the implementation and specifically wanted an expert from
Software. DeGeyter agreed to pay Matheny a finders fee of
$25,000 in cash upon finding such an individual. DeGeyter
then stated that the individual had to know everything about
Software's system and that the individual had to be ready to
bring as much of the system as possible, preferably the source
code. At the close of the conversation, DeGeyter told Matheny
that he was to keep a low profile and not let it be known
that he (Matheny) was looking for anyone. In particular,
D-Geyter told Matheny not to talk to Maguire or Addis about
the arrangements.
4/ DeGeyter specifically mentioned contacts with two Soviets
from Techmashimport-
5/ Matheny immediately contacted the F.B.I. and agreed to
cooperate in th, investigation.
ApprovedFor Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
443
On February 21, DeGyeter called Matheny and said that the
Arabs were putting pressure on his to recruit an employee from
Software and that he would contact Matheny later for his
decision. During the next month DeGeyter inquired as to
Matheny's progress in obtaining an employee from Software.
Matheny stated that he had recruited an individual but that
this individual wanted "front money."
On April 16th, Timothy B. Klund, An F.B.I. agent who
was acting in an undercover capacity, but using his real name,
posed an employee of Software and met with DeGeyter at the
Holiday Inn in Rosslyn, Virginia. 6/ DeGeyter made in clear
to Klund that he wanted him to steal the source,code. Klund
said that he would lose his job and face criminal charges if
he were discovered. DeGeyter offered Klund a position in his
company.
On April 18, Klund met DeGeyter at National Airport. On
this occasion DeGeyter offered Klund $250,000 for the source
code. Klund indicated he wanted $500,000 and that he would
not travel overseas. DeGeyter said that he would contact the
intermediary, Matheny, with a final price on April 25th.
On April 24th, DeGeyter contacted Matheny and told him
that he was purchasing a ticket for Klund to use in traveling
overseas.
On May 15th, DeGeyter again called Matheny and said that
he would travel to New York and have a check for Klund.
Matheny reiterated that Klund wanted cash.
On May 16th, DeGeyter called Matheny and said that he was
bringing $500,000 in cash and would meet Klund at J.F.K.
International Airport on May 18th.
The F.B.I. laboratory produced dummy computer tapes for
Klund to pass to DeGeyter.
On May 18th, DeGeyter arrived at J.F.K. International
Airport from Brussels, Belgium. Klund gave DeGeyter the dummy
6/ DeGeyter called Software sometime prior to this meeting
to verify the fact that Klund was employed there.
10.
95=929 0 - 82 - 29
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
444
tapes and DeGeyter gave Klund the check for $500,000. 7/
Exhibit 1. DeGeyter was arrested by the F.B.I.
G. Summary of District Court Proceedings
Date Summary
1980
May 19 Complaint filed in EDNY (18 U.S.C. 91952(a)(3)).
Rule 5 (Fed.R.Crim.P.) hearing. Bail set at
$500,000. Exhibit 2.
May 21 Search warrant for DeGeyter's briefcase
issued.
May 22 Search warrant executed. Briefcase searched.
Exhibit 3. DeGeyter interviewed by FBI.
June 5 DeGeyter arrested in NY on EDVA Complaint (18
U.S.C. ?1952(a)(3)). Exhibit 4. $500,000
surety bond.
June 6 Preliminary Hearing - EDNY
June 9 DeGeyter indicted in EDVA - 8 counts
1952(a)(3) -bond set at $500,000 surety.
Bench warrant issued. Exhibit 5.
June 9 DeGeyter removed to EDVA.
thea
June 16
June 16 DeGeyter arraigned on Indictment. Bond
reduced to $100,000 (cash or surety) over
objection of U.S. Special conditions set.
Motions 6/26/80 -- Trial set for 7/22/80.
June 16 Bail hearing - U.S. motion to hold bond
hearing re sources of money denied. Exhibit 6.
U.S. gets informant information that DeGeyter
has stated he is KGB agent and wants to raise
bail money to flee U.S.
June 20 9100,000 check tendered to Clerk. U.S.
motion to increase bail and hold a bail
justification hearing filed. Exhibit 7.
Bond hearing stayed until June 23, 1980.
June 23 Bail hearing - DeGeyter released on
9100,000 bond. Cashier's check deposited.
July 7 Plea agreement signed (Exhibit 8) DeGeyter
pleads guilty to 2 count Information.
Exhibit 9.
August 1 Sentencing Memorandum filed (Exhibit 10).
DeGeyter sentenced. Four months Count 1;
$500 fine on Count 2. Exhibit 10A.
Export denial letter served on DeGeyter.
Exhibit 11.
7/ Subsequent investigation determined that DeGeyter only
h-gd $800 in his account.
11.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
445
Date Summary
1980
October 17 DeGeyter released from FCI, Petersburg, VA
to INS detainer.
October 17
thru
October 24
December 24
1982
DeGeyter allowed to voluntarily depart U.S.
by INS.
810,000 civil penalty finally assessed
against DeGeyter by Dept. of Commerce per
plea agreement. Penalty paid. Exhibit 12.
As of April 22 No final action on Department of Commerce
Denial Letter of August 1, 1980!
12.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
EXHIBIT NO. 1
??11
CE EVIDENCE EVIDENCE
iNvESTMATIoN ' FEDERAL BUREAU OF INVESTIGATION
WASHINGTON, D. C.
t D. C.
KREDIETBANK
FEDERAL BUREAU OF INVESTIGATION
WASHINGTON, D. C.
INT71-391t I Mon! I I:W.0 Aca
.001..111 Ippon duo cheque do am Ion,
? ?
'Fi
ye Hundred Thousand US Dollar, -- USD *5066
ci.l.rap In Wars ,
- ?
okealluar
KNOKKE-CEWTRU
'IPPENSLAAN 231.
';':FIARC DE GEYTER
^???? ??? .nnv,;?2
473-?2004381-06
0000000011
e ? In nolo rulno? Not ocIvIjvon norl. ann,PoIon
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
447
EXHIBIT 2
UNITED STATES DISTRICT COURT
EASTEPII DISTRICT OF NEW YORK
UNITED STATES OF AMERICA .
- against -
MARC ANDRE DeGRYTER,
Defendant.
COMPLAINT
Title 18, U.S.C. 51552
X
EASTERN DISTRICT OF NEW YORK, $S,
J/1 WADE ISOM,.being duly sworn, deposes and says
that he is a Special Agent of The Federal Bureau of
Investigation, duly appointed according to law and acting
as such.
Otter about the 18th day of May, 1980, within
the Eastern District of New York and elsewhere', the
defendant MAE: ANDRE MeGEITER did knowingly and willfully
travel in foreign commerce with the intent to promote,
manage, establish, carry on and to facilitate the pro-
motion, management, establishment and carrying on of an
unlawful activity, to wit: commercial bribery, in vio-
lation of the New York Penal Law 5180.00 (McKinney 1975),
and thereafter did knowingly and willfully attempt to
commit cemmemtial bribery in violation of said statute.
(Title .18, United States Code, Section 1952(a)(3).
The source of your deponent's information and .
the grounds for his belief are a conversation with a
Special Agent of the Federal Bureau of Investigation
(hereinafter 'unnamed Agent') wherein your deponent was
advised as follows:
1 . In or about the month of April, 1980,
the defendant MARC ANDRE DeGRYTER engaged in several'
meetings with the unnamed Agent, wherein the Agent
represented himself to be an employee of Software A.G.
of North America, Inc., a software cbmputer firm located
in Reston, Virginia.
2. At the aforementioned meetings, the defendant
MARC ANDRE DeGEYTER claimed that he represented a foreign
conglomerate and stated that he wanted to obtain the
source code for a compute= data base system entitled
"ADABAS". The unnamed Agent informed the defendant that
the 'ADABAS' source cede was a trade secret of Software
A.G. of North America, Ihc., that the sOurce'code was
not for sale and that the unnamed Agent would have to
steal the source code from its owner, Software A.G.,
in order to deliver it to the defendant.
14,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
448
? 3. Thereafter, the defendant MARC ANDRE DeGEYTER
agreed to pay the unnamed Agent $500,000 for the .ADABAS"
source code.
4. On or about May 18, 1980, the defendant flew
to John F. Kennedy /nternational Airport, Queens, New York
from Brussels, Belgium.
5. Fur,uant to a pre-arranged plan, the 'defendant
MARC ANDRE DeGBYTER met the unnamed Agent at a location
in the International Arrivals Building, and delivered a
check in the sum of $500,001 to the unnamed Agent in
exchan'ie for two reels of computer tape.
WHEREFORE, your deporent respectfully prays that
the above-named defedant MAID ANDRE DeGERTER be dealt ?
with according to law.
Sworn to before me this
19th day of May 1980
,
EASTERN DISTRICT OF NEW YORK
15.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
449
EXHIBIT NO. 3
FEDERAL BUREAU OF INVESTIGATION
e ve.,,,e 5/28/60
. Pursuant to the issuance of a search warrant by United
States Magistrate RUTH V. WASHINGTON, Southern District of New
York (SDNY) on May 21, 1980, a search of a black leather briefcase,
approximately 17 inches long, 13 inches high and three and one
quarter inches deep, bearing a stitched border, black leather handle,
brass fixtures and two combination locks, and located in the New
York Office (NYO) of the Federal Bureau of Investigation (FBI) was
made commencing at 8:30 AM on May 22, 1980, and terminated at 9:50
AM on May 22, 1980. The search was conducted by Special Agents
(SAS) JIM WADE ISOM and JEREMIAH W. DOYLE in the NY? of the FBI.
An inventory of the items found in the above described
briefcase are attached.
Imiemnpnionon 5/22/80 m New York New York Ref 105-167272
SAS JIM WADE ISOM and
by JEREMIAH W. DOvTE/OWT/r1
Date d'etated
5/78/A0
This document contents neither recommendaticris nor conclusions of the FBI. It is the propene of the FBI end is loaned to your agency:
Ci and its cornerrs are not to be distributed outskle yuur *genet.
------------
?--.-.--?_
16.
Aooroved For Release 2007/12/11 CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
450
Item 1. One black leather briefcase, approximately
17. long, 13" high and 3-1/4" deep, bearing a stitched border,
black leather handle, brass fixtures and two combination locks.
Item 2. One Bag-Guard property ownership tag
identifing M. DE GETTER 41078197 as owner.
Item 3. One crone Matallurgimport, Moscow, USSR,
telephone took with handwritten names and telephone numbers.
Item 4. One American Express Company book of traveler's
checks numbered 0021-499-559 through RC21-499-577 inclusive
in denominations of $100 for a total of $1900.
Item 5. One business letter from Roth Western
Corporation, Janesville, Wisconsin $3545, dated 11/21(79 to MARC
DE GESTER.
?
Item 6. One box of business cards for TVS Broadcast
Systems Division, Brussels, Belgium, in the name of MARC DE GEYSER,
President.
Item 7. One scratch pad of notes approximately 81/2"
by 11" consisting of three pages and cardboard back.
Item 8. One "Business Week", magazine international
edition dated April 14, 1980.
Item 9, One ox-blood leather portfolio with the "Aigner"
symbol in the upper right hand corner consisting of the following
items typed and written in various languages:
a. One pad of blank lined paper.
b. One business card in the name of JUVENAIaY A.
SEELAYOV,' Vice President, Novoexport,'Moscow, USSR.
c. One handwritten List consisting of 10 items beginning
with "ADABAS" and ending with 'ADA BASICS, V. 4. 1".
d. One piece of paper bearing the handwritten name and
address of. GUNTER CAVALLAR, Sony GMBH Austria, Hauff Geese 24,
1111 Vienna, Vienna 743636.
e. Two copies of "Consulting Agreement - Radio
Production Licensing Program" between radio semiconductor, Inm?
State College, Penna. and MARC DE GEYTER dated 2/7/80.
0. One letter in the French language concerning "Cloudless
Trading Company SA, Panama" dated 4/20/79.
g. One letter in the German language concerning "ITS
Television and Broadcasting SA, Panama" dated 4/20/79.
h. One document in the German language concerning
"TVS Television and Broadcasting Si, Panama" dated 4/20/79.
i. Three sheets of blank stationery beariug the
letterhead "S.A. Commercial Engineering 4 Sales Agency N.V.,
Brussels, 3.10,..".
J.
from MARC.
MARC.
One telex dated 7/24/79 to Mr. BOLSJAROV (dep 7)
k. One telex dated 7/30/79 to dep7 (BOLSOAROV) from
1. One document in the French langUage concerning
"Cloudless Trading Company SA, Panama" dated 4/20/79.
m. One document captioned "Delivery .Acceptance Protocol"
between 0/0 Techmashimport, Moscow, USSR and DE GETTER dated
4/11/79 at Moscow, USSR.
n. Two 5 page documents in the German language.
o. Coo sheet of note pad stationery bearing the
letterhead 'Hotel Metropol, Moscow".
Incp. ten page contract No. 46-04/92211-113 between
"techmashimport*, Moscow, USSR and CESA, Brussels, Belgium
dated 2/14/79, in Moscow.
g. One addendum No. 3 to contract 46-04/92211-113
dated 4/14/79.
r. Ore appendix No. 1 to contract No. 46-04/92211-113
entitled, "Specification of the Equipment."
S. One CESA packing list for contract 446-04/91122-113
concerning 3 pcs item L= 8800 in the amount of $250,000 U.S.
dollars dated April 9, 1979 at Brussels, Belgium addressed to
Techmashirport, Moscow.
$7.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
451
t. One credit document dated March 19, 1979 issued by
Swiss Volksbank, Zurich, Switzerland in the amount of $450,000
U.S. dollars covering contract 46-04/91122-113.
?
u. One two page handwritten accounting worksheet.
V. One sheet on stationery bearing the letterhead
'Roland Swaeles" Rue Puccini, 44 (Boite 5) 1070 Bruxelles', with
hand writing in the French language, signed "MARC OE GEYTER*,
dated March 22, 1979.
w. One page of note paper with handwriting in the
French language.
x. One undated seven page T.V.S., Brussels, Belgium
proposal number 055791013 for the Ministry of Information.
Government of Iraq, concerning short wave and medium wave radio
broadcast systems.
y. One June 30, 1978 balance sheet for Frucodal
Holding AG.
z. One one page document in the German language
captioned 'Orconsult SA', dated August 24, 1979.
as. One December 31, 1978 balance sheet for "Orconsult
SA, Zuerich'.
bb. One bank Brussel Lambert document dated 10/19/79.
cc. One Societe Generale de Banque, Bruxelles dated 8/24/79.
dd. One 1976 - 1979 pocket calendar.
Item 10. One photocopy of Belgium Passport number
147192 in the name of MARC JOSEPH ANDRE DE GEITER with USSR
visa K number 841589 issued to MARC DE GEYTER, on 5/9/80 for
travel to V/0 Techmasimport, Moscow, USSR for the period
5/11/80 - 5/25/80.
item 11. One brown vinyl check book with Kredietbank
bank card in the name of MARC DE GEITER #473-2084381-06 08591242
and Kredietbank checks in the name of MARC DE GEYTER, Account
Number 472-2084381-06, Check Number 03 through 010 inclusive
and Cheek Number 012 through 024 inclusive.
Item 12. One Kingdom of Belgium Passport Sr 147192,
and international certificate of vaccination for MARC
DE GETTER.
Item 13. One green 1980 bound business diary containing
handwritten notes.
Item 14. One black spiral bound 1979 daily pocket
calendar and personal telephone directory with handwritten
names and telephone numbers and 3 sheets of note size paper
bearing handwritten notations.
Item 15. One black leather wallet containing,
a. One first National City Bank traveler's check
number 8172-076-160 in the amount of $20.00.
b. One sheet of paper captioned 'English for Beginners".
c. Various blank self-adhesive labels issued by
several airlines for modifying issued airline tickets.
Item 16. One "Sharp" electronic calculator model
EL-8145 and case.
Item 17. Six color photographs of an RSI. AM-FM radio.
Item 18. One black business card file containing
numerous business cards.
Item 19. One 4 page document captioned "Arrestbefehl",
dated February 7, 1980.
Item 20. One notepad bearing the letterhead "The
Sheraton City Squire Hotel", NY, NY, with a handwritten
notation.
Item 21. One pink computer card with a clipping
captioned 'Liegen', glued to the face.
Item 22. One blank notepad bearing the letterhead
'Ritz-Cmiton', Montreal, Canada. .
?
Item 23. One 541 in. by A .1.a. card captioned 'Compliments
of Benelux Home Diffusion", Brussels with handwritten notations
on both sides.
Item 24. One sheet of paper 31/2 in. sq. containing
handwritten notation beginning 'Smoke hot ?
18.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
452
Item 25. Two blank guarantee cards for a 'Philips"
Audio-Visual apparatus.
Item 26. One one page document captioned Zahlungsbefehl
dated February 20, 1980.
Item 27. One sheet of "Intourise notepaper containing
handwritten notes beginning "Sample of ? ending '814/4666563.
Item 28. Two telexes to Mr. BOLEHAXOV, signed "MARC".
Item 29. One unused "Sabena' airlines ticket number
3213754603 dated April 28, 1976 for travel between Brussels,
Eanover, irussels, issued to DE GETTER.
Item 30. Three used"Pan-American" airlines tickets
numbered 88254020472, 88254020473, and 88254020474 dated March 16,
1978. for travel between Los Angeles, Washington, New York,
Brussels, Zurich, Tehran, Athens, Brussels, London, Los Angeles,
Washington, Los Angeles, issued to DE GETTER.
Item 31. One unused "Sabena" airlines ticket number
3411346302, dated June 28, 1978 for travel between Brussels,
London, Isle of Man, London, Brussels, issued to DE GETTER.
Item 32. One open prepaid "Air France" ticket number
3020678553, dtd. November 21, 1978, issued to DE GETTER for
travel anywhere on an Air France air route.
Item 33. One used "Sabena" airlines ticket number
1210734420, dated March 19, 1980 for travel between Brussels,
Zurich, Brussels, issued to DE GETTER.
Item 34. Two "Sabena" airlines tickets numbered 1410446431
and 1410446432, dated April 15, 1980 for travel between New
York, Washington, New York, Brussels, Vienna, Moscow, Vienna,
Brassels, flew York, Washington, issued to DE GETTER.
Item 35. One yellow "Bic" pen.
EXHIBIT /401. 4
(TOP is In I
11iii1ii i2tFi Digirirt Tottrt
ronTmE
EASTERN DISTRICT OF VIRGINIA - Alexandria
UNITEDSTATESOFAMEMCA
MARC ANDRE DeGEYTER
BEFORE
5'.2)
c?e No ,770
COMPLAINT for VIOLATION of
U.S.C. Title 10
s?,,? 1952 (,e1 Ill
? The undersigned complainant being duly sworn atates:
That on or about April 19 . 19 SO . at Al exandria, Virginia
Eastern Virginia
Distrktof
"' MARC ANDRE DeGEYTER
in the
knowingly and willfully travel in interstate ccrtarerce Scan Dew Ed.'s to the
Eastern District of Virginia with intent to prcroote, manage, establish, carry on
and to facilitate the promotion,. ranagerrent, establishment and carrying on of
an unlawful activity, to wit: ocrtmercial bribery, in violation 015 10.2-494,
Ccde of Virginia, 1950, as amended and thereafter did perform and att,pt to
perform acts to promote, manage, carry on and facilitate the promotion, ravage-
ment and carrying on of said unlawful activity.
And the complainant states that this complaint is ba,ed on
See Attached Sheet.
19..
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
453
EXHIBIT NO. 4?Continued
And the complainant further states that he belimms that
are material witn,neet in relation to this charge.
Sworn to before me, and subscrOwd in my presence
Ut COPY, TZS'i.51
.... ? W..11PRRIS tr.'"`
QUIN aON
DEPUTY &sax
United States v. PARC ANDRE DeGEYTER
Affidavit for Complaint
Page 2
18 U.S.0 1952(a)(3)
The undersigned complainant, being duly sworn, states that: / an a Special
Agent of the Federal Bureau of Investigation; and that the information set out
hereinafter has been gained from personal investigation and investigation by other
Agents of the FAX whose reports I have read.
1. On or about April 16, 1980, while acting in an undercover capacity, I
vet with hARC ANDRE DeGEDTER at the Rosslyn Holiday One in Rosslyn, Virginia.
during this meeting. I told the defendant that / was an employee of the Software
AG of North America, Inc. (hereinafter Software All, a software computer firm
located in Reston, Virginia.
2. At this meeting PARC ANDRE DeCEITER claimed that he represented a
foreign conglomerate and stated that he wanted to obtain the source code for a
oomputer data base system entitled 'MARAS.. I informed DeGayter that this source
cede was not for Sale, and that I :would have to steal it from its owner, Software
if, in order to deliver it to oomnsa.
3. On or about April 18, 1980, while again acting in an undercover capacity
and posing as an employee of Software AG, I was at Washington National Airport,
Arlington, Virginia, where I observed DeGeyter arrive on an Eastern Airlies
shuttle flight which I determined had originated in New York.
4. At National Airport DeGeyter offered no 1250,000 for the .AEUOIAS. souroe
cede.
S. Based upon FOX reports which / have read, the source code for Software
AS's compiter data base system entitled 'ARAMS is a trade secret and would not
be sold in the ordinary course of business without approval of the Board of Directors
of Software AG.
Timothy B. 140/ol
Special Agent-
Federal Bureau of Investigation
Subscribed and Sworn to Before no th
20.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
454
EXHIBIT NO. 5
IN TOE UNITED STATES DISTRICT. COURT FOR TUE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division
UNITED STATES or AMERICA
v. ) CR. NO.
MARC ANDRE DeGETTER
SONE 1980 TERM - At Alexandria
COUNT _I
TEE GRAND JURY CEARGES TEXT:
A. At all times material to this Indictment:
1. The defendant, MARC ANDRE DeGETTER was a citizen of
Belgium.
2. Software AG of North America (hereinafter Software) was
a Virginia corporation specializing in computer software. Among
other products Software marketed the Adaptable Data Base System
(hereinafter ADABAS). .ADABAS was a data base management system.
3. The ADABAS source code was a trade secret of Software
AG. It was the 'logic behind the ADRIAN system.
4. From in or about Hey 1979, through May I.E. 1980, the
defendant MARC ANDRE DeGETTER:
a. represented to various Individuals that he wanted to
Obtain the ADABAS source code for Techmashimport, a foreign
trade corporation organired under the laws of the Onion of
Socialist Republics and other foreign interests.
b. DeGeyter offered amounts varying from $150,000 to
$500,000 for the ADABAS source code. ? .
B. On or about May 18, 1979, the defendant MARC ANDRE DeGETTER
did travel in imterstate commerce from New York to the Eastern
District of Virginia with the intent to otherwise promote,
manage, establish, carry on and facilitate the promotion, manage-
ment, establishment and carrying on of an unlawful activity, said
unlawful activity being commercial bribery, in violation of the
law of the Commonwealth of Virginia (Section 18.2-444, Code of
Virginia, 1950 as amended) and thereafter the defendant
MARC ANDRE ne(mTER did perform and atte4t to perform acts to
promote, manage, carry on and facilitate the promotion, manage-
ment and carrying on of said unlawful activity.
(Violation of Title 16, Unit,d Stites Code, Section 1952(a)(3)).
COUNTS /7 THROUGH V/
TEE GRAND JURY FURTEER CEARGES TEAT:
A. Paragraphs Al through A4 of Count I are hereby realleged and
incorporated by reference as though set forth in full.
21.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
455
EXHIBIT NO. 5--Continued
B. On or Cheat the dates set forth, the defendant MARC ANDRE
DeGETTER did travel in interstate and foreign commerce as set .
forth below with the intent to otherwise promote, manage, establish,
carry on and facilitate the promotion, management, establishment
and carrying on of an unlawful activity, said unlawful activity
being commercial bribery, in violation of the law of the
Commonwealth of Virginia (Section 18.2-444, Code of Virginia.
1950 as amended) and thereafter the defendant MARC ANDRE D.aGEITER
did perform and attempt to perforl acts to promote, manage, carry
on and facilitate the promotion, management and carrying on of
?said unlawful activity.
,COUNT DATE FROM TO
III July 20, 1979 Missouri Eastern District of
Virginia
'III October 2, 1979 United Kingdom Eastern District of
1 Virginia
IV February 7, 1980 Pennsylvania Eastern District of
Virginia
April 16, 1980 ' New York
April 18, 1980 New York
Eastern %strict of
Virginia
Eastern District of
Virginia
(Violation of Title 18, United States Code, Section 1952(a)(3)).
COONT:VIi
A. Paragraphs Al through AS of Count I are hereby realleged and
incorporated by reference as though set forth in full.
B. On or about may 16, 1980, the defendant MARC ANDRE DeGEYTER
did use a facility in interstate and foreign commerce, namely
international and interstate telephone facilities from outside.
the United States of America io the Eastern District of Virginia
with the intent to otherwise promote, manage, establish, carry on
and facilitate the promotion, management, establishment and
carrying on of an unlawful activity, said unlawful activity being
commercial bribery, in violation of the law of the Cormonwealth
of Virginia (Section 18.2-444, Code of Virginia, 1950 as amended)
and thereafter. the defendant MARC ANDRE DeGEYTER did perform and
attempt to perform acts to promote, manage, carry on and facilitate
the promotion, management and carrying on of said unlawful activity.
(Violation of Title 18, United States Code, Section .1952(a)(3)).
took.:4,tit
A. Paragraphs Al through A4 of Count I are hereby.realleged and
incorporated by reference as though set forth in full.
B. On Or about May 18, 1980, the defendant NAND ANDRE DeCZYTER
did cause a person to travel in interstate commerce from the
'Eastern District of Virginia to New York with the intent to
22.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
456
EXHIBIT NO. 5---Continued
otherwise promote, manage, establish, carry on and facilitate the
promotion, management, establishment and carrying on of an unlawful
activity, said unlawful activity being commercill bribery, in
violation of the New York Penal Law 8180.00 (McKinney 1975 as
amended) and thereafter the defendant MARC ANDRE DeGZYTER did
perform and attempt to perform acts to promote, manage, Carry on
and facilitate the promotion, management and carrying on of said
unlawful activity.
(Violation of Title 18, United States Code, Section 1952(a)(3)
land 2).
A TRUE BILL:
FOREMAN
JUSTIN W. WILLIAMS
United State, Attorney
Theocore b. reenber
By:
Assistant United States Attorney
A. \tNAD\_,S1( ?
Ma"dava
Special Assistant United States
Attorney
EXHIBIT NO. 6
IN THE UNITED STATES DISTRICT COURT FOR TOE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division -
UNITED STATES OF AMERICA
v. CRIMINAL No. 80-00102-A
MARC ANDRE DeGEYTER
mOTION OF THE UNITED STATES TO HOLD A BAIL
JUSTIFICATION HEARING
The United States, by the undersigned attorney, moves this
Court to hold a hearing to insure that any bond posted by the
defendant, Marc Andre DeGeyter actually assures his subseguent
court appearances. See United States v. Nebbia, 357 F.2d 301 (2d
Cir. 1966).
DeGeyter was indicted on June 9, 1980 for violating 18 CSC
81952(a)(3), by traveling in interstate and foreign commerce to
commit commercial bribery. An arrest warrant was issued and the
defendant is in the custody of the United States Marshal. A
8500,000 surety bond was set on the return of the Indictment.
2 3 .
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
457
EXHIBIT NO. 6?Cceitinued
The Fourth Circuit has held, citing Nebbia, supra, that the
'purpose of bail is to secure the presence of the defendant at
trial.' United States v. Kirkman, 416 F.2d 747, 752 (4th Cir.
1970).
DeGeyter is a foreign national with no residence or business
property in the UnF.ted States. The Indictment alleges that
DeGeyter was trying to obtain a trade secret from Software AG of
North America, a Reston, Virginia corporation), for a Russian
foreign trade corporation and other foreign interests. A review
of DeGeyter's passport shows extensive foreign travel. At the
time of his arrest an unused airline ticket for travel amongst
the cities of Moscow, Vienna, Brussels, New York and Washington
was found in his briefcase. DeGeyter was arrested when he passed
a $500,000 check drawn on a foreign bank to an undercover agent.1/
Thus, any bond posted by the defendant may not assure his
appearance at trial, but only indicate the extent of his criminally
obtained resources.
In order to establish that money/surety posted to meet the
bond in this case will assure the defendint's presence at trial,
the United States requests a hearing pursuant to United States v.
Nebbia, suora. See also, United States v. Milville 309 F.Supp.
824 (S.D. N.Y. 1970):
Pursuant to 18 USC A146(a)(5) this Court has the power to
net whatever terms and .conditions are necessary to assure the
defendant's future court appearance and a judicial inquiry into
,he adequacy of the origin of the money being posted to secure
DeGeyter's release is proper.
WHEREFORE premises considered, the United States requests
that the Court direct the Clerk to enter on the bond, that as a
condition precedent to DeGeyter's release, a hearing inquiring
into the sources of the bail money be held.
Respectfully submitted,
JUSTIN W. WILLIAMS
UNITED STATES ATTOPNEY
By.
dare S. re be
Assistant United States Attor
CERTIFICATE OF SERVICE
I hereby certify that a copy of the foregoing Motion of the
United States to Sold a Bail Justification Hearing 411-and
delivered to David Cotner, Esquire.
The dore S. e's-erg
Assistant United States Attorney
I/ Subsequent investigation has shown that there was only
1,8800 in the account upon which the check was drawn.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
458
EXHIBIT NO. 6 - -Continued
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division,.
UNITED STATES or AMERICA
V.
MARC ANDRE DeGETTER
jCRIMINAL No. 80-00102-A
ORDER
On motion of the United States requesting that this Court
hold a bail justification hearing prior to the defendant, DeGeyter,
being released from the custody of the United States Marshal to
determine that any money/surety filed with the Clerk adequately
insure DeGeyter's subsequent court appearances upon the above
styled Indictment:
It is this day of June, 1980,
ORDERED that the Clerk enter on the bond, that as a condition
precedent to the defendant being releaSed,a hearing be held by this
Court to determine if the sources of the money the defendant
posts for bond will insure his future appearances in this Court.
Alexandria, Virginia
Date:
ask for this
UNITED STATES DISTRICT JUDGE--
4r
7 odore S. Gt'een erg
Assistant United States Att
2 5 .
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
459
Ex= NO. 7
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF. VIRGINIA
Alexandria Division
:UNITED STATES OF AMERICA
H. ; Cr. No. 80-102-A
"PARC ANDRE DeGEYTER
NOTION OF THE UNITED STATES TO INCREASE
BAIL AND TO HOLD A BAIL JUSTIFICATION HEARING
. The United States, by the undersigned attorney, moves this
court to increase the defendant's bail to $500,000 and to hold a
1bail justification hearing should he tender the bond.
DeGeyter was arrested in the Eastern District of New York, on
'May 18, 1980 for violating 18 U.S.C. 61952(a) (3) by traveling in
l'interstate and foreign commerce to commit commercial bribery. The
iEastern District of New York set bail at 0500,000, cash or surety.
:On June 9, 1980, a Grand Jury in the Eastern District of Virginia
:returned an eight count indictment against DeGeyter, charging him
with eight violations of 18 U.S.C. 51952(a)(3). Bail was set at
5500,000. At arraignment on June 16, 1980, bail was reduced to
$100,0.00, cash or surety with certain special conditions on travel.
On June 20, 1980 his attorney tendered a $100,000 cashier's check to.
the Court to meet bail.
In view of recent information obtained through the FBI, the
United States believes that DeGeyter, a foreign national, intends to
flee the United States and the jurisdiction of this Court prior to
trial. To support its contention, the Government will present an
FBI agent who will testify that a reliable confidential informant
:has provided information indicating that DeGeyter intends to flee
after he meets the present 0100,000 bond.
Even though the testimony of the FBI agent will be hearsay, it
:".is admissible at a bail hearing.1/ See United States V. Wind, :527
:F.2d 672, 675 (6th Cir. 1975); United States v. Brown, 399 F. SuCp. !
631 (W.D.Okla: 1975)(state investigative agent permitted to testify
...regarding information received from reliable informant).
The United States does not intend to reveal the identity of
the informant, either by revealing the informant's name or by
r"disclosing sufficient information from which the individual's
::identity could be deduced because such revelations will probably
result in death to the informant and is unnecessary under the
'circumstances of this hearing.
1
i ?
18 U.S.C. 53146(f) provides that "iiInformation stated in, or offered
in connection with, any order entered pursuant to this section need
not conform to the rules pertaining to the admissibility of evidence
in a court of law.
26.
95-929 0 ? 82 ? 30
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
460
EXHIBIT NO. 7?Continued
11 United States v. Roviaro, 313 U.S. 53, 60-61 (1953) only
'roouires the disclosure of an informant's identity when such
q.
.enformation 'is relevant and helpful to the defense of an accused,
for is essential to a fair determination of a cause. Moreover,
;the Supreme Court in McCrav v. Ininois, 386 U.S. 300, 307
1(1967), stated that whether an informant's identity must be
'compelled depends not only upon the facts of the case, but also
,upon the stage of the proceedings at which the issue arises.
:Since the, question of the informant's identity is only arising
:at a hail hearing, it should not be compelled. Cf., United
'States v. Poles, 484 F.2d 919, 922-923 (4th Cir. 1973). The
'purpose of bail is to secure the presence of the defendant,'
1
:Tnited States v. Kirkman, 416 F.2d 747, 752 (4th Cir, 1970).
"Should DeGeyter be permitted to post the $100,000 bond or should
?
l/
his bond be raised the Unite States moves this Court for a
hearing pursuant to United States v. Nebbia, 357 F.2d 303 (2d
'Cir. 1966) and United States v. Melville 309 F.Supp 824(S.0.N.Y.
1
1970). Both cases permit a judicial inquiry into the origin of
the money being posted for bail. See 18 U.S.C. 53146(a)(5).
The inquiry is to assure the Court that the 'sources of bail.. .provide
the moral responsiOility and the proper purposes to assure the
defendant's presence.' Melville, sorra at 828. "(any) demand
One anonymity leads to a suggestion that the donor is engaged in,
something furtive, stealthy 1A?suspect in mot.'ve and possibly
illegal...(and] does not enhance assurance of the presence of
the defendant.' IQ. at 829.
So this case, the defendant attempted to steal a 'trade secret'
'worth in excess of $10,000,000 and intended to remove it from
the United States.
1 The Government's evidence is very strong and consists, in part,
of body recordings and pre and post arrest voluntary statements made
lto FBI agents. The defendant, a foreign national residing in Eelgiut
i:has no family or regular business ties to this country.
Respectfully submitted,
JUSTIN W. WILLIAMS
United States Attorney
Theodore S. Greenberg
Assistant United States Attorney
Z:C1:1%s:1::::t United States Attorney
Should the 2ourt grant the Government's Motion to Increase Ball,
the United States requests that the Court net forth its reasons in
writing. 18 U.S.C. $3146(d) and (0.
27.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
461
EDMIBIT mD. 8
United Stares Attorney
Eastern District of Virginia
117SolahlOys1owm,5inw'
. Alrxvd,j0.1222314
' July 7, 1980
70)1537 911:0
Frs1.1.I7.9100
David Cutner, Esquire
John D. Schmidtlein, Esquire
Gentlemen:
Re: United States v. Marc Andre DeGeyter
Cr. No. 80-102-A
The defendant, Marc Andre DeGeyter is charged in
an eight count Indictment with traveling in interstate and
foreign commerce with the intent to commit commercial bribery
in violation of Title 18, United States Code, Section 1952(a)(3).
Trial is set for July 22, 1980.
Confirming our discussions of July 2 and 5, 1980,
the United States, by counsel, and the defendant agree to
the following:
1. Defendant DeGeyter will plead guilty to one cougt
of violating the Export Administration Act of 1969 (50
U.S.C. App. Supp. 1, Section 2401 et sea., by
a violation of the Export Administration Act-(15
CFR 387.2) by seeking to export the ADABAS source code
("technical data"; 15 CFR 379.1(a) and (b)(1)(i) and (ii))
from the United States without the required export license
(15 CFR 370.3(a); 379.2). The maximum penalty for this
offense is one year imprisonment and/or a $25,000 fine (50
U.S.C. App. Supp. 1, Section 2405(A), Export Administration
Act of 1969 and 15 CFR 387.1(a)).
2. For knowingly and wilfully violating the Export
Administration Act, Marc Andre DeGeyter consents to an
administrative imposition of a $10,000 civil penalty by the
Secretary of Commerce or his authorized representative
pursuaht to the provisions of 50 U.S.C. App. Supp. 1, Section
2405(C)(1) and (C)(2)(B) and 15 CFR 387.1(b)(3). DeGeyter
agrees to execute any documents necessary to said consent
and collection of the S10,000 penalty.
3. Prior to the defendant's sentencing of the offense
set forth in parZgraph 1 above, the defendant is to deliver
to the United States Attorney for the Eastern District of
Virginia a cashier's check in the amount of $10,000-made
payable to the Treasurer of the United States. This check
will be held by the United States Attorney until such time
as the Secretary of Commerce or his authorized representative
imposes the aforesaid civil penalty. In the event that the
Secretary of Commerce declines to impose the aforesaid
$10,000 civil penalty, or imposes only a portion thereof,
the cashier's check or an appropriate refund will be remitted
to the defendant or his authorized representative.
4. The defendant will plead guilty to one count of
attempted commercial bribery in violation of Title 18,
United States Code, Section 13 assimilating 18.2-444(1);
18.2-27, Code of Virginia (1950, as amended).
. 28.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
462
EXHIBIT NO. 8--Continued
tvt
5. folio.idg sentencing on the aforesaid counts,the
United States will dismiss the pending eight count Indictment-
and agrees not to further prosecute the defendant for his
activities regarding Software AG of North America, Reston,
a
Virginia from May 1979 through May 18, 1980 which are now
known to the Government. --------
--V??
Should the defendant seek at any time to withdraw his
plea of guilty to the aforesaid counts or should the District
Court decline to accept his plea for any reason, this agreement
is null and void and the United States will proceed to trial
on the eight count Indictment returned June 9, 1980.
The defendant has been released from custody on a
$100,000 cash bond with special travel restrictions. The
United States has no objection to the continuation of the
present bond pending sentencing.
72
P117--
TS
David Cutner, Esquire
John D. Schmidtlein, Esquire
Page Three
At sentencing the United States will take no position as
to the sentence to be imposed.
No additional promises, agreements or conditions have
been entered into other than those set forth in this letter
and none will be entered into unless in writing and signed
by all parties.
Very truly yours,
JUSTIN W. WILLIAMS
ilted States Attorney
By:
.. . ???1 ... ?
-0. ore S.A..ee. ..?
erg
Assistant United States
Attorney
Agreed and consented to:
//
Marc Andre DeGeyter
,
David Cutner, Esquire
6AQQL
John D. S.9hmidtlein, Esquire
29.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
463
77,XIIIBIT NO. 9
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division
UNITED STATES OF AMERICA
V.
MARC ANDRE DeCEYTER
) CRIMINAL NO. 80-102-A
THE UNITED STATES ATTORNEY CHARGES THAT:
COUNT ONE
On August 7, 1979 in the Eastern District of Virginia and
elsewhere, the defendant MARC ANDRE DeGEYT:R did knowingly,
wilfully, and unlawfully counsel, command and induce the doing of
an act prohibited by the Export Administration Act and proclama-
tions, orders, rules and regulations issued thereunder, to
wit: counseling, commanding and inducing an officer of Software
AG to export the ADABAS source code from the United States to
Belgium without obtaining a validated export license.
(All in violation of the Export Administration Act of 1969, 50
United States Code App. Supp. 1, Section 2401 et sea.; 2405(A);
15 C.F.R. 370.3(a); 379.1(a) and (b)(1)(i) and (ii); 379.2;
387:1(a); 387.2).
COUNT TWO
On April 18, 1980 at Washington National Airport, in the
Eastern District of Virginia, within the special maritime and
territorial jurisdiction of the United States, the defendant MARC
ANDRE DeGEYTER did knowingly, wilfully and unlawfully attempt to
offer to an agent, employee and servant a gratuity without the
knowledge and consent of the principal, employer and master of
such agent, employee and servant with intent to influence his
action to te prejudice of his principal's, employer's and
master's business, to wit; to purloin the ADABAS source code.
(All in violation of 18 U.S.C. 57(3); 13 assimilating 18.2-444(1);
18.2-27, Code of Virginia (1950 as amended)).
44JSTIN W. WILLIAMS(
NITED STATES AT
By:
Theo re 5. Gr be
Assistant United States Attorney
0011.12
30.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
464
EXHIBIT NO. 10.
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
Alexandria Division
UNITED STATES OF AMERICA )
)
V. ) CRIMINAL NO. 80-102-A
)
MARC A DeGEITER )
SENTENCING MEMORANDUM
Sentencing is set for August 1, 1985.. On June 9, 1980 the
defendant was indicted on eight counts of interstate and foreign
travel with the intent to commit commercial bribery, in violation
of 18 U.S.C. 1552(e)(3). On July 7, 1980 DeGeyter entered into
a plea agreement with the United States and pled guilty to a two
count information charging violations of the Export Administra-
tion Act of 1969 and the Virginia commerc.ial bribery statute.
On Only 30, 1980 the United States reviewed the pre-sentence
report in this case. The 'Official Version" section of the
report is incomplete in that the report depicts DeGeyter's actions
as merely an attempt to legitimately buy the ADABAS source code.
Accordingly, the United States submits the following facts for
the Court's consideration:
A. Background
1. Software AG of North America (hereinafter Soft-
ware) is a .Virginia corporation specializing in computer
software. Among other products, Software markets the Adaptable
Data Base System (hereinafter ADABAS). ADABAS is a data base
management system.
2. The ADABAS source code is a trade secret of
Software and 55 worth at least $10 million.
3. The ADABAS source code constitutes "technical
data' under the provisions of the Export Administration Act of
1969.
4. Export from the United States of the ADABAS source
code is prohibited without a "validated export license' or other
authorization granted by the Office of Export Administration,
United States Department of Commerce.
5. Export of technical data is defined, in pertinent
part, as an actual shipment or transmission of technical data out
of the United States Or any release of technical data in the
United States with the knowledge or intent that the data will be
shipped or transmitted from the United States to a foreign
country.
31.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
465
EXHIBIT NO. 10--Continued
B. The Information
DeGeyter pled guilty to wilfully commanding and inducing
James Maguire, President, Software AG to export the ADABAS
source code from the United States to Belgium without obtaining
a validated export license.
Beginning in May 1979 DeGeyter started making contacts with
Maguire and James Addis (a Software salesman) to get them to sell
him the ADABAS source code without the knowledge of the company.
On May 18, 1979, DeGeyter met Addis, offered him
$150,000 for the source code in $100 bills or to set up a
Swiss bank account. Addis told DeGeyter to talk to Maguire.
DeGeyter contacted Maguire and at their first meeting on
July 20, 1979, told Maguire, 'It's a one-time shot, no paper,
no contract'.
During his dealings with Maguire, DeGeyter made it clear
that he wanted Maguire to bring the source code to Belgium, where
its authenticity could be tested, following which it would be
sent to Techmashimport, Moscow. This was the substance of the
conversation which took place on August 7, 1979 and which forms
the basis of Count One.
' The following colloquy on August 7, 1979 between Maguire
(JM) and DeGeyter (MD) is germane to this offense.
JM: In general, I say yes, but I got
some questions. You know, I'm a little bit
nervous. I mentioned some of the concerns
before. This source code, my understanding
is, that, as far as moving something out of
the U.S., you know, it may be an administra-
tive technicality. Do you know about the
export licenses and everything? What if you
get caught with that source code?
MD: I don't think there should be any
problem in that. I would then take the whole
responsibility for that. You are not supposed
to know where it goes to and what I an going
to do with it.
JM: Okay. It's what's, you know, is,
is, is there any way they can trace it?
MD: No.
JM: Back to us.
MD: No, no way whatsoever. ? There's
really no way. Nothing, but you know, you
have to trust me on that. I'm telling you
there's no way.
?
MD: Okay, we'll try to head fur the last
days of August.
JM: Okay.
? MD: And be in Brussels. And we do the
tests, we fly to Zurich, and you get the
money, and that's it.
In or about November 1979, Maguire, who had been cooperating
with the FB/ broke off contact with DeGeyter.
32.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
466
EXHIBIT NO. 10--Continued
Unable to obtain the source code directly from Eaguire,
DeGeyter sought to recruit a Software employee through an
intermediary in another company. The intermediary contacted the
FBI. . On April 18, 1080 DeGeyter offered an FBI agent posing as a
5,,Etware employee 1230,000 to purloin the source code. At this
time DeGeyter changed the represertations he made to Maguire and
told the agent that ha was trying to obtain the source code for an
Arab group. This transaction was charged as Count Two in the
Information to which DeGeyter pled guilty.
On May 18, 1980 DeGeyter gave, the FBI undercover agent a
check for $500,000 in return for the source code which the agent
was to have stolen from Software. Following the exchange DeGeytar
was arrested.
Respectfully submitted,
JUSTIN W. WILLIAMS
UNITED STATES ATTORNEY
By: P flAD ku CI,
? ,
Theodore S. Gteen:lerg
Assistant United States Atto
CERTIFICATE OF SERVICE
I hereby certify that a copy of the foregoing Sentencing
Memorandum was hand delivered this fist day of July, 1980 to
John D. Schmidtlein, Esquire, Suite 506, 320 King Street,
Alexandria, Virginia 22314.
Theodore S. Greenberg
Assistant United States A't,tAney
33.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
United Scam of America Ys.
DEFENDANT
467
EXHIBIT NO. 10A
United State District Court for
MARC MORI: DEGEITER
Cr. 80-102-A
In the presence of the attorney for the government uOuTu
lthe defendant appeared in person on this date ?.- 08 Or 00?1
COURSED L__J WITHOUT COUNSEL No.eher the coon adriard defendent or nem to coons, and asked v..... Otfrogoort ?orod re
hare counrul appointee by the to. and tha defendant thereupan war.. Yu:1W. a Torage.
X John
WITH COUNSEL L. Schmidtlein 'sc/
L._.J .1
PLEA there is a factual basis for Me plea,
} X
1..--.1 GUILTY, and the court being satisfied that L____I NOLO CONTENDERE, .. I____I NOT GUILTY
(Name of a.m.',
FINDING
JUOGMENT
SENTENCE
OR
PRORATION
ORDER
SPECIAL
[GNOMONS
OF
PRORATION
ADDITIONAL
CONDITIONS
OF
PRORATION
[0..MITtIENT
RECOMMEN.
DATION
There being a findingX,A= of
Gun.ry,
a, charged or u.;;'Offc.rials) of
'.Seeking. to. export the ADXBASsource.dodi'vithisui an-export license -
Export Adoin_Lstrat_ion Act of' 1969, .50..CISC.App':'pupp. I, Sec.-24:4
.42405(A)1 1$ CFR-370.2(a); -379.1(0 and (b)(1)(1):end_.;(11/;
. 387.11a/r 387.2 .,'Comet
Attempted .commercial bribery., 18 USC 7(3), 13 nsstnilatingz,,-
18.2 -444(1);.. 18.2-27,..Code'of.7irginia,(1950 as amended) - COmmt 2
1 L--) NOT GUILTY. Defendant is discharged
LL
T. court mated whether del ...... hog anything to Ur TrITY judgment rhould not be prOncxeccd. etearese turruernt ?ure ue Cht toe.,
Too Noun. or >poser. to the [Our% the coon adjudged defendant piny marsta eoh..ad Tnt orrcre-L,
Tway ,onn.ttcdI, ttO,00t000t of Gen.( or his authorized reprountuire for imprironment . ge-ed cr' .f.GTS.T. (4)
months as to Count 1 and a fine of $500.00 shall be imposed as to
Count 2. The defendant shall be given credit for tbrs already spe-t
incarcerated on these charges.
In additihn to The special condition, od prObation inipeTed atrOrt. It ia hereby oroeree Oat sahara: euheit?chn pree.len *else, an,.
fere. side of this. judgment by (merged. The Goren may change conditions. of proper:or, reduce or seteue Pedre. Orohe-en.e.
any time Curio; The 'meaten nu:04 or witAin a Maximum probation period oLti.e.yeara_rermated on a .....h.ust nhohe
'me... for a rieriatrun occurring during Pre probalibn per..
.>The court orders commitment to the custody of the Attorney General and recommends,
SIONOO Iry
Ihrurret /ogre
crearstret?
34.
.;.. 08-01-80
It is Or Pered tn. Pre Carl C..or I
edror.ed ten or .",..Phe-a
Cdhlueignaf TRUE COIN, r.
.1.3(0.4.T2
0
/C,E?r<
k
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
468
EXHIBIT NO. 11
? :3ttc Acre Du/ter
rtus1aaa 15
? l!lgia.m 2232
1-22a:
? Office of Bxport Administration, International Trade
O.S. Department of Commerce, hereby charges that
yci, larc Andre OeGeyter, have Knowingly violated the Provisions of
3ections 37.2 and 337.3 of the Export Administration Regulations
13 da.R. Part 368 st sod. (1979)). (the Regulations), issued
pars:cent
to tne F.port Administration Act of 1969, as amended (50
U.S.C. app. 2401, et :Isa. (1976)).
? Office of Broort Administratica has reason to believe that,
aring the period from May 18 to November 6, 1979, you counseled and
induced an employee of Software AG of North America, Inc., Reston,
Virginia, to procure for you 0.S.-origin rentricted technical data.
? procur2oent Attempt was made by you with the intention that the
tcAnical 3t os neported to the U.S.S.R. without applying for and
o,La:h:ng a validated export license from the Office of x'port
.wich you knew or. Ghould have knowl was reguired.
Accordingly, you ore hereby notified that administrative proceedings
2re in5titated against you pursuant to Section 11(c) of the Export
Alministration Act of 1979 (P.D. 95-72) (to be codified at SO U.S.C.
? 2401 nt sec.) (the Act) and Part 323 of the Regulations (44
5,257, Octoocr 12, 1579) for the purpoie of obtaining an Corder
al.aini3rrative sanctiono.incluiing any or all of the
7:evocation of validated export licence.; under Section
332.3(2)(1);
of export privileges unier Seotion 328.3 (a)(2);
practice under Section 382.3(a)(3); and/or
imposition of a civil penalty under Section 322,3(a)(4).
dc?ies of Parts 357 and 323 of the Regulations are enclosed.
ion the c4azgea colltaine?1 in lois Latta.: ,:itnin
(33) 2e.:vic,2 es proviivd in Section 333.7 of
m.,:oo failure wIll Oe treated as a default under Section
JS3.3.
'fou 2:2 fur:ther rotifeed tnat you are entitled to an agency hearing
.2n tnL, record raided in Section 333.7 ot the Regulations if a
,r:Gtta ..!:3110 tnOrerur It illul with your ans.:et/ to be repdesented
an?.! Soction ii() of tie Act, to sect a cor.Lent
5p35c.r: 5t; ce.rton,Iaruts againct you.
? nit to 5,-2Ctio.1 33ti. 23, 5 fal refarring t!-:Is metier to the
COMfAia, r. jO3tC aJOMir your answer in aocor,iance with
2ct.on 333.b, tnizt it anouid to, addressed to the Hearing
internationei Trade Adminiatration, Roma 3805, 0.3.
;.,,i;Arc:7--..nt. of Co=arce, .1.ZtO Street caa' Constitution A.venua,
20230.
:zaat Knowis, Olrector
Dffl.L:.! of Wiport Administration
?
cc: Comras/McClelland/Chrono/OEA/Case file 11(75)-20
cp:7/25/20 Wang 42529A
35.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
_Theodore S. G e erg .
ssistant. United States A
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Theodore S. Greenberg, Esq.
Assistant United States Attorney
Eastern District of Virginia
117 South Washington Street
Alexandria, Virginia 22314
470
,ENERAL courisEL OF THE
UNITED STATES DEPARTMENT OF COMMERCE
washington, D.C. 20230
DEC 2 2 198o DEC 24 12 is
4TIN.?iErS OFFI
Re: United States v. DeGeyter
Criminal No. 80-120-A
Dear Ted:
Pursuant to our telephone conversation, enclosed is a
certified true copy of an Order entered by Eric L. Hirschhorn,
Deputy Assistant Secretary for Export Administration, on
December 19, 1980, assessing a t10,000 civil penalty against Marc
Andre DeGeyter in accordance with the terms of the plea bargaining
agreement signed by Mr. DeGeyter and you on July 7, 1980. In
accordance with that plea bargaining agreement and the terms of
the Order, payment of the S10,000 civil penalty is to be made by
transfer of the check provided to your office by Mr. DeGeyter to
the Treasury of the United States through the Department of
Commerce. .
Thank you very such for your assistance in this regard.
Enclosure
Sincerely,
*mn
Thomas C. Barbour
Attorney-Advisor
37.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
P.,..o0k/LO
IISCPPAPI
mr.p.riP SPCL.TON
00 NNNNN
NO?C?? J. I?Ls?CN
PCOPLC C.0 CCPP?O i?VtwO
LCSCP
LEON P. GOLD
ALLALr ? pCpro?LO
ARNOLD S. JACOBS
oce cnT CLJPCS.C.p.
471
SHEA & GOULD
330 MADISON AVENUE
NEW YORK. NEw YORK 10017
12121 COI- 320L1
TELEX:J.3e"
CABLE: MOLI.P.146
?
JLIOSOOd
CUPrOPCAN OrrkLC
a, SOy
1.0POOP wiP SD.
C?OLPPO
? ic..LPO C. PPLPICrlibi
mit PRAPC., P. ?0...... July 31, 1980 ...... . SOS,
azsipton, run.c%
wr?ATIONO C
wro.14..4 P. OV.LOP 0 COPOC Y. 1.1117701+
PICPPRO L. SoINOCIATTI ...... Or?LCS
POPCPt GOLD In IPP.SPINCTON PVC.O.PC
25....,tO A. CV,. CP p?P.POLO P.APILL 0.4.0,LP, raw TOPP $1110
11.......411...32.0
JCSSC CLIPICIPPO
r?rad. C
MILC? r. 01LOOMPLO
SPLal 9. sr. elf
APLACLo IONS-7[011
Or COVP?CL
BY HAND
RAVIpi?LI
Theodore S. Greenberg, Esq.
Assistant United States Attorney
United States Attorney's Office
117 South Washington Street
Alexandria, Virginia 22314
Dear Mr. Greenberg:
I have enclosed a certified check drawn on our
escrow account and made payable to the Treasurer of the
United States in the amount of $10,000. This payment is
remitted by Marc DeGeyter in accordance with numbered
paragraph 3 of the letter agreement dated July 7, 1980 among
ycurseff, Mr. DeGeyter, myself, and John Schmidtlein.
Pursuant to the above agreement, I understand that
ycur office will hold this check until such time as the
Secretary of Commerce imposes a civil penalty against
Yr. DeGeyter, which penalty shall i no event exceed $10,000.
Very ly yours,_
\ 6.
David A. Cutner
38.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
472
U. s . i oRCE
December 22,
19 80
an Order issued in the
FEY CERTIFY that the annexed is a hue copy of
maJof Marc Andre DeGeyter by Eric L. Hirschhorn, Deputy
t Secretary For Export Administration, on December 19,
ompliance Division, Office of Export Administration
International Trade Administration
/
Director, Compliance Divisicin
(OUmmInde)
EREWYthw Sharon R. Connelly
?
>C-4
7,71,7
egoing certificate, is now, and was at the time of signing,
Division
her
and credit should be given 7f-e4 certificate as such.
4
Director
IN WITNESS WHEREOF, I have hereunto subscribed my name,
and caused the seal of the Department of Commerce to be af-
fixed this 2.2 day of
one thousand nine hundred and
December
eighty
For the SECRETARY OF COMMERCE:
uscomm-Dc 133.1.71
39.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
473
I UNITED STATES OF AMERICA
DEPARTMENT OF COMMERCE
In the Matter of )
MARC AVORE DEGEYTER )
ORDER
On July 7, 1980, the United States of America, by the United
States Attorney for the Eastern District of Virginia, and Marc Andre
DeGeyter entered into an agreement which, inter alia, contained the
following provisions:
1. Defendant DeGeyter will plead guilty to one count
of violating the Export Administration Act of 1969 (50
U.S.C. App. Supp.I, Section 2401 et seq., by
counseling and inducing a violation of the Export
Administration Act (15 CFR 387.2) by seeking to export
the ADABAS source code ("technical data"; 15 CFR
379.1(a) and (b)(1)(i) and (ii) from the United States
without the required export license (15 CFR 370.3(a):
379.2). . . .
2. For knowingly and willfully violating the Export
Administration Act, Marc Andre DeGeyter consents to an
administrative imposition of a t10,000 civil penalty
by the Secretary of Commerce or his authorized
representative pursuant to the provisions of 50 U.S.C.
App. Supp.I, Section 2405(C)(1) and (C)(2)(B) and 15
CFR 387.1(b)(3). DeGeyter agrees to execute any.
documents necessary to said consent and collection of
the $10,000 penalty.
3. Prior to the defendant's sentencing on the offense
set forth in paragraph 1 above, the defendant is to
deliver to the United States Attorney for the Eastern
District of Virginia a cashier's check in the amount
of t10,000 made payable to the Treasurer of the United
States. This check will be held by the United States
Attorney until such time as the Secretary of Commerce
or his authorized representative imposes the aforesaid
civil penalty. In the event that the Secretary of
Commerce declines to impose the aforesaid t10,000
civil penalty, or imposes only a portion thereof, the
cashier's check or an appropriate refund will be
remitted to the defendant or his authorized
representative.
40.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
474
On August 1, 1980, Marc Andre DeGeyter appeared in the United
States District Court for the Eastern District of Virginia and
entered a plea of guilty to a two count charge filed by the United
States Attorney. One of those counts was the violation of the
Export Administration Act and implementing Regulations referenced in
paragraph 1 quoted above.
ACCORDINGLY, pursuant to the authority delegated to me by the
Secretary of Commerce by Department Organization Order 10-3 (45 Fed.
Reg. 6141, January 25, 1980), and International Trade Administration
Organization and Function Orders 41-1 (45 Fed. Reg. 11862, February
27, 1980) and 41-4, effective August 26, 1980, I hereby find:
1. On August 7, 1979, Marc Andre DeGeyter knowingly, willfully
and unlawfully counseled, commanded and induced an officer of
Software AG to export the ADABAS source code from the United States
to Belgium without obtaining a validated export license, in
violation of the Export Administration Act of 1969, 50 U.S.C. app.
?2401, et seg. (1976 and Supp.I 1977) and the implementing
Regulations, 15 C.F.R. ??370.3(a); 379.1(a) and (h)(1)(i) and (ii);
379.2 and 387.2 (1979); and
2. Marc Andre DeGeyter has consented to an administrative
imposition of a t10,000 civil penalty for the violation of the
Export Administration Act and the implementing Regulations
referenced in paragraph 1 of this finding.
IT IS THEREFORE ORDERED, that Marc Andre DeGeyter., within 20
days of the date of this Order, pay to the Department a civil
penalty in the amount of t10,000. Payment of the $10,000 may be
made by the Office of the United States Attorney for the Eastern
District of Virginia out of funds provided to that Office by
Mr. DeGeyter pursuant to the agreement signed by that Office and
Mr. DeGeyter on July 7, 1980.
This Order is effective immediately.
Eric L. Hirschhorn
Deputy Assistant Secretary
for Export Administration
Entered this 1141day of December, 1980.
41.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
475
STATEMENT OF
DOUGLAS K. SOUTHARD
DEPUTY DISTRICT ATTORNEY
COUNTY OF SANTA CLARA, CALIFORNIA
BEFORE THE
U. S. SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
MAY 5,1982
Senator Nunn, Members of the Subcommittee and Staff:
My name is Douglas K. Southard. I am a Deputy District Attorney for the
County of Santa Clara, California. I have been employed by the District Attorney's
Office, the chief prosecuting agency in that county, for a period of five years.
Prior to that I practiced general civil law for a period of two years in a small law
firm in the county. I am a graduate of Stanford University with a degree in
Philosphy, and of Hastings College of the Law, the University of California, having
attained a ID. Degree in 1975. Like many people in law enforcement, I have no
technical background in the area of semi-conductor manufacture or electronics in
general, but have, of necessity, learned some of the basics of the industry which
was necessitated by my involvement in high technology theft prosecutions. In the
District Attorney's Office I have been assigned for a period of three and one-half
years to felony prosecutions. For the last two years my primary assignment has
been high technology thefts, including trade secrets thefts, integrated circuit
thefts, electronic equipment thefts and the investigation and prosecution of related
criminal conspiracies.
In learning the technical necessities of this area I have been greatly
assisted by numerous people in law enforcement and in the industry itself; and
particularly, have received training and assistance from Intel Corporation,
Signetics Corporation, National Semiconductor, Synertek Corporation, Hewlett-
Packard Corporation, and the NBK Corporation.
Investigation agencies with whom I have closely worked investigating and
prosecuting these cases primarily have been the organized crime and criminal
investigation section of the Santa Clara County Sheriff's Office, the Federal
Bureau of Investigation, and the Santa Clara County Police Department, with
notable assistance from the Los Angeles and Orange County Sheriff's Departments,
United States Customs Service and the Department of Commerce. The preeminent
police expert on these matters in our county is Detective Patrick Moore of the
Sheriff's Office.
95-929 0 - 82 - 31
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
476
In the last two years we have investigated literally scores of technology-
related theft cases, resulting in numerous convictions, but also, sadly, numerous
unsolved thefts or thefts wherein the property was never recovered.
Like you, we in local law enforcement are very concerned with the
national security implications of the technology thefts that we have seen.
However, as our expertise is in the field of investigating and prosecuting these
crimes, and not in the international ramifications thereof, I will limit myself in my
comments to the problem as seen by the local investigator and prosecutor and some
suggestions as to where law enforcement has to go to help stem the tide.
First, however, I think it would be instructive to explain somewhat the
integrated circuit manufacturing process and the history of the industry. I think
this will help the Subcommittee understand the sophistication of the technology
involved, the sophistication of the manufacturing process, and the areas in which
security problems can arise. The focus of my presentation will be on integrated
circuits themselves and not upon the finished products into which they are
constructed.
Overview Of The Technology
A semiconductor is merely a description of the material from which
integrated circuits are made. All integrated circuits, as we know them, are
semiconductor integrated circuits. However, all semiconductor circuits are not
necessarily integrated circuits. The concept of integration infers that large
numbers of transistors or diodes or other electrical elements are combined
together to perform a function. Large scale integration ("LSI") is now the norm.
An integrated circuit is nothing more than a super miniaturized electronic
circuit constructed on a substrate of silicon crystal. Silicon provides an ideal
medium in that it has the electrical properties of both a conductor and an
insulator. Like metal, silicon is cold, clammy to the touch, grey and semi-metallic
in appearance. Like an insulator, such as glass, silicon is fragile -- it can be broken
or chipped much like, for instance, quartz or obsidian. Because of its molecular
structure, the addition of certain types of impurities to a pure silicon crystal
structure can create free electrons which may alter its electrical properties. By
adding these impurities, (such as phosphorus, boron or arsenic), which are often
called "dopants" to the pure silicon crystals structure, in measured amounts, and at
specific locations, the electrical properties can be altered in different areas of a
silicon chip, giving one area an excess of electrons and another area a dearth of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
477
electrons, so that current flow between the two adjacent areas can be induced with
the appropriate input. Given these basic compositions, super-sophisticated
geometries can be constructed by semiconductor engineers connecting hundreds or
thousands of different "doped" areas in a particular fashion to achieve the result
desired. These designs are three-dimensional in nature, interconnecting different
. layers of an integrated circuit device vertically with different areas horizontally.
Horizontal and vertical connections are made by alternatively photo-lithographing
circuit designs upon the silicon and building up layers in the silicon by exposure to
corrosive chemicals which cause the silicon, in effect, to grow.
The net result is a three-dimensional electronic circuit as small as one-
quarter inch square or as large as an inch square which may contain anywhere from
four thousand to hundreds of thousands of transistors or other electrical devices.
For instance, a "2114" type integrated circuit, which is a relatively simple memory
device, has the capacity of retaining four thousand bits of information, that is four
thousand binary encoded memory units. The memory portion of the chip alone will
contain approximately eight thousand transistors and the entire chip ten to twelve
thousand transistors. This particular chip is a very basic chip which is quickly
becoming outmoded and serves as a building block upon which computer systems or
other electrical systems can be constructed.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
478
Design Process
The product flow of a typical integrated circuit device can be graphically
summarized as follows:
MARKET EVALUATION (Need)
PRODUCT DEFINITION (Solution)
COMPOSITE
DRAWINGS
LOGIC DESIGN (Schematic Mock-up)
) CIRCUIT DESIGN (Limited by physical
limitations inherent
in available process-
ing techniques)
LAYOUT (Hand or Computer
assisted circuit
drawings)
DIGITIZING (Magnetically encoded
Layout Design)
DATA EASE TAPE (Governs Equipment
Producing Reticles)
200x
OVERLAYS
RETICLES (10x or 20x Final
Device Size)
MASKS (Actual Device Size)
WAFER PROCESSING (Masks create patterns
on Wafers via Photo-
graphic Techniques)
FINAL PACKAGE TESTING
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
479
The market evaluation and product definition stages define the need and
the envisaged solution to the problem. This is followed my meticulous design work
culminating in a layout either drawn by hand or computer aided design equipment.
The resulting design is then "digitized" by translating its physical dimensions and
qualities into quantifiable data which are encoded by a computer onto a memory
tape, called a data base tape. This tape can then be used, with some intermediate
computer language translations, to run special machinery which creates reticles.
Reticles are groups of glass plates, one for each layer of the final chip, which have
the layer designs very precisely photographed upon them. From the reticles, by use
of a step and repeat camera, are made the chromium masks with which the wafers
are actually processed. Each mask has scores of circuit layers upon it, each
exactly the same. Usually the mask actually contacts the wafer to print the
circuit design upon it.
As is indicated on the diagram, constant design re-evaluation goes on,
leading to continual upgrading of designs.
Any person who was able to steal or otherwise acquire a data base tape,
reticle or mask set for a given product would have tools incorporating the original
designer's trade secrets, arrived at only after hundreds of thousands, even millions,
of dollars in design effort. With these tools an unscrupulous competitor could
undercut the original designer's prices and compete with him almost overnight.
Although basically the same data could be obtained by "reverse-engineering" a chip
purchased on the open market, such a process is expensive, time consuming, and
less precise than stealing the original designs.
Manufacturing Process
The actual manufacture of the integrated cirucit is a very complicated
process, which is difficult to understand for someone like myself who is not very
well versed in physics and chemistry, but I think we can describe it in such a
fashion that you get a feeling for it. I have brought some samples of the items to
be discussed to aid in understanding the technology.
First of all, an integrated circuit is a micro-miniature structure
comprised of several key materials. The basic material is highly pure, single
crystal silicon. The process starts with a single silicon crystal called a seed
crystal. The seed crystal, like the yeast in French bread, is sort of the magic
ingredient. It is a pure silicon crystal which is dipped into an essentially rotating
vat of liquified silicon, and is extracted under a controlled rate so that the molten
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
480
silicon material adheres to it and grows upon it. The result of this process is a long
sausage-like poly-silicon ingot, with an almost perfectly pure crystal lattice
structure, consistent throughout the entire ingot.
The ingot is then sliced into thin round silicon wafers. After the wafers
are polished they are subjected to a diffusion and photo-lithography process which
imprints the completed circuits upon them. Each wafer, approximately three to
four inches in diameter, can be imprinted with hundreds of individual circuits for
rectangular chips, each of which is essentially identical to the other.
The diffusion process consists of placing the wafers into furnaces at very
high temperatures in different gaseous atmospheres containing the desired dopants.
By this method oxide layers are grown on top of the wafers. This is really just a
very accelerated and sophisticated "rusting.' process such as we are all familiar
with. These deposits are called epitaxial growth.
Each diffusion or oxidation step is then followed by a photo-lithography
step.
The patterns lithographed upon a wafer are introduced through the use of
several successive masks and processed very similarly to the taking and developing
of pictures. The process requires a very clean, particle-free environment
containing much complex and expensive processing equipment. Patterns on masks
are projected into an emulsion film on the wafers from a light source with a
machine called a "projection printer." The picture of the mask on the wafer is
developed through regular "dark room" developing techniques, the purpose being to
delineate areas from which to remove the unwanted portions of the deposited
silicon or metal. This is in turn done by use of suitable acid rinses, which etch
away unwanted materials. After each acid etch a long rinse in very pure water is
necessary.
Under newer processes ion implantation is used instead of or, in
conjunction with diffusion. With this method, ions are literally shot into the silicon
wafer by an ion beam generator. Laser e-_tLtag equipment is also now coming into
general use.
The process continues in successive layers, sometimes as many as eight or
ten layers thick. Although the variables are many, the process is basically the
same for each successive layer: diffuse (grow oxides), photo-lithograph the circuit
pattern, etch, then repeat. The final layer, called the "metal mask," is an
aluminum film which interconnects all the vertical and horizontal geometries
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
481
within the design. This is the layer that is most visually apparent when looking at
the chip.
All this construction is done in a micro world that approaches the size of
bacteria. For instance, a common dimension of a typical circuit "wire," if you can
call it that, may be as small as four microns -- that is, four millionths of one inch.
All of this, of course, is done by super sophisticated equipment and
trained personnel in highly controlled atmospheric conditions. The designs
themselves, and the processes which are used to grow the layers on the chip, are
the result of years of design and re-design effort, leading finally to a design which
not only is workable but is makable, given the physical and technical limitations of
the manufacturing technology of the day.
After the chip manufacture process, the chips are separated from each
other by the wafer with special machines, so that each rectangular
individual chip may be encased in a protective housingand connected to the outside
world by means of precious metal leads that go to the familiar pins that plug into
printed circuit boards. Prior to doing that, of course, there is laborious,
painstaking and precise testing process wherein each individual chip is electrically
tested for defects. The defective chips are marked and ultimately discarded,
usually for later reclamation of precious metals.
The resulting chip is a high-reliability product which will perform in
adverse conditions for a substantial period of time without failure. Internally the
chip has no wires to come loose, no terminals to corrode, nor any other of the
physical attributes of traditional electronics devices which make them susceptible
to malfunction. Moreover, the incredible miniaturization achieved makes it
possible to literally construct a computer on a chip, and therefore make it
available for applications not previously dreamed of.
The variety and types of chips produced in this fashion are limited only by
the imagination of the engineers. The two basic types involved are: memory chips,
which can be broken down into numerous sub-categories depending upon the type
and properties of the memory and the input-output capabilities it has; and micro
processors, which are the commonly referred to "computers on a chip." They are
central data processing units designed to work in conjunction with other chips (for
instance, memory chips) to process information.
The applications of these chips are likewise as diverse as man's
imagination. They can be used in everything from digital watches to auto emission
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
482
control systems; video games to intercontinental ballistic missile guidance systems;
desk top computers to smart bombs and cruise missiles. This technology presents
such significant opportunities for the human race, that it may be the most
significant advance in technology since the industrial revolution. With it, we are
anticipating a quantum leap in man's ability to do tasks that need to be done.
Brief Industry History
The integrated circuit was invented in the late 1950's. Commerically
useable integrated circuits, known as "I-C's" in the parlance, were first available in
1961. The technology expanded rapidly and in 1971, a then small Santa Clara
company produced an entire computer on a single silicon chip. The computer on a
chip, technically called a micro processor or micro computer is revolutionizing the
electronics industry. As certain periodicals have recently pointed out the micro-
computer chip will have more impact on our society in the next twenty years than
any other invention. Already the micro-computer is being used in microwave
ovens, refrigerators, electric ranges, cash registers, taxi meters, gas pumps,
typewriters, television, computers and military applications. By the end of this
decade we may expect that they may be found in virtually every home and
business.
The integrated circuit was a uniquely American development. It was first
marketed in 1961, and integrated circuits are now already more than a five billion
dollar world-wide industry. Only over the last five years or so has foreign
competition become substantial factor in the state-of-the-art, leading edge portion
of the business. The micro-computer started from nothing in 1971. Recently sales
were in the range of half a billion dollars, and are expected to grow at
approximately fifty percent annually for the foreseeable future.
Continued development of integrated circuit memory chips has reduced
the cost of information storage in computers a hundred fold in the last ten years.
In the late twentieth and early twenty-first centuries integrated circuitry will be
as basic to an industrial economy as steel in the nineteenth and early twentieth
centuries. Leadership in this technology will be vital to any nation that would be a
world leader in economic and military power.
In the wake of this new technology has sprung an industry centered in
what has come to be known as "Silicon Valley," Santa Clara County, California,
which is among the most fast-moving and competitive in the world. Any individual
who can build a better electronic mousetrap using this technology has potential
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
483
immediate access to great wealth and recognition. Companies spring up over
night, based upon one good idea and sometimes die just as quickly when that idea is
overcome in the marketplace by new and better ideas. The leading semiconductor
manufacturers in the country and in the world are often companies who did not
even exist fifteen years ago and have literally gone from a backroom type of
operation started in somebody's garage to a billion dollar corporation in the space
of ten or fifteen years. Up to now, in my view, the rapid growth of these
companies has prevented a proper assessment of their security operations and has
caused a substantial lag in public and official appreciation of the national secuirty
implications of the new technology.
According to available evidence, in the past five years probably one
hundred million dollars or more in electronic technology and product has been
stolen in the Santa Clara County area alone. We in law enforcement have only
recently, within the last three years, almost stumbled across the problem. At the
time we were totally unprepared to deal with it. Now we are beginning to make
some headway.
What follows is a summary of some of the cases we have dealt with, the
problems we have encountered, and some suggestions aimed at strengthening law
enforcement's position.
Silicon Valley Thefts
In recent years increasing press coverage of high technology thefts has
gained the headlines across the country, and particularly in Silicon Valley, Santa
Clara County, California, where high technology electronics is centered. So what's
all the fuss about? In the last five years I would estimate that in excess of a
hundred million dollars of technology and products have been stolen, illegally
copied or counterfeited from Silicon Valley firms. Most of that theft is by
employees. The cases we handle involve technicians, inventory clerks, draftsmen
and engineers. Quite commonly, security personnel are also involved. They steal
circuit designs, process information, precious metals, and the chips themselves.
There is also an increasing propensity to stealing finished goods, such as computer
disc drives, and personal computers which have become increasingly smaller in size
and therefore more easy to steal.
This is not difficult to do. A complete set of glass reticles, which are
essentially production tools incorporating all details of a sophisticated new circuit
design, can be taken out of a plant in one's coat pocket. The same would apply to a
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
484
computer tape describing all details of the design. When a sophisticated new
circuit design may have cost as much as a half million dollars or more to research,
develop and engineer through the manufacturing stage, these items become
increasingly attractive targets of crime. With these reticles or computer tapes,
and available production technology, a competitor could go into direct competition
within a few months, undercutting the original firm's price because of less capital
investment. Where a company or country has not developed technical expertise to
actually design these products effectively from scratch, as is the case in Eastern
Europe, the availability by theft of proprietary product designs makes the
establishment of semiconductor manufacturing possible where it otherwise might
not have been.
The "Gray Market"
The most common problem, however, is much more crude and direct. An
employee can take out one thousand high priced, high demand chips selling for as
much as one hundred dollars each in his briefcase, the lining of his jacket or in his
lunch bag. He may sell them for five to fifty cents on the dollar to one of the
numerous fly-by-night independent distributors operating out of low rent office
suites, their homes, or even the back of their cars. Usually no questions are asked.
Independent brokers are not about to share with their customers the source of their
product, as the customer could then go directly to the source and cut the broker
out of his percentage.
As often as not the buyer purchasing stolen parts is an otherwise
respectable appearing businessman, who either uses his business as a front for
criminal activity or just can't pass up the opportunity to make some fast money. In
one recent case in Santa Clara County, resulting in a conviction of two persons, an
undercover officer offered to sell to a local distributor purportedly stolen Intel
memory chips which were then in very high demand. The officer flat out told the
defendants that the chips were stolen. After snapping up the parts for $10,000.00
cash, the common method of payment, the defendants the same day shipped the
parts via air freight to Werner Bruchhausen, a notorious international chip broker
in Germany. Bruchhausen is widely reputed to be a Soviet East German agent, is
under indictment by a federal grand jury in Los Angeles, and is currently in the
custody of the German federal police. This transaction was in violation of federal
export control regulations prohibiting such transactions without prior approval
because of the military applications of these products.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
485
Now the principal here was no back-alley crook. He had a fine home in
one of the exclusive hillside residential areas in Santa Clara County. He and his
beautiful wife drove Mercedes and sent their kids to the best private schools. He
was an armed forces veteran and a member of the reserves. He was president of a
successful parts distribution firm and all in all a typical American success story.
And yet, here he is selling stolen integrated circuits to an internationally known
fence. The reason is the same as always, greed. This kind of greed is not unusual
in the context within which he worked: Silicon Valley, a prime example of
capitalism on the rampage. Everyone wants to become an overnight millionaire
and money flows like water, tempting the otherwise honest citizen to scramble fast
to get his share of the pie.
Greed has spawned what is often called the "gray market". To understand
what the "gray" market is one must understand the hierarchy in electronics
commerce. The manufacturers such as Intel, National Semiconductor, Texas
Instruments, Signetics, Synertek and others, actually create the technology and
design and manufacture the integrated circuits for later use in a variety of
electronic equipment. At the end of the line is a customer such as Burroughs,
General Electric, Westinghouse, Siemons of Germany, or any of the numerous
defense contractors in this country.
In between are the middlemen. At the top of the distribution heirarchy
are the so-called franchised distributors. These include such companies as Elmar
Electronics, Hamilton-Avenet, and Western Microtechnology, which have
continuing written contracts with various manufacturers to represent them and sell
their parts in the market place. Major customers deal directly with the
manufacturers, but franchised distributors take up the production slack and provide
the means to connect supply with the demand by locating the demand. These are
reputable firms who prize their business name and deal only in first line products.
No evidence of false or fraudulent dealings or dealing in stolen property, by these
companies, has ever been brought to my attention.
Down line from the franchise distributors are the so-called independent
distributors. They obtain their product either directly from the company which
manufactures it when surplusages occur or from franchised distributors or from
such other means as might be available. Other means might include, and often do
include, purchasing surplus inventory from the end users. Because of the volatile
nature of the market, the end user customer will often find itself in a situation
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
486
where it has a surplus of parts. It might, for instance, have purchased large
numbers of scarce parts which had been allocated to it by the manufacturer as a
hedge against a rainy day. It may not have needed the number of parts it had
allocated to it, but purchased them anyway to insure that it had a supply so that its
production would not be interrupted. Down line if demand fell off the need for this
inventory evaporates and the customer finds himself with a "white elephant"
inventory, which often he is eager to dispose of quickly for cash. Or a customer
might purchase inventory in preparation of a new product introduction and then
scrap the product, leaving itself again with a surplus of unneeded parts. These too
would be sold in the independent distributor market.
Another source cif parts for the independent distributor is used parts.
Numerous types of products incorporate printed circuit boards into which the
integrated circuits themselves are literally plugged. As customer needs change
sometimes the old printed circuit boards are scrapped and new ones with more
updated capabilities replace them. Again, surplus parts are now available and are
often sold at low rates in the independent broker market. Because of the basic
reliability of integrated circuits, used integrated circuits are often quite reusable.
What is created by this system is an "anything goes" marketplace where,
especially in times of high demand and short supply, such as occurred in the 1977 to
1980 time frame, speculation runs rampant. It's really no different from pork belly
futures. Brokers buy large quantities of parts at fire sale prices, hoping to be able
to turn them over quickly if a need is found elsewhere. Numbers of these people
made a lot of money doing just this sort of speculation during the parts shortage of
1977 to 1980.
Gray Market Case History: Larry E. Lowery
Larry E. Lowery first came to the attention of law enforcement in
January 1978. In that month an employee at Elmar Electronics, a franchised
electronics distribution house in Mountain View, California, was cautiously
approached by a fellow employee, Paul Hernandez, about the possibility of stealing
integrated circuits from Elmar's warehouse. The employee alerted police and
cooperated in an undercover investigation. Hernandez was observed to steal one
hundred thousand dollars worth of late model circuits and transport them to David
Henry Roberts, who in turn delivered them to Larry Lowery's house, where
Lowery's wife paid Roberts. Larry Lowery was at the time away in Las Vegas.
Roberts and Hernandez were arrested, but due to a series of mis-cues by law
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
487
enforcement their cases were dismissed by the courts. Neither would testify
against Lowery, and Lowery's wife claimed marital privilege. Lowery, therefore,
escaped prosecution.
Through investigation it was learned that Lowery operated a company
called L. & M. Electronics in Mountain View, California, and had since mid-1977
successfully solicited electronics thefts, via Roberts, on a continuing basis.
In early 1979 Roberts was again arrested and convicted for two integrated
circuit thefts perpetrated by forged invoices written on his employer's account.
Again he named Lowery as his instigator and fence, but police were unable to
acquire evidence other than Roberts' statement with which to prosecute. It's
interesting to note that Roberts' employer was unaware of Roberts' previous
criminal activity.
In April 1980, it came to the attention of the Santa Clara County Sheriff's
Office Organized Crime Unit that a large quantity of Synertek Corporation's
E-prom type circuits, then in high demand, were being offered for sale by a local
independent broker. An undercover investigation was initiated which ultimately
led to the arrest of Lowery, and the search of his business premises. By now he had
changed his business name to Brut Electronics. Over eleven thousand stolen
Synertek integrated circuits valued at between one hundred and one hundred and
fifty thousand dollars were seized. Search warrants also led to the seizure of his
business records and the records of a "paper company" used by Lowery called
O.C.S.
Leg work and forensic examination disclosed that the records relating to
Lowery's acquisition of the stolen Synertek parts were phoney. Handwriting
experts determined all were authored by David Roberts, although they purportedly
showed transactions with numerous different companies. Innumerable hearings and
motions followed Lowery's arrest. Prior to the preliminary hearing a prosecution
witness was lured out of his home, attacked and severely beaten by a total
stranger. He was therefore unable to testify at that hearing. On the eve of a jury
trial, Roberts, then under subpoena by the prosecution, was murdered
execution-style, and his body dumped in a shallow grave in the Santa Cruz
mountains.
After six weeks of trial, necessitated by execessive technical testimony,
Lowery was convicted on November 2, 1981 of knowingly receiving stolen property.
He was allowed to remain free on bail pending his sentencing. On January 18, 1982,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
488
Lowery was sentenced to two years state prison and remanded into custody by the
judge.
On Thanksgiving weekend 1981, while Lowery was still free on bail after
his conviction, Monolithic Memories, Inc., of Sunnyvale, California suffered a three
point four million dollar theft, notwithstanding extensive electronic security
measures and twenty-four hour security personnel. The theft was undetected until
workers returned from the long Thanksgiving weekend. Many of the circuits taken
were reportedly specially designed units with direct military application. In all,
about a ton of boxed first line parts were taken, necessitating at least two truck
loads to make off with all the booty.
It was quickly determined that this had to be an inside job in that
somebody with knowledge of security measures would have to have disconnected,
or otherwise rendered inoperative, electronic security measures which included
perimeter alarms, closed-circuit television, ultrasonic motion detectors and
locked-cage part storage areas. Lie detector tests were given to various security
personnel who had worked shifts coinciding with the theft. One security guard,
Ronald Washington, notably failed the polygraph test, but was informed that he
passed, in hopes he would be put off his guard by that information.
Soon thereafter an acquaintance of Washington's, lured by the $50,000.00
reward offered by MMI, contacted MMI and law enforcement authorities, with
information regarding the case. It was learned that Washington had bragged about
having participated in the theft and stated that he was using the $7,200.00 payment
he had received for his part in the theft to finance his fledgling cocaine sales
business.
An undercover operation was initiated wherein an experienced narcotics
officer was introduced to Washington and proceeded to purchase cocaine from him
on five occasions. During the course of the conversations attendant to those drug
purchases, further statements were made by Washington incriminating himself and
others. He described the "big man" in the theft operation in such a manner as
clearly described Larry Lowery.
After weeks of negotiations with Washington the undercover officer told
him that he had a friend who would soon be quitting Synertek, a local integrated
circuit manufacturer, and who wanted to make one last killing by stealing parts
from his employer before moving east. A sting operation was thereby initiated
wherein a half million dollars in stolen Synertek parts were offered to Washington
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
489
and Washington's superiors. A purchase date was set up and bait parts were
acquired from Synertek for the operation.
On February 24, 1982 the operation went into effect. The plan was to
deliver the purportedly stolen parts to Washington and his confederate and to tail
them as they delivered them to the broker for whom they were purchasing the
parts. The operation was partially successful in that Washington, Abel Urbina and
*a third individual took delivery of the parts, but did not take them immediately to
their broker's location. They were monitored in regular telephone communication
with the leader of their operation, but waited to have the entire delivery made
before taking them to their storage location. Because Synertek was understandably
unwilling to risk a half million dollars worth of parts to the undercover operation
for fear the thieves might get away with them, the officers were unable to
complete the operation according to plan.
The three subjects were arrested and evidence was seized implicating
both Larry Lowery and his partner, Larry Kizer. One of the vehicles used by the
three young thieves was Larry Lowery's personal Lincoln Continental automobile,
registered in his name. The other vehicle, a truck, was owned by a Nevada
Electronics company run and owned by Larry Kizer. Subsequent search warrants
revealed numerous business documents in Brut's (that is, Lowery's) business
premises showing Kizer's relationship to Brut and Lowery. Telephone records were
seized, pursuant to warrant, which indicated that at the very time of their arrest
the three arrestees were talking to Kizer in Nevada on the pay phone in Santa
Clara County. To date, despite extensive efforts by law enforcement, the parts
themselves have not been located or recovered. It is feared that they may have
already been transported overseas, most likely to a European location.
To date, the trail of investigation is littered with dead bodies, assault,
sophisticated thefts, drug sales, and more. Scores of criminal conspirators appear
to be involved. It represents the clearest case of consistent, habitual, organized
criminal activity aimed at Silicon Valley as yet uncovered. Because of the
complexity of the case and the circumstantial nature of the evidence available, it
would be a very difficult task to fully prosecute and bring to justice all of the
people involved. Undoubtedly it will take years before the investigation is
completed and prosecutions culminated.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
490
Gray Market Case History: John Jackson
John Jackson, when he first came to the attention of Santa Clara County
law enforcement officials had previously been convicted five times elsewhere of
felonies involving theft, forgery and theft by false pretences. He had never been
sentenced to state prison for any of these offenses.
In November 1979, around Thanksgiving time, Intel Corporation suffered a
theft of approximately one million dollars worth of "2732" E-Prom devices. These
were at the time state-of-the-art memory devices in very high demand throughout
the world. They were capable of holding thirty-two thousand bits of binary
information in the memory and of being erased and re-programmed at will by the
user. This combination of memory capacity and flexibility made them a standard
memory unit around which such devices as main-line and desk-top computers were
built.
After the theft, corporate investigators had no leads as to how the items
had been stolen. Shortly thereafter, however, in December 1979, it came to the
attention of Intel employees in Europe that a large number of 2732's had surfaced
there. Specifically, Siemons AG of West Germany, a huge electronics
manufacturer and one of Intel's best customers, had apparently just received a
large shipment. At this particular time these particular items were in such short
supply, and in such high demand, that Intel was using a rationing system whereby
preferred customers were allocated a monthly allotment of parts based on various
criteria. Siemons was among Intel's highest allotment consumers, receiving one to
two thousand of these parts per month.
Within a short time Siemons began to notice a high failure rate of Intel
2732's it had purchased in a bulk. Siemons contacted Intel to complain. Samples of
the questioned chips were sent to Intel in the United States for analysis. Forensic
analysis disclosed that the devices in question, had in fact, been counterfeited.
Although they were authentic Intel parts, they had been forged with falsified Intel
part numbers, logo and markings. The reason for this was that the ten thousand
2732's stolen in the November 1979 theft had not yet been marked. The marking of
a device with the logo and part number is the last stage in the final testing and
quality assurance process. The parts that had been stolen had not yet reached the
final phase and had in fact not finished the testing process. As a result of that, a
substantial number, perhaps thirty percent, were parts that would not have passed
Intel's strict quality control standards. Thus, in use by Siemon's customers
equipment had begun to fail.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
491
After putting some pressure on Siemons, Intel learned the source of parts
in question. Siemons, had purchased a bulk lot of approximately ten thousand parts
from E.B.V. Corporation of Munich, West Germany. Further pressure was brought
to bear on E.B.V. and the admission was made that it had received parts from two
sources: Republic of Virginia in Arlington, Virginia, another parts broker, and
Mormac, Incorporated of Torrance, California. Until the execution of search
warrants on these premises in February 1981, the trail had grown somewhat cold and
no further back-tracking could be done.
A break in the case occurred in January 1980 when an anonymous
telephone informant informed police that John Henry Jackson lived at a specific
location with a house and garage full of stolen integrated circuits. An undercover
investigation led to the issuance of a search warrant, the seizure of thousands of
stolen integrated circuits, and Mr. Jackson's arrest. However, the case was later
dismissed after the judge found the search warrant to have been issued based upon
improper evidence.
In the course of investigating the case, however, law enforcement
officials contacted employees of Jackson who provided information linking Jackson
to improper dealings with integrated circuits.
It was learned that Jackson had been in business as a printed circuit board
"stuffing" house and aspiring computer maker, with a parts brokerage business on
the side.
Another employee of Jackson's came forward, spurred in part by
continuing revelations in the press regarding the seriousness of the stolen chip
problem. This individual literally walked into the investigator's offices and plunked
down upon their desk an assortment of printing plates which he stated he had used
while in Jackson's employ to counterfeit Intel integrated cirucit devices. Further
forensic analysis was done comparing the printing plates provided by this informant
to the printing on the confirmed stolen parts recovered from Siemons in Europe.
The printing plates matched the printing on the stolen devices.
This witness told of having been hired by Jackson for a menial job and
being 'induced by him into participating in his chip marking and marketing
operation. In the period of less than a year that he worked for Jackson he had
marked tens of thousands of integrated cirucits, primarily Intel 2732's and 2716's.
He provided information corroborated by another Jackson employee that Jackson
had been doing business in large part with the firm of Mormac in Los Angeles, and
95-929 0 - 82 - 32
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
492
in particular an individual by the name of Patrick Ketcham. Ketcham had
previously been convicted in a federal court in Los Angeles in another forgery
scheme wherein parts acquired on the open market were falsely represented and
documented to meet the stringent military specifications required by the
Department of Defense. At the time of the Jackson investigation, Mr. Ketcham
was still on probation for that offense.
With the cooperation of this informant the Sheriff's Department and Intel
Security set up an undercover operation whereby the informant continued to work
for Mr. Jackson, marking with counterfeit markings stolen Intel parts and
informing the police of their disposition. After one such counterfeiting session, an
associate of Jackson's was arrested in Long Beach, California, attempting to sell
the parts to a broker at that location. At that point, in February 1981, law
enforcement officers arrested Jackson, Ketcham, and one of Jackson's associates,
a former Intel employee. This employee had, according to both informants, been
seen to deliver Intel parts to Jackson's business premises on multiple occasions. On
one occasion the parts were delivered in the lining of the subject's leather jacket.
The subject, in fact, had worked in an area of Intel, a Reliability Testing area,
where he had access to the stolen 2732's and stolen 2716's. Intel business records
reflected that the subject had signed in on the "off hours" signing sheet on one of
the days of the Thanksgiving weekend in which the ten thousand 2732's were stolen.
Concurrent with these arrests, extensive search warrants were prepared
and served on Mormac, Space-Age Metals, Jackson's business and home, and on
Republic of Virginia, the parts distributor in Arlington, Virgina. No business
records were discovered memorializing Jackson's role in any of these transactions.
However, the business records of Space-Age, Mormac and Republic clearly
indicated that shortly after the theft in November 1979 or early December 1979,
Space-Age Metals sold Mormac five thousand Intel 2732's and sold Republic
another five thousand 2732's. Mormac and Republic in turn each sold all of those
parts to E.B.V. in West Germany, from which they went to Siemons. All of this in
the space of approximately one and one-half months after the theft. In one
business letter discovered at Space-Age Metals a Republic vice president told a
Space-Age official that he was amazed at the quantity and price that was being
offered for these parts given the scarcity of the parts in the marketplace, but that
he wanted to close the deal and wasn't stupid enough to ask any questions.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
493
The Jackson case is still pending trial. Charges against Patrick Lyle
Ketcham were dismissed due to insufficient evidence that he had actual knowledge
that the parts received by Mormac were stolen. Although the informant witnesses
had initially linked Ketcham directly to receipt of large quantities of integrated
circuits, in the relevant time-frame, subsequent investigation proved that Ketcham
in fact had received the five thousand parts in November and December of 1979
from Space-Age, not Jackson. In fact, at that particular time Ketcham's
relationship with Jackson was strained because Jackson had provided him with so
many sub-standard parts. Charges against the president of Mor mac, one of
Ketcham's associates, were also dismissed for lack of evidence of personal
knowledge on his part. Charges against Space-Age Metals or any of its employees
or officers were never filed. No direct evidence of whom in that organization was
responsible for the acquisition of those parts was ever found.
The Jackson case points out the difficulty of proving knowing receipt of
stolen integrated circuits. Although the various business records of the affected
companies, mainly Siemons, E.B.V., Republic, Space-Age, and Mormac, indicate
transactions amongst them in Intel 2732's during the relevant time-frame, it is
impossible to prove which Intel 2732's were actually involved in the transactions.
Once the parts actually got to E.B.V., all were incorporated into products which
were later sold. Only a handful were actually extracted and preserved by Siemons
after defects began to be discovered. Siemons wasn't about to recall all the
finished products into which these chips might have been incorporated just to rip
them apart to find stolen chips. As a result the web of circumstantial evidence
becomes strained. Direct evidence is simply not forthcoming. The records-keeping
systems employed by the brokers are not sufficiently specific to be able to trace
the particular part. Nor are knowing thieves likely to keep such records.
Finally the cost for such a prosecution would be almost prohibitive for a
local jurisdiction. The estimated costs of producing the minimum one dozen
witnesses from Europe and the East Coast necesssary to prove the evidentiary
chain in the Jackson case is in excess of the entire witness budget for the County
of Santa Clara for an entire year. Public safety considerations simply will not
allow property crimes prosecutions to take precedence over violent crimes
prosecutions.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
494
Modes of Thievery And Problems Of Prosecution
The most common means of theft involve company employees. They are
the following types:
(1) Finished Goods Thefts: Usually these are from warehouse
or storage areas, although armed robberies and truck
hijack thefts have also occurred. Usually the storage area
has some sort of security, sometimes including elaborate
electronic measures. A determined thief, however, can
usually defeat these systems without detection. The
common denominator here in the intent to resell the
stolen product in the "gray tnarket."
One of the primary difficulties investigators face is
the identification of the stolen product. Integrated
circuits are fungible goods without clearly traceable
identification markings. Usually the devices bear a
manufacturer s' logo, part number, and bottom-side
markings indicating place of manufacture (usually
overseas, mostly in Southeast Asia), and a date code.
Some manufacturers also mark the parts with lot
numbers, identifying a part as being one of a finite group
of parts (usually a few thousand) which were processed at
a certain place and time.
Lot numbers provide the minimum amount of
identification necessary for law enforcement to be able to
trace back stolen parts. Some manufacturers have also
resorted to the use of chemical taggants in their printing
inks, much as the Bureau of Alcohol, Tobacco and
Firearms has required of gunpowder manufacturers.
Unfortunately, limited experience has shown that these
additives can interfere with the electrical functioning of
the part.
Another problem is sloppy inventory control. Many
of these companies have grown so quickly that proper
inventory tracking policies have not been insitituted.
Company philosophies emphasizing speedy, inexpensive
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
495
production and quick product turnover are not conducive
to accurate record keeping. On numerous occasions
stolen chips have been recovered and confessions given,
when the company involved can't even prove anything is
missing! With many products substantial inventory
shortages have become so common that the companies
have just given up and accepted the losses as normal
inventory attrition which is factored into product
planning.
Apparent lack of commitment to reasonable
security goals also thwarts detection of theft. To many
companies the security department is a bastard stepchild
which is always well down on the list of priorities.
Apparently it is felt that security costs more than it's
worth. As a result, many crimes are never detected or, if
they are, are not reported. It's interesting to note that a
number of the largest companies have, to my knowledge,
never reported any integrated circuit thefts. Others
report them only when a thief is caught red-handed. Yet
companies which have made a substantial commitment to
improved security, especially Intel and Signetics
Corporations, which have their own full-time corporate
investigators (as opposed to just security managers), have
regularly reported, investigated, and actively prosecuted
thefts. Given the number and seriousness of the thefts
that are reported by such companies, one can only
conclude that the other companies are either unaware of
or do not report their own thefts. One can hardly
conclude that a company with tens of thousands of
employees suffers no thefts.
The ironies that occur as a result of this lax attitude
are worthy of note. On one occasion Sheriff's detectives
warned one of the largest manufacturers that, based upon
intelligence information, a major theft was planned for a
specific date in the near future. The potential thief, a
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
496
convicted murderer, was identified. Although the theft
was thwarted, the thief was not fired, and reportedly still
carries out a thriving cocaine business.
Almost every time we serve a search warrant on a
chip black marketeer we find integrated cirucits made by
one large manufacturer, without appropriate paperwork
accounting for its acquisition. (The situation appears so
hopeless we don't even bother to try to determine if it's
stolen or not).
At another company, the security manager had
evidently been a thorn in the side of management for
some time, since he continually decried the lack of
funding for the security department, warning that this
prevented him from doing his job properly. When a
substantial theft occurred, management's response was to
effectively disband the security department and
decentralize security by transferring those responsibilities
to the unit managers of each production unit, thus
multiplying the opportunities for corruption.
(2) Unfinished Goods Thefts: Integrated circuits can't be
considered finished goods until they have not only gone
through the actual manufacturing and assembly process,
but also have been thoroughly tested. The testing process
is vital to the reliability of the chip, and serves to cull out
sub-standard parts (which do not meet the manufacturer's
published specifications), and grade those parts which
meet or exceed specifications.
Almost all United States semiconductors actually design and fabricate the
semiconductor chips themselves in their U. S. facilities. This is a capital and
technology intensive enterprise requiring a relatively skilled labor pool. After chip
fabrication on the wafers and initial electrical testing, however, the wafers are
usually sent to overseas plants. Here they are sorted and fabricated into the actual
protective plastic package which contains the chip. The chip is placed in the
package and connected by fine aluminurn or precious metal wires to the external
pins which are ultimately used to plug the device into a printed circuit board.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
497
These operations are relatively labor intensive, and the low wage rates overseas,
especially in Southeast Asia, make it cost effective to do this work there.
At this point the fully fabricated but untested devices are shipped back to
the United States for final testing, quality assurance work, and then marketing.
The industry practice is not to imprint the devices with logo, device type or lot
numbers until stateside final quality assurance testing is completed. Thus, any
unmarked part is presumptively either a reject or an untested part.
Since there can be an much as a 30% to 40% rejection rate at this stage,
especially for the more complicated devices, a good number of bad parts have to be
disposed of in some fashion. This is normally done by a reclamation process which
involves grinding up the parts in a shredding machine and flushing out the precious
metals in an acid bath. Although some companies maintain their own reclamation
facilities, most sub-contract this task out to metal reclaimers. Varying degrees of
security are used to insure the parts are in fact ground up.
These measures are taken because the manufacturers want to maintain a
reputation for quality. One obviously doesn't sell defective products with one's
logo on it. Nor would a company normally want to put its unmarked rejects on the
market. They could easily have counterfiet markings printed on them, and be sold
as good parts. The resulting warranty claims and injury to reputation would be
costly. As a result, the manufacturers almost uniformly maintain a policy of not
selling unmarked or reject parts. Thus an unmarked part should be presumptively
stolen.
If this were in fact the case, law enforcement's job would be easier.
Unfortunately, the truth is more complicated. Many parts which do not meet
specifications and are therefore technically rejects are useable for lesser tasks,
and thus still have value, often above their scrap value. For example, a 16K
EPROM (an eraseable, programmable memory with a 16,000 bit memory capacity),
may not meet factory specs, yet still have 4,000 or 8,000 bits of usable memory
capacity. As such it may not be usable in, say, computer or guidance system
applications, but it would be usable in less critical applications, for instance a
video game. If cost effective, the company might sell it with special customer
markings or no markings at all. In such a case the part could be remarked and
fraudulently sold as first grade product. Or, if a company were particularly cash
poor at a given time, it (or an unauthorized department head), might be tempted to
sell the unmarked parts for the short term benefit involved. This has happened on
numerous occasions.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
498
When combined with the fact that many reclaimers fail to destroy rejects
because their intact value is worth more than the scrap value, these practices have
created a more or less established grey market for unmarked parts (either untested
or rejects). Rejects are especially easy targets, since very sloppy inventory control
and security practices are used with respect to them. Often they are stored for
months in rows of large barrels in various out-of-the-way areas without security
protection. The same can be true, to a lesser degree, with untested parts. It's only
when the parts are market grade that security becomes serious.
With easy access to unmarked parts, parts counterfeiters can have a
relatively easy time of it. John Jackson used stolen or counterfeited printing
plates to mark his parts. Larry Lowery stamped his with "generic" device names,
not even bothering to put cn a logo. With the legal availability of unmarked parts,
proving guilty knowledge by one who possesses them is difficult.
All in all, however, the primary problem with the unmarked parts market
involves consumer safety, not national security. When defective chips installed in
medical equipment, airplanes, microwave devices and the like start failing, people
are going to get hurt. Hopefully the problem can be cured before that happens.
Trade Secrets
Trade Secrets thefts pose a potentially more serious security problemn
than theft of product, since such thefts provide the very means of obtaining the
technology upon which to establish an industry and develop competitive expertise.
I've heard it authoritatively said that the United States at one time possessed a ten
year lead over the Soviet Union in micro-electronics technology, but that that lead
has already shrunk to maybe five years, based primarily on the easy access the
Soviets have had to our technology. I'm not in a position to attest to the veracity
of that proposition, but what I have seen would certainly not negate it.
By its very nature Trade Secret theft is the most difficult to detect and
solve. What is taken is generally not a physical thing, but an idea. Original
documents, computer tapes, reticles, masks, and technical drawings can be easily
copied by any of a number of photographic or electronic means without anything
corporeal ever being taken. Hence, it is never missed.
California at least is among the few states that at least have a criminal
trade secrets theft statute. It reads as follows:
Penal Code Section 499c
(a) As used in this section:
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
499
(1) "Article" means any object, material, device or
substance or copy thereof, including any writing, record,
recording, drawing, sample, specimen, prototype, model,
photograph, micro-organism, blueprint or map.
(2) "Representing" means describing, depicting,
containing, constituting, reflecting or recording.
(3) "Trade secret" means the whole or any portion or
phase of any scientific or technical information, design process,
procedure, formula or improvement which is secret and is not
generally available to the public, and which gives one who uses
it an advantage over competitors who do not know of or use the
trade secret: and a trade secret shall be presumed to be secret
when the owner thereof takes measures to prevent it from
becoming available to persons other than those selected by the
owner to have access thereto for limited purposes.
(4) "Copy" means any facsimile, replica, photograph or
other reproduction of an article, and any note, drawing or
sketch made of or from an article.
(5) "Benefit" means gain or advantage, or anything
regarded by the beneficiary as gain or advantage, including
benefit to any other person or entity in whose welfare he is
interested.
(b) Every person is guilty of theft who, with intent to
deprive or withhold from the owner thereof the control of a
trade secret, or with an intent to appropriate a trade secret to
his own use or to the use of another, does any of the following:
(1) Steals, takes, or carries away any article
representing a trade secret.
(2) Fraudulently appropriates any article representing a
trade secret entrusted to him.
(3) Having unlawfully obtained access to the article,
without authority makes or causes to be made a copy of any
article representing a trade secret.
(4) Having obtained access to the article through a
relationship of trust and confidence, without authority and in
breach of the obligations created by such relationship makes or
causes to be made, directly from and in the presence of the
article, a copy of any article representing a trade secret.
(c) Every person who promises or offers or gives, or
conspires to promise or offer to give, to any present or former
agent, employee or servant of another a benefit as an
inducement, bribe or reward for conveying, delivering or
otherwise making available an article representing a trade
secret owned by his present or former principal, employer or
master, to any person not authorized by such owner to receive
or acquire the same and every person who, being a present or
former agent, employee, or servant, solicits, accepts, receives
or takes a benefit as an inducement, bribe or reward for
conveying, delivering or otherwise making available an article
representing a trade secret owned by his present or former
principal, employer or master, or any person not authorized by
such owner to receive or acquire the same, is punishable by
imprisonment in the state prison, or in a county jail not
exceeding one year, or by fine not exceeding five thousand
dollars ($5,000), or by both such fine and such imprisonment.
(d) In a prosecution for a violation of this section it
shall be no defense that the person so charged, returned or
intended to return the article. (Emphasis added)
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
500
Subsection (b) thus makes it a crime to take or copy any article containing
a trade secret. Subsection (c) makes it a crime to offer a bribe to another to
obtain a trade secret.
Note that Section 499c does not prohibit competitors from exploiting
trade secret where they honestly gain access to them, such as by analysis of and
reverse engineering from a finished, marketed product. The emphasis is on
dishonest acquisition. Nor is novelty required. As is explained in the Restatement,
Torts (1939), Section 757, Comment "b":
...A trade secret may be a device or process which is
patentable; but it need not be that. It may be a device or
process which is clearly anticipated in the prior art or one
which is merely a mechanical improvement that a good
mechanic can make. Novelty and invention are not requisite
for a trade secret as they are for patentability. These
requirements are essential to patentability because a patent
protects against unlicensed use of the patented device or
process even by one who discovers it properly through
independent research. The patent monopoly is a reward to the
inventor. But such is not the case with a trade secret. Its
protection is not based on a policy of rewarding or otherwise
encouraging the development of secret processes or devices.
The protection is merely against breach of faith and
reprehensible means of learning another's trade secret. For this
limited protection it is not appropriate to require also the kind
of novelty and invention which is a requisite of patentability.
Unfortunately, very few states have criminal trade secrets theft laws. In
an informal survey I did, I discovered that most of the western states where
significant semiconductor and defense plants exist have no trade secrets laws. I
see this as a serious deficiency.
Trade Secrets Thefts Case History: Peter K. Gopal
Peter K. Gopal first came to the attention of industry security personnel
in approximately January 1978. At that time, Intel Corporation learned from an
anonymous source that one of its biggest competitors, National Semiconductors
Corporation was in possession of a computer data base tape containing the design
for a late model Intel microprocessor chip. This chip, the 8085, was a new, original
Intel design representing a substantial advancement from previous microprocessor
design.
Investigation revealed an individual by the name of James Catanich, an
employee of National Semiconductor and their Microprocessor Division. Catanich
told investigators that Gopal had directed him to take a untitled data base tape for
inspection on National's computer system to see if the data contained in it was, in
fact, genuine. Catanich reported that he picked up this tape from one of Gopal's
associates and took it to National Semiconductor to view its contents with the use
of National computers.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
501
According to Catanich, upon viewing the contents he immediately
recognized that the data thereon was proprietary Intel design information and, in a
panic, took the tape off the machine and returned the tape to Gopal. However, it
appears that in his haste he forgot to erase the data from National Computer's
memory banks, and another National employee subsequently discovered the data.
That employee thereupon apparently sought to convince his superiors that he could
reverse engineer the Intel design, without telling them that he had acquired the
original Intel data. After the incident was discovered, the employee was dismissed,
as was Catanich. The corporate investigators, who later contacted the police
regarding the incident, were unable to directly link the information to Gopal.
National cooperated with Intel, returning all information to them. Intel let the
matter lie.
Thereafter, in September 1981, one Andrew Moore, an independent
manufacturer's representative, indicated in conversations to a National
Semiconductor employee that he represented a principal who owned original Intel
design information available for sale. The National employee immediately
contacted his superiors, who contacted Intel and law enforcement authorities.
An undercover investigation ensued. The National employee, Larry
Worth, re-contacted Mr. Moore, and set up a meeting with his principal, who turned
out to be Peter K. Gopal. Equipped with a body transmitter-recorder, Mr. Worth
and another undercover operator, Tom Dunlap of Intel Corporation, met with
Mr. Gopal on numerous occasions. Dunlap posed as a National Semiconductor
employee. Dunlap was used, rather than a police officer, because his technical
expertise was needed to authenticate the genuineness of the data Gopal proposed
to sell. During negotiations, Gopal offered to sell both chip designs and process
information for numerous Intel Corporation products. One of the products offered
was a highly proprietary state-of-the-art design not yet even marketed by Intel or
any other corporation. The purchase price proposed for the entire package was in
the millions of dollars. Gopal indicated that he had past and continuing access to
proprietary Intel designs via insiders within Intel corporation. He stated that he
had already sold his designs in Europe and the customers were quite satisfied with
their performance and authenticity.
The undercover operation culminated in late September 1978, with the
sale by Gopal to undercover operators of Intel 2114 chip designs. The 2114 is a
standard memory chip. Search warrants were prepared and served leading to the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
502
seizure from Gopal's business premises of scores of computer tapes, glass reticles,
masks and other design materials for Intel, National, Zilog and other corporations.
The value of the items seized ran well into the millions of dollars. Some of the
items seized were designs still in the research and development state, which had
never been marketed.
Also seized were business and personal records of Gopal's indicating
numerous trips to Europe in 1977 and 1978, including trips to the Soviet Union and
Poland. Business cards of numerous Soviet consular level and ministry officials
dealing in technology exchange and purchase were found. These items can be
summarized as follows:
(1) Money exchange certificate, in both Russian and English,
signed by Gopal, dated November 28, 1977, showing a
transaction wherein Gopal exchanged $100.00 U.S. for
71.48 rubles. From personal experience I know that the
maximum amount of foreign currency one can bring into
the U.S.S.R. is $100.00. One must exchange it for rubles
at the port of entry and then re-exchange the rubles for
dollars when you leave. Thus the certificate indicates
Gopal entered the U.S.S.R. on November 28, 1977.
(2) Russian coins of various kopek denominations.
(3) Diary entries showing trips to Vienna in August, October,
and November 1977, plus airline tags, etc., for Austrian
airlines.
(4) Diary entry of November 1977, with the following name
and address:
Zdzilaw Przychodzien
Deputy Director
Ministry of Machine Industry
36 Krucza Street
00-921 Warsaw, Poland
(5) Separate personalized business cards of the following
persons, listing their address as "Ministry of Electronics
Industry," Usieuicha 24/2, Moscow 125315, Tel. 155-49-15:
(a) Alexander I. Rublsov
Dipl. Engineer Semiconductors
(b) Alexander S. Ivanov
Mgr. of Special Technological Equipment
Department
(c) Leonid F. Dymov
Chief of Department
(d) Vasily V. Kurdin
Director of Marketing
(e) Gennady V. Verklovenko
Sales Mgr. Semi-conductors
(6) Separate personalized business cards, listing the address
as "V/O TEchnoproimport" Moscow C-200, Smolenskaja -
Semaya Place 32/32, Tel. 244-33-52":
(a) L. A. Pavlov
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
(7)
503
Expert (This card bears the pencil-written words
"Terms of contract negotiation in what appears to
be Gopal's handwriting.)
(b) Valerie N. Kodsnev
Dipl. Engineer
Separate personalized business cards, listing the address
as the Soviet Consulate at 2790 Green Street, San
Francisco, California (415)972-6642:
(a) Stanislav N. Nosov
Commerical Counsel
U.S.S.R.
(b) Yuriy V. Palov
Vice Counsel, Science, Technology, and Education
Exchanges.
Business records seized indicated continuing international transactions
between Gopal and Austrian and Swiss firms. The primary Austrian firm, Sacher-
Gesellschaft AG, of Vienna, Austria, was headed by Dr. Rudolf Sacher. He was
also a one-half shareholder with Gopal in Gopal's business, Semiconductor Systems,
International, Inc. Subsequent investigation of the Swiss firms indicated they were
probably nothing more than shell corporations, serving as middlemen for the
transactions in which they were involved. Efforts to track the course of the
transactions past the Swiss firms were fruitless. Gopal has refused to cooperate
with the authorities.
The investigation continued after Gopal's arrest. A business associate was
located who told authorities that Gopal had bragged of having purchased certain
integrated circuit testing equipment and selling it to Poland via one of his Swiss
intermediaries. Gopal bragged to him that he had received three times the fair
market value of the equipment in cash, and had successfully smuggled the cash
back into the United States without interdiction by Customs or Commerce
officials. A check of available business records confirmed that Gopal had indeed
acquired the equipment in question and had sold it, but its ultimate purchaser could
not be determined. My understanding is that the Department of Commerce, after
a diligent investigation, concluded that it was unable to prove a violation more
serious than a misdemeanor, for which the only penalty was suspension of export
licensing privileges. Since Gopal had, by that time, been effectively blackballed
from the indsutry, it was felt that such a prosecution would not be worth the
effort.
Gopal and his co-cospirators were charged with various state law
violations, including conspiracy, bribery to obtain trade secrets, and theft and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
504
possession of stolen trade secrets. (It is interesting to note that during one of the
tape recorded conversations Gopal had with undercover operatives, he offered
Larry Worth, the National employee, ten thousand dollars each for each late model
data base tape Worth could smuggle out of National Semiconductor. Based upon
these conversations, the bribery count was included.) This prosecution represented
one of the first major prosecutions under California's Trade Secret Theft Statute.
That statute, as previously pointed out, is a departure from traditional
common law notions of property subject to theft. At common law, property must
be physical to be subject to theft. The Trade Secrets Law expands this concept of
property by specifically making ideas which qualify as Trade Secrets property for
purposes of penal statutes. This statute was designed to fill some of the logical
gaps left in the law by existing patent and copyright legislation. It protects ideas
which are not patentable nor copyrightable, but which have substantial business
value to its owner or competitors. For instance, a semiconductor device, such as a
"memory" device would not be patentable because it is not a product of new
technology, but merely builds upon existing technology. Under copyright law it
would not be copyrightable even though such a design is in large part based upon its
designer's creativity. Yet such a design can and increasingly does represent the
expenditure by its owner of hundreds of thousands, even millions, of dollars of
manpower, time and materials, before a single chip can ever be produced.
After initiation of the Gopal prosecution a novel problem presented itself
and led to the suppression of all of the physical evidence against Gopal. While
serving the search warrant the police had taken with them technical
representatives of Intel and National Semiconductor in order to help identify the
numerous items at Gopal's business which might be stolen. The police officer
involved, having no technical background, had no idea of what they were looking at,
or for. Trained engineers were required merely to identify those items which
belonged to the victims,. The majority of the items seized were reticles,
photographs and tapes. None of them obviously had the word "stolen" on them.
Many had the victims' logos and other identifying criteria deleted. Only an expert
would be able to identify ihem.
The trial court ruled that the police had abdicated their responsibiilty of
personally conducting the search by using these outsiders and suppressed all the
evidence. Thankfully, on the People's appeal, the Appellate Court reversed and
reinstated the evidence to the case.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
505
After literally years of motions and other proceedings the case finally
came to trial in November 1980. As neither side was comfortable with the prospect
of a jury of lay people understanding the complex evidence being presented, both
agreed to trial before a judge only. In the six months that followed extensive
technical testimony was required to establish the case and to identify the items in
Gopal's possession as being copies of originals in the possession of Intel Corporation
and the other victims. On one occasion the court had to be recessed to the
Computer Facilities room at National Semiconductor Corporation so that computer
tapes could be played and displayed to court and council for analysis. Forensic
analysis, including comparison of microscopic defects in the stolen reticles verses
Intel and Zilog master reticles, consituted key evidence in the case. It was thus
proved that the copies in Gopal's possession were directly made from original
proprietary design data in the custody of one of Intel's sub-contractors and
accessible to an employee who was a friend and part-time employee of Gopal's.
Gopal was convicted by the court of six counts of receiving and possessing
stolen trade secrets, bribery and conspiracy. He was sentenced to two years, eight
months in the state prison in California, but is currently free on bail pending his
appeal, which is expected to take at least a year. The transcript of the
proceedings has not yet been transcribed, it was so voluminous. Three and one-half
years after the offense and one year after the conviction, Mr. Gopal has yet to go
to jail. Moore and Catanich, Gopal's co-conspirators, were each convicted by their
plea of guilty to one count, one felony count. Each received probation and a
substantial fine. The actual thief of the Intel trade secrets had his case dismissed
for insufficient evidence, which was purely circumstantial and insufficient to
support a reasonable expectation of conviction.
Copyright Protection
The U. S. Copyright Office has maintained a general rule that it will
accept and maintain registration for a chip design incorporated into a schematic
diagram, mylar sheet, photolothographic reticle or mask, or similar representatives
in the nature of scientific or technical drawings. However, chip makers are
hesitant to rely solely on registration of these for at least three reasons:
First, the final chip configuration represents the integration of a number
of individual "drawings," so that the final product may be different from each
individual layout itself. Not only are revisions made, but the total is more than
just the sum of its parts.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
506
Secondly, the diagrams, sheets and masks which the Copyright Office will
register are not items which are exposed by the chip maker on the market. You
can't buy them. When unauthorized duplication does occur, it is usually done by a
primarily photographic process of "reverse engineering" from the finished chip, not
from the design layout itself. Since the items registered were not in fact copied,
it's questionable whether copyright protection applies under Section 113(b) of the
Copyright Act. In the past, the Copyright Office has refused to concede that the
chip itself is a published version of the drawings, so that while the drawings were
protected, the chips were not.
Finally, even if copyright protection is available, proof of infringement
poses difficult problems. Those who reverse engineer commonly alter the design
cosmetically to disguise its origins from all but expert analysis. For instance, in
the Gopal case, where stolen designs were used, naturally all logos and other unique
company identifiers were removed. In addition, memory arrays were flip-flopped
in a mirror image manner, address arid input-output buffers were enlarged, and
metal mask circuitry was rearranged in visually different but functionally
irrelevant ways. The resulting chip would have been created and sold in plastic
protective carriers so that a sample device would have to be purposely dissected
and technically analyzed for the offense to be discovered. Once discovered the
offender would undoubtedly argue no violation since substantial cosmetic
differences exist ed.
Patent Protection
Although I don't presume any expertise in patent law, I think it's fair to
say that the standards of patent protection, whether under state or federal law, are
much more severe than those of copyright protection. One must show (1) novelty,
(2) uniqueness, and (3) improvement over the prior art, which is not required for
copyright purposes.
The standards of novelty and invention are high, and cumbersome to
obtain. Although certain basic building blocks of semi-conductor technology, such
as the semi-conductor transistor or "gate," are patentable, the patent process is
generally not amenable to design advances. Like a novelist using established words
and alphabet, the chip designer's genius is in his creative mastery and manipulation
of the basic building blocks which enable him to get from a functional point A to a
functional point B in the most electrically efficient and mass-producible package
he can. Continual revision and redesign is the rule. A design which is state-of-the-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
507
art today may be obselete in the market place next year. The tedious patent
process does not fit into such an industry.
Suggested Responses To The Problem
Although the problems outlined are often centered in California, they are
becoming increasingly national in scope as the industry, spreads out across the
country. Most western and eastern seaboard states have an electronics
manufacturing industry of some sort. Even relatively isolated states as Idaho and
Utah have significant branch manufacturing facilities run by companies based in
California. This trend will continue as the industry seeks new locations with
relatively cheap labor pools and inexpensive employee housing opportunities. Both
of these commodities are becoming extremely scarce in California.
As a result of this, it appears unreasonable to expect local law
enforcement agencies to be up to the job of such specialized investigations. Some
sort of national or regional approach is necessary.
priorities which would address the problem:
(1) Increased Staffing of Investigative Personnel In Export
The following is a list or
Regulatory Agencies And Amendments Of Their Enabling
Legislation
Neither the U. S. Customs Service or the Export Administration
Compliance Division of the Department of Commerce is adequately staffed to
enforce existing laws regarding export of high technology goods.
The Customs Service's mission is not really even defined to include export
activities. Its emphasis has always been monitoring of imports. It is suggested
that amendments of applicable law to expand its mission in this area is desirable.
Many of the export laws now on the books provide inadequate penalties to
deter criminal conduct. As was mentioned with respect to the Gopal case, an
export violation discovered there was only a misdemeanor, for which the only
penalty was suspension of export licensing status. A re-evaluation is in order.
(2) Creation Of National Or Regional High-Technology
Crimes "Task Force" Or Information Clearinghouse
The Santa Clara County experience suggests that creation of a central
intelligence clearinghouse is a mandatory first step toward combatting high tech
crime. The "gray market" in particular consists of large numbers of interconnected
companies and individuals, whose activities and relationships can only be
establsihed by a continual monitoring effort, much like a narcotics bureau. Since
these people operate on at least a regional scale, it is impossible for a local agency
95-929 0 - 82 - 33
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
508
to keep track of them. By a pooling of information into a central intelligence unit,
a broader, more complete picture can be constructed. From this vantage point, the
major problem can be isolated and addressed.
To date the Santa Clara County Sheriff's Organized Crime Unit is the only
such unit in the country that I'm aware of. Despite effective efforts by those in
the unit, its staffing level (less than 5 people), is insufficient to deal with the cases
arising just in Santa Clara County, much less in the region as a whole.
(3) Mandating Crime Reportg
If a centralized intelligence unit were created, laws making reporting of
thefts to such agencies mandatory would be useful in gathering information and
assessing patterns of criminal activity. Sanctions for violations need not be
criminal sanctions.
(4) Electronics Broker Regulation Legislation
The obvious "choke point" of the gray market is the broker. Without the
unscrupulous broker, the thief would have no one to sell to, and thus no reason to
steal. If the brokers can be controlled, so can the crime problems. This should be
the focus of the investigative efforts. The restrictions imposed need not be much
more onerous than those almost everywhere imposed on pawnbrokers. Among the
possibilities include the following:
(a) Federal broker licensing statutues: Require all
electronics parts brokers to be licensed, conditioned upon
identification of all parties holding an interest, disclosure of all
current business and inventory locations, agreement to keep full
and complete records of all transactions, to follow specified
procedures to assure property acquired is not stolen, and to
abide by other applicable laws and regulations, on pain of
criminal penalties.
(b) Inspection statutes: Enabling designated law enforcement
agencies access to brokers inventories and business records to
assure compliance with the rules set forth in the licensing
regulation. This should specifically include authority to search
and seize with probable cause, but without a warrant. Again,
this is generally no more severe than current pawnbroker
statutes.
(c) Prohibition against possessing, buying or selling unmarked
integrated circuits: Or other specified electronic devices,
except by the manufacturer or its designated agent for
scrapping purposes.
(d) Prohibition against remarking or counterfeiting integrated
circuits, etc.
(e) Creation cd an evidentiary presumption: That a broker in
possession of specified stolen electronics goods has knowledge
of its stolen character, unless he can show excercise of
reasonable efforts to assure himself it was not.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
509
(5) Enactment Of A Federal Trade Secrets Law With
Criminal Penalties
Such a law, patterned on traditional civil law concepts (as was California's
criminal statutes), would help fill the gaps in federal patent and copyright laws,
and would give law enforcement an additional tool with which to combat espionage.
In specific cases, prosecution under such a law might be much more manageable
than having to prove actual diversion of classified information to a foreign power.
Such a law could be tailored to fit federal subject matter jurisdictional
requirements, if necessary, and would lend uniformity to an area which now has
only spotty coverage.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
510
pepartaant 4aumice
STATEMENT
OF
THEODORE WAI WV
ASSISTANT UNITED STATES ATTORNEY
CRIMINAL DIVISION
CENTRAL DISTRICT OF CALIFORNIA
BEFORE THE
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
UNITED STATES SENATE
CONCERNING
UNITED STATES v. EDLER INDUSTRIES, INC., AND VERNON EDLER
UNITED STATES V. SPAWR OPTICAL RESEARCH, INC.,
WALTER 3. SPAWR AND FRANCES A. SPAWR
UNITED STATES V. ANATOLI TONY MALUTA AND SABINA D. TITTEL,
SUB NON, UNITED STATES V. WERNER J. BRUCHHAUSEN
ANATOLI TONY MALUrA, SABINA TITTEL AND DIETMAR ULRICHSHOFER
MAY 5, 1982
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
511
Good morning, Mr. Chairman and members of the Subcommittee,?
my name is THEODORE WAI WU. I am an Assistant United States
Attorney of the Criminal Division, Central District of Califor-
nia. I have been investigating and prosecuting illegal exports
of Munitions List articles and controlled technology and pro-
ducts since 1976. In this respect I have worked closely witt
special agents from the U.S. Customs Service and the Compliance
Division of the Commerce Department, as well as concerned membErs
of other federal agencies.
My testimony today will focus on the three cases I handled
in the area of illegal technology exports.
Mr. Chairman, with your permission I would like to read
the salient points of a prepared statement.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
512
UNITED STATES v. EDLER INDUSTRIES, INC., AND
VERNON EDLER (CENTRAL DISTRICT, CALIFORNIA)
A. The Initiation of the Investigation
The federal investigation into the technology export
activities of Edler Industries, Inc. (Eli) of Newport Beach,
California, was instituted by the U.S. Customs Service in
Los Angeles in July 1975. The Office of Munitions Control
(OMC) of the U.S. Department of State had asked Customs to
investigate whether Eli was engaging in illegal export in
violation of the International Traffic in Arms Regulations
(ITAR) and 22 U.S.C. ? 1934, then in effect. Thus in July
1975, pursuant to a search warrant, Customs agents seized
numerous corporate records and documents from Eli. Subse-
quently, the matter was referred to the United States
Attorney's Office in Los Angeles and was ultimately assigned
to me. A number of witnesses were interviewed; they included
several former Eli technical and non-technical employees, as
well as OMC licensing officials and a government solid fuel
rocket expert.
B. History of Proceedings
On July 12, 1976, a federal grand jury in Los Angeles
returned an indictment against Eli, and its president-owner,
Vernon Edler, for illegally exporting controlled technical
data and assistance to France, in violation of then 22 U.S.C.
S 1934, now 22 U.S.C. S 2778(c) (Section 38
of the Arms Export Control Act (AECA)); the Internationa3.
Traffic in Arms Regulations (ITAR) and 18 U.S.C. S 1001.
Two months later, a federal jury found both the corporation
and Vernon Edler guilty of exporting, without license, to the
Societe Europeenne de Propulsion (SEP) of France, certain
technical assistance and data related to the fabrication of
graph se and carbon-carbon advanced lightweight material
components having missile and aerospace applications. El/
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
513
was sentenced to pay a $25,000 fine and Vernon Edler receiveil
a two-year prison sentence. The execution of Vernon Edler's,
prison sentence was suspended, and he was placed on probation?
for five years on the condition that he serve ten (10) weelt,
ends in jail and donate 1200 hours of work to a charitable
organization. Thereafter, Eli and Vernon Edler appealed theirc
convictions. On appeal, the Ninth Circuit Court of Appeals-
remanded the case for a new trial, on the basis that the triaa
court should have permitted Eli and Vernon Edler to offer
proof that the technical information exported to SEP had non-
military uses. The court of appeals opined that evidence
concerning non-military applications was relevant to the
question "whether a defendant knew or should have known that
the recipient of the exported information would use the infor-
mation to produce or operate Munitions List articles."
appellate court also concluded that Eli and Vernon Edler shoUlt
have been allowed to show a lack of significant relationship.
between the technical information and Munitions List items.
Accordingly, the case was remanded for a new trial.
On February 7, 1979, as a result of a new trial, Eli
and Vernon Edler were convicted by a federal jury of illegally
exporting Munitions List technical data to SEP and they
received the identical sentences as those previously imposed
by the district court. Eli and Vernon Edler again appealed
but the appellate court affirmed their convictions. Their
subsequent petition for certiorari was denied by the United
States Supreme Court.
C. The Exports and Technology Involved in
Edler
From as early as 1968 through 1976, Vernon Edler was
owner and president of Eli, a Newport Beach aerospace
engineering firm. He was the decision-maker of the corporation
and had close, daily working contacts with its engineers and
technicians. Eli began as a machine shop and gradually
evolved into an aerospace manufacturing and engineering firm
engaged in the fabrication of missile and rocket components --
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
particularly nozzle components for missile and rocket motors.
Eli had from time to time performed Government defense con-
tracts and worked on rocket motor components for such
missiles as the Polaris, Minuteman, Tartar, Hawk and Navy
Standard Arms. Sometime during 1968-1969, Vernon Edler
applied to OMC for approval for Eli to enter into a Tape Wrap
technical assistant agreement with a French entity called
Societe d'Etude de la Propulsion par Reaction (SEPR) of
Paris, France. (Tape Wrapping was then a sophisticated
technical process for making components out of lightweight
silica preimpregnated material.) Under that agreement, Ell
would provide SEPR with technical assistance related to the
fabrication of tape wrapped components for rocket motors.
The application was disapproved and Vernon Edler was informed
by OMC that the disapproval was based on foreign policy and
national security reasons. Specifically, OMC informed Vernon
Edler that "the policy of the United States was not to assist
a foreign country in the development of nuclear strategic
delivery capabilities," and that the assistance which Edler
proposed to provide REPS was in the "strategic delivery area.."
Notwithstanding OMC's refusal to grant an export license,
ELI implemented the Tape Wrap program and provided SEPR with
technical data, drawings, job travelers, and conducted
critiques with SEPR engineers and technicians from France on
tape wrap processes related to the fabrication of nozzle
throat inserts and other nozzle components for missiles and
rockets. French engineers and technicians from SEPR made
technical visits to Eli facilities and Vernon Edler sent his
manufacturing supervisor to SEPR's missile manufacturing
site in Lyon, France, to furnish technical assistance to
SEPR. The tape wrap program was completed in 1971. EII-SEPR
contacts continued, however.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
515
In January 1974, Vernon Edler sought OMC export
license to enter into a Lightweight Technical Assistance
Program (LTAP) to provide the Societe Europeenne de
Propulsion (SEP) with technical assistance related to
lightweight material processing for the production of rocket
motor components. According to former Eli employees, SEP and
SEPR were so related that the technical personnel whom Eli
dealt with at SEPR under the Tape Wrap agreement were also
representatives of SEP. To Eli, SEPR and SEP were one and the
same. Just five months later in June 1974, EII applied for
OMC authorization to export carbon-carbon technology to SEP
under a Carbon-Carbon Technical Assistance Program agreement
(C/CTAP) which Eli, without OMC's knowledge, had already
sig.led with the French. Based on the C/CTAP, Eli was now to
provide more sophisticated technical know-how that related to
the fabrication of carbon-carbon rocket motor components. The
technology involved in the production of carbon-carbon
material components was a technical upgrade compared to the
know-how covered by the earlier LTAP and the Tape Wrap agree-
ment.
While the export license applications for the LTAP and
C/CTAP were still pending, an OMC licensing officer informed
Vernon Edler that those technical assistance programs were
covered by OMC licensing requirements and that Eli was not to
act on them without "specific written approval" from the State
Department. However, unbeknownst to OMC at the time it gave
this caution, Eli was already well into the performance of
the LTAP and C/CTAP. French engineers and technicians from
SEP were given detailed technical instructions, job travelers,
drawings, data on specific gravity measurement and calcu-
lations, configuration analysis, and on-site demonstrations
on how to process lightweight silica, carbon and graphite
ablative materials for the fabrication of rocket motor com-
ponents. Eli technicians again went to SEP manufacturing
sites to observe and critique material fabrication processes
for nozzle throats, entrance caps and exit cones. Eli .
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
516
personnel saw those components being qualitatively verified
at SEP for quality acceptance. According to one Eli engineer,
if accepted, those components would be put on the applicable
missiles. At another SEP manufacturing facility, an Eli
engineer observed exit cones of the size and configuration
which he associated with the submarine-launch Polaris missile-
Another Eli engineer saw exit cones at various stages of com?
pletion as well as completed nozzle assemblies attached to
rocket motors. Indeed, Eli personnel demonstrated to Frenclia
technicians at SEP "techniques" of fabricating hardware
"associated with missiles and rockets." As trial testimony
showed, Eli personnel knew SEP was buying Eli technical
knowledge to fabricate aerospace products. Under the carbo
carbon agreement, programs which involved carbon/carbon
rocket motor components were assigned various female names.
For example, there was the "Irene" program which related to
exit cones for solid fule rocket motor; "Marcella" which
pertained to nozzle throats; and "Nancy" which concerned
entrance caps.
According to the trial testimony of one former Eli
employee, the diameters of the nczzle throats and entrance
caps of the "Kathleen" program fit the same "ballpark as a
Polaris or Poseidon" submarine-launch ICBM. This witness
testified he had no doubt that the carbon/carbon agreement
was to give SEP technical know-hew and manufacturing tech-
niques to fabricate rocket nozzles and that SEP's attempt
to reach"highdensity" for the carbon/carbon material
indicated to him that the technology transferred to the
French could only be used for rocket motors.
Throughout the summer of 1974, French engineers con-
tinued to receive instructions from Eli on "fabrication
parameters" and were shown manufacturing techniques for the
components under the various "girl" programs. Vernon Edler
himself participated in these activities.
In October 1974, OMC informed Vernon Edler that
Eli's license applications for the LTAP and C/CTAP agreements
had been disapproved. Yet, notwithstanding OMC's refusal to
grant approval, Vernon Edler continued to export to SEP the
controlled technical information.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
517
Two government missile experts testified at trial
that the technology Eli transferred was significantly and
directly related to rocket nozzles for military missiles.
According to one U.S. Air Force rocket expert, the data
exported by Eli "uniquely speak to, without exception, rocket
nozzles." Indeed, some of the techniques transferred to SEP
were then currently used in a major U.S. missile program,
according to an expert from the aerospace industry. Vernon
Edler himself admitted to a Customs special agent in my
presence that he (Edler) was aware that SEP was involved in
missiles and missile components production, and he believed-
that the technology Eli conveyed to SEP would be utilized In
that vein.
The Edler case represents the first successful govern-
ment prosecution of illegal exportation of Munitions List
II
UNITED STATES V. SPAWR OPTICAL RESEARCH, INC.
WALTER J. SPAWR AND FRANCES A. SPAWR,
No. CR 80-789-NNE (C.D. Cal. 1980
A. The Investigation
In February 1978, Compliance Division, Office of
Export Administration (DEA), Department of Commerce, received
a report of possible interest from a government agency regard-
ing the alleged sale of laser mirrors to the Soviet Union by
Spawr Optical Research, Inc., (Spawr Optical), Corona, Cali-
fornia, in violation of the Export Administration Act of 1969,
as amended. The referring agency gave its approval for Compli-
ance Division to contact the concerned citizen who furnished
the information on the alleged violations. DEA licensing of-
ficers confirmed that laser mirrors, of the type described in
the report, were controlled by the Commerce Department for na-
tional security reasons and would not be authorized for export
to the Soviet Union. Licensing officers also confirmed that
Spawr Optical had applied for authorization to export certain
high energy laser mirrors to a research institute in the USSR
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
518
in 1976, and that the license application had been rejected
for national security reasons. Further research revealed the
license application had specified 14 water--cooled laser optics
(mirrors) of various diameters valred at approximately $30,800.
One week later, a special agent from the Compliance Division
and a Customs special agent (from the San Francisco Customs Of-
fice) contacted the concerned citizen and two former employees of
Spawr Optical, who furnished substantive facts to support the
previous report. Based on this information, a federal grand
jury subpoena was issued in March 1978, for Spawr Optical
corporate records and documents related to the export of laser
mirrors.
On March 9, 1978, special agents from Customs and the Cum-
merce Department interviewed Walter d. Spawr and Frances A.
Spawr at the company premises and obtained a voluntary, signed
statement from Frances Spawr. According to Frances Spawr's
statement, she had undervalued several shipments of laser mir-
rows to a Wolfgang Weber in West Germany at the latter's recinsEs-
Following the interview, the agents served the grand jury
subpoena on Frances Spawr as the company's custodian of records-
Investigation then followed.
Subsequently, Special Agent Rice of the Commerce Department
Compliance Division, initiated a foreign inquiry through the LLB..
Consultate General in Frankfurt, West Germany concerning the
disposition of the Spawr laser mirrors exported to Weber. Weber
admitted that the mirrors had been transshipped to the Soviet
Union and agreed to come to the United States to disclose to the
Compliance Division his involvement in the transshipment scheme._
In September 1978, Weber traveled to the United States sordi
was interviewed by special agents of the Compliance Division,
at-which time Weber disclosed in detail his participation
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
519
with Walter Spawr in,the transshipment of Spawr laser mirrors
to Mashpriborintorg, a state purchasing agency of the Soviet
Union. Thereafter, the matter was referred to the United States
Attorney's Office in Los Angeles for consideration, and in the
spring of 1979, I was assigned to oversee the investigation and,
if appropriate, to prosecute the case. Investigation continued
and additional witness interviews were conducted by Customs and
Compliance Division special agents and myself up through the
summer of 1980. In August 1980, Compliance Division Special
Agent Rice and I went to Switzerland in an attempt to elicit
the cooperation of the Swiss Government in our investigation of
Spawr Optical and ofanother export control matter. Represent-
atives of the Swiss Government declined to lend assistance
based on their political neutrality and the restrictions of
their own business secrecy law.
Investigation and trial evidence disclosed that Spawr
Optical held a DOD facility security clearance and had performed
contracts on government defense programs. Walter Spawr and the
company had performed laser optics polishing work for companies
like TRW and Rocketdyne, and government agencies such as Los
Alamos Science Laboratory, Redstone Arsenal and Naval Weapons
Laboratory. Moreover, Spawr had furnished the Air Force Weapons
Laboratory at Kirtland APB, New Mexico, high energy laser mirrors
of the identical specifications as some of the mirrors illegally
sold to the Soviet.Union.
B. The Indictment
On September 3, 1980, a federal grand jury returned
a 15-count indictment against Spawr Optical, and Walter J. and
Frances Spawr, charging conspiracy, submission of false state-
ments to the government and illegal exportation of laser mir-
rors to the Soviet Union.
C. The Exports and the Technology
Witness statements and evidence presented at trial
established the following:
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
520
In 1974 and 1975, Spawr Optical, led by its president
and founder, Walter J. Spawr, sought additional markets for
the Spawr laser mirrors in Europe. One of the firms contacted
there as a possible sales agent was Oriel GmbH, Darmstadt,
West Germany, whose managing director was the previously men-
tioned Wolfgang Weber. Weber was a young and ambitious en-
trepeneur with good contacts in the USSR. In early 1975,
Weber became Spawr's West German sales representative. Weber
testified that he went to Moscow in late 1975 for the purpose
of exhibiting Spawr mirrors in the Soviet Union with Walter
Spawr's approval_ Initial contacts between Weber and repre-
sentatives of Mashpriborintorg were encouraging to Weber, and
he contacted Walter Spawr by telerhone in December 1975 to
convey the Soviets' interest in him. According to Weber, Sp6aur
was enthusiastic about possible large sales of his laser mirmers
to the Soviet Union.
Weber testified that, in about January 1976, he obtained
a large order for Spawr Optical water-cooled laser mirrors
from Mashpriborintorg. These mirrors of various diameters
ranging up to twelve (12) inches, were the finest manufactured
by Spawr Optical, which was noted in its field for the superior
quality of its mirror surfaces. Weber transmitted the order
to Walter Spawr after receiving his approval in January 1976.
Almost immediately thereafter, Walter Spawr assigned a production-
order number to the Russian order, and work was begun on fill-
ing the order. Even though the firm's general manager had over
one year earlier warned both Walter and Frances Spawr of the
U.S. Department of Commerce requirement for export licenses for
such laser mirrors, no export license application was submitted
by the firm to the Department of Commerce for export of the
mirrors.
The majority of the laser mirrors in the January Russian
order were exported to Weber in West Germany in July 1976. Ex--
port documents, containing false statements, were executed by
the Spawrs to facilitate the shipments and to deceive U.S.
authorities as to the value of the contents and shipments, and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
521
thereby to evade scrutiny and export licensing requirements.
Weber testified that, after the arrival of the mirrors at Frank-
furt Airport, he arranged to forward them to Moscow. Weber
subsequently learned from the Russians that they were very
pleased with the Spawr mirrors they received, and he communi-
cated the Soviets' satisfaction to Walter Spawr. Weber also
testified that he called Walter Spawr on several occasions
from Moscow concerning the mirrors for Russia. This was
confirmed by the firm's former secretary, who was told of the
:Moscow calls by Frances Spawr.
In April 1976, Weber received another large order for
additional Spawr water-cooled mirrors from Mashpriborintorg.
The order included mirrors of various diameters ranging up to
15.74 inches. Weber was told by the Russians that these mirrors
would be used by the Lebdev Institute, Moscow, for "laser experi-
mentation." As he had done with the first order, Weber sent the
order to Walter Spawr and informed him of the intended customer..
According to a former Spawr Optical employee, Frances Spawr toad
her that the Spawrs believed they should apply for a Commerce
export license to cover the larger mirrors in the second order
because there was a possibility that the larger mirrors would be
detected and stopped by Customs officers. An export license
application for 14 of the 29 mirrors odered by the Soviets in
April 1976 was sent to the Commerce Department's Office of Export
Administration in May 1976. In October 1976, the license appli-
cation was denied for '"national security reasons." The Spawrs
were expressly informed by Commerce in writing that
"these laser mirrors . . . have signifi-
cant strategic spplications. They have
been denied in view of the predominant
use with CO2 lasers which have important
applications in the military arena."
Weber testified that, during the period before the
license application rejection, he discussed with Walter Spawr
what to do if the application was denied. According to Weber,
he and Spawr devised a plan to send the mirrors to Switzerland,
from where they would be forwarded to the Soviet Union. A
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
522
former Spawr Optical secretary testified that Frances Spawr
told her that if the Department of Commerce did not approve
the license application, they would ship the mirrors to Russia
anyway, by way of Switzerland.
After the application was rejected by the Commerce De-
partment, Spawr Optical continued with the fabrication of the
mirrors for the second Russian order. Walter Spawr cautioned
his employees to no longer refer to the pending order as the
"Russian" order as they had formerly done. As part of the
conspiracy to export the second order of mirrors to the Soviet
Union without licenses and to deceive U.S. export licensing
people, Walter Spawr asked Weber to send him an order cancella-
tion on that second Russian order; but to really keep the order
open. Testimony and documents obtained at the firm showed that
it was Frances Spawr who received from Weber the address of
the Swiss freight forwarder used to divert the mirrors to the
USSR.
By February 1977, Spawr Optical had completed the second
Russian order, and had begun to ship the mirrors to Switzerland
in four shipments. In order to avoid scrutiny by U.S. author-
itites, Frances Spawr, as she had done earlier with another
employee, instructed the firm's new secretary to falsify the
value of the mjrrors on Shipper's Export Declarations. Francos
Spwr told her secretary to place on the export declarations
the false value of $500 or less per mirror. This Was the
same tactic used by the Spawrs to effect the July 1976 ship-
ments. The second Russian order had a price tag of about
$40,000.
On December 12, 1980, after 13 days of trial which spanne-d
over a five-week period, the Spawrs and their firm were varicmtsiy
convicted by a jury of conspiracy, submission of false state-
ments, and illegal exportation of laser mirrors to the Soviet
Union. Frances Spawn was sentenced to five years imprisonment_
Her sentence was suspended and she was placed on five years pro-
bation. Walter Spawr was sentenced to ten years imprisonment?
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
523
with all but six months suspended; he was also placed on five
years probation. Both Mr. and Mrs. Spawr were ordered to con,
tribute 500 hours to a charitable organization. The firm wee
fined $100,000.
The Justice and Commerce Departments and the Customs Ser-
vice considered the prosecution to be an important milestone
in export control enforcement because of the seriousness of
the offenses and because of the important laser optics tech-
nology made available to the Soviet Union as a result of the
unlawful exports. Colonel Bob L. Francis, USAF, Commander of
the Air Force Weapons Laboratory, Kirtland AFB, assessed that
the mirrors exported by Spawr Optical not only advanced the
laser mirror technology in the USSR, an area where the Russians
were felt to be deficient, but it also saved the Soviets mil-
lions of dollars and nearly one hundred manyears in research
and development costs. Even though the commercial value of
the mirrors was relatively low (about $60,000), the technological
value received by the Soviet Union was significant. According
to Colonel Francis:
"The free world, and especially the United
States, has actively pursued the technology
investigations of high energy lasers as to
their weapons lethality capabilities. In
this pursuit it became evident that sophis-
ticated heat exchangers using water cooling
of the mirrors substates were very important
and necessary elements. This eight-year
development effort, of improving and per-
fecting the heat exchangers on water-cooled
laser mirrors, has involved many millions of
dollars and nearly a hundred manyears of R&D
effort. The illegal sale by Spawr, et al,
has now provided the Soviets with over 50
water-cooled high energy laser mirrors as
well as the capability to disassemble and
back engineer this mirror heat exchanger
technology."
95-929 0 - 82 - 34
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
524
The assessment that the mirrors illegally exported to the So-
viet Union had real potential military application paralleled
what was evidently known to the Spawrs at the time of the corn-
summation of the offenses. In October-November 1976, the Spawrs
had asked of their prospective secretary during an employment
interview how the latter felt about working for a company that
makes things that might harm people.
In the respect of national security interest, then, the
Spawr Optical prosecution was particularly important to the gow-
ernment. It also resulted in the largest fines and longest prisrua
sentences levied for export control offenses up to that time.
It should be noted that the assistance of concerned cit3.--
zens and cooperative witnesses were crucial to the successful
investigation and prosecution of the Spawr Optical case.
III
UNITED STATES v. WERNER J. BRUCHHAUSEN,
ANATOLI T. MALUTA, SABINA D. TITTEL, AND
DIETMAR ULRICHSHOFER (CENTRAL DISTRICT,
CALIFORNIA)
A. The Origin of the Investigation
In March 1980, while conducting the Spawr Optical
Research investigation, I was advised by the Compliance
Division special agent who was on the Spawr case that he was
also concurrently working on another investigation involving
possible diversions of controlled high-technology goods to
the Soviet Bloc by a Los Angeles firm. He furnished me with
the following information:
In January 1980, Fairchild Test Systems Group, San Jose,
California, contacted the Compliance Division concerning sales
of advanced semi-conductor test instruments to an entity
styled Consolidated Protection Development Corporation. Fairchild
had previously sold four of the systems to Consolidated Protection
and had current orders for eight more systems, valued at about
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
525
$1.3 million. In February 1980, Watkins-Johnson Company,
Palo Alto, California, and Applied Materials Corporation, Sunnyvale,
California, also contacted Compliance Division inquiring about
Consolidated Protection and its president, Anatoli Tony Maluta.
The Compliance special agent then contacted Fairchild, Applied
Materials, and Watkins-Johnson. What emerged from these contacts
was information pointing to the possibility that Anatoli (Tony"))
Maluta was purchasing U.S.-origin high-technology products for
possible diversion to proscribed countries. Maluta's method of
operation was consistent with traditional diversion procurement
attempts, although it was apparent that Maluta had refined thome
methods. Further investigation showed that Maluta was purchaqii,ng
goods under one name and exporting under another. In 'fact, Malutm;,
over a three-year period, was determined to have actively usefl:
some six trade styles to conceal his activities. Maluta's frmIght
forwarder in Los Angeles confirmed to the special agent that
Maluta made only export shipments, contrary to Maluta's ass,,rifimms
to his suppliers that he was purchasing for domestic consumptilmn
only. most of the shipments through the freight forwarder wemm
made to West Germany through Los Angeles International Airport..
Inaddition, records made available to the government indicate3
Maluta had apparently undervalued and misdescribed the commodi,
ties on Shipper's Export Declarations to disguise the nature mud
value of the goods.
Further leads revealed that Maluta had devised elaborata
cover stories to mask his true activities. These cover stories
generally followed the line that Maluta was enaged in the
manufacture of perimeter protection systems for military imstaala-
tions in Alaska, Arizona, Southern California, or elsewhere in
the "Free World." Maluta also falsely represented to his sup
that his work was classified by the government. These cover
stories were apparently designed by Maluta to prevent instal/mm
or repair technicians and salesmen from the manufacturers from
visiting Maluta's asserted installations, and also to allow
Maluta to evade manufacturers' questions about the intended uses
and locations of the equipment. Maluta's apparent intent was
clear to the investigators: the fewer questions asked, the better.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
526
The Compliance special agent also learned that Maluta
was then in the process of purchasing considerable amounts of
equipment, including two highly sophisticated Gasonics, Inc.,
HiPox high-pressure furnaces, valued at about $300,000, used
in the manufacture of semi-conductor devices.
B. The Investigation Upgraded
Upon receiving the foregoing information, I advised
the Compliance special agent and the Customs special agent
on the Spawr case to increase vigilance on monitoring Maluta's
activities in addition to working on the Spawr case. In late
March 1980, the Gasonics equipment was tracked from the manu-
facturer in Sunnyvale, California, to the Los Angeles freight
forwarder, where it was to be shipped on Maluta's orders. It
was held there by the freight forwarder awaiting eventual export
to West Germany. Maluta had instructed the freight forwarder
to ship the equipment to a consignee in West Germany. We
ascertained Maluta had not applied for the necessary export
license.
It was readily apparent to me then that the investigation
was taking on major importance and scope and that the one or
two Commerce Department Compliance agents assigned to the case
did not comprise sufficient manpower to handle the investigatiom_ a
then requested the Special Agent in Charge of the U. S. Customs
Office of Investigation in Los Angeles to enter the investigation and
assign additional Customs investigators to the case, which he did..
Itwas clear that we could not risk the Gasonics furnac
falling into the hands of a Communist Bloc nation because of the
strategic nature and the state-of-the art technology of the equipment
being readied for export. I also considered it important not mmag
to our potential case against Maluta, but also to our national security
interest, to ascertain the final destination of the equipment, wthich
we suspected to be a Bloc nation. For this reason, I, after r-
cussion with the Customs and Commerce agents, requested Custuu, tm
prepare a substitute Gasonics shipment containing sand or some reth=
suitable material for a controlled delivery. I also asked CulFhErrris
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
527
to seize the real high-pressure furnace systems when they were pre-
sented for export at Los Angeles International Airport. The sub-
stituted crates would then be allowed to be exported in place of
the real equipment. It was our considered opinion that if the
controlled delivery worked, we would have a good chance of trend:rig
where the equipment was really going.
The substituted shipment was exported in early May 1950 tm
Vienna via West Germany. . Documents showing the ultimate destination
of the equipment as Mashpriborintorg, Moscow, USSR via Amsterdam
were subsequently recovered by the U. S. Customs Attache Office,,
Bonn.
Throughout the investigation, there was an efficient and
cooperative relationship between working level U. S. Customs
investigators, U. S. Commerce Department investigators, the
U. S. Justice Department personnel involved in the investigation
and prosecution, the U. S. Customs Attache's Office in Bonn,
and West German Customs officials in Bonn and Duesseldorf. As
you will see, later on, special agents and revenue agents from the
Internal Revenue Service entered the investigation with excellent
results.
The continuing investigation by U. S. Customs in Bonn
and the Duesseldorf West German Customs Office revealed an
extensive and complicated web of diverters and firms
wittingly and unwittingly providing assistance to the network. of
Maluta and his West German co-conspirator, Bruchhausen, who pro-
cured goods primarily for the Soviet Union. It was also learned
that Elmasch GmbH, an additional West German firm in the network
was established to procure U.S.-origin technology goods for
other Soviet Bloc nations, principally Bulgaria, Poland, East
Germany, Czechoslovakia, and Hungary.
By mid-May 1980, search warrants had been obtained to
search Maluta's firm, now named Continental Technology
Corporation, in Torrance, California, bank deposit boxes and
former offices of Maluta's California firms. Warrant searches
were also conducted at the residence of Sabina Tittel, who
was then suspected of being a part of Maluta's illegal export
activities. Voluminous export documents were obtained in the
search of Continental Technology which were crucial to the
investigation. It was also apparent that many other documents
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
528
had been destroyed before the searches. Searches of entities
allegedly operated by Bruchhausen in West Germany, were also con-
ducted by West German Customs authorities, which resulted in
the discovery of significant amounts of incriminating documents.
I arranged for travel to West Germany for one Commerce
investigator and one Customs investigator and myself in July
and August 1980. On arrival in Bonn, I Met with U. S. and
West German officials to elicit West German cooperation in
our investigation of what was considered to be the most
significant and elaborate diversion scheme yet unearthed.
After some frank discussions with West German officials, they
agreed to allow the Commerce Department investigator and me to
work with the West German Customs authorities. U. S. Customs
investigators were already authorized by an existing U.S.-German
Customs Agreement to conduct certain inquiries in West Germany.
I must say I was personally gratified and extremely appreciative
that the West German authorities were willing to assist our effort
in this way.
During our three-week stay in West Germany, we reviewed
the large number of business and export documents seized by the
West Germans from Techma GmbH, Elmasch GmbH and other Bruchhausen
related entities. We worked closely with a very talented and
cooperative West German Customs agent during this period. The
documents we reviewed clearly established that Techma and
Elmasch were set up solely to receive U.S.-origin goods and to
divert to the Soviet Bloc. Of the literally hundreds of shipments
we reviewed, only one or two involved non-U.S.-origin goods.
After a cursory summation, we estimated that the Soviet Bloc
paid more then $12 million for the U. S. high-technology products
' bought through Maluta over a period from 1977-1980. The apparent
domestic value of the goods purchased in the U. S. over the same
period was approximately $8 million. As you can see, the scheme,
up to the time of its discovery, was extremely lucrative for
those who were part of it. At the same time, the system was
virtually impossible to detect on its own. This was because
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
529
(1) Maluta's cover stories were apparently effective in discour-
aging manufacturers from questioning his activities; (2) his use
of two sets of firms, one to purchase and one to export, made it
difficult for the curious to make a face value connection between
purchaser and exporter; and (3) the use of in-bond shipments
through West Germany and a neutral country, either Switzerland
or Austria, precluded undirected discovery of the diversions
by foreign governments.
After our visit to West Germany in July and August 1980,
I traveled to Switzerland with the Compliance agent to ask
the Swiss authorities to help with our investigation. In dis-
cussions with Swiss government officials, we were told that '
American export control enforcement involved political considera-
tions and that the. Swiss government could lend no assistance
because.of that country's political neutrality and because their
own business secrecy laws prohibited even the government from
making certain business-type inquiries.
In February 1981, based on what we had already learned
about Maluta's and Tittel's activities at Continental Technology,
I asked the Internal Revenue Service to enter the case. Infor-
mation and documents reviewed by the Custom's and Commerce inves-
tigators and myself pointed to the strong likelihood that Maluta
and Tittel had not declared significant parts of their gains from
the illegal export activities from 1978 and 1979. Within the aegt
five months, IRS special agents and revenue agents amassed enough
information to support several felony counts against Maluta ana
Tittel for tax evasion and subscribing to false income tax returns-
This was a considerable achievement on the parts of the IRS
investigators, who played no small role in the government's ultmatte
success in the prosecution of Maluta and Tittel.
The investigation team comprising one Customs special agent
and one Compliance special agent and myself again traveled to
West Germany in May and June 1981 to interview additional witrrroxr-
and to finalize our pre-indictment investigation and prosecution
documents. I again met with West German officials and received.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
530
their continued, effective cooperation, which was crucial in
developing our case against Maluta and his associates. The tem
returned to the United States after three weeks of investigatimr4,
having secured the cooperation of crucial prosecution witnesses..
C. The Indictment
On August 19, 1981, a federal grand jury in Los .Angelses
returned a sixty-count indictment against Maluta, Bruchhausenfl
Maluta's secretary, Tittel, and Dietmar Ulrichshofer of Vienna?
variously for conspiracy to violate U. S. export laws, making
false statements on Shipper's Export Declarations, violations of
the Export Administration and Arms Export Control Acts, perjury,
and income tax violations.
D. Maluta and Tittel Convicted
On October 26, 1981, Sabina Dorn Tittel pleaded guilty
to six counts of the original indictment, including two false
statement counts, two income tax violation counts, and two counts
of illegal exports to West Germany.
On October 27, 1981, as a result of a court trial before
United States District Judge William Matthew Byrne, Jr., on stip-
ulated facts, Anatoli Tony Maluta was convicted of the fifteen
felony counts charged in a Superseding Information, including
conspiracy, making false statements on export declarations,
illegal exportation of high-technology and Munitions List
commodities to the Soviet Bloc, including the Soviet Union, in
violation of the Export Administration and Arms Export Control
Acts, and of tam evasion and subscribing to a false income tax
return. On December 7, 1981, Maluta was sentenced to five years
imprisonment and to pay a fine of $60,000. Maluta is currently
at liberty on bond pending appeal. Tittel was sentenced to two
years imprisonmerr, and to pay a 829,000 fine. Tittel was taken
into custody in January 1982 and is currently serving her sentence
at the Federal Correctional Institution, Pleasanton, California.
On April 2, 1982, Tittel filed a motion for a reduction of her
two-year sentence, and the court has taken the motion under
submission.
variously for conspiracy to violate U. S. export laws, making
false statements on Shipper's Export Declarations, violations of
the Export Administration and Arms Export Control Acts, perjury,
and income tax violations.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
531
D. Maluta and Tittel Convicted
On October 26, 1981, Sabina Dorn Tittel pleaded guilty
to six counts of the original indictment, including two false
statement counts, two income tax violation counts, and two counts
of illegal exports to West Germany.
On October 27, 1981, as a result of a court trial before
United States District Judge William Matthew Byrne, Jr., on stip-
ulated facts, Anatoli Tony Maluta was convicted of the fifteen
felony counts charged in a Superseding Information, including
conspiracy, making false statements on export declarations,
illegal exportation of high-technology and Munitions List
commodities to the Soviet Bloc, including the Soviet Union, in
violation of the Export Administration and Arms Export Control
Acts, and of tax evasion and subscribing to a false income tax
return. On December 7, 1981, Maluta was sentenced to five years
imprisonment and to pay a fine of $60,000. Maluta is currently
at liberty on bond pending appeal. Tittel was sentenced to two
years imprisonment and to pay a $25,000 fine. Tittel was taken
into custody in January 1982 and is currently serving her sentence
at the Federal Correctional Institution, Pleasanton, California.
On April 2, 1982, Tittel filed a motion for a reduction of her
two-year sentence, and the court has taken the motion under
submission.
E. The Importance of the Case and the Exported
Technology
I am informed by the Justice and Commerce Departments
and the Customs Service that the Maluta/Bruchhausen illegal expart
operation was the most sophisticated and complex, as well as the
largest, yet uncovered .involving high-technology commodities
to Soviet Bloc nations. Not only were the firms involved in the
scheme established solely to procure technologically advanced.
military and "dual-use" commodities for shipment to Communist--
controlled nations, the personnel chosen to execute the scheme
were carefully selected. More than eight million dollars of
some of the most advanced hardware were exported illegally 017E5
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
532
a three and one-half year period in the scheme, and most of the
equipment was highly prized and dearly paid for by the Soviets
and their satellite countries in hard currency. Some of the
computers, micro-circuit test systems and manufacturing equipmmart
and peripherals purchased and exported by Maluta, could greatly.
increase their computer technology and production capability.
The controlled commodities also included military microwave
surveillance equipment intended for the Soviet Union, and micro-
computers and state-of-the art solid state electronic devices.
for the Soviets and other Bloc users. The equipment illegally,
exported from the United States in this case represents a vast
gain by the Soviet Bloc in advanced technology equipment that
would not have been licensed by U. S. authorities for shipment
to the Soviet Bloc. Equally important is the fact that our
investigation frustrated Maluta and his co-conspirators from
obtaining millions of dollars of additional equipment, including
a $1.3 million order for semi-conductor test equipment for the
USSR, a $700,000 microwave surveillance system which, according
to the manufacturer, was capable of missile-tracking applications,
and the $300,000 high-pressure furnace systems also for the
Soviet Union. These are only some of the items Maluta had on
order for export. There were considerable quantities of addi-
tional sophisticated equipment that Maluta was in the process of
ordering for Bruchhausen's firms when the network was uncovered.
The investigation and prosecution closed down a highly successful
and established procurement system.
I am convinced that Soviet Bloc efforts to obtain U.S.-origin
state-of-the-art technology are relentless and very much alive.
This is a critical challenge facing our country and its allies
today, and this is a challenge we must meet with resources and
resolve.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
533
"CONTROL OF TECHNOLOGY TRANSFERS ,
TO THE SOVIET UNION"
TESTIMONY
OF
THE HONORABLE
JAMES L. BUCKLEY
UNDER SECRETARY FOR SECURITY ASSISTANCE,
SCIENCE AND TECHNOLOGY
BEFORE THE
SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATION
OF THE
COMMITTEE ON GOVERNMENTAL AFFAIRS
MAY 6, 1982
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
534
MR. CHAIRMAN AND MEMBERS OF THE COMMITTEE,,
I AM DELIGHTED AT THIS OPPORTUNITY TO RESPOND TO
YOUR INVITATION TO TESTIFY ON THE ROLE OF THE STATE
DEPARTMENT IN CONTROLLING OF THE TRANSFER OF MILITARILY
CRITICAL TECHNOLOGY TO THE SOVIET UNION AND THE
EASTERN BLOC. WHATEVER THE RECORD OF PRIOR ADMINISTRATIONS,
REPUBLICAN AS WELL AS DEMOCRATIC, IT IS CLEAR THAT
THIS ADMINISTRATION HAS PLACED A VERY HIGH PRIORITY
ON IMPROVING THE EFFECTIVENESS OF THE EXECUTIVE
BRANCH IN ENFORCING EXPORT CONTROLS. IT HAS LAUNCHED
IMPORTANT INITIATIVES WHICH WE BELIEVE WILL GREATLY
IMPROVE THEIR OVERALL EFFECTIVENESS WHILE SHARPENING
THE FOCUS ON THOSE ELEMENTS OF ADVANCED TECHNOLOGY
AND PROCESS KNOW-HOW WHICH ARE OF THE MOST CRITICAL
IMPORTANCE TO THE SOVIET BLOC. WE FREELY ACKNOWLEDGE
THAT MUCH MORE NEEDS TO BE DONE; AND WE ARE ACTIVELY
WORKING WITH OTHER AGENCIES TO IMPROVE COORDINATION
OVER A RANGE OF ISSUES. IT WILL TAKE TIME, HOWEVER,
FOR ALL THESE EFFORTS TO TAKE HOLD IN PARTICULAR
AREAS, ESPECIALLY BECAUSE OF THE LARGE AMOUNT OF NEW
DATA THAT HAS HAD TO BE GATHERED BY VARIOUS AGENCIES,
AND THE ANALYTICAL WORK THAT HAS TO BE DONE.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
535
IN YOUR LETTER INVITING ME TO TESTIFY, YOU ASKED
THE STATE DEPARTMENT TO RESPOND TO SIX SPECIFIC
QUESTIONS. I HAVE DONE SO IN THE ATTACHMENT TO MY
PREPARED STATEMENT, WHICH I WOULD APPRECIATE YOUR
INCLUDING IN THE PROCEEDINGS.
NATIONAL SECURITY EXPORT CONTROLS ARE A BASIC
ELEMENT IN OVERALL U.S. POLICY TOWARDS THE WARSAW
PACT COUNTRIES. TO PUT IT BLUNTLY, THESE CONTROLS
ARE A RECOGNITION OF THE FACT THAT THE GLOBAL
OBJECTIVES OF THE SOVIET BLOC ARE INNIMICAL TO OUR
OWN, AND THREATEN EVERY VALUE FOR WHICH OUR NATION
STANDS. THEREFORE, IT IS SIMPLY HARMFUL FOR US TO
PROVIDE THOSE NATIONS WITH WESTERN, MILITARILY USEFUL
TECHNOLOGIES, TO BE TURNED AGAINST US.
AS MOST OF THESE SENSITIVE TECHNOLOGIES ARE NOT
WITHIN THE SOLE CONTROL OF THE UNITED STATES, IT HAS
BEEN ESSENTIAL FROM THE OUTSET TO ACHIEVE AMONG THE
MAJOR WESTERN INDUSTRIALIZED POWERS FUNDAMENTAL
AGREEMENT AS TO WHAT TECHNOLOGIES ARE MILITARILY
CRITICAL AND HOW THEIR TRANSFER TO THE SOVIET BLOC
SHOULD BE CONTROLLED.
THE INSTRUMENT THAT HAS BEEN DEVELOPED FOR THIS
PURPOSE IS THE COORDINATING COMMITTEE FOR MULTI-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
536
LATERAL EXPORT CONTROLS, OR "COCOM" TO WHICH JAPAN
AND ALL NATO COUNTRIES, WITH THE EXCEPTION OF ICELAND,
BELONG. COCOM WAS CREATED IN 1949 BY INFORMAL AGREE-
MENT AMONG ITS MEMBERS, AND HAS THUS BEEN IN EXISTENCE
FOR MORE THAN THREE DECADES.
COCOM HAS THREE MAJOR FUNCTIONS:
-- THE FIRST IS THE ESTABLISHMENT AND UPDATING OF
LISTS OF EMBARGOED PRODUCTS AND TECHNOLOGIES. ALTHOUGH
COCOM LISTS ARE NOT PUBLISHED, THEY BECOME THE BASIS
FOR THE NATIONAL CONTROL LISTS ADMINISTERED BY EACH
MEMBER GOVERNMENT. THE MEMBER GOVERNMENTS ARE NOW
PREPARING FOR A MAJOR REVIEW OF THESE EMBARGO LISTS,
WHICH WILL BEGIN IN OCTOBER.
-- SECONDLY,. COCOM ACTS AS THE CLEARING HOUSE FOR
REQUESTS SUBMITTED BY THE MEMBER GOVERNMENTS TO SHIP
SPECIFIC ITEMS TO SPECIFIED END-USERS IN THE PROSCRIBED
COUNTRIES. (THE COCOM-PROSCRIBED COUNTRIES ARE THE
SOVIET UNION, THE OTHER WARSAW PACT COUNTRIES, CHINA,
AND THE OTHER COMMUNIST COUNTRIES IN ASIA).
-- THIRDLY, COCOM SERVES AS A MEANS OF COORDINATING
THE ADMINISTRATION AND ENFORCEMENT ACTIVITIES OF THE
MEMBER GOVERNMENTS.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
537
THE COCOM LISTS SET UP FAIRLY SPECIFIC LIMITS ON
THE TECHNICAL CHARACTERISTICS ABOVE WHICH MEMBER
GOVERNMENTS AGREE THAT THEY WILL PROHIBIT EXPORTS TO
PROSCRIBED COUNTRIES, UNLESS COCOM ITSELF APPROVES
EXCEPTIONS.
IN AGREEING TO A NATIONAL REQUEST TO EXPORT
ITEMS ON ONE OF THE CONTROL,LISTS, COCOM WORKS ON THE
PRINCIPLE OF UNANIMITY. NO APPLICATION, IN SHORT, IS
APPROVED IF ANY MEMBER STATE OBJECTS. ONE OF THE
EVOLVED STRENGTHS OF COCOM IS THAT IN OVER 30 YEARS
OF OPERATION, THERE HAVE BEEN VERY FEW CASES IN WHICH
A GOVERNMENT HAS EXERCISED ITS SOVEREIGN RIGHT TO GO
AHEAD WITH EXPORTS OVER COCOM OBJECTIONS. THIS IS
ALL THE MORE REMARKABLE GIVEN THE ABSENCE OF ANY
TREATY OR EXECUTIVE AGREEMENT UNDERGIRDING THE
ORGANIZATION.
OVER THOSE DECADES, COCOM HAS GENERALLY BEEN
SUCCESSFUL IN INHIBITING THE OVERT FLOW OF STRATEGIC
TECHNOLOGY TO OUR ADVERSARIES. DURING THE 1970S,
HOWEVER, IN THE HONEYMOON DAYS OF DETENTE, THE U.S.
AND THE WEST RELAXED CONTROLS OVER A NUMBER OF
EMBARGOED COMMODITIES. IT WAS BELIEVED THAT WIDE-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
538
RANGING TRADE WOULD SOMEHOW ALTER THE INTERNATIONAL
BEHAVIOR OF THE SOVIETS AND MODERATE THEIR MILITARY
INVESTMENT. DURING THIS PERIOD, THE U.S. WENT FROM
BEING THE LEAST, TO THE MOST FREQUENT, SEEKER OF
EXCEPTIONS TO MULTILATERAL CONTROLS. COCOM ITSELF
CAME TO REFLECT SUCH ATTITUDES, AND EXCEPTIONS TO
THE EMBARGO WERE ALLOWED TO THRIVE. WE NOW KNOW
THIS WAS A MISTAKE. DURING THE PERIOD OF DETENTE,
THE WORLD STOOD WITNESS TO THE GREATEST MILITARY
BUILD-UP IN HISTORY, ALONG WITH THE INCREASED SOVIET
ADVENTupism THAT GREW OUT OF AN INCREASED SELF-
CONFIDENCE.
THE REAGAN ADMINISTRATION CAME TO POWER FIFTEEN
MONTHS AGO DETERMINED TO STEM THE FLOW OF THE TECHNOLOGY
THAT THE SOVIET UNION AND ITS WARSAW PACT ALLIES
WERE USING TO IMPROVE THEIR ALREADY VAST WAR-MAKING
CAPABILITIES. IT WAS CLEAR THAT THE WEST'S CRUCIAL
QUALITATIVE EDGE IN MILITARY SYSTEMS WAS BEING
UNDERMINED BY THE SOVIETS' INCREASINGLY AGGRESSIVE
EFFORTS TO BUY OR STEAL OUR MILITARILY-RELEVANT
TECHNOLOGIES AND EQUIPMENT.
MORE PRECISELY, WE SAW THIS WELL-ORCHESTRATED
ACQUISITION PROGRAM GIVING THE SOVIETS:
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
539
(1) A VERY SIGNIFICANT SAVINGS IN TIME AND
MONEY IN THEIR MILITARY RESEARCH AND
DEVELOPMENT PROGRAMS,
(2) RAPID MODERNIZATION OF THEIR DEFENSE
INDUSTRIAL INFRASTRUCTURE,
(3) THE OPPORTUNITY TO ACCELERATE THE CLOSING
OF GAPS BETWEEN OUR WEAPONS SYSTEMS AND
THEIRS, AND
(4) THE CHANCE TO DEVELOP, WITH ALARMING ,
SPEED, NEUTRALIZING COUNTER-MEASURES TO
OUR OWN TECHNOLOGICAL INNOVATIONS.
AS A CONSEQUENCE, THE ADMINISTRATION HAS
INITIATED EFFORTS TO FILL IN GAPS IN THE MULTILATERAL
EXPORT CONTROL SYSTEM. AT THE OTTAWA SUMMIT MEETING
LAST JULY, PRESIDENT REAGAN RAISED THE PROBLEM OF
WESTERN TECHNOLOGY TRANSFER TO THE SOVIET UNION. AN
AGREEMENT AT OTTAWA TO CONSULT ON THIS ISSUE CUL-
MINATED IN A HIGH LEVEL MEETING IN PARIS DURING
JANUARY, THE FIRST MINISTERIAL LEVEL COCOM MEETING
SINCE THE LATE 1450S. THE OTHER COCOM GOVERNMENTS
HAVE ASKED THAT THE RESULTS OF THAT MEETING BE KEPT
CONFIDENTIAL, AS INDEED ARE ALL COCOM PROCEEDINGS.
I CHAIRED THE U.S. DELEGATION TO THAT MEETING, HOWEVER,
95-929 0 - 82 - 35
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
540
AND I CAN SAY THAT THERE WAS A CONCRETE CONSENSUS THAT
THE MEMBER GOVERNMENTS SHOULD RENEW THEIR EFFORT TO
IMPROVE COCOM EFFECTIVENESS. WE HAVE BEEN ENCOURAGED
BY WHAT APPEARS A NEW, AND MORE CONSTRUCTIVE ATTITUDE
OF OTHER COCOM GOVERNMENTS, AND FEEL THAT THIS MEETING
FORMS A BASIS FOR A REVITALIZATION OF THE COCOM SYSTEM.
SUCH A REVITALIZATION WILL TAKE MUCH HARD WORK
AND IT WILL TAKE TIME, AMONG OTHER REASONS BECAUSE
COCOM DEPENDS ON THE NATIONAL ADMINISTRATION OF
CONTROLS BY 15 INDIVIDUAL GOVERNMENTS. BUT SOME
SPECIFIC STEPS ARE UNDERWAY. EFFECTIVENESS, FOR
EXAMPLE, REQUIRES PRECISE DEFINITIONS OF MANY COMPLEX
TECHNOLOGIES. WE HAVE MADE PROGRESS TOWARD AGREEMENT
ON A NUMBER OF SPECIFIC, TECHNICAL PROPOSALS IN THIS
AREA TO TIGHTEN THE EMBARGO.
SECOND, THE U.S. IS NOW WORKING ON PROPOSALS
THAT WILL EXPAND COCOM CONTROL LISTS INTO PREVIOUSLY-
UNCOVERED PRIORITY INDUSTRIES. THESE INCLUDE GAS
TURBINE ENGINES; LARGE FLOATING DRYDOCKS; CERTAIN
METALLURGICAL PROCESSES; ELECTRONIC GRADE SILICON;
PRINTED CIRCUIT BOARD TECHNOLOGY; SPACE LAUNCH
VEHICLES AND SPACECRAFT; ROBOTICS; CERAMIC MATERIALS
FOR ENGINES; CERTAIN ADVANCED COMPOSITES; AND COMMUNI-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
541
CATIONS SWITCHING AND COMPUTER HARDWARE AND SOFTWARE
TECHNOLOGY AND KNOW-HOW. THIS PROCESS WILL CONTINUE
INTO THE TRIENNIAL COCOM LIST REVIEW, WHICH WILL
TAKE PLACE THIS OCTOBER, WHEN A GENERAL REAPPRAISAL
OF EVERYTHING ON THE CONTROL LISTS WILL TAKE PLACE.
THIRD, WE HAVE DEVELOPED WORKABLE PROPOSALS FOR
HARMONIZING THE EXPORT LICENSING PROCEDURES OF THE
15 MEMBER STATES SO AS TO MAKE COCOM DECISION-
MAKING MORE EFFICIENT. WHAT WE ARE SEEKING ARE WAYS
TO BRING NATIONAL ENFORCEMENT PRACTICES TO A LEVEL
OF EQUAL EFFECTIVENESS. THESE TWO QUESTIONS WILL BE
ADDRESSED AT A SPECIAL COCOM MEETING WHICH WILL
CONVENE IN PARIS LATER THIS SPRING -- AND THE FACT
THAT ALL PARTNERS HAVE AGREED TO THAT SPECIAL MEETING
IS TESTAMENT TO OUR SHARED GOALS.
FOURTH, ILLEGAL DIVERSION ACTIVITIES ARE A
PROBLEM OVERSEAS AS WELL AS AT HOME. WE HAVE BEEN
COOPERATING WITH OUR COCOM ALLIES TO IMPROVE ENFORCE-
MENT AND INVESTIGATIVE CAPABILITIES IN THIS AREA.
THE STATE DEPARTMENT, WORKING CLOSELY WITH OUR
INTELLIGENCE AND INVESTIGATIVE AGENCIES, HAS BEEN
CHANNELING APPROPRIATE INFORMATION TO OTHER GOVERN-
MENTS TO ALERT THEM TO POTENTIALLY ILLEGAL ACTIVITIES
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
542
WITHIN THEIR BORDERS. WE HAVE ALSO ENCOURAGED THEM
TO INCREASE THE INVESTIGATIVE RESOURCES AND THE
SANCTIONS AVAILABLE FOR EXPORT CONTROL ENFORCEMENT.
COMMERCE, AND IN TURN CUSTOMS, HAVE DETAILED OFFICERS
TO STATE TO SUPPORT THIS OVERSEAS COMPLIANCE EFFORT.
COCOM HAS THUS, WE BELIEVE, MADE MEASURABLE
PROGRESS TOWARDS STRENGTHENING STRATEGIC EXPORT
CONTROLS SINCE THIS ADMINISTRATION CAME INTO OFFICE.
BUT IT IS ALSO CLEAR THAT THE CONTINUING REVITALI-
ZATION PROCESS WILL BE LONG AND HARD. IN ATTEMPTING
TO STRENGTHEN STRATEGIC EXPORT CONTROLS ON EXPORTS
TO THE SOVIET UNION AND THE OTHER WARSAW PACT
COUNTRIES, WE ARE FACED WITH THE PERENNIAL PROBLEM
OF SECURING AGREEMENT WITH ALL THE OTHER COCOM
ALLIES ON JUST WHERE TO ESTABLISH THE TECHNICAL CUT-
OFFS FOR COMMODITIES AND TECHNOLOGIES UNDER EMBARGO.
DETERMINING IN MANY SCORES OF DIFFERENT TECHNICAL
AREAS WHAT IS SUFFICIENTLY STRATEGIC TO WARRANT
CONTROL IS NOT AN EASY TASK. WE DO NOT ALWAYS AGREE
ON WHAT ARE MILITARILY CRITICAL TECHNOLOGIES, YET
THE PURPOSE OF THE ORGANIZATION IS LIMITED TO SUCH
TECHNOLOGIES. MEMBERS EXERCISE CONSIDERABLE CARE TO
AVOID CONTROLS WHOSE PRINCIPAL IMPACT WOULD BE
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
543
ECONOMIC RATHER THAN MILITARY, AND EACH HAS ITS OWN
VIEWS AND PERSPECTIVE. WESTERN EUROPEAN AND JAPANESE
ECONOMIES WOULD, GENERALLY SPEAKING, BE AFFECTED
MORE THAN THE U.S. ECONOMY BY SWEEPING CONTROLS ON
MANUFACTURED PRODUCTS. BUT SUCH DIFFERENCES BETWEEN
OURSELVES AND OUR COCOM ALLIES SHOULD NOT BE OVER-
EMPHASIZED. WE SHOULD REMEMBER THAT OUR ALLIES HAVE
COOPERATED WITH US FOR OVER THIRTY YEARS TO CONTROL
SIGNIFICANT AMOUNTS OF EQUIPMENT, MATERIAL AND
TECHNOLOGIES THROUGH COCOM. THAT IS, FIRST AND FORE-
MOST, BECAUSE WE SHARE A COMMON BELIEF THAT SUCH
CONTROLS CONSTITUTE AN IMPORTANT ELEMENT IN OUR
MUTUAL DEFENSE.
AS YOU KNOW, THE STATE DEPARTMENT IS ALSO
RESPONSIBLE FOR ADMINISTERING MUNITIONS EXPORT
CONTROLS WHICH COVER DEFENSE ARTICLES AND SERVICES.
MUNITIONS ARE NOT APPROVED FOR EXPORT TO WARSAW PACT
COUNTRIES. ACCORDINGLY, THE MAIN ISSUE IN ADMIN-
ISTERING THESE CONTROLS RELATES TO SECURITY CONCERNS
AND OUR FOREIGN RELATIONS WITH OTHER COUNTRIES.
YOUR LETTER OF INVITATION MENTIONS THAT, IN AN
EXECUTIVE BRANCH MORE EFFECTIVELY ORGANIZED TO SHAPE
AND ENFORCE EXPORT CONTROL POLICY, YOU ENVISAGE A
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
544
PRINCIPAL AND EXPANDED ROLE FOR THE DEPARTMENT OF
STATE. WE, TOO, ENVISAGE SUCH A ROLE FOR THE
DEPARTMENT.
UPON TAKING OFFICE, THIS ADMINISTRATION UNDER-
TOOK A FULL REVIEW OF OUR POLICY CONCERNING THE
TRANSFER OF STRATEGIC TECHNOLOGY TO THE SOVIET UNION
AND THE OTHER WARSAW PACT COUNTRIES. THE STATE
DEPARTMENT WAS A MAJOR PARTICIPANT IN THIS REVIEW,
WHICH CULMINATED IN THE COCOM HIGH LEVEL MEETING.
THE STATE DEPARTMENT LED OUR DELEGATION TO THAT
MEETING. SINCE THEN, ON A NUMBER OF OTHER OCCASIONS
SENIOR OFFICIALS AT STATE HAVE DISCUSSED WITH OUR
ALLIES SECURITY CONCERNS RELATED TO TECHNOLOGY
TRANSFERS. WE ARE PERSUADED THAT IMPROVED ALLIED
COOPERATION ON SENSITIVE TECHNOLOGY TRANSFER ISSUES
IS A REALISTIC OBJECTIVE. tHERE WILL, OF COURSE,
CONTINUE TO BE SOME DIFFERENCES ON THE DETAILS OF
CONTROLS AND THEIR APPLICATION TO INDIVIDUAL CASES.
BUT, WITH HARD WORK TO IDENTIFY CLEARLY AND TO
JUSTIFY PERSUASIVELY WHAT NEEDS TO BE CONTROLLED AND
HOW CONTROLS SHOULD BE ENFORCED AND ADMINISTERED,
SUCH DIFFERENCES, WE BELIEVE, WILL BE THE EXCEPTION
RATHER THAN THE RULE.
* * *
* * ?
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
545
1. Q: We believe there may be a need for legislation to
define certain kinds of dual-user technology as
being of national security significance. This is
a very difficult question. The Department's general
response would be valuable.
A: The Department believes that it is not feasible to
define in legislation what dual-use technology is
of national security significance. To be effective,
controls must be technically precise. This not
only requires detailed lists, too lengthy for legis-
lation, but'also continuing review to take into
account new technologies which are emerging more
frequently and more rapidly than can feasibly be
accomplished by the process of amending legislation.
Consultation, in a case like this, can of course meet
needs not readily solved by legislation. The
Export Administration Act now contains broad authority
to control exports for security reasons, and specific
guidance on the need to control militarily critical
technologies. There may be a few refinements which
would improve this legislation. However, we believe
that the general approach of the Export Administration
Act of 1979 is sound. The review of technologies to
determine what is militarily critical is difficult
and time-consuming. However, we have benefitted greatly
from the work done to date. One important indication
of this benefit is that we are much farther advanced in
our preparation for the 1982/1983 COCOM List Review than
we were at comparable periods in preparing for previous
List Reviews.
2. Q: The Department's experience in enforcing the Arms
Export Control act is of special interest to the Sub-
committee. We would find very useful an assessment
from the Department of its working relationship with
the U.S. Customs Service, which handles the investi-
gative function for the AECA. We would look forward
to the Department's views on the problems caused
by the separation of the licensing role from the
investigative responsibility.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
546
A: The International Traffic in Arms Regulations (22 CFR)
121-128 and 130) promulgated by the Department under the
authority of the Arms Export Control act require the
persons intending to export defense articles and defense
services from the United States obtain a license from
the Department authorizing the exports. When a license
has been granted, it must be filed with the U.S. Customs
Service prior to the actual export. Additionally, a
Shipper's Export Declaration must be filed with, and
be authenticated by, the U.S. Customs Service. Customs
is therefore in a position to review exports of defense
articles or defense services for conformity with the
statute and regulations.
The U.S. Customs Service has a longstanding and well-
established presence at the ports of the United States.
The Service is so organied that the performance of the
function fits in with its other responsibilities at the
ports. The alternative would appear to be the estab-
lishment of a second organization at the ports solely
for the purpose of processing the export of defense
services. In our judgment, this would be r(,dundant,
extravagant and wasteful.
The working relationship between the Department's
Office of Munitions Control and the U.S. Customs
Service's Office of Investigation is excellent. The
Department refers to Customs those cases in which there
is reason to believe that a willful violation of the
statute and regulations may have occurred. Customs
informs the Department of instances that come to its
attention. On a continuing basis the offices exchange
information relating to investigations. Customs
regularly provides to the Department reports of investi-
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
547
gations on significant cases. Both offices make a
concerted effort to ensure that the special agents
assigned to investigate alleged violations are know-
ledgeable as to the statute and regulations, and are
furnished such assistance as may be needed. The
exchange of views by personnel of the two offices is
informal and candid. Customs is apprised of the
foreign policy and security interests that may bear upon
an investigation In turn, Customs alerts the Depart-
ment to any investigation that may involve such interests,
and seeks guidance as to a course of action that might
be taken.
With some 600 special agents assigned to fifty-eight
U.S. ports, Customs can react quickly to a request
for an investigation. The particular expertise of
special agents and inspectors, with regard to the
movement of goods through ports, results in avenues
of inquiry being explored that might not otherwise
be looked into. The relationship, through the Customs
Cooperation Council, of the U.S. Customs Service with
the customs servicesof eighty-seven other nations
enables it to obtain information expeditiously which
might otherwise take some time to obtain, or which
might not be made available. Because of the close
working relationship between the Department and Customs,
any problems that arise are settled in an atmosphere
of understanding as to each other's concerns.
In a separate but related activity, Customs participates
actively in the inter-agency committee advising State
on approaches to other governments on dual-use exports
and has detailed an officer to work on a full-time
basis with the office in State charged with this respon-
sibility.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
548
Finally, our experiences suggest that 'the advan-
tages of separation of the licensing role, from the
investigative responsibility, outweigh problems that
may arise in the coordination of the two operations.
Customs, not being involved in the licensing process,
approaches a question of violation from a different
3. 0. The Department's views would he sought on the efficiency
of the executive branch in enforcing the Export Adminis-
tration Act. We would find especially valuable the
Department's comments on the possible need to improve
coordination and communication between the intelligence
community and investigative agencies charged with making
inauirv into export control violations regarding dual-use
technology.
A. There have been major exports to the USSR and other Warsaw
Pact countries of items nominally subject to control by
the United States and other COCOM member countries.
Therefore, improvement of enforcement is a high priority.
Specifically, we recognize the need to improve coordination
and communication between the intelligence community and
investigative agencies. Substantial progress has
already been made. An informal inter-agency group chaired by
the Department of Justice has brought the investigative
and intelligence communities closer together. The
intelligence community, Commerce and the Customs service,
have reorganized to give a higher priority to this work.
The State-chaired Working Group II of the Economic
Defense Advisory Committee, charged with international
enforcement activity, has increased its activities
markedly and has methodically sorted out vast amounts of
intelligence and taken remedial action where the informa-
tion available to us warranted such action. The Adminis-
tration has been active in alerting other governments to
possible illegal activities within their borders and in
establishing cooperation between U.S. intelligence and
investigative agencies and counterpart agencies in other
countries. Economic Defense officers stationed in our
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
549
Fmbassies overseas provide useful leads and other informa-
tion on diversion activities and consult with outher
governments freouently and in depth. The COCOM Subcommittee
or Fxport Controls has also been active in developing
improved means of international coordation of enforcement.
We are preparing for a meeting of this Subcommittee later
this spring which will consider a number of proposals to
improve coopration on export control enforcement and
better protect sensitive items in transit.
4. Q: Please provide the Subcommittee with the specific
steps the Department is taking to improve the
efficiency of the executive branch in defining and
then executing export control policy.
A. Our export control policy is reflected by what is
actually controlled, how these controls are administered,
and what can actually be licensed for shipment. We are
taking the following steps to improve the efficiency
of the executive branch in these areas:
a) State is working closely with interagency Technical
Task Groups which have been established to define
specific items of strategic concern. These groups
are developing technical proposals and justifications
for revising the COCOM lists. They are identifying
items which should be considered for addition to
the lists and items now on the list which need to
be clarified or which may no longer be of strategic
concern.
b) State is expediting the U.S. review of COCOM cases
and its own agency consideration of domestic export
license applications submitted either to Commerce
(dual-use items) or to the Office of Munitions
Control (munitions items). State's role includes
efforts to insure that case decisions are consistent
with policy and are equitably applied by researching
precedents and other data available from earlier
COCOM list reviews, from cases, from industry, and
from intelligence agencies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
550
C) State is leading negotiations with our allies to
strengthen the enforcement of multilaterally
agreed contrcds and to harmonize licensing pro-
cedures, including the development of standards
for the consideration of license applications in
COCOM member countries.
5 Q: Preliminary inquiry has revealed that COCOM nations
have not always made export controls a high priority
with reference to technology transfers to the Soviet
Union and Eastern Bloc. We would want to know the
Department's assessment of that preliminary finding.
Moreover, we would want to know if the Department
believes the goal of achieving full-scale cooperation
from COCOM is a realistic objective for this
nation's foreign policy.
A: Cooperation from COCOM is a realistic objective, as
evidenced by the continuing effectiveness of the
organization for more than 30 years. We are doing
all we can to further the objective of "full scale"
cooperation.
Of course, "full scale" cooperation is unrealistic
if, by that expression, is meant Allied acceptance of
whatever the U.S. proposes. Indeed the very concept
of cooperation involves a willingness to listen to
what the other party can constructively contribute
to solving the problem. However, there has been a
good track record of COCOM acceptance of those U.S.
proposals which have been technically precise and well
justified in terms of military criticality and Soviet
deficiencies, and there are also many useful proposals
from other COCOM members to strengthen and/or clarify
controls.
Other COCOM members have not devoted as much resources
as we believe necessary to the enforcement of controls.
We are stressing to them the need to increase their
resources as we are doing. As a result, their aware-
ness of the need to improve enforcement has definitely
increased.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
551
6. Q: A preliminary finding in the inquiry is that the U.S.
Customs Service could be more effective in investi-
gations of export control violations if it had more
agents assigned to U.S. missions in certain countries
with high technology industries. What is the Depart-
ment's general response to the preliminary finding?
A: The Department of State agreed that Customs would be
more effective in investigations of export control
violat'ons if it had more agents assigned to U.S.
missions in certain countries with high technology
industries. State is now reviewing Customs Service
request for'such additional overseas slots. The ultimate
decision will rest with the Chief of Missions overseas.
There is, of course, a continuing need for close
coordination of U.S. Government activity overseas,
under the leadership of the Ambassador. Moreover, there
are frequently extremely sensitive political and legal
aspects in the conduct of overseas investigations
occasioned by host government insistence on juris-
dictional rights which need to be addressed by
other elements of our overseas missions. But the
degree of Allied consensus on the need to strengthen
enforcement of COCOM Controls in combination with
the professionalism of the Customs Service leads us
to believe that mutually satisfactory arrangements
will be possible in the future as they have been
in the past.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
552
PREPARED STATEMENT OF MICHAEL LORENZO
STATEMENT ON ROLE AND RESPONSIBILITIES OF DEFENSE
RESEARCH AND ENGINEERING IN EXPORT CONTROL
Mr Chairman:
Thank you for the opportunity to testify before the U.S.
Senate Permanent Subcommittee on Investigations.
Dr. Frank Napper, Director of Military Technology Sharing
and Dr. Oles Lomacky, Director of the Office of Technology
Trade are also here to support this testimony.
This statement deals primarily with the technical policy
and assessment aspects of technology transfer functions as they
pertain to West-East strategic trade (Dual Use Technology).
This statement on East-West trade is divided into three
parts; Defense roles and responsibilities, Defense accomplish-
ments and Defense concerns as related to export control.
Roles and Responsibilities:
In accordance with current Department of Defense
Directives, the Under Secretary of Defense for Research and
Engineering is the principal advisor to the Secretary of
Defense on all technological and scientific matters, including
the formation of policy thereto. Within Research and
Engineering, International Programs and Technology (IP&T) is
charged with a variety of specific technology related duties.
In addition to its international program responsibilities,
which in themselves involve a number of technology transfer
issues, IP&T is alse responsible for development and main-
tenance of the Militarily Critical Technologies List which is
so necessary for the important function of performing technical
assessments, reviewing control lists (CoCom, CCL) as well as
providing overall technical policy direction for the Department
of Defense. One of my first requirements as an incumbent in
office since I October 1981 was to distinguish between techni-
policy and international security policy in order to clearly
delineate responsibilities between IP&T and its counterpart in
the Office of the Under Secretary for Policy.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
553
Technical policy is that which is pertinent to the opera-
tional, technical and acquisitional aspects of technology
transfers (T/T), including Foreign Military Sales (FMS), muni-
tions, and dual-use export control cases, critical technologies
identification, U.S. and Coordinating Committee (COCOM1)
embargo list reviews international programs and related activ-
ities, Committee on Exchanges (COMEX) activities and NATO
technical matters, such as Data Exchange Agreements (DEAs), and
Memoranda of Understanding (MOUs). International security
policy is the responsibility of the Office of the Under
Secretary for Policy. The Policy Office responsibility is per-
tinent to the broader considerations of international security,
political and economic aspects of export control, which tie
national policy with military interests with respect to
countries and/or regions. In these efforts the Services, other
Defense Agencies and the Intelligence community support both
the OUSDRE and Policy offices in threin primary roles.
Notwithstanding the delineation of responsibilities, the
primary goal of Defense is national security which includes
prohibiting the export or acquisition of critical equipment and
technology by potential adversaries that could add "signifi-
cantly" to their military capabilities. This includes all
transfer mechanisms both legal and illegal whether the acquisi-
tion is from the United States or involves a direct sale or
reexport from other countries. In order to achieve this,
Defense has established goals with respect to the improvement
of source documentation (MCTL2, data base, etc.), control lists
(COCOM, CCL3, etc.) and case processing (timeliness, con-
sistency, substance, etc.).
1COCOM (Coordinating Committee) - A voluntary organization con-
sisting of thc, NATO Countries less Iceland plus Japan that
controls dual use export to the East bloc of countri,s.
2MCTL - Military Critical Technology List as required by the
Export Administration Act of 1979.
3CCL - Commodity Control List under cognizance of the
Department of Commerce.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
554
Pursuing these goals has resulted in major workload
increases in the last year, particularly with the focus on
export controls by this Administration. Both the State and
Commerce Departments have increased the level of activity in
compliance matters, thereby necessitating more technological
inputs and other help from Defense. As an ancillary require-
ment, it is important for Defense to support Customs' officials
to aid in identifying equipment being exported to ascertain
whether a validated license is required. According to the
Export Administration Annual Report for Fiscal Year 1981,
Customs detained 628 questionable shipments of which 160 were
attempted illegal exports. By training customs officials and
providing some basic guidelines on how to recognize or identify
high technology items that are subject to national security
controls, Defense hopes to raise the batting average of customs
in detaining illegal shipments. It is important to our
national security interests that violations of our export
controls are quickly identified and properly detained. It is
equally important from an economic standpoint that legitimate
exports are not unnecessarily detained. In establishing our
technology transfer policy, we are mindful of the fact that we
work in a free trade system and open society that is a fun-
damental source of our greatness. It is also recognized that a
strong and viable economy is necessary to develop and maintain
a strong defense.
Accomplishments
A number of corrective steps have been taken to enhance our
performance in these areas. The staff was increased for
license application reviews, trained in efficient application
of the necessary technical skills to the review process, and
management procedures were instituted for orderly and thorough
application processing. All agreements with the Department of
Commerce have been reviewed, including Delegations of Authority
and procedural agreements. An interface has been structured
with the Services in seeking their technical and military
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
555
expertise, and an excellent relationship exists with the
Defense Intelligence and National Security Agencies leading to
their active participation in license application review. As a
result of these actions, the old backlog of applications
awaiting review has been eliminated in recent months completely
adhering to the time limits imposed by the Export Administra-
tion Act of 1979. We are holding no applications for more than
60 days, and currently are processing only 44 applications for
a period of more than 30 days. Coincidentally, industry mem-
bers are now beginning to appreciate that many of the licensing
delays which they have experienced had been unfairly laid at
the door of Defense.
. The involvement by the Intelligence Community has increased
now to processing over 100 cases a month compared with the pre-
vious figure of 25 per year and their increased efforts have
aided the Defense effort immeasurably.
Defense has achieved consistency and efficiency in pro-
cessing applications. This was done by pursuing an approach,
not only in license processing, but in the many other efforts,
which stress the control of technology. This is best exempli-
fied by the work on the Militarily Critical Technologies List
(MCTL).
As you know, the MCTL was generated in response to the
Export Administration Act of 1979, and the first version was
published in October of 1980. We set about refining the list,
adding some items and rejecting others. The generation of the
list and its refinement represented a large, cooperative under-
taking among our technical people, technical specialists from
the Services, Services laboratories, other government agencies
and industry. The first major opportunity to implement the
MCTL was to improve the multilateral controls on export control
to the Warsaw Pact in the COCOM List Review preparations that
began with the formation of Technical Task Groups (TTG's) last
fall. The government is now in the midst of reviewing the
CoCom list and finalizing U.S. proposals for negotiations sche-
95-929 0 - 82 - 36
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
556
duled next October in Paris, the headquarters of COCOM.
Defense participation in the List review has concentrated on
ensuring that the U.S. government proposals for COCOM con-
sideration include all the Militarily Critical Technologies as
well as removing products from control where possible so that
we and our Allies will be acting in concert in controlling only
what is important. The U.S. is working more closely with the
COCOM nations although potential for real problems exist as we
move to close the rather wide gaps in coverage of flown of cri-
tical technologies and goods to the Warsaw Pact.
The MCTL has provided an important mechanism for cementing
our relations with industry and for exposing our concerns and
the mechanics of our operations. The results have been most
rewarding. An association of industry associations, the
Multi-Association Policy Advisory Group (MAPAG), has been
working with us on these issues, and approximately 80 companies
are currently reviewing the 1981 revision of the MCTL.
Defense continues to examine the Export Administration
Regulations to see if there are constructive suggestions we
might make to improve their effectiveness. It was determined
that Section 379, Technical Data, was indeed the major sieve
through which our technology had been leaking. This section
was deemed both arcane and ineffective. As a result, we called
upon the MCTL once more and extracted from it the lists of
"arrays of know-how" developed in the famous Defense Science
Board Bucy Report. A proposed revision of Section 379 has been
drafted, based on these arrays of know-how and is currently
being coordinated throughout the Department of Defense. In due
course, it will be submitted to Commerce for their considera-
tion, and to industry for review and comments.
Excellent progress has been made in the development of our
data base. Our approach has been to develop a system which,
though simple at first, is always useful as it grows since it
is formatted to fit the future automated DOD Management
Information System known as FORDTIS (Foreign Disclosure and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
557
Technical Information System). It started as a modest system
on word processors which provided the data for our monthly
reports. It has since been expanded and moved to a greater
computer capability. The next step is to integrate our system
into FORDTIS which will be the primary DOD management tool to
be shared by other agencies for tracking all high technology
exports. Into this data base we have entered a large number of
cases from 1980 and 1981 as well as the present ones to afford
consistent guidelines of a scientific analytic predictive
nature. Also included in FORDTIS is the MCTL data base. The
MCTL together with a keyword in context index and an index to
the Commodity Control List (CCL) are already included. Defense
now has an effort underway to revise, update, and reformat the
10,000 pages of supporting documentation for all items on the
MCTL so that all of this information may be available to
FORDTIS users. The management improvements available from
better use of this vast store of concentrated information are
expected to be considerable. This data base will greatly sup-
port control lists, COMEX and other case reviews as well as
policy activities.
As a related activity, significant efforts to collect a
volume of information on foreign availability of critical tech-
nologies and related keystone equipments are underway. The
intelligence community and the industry establishments have
been requested to thoroughly assess foreign availability and
adversary capabilities on each and every item in the MCTL.
Although the Department of Commerce is the focal point for such
information per the Export Administration Act, the Department
of Defense believes that, by definition, the assessment of
foreign availability (in similar quality and quantity) requires
primarily technical and intelligence capabilities. We will of
course provide such information to the Department of Commerce
as the primary repository.
In summary, Defense has made major strides in stressing
technology control, such as the MCTL development and applica-
tion. It also developed a cooperative relationship with
industry and brought efficiency and effectiveness to our review
of license applications.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
558
Concerns
Currently there is not sufficient specificity with respect
to Country/Regional guidelines to enable a case processor to
differentiate between various countries and/or regions. This
is not too much of a problem from a technological standpoint if
one is dealing with the countries of Eastern Europe because
technologically all the Bloc countries should be treated essen-
tially the same. The only advantage would occur in handling
borderline cases. However, lack of specificity is a major con-
cern in viewing exports to the free world. Defense is working
with State and Commerce to improve the situation. Under the
Export Administration Act of 1979, Defense has the authority to
review and object to proposed sales to free world countries
provided the equipment is controlled for national security.
For the purposes of clarifying this point, an example is the
sale of production equipment and know-how for the manufacture
of state-of-the-art integrated circuits, an area in which the
United States is a leading supplier in the world today. If
sales of this equipment are not carefully controlled and spe-
cial negotiations completed with the governments of the reci-
pient companies, the thrust of our control efforts within COCOM
may be readily undermined by the ensuing foreign availability
sources created by such sales. This is a very complex issue
which has significant National as well as International over-
tones. The true scope of this problem is not fully known at
this time, but Defense will have to become more directly.
involved.
Our national security interests are not truly represented
when we group all our NATO Allies, Japan, Australia, and New
Zealand into the same Country Group for export purposes as
Neutrals and Third World Countries. Commerce has proposed a
change to this Country Group structure to which Defense has
heartily concurred. In the interim, it is incumbent on Defense
to establish more specific strategic and technical policy
guidelines with respect to the Neutrals and Third World
Countries, based on the integration of our political, economic
and military interests. Exports to those countries that are
not supportive of U.S. policies or to which intelligence advi-
ses us to be wary, may appropriately require Defense review.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
559
The Soviet Union has made a concerted effort to exploit
scientific exchanges and all technical information available in
order to enhance their military posture. The extent of the
problem has caused Defense to review its own procedures of
controlling unclassified technical data. The Services and
other Defense Agencies have established procedures to limit the
unstructured release of technical papers from their labora-
tories and research centers. Other representatives from
Defense who are scheduled to testify before this Committee will
more appropriately address this subject. In an open society
such as ours, the opportunity for a potential enemy to collect
meaningful information is extensive. However, the diffusion of
technology and information to all sectors of our society, par-
ticularly academia and the small R&D firms, is one of the U.S.
cornerstones to solve Defense's technological problems and to
Maintain our technological lead. Different sectors must talk
to each other and exchange data to lead to innovation and tech-
nological advancement. This is a strength of our society com-
pared to the closed society of the USSR. Defense relates its
technology transfer concerns to small industry and academia
which generates much of our new technologies. The Soviets know
this and will exploit these segments of our technology base if
we don't communicate better and more directly with them.
A significant cross-section of highly skilled executives,
technicians and scientists from Industry, Academia and
Government has been trained in the fundamentals of export
control through participation in the development of the MCTL
and our COCOM proposals. These personnel constitute a major
resource for license application review. It is equally impor-
tant to keep them current with respect to the status of export
control issues. This would have an ancillary benefit by pro-
viding an expeditious channel for identifying emerging tech-
nologies for consideration of possible control. In order for
the Defense facilities to support export control on a con-
tinuing basis, it is necessary to identify a centralized
program element in the Defense budget for this purpose. The
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
560
Services have been requested to do theirs starting in POM-84.
These specific actions are necessary management improvements
within the context of improving and simplifying our directions
to the Services and Defense Agencies to better support us in
technology policy development and technology assessments for
improved export control for national security purposes. This
will help close the loop in the control of technology transfer
within Defense.
There are other areas which require Defense's attention.
These include more active participation in the various commit-
tees chaired by either State or Commerce, such as the Committee
on Exchanges (COMEX), Working Group 2 on compliance issues and
the Technical Advisory Committees. An increase in permanent
staff would obviously overcome this problem.
In closing, I an certain that Administrative policy
regarding improved controls on technology transfer to the
Warsaw Pact is clear. As a result of. our dedicated effort to
implement that policy, Defense has achieved significant suc-
cesses and incurred significant problems. To follow-up and
maximize the value of our present successes, we need to improve
upon our resources in all technical and intelligence sectors of
Defense. There is a need to improve the direction and man-
agement control of these resources via new DOD Directives and
Program Elements. Attempts are being made to communicate more
effectively with industry and academia. And, finally, Defense
needs to improve multilateral controls in concert with our
Allies and other parties having mutual interests. These areas
represent major challenges and opportunities for us in the
coming months and years. Thank you, Mr, Chairman.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
561
MICHAEL LORENZO
Michael Lorenzo, P.R., was appointed as the Deputy Under Secretary
of Defense (International Programs and Technology) in the Office of the
Under Secretary of Defense for Research and Engineering (OUSDR&E) on
October 1, 1981. He is responsible for technology transfer issues and
for all international activities in Defense research, development, and
acquisition, serving as the focal point for international cooperative
R&D efforts related to defense and for the management of activities
involving export control, munitions cases, and equipment transfer to
foreign nations.
Prior to this appointment, he served in a variety of application
engineering and managerial positions at the Defense and Electronic
Systems Center and Civil Systems Division of the Westinghouse Electric
Corporation for sixteen years. At Westinghouse, his responsibilities
included Manager of Military Planning for Defense, Oceanographic and
Space activities; Manager, Air Resources of Westinghouse Management
Services, Inc.; Director, Westinghouse Environmental Quality Control
and DOD Marketing Specialist. Mr. Lorenzo joined Westinghouse following
a distinguished thirteen-year Civil Service career with the USM and USAF
where he served in mechanical, aeronautical and aerospace positions
including PEM of the USAF Manned Orbiting Laboratory Program during its
initiation in 1964. Throughout this period, management and executive
functions included work with and for the U.S. intelligence communities
with respect to the collection, processing and production of information
with additional responsibilities to provide guidance to Westinghouse
and Department of Defense organizations while serving on active status
as a reserve Rear Admiral. He directed and managed efforts in planning,
programming, budgeting, systems analysis, operations research, financial
investment and analysis, conceptual engineering, systems development,
political assessments and human sensitivity evaluations in the markets
of Defense, Intelligence, Environmental Quality and-Civil Systems.
Other experiences included three years with the Fischer and Porter
Company as a field industrial instrumentation engineer, association with
the Stanford Research Institute as a consultant developing models for
simulation of 0E0 programs, and airline pilot with TWA.
In addition to his industrial and governmental experience,
Mr. Lorenzo also had a distinguished military career which included
over 140 combat sorties flown as 'a naval aviator in combat zones during
WWII and the Korean conflict. During this time, he was the recipient
of sixteen military decorations including the Distinguished Service
Medal, two Distinguished Flying Crosses, and seven Air Medals, and the
Air Force Commendation Medal retiring from the Active Reserves as a
Rear Admiral (upper half) in 1973. Admiral Lorenzo started his military
career as a member of the Army Corps of Engineers transferring to the
Navy as a seaman 2/C immediately after the Pearl Harbor attack. He
received the earliest possible accelerated promotions to the maximum
attainable ranks permitted by law for reservists.
A Registered Professional Engineer in the District of Columbia
and the State of Maryland, Mr. Lorenzo holds three Civil Service
engineering ratings and is the author of approximately 70 publications
in aerospace and other technological areas including a book and a
patent. He is a member of the National Society of Professional
Engineers, American Society for Engineering Management, and an Associate
Fellow of the American Institute of Aeronautics and Astronautics.
Mr. Lorenzo graduated from Pennsylvania State University in 1947
with a B.S. in Chemistry and Physics. He received his MEA from George
Washington University in 1956 and later completed further graduate work
toward a Ph.D at GNU and the USDA Graduate School.
Mr. Lorenzo was born in 1920 in Newton, New Jersey. He and his
wife; the former Anastasia Hackett, have five children and three
grandchildren.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
562
MILITARY TECHNOLOGY TRANSFER
delivered to
American Society for Engineering Management
at
George Washington University
11 March 1982
by
MICHAEL LORENZO, P.E.
Deputy Under SecretarY of Defense
, Research and Engineering
-(International Programs and Technology)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
563
Fellow members of the American Society of Engineering
Management, it gives a warm feeling to be.invited back to my
Alma Mater. . This is the institutionof higher learning that
awarded me an MEA degree in accordance with the academic
demands of Dean Mason, Dr. Jack Walters, et al, befitting the
style of Kate Turabiam. This degree has been a great manage-
ment tool for me over the years, particularly in my present
assignment--the OUSDR&E International Programs & Technology
(IP&T) is responsible for all technology transfer functions
among the DoD to all nations and is a truly multi-discipled
set of functions.
Technology -.The International Language
? When the super beings, in my case the good Lord, created the
Earth, he endowed all peoples with creative and logical powers
in all ethnic groups barring none. At the same time, endowed
in everyone on the surface of this earth were the Physical
Scientific Laws of Nature.
As different groups evolved, some developed these Laws
more than others for the fundamental purposes of enhancing
and improving the quality of life, property and welfare. Free
societies like ours soon learned that we had to protect these
wonderful assets from others with some form of security such as
police and armed defense capabilities. While good peoples
developed the Laws of Nature for the good of society in general,
others used technology to capture or destroy the life, property
and welfare of others. Accordingly and unfortunately, some
forms of high technologies have to be controlled from the
use of potential adversaries. This is a very difficult thing
to do and short-lived at best.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
.564
For many centuries, engineers and scientists like you and
I who have done various forms of scientific research in
Universities, Industry and elsewhere were bonded by a Code of
Ethics to help our fellow beings by sharing our findings,
particularly in the fields of health and comfortable living.
This rapport and environment is essential to academia and
others to promote a healthy research environment and to promote
human understanding. As a result, the Physical Scientific Laws
of Nature are in reality an International Language.
In recent months, I have headed U.S. Defense Technological
country-to-country cooperation teams in several foreign
countries and experienced this phenomenon first hand. As a
guest of the Japanese Government and the Kyoto Ceramic Company
in the Cities of Kyoto and Kagoshima, we became involved with
the Japanese researchers concerning their ceramic gun barrel
and engine developments among other things. The interpreter
was needed for most conversations except during the two-way
discussions concerning the ceramic automobile engine, when
such subjects as Carnot's Laws of Thermodynamics, dynamometers,
torque, stoichiometric temperatures, etc were discussed.
Only scientists and engineers could ever experienee such an
event and understand each other Internationally! It is indeed
too bad that our lawyers, political scientists and politicians
cannot ever experience such a dialogue!
Incidentally, the ceramic hot parts, (pistons, piston
sleeves, piston head caps, turbo supercharger shaft and turbine
assemblies including blades) permit stoichiometric combustion
temperatures, hence an approximate 8 to 15 percent increase in
fuel efficiency is achievable in a diesel engine requiring no
water cooling system! After establishing this International
Technology rapport, the chief researcher levied with me saying
that they expected such an automobile engine to enter service
in.approximately I to 2 years and attain a 500,000 mile line.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
565
The management of Kyoto Ceramics (KYOCERA) paid a heart-warming_
compliment to me by connoting that I was now a member of this
International Language Team by awarding me a company work
uniform jacket with insignia. A recent article describing
Kyocera's products, organization and management appeared in
the February 18, 1982 issue of the New York Times Business
section. The Japanese are using ceramics widely making other
products like false teeth, semi-conductors (mostly packaging
for sophisticated silicon chips), ceramic cutting tools, pen
tips, solar cells, synthetic gem stones, artificial bones and
other biological implants.
Here we go again, the U.S. was the original leader of
robotics and ceramic engine parts research ten years ago, and
now lags behind Japan in its application! Why? There are a lot of
reasons, most of which I will leave for the Q's and A's to
follow. However, before leaving this subject, one must give
Japan credit for their progress principally due to one major
reason; namely, they have a great Government-to-Industry
relationship, not adversarial like ours which this Administration
is changing with time.
The bottom line of technology transfer is, "Yes, you can
control some critical technologies, but this is_ goOd. for the
most part only for a few_years because when one country has
demonstrated something, this generally provides enough motivation
for another country to pump in the resources and achieve a like type
- capability" -- nuclear energy is a classic example. However, we
can and must do two things; namely, keep our technological
R&D base strong with a healthy lead time and be smarter than
any potential adversary.
"DoD Technology Transfer 1981"
During CY 1981, IP&T processed almost 8,000 munitions cases
that were referred to us by the Department of State (DOS).
Another 23,000 cases were processed by the State Department
without'referral to DOD. These cases included such things as
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
566
exports of 12 gauge shotgun shells and .22 ammunition going
to a NATO nation for 'example. These exports of goods and
technologies are covered by a National Security Decision
Directive entitled, "Conventional Arms Transfer
Policy" signed on July 8, 1981 by the President, and the Arms
Export Control Act of 1976 (as amended). Most of these goods and
technologies go to our Allies and other friends .and are made
for the primary purpose of enhancing military capabilities of
mutual interest. We find this new Presidential Directive to be
an excellent policy, rather straightforward to implement and
effective in nature. The number of ITAR (International Traffic
in Arms Regulations) cases have been increasing at a rate of
25% per year and are becoming ever more complex in nature. This.
is a rapidly expanding market. Included in these technology
transfer (T/T) functions are Foreign Military Sales, dual-
development, co-production, Data Exchange Agreements and
selected sections of numerous Memoranda of Understanding.
"T/T Rejection Rates"
That's the good news--growing at a rate of 25% per year.
Now for the bad news, the rejection -rate was greater than 5%
in 1981 compared to less than 2% one year prior. Along with
the 1981 rejection rate of 5%, one must add that a lot of
cases were approved wil;.11 exceptions--some people call these
constraints, gates or fences. For example, we quite.
often approve an export license for an advanced turbo jet engine
to a foreign country while retaining all of the design, .
manufacturing and production of the hot sections,which have
to be purchased from us.
Needless to say, an unworthy "friend"
could reverse -engineer these hot sections but at a tremendous
expenditure of resources. The Munitions List contains
Military or Single-Use technologies.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
567
Many technologies are primarily developed for civilian
use but have military significance. These are called Dual-Use
technologies. Industries with these products seek license for
export from the Department of Commerce Commodity Control List,
which is screened for "significant" enhancement of the
military capabilities of a potential "adversary" as outlined
in the Export Administration Act of 1979. Of the approximate
86,000 cases received by the DoC in 1981,. 3,500 were referred
to DoD of which 1,500 were of .a. COCOM consideration. Here
again, many. "precedent" cases are delegated to Commerce by DOD
once the "performance thresholds" are established and all
parties agree to them, which is rather hard to achieve. The
acronym COCOM stands for Coordinating Committee which is a
voluntary organization established in the 1950's consisting
of the NATO nations less Iceland plus Japan. -COCOM convenes
in Paris for the primary purpose of controlling East-West
trade of Dual Use technologies. Computers and associated
products are the most prevalent products of the Dual Use
technology category that have military implications.
Some people -- consisting of politicians, lawyers and
political scientists for the most part -- have created the
buzz words "technology hemorrhaging" fcr the decade of the 1980's.
Such a dual use technology transfer case creating this image
is Kama River. We must regret the Kama River truck facility..
The U.S., France, Italy, UK, West Germany and Austria financed
and built the most modern and largest heavy truck facility in
the world. The general contractor was. Mack Truck Inc. of
the U.S. Assurances that these trucks would be for the civilian
sector were not kept; many of the heavy vehicles used in the
invasion of Afghanistan were manufactured at the Kama River
facility. Incidents such as these are not the norm, yet
they have happened; and we are insuring that our mistakes are
not repeated. The bid has been tightened considerably in this
area since, in 1981, we experienced a 15 percent rejection rate
compared to less than 2 percent a few years ago. However,
the number of Dual Use cases is growing 15-20 perdent Per year.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
568
In other words, 'PST processes a combination of 1,000
'T/T cases per month, plus approximately 3,000 MOU's/DEA
international programs per year, which makes it one of the
busiest shops in DoD. The International Programs Which have
a lot of T/T in them are very synergistic with the T/T cases
in general. It is interesting tO note that.over 90 percent of the
T/T case processing activity within DoD is technical assessment,
the other being Policy and Military considerations.
Sensitive technology.is not licensed for sale to potential
adversaries. To insure that such technology is not acquired
by unfriendly countries, MOD's concerning USG-approved security
procedures and re-export assurances are negotiated with all
friendly countries and apply to their companies that receive
sensitive U.S. technology.
Further assurances that sensitive technology is transferred
only to destinations that will not adverselyi 'affect U.S. national
security are gained through the National Disclosure Policy Committee
(NDPC) review process. The NDPC is chaired by DoD and includes
representatives from DOS, DoE, CIA, OJCS, and the military
departments. The purpose of the NDPC is to establish policy
-concerning the release of classified/sensitive military information
and systems to countries with which the U.S. has trading relations and
to consider requests for exceptions to that policy. The NDPC also
also participates in the decision making process on export license
applications involving the the release of classified information
when special concerns arise with respect to foreign
eligibility.
T/T Enforcement
Enforcement responsibility resides with DoC
government
Compliance
Division and Bureau of Customs; prosecution is handled through
Department of Justice. Currently efforts are underway to
improve export control enforcement through the Interagency
Working Group on Export Control Enforcement. The departments
and agencies participating are Justice, Treasury, Commerce,
State, CIA, FBI, Defense and the National Security Council.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
569
l.iultilaterali Ex,ort Control enforcement is also being
studied through the COCOM High Level Group (HLG) and the
NATO Technology Transfer Study Group. The COCOM HLG is
evaluating current COCOM controls on the nine defense priority
industries in an effort to strengthen those controls. The
NATO Technology Transfer Study Group has been established tO
involve the foreign MOD's in the export control arena and
possibly establish an overriding veto for the MOD's in third
party transfers. Recent analyses conducted by competent
authorities show that less than 25% of the adverse critical
technology leaks have gone through legal means which leads
us to the conclusion that the current regulations mechanism is
more effective than some people think. The efforts underway to
improve enforcement are focused on clandestine and illegal
acquisitions and should prove quite successful in reducing
undesirable T/T.
In closing, DOD will continue to stress as its primary
role in technology transfer;
1. Improving and maintaining the U.S. technology base
through adequate /IDEA resources;
2. Improved armament cooperation with our allies including
technology transfer; and
3. Control of transfer of military technologies and
dual-use technologies to potential adversaries.
You have been a wonderful audience; the podium will now
entertain questions.
Thank you.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
570 ?
STATEMENT OF
CHARLES P. LECHT
FORMER PRESIDENT
ADVANCED COMPUTER TECHNIQUES CORPORATION
NEW YORK, NEW YORK
BEFORE THE
U. S. SENATE PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
MAY 11, 1982
Mr. Chairman, Senators, my name is Charles Lecht. I am pleased to
appear here today to contribute to this Subcommittee's examination of the transfer
of American technology to Soviet Bloc nations. During the course of your staff's
investigation and these hearings, you have studied that problem, mindful of the
views and interests of government, the intelligence and defense communities, law
enforcement, and the public itself. Let me now focus your attention on the issue
from the viewpoint of that sector which, by all reports, is the target of these
Soviet efforts: America's high technology industries.
Until April 26, 1982 I was President and Chairman of the Board of
Advanced Computer Techniques Corp. (ACT), a computer software consulting firm
which I founded in 1962. Holding a Bachelor of Sciences degree in mathematics
from Seattle University and a Masters of Sciences degree in mathematics from
Purdue University, I have been actively involved in the computer field since 1951,
including the authorship of five books. My company has been in existence now for
some twenty years, regularly conducting business with foreign governments, U.S.
subsidiaries abroad, multi-national corporations, as well as the United States
government. ACT currently employs over 350 persons in both national and
international offices, with over fifty per cent of the company's income currently
derived from business abroad. We produce computer program software, synthetic
languages, and operating systems. On numerous occasions, we have been chosen as
subcontractor on U.S. government contracts. As but one example, ACT is
responsible for some of the software used in the production of the F-16 airplane.
My years of experience in the field reinforce what this Subcommittee has
already heard: the Soviets are engaged in a concentrated effort to seek out and
obtain the secrets of America's technology giants. From a personal standpoint, the
problem has "hit home" on several occasions during my years with ACT.
One of ACT's frequent sources of business and consulting contracts has
been the country of Yugoslavia. ACT has become one of the best known American
firms operating in that country. Consultant work is prohibited in Yugoslavia
except by consent of the government. ACT prospered there, under the auspices of
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
571
the necessary government approval. As a systems analyst, we provide advice on
what the Yugoslays should buy and at what prices so that they will not be easily
cheated on the American marketplace.
About seven years ago, I had been conducting some ACT business with
Honeywell's Yugoslavian sales agents. A Yugoslav Honeywell representative
invited me to lecture in Yugoslavia on the current state of computer technology.
At first blush, this was not an unusual request -- I had already given numerous
speeches in Yugoslavia, as well as in the United States and elsewhere. I understood
that the lecture was to be given to Yugoslays. I did not expect nor was I prepared
to address a select corps of the Russian military. Nevertheless, in my discussions
with the sales agent just prior to the speech, he told me, somewhat reluctantly, /
that more than a few representatives of the Soviet military had come "from all
over Russia" simply to attend my lecture. I responded by flatly refusing to give the 1/
speech. He was visibly upset, but I remained firm in my refusal.
Later that evening, I received a phone call in my Yugoslav hotel roon
from an individual who identified himself as a general in the Soviet military. He
told me that he made the trip to Yugoslavia solely for the purpose of hearing my
lecture. He urged me to reconsider my decision. Despite my refusal to do so, the
"General" persisted. Finally, he asked me, at the least, to meet him for a drink. I
had no desire to speak or drink with the Soviet military and politely declined his
invitation.
That incident occurred at least seven years ago. As of last fall, I had not
seen nor heard from the sales agent since. Strangely enough, on the very day after
this Subcommittee's staff first interviewed me on this subject last October, he
phoned me to set up a meeting in my New York office. At that meeting he
introduced me to a Yugoslavian businessman who accompanied him. When I
reminded him of the aborted lecture incident, he responded with a somewhat
nervous laugh and quickly changed the subject.
In another setting, our company has also been confronted with the
problem of Soviet approaches to American subsidiaries working abroad. ACT has
had a subsidiary located in Milan, Italy. Milan is recognized as an international
center for businesses involved in highly advanced technology. In fact, most of
America's high technology companies do research and development work in the
area.
95-929 0 - 82 - 37
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
572
As a booming technology center, Milan also accommodates companies
from Western European as well as Soviet Bloc nations. In fact, after General
Electric began selling computers directly to the Soviets through their Italian
subsidiary, they established a GE center in Milan for the express purpose of
training Soviet personnel in computers. The Soviet contribution in Milan, however,
goes beyond the placement of trainees arid legitimate technology companies. It is
common knowledge amongst the Milan technology community that Soviet
intelligence agencies are more than amply represented in Milan. A restaurant, La
Notte, was a favorite hangout.
ACT's business manager in Milan, Jean Patrick Rousseau, was directly
approached for information by the Soviets. Identifying himself as an of ficial of the
Soviet Chamber of Commerce, the individual asked Rousseau to provide software
information and services. The Soviet was specific to Rousseau as to the manner
and method to be employed in the proposed deal: he was to pay Rousseau
personally with an agreement that there would be no record of the payment or the
work performed. When Rousseau related the offer to me, I told him not to deal
with that individual or with any other Soviets. Some time after this incident,
Rousseau was again approached by another individual from the Soviet Chamber of
Commerce with a similar request. As before, Rousseau refused to cooperate.
Clearly, and from all reports, there is a serious and focused attempt by
the Soviets to unveil the inner workings of our high technology. Although
American initiatives are as yet ill-equipped to deal effectively with the problem,
there is, at least, growing recognition that the problem exists. I also see, however,
a disturbing development which does not bode well for our future ability to combat
technology transfer. The United States, in both government and public circles, has
been seriously misled as to the true nature of Soviet efforts to transfer technology.
We continue to operate under an absolutely crippling misconception of what the
Soviets are stealing and why they are doing so.
It is of ten said that the Soviets are seeking our technology on a broad
scale in order to copy what they are incapable of creating themselves. Mr.
Chairman, over twenty years of experience in high technology tells me that their
true purposes are much more precise. The Soviets are stealing our technology
selectively for military purposes, and military purposes only.
Contrary to popular belief, the Soviets are not significantly behind the
United States in the level of technology achieved. In 1980 the Soviets estimated
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
573
their yearly production in computer technology at $10-11 billion and growing. Even
by American estimates, their yearly production nears $6-7 billion per year. By
comparison, American production of new computer technology was $11 billion in
1980.
An analysis of those figures exposes the obvious fallacies in what 1 will
term the "underdeveloped Soviets theory. Soviet production is by and large new
production -- in contrast to the United States, there is, by deliberate choice, no
mass production of consumer goods in the Soviet Union. Moreover, theirs is a 75%
agrarian economy -- with no banks, no consumer sector, no hotel industry. There is
therefore no real need for the white collar computerization which we recognize as
a fact of life in the United States. Our industry is 75% of white collar. Thus one
wonders what Soviet technology production, currently very near our production, is
used for, if not primarily military purposes. To be sure, some is in factory
automation, but I am of the opinion that this could not but account for a fraction
of the massive production under way.
By contrast, American high technology production is spread over a vast
spectrum of industries in both the public and private sectors. Frankly speaking, it
is pure "myth" that the Russians are so far behind us technologically. There is
more scientific literature printed in the Soviet Union than anywhere else in the
world. Intelligence is not, unfortunately, a privileged or solely American
commodity.
Years ago, the Soviets were, by comparison, more interested in purchasing
American technology for use and for copying. The reason was simple -- they were
just starting out in the field and they were broke. If you are surrounded by a sea of
countries characterized as technological supermarkets (to the Soviets, a circle of
traditionally high technology countries), and have very limited investment capital,
you buy what is easily available in order to better focus capital on what you most
have but cannot easily buy. To the Soviets this has always meant food and arms.
In the 1980s, the Soviets have far less dependency on surrounding
technological "supermarkets". They have acquired some of them (Czechoslovakia,
Hungary, Poland, East Germany) as well as the means and the know-how to create
and operate their own. The truth is that the Soviets no longer want our technology
solely to copy it or because they can't make it. They want it, primarily, because it
is the purest reflection of our military capabilities.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
574
??
That they are stealing computers and microchips from the USA is
unquestionable, but it is not because they are inherently incapable of building
equivalent technology. The evidence shows that such stealing is primarily devoted
to military purposes. In that vein, they are primarily stealing our technology in
order to find out, for example, how the F-16 embedded computer systems
technology works, how to defend against the power this gives us, and how to
incapacitate it in the quickest and most effective way. Their focus on military
intelligence and exploitation does not, however, preclude their interest in U. S.
technology for their commercial sector in either export operations or internal use.
Unfortunately, current American policy on technology transfer ignores
that fact, resting instead on a totally outdated conception of what the Soviets are
stealing and what they are stealing it for. With this improper focus, we are not
only ineffective in stopping technology transfer, but we are also hurting our own
technology in the process. Wholescale, generalized attempts to scuttle all
technology transfer on unspecified and unfocused bases do not solve the real
problem and are totally unresponsive to the needs of our own technology industry.
One example occurred when the U.S. government prevented a Soviet
scientist from delivering a planned speech to a scheduled conference in California
in 1979. The speech had been the result of concentrated planning and scheduling
efforts by respected members of the American technology community. The Soviet
was to deliver a paper on the science of "holography", an area believed to be the
key to future military victory and an area in which the Soviets are undisputedly
recognized as experts. As a result of unfocused and unrealistic efforts to curb
technology transfer, the speech was cancelled. This was done despite protests by
IBM as well as other respected members of the American scientific and high
technology community. Such actions do not stem the flow of technology to the
Soviets. They do seriously halt the flow of expert and needed Soviet technology to
American industry.
There are other serious shortcomings in our current policy on technology
transfer. The CoCOM control "sieve", once effective, is now begging of revision.
Dramatic changes in technology require that we re-evaluate CoCOM's basis. Most
of our legal controls on technology transfer center on the export laws and a belief
that we can effectively police the transfer of listed materials at our borders. In
view of the changes in restricted technologies, just in the last five years that
policy is unrealistic and hopelessly outdated. The huge computers of fifteen years
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
575
ago are no longer the "jewels" of our technology industry. Today's most powerful
computers (and in the foreseeable future) are composed of tiny microprocessor
chips, the elements of which vanish into the microscopic world. We should be
selling our big computers for as much profit as they will bring, rather than
expending resources to restrict their export to the Soviets and elsewhere. Clearly
a new computer can be very large in size, so old and new are not equivalent toI2ig
and small all the time; just most of the time. But new and 1:ig machines are
ultimately decomposable into microprocessor chips, bringing me to the point of this
part of my testimony.
Even the largest computer systems can be shipped piece by piece and
reassembled at their point of destination.
The transfer of microprocessor chips defies detection by currently known
means. These are so thin that they can pass through the eye of a needle. Only half
a centimeter square, they are essentially undetectable by metal detection devices.
No surveillance device is truly effective.
This makes detection at borders virtually impossible. Instituting controls
at our borders are therefore impossible. We must institute some policy of controls
on technology for previously mentioned reasons. Most important, that policy must
be effectively communicated to and instituted at the source ? the companies that
make these products and deal in them. Unfortunately, to date the government has
done little in this respect. Current export control lists are (1) hopelessly outdated
and (2) not visibly circulated within the industry sectors. I have seen lists of
controlled products which are so outdated that they go back to the days of
delivering B-29 parts.
The government should initiate serious efforts to give guidance on foreign
involvement and the true strategy of foreign technology transfer to key officers in
companies producing the targeted technology. Private briefings of the very top
people in these industries by responsible and knowledgeable American officials
would be the best beginning to an effective program. Sadly, many USA
microprocessor manufacturers have some measure of foreign ownership, including
control.
Today the People's Republic of China is currently in the "supermarket"
situation which the Soviets were in fifteen years ago. I met with the first
purchasing mission from the People's Republic of China in my New York offices.
We spent nearly twelve hours together, discussing the scope of their knowledge and
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
576
interest in the technology area. All of, certainly most of, the members of the
group were university graduates, mostly from schools like Harvard, Princeton, and
Yale and well experienced in high technology. They indicated that they, too, had a
deep knowledge of microprocessor chips, modern nuclear reactor technology, etc.
In passing, I remarked that "you certainly know a lot about modern technology."
The Chairman of the Chinese group responded, "We're not stupid. We're just
broke."
Like the Chinese, the Soviets are not "stupid". And, unlike fifteen years
ago, they are no longer "broke". They do not need to steal all our technology and
they know it. By design, they have for the most part chosen to selectively target
and secure those areas of American technology which are critical to the secrets of
our military defense. They need to know such things as when and where our
missiles and planes take off and how to jam the electronics in these. As long as the
United States fails to recognize the bases and nature of their strategy and persists
in outmoded, ineffective, and unfocused attempts to control the export and
transfer of technology, the Soviets will, I am afraid, find their global task that
much simpler.
Thank you.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
577
PREPARED STATEMENT OF ADMIRAL BOBBY..R7 INMAN
Thank you Mr. Chairman for the opportunity to appear before
this Committee this morning and to continue dialogue on this most
important topic. I believe that we agree that technology
transfers to the Soviets and the Eastern Bloc represent a very
serious problem.
I would like to take this opportunity to again enter into
the public record the kinds of problems we are dealing with, and
the importance of the various Soviet Bloc mechanisms for
acquiring Western technology.
? first.'as weZlook..-at the militarily useful, militarily
related technology which the Soviets have acquired from the
West, aboUt 70 percent of these acquisitions have been
accomplished by the Soviet and East European intelligence
services, using clandestine, technical, and overt collection
operations. They are trying to get technologies of proven
Western weapons or component designs that can be applied
directly to Soviet weapons R&D and industrial needs.
--- The Soviets and their Warsaw Fact allies are concentrating
their efforts through purchases openly and legally and, if
not successful, then illegally, including espionage. The
sources of this technology may be government classified or
unclassified reports, private companies "proprietary"
report, open-source technical documents from companies and
government organizations. Embargoed equipment falls ihto
this category as well. The Soviets undertake a very
thorough vacuum cleaning of anything in the public sector
which will let them better target their espionage
activities. .
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
578
-- Of the remaining 20-30 percent of the acquisitions of
information of military value to the Soviets, it mainly
comes through legal purchases and open-source publications
or from other Soviet organizations, such as the Ministry of
Trade and related international bodies; only a small
..perLentage comes from the-dir,ect?techn4cal-exchanvts.
tonductedlby 'scientists and s.tudents
I would like to enter into the record at this time an
unclassified study from the Intelligence Community perspective of
our knowledge of Soviet efforts to obtain Western technology and
to use it ultimately to improve their own military capabilities.
As we look out into the 1980s, where do we believe the
pressure is going to come?
-- Future Soviet and Warsaw pact acquisition efforts--including
acquisitions by their intelligence services--are likely to
concentrate on the sources of such component and
manufacturing technologies, including:
Defense contractors in the United States, Western Europe,
and Japan who are the repositories of Military
development and manufacturing technologies.
General producers of military-related auxiliary
manufacturing equipment in the United States, Western
Europe, and Japan,
Small and medium-size firms and research centers that
develop advanced component technology and designs,
including advanced civil technologies with future
inilitary applications,
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
579
The task is likely to become even more difficult in the
future as several trends identified in the 1970s continue into
the 1980s:
First, since the early 1970s, the Soviets and their ?
surrogates among the East Europeans have been
increasingly using their national intelligence services
to acquire Western civilian technologies--for example,
, 6
automobile, energy, chemicals, and even consumer
electronics.
Second, since the mid-1970s, Soviet and East European
intelligence services have been emphasizing the
collection of manufacturing-related technology, in
addition to weapons technology.
Third, since the late 1970s, there has been increased
emphasis by these intelligence services on the
acquisition of new Western technologies emerging from
universities and research centers'.
The combined effect of these trends is a heavy focus by
Soviet Bloc intelligence on the commercial sectors in the West--
. .
setors.th:a-t,arernot.,-760".1411Y.:ProtecterL,f.rom hostjl_e,I.ntellj9Pn_cn
In idOttoT", P!e.-se.curj_tY..ptovticlodby
is no Mat-ch for the human penetration operationsof Such foreign
intelligence services.. But the most alarming aspect of this
commercial focus by Soviet Bloc intelligence services is that as
a result of these operations the Soviets have gained, and
continue to gain, access to those advanced technologies that are
likely to be used by the West in its own future weapons systems.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
580
I can only conclude that Western security services will be
severely tested by the Soviet intelligence services and their
surrogates among the East European intelligence services during
the 1980s. In response, the US and its Western allies will need
to organize more effectively than it has in the past to protect
its military, industrial, commercial and scientific communities,
I am pleased to say that coordination within the
Intelligence Community and intelligence support to the Executive
Branch departments and agencies regarding the'issue of technology
transfer is much better than a year ago when Bill Casey pointed
out a number of deficiencies in this area to the Senate Select
Committee on Intelligence. for example:
-- The DCI hasWablished.,a Technology Transfer
Intelligence Committee (TTIC) to serve as a focal point
within the Intelligence Community on all technology
transfer issues. The Committee is able to draw on the
highly skilleci.S&T. analysts who are located thr_ogghou.t.
the:military tEh41.4ca1-jntO11_genCe-Lcenters;,;ana.selsewhere
in the Intelligeace Commuivity to .address this'-complex
problem. The Committee also ensures that intelligence
information collected on technology transfer is
consistent with the DCI's priorities and guidance and
meets the needs of Community production organizations. A
TTIC Subcommittee on Exchanges advises appropriate US ?
Government departments and agencies of the technology
transfer implications and foreign intelligence equities
involved An exchange programs and commercial contacts
with nationals from designated foreign countries and
recommends changes as appropriate. A Subcommittee on
Export Control has recently been established to provide
foreign intelligence support, on export control issues to
appropriate US Government agencies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
581
-- The intelligence agencies are now better organized to
support the functions of the export Control enforcement
agencies. 'Assistant Attorney General Lowell Jensen is
heading an interagency committee at Justice on Export
Control Enforcement. This group has the potential to
become the most significant forum for coordinating .
enforcement and investigative efforts dealing with export
control matters. As members of this Committee, we will
ensure that it draws effectively upon appropriate
intelligence data bases and support. The intelligence
agencies will also become directly acquainted with the
current state -ofthe enforcement .effort and the
-1.0telleigence_nee'di.of the:On-forcement.agencies 'but a sn
will be in a'pcisition to acqUire-first hand and peruse
significant information being developed by the
enforcement agencies that will add to and enhance the
effectiveness of the intelligence effort in the long .
run. Any intelligence issues that are developed in this
forum may be brought back to the TTIC for appropriate.
consideration in an Intelligence Community setting.
-- The NSC Technology Transfer Coordinating Committee,
chaired.* Dr. Gus Weiss, 'serves as a valuable high-level
forum for national policy assessment and developments.
It is here that the political, foreign policy,
.intelligence and enforcement elements are woven together
and decisions on jurisdictional issues or program choices
may be sought. Substantial intelligence support to this
group will result in better understanding of the threat,
greater support for the efforts of the intelligence and
enforcement agencies and result in more considered policy
determinations.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
582
-- The intelligence agencies are now in a position to
make substantial contributions to Commerce's Advisory
Committee on Export Policy, 'which makes determinations
concerning whether particular exports should be licensed
and what general policies should be applied by the US.
-- State's Economic Defense Advisory Committee (EDAC).
GT-dup.,n st:ructre"..prW,cies.,,an, i_mvortan.t
opObrtunity for, 1-ntelli.gence,-.epforcementand. foreign
policy considerations to be discussed in the context of
both general policy concerns and specific cases.
Intelligence support here is essential for its value in
identifying and assessing international enforcement
problems and bridging the gap where there. are both
domestic and international aspects to a particular case.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
583
PREPARED STATEMENT OF DR. STEPHEN D. BRyEN
I WELCOME THIS OPPORTUNITY TO SPEAK WITH YOU TODAY CONCERNING
WHAT WE IN THE DEPARTMENT OF DEFENSE BELIEVE TO BE A MOST SERIOUS
NATIONAL PROBLEM - THE CONTROL OF TECHNOLOGY WHICH IS BEING TRANS-
FERRED TO THE SOVIET UNION AND ITS ALLIES. MY DISCUSSION WILL FOCUS
ON WHAT WE HAVE ACHIEVED SO FAR, WHAT IS IN THE WORKS, AND WHAT WE
HAVE YET TO DO. IN THIS CONNECTION YOU SHOULD KNOW THAT ONE YEAR
AGO WHEN I UNDERTOOK THIS MISSION, I HAD ONLY FOUR STAFF MEMBERS,
A FULL PLATE OF RESPONSIBILITIES, NO PREVIOUS RECORDS OR ASSESSMENT,
AND NO ORDERLY SYSTEM FOR DISCHARGING MY RESPONSIBILITIES. I CAN
SAY NOW, WITH SOME PRIDE, THAT WE HAVE MADE CONSIDERABLE PROGRESS
IN SOLVING SOME OF THE PROBLEMS; OTHERS REMAIN ON THE AGENDA.
PREVIOUS TESTIMONY HAS GONE TO CONSIDERABLE LENGTH TO ILLUS-
TRATE THE SCOPE OF OUR PROBLEM. IT WOULD BE VERY DIFFICULT TO
ESTIMATE THE REAL DAMAGE DONE TO U.S. NATIONAL SECURITY BY THE
BELL CASE, WHICH HAS BEEN BRIEFED TO YOU. THAT LOSS CONSISTS OF
BOTH MILITARY DAMAGE IN MAKING THOSE WEAPON SYSTEMS VULNERABLE TO
COUNTER-MEASURES AND IN COST TO THE TAXPAYER TO OVERCOME THE
VULNERABILITIES THAT THOSE COMPROMISES ENTAIL. THESE ARE COMMON
ASPECTS OF SUCH CASES AND CAN BE READILY UNDERSTOOD WHEN BLATANT
ESPIONAGE IS INVOLVED AND U.S. MILITARY WEAPON SYSTEMS HAVE BEEN
DIRECTLY COMPROMISED BY SOVIET EFFORTS. THE SAME KIND OF DAMAGE,
HOWEVER, IS DONE IN MORE SUBTLE WAYS BY A VARIETY OF MECHANISMS
THAT ARE CENTRALLY DIRECTED BY THE SOVIET UNION TO THE DETRIMENT
OF THE UNITED STATES..
** A SO CALLED "GRADUATE STUDENT" STUDIES FUEL AIR EXPLOSIVES IN
AN AMERICAN UNIVERSITY, RETURNS TO MOSCOW AND EMPLOYS THAT
KNOWLEDGE IN THE DEVELOPMENT OF THOSE KINDS OF WEAPONS FOR
THE SOVIET UNION.
** A TOUR OF A U.S. MANUFACTURING FACILITY ENGAGED IN BUILDING
WIDE BODY AIRCRAFT IS COMPRISED OF VISITING SOVIET OFFICIALS
WITH GUMMY SOLED SHOES WHO CAN BE PRESUMED TO HAVE ACQUIRED
SUFFICIENT METALLURGICAL KNOWLEDGE THROUGH THE SOLES OF THEIR
FEET TO ADVANCE THE STATE-OF-THE-ART OF SOVIET METALLURGY
APPLICABLE TO THE SAME KIND OF AIRCRAFT FOR SOVIET MILITARY
PURPOSES.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
**
* *
* *
584
IN A PERIOD OF DETENTE AND BRIDGE BUILDING WE LICENSE THE
SALE OF PRECISION BALL BEARING GRINDERS WHICH PERMIT THE
SOVIETS TO INCREASE THE ACCURACY OF THEIR STRATEGIC MISSILES.
THE U.S. TAXPAYER ASSUMES THE COST OF UPGRADING U.S. ICBMS TO
REDUCE OUR VULNERABILITY.
OVER A PERIOD OF 3 OR 4 YEARS THE SOVIETS ACQUIRE THE BITS
AND PIECES REQUIRED TO CONSTRUCT A COMPLETE MANUFACTURING
FACILITY FOR INTEGRATED CIRCUITRY, THUS IMPROVING THE RELI-
ABILITY, THE WEIGHT AND PERFORMANCE CHARACTERISTICS OF SOVIET
MILITARY SYSTEMS FOR A WIDE VARIETY OF APPLICATIONS.
FOR A FEW THOUSAND DOLLARS THE SOVIETS ACQUIRE VIRTUALLY ALL
UNCLASSIFIED U.S. MILITARY STANDARDS APPLICABLE TO THE
PRODUCTION OF U.S. MILITARY MATERIEL.
** THE LIBRARY OF CONGRESS SENDS THE OPERATING AND MAINTENANCE
MANUALS FOR THE EMPLOYMENT OF U.S. FIELD ARTILLERY AND MISSILES
TO THE SOVIET UNION IN HONORING A 19TH CENTURY TREATY FOR THE
EXCHANGE OF GOVERNMENT PRODUCED PUBLICATIONS.
UNDOUBTEDLY YOU HAVE HEARD, OR WILL HEAR IN THE FUTURE, FROM
THOSE WHO SAY THAT ONLY BY CONSTANT INVESTMENT IN THE TECHNOLOGY
BASE UPON WHICH OUR DEFENSE IS FOUNDED, CAN THE U.S. HOPE TO REMAIN
AHEAD OF ITS STATEGIC ADVERSARY. LIKEWISE YOU WILL HEAR THAT IT
IS IMPOSSIBLE TO CONSTRAIN KNOWLEDGE AND TO DO SO IS, IN FACT,
COUNTER TO THE EFFORT TO ADVANCE THE ONWARD PROGRESS OF TECHNOLOGY.
UNDOUBTEDLY WE MUST PURSUE THE ADVANCEMENT OF OUR OWN TECHNOLOGY
BASE. LIKEWISE, WE DO NOT SEEK TO CONSTRAIN THE FREE FLOW OF IDEAS.
HOWEVER, WE BELIEVE THAT IT WOULD BE IMPRUDENT IN THE EXTREME TO
SHRINK FROM THE DIFFICULT TASK OF DEVISING AND ENFORCING REASONABLE
CONTROLS TO PRECLUDE THE USE BY THE SOVIETS OF THE FRUITS OF OUR
TECHNOLOGICAL GENIUS TO DESTROY THE VERY SYSTEM BY WHICH IT IS
NOURISHED. IT IS OUR ATTEMPT TO STRUCTURE, WITHIN THE DEPARTMENT
OF DEFENSE, REASONABLE CONTROLS OVER TECHNOLOGY; CONTROLS WHICH
WILL EFFECTIVELY INHIBIT THE FLOW OF TECHNOLOGY CONTRIBUTING TO
THE GROWTH IN SOVIET MILITARY CAPABILITY.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
585
IT IS A TRUISM THAT THERE IS NO SUBSTITUTE FOR CASE-BY-CASE
REVIEW OF PROPOSED EXPORTS. ONLY BY CAREFUL AND OBJECTIVE ANALYSIS
OF THE FACTS OF EACH CASE CAN THE OPERATIONAL, TECHNICAL AND PRECE-
DENTIAL IMPACT OF AN EXPORT BE PROPERLY ASSESSED. WE HAVE NO
INTENTION WHATEVER OF ELIMINATING THIS VITAL ELEMENT OF DOD'S
CONTRIBUTION TO THE GOVERNMENT'S EXPORT CONTROL EFFORT. HOWEVER,
THE CASE-BY-CASE APPROACH FUNCTIONS BEST WITHIN A FRAMEWORK OF
GUIDELINES AND CRITERIA; PROVEN STANDARDS BY WHICH INDIVIDUAL
JUDGEMENTS CAN BE MADE. IN THE PAST, OUR INDIVIDUAL JUDGEMENTS
WERE MADE IN SO FLEXIBLE A FASHION THAT WE WERE OVERLY SUBJECT TO
THE VAGARIES OF THE MOMENT. INDEED, A SMALL INDUSTRY HAS ARISEN
IN WASHINGTON COMPOSED OF INDIVIDUALS WHO KNOW HOW TO "PLAY THE
SYSTEM" WITHIN THE EXPORT CONTROL COMMUNITY. THESE PEOPLE, THOUGH
OFTEN WELL INTENTIONED, RECOGNIZE THAT TIMING AND APPROACH CAN
MAKE THE DIFFERENCE BETWEEN APPROVAL AND DENIAL OF AN INDIVIDUAL
CASE, PARTICULARLY THOSE CASES WHICH ARE RECOGNIZED AS BEING ON
THE MARGINS OF ACCEPTABILITY. THE EFFECT HAS BEEN GENERALLY TO
ADVANCE THE MARGINS OF ACCEPTABILITY OF EXPORTS THROUGH THE GRADUAL
ACCRETION OF PRECEDENTIAL APPROVALS WITHOUT PARTICULAR REGARD FOR
THE BASIC STANDARDS BY WHICH EXPORTS SHOULD BE JUDGED - - THE
NATION'S SECURITY. ACCORDINGLY, WE ARE ENGAGED IN A MAJOR EFFORT
TO DEVELOP, IN A COGENT AND COHERENT FASHION, A FRAMEWORK OF POLICY
WITHIN WHICH THE DEPARTMENT OF DEFENSE CAN PROVIDE ITS ADVICE AND
COUNSEL TO THE ULTIMATE LICENSING AUTHORITIES. SOME OF THIS EFFORT
IS BEING UNDERTAKEN IN THE CRUCIBLE OF SPECIFIC, CURRENT CASE
REVIEWS.' OTHER EFFORTS ARE BASED UPON QUIET ANALYSIS OF THE LESSONS
OF PAST EXPORT ACTIVITY. THE OBJECTIVE IS THE SAME IN BOTH ACTIVI-
TIES; TO IMPLEMENT THIS ADMINISTRATION'S VIEW THAT OUR EXPORTS
SHOULD NOT UNDERMINE OUR EFFORTS TO REPAIR THE EFFECTS OF A PERIOD
OF NEGLECT FOR OUR NATIONAL DEFENSE WHICH HAS PLACED OUR ADVANTAGE
.OVER THE SOVIET UNION IN QUESTION.
STARTING WITH FOUR PEOPLE, WE IN THE OFFICE OF THE UNDER
SECRETARY OF DEFENSE FOR POLICY, HAVE EXPANDED OUR STAFF TO TWELVE
AND HAVE INTENSIFIED OUR ROLE IN THE EXPORT REVIEW PROCESS WHILE
UNDERTAKING THIS MAJOR EFFORT IN OBJECTIVE POLICY FORMULATION. I
WOULD LIKE TO SHARE WITH YOU SOME OF THE THINGS WE HAVE DONE TO DATE,
AND SOLICIT YOUR SUGGESTIONS FOR OUR FUTURE EFFORTS.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
586
FIRST, AN AUGMENTATION TEAM COMPOSED OF REPRESENTATIVES OF THE
SERVICES HAS BEEN ASSIGNED TO MY OFFICE AND IS PREPARING FOR THE
SECRETARY OF DEFENSE'S SIGNATURE A POLICY STATEMENT ON CONTROL OF
TECHNOLOGY TRANSFER. THIS WILL REPLACE A 1977 INTERIM POLICY
SIGNED BY SECRETARY BROWN, DESIGNED TO SUPPORT U.S. EFFORTS TO
CONTROL EXPORTS OF MILITARY CRITICAL TECHNOLOGY AND RELATED PRODUCTS.
WHEREAS THE INTERIM POLICY FOCUSED ALMOST EXCLUSIVELY ON THE KNOW-
HOW OF TECHNOLOGY, THE THRUST OF OUR NEW POLICY WILL REFLECT A
BALANCED BUT FORCEFUL EMPHASIS ON TECHNOLOGICAL KNOW-HOW, KEYSTONE
EQUIPMENT, AND END PRODUCTS. THE POLICY WILL REFLECT SEVERAL
CHANGES THAT HAVE OCCURRED SINCE 1977. THE EXPORT ADMINISTRATION
ACT OF 1979 IS IMPORTANT IN THIS RESPECT AS IS THE INCREASED AWARE-
NESS AND CONCERN OF MANY AMERICANS TOWARD THE VAST AMOUNTS OF U.S.
TECHNOLOGY REACHING OUR POTENTIAL ADVERSARIES.
THIS TEAM IS ALSO PROVIDING MANAGEMENT ASSISTANCE TO MY OFFICE
IN THREE FORMS. THE FIRST OF THESE IS TECHNICAL ASSISTANCE TO
AUTOMATE SOME OF THE ROUTINE ADMINISTRATIVE TASKS INVOLVED IN DETER-
MINING POLICY AND PROCESSING CASES. THE SECOND IS TO ASSIST THE
INTEGRATION OF EXISTING DATA BASES USED IN ROUTINE CASE PROCESSING.
THE THIRD IS THE CREATION OF A CENTRAL LIBRARY TO PROVIDE THE BASIC
DOCUMENTS REQUIRED FOR DEVELOPING POLICY. EXISTING AUTOMATION SYS-
TEMS THROUGHOUT DOD, INCLUDING THOSE IN MY OFFICE, IN OUSDRE, AND
THE NAVAL RESEARCH LABORATORY AS WELL AS THE NEWLY EMERGING FORDTIS
SYSTEM, ARE BEING REVIEWED WITH THE END OBJECTIVE OF CREATING A
COMPREHENSIVE, EFFECTIVE SYSTEM FOR USE BY THE DEFENSE POLICY MAKERS.
IN THE SAME VEIN, WE HOPE TO IMPROVE THE PROCESSING OF PROPOSED
TRANSFER CASES BY RECOMMENDING IMPLEMENTATION POLICY AND PROCEDURES
WHICH WILL MAKE OPTIMUM BENEFIT OF AVAILABLE (AND RECOMMENDED)
MANPOWER AND AUTOMATION CAPABILITIES. THE POLICY INVENTORY LIBRARY
WILL BE A REPOSITORY OF EXISTING AND PROPOSED LEGISLATION, DIRECTIVES
AND REGULATIONS OF GOVERNMENTAL DEPARTMENTS AND AGENCIES INVOLVED
IN MAKING AND IMPLEMENTING TRADE AND EXPORT CONTROL POLICY.
THIS COMMITTEE SHOULD KNOW, THAT ON TAKING OFFICE THERE WERE
NO COHERENT RECORDS AVAILABLE ON PAST DOD DETERMINATIONS; NOR WAS
THERE ANY SINGLE SOUURCE TO APPRAISE THE RESULTS OF PAST ACTIVITY.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
THIS DEFICIENCY IS SLOWLY BEING CORRECTED, AND MY STAFF IS BEING
TRAINED TO APPLY MORE RIGOROUS STANDARDS AND FOLLOW MORE DISCIPLINED
PROCEDURES. IN THE LONG RUN, THESE EFFORTS WILL GO A LONG WAY IN
ASSURING AN INSTITUTIONALIZED LEARNING CURVE IN HARMONY WITH OUR
SECURITY INTERESTS.
IN ORDER TO FURTHER EDUCATE U.S. CITIZENS AT HOME AND FRIENDS
ABROAD ABOUT THE RISKS TO THEIR SECURITY POSED. BY INDISCRIMINATE
TRANSFER OF TECHNOLOGY AND ABOUT THE MEANS OF TRANSFER, THE AUGMEN-
TATION TEAM IS, UNDER MY DIRECTION, PREPARING A WHITE PAPER ON THE
SUBJECT. THE GOALS OF THE PAPER ARE TO DEMONSTRATE THE IMPORTANCE
OF DUAL-USE TECHNOLOGIES TO THE DEFENSE SUPPORT INDUSTRIES IN THE
SOVIET UNION; TO PROMOTE MORE VOLUNTARY COMPLIANCE WITH EXISTING
EXPORT PROCESSES; AND SECURE SUPPORT FOR AND ASSISTANCE IN DEVELOPING
METHODS WHICH MORE CLOSELY REVIEW DEFENSE RELATED TECHNOLOGIES
PROPOSED FOR EXPORT. THE PAPER WILL ALSO ATTEMPT TO PRESENT THE
ROLES AND CONTRIBUTIONS OF THE DEPARTMENTS OF STATE, COMMERCE,
TREASURY, JUSTICE AND THE'BUREAU OF CUSTOMS. WE ANTICIPATE THAT
OUR WHITE PAPER WILL BE AN IMPORTANT EDUCATIONAL TOOL AND REFERENCE
SOURCE. WE HOPE, AS WELL, THAT IT WILL STIMULATE OUR ALLIES AND
FRIENDS TO WORK WITH US IN THIS EFFORT. ACCORDINGLY, WE PLAN TO
DISTRIBUTE THIS PAPER WIDELY AND HOPE IT WILL FORM PART OF THE
DIALOGUE AND DEBATE ON TECHNOLOGY TRANSFER IN THE MONTHS AND YEARS
AHEAD.
ANOTHER MAJOR EFFORT IS OUR ATTEMPT TO WORK CLOSELY WITH THE
DEPARTMENTS OF STATE AND COMMERCE IN SEEKING TO STRENGTHEN STRATEGIC
TRADE CONTROLS IN COCOM AND, THUS, TO STEM THE FLOW OF WESTERN
.TECHNOLOGY TO THE SOVIET UNION AND ITS ALLIES. AS YOU KNOW, COCOM
IS AN INFORMAL NON-TREATY ORGANIZATION ESTABLISHED IN THE EARLY
1950'S COMPRISED OF THE NATO COUNTRIES LESS ICELAND PLUS JAPAN. IT
HAS NO FORMAL LINK TO NATO, HOWEVER. THE COCOM SYSTEM WORKS ON
THE BASIS OF CONSENSUS. THIS IS BOTH ITS STRENGTH AND ITS WEAKNESS.
BECAUSE IT IS A VOLUNTARY ORGANIZATION AND REQUIRES UNANIMITY TO
ACT, IT CAN CONTINUE TO OPERATE WITH REASONABLE EFFECTIVENESS ONLY
THROUGH A SYSTEM OF COMPROMISE, EXCEPTIONS AND PRECEDENT. THE
MEMBERS SEEK TO BALANCE THE STRATEGIC CONCERNS OVER COCOM RESTRICTED
TECHNOLOGY TRANSFERS AGAINST THEIR COMMERCIAL AND POLITICAL INTERESTS.
95-929 0 - 82 - 38
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
588
UNFORTUNATELY, THE NEED TO SEEK COMPROMISE HAS ALLOWED CONTROLS TO
BE ERODED, ESPECIALLY IN RECENT YEARS. THIS EROSION TAKES THE
FORM OF NUMEROUS EXCEPTIONS REQUESTS WHICH HAVE THE EFFECT OF
VIRTUALLY ALLOWING THE EXPORT OF ALL BUT THE MOST ADVANCED TECH-
NOLOGIES. AS INDICATED, THE SOVIET UNION HAS SOUGHT TO ACQUIRE
THESE THROUGH ILLEGAL CHANNELS ,WITS CONSIDERABLE SUCCESS.
FROM THE OUTSET, THIS ADMINISTRATION HAS SOUGHT TO STRENGTHEN
THE STRATEGIC PURPOSE AND WILL OF COCOM. KEY TO THIS EFFORT HAS
BEEN THE COCOM HIGH LEVEL MEETING CONVENED LAST JANUARY IN PARIS.
THE PURPOSE OF THIS POLITICAL MEETING WAS THREEFOLD: TO REAFFIRM
THE STRATEGIC PURPOSE OF THE COCOM EMBARGO; TO GAIN AGREEMENT TO
STRENGTHEN CONTROLS OVER CERTAIN KEY MILITARY-RELATED TECHNOLOGIES
SUCH AS ROBOTICS, COMPUTERIZED MESSAGE SWITCHING, METALLURGY AND
MICROELECTRONICS; AND TO HARMONIZE COCOM PROCEDURES AND INCREASE
COOPERATION AMONG MEMBERS IN ENFORCING CONTROLS. WE ALSO SOUGHT
TO ESTABLISH A COMMITTEE OF MILITARY TECHNOLOGY EXPERTS TO ADVISE
COCOM. EXCEPT FOR THE U.S. AND ONE OR TWO OTHER COUNTRIES, DEFENSE
MINISTRIES ABROAD PLAY LITTLE OR NO ROLE IN THE REVIEW OF STRATEGIC
TRADE EXPORTS.
IT WAS OUR RESPONSIBILITY TO PREPARE FOR COCOM AN ELABORATE
BRIEFING, POINTING OUT THE GAPS AND LOOPHOLES IN THE PRESENT
SYSTEM AND THE HARM THIS WAS BRINGING TO THE INDIVIDUAL AND COLLEC-
TIVE DEFENSE EFFORTS OF THE COCOM NIMBERS. COUPLED WITH A GRAPHIC
AND EFFECTIVE OVERVIEW OF SOVIET TECHNOLOGY ACQUSITION SUCCESSES,
U.S. PROPOSALS PRESENTED AT COCOM BY UNDER SECRETARY OF STATE
BUCKLEY, UNDER SECRETARY OF COMMERCE OLMER, AND UNDER SECRETARY
OF DEFENSE IKLE. FOR THE RECORD, YOU SHOULD KNOW THAT THESE
BRIEFINGS REQUIRED CONSIDERABLE EFFORT, AS WE HAD TO CONDUCT THE
INVESTIGATIVE WORK AS WELL AS PREPARE THE ACTUAL PRESENTATIONS.
THE LACK OF A CENTRAL DATA BASE AND HISTORICAL DOCUMENTATION (AS
WELL AS EVALUATION) REQUIRED A FAR MORE EXTENSIVE UNDERTAKING ON
OUR PART THAN OTHERWISE MIGHT HAVE BEEN NECESSARY.
I AM PLEASED TO REPORT THAT THE GENERAL STRENGTHENING PROGRAM
SOUGHT BY THE U.S. WAS WELL RECEIVED BY OUR ALLIES AND WE ARE
WORKING TOGETHER TO ESTABLISH A SOLID FRAMEWORK TO REVITALIZE
COCOM AS AN EFFECTIVE MEDIUM FOR THE CONTROL AND ENFORCEMENT OF
THE STRATEGIC TRADE EMBARGO.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
589
SEPARATELY, MY OFFICE HAS SUPPORTED A MAJOR NEW NATO STUDY
ON THE SECURITY IMPLICATIONS FOR THE ALLIANCE OF THE TRANSFER OF
MILITARILY RELEVANT TECHNOLOGY TO THE WARSAW PACT COUNTRIES. THIS
UNDERTAKING WAS THE RESULT OF SECRETARY OF DEFENSE WEINBERGER'S
INITIATIVE AND IS THE FIRST NATO REVIEW OF THE TECHNOLOGY TRANSFER
ISSUE. THE STUDY GROUP ASSESSED THE SOVIET ORGANIZATION AND
MECHANISMS FOR ACQUIRING TECHNOLOGY, AND IDENTIFIED A REPRESEN-
TATIVE LISTING OF TECHNOLOGIES THAT ARE ESSENTIAL TO NATO MILITARY
MISSIONS. ALTHOUGH THE FINDINGS OF THIS SEVEN MONTH EFFORT WILL
NOT BE APPROVED UNTIL LATER THIS MONTH, SOME OF THE BENEFITS
WHICH HAVE EMERGED FROM THE EFFORT INCLUDE A BETTER UNDERSTANDING
OF THE MAGNITUDE OF THE SOVIET EFFORT TO ACQUIRE WESTERN TECHNOLOGY,
THE APLICABILITY OF "CIVILIAN" TECHNOLOGIES TO MILITARY WEAPONS,
AND A GREATER APPRECIATION OF THE RISK TO NATO RESULTING FROM
TECHNOLOGY TRANSFER TO THE SOVIETS. WE ARE ENCOURAGING NATO TO
CONTINUE THE DIALOGUE BEGUN BY THIS INITIATIVE THROUGH ESTABLISHING
AN OFFICE AT NATO HEADQUARTERS TO ALERT THE ALLIANCE TO SOVIET
EFFORTS TO ACQUIRE ADVANCED TECHNOLOGY. I WANT TO EMPHASIZE OUR
BELIEF THAT THE TRANSFER OF TECHNOLOGY IS FAR MORE THAN A PAROCHIAL
U.S. CONCERN. IT IS A POTENT ALLIANCE ISSUE WITH WIDE RANGING
IMPLICATIONS.
THE INCREASING IMPORTANCE OF ADVANCED DUAL-USE TECHNOLOGIES
TO MILITARY APPLICATIONS HAS RAISED DEFENSE DEPARTMENT CONCERNS
ABOUT THE LOSS OF TECHNOLOGY THROUGH ACADEMIC ACTIVITIES TRADITION-
ALLY CONSIDERED OUTSIDE THE AREA OF GOVERNMENT CONCERN. THIS NEW
CONSCIOUSNESS OF THE MILITARY IMPORTANCE OF DUAL-USE TECHNOLOGY
HAS RAISED SUSPICIONS IN THE ACADEMIC COMMUNITY ABOUT THE INTENTIONS
AND MOTIVES OF THE GOVERNMENT, WHILE THE GOVERNMENT HAS BEEN
DISMAYED BY THE LACK OF COOPERATION OR SYMPATHY FROM THE COLLEGES
AND UNIVERSITIES OVER THE PROBLEMS OF TECHNOLOGY TRANSFER.
WE ARE CONCERNED WITH ESTABLISHING A DIALOGUE BETWEEN THE
GOVERNMENT AND THE UNIVERSITIES, AS WELL AS PRIVATE RESEARCH LABS.
WE HAVE TAKEN STEPS TO INCREASE COMMUNICATION WITH UNIVERSITIES,
TO PRESENT OUR POINT OF VIEW, AND TO LISTEN TO THEIR RESERVATIONS
AND FEARS. THE NATIONAL ACADEMY OF SCIENCES HAS FORMED A PANEL
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
590
ON SCIENTIFIC COMMUNICATION AND NATIONAL SECURITY TO STUDY THE
PROBLEM OF TECHNOLOGY TRANSFER IN UNIVERSITY-RELATED AREAS AND TO
ASSESS WHAT CAN OR SHOULD BE DONE ABOUT IT. WE HAVE COOPERATED
WITH THIS GROUP IN PRESENTING OUR VIEWS FOR CONSIDERATION IN THEIR
DELIBERATIONS.
THERE IS ALSO A UNIVERSITY FORUM ON EXPORT CONTROL IN WHICH
DEFENSE DEPARTMENT PERSONNEL PARTICIPATE IN DISCUSSION OF THESE
ISSUES. OUR OFFICE IS INTIMATELY INVOLVED IN A WORKING GROUP OF
THIS FORUM, AND WE ARE ATTEMPTING TO PROVIDE THE INFORMATION AND
ORIENTATION THAT IS NECESSARY FOR TME MEMBERS TO UNDERSTAND THE
DEFENSE PERSPECTIVE AND BE ABLE TO ASSESS THE PROBLEM OF TECHNOLOGY
TRANSFER TO THE SOVIETS.
IT IS ESSENTIAL THAT THIS KIND OF COMMUNICATION BE FOSTERED TO
KEEP LINES OPEN BETWEEN THE DEFENSE DEPARTMENT AND THE UNIVERSITIES.
WE CANNOT DO OUR JOB WITHOUT UNIVERSITY COOPERATION IN R&D, AND WE
NEED THEIR SUPPORT FOR OUR EFFORTS TO IMPROVE OUR DEFENSE READINESS.
WE BELIEVE IMPROVED COMMUNICATION AND UNDERSTANDING IS CRUCIAL.
WE HOPE WE WILL AGREE ON VIABLE WAYS TO DECREASE SOVIET ACCESS TO
OUR TECHNOLOGY WITHOUT INHIBITING SCIENTIFIC AND TECHNOLOGICAL
DEVELOPMENT.
MY OFFICE HAS ALSO BEEN WORKING CLOSELY WITH ENFORCEMENT
AGENCIES TO PREVENT ILLEGAL DIVERSIONS OF SOPHISTICATED TECHNOLOGIES
TO THE SOVIETS. AS A RESULT OF THE JANUARY HIGH LEVEL MEETING,
SPECIFIC MEASURES DESIGNED TO CLAMP DOWN ON ILLEGAL EXPORTING AND
DIVERSIONS WILL BE NEGOTIATED AND DEVELOPED SHORTLY IN COCOM. FOR
ITS PART, THE DEPARTMENT OF DEFENSE IS IN THE PROCESS OF DRAWING
UP A "MUSHROOM BOOK" - A DESCRIPTIVE LIST DESIGNED TO AID CUSTOMS
OFFICIALS IN IDENTIFYING THE MOST CRITICAL TYPES OF SOPHISTICATED,
.TECHNOLOGICAL EQUIPMENT. USING THIS BOOK AS A TOOL, U.S. CUSTOMS
AGENTS WILL BE ABLE TO CONCENTRATE ON IDENTIFYING WHETHER SOPHISTI-
CATED EQUIPMENT IS BEING EXPORTED LEGALLY OR NOT. WE HOPE TO GET
OTHER COCOM MEMBERS TO USE THIS BOOK ALSO.
THE DEPARTMENT OF DEFENSE HAS BEEN SERIOUSLY CONCERNED ABOUT
THE IMPLEMENTATION OF U.S. DISTRIBUTION LICENSES. DISTRIBUTION
LICENSES ALLOW THE BULK SHIPMENT OF ITEMS INCLUDING COMPUTERS, TO
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
591
A HOST OF COUNTRIES OUTSIDE THE SOVIET BLOC. HOWEVER, A NUMBER OF
THESE COUNTRIES ARE WILLING TO ALLOW, IF NOT COOPERATE WITH, SOVIET
ACQUISITION OF COCOM EMBARGOED EQUIPMENTS. THE CURRENT SYSTEM
LEAVES A LARGE LOOPHOLE OPEN FOR DIVERSIONS TO THE USSR OF SOPHIS-
TICATED EQUIPMENT. WE ARE URGING THAT THIS LOOPHOLE IN THE SYSTEM
BE CLOSED AS COMPLETELY AS POSSIBLE. THERE ARE SOME WHO QUESTION
WHETHER THE EXPORT ADMINISTRATION ACT IS SUFFICIANTLY CLEAR TO
CARRY THIS OUT. IF IT PROVES INADEQUATE, WE WILL ASK THAT THE STATUTE
BE AMENDED TO ENABLE US TO CLOSE DOWN THIS GAP IN OUR COVERAGE.
WE HAVE BEEN CLOSELY INVOLVED IN THE ADMINISTRATION'S REVIEW
OF THE DRAFT LAW OF THE SEA CONVENTION. OUR FOCUS IS ON ITS POTEN-
TIAL IMPACT ON THE TRANSFER OF TECHNOLOGY TO THE SOVIET UNION AND
ITS CLIENT STATES. IN THAT CONTEXT, A CRITICAL EXAMINATION OF THE
DRAFT TREATY TEXT WAS UNDERTAKEN TO REASSESS THE POTENTIAL FOR THE
TRANSFER OF MILITARILY SENSITIVE TECHNOLOGY. A MAJOR OBJECTIVE IS
TO ASSURE THAT THE CONVENTION WILL NOT FORM THE BASIS FOR ANY
WEAKENING OR UNDERMINING OF OUR DRIVE TO STRENGTHEN THE COCOM
SYSTEM. I WOULD LIKE TO EMPHASIZE THAT, IN ITS PRESENT FORM, THE
CONVENTION CONTINUES TO HAVE SERIOUS IMPLICATIONS FOR THE TRANSFER
OF U.S. TECHNOLOGY. FOR THAT REASON, IT MUST BE CAREFULLY WEIGHED
AGAINST OTHER NATIONAL SECURITY CONSIDERATIONS.
ONE CURRENT EFFORT OF PARTICULAR INTEREST TYPIFIES BOTH THE
PROBLEMS OF DEVELOPING ADEQUATE CONTROLS AND THE RISKS OF NOT
DOING SO. THAT EFFORT CONCERNS THE VHSIC PROGRAM. VHSIC, WHICH
STANDS FOR VERY HIGH SPEED INTEGRATED CIRCUITS IS DESIGNED TO FILL
THE GAP BETWEEN OUR HIGH PERFORMANCE MILITARY NEEDS AND CURRENT
TECHNOLOGY IN MICROPROCESSORS. THE RESULTING PRODUCT WILL PERFORM
ADVANCED SIGNAL PROCESSING FUNCTIONS FOR WEAPONS SYSTEMS INCLUDING
ELECTRONIC WAREFARE, COMMUNICATION, RADAR, AND PRECISION GUIDED
MUNITIONS AND DO SO WITH LESS COST, VOLUME, POWER, AND WEIGHT THAN
CURRENT DIGITAL TECHNOLOGY. THE PROTECTION OF THIS TECHNOLOGY, SO
IMPORTANT FOR OUR FUTURE DEFENSE NEEDS AND WEAPONS SYSTEMS, IS OF
THE HIGHEST PRIORITY. CONGRESS SPECIFICALLY MANDATED THE CONTROL
OF THIS TECHNOLOGY WHEN IT FUNDED THE VHSIC PROGRAM. TO DATE, THE
WHOLE SYSTEM OF INTENDED CONTROLS HAS NOT BEEN IMPLEMENTED. WE
ARE NOW DOING OUR BEST TO REMEDY THIS SITUATION AND TO PROTECT
THIS TECHNOLOGY FROM OUR ADVERSARIES AND THUS PRESERVE OUR QUALI-
TATIVE LEAD IN CRITICAL DIGITAL TECHNOLOGIES.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
592
A MOST PRESSING TASK AT THIS JUNCTURE IS TO PUT THE VHSIC
PROGRAM UNDER THE PROTECTION OF THE INTERNATIONAL TRAFFICE IN ARMS
REGULATION (ITAR), AS THE CONGRESS INTENDED, WE ARE WORKING WITH
THE STATE DEPARTMENT TO ACCOMPLISH THIS. OUR IMMEDIATE TASK IS TO
PROTECT THE TECHNICAL DATA AND MILITARY HARDWARE THAT IS NOW BEING
DEVELOPED BEFORE IT IS TOO LATE TO PREVENT THE DISSEMINATION OF
THESE TECHNOLOGIES TO OUR ADVERSARIES. TO DO THIS, WE MUST PUT THE
VHSIC DEVICES THAT HAVE ALREADY BEEN DESIGNED AND THE SUPPORTING
TECHNICAL DATA ON THE MUNITIONS LIST, TO ENSURE PROTECTION UNDER
THE ITAR. SOME LEGAL PROBLEMS ARE INVOLVED IN DEFINING JUST WHAT
CAN BE COVERED UNDER THE ITAR, BUT WE ARE CONFIDENT THAT THESE CAN
BE SOLVED.
IN THE INTERIM, WE ARE TAKING STEPS TO SAFEGUARD THIS TECH-
NOLOGY THROUGH THE USE OF THE EXPORT ADMINISTRATION REGULATIONS
(EAR). THIS WILL REQUIRE UNDERTAKING SOME IMPORTANT REVISIONS OF
THE EAR TECHNICAL DATA CONTROLS AND COMMODITY CONTROL LIST.
FOR SOME ELEMENTS OF THIS PROGRAM, WE BELIEVE THERE IS NO
EFFECTIVE CONTROL SHORT OF CLASSIFICATION. WE HAVE FOUND THAT,
UNDER EXISTING CONTROLS, MUCH OF THE LITERATURE, SOFTWARE, AND
HARDWARE CANNOT OTHERWISE BE FULLY .2ROTECTED. NEITHER THE ITAR
NOR THE EAR ARE EXEMPT FROM ACCESS TO THIS SENSITIVE TECHNICAL
DATA THROUGH THE FREEDOM OF INFORMATION ACT. MEMBERS OF THE PUBLIC
CAN EASILY OBTAIN INFORMATION BY MERELY INVESTING A 20 CENT STAMP
AND THE TIME NECESSARY TO WRITE A SHORT LETTER. ONCE THIS INFOR-
MATION IS OBTAINED, IT CAN EASILY BE PASSED TO THE SOVIETS, OR PUT
IN THE PUBLIC DOMAIN WHERE IT CANNOT BE PROTECTED. IT IS PARTICU-
LARLY IMPORTANT THAT WE PROTECT THOSE INDICES AND LISTS WHICH GIVE
AN OVERVIEW OF THE PROGRAM, AND ALLOW OUR ADVERSARIES TO PINPOINT
THOSE PARTS OF THE PROGRAM THAT ARE PARTICULARLY USEFUL TO THEM.
IF OUR ADVERSARIES OBTAIN ANY OF THIS ADVANCED TECHNOLOGY, WE WANT
TO MAKE SURE THEY DO SO ONLY AFTER EXERTING THE MAXIMUM OF TIME
AND EFFORT. WE ARE SENSITIVE TO THE NEED FOR CONTRACTORS AND OTHERS
WORKING ON THE PROGRAM TO HAVE ACCESS TO THE DATA AND INFORMATION
THAT THEY NEED, BUT WE BELIEVE THAT THROUGH SELECTIVE CLASSIFICATION
WE CAN CONTROL ELEMENTS OF THE PROGRAM DIRECTLY ASSOCIATED WITH OUR
FUTURE MILITARY SYSTEMS.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
593
TO PROTECT AND MONITOR THE VHSIC PROGRAM, WE HAVE FORMED A
VHSIC WORKING GROUP ON EXPORT CONTROL WHICH I CHAIR. THE WORKING
GROUP IS NOW WORKING TO SELECTIVELY APPLY THE NEEDED CONTROLS. WE
INTEND TO USE THE MINIMUM CONTROLS COMPATIBLE WITH PROTECTION OF
THIS TECHNOLOGY. THE GROUP HAS ALREADY PROPOSED CLASSIFICATION OF
ELEMENTS OF THE VHSIC PROGRAM AND HAS DEVELOPED DOCUMENTATION ALLOWING
PORTIONS OF THE VHSIC PROGRAM TO BE CONTROLLED UNDER THE ITAR. WE
STILL HAVE A GREAT DEAL TO DO BEFORE WE ARE SATISFIED THE PROGRAM
IS APPROPRIATELY COVERED. BUT, WE BELIEVE, THE EXPERIENCE OF THE
WORKING GROUP, AND THE TECHNIQUES BEING USED, WILL BE OF IMPORTANCE
WELL BEYOND THE VHSIC PROGRAM. WE INTEND FULLY TO USE THE SAME
MODEL TO PROTECT OTHER EMERGING TECHNOLOGIES SUPPORTED BY THE
DEPARTMENT OF DEFENSE.
I WOULD LIKE TO TURN NOW TO AN IMPORTANT SOURCE OF THE SOVIETS'
ABILITY TO ACQUIRE SOPHISTICATED WESTERN TECHNOLOGY. ENERGY EXPORTS
TO THE WEST, PRIMARILY NATO EUROPE, CURRENTLY PROVIDE ABOUT HALF
THE HARD CURRENCY EARNINGS FOR THE SOVIET UNION. WHILE MOST SECTORS
OF THE SOVIET ECONOMY ARE STAGNANT, ENERGY REMAINS A BRIGHT SPOT.
ONE PARTICULARLY PROMISING AREA IS NATURAL GAS AND THE SOVIETS ARE
PLANNING TO DOUBLE THEIR SALES TO WESTERN EUROPE BY BUILDING A
MASSIVE PIPELINE FROM WEST SIBERIA TO WESTERN EUROPE. WHEN THIS
PROJECT IS COMPLETED IT WILL GENERATE SOME $8 BILLION PER YEAR IN
NEW REVENUES. ABOUT 25 PER CENT OF WESTERN EUROPE'S IMPORTED GAS
WILL THEN COME FROM THE USSR AND IN THE CASE OF SOME COUNTRIES,
SUCH AS WEST GERMANY, THE FIGURE WILL BE EVEN HIGHER.
WE ARE NATURALLY CONCERNED ABOUT THE POTENTIAL FOR POLITICAL,
ECONOMIC, AND EVEN MILITARY MANIPULATION WHICH SUCH LEVELS OF
ENERGY DEPENDENCE IMPLY. WE ARE ALSO PERPLEXED AS TO WHY SO MANY
OF OUR NATO ALLIES ARE EAGER TO TIE THEMSELVES TO A HIGH PRESSURE
56-INCH UMBILICAL CORD TO THE SOVIET UNION WHEN ADEQUATE, ECONOMIC,
AND RELIABLE ALTERNATIVES EXIST IN THE WEST. THE NORTH SEA ALONE,
FOR EXAMPLE, COULD SUBSTITUTE FOR MOST OF THE ENERGY FROM THE WEST
SIBERIAN PROJECT AND AT THE SAME TIME PROVIDE JOBS AND ECONOMIC
STIMULUS TO THE WEST. FURTHERMORE, ALL THE HARD CURRENCY GENERATED
BY GAS SALES WOULD REMAIN IN THE INDUSTRIALIZED DEMOCRACIES AND
NOT FLOW TO THE EAST. OTHER WESTERN OPTIONS, ARCTIC GAS, AMERICAN
COAL, AND GAS AND OIL FROM LATIN AMERICA, AFRICA AND ELSEWHERE,
ALSO EXIST.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
594
THE SIGNIFICANCE OF THE WEST SIBERIAN PROJECT FOR TECHNOLOGICAL
ACQUISITION FROM THE WEST IS ENORMOUS. WITHOUT THE REVENUES FROM
THE NEW GAS SALES THE SOVIETS' FINANCIAL SITUATION WOULD DETERIORATE
GREATLY. AT A TIME WHEN ENERGY PRICES ARE DEPRESSED AND RAW MATERIAL
EXPORT EARNINGS ARE DOWN, WHEN SOVIET CROPS ARE FAILING AND WHEN
EASTERN EUROPE IS ON THE VERGE OF BANKRUPTCY, NEW GAS SALE EARNINGS
ARE CRITICAL TO THE SOVIET HARD CURRENCY POSITION. REVENUES FROM
THE WEST SIBERIAN PROJECT ALONE, FOR EXAMPLE, WILL FINANCE MORE
THAN ALL THE MACHINERY AND EQUIPMENT IMPORTS THE USSR PURCHASES
FROM THE WEST EACH YEAR. WHILE WE WOULD EXPECT THE SOVIETS TO
DEFER SOME OTHER PURCHASES IF THEY DID NOT HAVE THESE PIPELINE
REVENUES, IT IS CLEAR THAT DEFENSE-RELEVANT IMPORTS, PARTICULARLY
ITEMS OF SOPHISTICATED TECHNOLOGY AVAILABLE ONLY FOR HARD CURRENCY,
WOULD BE ADVERSELY AFFECTED BY THE LOSS OF NEW NATURAL GAS SALES TO
WESTERN EUROPE.
ANOTHER MAJOR PROBLEM WITH THE PIPELINE IS THE LEVERAGE THAT
PARTICIPATION IN THE PROJECT GIVES TO THE SOVIETS IN TECHNOLOGY
ACQUISITION. WITH A $10-15 BILLION INVESTMENT IN THE PROJECT, IT
WILL BE HARDER FOR THE WESTERN EUROPEANS TO REFUSE SOVIET REQUESTS
FOR TECHNOLOGY, WHERE THE DOLLAR AMOUNTS ARE SMALL BY COMPARISON.
IT IS DIFFICULT TO REFUSE A REQUEST FOR A $1 MILLION COMPUTER WHEN
YOUR CLIENT HAS JUST PLACED AN ORDER FOR $1 BILLION IN PIPE!
FURTHER DOWN THE ROAD, WHEN BILLIONS OF DOLLARS IN NATURAL GAS ARE
WARMING WEST EUROPEAN HOMES, GENERATING ELECTRICITY, AND RUNNING
FACTORIES, IT WILL ALSO BE DIFFICULT TO TURN DOWN REQUESTS FOR
SENSITIVE TECHNOLOGIES AND EQUIPMENT. SINCE THIS PROJECT IS SLATED
TO LAST TWENTY YEARS OR MORE, WE SEE IT HAVING AN IMPACT ON FUTURE
PROPOSALS TO TIGHTEN TECHNOLOGY CONTROLS OR EVEN MAINTAIN THEM FAR
INTO THE FUTURE.
I HAVE COVERED QUITE A VARIETY OF OUR EFFORTS TO DATE. CLEARLY,
WE DO NOT HAVE ALL THE ANSWERS. WE NEED ASSISTANCE FROM THE CONGRESS
IN TERMS OF RESOURCES ADEQUATE TO THE TASK AND THE LEGISLATIVE
BASIS FOR OUR EFFORTS. AS YOU WEIGH OUR REQUESTS FOR SUCH ASSISTANCE,
YOU MAY WISH TO CONSIDER THE IMPLICATIONS OF THESE EFFORTS FOR
U.S. NATIONAL STRATEGY. ONE APPROACH MAY BE TO ASK WHAT THE
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
595
-18-
ALTERNATIVES MIGHT BE. IF WE ARE FACED WITH A SITUATION IN WHICH
THE SOVIETS ACHIEVE QUALITATIVE PARITY WITH US IN TERMS OF THE
CAPABILITIES OF OUR WEAPONS SYSTEMS, THEN WHAT NATIONAL STRATEGY
OPTIONS REMAIN TO US? WHAT STRATEGY COULD WE SUSTAIN? WOULD WE BE
FACED WITH A CHOICE BETWEEN MATCHING THE SOVIETS MAN FOR MAN AND
TANK FOR TANK, OR ABANDONING OUR ALLIES AND DEFENDING AMERICA AT THE
'EASTERN SHORE? WE BELIEVE THAT MAJOR IMPROVEMENTS IN TECHNOLOGY
TRANSFER CONTROLS WOULD BE FAR MORE ECONOMICALLY EFFECTIVE AND
POLITICALLY ACCEPTABLE THAN THE ALTERNATIVE MILITARY SOLUTIONS.
\I
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
596
STATEMENT OF LAWRENCE J. BRADY
ASSISTANT SECRETARY OF COMMERCE
FOR TRADE ADMINISTRATION
BEFORE THE SENATE
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
May 12, 1982
I am very pleased to have the opportunity to testify before
this subcommittee on an issue which is of vital concern to the
Reagan Administration: technology transfer from the West to
the Soviet Union. Only now, as a nation, are we beginning to
understand the extent of these technology transfers during the.
past decade, and the contributions such transfers have made to
strengthening the Soviet military-industrial base.
Stopping the extensive acquisition by the Soviets of sensitive,
dual-use Western technology in ways that are both effective and
appropriate in our open society is one of the most complex and
urgent issues facing America and the rest of the Free World
today. Moreover, only now are we beginning to recognize that
the technology transfer issue is much more than just an
enforcement problem.
Apart from strengthening enforcement, in order to deal
successfully with the increasing Soviet effort to acquire
advanced Western technology, we need to:
o Understand what technology the Soviets need, how such
acquisition has helped the Soviet Union achieve its
goal of military superiority, and what methods the
USSR is using to obtain it;
o On a multilateral basis, marshall the support and
commitment of our allies to prevent further technology
leakage to the Soviet Union by Western industrial
concerns and by U.S. subsidiaries and licensees
operating abroad;
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
597
? Build up our counterintelligence efforts to counteract
the Soviet intelligence organization;
o Work closely with industry segments involved in the
development production of high technology to assess
ways of retarding the growing industrial security
problem; and
o Examine all possible avenues for identifying and
protecting defense sensitive technologies, including
technical documents, which are not now subject to our
classification system.
Mr. Chairman, we are now approaching the problem on all these
and other fronts. I want to emphasize that today we are in a
far different strategic, political, and technological
environment than the one that shaped our export control system
30 years ago.
Strategically, we need to recognize that the USSR is far more
powerful militarily than the nation we faced at the end of
World War II, and is'far more capable of procuring and applying
our latest technological advances. We could not, however,
take adequate protective action until we had accurately
assessed the nature of that threat. Therefore, one of the
first actions taken by the Administration was to request the
intelligence agencies to prepare a comprehensive analysis of
Soviet technology acquisition methods.
Not until the Fall of 1981, when we started to receive these
analyses, did we begin to appreciate the magnitude of Soviet
activities against the West. In April of this year, the C.I.A.
released the unclassified version of its report, "Soviet
Acquis:tion of WesLern Technology," which verified the fact
that the USSR's efforts were massive and planned at the highest
levels of government, KGB and the military.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
598
It now appears that the USSR is placing greater emphasis on the
procurement of production equipment technology, as opposed to
actual weapons designs in some cases. The commercial sector,
which generally is not adequately protected against penetration
by hostile intelligence services, is being targeted.
Industrial espionage has become one of the most productive
areas for Soviet and East European intelligence services. We
anticipate greatly enhanced activity in automobile technology,
energy, chemicals, consumer electronics, and computers.
Politically, we face a much more formidable task in working
with our allies to stem the flow of security sensitive
technology to the USSR. For them, trade in high technology
products means relief from the growing pressures of high
unemployment. The past ten years of Detente and expanded trade
with the USSR has also created interdependence and
vulnerabilities in the West to subtle and ,not-so-subtle Soviet
blandishments to ignore national security in favor of
commercial considerations. Also, the pressure to export and to
retain access to the Soviet market is, for certain industries
within these countries, enormous.
Revolutionary advances in technology and in the structure of
business enterprises have also created enormous new obstacles
for our efforts to regulate strategic trade with the Warsaw
Pact. The rate at which new technologies are conceived and
applied to industrial process continues to accelerate. We are
in the midst of perhaps the most rapid period of technological
advance in human history.
The private sector has now risen to prominence in technology
leadership, with the governments following behind.
Leading-edge technology -- once primarily generated by the
military -- is now frequently developed first in the civilian
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
599
? sector. It has thus become more difficult for national
governments to control the dissemination of technology to
foreign recipients. Identification and protection of new and
emerging technology remains one of our toughest challenges.
At the same time, the rise of multinational corporations,
combined with the speed of modern communications and
transportation, has intensified the proliferation of advanced
technology. Overseas corporate acquisitions, joint ventures,
manufacturing associations, cross licensing, multinational data
communications transfers all make the task of national
enforcment more difficult.
We also discovered that Third country diversions constitute the
largest source of illegal transfers to controlled destinations,
.far exceeding the number of illegal shipments from the United
States. It therefore became obvious that the magnitude and
international scope of technology leakage far exceeds our
previous assessments.
Mr. Chairman, this Administration, even prior to taking office,
was acutely aware of the technology transfer problem. In the
months since assuming office, we have moved systematically to
ascertain the threat posed by this leakage, to ascertain how
the Soviets and East Europeans are working to acquire Western
technology, and finally taken remedial actions to deal with
this matter. Since the major bulk of the technology transfer
problem is international, we addressed that aspect first.
At the Ottawa Summit in July 1981, President Reagan made a
personal appeal to the leaders of Europe, Canada, and Japan to
join with us in this endeavor. As a result, agreement was
reached to hold a high level meeting of the Coordinating
Committee (COCOM) -- the first in twenty-five years -- to
discuss the U.S. proposals.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
600
This meeting, in which Commerce played a key role, took place
in January of this year. Important progress was achieved.
There is now a political commitment from our COCOM partners
which will serve as the foundation for refocusing and
strengthening international control efforts toward critical
technologies and equipment.
Such a commitment is vital to the mutual security of the West.
.COCOM controls have played a major role in stemming the tide of
technology transfer to the East, and have proved most
successful in the computer area. As a consequence of these
controls, the Soviets lack the most advanced Western computers,
even though such computers have been commercially available in
the West for more than a decade.
Since the high level meeting we have devoted many months to
striving for tighter controls on lege/ sales and increased
enforcement efforts within COCOM member countries. We have
stressed, and our fellow COCOM members agree, that without
immediate remedial action, the growing leakage of technology
from the West to the USSR would reach proportions too great to
rectify.
This Administration has repeatedly pointed out that our
short-sighted export licensing policies during the detente of
the late sixties and early seventies has encouraged the most
extensive raid on Western technology by the Soviet Bloc since
World War II. In the process, they have gained expertise in
electronics, computer sciences, manufacturing techniques,
aviation, and a host of other disciplines that has been of
incalculable value to their military establishment and, thus,
of immeasurable harm to our own interests on this planet.
There is no conceivable way in which our short-term financial
..gains could ever balance the damage done to our national
security as a result of past export control policies.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
601
Thus, Mr. Chairman, these hearings come at a propitious time.
The security of the Free World demands responsible, united
action by Free World governments to deprive our adversaries of
those industrial and technical tools they covet. It is in this
spirit that I welcome the hearings and the review conducted by
your staff of Commerce's compliance organization.
I have reviewed the Minority Staff report. Based on both my
experience as Assistant Secretary and my earlier tenure as
Acting Director of the Office of Export Administration, I agree
that the report has identified some of the fundamental problems
in the Commerce enforcement mechanism. The Staff Report is a
useful historical document in that respect. Unfortunately, it
only addresses a small part of the technology transfer
problem. Moreover, it does not recognize that the policies of
this Administration represent a sharp change from the practices
of the past; that we view the pressing need for more effective
control as a top priority.
The report also does not address the organizational realignment
and enhancement of the Compliance Division we now have underway
I must also disagree with the report's assertion that Commerce
has trade promotion as its major objective to the detriment of
enforcing the Export Administration Act. From the President on
'down, the clear policy is that trade must be carefully weighed
against national security considerations. I would not object
if you said past administrations emphasized trade promotion
over all other concerns. I, too, was a severe critic of such
past practices. But we are in the present; circumstances have
changed.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
602
Within the organization that I oversee, Trade Administration,
our management focus has been on effective and efficient
execution of our regulatory mission.
On the Import Administration side, we are charged with
enforcement of the laws governing unfair trade practices. Our
mission was spelled out unambiguously by the Congress in its
deliberations leading to passage of the 1979 Trade Agreements
Act. In transferring this function to the Department of
Commerce from Customs, Congress instructed us to protect
American industry from injurious and unfair foreign trade
practices by administering the countervailing duty and
antidumping laws of the Unites States; and, before its
suspension, the provisions of the Steel Trigger Price
Mechanism. This we are doing.
The challenges were similarly pressing in Export
Administration. Various factors had combined over the past
several years to cause unacceptable delays in the processing of
export license applications. These factors ranged from a lack
of clear policy guidance to a simple manpower shortage.
However, Congress and the private sector had become
increasingly critical with respect to the delays and
bottlenecks encountered in the licensing process.
In the early days of this Administration, both Secretary
Baldrige and Under Secretary Olmer told me to solve the serious
backlog problem we had inherited so that, by the end of fiscal
year 1981, the number of application not processed within the
statutory deadlines would be reduced to as near zero as
possible.
To this end we dedicated ourselves, mustering the necessary
resources, enlisting the temporary aid of the Department of
Defense's export licensing analysts, and streamlining the
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
603
administrative inhibitions to getting the job done. The result
by last October was elimination of the backlog of over 2,000
cases and maintenance in the six months since then of only a
modest number of extraordinary cases in process beyond the
statutory timetables.
Our thesis was, and remains, that export controls can be both
effective and efficient; export controls should reflect clear
Administration policies and be applied with reasoned judgment
.by technically qualified people using that policy guidance.
These are instances of the Reagan Administration's proven
ability to reverse some serious regulatory obstacles of the
past and to make the export control system function in the
manner .originally intended by Congress.
We also took steps to evaluate the enforcement function of the
Office of Export Administration in order to improve its
performance. Approximately one year ago, Under Secretary Olmer
asked the Inspector General of the Commerce Department to
undertake an independent review of the programs, functions, and
activities of the Compliance Division. As Inspector General
Funk has explained to your staff, other priorities precluded
such a survey at the time. Last month, however, Mr. Funk
directed. his staff to conduct the inspection. We expect to
receive the Inspector General's findings and recommendations
before the month is out.
Customs has upgraded the inspection effort, and I am pleased to
announce today the organizational realignment and enhancement
of the Compliance Division. The Division is itself being
elevatsd to Office status and, together with the Office of
Antiboycott Compliance, will comprise a new export enforcement
organization to he headed by a Deputy Assistant Secretary
reporting directly to me. The candidate we have selected for
that post is currently an Assistant U.S. Attorney for the
Central District of California. Theodore W. Wu is a celebrated
expert in the law enforcement community whose successful
95-929 0- 82 - 39
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
604
prosecutions of two of this country's most notorious export
diversion cases render him highly qualified for this
considerable undertaking.
In addition, with recent Congressional approval in February of
our proposed reprogramming, the resources of the Compliance
Division have been increased by about 40% and new field offices
are being established In San Francisco and Los Angeles to
supplement our Washington Headquarters and New York Field
Office.
In summation, Mr. Chairman, it is our belief that the
Administration, in office now for little more than 14 months,
has a deliberate and sensible, yet ambitious, program to
upgrade and revitalize the nation's export control enforcement
efforts. Our emphasis will be leanness and efficiency; we
don't envision it ever becoming a major law enforcement
bureaucracy housing competing missions. Rather, ours will be
an office well coordinated with the intelligence community and
other enforcement agencies reflecting the comprehensive thrust
of 'Soviet acquisition methods. Yet it will exist in an
environment that is highly integrated with the other components
of the government's international trade promotion and
regulation sectors.
The value of Commerce's close relationship with the private
sector should not be understated. As any witness from the
enforcement community will verify, the information provided by
the business sector is an essential element of an effective
enforcement effort. This partnership exists in no other
agency. The historicaL ties between the Department of Commerce
an U.S. business, along with the new steps I have outlined
regarding the strengthening of our enforcement office, make it
not only the ideal, but the only logical agency to carry on the
primary enforcement function mandated by the Export
Administration Act.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
605
Mr. Chairman, I want to commend you for your interest in this
vital area, and I encourage you and others in Congress to join
with us in this Administration's effort to improve our export
control system. If you do, our partnership will go far in
enhancing the security of our nation and the Free World.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
606
REPORT OF INSPECTION
COMPLIANCE DIVISION
OFFICE OF EXPORT ADMINISTRATION
INTERNATIONAL TRADE ADMINISTRATION
Prepared by
Office of Inspector General
U.S. Department of Commerce
June 11, 1982
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
607
UNITED STATES DEPARTMENT OF COMMERCE
Office of Inspector General
Office of Investigations
I. REPORT OF INSPECTION
A. BASIS FOR THE INSPECTION
On April 13, 1982, the Inspector General directed that an
inspection be made of the Office of Export Administration's
Compliance Division, which oversees the enforcement of export
controls for the U.S. Government. The inspection was a direct
result of continuing concern of Under Secretary for International
Trade Lionel H. Olmer and Inspector General Sherman M. Funk
regarding the Department of Cogmerce's enforcement of tne Export
Administration Act of 1979. The inspection was conducted during
the period April 19 through 30, 1962.
B. INSPECTION TEAM
The inspection was conducted under the supervision of Michael M.
Ryman, Assistant Inspector General for Investigations. The
inspection team included two criminal investigators, two
auditors, and a management analyst from the Office of Inspector
General. Personnel for this inspection team were selected to
provide a wide range of both technical expertise and professional
judgment.
C. SCOPE OF THE INSPECTION
The focus of the inspection was on present operations, resources
and management of the Office of Export Administration's
Compliance Division (OEA/CD). Assessment of the overall
effectiveness of 0EA/CD and the Department's responsibility to
enforce the Export Administration Act was limited by the two-week
length of the inspection, the immediacy of the Division's current
problems, and the Department's plans to reorganize and strengthen
the compliance effort in the next few months. The Office of
Inspector General intends to follow up this inspection with a
more detailed management audit of 0EA and 0EA/CD operations after
the reorganization has been implemented, to ascertain the
latter's impact on the effectiveness of the Compliance function.
Our inspection of 0EA/C0 included a review of the following:
- Goals and objectives of the compliance program, and the
criteria used by management to determine their achievement;
- Procedures for identifying, initiating, and conducting
compliance inspections and investigations, and the use made
of the results;
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
608
Pertinent laws and directives, budgets and
reports;
financial
Conditions existing within the Compliance operation which
might be hindering the Division's ability to carry out its
mission.
The inspection team conducted its evaluation through interviews
in Washington, D.C. with key management, supervisory and DEA
operational staff (e.g., investigators, inspectors, intelligence
workers, and support personnel), representatives of the U.S.
Customs Service, and intelligence community liaison personnel.
The team reviewed operational records, management information
reports, procedural and policy guidelines, and other pertinent
documents. Past evaluations of the 0EA/CD -- prepared by the
Department of Commerce, General Accounting Office, and others --
were also reviewed.
Classified information was reviewed during the course of the
inspection, but this report contains no classified information.
U. BACKGROUND ON THE COMPLIANCE DIVISION
The Office of Export Administration's Compliance Division
(DEA/CD) is responsible for enforcing the provisions of the
Export Administration Act of 1979 (50 U.S.C. 2401, et seg.),
except for those provisions relating to foreign boyTTitihich
are enforced by the Office of Antiboycott Compliance. Both
offices are part of the Department's International Trade
Administration.
The OEA/CD is responsible for the prevention of unauthorized
exports from the United States. This includes leadership of a
multiagency enforcement effort; the development of information
regarding possible export control violations; the investigation
of suspected violations; preparation of violation cases for
Department of Commerce administrative proceedings before the
Hearing Commissioner; and the referral of cases to the Justice
Department for criminal prosecution. The Compliance Division is
also responsible for preventive enforcement activities and an
ongoing program to educate exporters on export control
regulations.
The DEA Compliance Division presently has three branches.* The
primary functions of each are outlined below:
* The International Trade Administration has announced its
intention to reorganize the Compliance Division and to raise the
function to a higher level under,a new Deputy Assistant Secretary
for Export Enforcement. The exact realignment plan and schedule
are not yet available.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
609
1. Intelligence Branch -- develops intelligence
Information regarding areas of possible export
administration violations; collects intelligence
data on overseas firms and individuals in order
to identify and evaluate their suitability and
reliability as recipients of U.S. exports;
2. Investigations Branch -- investigates suspected
export administration violations; in consultation
with the Department's Office of General Counsel,
prepares cases on violations for referral to the
Hearing Commissioner or for other legal action;
3. Facilitation Branch -- conducts on-site physical
Inspections of cargo for evidence of export
control violations; prom6tes compliance with
export clearance regulations; maintains liaison
with the U.S. Customs Service, Census Bureau and
Postal authorities.
Until recently, the U.S. Customs Service provided limited
investigative and inspection support on a reimbursable basis to
0EA/CD. The U.S. Customs Service, with its initiation of Project
EXODUS, has greatly expanded its own role in export compliance
enforcement over the past 18 months.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
610
II. SUMMARY OF FINDINGS
The inspection team found the Office of Export Administration's
Compliance Division (0EA/CD) impaired by numerous internal and
external problems which severely hamper its ability to enforce
controls on U.S. exports. These problems include:
No comprehensive appraisal of or effective overall
strategy to address the Nation's technology leakage
problem;
Insufficient trained personnel;
Inadequate management direction and oversight;
Failure to use modern, state-of-the-art intelligence,
investigative and enforcement techniques and systems;
Lack of strong leadership and clear lines of
organizational responsibility within 0EA/CD;
Unwarranted interference in the detailed conduct of 0EA/CD
investigative operations by the Deputy Assistant Secretary
for Trade Administration;
Inadequate cooperation and coordination with the U.S.
Customs Service and vital information sources in the U.S.
intelligence community;
Inadequate travel funds, law enforcement equipment and
other support resources; and
Use of antiquated or inefficient internal administrative
and management systems and procedures.
Many of the problems highlighted in this report have been
identified in earlier reviews provided to ITA management. The
Department of Commerce has failed to correct these problems
despite strong public statements by the present and past
Administrations in support of tight controls over the export of
high and dual-use technologies. This failure raises serious
questions about the Department's commitment to, and ability to
enforce, the Export Administration Act of 1979.
The inspection team repeatedly was advised that the problems it
noted reflect the Department's dual and possibly conflicting
missions of trade promotion and export control. The team was not
able to reach this conclusion unequivocally. It is clear,
however, that the Department's failure to provide adequate
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
611
resources, policy guidance and management direction has impeded
the compliance effort and produced at very least the perception
of a de facto supremacy of the trade promotion mission over the
Departments exportcontrol function.
What is also clear, from the findings in this report, is that the
Department of Commerce has not taken a bold lead in forging an
aggressive multi-agency effo-rt to halt the illicit export of
controlled products.
ITA Response
The International Trade Administration has reviewed the draft
inspection report and concurs with most of the findings and
recommendations. ITA's comments, which are provided in their
entirety as an addendum to this report, emphasize that corrective
action has already been initiated to address many of the problems
cited in this inspection report. Other improvements are planned
for the near future.
The Inspector General has asked the Under Secretary for International
Trade to submit, within 60 days, a detailed implementation plan
for each of the inspection report recommendations. The Office
of Inspector General will followup on IA's planned corrective
action and will, within the coming year, conduct a review to
assess the Department's progress in improving enforcement of
export controls.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
612
III. DETAILED FINDINGS
A. UUAL MISSIONS: TRADE PROMOTION AND EXPORT CONTROL
Finding # I
There is a widespread perception that a oasic conflict exists
between the trade promotion goals of ITA (on the export
development side) and the agency's trade restraint goals (on the
export administration side). This conflict is interpreted by
many observers as a major reason for inadequate commitment of
Commerce resources to the enforcement function in 0EA/CD.
Discussion
Virtually without exception, each of the staff interviewed in
DEA, 0EA/CD, the Office of General Counsel and the U.S. Customs
Service referred to this conflict and acknowledged its impact --
real or perceived.
The primary mission of ITA is to foster exports, as part of
the Department's overall goal to promote U.S. domestic and
international business. Tnere appears to be an inherent internal
conflict when the same agency harbors within its structure
organizations charged with pushing export trade and other
organizations charged with restraining it, through a regulatory
licensing function and the interdiction of illicit exports. Some
critics have accused the Department of consciously maintaining a
weaK enforcement effort, of being less than enthusiastic in
blocking the sale and export of controlled products, even those
in the high-tech area.
The Assistant Secretary for Trade Administration recently
testified that such criticism was wholly unwarranted. He
emphasized that the Department's trade policy must be delicately
balanced against national security considerations. We found no
evidence of any ITA policy pointed toward weakening export
controls in favor of export promotion. On the other hand, we
found no evidence that the "delicate balance" referred to, or the
Department's dual commitment to trade promotion and export
control, have yet been translated into adequate staffing
resources and management priorities for enforcement of the Export
Administration Act. We did find ample evidence that those
involved in implementing the Act, both inside and outside the
Commerce Department, perceive the long history of inadequate
enforcement as a manifestation of a lower priority vis-a-vis
export promotion.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
613
Recommendation
A stronger policy commitment, backed up by significantly
increased manpower resources and more aggressive management,
should be assigned to the control of illicit exports. The
projected realignment of the compliance function in ITA must
include enhanced organizational stature as well as sharply
increased resource commitments. The problems arising from past
inadequacies cannot be corrected by rhetoric; only effective
enforcement of the Export Administration Act can erase the
conflict -- real or perceived -- between the Department's trade
promotion and enforcement missions.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
614
B. INADEQUATE RESOURCES AND OPERATIONS
Finding #2
The lack of operational travel adversely affects the quality and
scope of criminal investigations conducted by the Compliance
Division, compounding the problems created by a shortage of staff
resources.
Discussion
The Investigations Branch has less tnan 12 special agents to
cover the entire United States. Most of 0EA/CD's investigations
are conducted by telephone and correspondence, handled out of the
Washington, D.C. Headquarters office. A restrictive travel
practice has developed in 0EA/CD through the years and is a
serious impediment to an effective investigative program.
Investigators have been limited in their travel and must wait for
inspectors from the Facilitation Branch to travel to an area to
work investigative cases as a side-track from their normal
inspection duties.
Operational travel is essential to an adequate pursuit of
investigative leads. This requirement for travel is universally
recognized by law enforcement agencies. In most 0EA/CD cases
examined by the inspection team, investigator travel was
necessary. In many instances, however, the 0EA/CD travel
requests were not approved. This has resulted in delays or
termination of investigations, and has allowed continued criminal
activity and nonenforcement of the export laws.
Examples of lost opportunities for enforcement and prosecution of
export control violations are not diffiicult to find. One recent
denial of an 0EA/CD agent's travel request has permitted a
consortium of companies to continue their illegal export of hign
technology products to the U.S.S.R. and Communist Block countries
via several European intermediaries; the Assistant U.S. Attorney
willing to prosecute this case remains without the necessary
investigator to work his case. Another agent's request for
travel to the West Coast was denied despite substantial evidence
of unlicensed shipment of micrb chips and other restricted items.
This travel denial was made by 0EA/CD management with the
suggestion that the case be followed through the mail.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
615
Recommendation
More agents are needed to investigate export violation cases.
The Assistant Secretary for Trade Administration should conduct a
review to determine an adequate level of staff for this function,
as well as other functions of the Compliance Division. Such
adequate staffing should be provided as soon as possible, if
necessary by shifting other ITA resources, obtaining personnel
detailed from other agencies, and/or requesting an emergency
budget supplement.
0EA/CD operational travel should be approved and taken as
necessary in pursuit of criminal cases. Adequate management
systems and controls should be established to insure that
domestic travel can be taken in a timely manner. International
travel should be similarly approved where justified, particularly
when U.S. Customs Service or other appropriate U.S. overseas
investigative personnel are not available.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
616
Finding # 3
The Assistant Secretary for Trade Administration has been
unreasonably slow in establishing Export Compliance Field Offices
on the West Coast.
Discussion
Approximately 86 percent of the total value of U.S. controlled
exports leave from West Coast ports and airports. Despite the
bulk of these known export violations and the concentration of
high technology manufacturers in the "Silicon Valley" and other
West Coast areas, 0EA/CD investigations and inspections are now
performed there only a few weeks a year.
About one year ago, the Assistant Secretary for Trade
Administration announced plans to establish 0EA/CD field offices
in Los Angeles and San Francisco, each staffed with a trained
team of compliance investigators and inspectors. ITA records of
July 1981 show that the Under Secretary for International Trade
had discussed this plan with the Secretary who gave full support
for the idea and stressed the need to accelerate tne proposed
operation.
On August 3, 1981, a Newsweek article mentioned the establishment
of West Coast field ol?fIZT--Ey Commerce as a means to help combat
hign-technology smugglers. ITA records show that the Assistant
Secretary for Trade Administration advised the Secretary two days
later that the San Francisco and Los Angeles field offices were
scheduled to open October 1, 1981, and both offices would be
fully operational within three to six months. However, these
field offices had not been opened and staffed as of April 30,
1982.
The Assistant Secretary for Trade Administration cites internal
0EA/CD management problems as the reason he did not push ahead
with the West Coast offices last fall. He did not wish to put
new staff and resources out in the field, when DEA/CD was already
engulfed in severe management problems which made it difficult to
manage its existing structure and resources. Within the last
month, the Assistant Secretary has announced a plan to reorganize
the Compliance Division, raise it to office status headed by a
new Deputy Assistant Secretary with a strong law enforcement
background. Plans to open the West Coast offices apparently are
now back on track.
Despite the above explanation for the delays in opening the West
Coast offices, there is no doubt that the Compliance Division's
enforcement of the export law suffered because of the repeated
delays. We believe that the mere presence of additional 0EA/CD
manpower on the West Coast during the past year would have
provided worthwhile deterrence and detection coverage.
Recommendation
ITA management should expedite the establishment and staffing of
Export Compliance Field Offices on the West Coast. These offices
should be staffed with adequate numbers of trained and
experienced investigators and inspectors.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
617
Finding #4
The Compliance Division frequently hires inexperienced
investigators and provides no training for its investigative
staff.
Discussion
The Compliance Division has hired entry-level investigators with
no experience or specialized training, instead of badly needed
journeymen. In one case, an untrained and inexperienced new nire
was allowed to investigate for six months without investigator's
credentials.
Compounding the problems created by inexperienced manpower,
0EA/CD requires or offers no investigative, intelligence or
enforcement training to its investigative staff. There is no
program or materials to provide training to new hires or
journeyman investigators. On-the-job training is also very
limited and only available from individual OEA/CD investigators
who were trained oy other agencies before coming to the
Compliance Division. Some of the investigators had no
investigative training or experience at all when they assumed
their 0EA/CD duties; this is a violation of OPM standard X-118.
Investigators have requested formal training, but it has been
refused because they could not be spared from their normal
duties.
The training program in effect in FY 1980 appears to have been
limited to a report writing course for all special agents, a
short version of a white collar crime course, and a case
management course for the supervisor of the Investigations
Branch. Such training, inadequate then, has Peen further
reduced: financial records show a total expenditure of $24.98
for training of Compliance Division personnel in FY 1981, and no
expenditure at all thus far in FY 1982.
Recommendation
The Compliance Division should develop and implement a formal
training program for all newly hired and present undertrained
personnel. This should include utilization of the Federal Law
Enforcement Training Center and other established law enforcement
training facilities, as well as structured on-the-job training.
A training profile should be developed for each 0EA/CD
investigator to determine his individual training needs. DEA/CD
personnel should be adequately trained in all aspects of law
enforcement, including intelligence, surveillance, investigations
and inspections, judicial proceedings and case handling. The
Department should provide adequate funding for 0EA/CD's training
needs.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
618
Finding #5
The Compliance Division lacks virtually any law enforcement
technical equipment, although such equipment is needed to conduct
investigations effectively.
Discussion
The Compliance Division does not have technical equipment for the
collection of criminal evidence, such as cameras, surveillance
team communications equipment, consensual monitoring and other
law enforcement devices. In the past, when investigative
technical aids were needed, they were either borrowed from other
agencies or were personal equipment loaned by individual
investigators. Past efforts tb procure these essential items
have been unsuccessful.
0EA/CD's failure to obtain required investigative equipment is
particularly difficult to understand inasmuch as 0EA/CD funds for
this purpose have been used to purchase equipment for other 0EA
offices and to furnish 0EA/CD's unoccupied new field office in
Los Angeles. Examination of ITA accounting records maintained by
the Office of Financial Operations, Office of the Secretary,
revealed that $37,445 of approximately $52,000 in office
furniture and equipment charged to the Compliance Division for
the period October 1980 to March 1982 was used for a record
processor microcopier system installed and used in the Operations
Division's licensing activity. Also, office furniture valued at
approximately $1,800 was delivered to the Los Angeles Export
Compliance Field Office, although this office is still neither
open nor staffed.
Recommendation
The Department should purchase the essential investigative
equipment required by the Compliance Division.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
619
Finding #6
The Compliance Division's current intelligence operations are
almost exclusively reactive rather than proactive in nature. An
efficient and effective intelligence operation cannot be
conducted in such a manner.
Discussion
Due to manpower shortages and/or policy and management direction,
OEA/CD has never aggressively developed its own intelligence
leads on potential export violators, or actively solicited such
leads from the intelligence community. The Department should be
directing and/or soliciting a steady flow of information and .
close working cooperation between the Department and the U.S.
intelligence community and COCOM intelligence agencies to
identify targets, patterns and sources of controlled technology
leakage.
In actuality, however, 0EA/CD's Intelligence Branch even fails to
regularly use the information currently available through 0EA's
License Accounting Retrievel System (LARS). The Compliance
Division has taken little or no initiative to work with DEA to
expand and improve its ability to develop "intelligence"
information through the export licensing and other review
processes. The LARS data base could provide a valuable source of
intelligence information. The data base information is
particularly useful for trend and cross-pattern analyses in
detecting illegal transshipments and diversions of goods through
otner countries. In some cases, tne ?EA Operations Division used
LARS data to strengthen ongoing investigative cases. However, to
date LARS or other intelligence data is not systematically being
used by 0EA/CD personnel in a similar manner. One major reason
for this is that the Intelligence Branch currently lacks
sufficient staffing and expertise, including computer
specialists, to undertake this type of intelligence operation.
Recommendation
The Commerce Department and its Compliance Division must increase
its cooperation with and the flow of relevant information from
the U.S. and COCOM intelligence communities, including specific
information on the Soviet Bloc's Western technology import
strategy and targets, exporters of controlled technologies, their
diversionary routes and schemes, and third country participants
in such schemes.
The Intelligence Branch should be given sufficient computer
specialist and analytical staff, and full access to LARS, to
enhance their in-house intelligence operations. The LARS data
base should be expanded to include distribution license
information and other available data which may be useful to the
intelligence operation.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
620
Finding #7
OEA/CD intelligence operations are severely hampered by
o Inadequate and delayed iotelligence analyses of
information or leads on possible export violations.
o A failure to adequately control, protect and centrally
maintain source documentation establishing possible
investigative leads.
Discussion
The Intelligence Branch is responsible for processing, analyzing,
and augmenting information on potential violations of export laws
and regulations for possible referral for investigative action.
Sources of information include ,Application Screen leads referred
from 0EA's Operations Division, voluntary and informant
disclosures, referrals from other agencies, violations discovered
oy the Facilitation Branch, information from the intelligence
community and others.
For the period October 1, 1981 to April 21, 1982, the
Intelligence Branch logged in 598 cases or referrals of potential
violations; only 74 cases were reviewed during that period. In
addition, there are several hundred backlogged cases from prior
years; the Intelligence Branch is currently able to do no more
than store these cases. While the inspection team was unable to
assess the quality of the intelligence reviews conducted on the
74 cases processed, it is not unreasonable to conclude that the
Intelligence Branch is ineffective in providing timely and
accurate assessments of suspected violations. Less than 15
percent of the leads received by the Intelligence Branch were
processed during this one six-month period, and hundreds of leads
from prior years have gone untoucned.
me effectiveness of an intelligence arm of a law enforcement
agency is only as good as its ability to respond in a timely
manner with a careful and informed analysis of the intelligence
information. Failure to do so only thwarts the necessary
followup investigation, possible prevention of the actual export
violation and successful criminal prosecution of or
administrative action against violators. A large backlog in the
Intelligence Branch slows the investigative process since most
investigations are not started without the intelligence referral.
Furthermore, the backlog puts undue pressure on the small staff
in the Intelligence Branch to cut short their intelligence
analyses, close cases prematurely, or forego further information
gathering from the intelligence community or other sources. A
staff of five persons is totally inadequate to provide necessary
intelligence data and analyses on suspected export violations.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
621
The Intelligence Branch's manpower problems are further
compounded by the absence of any systematic review of incoming
cases or information leaks and an internal filing and accounting
system to keep track of the Branch's backlog to ensure that the
cases are handled in order of priority and are not lost or
misplaced. The current system places almost total reliance upon
the memory and judgment of the Chief of the Intelligence Branch
to determine the significance and disposition of the backlog of
potential violations. Little or no effort is made within the
Intelligence Branch to process or prioritize the received
intelligence. It functions as little more than a depository and
ineffective conduit to the investigative section.
Recommendation
Additional manpower should be assigned to the intelligence
function, whether it remains as presently structured or is
relocated to another unit in 0EA, combined with 0EA/C0
investigations or given greater resource assistance from other
intelligence agencies. A review should be made of the entire 0EA
intelligence processes to determine whether intelligence
information is adequate and effectively collected, whether
maximum and timely cooperation is available from all appropriate
segments of the intelligence community, and how the analysis of
intelligence information and leads could be better handled and
expedited to prevent, or at least detect and detain, illegal
export shipments.
Automation of the intelligence gathering and internal filing and
control systems is needed, but more drastic improvements also
must be made to increase the effectiveness and efficiency of the
intelligence operation.
Finally, a special effort must be made to eliminate the current
backlog of Intelligence Branch cases. A special team of
intelligence and investigative agents, perhaps including details
from other agencies, should be assigned this task with clear,
written instructions on how to review these cases and recommend
appropriate action. We suspect that most of these leads are lost
opportunities, Out they contain crucial information on possible
violators, illegal export items, importers and foreign government
or company practices, which should be fed into the current
intelligence data base.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
622
Finding #8
0EA's license application screening, which is vital to the
compliance function, is an antiquated manual process which, in
practice, does little to help detect violations of export laws
and regulations.
Discussion
One of the principal sources of leads for 0EA/C0 investigative
followup is the Application Screen. The Application Screen is a
file containing an alphabetical listing of the names of persons
and/or firms (exporters, consignees, distributors, etc.) which
were previously denied export privileges or are suspected of
illegal exporting activities. Those of national security concern
are also on the list. Additions and deletions of names from the
screen are made by the Operations Division at the direction of
the Compliance Division.
The Application Screen process involves four full-time processing
clerks (three GS-5's and one GS-61 who manually check all the
information on the face of a license application against the
large rotary card screen file. If any of the individual or
business names on the license application match those in the
screen file, the application is referred to 0EA/CD's Intelligence
Brancn.
There are several shortcomings in this vital screening process:
1. Manual operation of the review process provides too many
opportunities for human oversight or error. Names can be
overlooked, or not recognized because of misspelling or
purposeful omission by the applicant without detection by
DEA clerks. Given the volume of applications and the
screen file listings, it is not surprising that human
oversights have resulted in suspect licenses going through
the screen undetected.
2. The present screen name listings are, in large part,
historical. They represent companies or persons involved
in past export violations or suspect cases. A manual
system is not updated with the speed necessary to provide
vital, current intelligence data and information on
today's violators. The current process also does not
screen out the repeat violators who change the name of
their company, use a new intermediary company, change
their own names, or recruit new "principals" for tneir
illegal export operations.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
623
Recommendation
We understand that DEA is now planning an overall review of
computer applications for various DEA functions. Priority should
be given to automation of the screen process and the Compliance
Division's intelligence gathering and internal control needs.
Such automated systems, which can be accessed by all appropriate
agencies, are needed for immediate entry of data on all current
investigations, new violations, and new suspects from the
Intelligence community and other sources. The new automated
screen process should also be aole to go far beyond a simple
match of names; it should help detect deceptive submissions,
omissions or substitutions by applicants, or at least flag tne
more obvious ones for further review.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
624
C. COOPERATION WITH THE U.S. CUSTOMS SERVICE
Finding # 9
Cooperation and coordination between the Compliance Division and
the U.S. Customs Service are inadequate and adversely affect
enforcement of export laws.
Discussion
Strong cooperation between 0EA/CD and the U.S. Customs Service is
essential to effective enforcement of export controls and to
supplement the Compliance Division's insufficient investigative
and inspection manpower in the U.S. and overseas. The 0EA/CD
inspectors must use Customs officials for search and seizure of
suspected cargo, since 0EA/CD inspectors do not have such
authority. Despite the obvious need for cooperation, between the
two agencies, the Compliance Division does not maintain effective
liaison with the U.S. Customs Service. There have even been
efforts by some Compliance Division personnel to avoid
coordination with Customs. ?There have also been incidents of
interagency hostility and investigative case interference by both
the Compliance Division and Customs.
One major source of the hostility has been Commerce's narrow
interpretation of Paragraph 12(c) of the Export Administration
Act and 0EA's unwillingness to disclose confidential licensing
information to Customs and other law enforcement agencies. (See
Finding #11.) Customs-Compliance Division competition and turf
battles have intensified during recent months with Congressional
hearings focused on the enforcement of export laws and
interagency rivalry. The absence of a signed ITA-Customs
interagency agreement for FY 1982 has further hampered their
cooperation. (See Finding # 10.)
Current 0EA liaison with U.S. Customs Service on Project EXODUS
is being handled chiefly by an individual-- an
expert/consultant-- whose efforts are divorced from the
operations of the Compliance Division. Even though the liaison
effort is assisted by the presence of U.S. Customs Service agents
assigned to 0EA, this arrangement is inadequate. (See Finding
#13).
Recommendation
The Assistant Secretary for Trade Administration should make a
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
625
policy commitment to and negotiate strong Customs-OE/CD
cooperation. This commitment must be communicated down through
the ranks of both agencies as operating policy. Written
guidelines and procedures should be developed to support improved
cooperation; they should clearly spell out the jurisdiction of
each agency, how and what constitutes liaison, what arrangements
and resources exist for domestic and overseas support, and what
are the responsibilities and obligations of each agency to a
unified export enforcement effort. (Also see Finding #10.)
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
626
Finding #10
0EA and Compliance Division officials are not aware of the actual
level of support furnished by the U.S. Customs Service for ITA's
export control compliance matters. The transfer of appropriated
funds from the Compliance Division accounts could be excessive.
Discussion
Until January of this year, the U.S. Customs Service provided
investigative, inspection, and administrative support to OEA
under a cost reimbursable interagency agreement with ITA. For FY
1981, at a total cost of $200,000, the U.S. Customs Service
agreed to provide:
- 2 manyears of at-large investigative support
- 2 inspector positions at J.F.K. International Airport
in New York
3 manyears of at-large inspector services at various
posts throughout the U.S.
There is no record of tee actual support provided by the U.S.
Customs Service under this interagency agreement. Lacking this
record, ITA cannot certify that payment to the U.S. Customs
Service is correct and proper, as stated on the Voucher and
Schedules of Withdrawals and Credits (SF 1081). A 1980
management study, conducted by the Deputy Assistant Secretary for
Export Administration, concluded that the U.S. Customs Service
was paid for services it did not provide.
There is no written agreement for U.S. Customs Services to
provide export control compliance support in FY 1982. (HA
cancelled Customs services effective January 15, 1982, and
requested information on the actual services rendered during the
fiscal year to that date. No response had been received from
Customs as of April 30, 1982.
Recommendation
A follow-up request should be sent to the U.S. Customs Service by
the Assistant Secretary for Trade Administration to obtain a
record of actual services rendered by Customs in FY 1982 and
under the FY 1981 interagency agreement. Such documentation is
necessary to support ITA certification that the SF 1081s are
correct and proper for payment.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
627
For all future cost reimbursable interagency agreements with
Customs, or any other agency, OEA and the Compliance Division
should clearly specify in the agreement what services or products
are to be provided at what cost. In addition, DEA or the
Compliance Division should maintain its own cost accounting
records and require monthly charge reports from the provider
agency.
95-929 0 - 82 - 41
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
628
Finding #11
A strict construction or a narrow interpretation of Paragraph
12(c) of the Export Administration Act of 1979, by the Office of
Export Administration and the General Counsel's Office, has
impeded the progress of criminal investigations and prosecutions.
Discussion
Commerce interprets Paragraph 12(c) of the Act to require that
written permission of the Secretary of Commerce must be obtained
in each incident where ITA licensing information is released for
disclosure during a criminal procedure. This policy includes
disclosures to grand juries and U.S. magistrates. It also
includes information placed in statements made in requesting
legal powers; e.g., search warrants. This requirement has
delayed 0EA/CD's release of vital investigative case information
and has been used to justify minimal or delayed cooperation with
the U.S. Customs Service when it requests information in
connection with criminal investigations.
Numerous questions have been raised about the wisdom and legality
of Commerce's interpretation of Paragraph 12(c). We note that the
same restriction applies as well to disclosures of information
regarding munitions and weapons exports under the control of the
State Department. However, the State Department has issued
blanket authority to allow sucn disclosures in law enforcement
efforts involving its export cases. No such authority has been
issued by Commerce.
Recommendation
The Secretary of Commerce should issue olanket authority for
release of Paragraph 12(c) type information in law enforcement
efforts.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
629
D. MANAGEMENT DIRECTION AND OVERSIGHT BY ITA
Finding #12
The Deputy Assistant Secretary for Export Administration and the
Director of DEA have circumvented 0EA/CD management and become
personally and directly involved in the conduct and disposition
of investigations. This has tended to:
denigrate the established chain of command and management;
create multiple sources of concurrent supervisory instruction
to the operating staff; and
- detract from the efficient and effective operation of the
Compliance Division.
Discussion
The DAS and Director of OEA justify their direct personal
involvement in individual investigations on the basis of their
perception that the Compliance Division's investigators and
managers are largely unqualified, and are naive regarding the
political ramifications of their actions. While there may be
some validity to these charges, there is an alternative and more
effective approach which should have been taken by the DAS to
handle the situation. The DAS could have worked to improve the
qualifications, resources and effectiveness of the Compliance
Division, rather than circumventing 0EA/CD and pursuing
investigations without the direct involvement of Compliance
Division managers. The DAS apparently prefers to use "favorite
son" investigators and a paid consultant to manage and conduct
important investigations.
In addition to using investigative teams outside of the formal
0EA/CD structure, the DAS personally intervenes and conducts
crucial aspects of sensitive investigations. For example, he
personally intervened in the Piher/Suin investigation (Case No.
81-359) by traveling in lieu of an experienced investigator, as
was requested by the Foreign Commercial Service, and failed to
file a written report of his activities, as requested by the
Director of the Compliance Division. The DAS subsequently
directed that this case be reassigned from the original case
agent to an agent of his choosing. Similar actions were detected
in inspection team's review of Case Nos. 82-76, 82-68, 81-271,
82-55, 81-377, and 80-12.
It is obviously both the perogative and responsibility of the DAS
to set overall policy for and oversee 0EA operations, including
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
630
those of the Compliance Division. In special cases, this may
even warrant some degree of personal DAS involvement in case
investigations. However, it is counter-productive for the DAS to
conduct day-to-day operations or call the shots routinely in an
investigative case. It is a waste of available trained
investigators and can have a devastating impact on the morale of
the Compliance Division employees, particularly inasmuch as the
DAS himself is neither a trained investigator nor has any
background in criminal investigation.
Recommendation
Investigations of potentially criminal violations and national
security matters should be conducted by trained 0EA/CD
investigators, without interference in their day-to-day
fact-finding operations.
The Department should obtain qualified individuals to manage the
0EA/CD, if they are not now available. This would include the
pending employment of Theodore Wu as a new DAS for Export
Enforcement to oversee intelligence and enforcement operations.
However, it should also extend down to the management of all
0EA/CD operating units. Efforts should be made to upgrade the
quality of the existing staff and resources. These efforts
snould include the development and implementation of a training
program, inasmuch as newly hired personnel learn on the job from
investigators whose own qualifications are limited. (See
Finding #4).
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
631
Finding #13
The Deputy Assistant Secretary for Export Administration has
weakened the Compliance Division by shifting part of its
functions and responsibilities to a consultant and task force
which operate outside of the Division. The DAS has misused this
expert/consultant whom he nired ostensibly to evaluate and
upgrade the compliance function. Personnel regulations have been
violated, as well as sound management practices, by interjecting
this consultant in an operating role for which he has little
expertise.
Discussion
The OAS originally authorized the hiring of the expert/consultant
for a 30-day term and has since extended his appointment five
times. According to his position description, the consultant is
to enhance the efficiency and effectiveness of the Compliance
Division. Specifically, he is to
Make recommendations to improve intelligence capabilities
and operations;
Evaluate the need, if any, for additional law enforcement
powers;
- Oesign and establish programs in support of future and
ongoing investigations;
- Perform other special projects as agreed upon between him
and the Director of the Compliance Division.
In fact, however, the consultant has not improved the operations
of the Compliance Division, nor has he worked with the management
or staff of that Division. The consultant's activities bear
little, if any, resemblance to his position description. Rather,
there is considerable evidence that the consultant and DAS have
further reduced the effectiveness of 0EA/C0 by stripping it of
many of its assigned functions and resources. The inspection
team found numerous problems and inconsistencies between planned
(as outlined in his position description) and actual activities
of the consultant whicn have disrupted or weakened OEA/CD
operations. These include:
- A task force has been assembled to work with the
consultant. It includes two U.S. Customs agents and 0EA's
principal computer expert, but does not include anyone from
the Compliance Division. This group independently carries
out many of the investigative and interagency liaison and
intelligence coordination functions assigned to the
Compliance Division.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
632
The consultant's task force operates without any specified
scope of work, time frame, or performance and reporting
requirements.
- The consultant's task force, rather than the Compliance
Division, acts as the central liaison between the
Department of Commerce and the U.S. Customs Service on
Project EXODUS.
me consultant works closely with 0EA's computer and
licensing people to develop new and improved intelligence
information. However, this again is done without
consultation or cooperation with OEA/CO.
The consultant has had very little interaction with the
Director and employees of the Compliance Division. He
reports directly to the DAS and not to the Director of the
Compliance Division, as stated in his position description.
- The consultant's position designation as critical
nonsensitive is in conflict with the direct investigative
duties he has performed and the provisions of DAD 207-4.
The DAS has turned over several classified investigative
cases, initiated Dy the Compliance Division, to the
consultant.
- The consultant has performed no significant analysis or
evaluation of the operations of the Compliance Division as
is stated in his position description. No identifiable
product was located.
Altnough tnere are some benefits to oe derived from the
consultant's efforts, his independent operation further fragments
Commerce's already limited effort to enforce export controls and
provide strong, unified leadership to an interagency program to
prevent or detect illegal export of controlled technologies.
The inspection team also questions the legality and propriety of
the hiring of this consultant. Instructions covering the
employment of experts and consultants are contained in Chapter
304 of the Federal Personnel Manual. Manual subchapters 1-3
state that improper employment of experts and consultants is not
only illegal, but also wasteful and destroys the morale of career
specialists. One of the manual examples of improper employment
of an expert is assignment to a noncritical, nonsensitive
position which could be handled as well by a regular Federal
employee. Such a violation seems to have been made in this Case.
Financial compensation ($93 per day) for this full-time position
may also nave been made to avoid competitive employment
'procedures and General Schedule pay limits.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
633
Recommendation
The consultant's task force should oe disbanded; the work
initiated by the task force should be continued by the Compliance
Division as follows:
- The liaison function with the U.S. Customs Service should
be continued and enhanced by the Intelligence Branch;
- The expanded use of tne LARS data base for intelligence
gathering operations should continue to be pursued by the
Intelligence Branch with UEA's computer experts.
To the extent that the Compliance Division and the DAS believe
that there is a need to continue the services of this or another
expert/consultant, the latter should report to the Director of
tne Compliance Division. Certain aspects of the consultant's
efforts have significant merit; but appear far outside the scope
of his position description as currently written. A written
agreement should be prepared to specify his mission and work
products.
Both tne DAS and 0EA/CD should adhere to all appropriate
personnel regulations concerning the niring and use of
experts/consultants. Special care must be taken to avoid
assigning consultants to operational duties which would normally
be nandled by civil servants. Rules regarding extension of term
appointments and financial compensation should be followed.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
634
E. INTERNAL ADMINISTRATION AND MANAGEMENT SYSTEMS
Finding #14
The Compliance Division does not have an effective management
information system or automated administrative processes,
including case control and time reporting systems and information
storage. The current manual processes waste staff time, lend
themselves to human errors, and do not provide management with
sufficient information to effectively and efficiently carry out
the compliance function.
Discussion
The Chief of the Intelligence Branch has the primary
responsibility for compiling and maintaining statistics for the
Compliance Division. Branch Chiefs and staff memoers of the
Compliance Division also devote a substantial portion of their
time generating statistical and administrative reports for
various sources in DEA, ITA, and the Congress. This information
is usually necessary for management's use, but could be more
quickly and efficiently produced if the manual information
storage and retrieval systems now in existence were automated.
The current systems place excessive reliance on the memories of
individual managers and agents as to the significance and status
of hundreds of investigative cases and leads. Furthermore, the
time devoted to compiling and reporting this information detracts
from the time devoted to intelligence, inspections, and
investigative operations. Given limited staff resources, the
need to automate is that much more urgent.
Recommendation
An analysis of computer applications within the Compliance
Division should be performed. This can be done in conjunction
with the requirements analysis being arranged by the DEA
Operations Division. Wherever the benefits outweigh the costs,
management information and administrative processes should oe
automated. Strong consideration should also be given to the
creation of a dedicated, secured system for the licensing and
compliance operations, due to the national security issues
involved and the use of sensitive and classified
information.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
635
Finding #15
Operational policies and procedures of the Compliance Division
were found to be nonexistent or outdated and not widely
disseminated to staff members.
Discussion
The inspection team found few operational policies and procedures
for the Compliance Division. The most significant procedural
guidelines applicable to the operations of the Compliance
Division are the DEA manual and the agent's manual. The
Compliance Division did not have a copy of the DEA manual and
some employees did not even know of its existence. The team
reviewed a copy of the DEA manual maintained by the Operations
Division; it is fairly comprehensive and informative on the
interaction and relationship between tne licensing and compliance
functions. However, the DEA manual's section on "Intelligence
Information, Investigation, and Enforcement" was last updated in
1973, with many sections written as early as 1956.
The agent's manual was similarly outdated. Most of the
investigators do not have a copy of that manual; there are few
copies available. Furthermore, the manual is classified at a
level above that of most 0EA/CD agents. Such classification
seemed unwarranted.
Recommendation
0EA/CD operating procedures and manuals should be updated and
readily available to staff. If classified information must be
included in the agent's manual, it should be restricted to a
separate appendix to permit free and ready access by agents to
the manual's oasic operating procedures and information.
Considering the present lack of training provided new
investigators, an agent's manual is an absolute necessity.
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
636
Finding #16
The Compliance Division has maintained inaccurate accounting
records of its travel costs. Its reports to the Office of Export
Administration in Fiscal Year 1982 significantly understated
actual monthly travel costs.
Discussion
Since November 1981, units of the Office of Export Administration
have been directed to provide monthly cost data on certain
categories of expenses for internal management purposes. One of
these cost categories is for travel.
Comparison between travel costs reported by the Compliance
Division ($13,032) and actual costs shown in Commerce accounting
records ($26,778) snow a difference of more than 100 percent as
of February 1982. The inspection team found no evidence that
this discrepancy was due to diversion of 0EA/C0 travel funds to
non-OEA/CD uses. Rather, the team attributed the difference, at
least in part, to a failure to include all 0EA/CD travel claims
for,each month in the reports prepared for the Director of the
ColWpliance Division.
Recommendation
The Compliance Division should reconstruct its travel costs for
FY 1982 and provide the Office of Export Administration with
corrected financial reports. An accurate internal financial
accounting system should be established and maintained by 0EA/CD
to ensure proper and effective use of all available 0EA/CD funds.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
637
Finding #17
The assigned working space of the Compliance Division is
inadequate and has an adverse effect on the ability of the
Division to perform its mission.
Discussion
The Compliance Division's working space is crowded, poorly
equipped, ill-maintained, and noisy. This contributes to low
staff morale and impedes investigative effectiveness. While this
condition, of itself, would not usually disrupt normal activity,
its impact is grossly magnified by the myriad of other problems
and shortages facing DEA/CO.
The currently assigned space provides no opportunity for staff to
conduct private meetings with sources of information, other
enforcement agency personnel, co-workers or other persons wishing
to discuss confidential matters or cases. Furthermore, it is not
good security practice to hold staff discussions of sensitive
and, on occasion, classified information in the current open work
areas.
Recommendation
The Department should provide adequate and secure working and
file space for the Compliance Division.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
638
v-N
July 2, 1982
MEMORANDUM FOR SHERMAN FUNK
FROM: Lionel H. Olmer
ADDEN
UEU-'5"r'ES DEPARTMENT OF COMMERCE
The Under Secretary tor International Trade
Washmpt.on. D.C. 20230
SUBJECT: Comments on Draft 'Report on Export Enforcement
I have reviewed your draft Report and its findings and
recommendations concerning operations of the export enforcement
group in Trade Administration. ITA's comments are attached.
I hope that you recognize that many of the problems your investi-
gators reported upon are soon to be things of the past or already
are. ITA has agreed to report back to the Senate Permanent
Investigations Subcommittee later this year on the progress we
have made in addressing these problems; we will have a very
positive story to tell on that occasion.
I hope you will incorporate as much as possible of our response
into your final Report. I would especially urge you to ensure
that your final Report takes notice of several important ITA
initiatives taken well before the date of the draft Report to
correct the situation. These include, for example, the planning
and implementation of a major reorganization designed to improve
export enforcement, including the appointment of a new Deputy
Assistant Secretary for Export Enforcement.
By failing to make adequate mention of this key reorganization, as
well as other ITA initiatives on enforcement, the draft Report
gives the incorrect impression that ITA has taken no effective
remedial action whatsoever during the past year.
In any event, please include our entire response as an addendum to
your Report.
Attachment
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
639
SUMMARY OF FINDINGS
(Report page 4)
FINDING: No comprehensive appraisal of or effective overall strategy to
address the Nation's technology leakage problems
RESPONSE: The Department has undertaken several initiatives to rectify
this problem. As explained by Assistant Secretary Brady in his
May 12, 1982 testimony before the U;S. Senate Permanent Sub-
committee on Investigations, the Administration directed the
intelligence agencies to prepare a comprehensive appraisal of
Soviet technology acquisition efforts. On the basis of the
initial results of that appraisal the Department has taken the
following steps:
(1) Creation of a Foreign Technical Assessment Center within
the Office of Export Administration, tasked with maintain-
ing a data base enabling the Department to assess foreign
availability of technology.
(2) _Pursuit of stronger ties with the intelligence community
and other enforcement agencies, both with respect to '
intelligence collection and intelligence utilization.
(3) Elevation to office status of the Compliance Division, to
be headed by a new Deputy Assistant Secretary for Export
Enforcement (DAS/EE). The Office of Export Enforcement
(OEE) will be an aggressive enforcement organization, with
field offices in Los Angeles, San Francisco and New York.
The establishment of additional field offices will be
considered as needs arise.
(4) Tasking of the DAS/EE with the responsibility for
developing strategy for addressing the Nation's illegal
technology transfer problems. Such a strategy is now in
the formulation stage.
Insufficent trained personnel
RESPONSE: We concur in this finding. However, it should be recognized
that the Department has already taken important steps to correct
the situation, including initiation of a vigorous program to
recruit professional law enforcement personnel with extensive
criminal investigation experience. In this connection, the
Department is in the process of eliminating current obstacles to
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
. 640
the recruiting of experienced law enforcement personnel, such as
the unavailability of premium pay for administratively uncon-
trollable work by export enforcement special agents. We are
also actively pursuing the matter of obtaining firearms, and
search, seizure and arrest powers for our export enforcement
special agents. Finally, we plan to deliver an effective,
professional training program which will include instruction not
only in conventional law enforcement, such as surveillance and
search and seizure techniques as well as Federal criminal
procedures, but also will include training in problems unique to
export enforcement. The in-house portion of the training
program will concentrate on specialized export control
enforcement techniques, trade intelligence and technology
acquisition trend analysis.
FINDINGS: (a) Inadequate management direction and oversight
(b) Lack of strong leadership and clear lines of organizational
responsibility within 0EA/CD
RESPONSE: Recognizing that the management structure inherited from the
prior Administration was inadequate to the task of stemming an
accelerating tide of illegal technology transfer, we have taken
steps to rationalize that structure. As a result, the Depart-
ment has established the post of Deputy Assistant Secretary for
Export Enforcement, whose only responsibility will be directing
the Department's export control enforcement and antiboycott
compliance efforts. The new DAS/EE brings solid law enforcement
management skills to his position. One of his highest
priorities is to establish management objectives and milestones
in order to concentrate resources and talents on the timely
fulfillment of the Department's export enforcement mission.
FINDING: Failure to use modern state-of-the-art intelligence,
investigative techniques and systems
RESPONSE; We agree that much remains to be done in the area of developing
a sophisticated, comprehensive response to illegal technology
transfer. However, the Department has made a good start in
recent months toward attaining this objective. For example, we
have created a specialized analytical unit which correlates
licensing and other intelligence data in order to identify
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
641
possible diversions and diversion routes. This unit will soon
be fully integrated with the Department's operational export
licensing and enforcement arms. Further, the Office of Export
Administration (CEA) has established a technology transfer unit
which is tasked with providing data to the Office of Export
Enforcement. Moreover, the Office of Export Enforcement's own
intelligence unit will be staffed by personnel having both
intelligence and criminal investigation expertise.
.FINDING: Unwarranted interference in the detailed conduct of CEA/CD
investigative operations by the Deputy Assistant Secretary for
Trade (sic) Administration
RESPONSE: (See our response to Finding #12 below.)
FINDING: Inadequate cooperation and coordination with the U.S. Customs
Service and vital information sources in the U.S. intelligence
111-E_IatC01111
RESPONSE: Concurrent with the restructuring and enhancement of our export
enforcement effort, the Department is continuing to move
vigorously to improve cooperation and coordination with the
intelligence agencies. For example, the Department is sharing
and will continue to share with the intelligence agencies
certain threat appraisal and technology transfer intelligence
collection and analysis responsibilities. In addition, the
Department's licensing and export control arms will make every
effort to improve the frequency and effectiveness of their
liaison with the intelligence agencies.
The Department has increasingly sought to improve cooperation
with the Customs Service at all levels. For example, the
Department made a special effort in recent months to share
licensing and intelligence data with Customs personnel in order
to facilitate the development of profiles for use in 'Operation
Exodus. In addition, the Department is presently exploring
with Customs ways of more efficiently allocating the export
control responsibilities of the two agencies, such as assigning
primary responsibility for inspections at points of exit to
Customs.
We fully expect these efforts at improved cooperation to be
successful and to result in a more effective united front
against the illegal technology transfer threat.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
FINDING:
RESPONSE:
FINDING:
RESPONSE:
642
Inadequate travel funds, law enforcement equipment and other
support resources
We agree with this finding to the extent that it reflects the
priorities accorded in past years to the budget and manpower
needs of export control enforcement. The Department is now
fully committed to funding the travel, logistical, space and
equipment needs which are associated with the development of an
investigative force which will be greatly improved both in terms
of quality and quantity.
Use of antiquated or inefficient internal administrative and
management systems and procedures
We agree with this finding of the Report. The need for
application of advanced data processing techniques to the
licensing and intelligence analysis functions, as well as to the
enforcement mission, is critical. To achieve this goal, there
must be both complete commitment and a vigorous follow-through
on the part of all management levels of the Department.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
FINDING:
RESPONSE:
FINDING:
RESPONSE:
642
Inadequate travel funds, law enforcement equipment and other
support resources
We agree with this finding to the extent that it reflects the
priorities accorded in past years to the budget and manpower
needs of export control enforcement. The Department is now
fully committed to funding the travel, logistical, space and
equipment needs which are associated with the development of an
investigative force which will be greatly improved both in terms
of quality and quantity.
Use of antiquated or inefficient internal administrative and
management systems and procedures
We agree with this finding of the Report. The need for
application of advanced data processing techniques to the
licensing and intelligence analysis functions, as well as to the
enforcement mission, is critical. To achieve this goal, there
must be both complete commitment and a vigorous follow-through
on the part of all management levels of the Department.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
644
FINDING 12: The lack of operational travel adversely affects the quality and
scope of criminal investigations conducted by the Compliance
Division, compounding the problems created by a shortage of
staff resources.
RECOMENDATION: More agents are needed to investigate export violation
cases. The Assistant Secretary for Trade Administration
should conduct a review to determine an adequate level of
staff for this function, as well as other functions of the
Compliance Division. Such adequate staffing should be
provided as soon as possible, if necessary by shifting
other ITA resources, obtaining personnel detailed from
other agencies, and/or requesting an emergency budget
supplement.
0EA/GD operational travel should be approved and taken as
necessary in pursuit of criminal cases. Adequate management
systems and controls should be established to insure that
domestic travel can be taken in a timely manner. Inter?
national travel should be similarly approved where
justified, particularly when U.S. CUstoms Service or other
appropriate U.S. overseas investigative personnel are not
available.
RESPONSE: We concur in this finding. An effective law enforcement
operation tasked with stemming illegal exports necessarily
involves extensive mobility and must therefore be predicated
upon an adequate travel budget, as well as the appropriate
delegation to line managers of the authority to approve
operationally critical travel requests.
The lack of investigative travel is not attributable solely to
resources as the following data show:
Travel Expenses ($000)
Export Other
Enforcement OEA
FY 1980
46
52
FY 1981
43
44
FY 1982 (est.)
60
60
Approved For Release 2007/12/11: CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
645
LTA program managers are allocated resources for official travel
based both on past experience and on the presentation of
evidence of future expansion. Until the arrival of the new
DAS/EE, however, compliance management had not voiced to senior
ITA management any need for additional travel resources.
Also, we found in an April 1980 study that most of the former
Compliance Divisions investigators were reluctant to travel,
principally for personal reasons. In expectation of a vigorous
pursuit of his duties by the new DAS/EE, ITA senior management
is planning to increase the level of travel resources available
to export enforcement.
We are also working to determine the appropriate level and
sources for additional staffing of the export enforcement effort.
FINDING 13: The Assistant Secretary for Trade Administration has been
unreasonably slow in establishing Export Compliance Field
Offices on the West Coast.
FECCHMENDATION: ITA management should expedite the establishment and
staffing of Export Compliance Field Offices on the West
Coast. These offices should be staffed with adequate
numbers of trained and experienced investigators and
inspectors.
RESPONSE: A notification of proposed reprogramming was sent on May 28,
1981 to Senate Appropriations Committee Chairman Hatfield and to
House Appropriations Subcommittee Chairman Smith. The request
included shifting 15 positions from other program areas of ITA
for the export compliance function.
Establishing offices on the West Coast was not explicitly
mentioned in that reprogramming notification. The special
reprogramming notification to create field offices was held up
pending departmental resolution with CMH of In.'s FY 83 budget
request?agreed to in December, 1961. Promptly upon Congress'
return, the Department sent a second reprogramming notification
requesting specific approval for the establishment of export
enforcement offices in San Francisco and Los Angeles, Approval
of this request by Congress came on February 23, 1982. In view
of the imminent reorganization of ITA's export enforcement
organization, implementation of the staffing of the West Coast
offices was deferred to give the new DAS/EE the opportunity to
direct that staffing.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
FINDING f4:
646
As the Report's discussion of this finding recognizes, plans to
open the West Coast field offices are now back on track. The
Department is now pressing GSA to provide appropriate quarters
as soon as possible to handle the enhanced staffing for these
offices.
The-Compliance Division frequently hires inexperienced
investigators and provides no training for its investigative
staff.
RECOMMENDATION: The Compliance Division should develop and implement a
formal training program for all newly hired and present
undertrained personnel. This should include utilization of
the Federal Law Enforcement Training Center and other
established law enforcement training facilities, as well as
structured on-the-job training. A training profile should
be developed for each OE/CD investigator to determine his
individual training needs. 0EA/CD personnel should be
adequately trained in all aspects of law enforcement,
including intelligence, surveillance, investigations and
inspections, judicial proceedings and case handling. The
Department should provide adequate funding for 0EA/CD's
training needs.
RESPONSE: This problem is now being dealt with on two levels. First, we
are now recruiting only experienced investigative and intelli-
gence personnel of the highest professional quality. In order
to ensure that this is done, all selections for these positions
must be approved by the new DAS/EE, who has in-depth experience
in the investigation and prosecution of technology transfer
crimes. Second, we are providing a systematic and continuing
training program for all ITA special agents, covering not only
conventional law enforcement skills but also the specialized
investigative and intelligence skills which are vital to
development of technology transfer cases. Further, recognizing
that voluntary compliance and cooperation by the private sector
remains the first line of defense against the loss of critical
technology, Commerce special agents will be trained to work with
the business community.
The question of basic (X-118) qualifications held by two
specific employees in DEA was discussed between a representative
of the IG's office and ITA's Office of personnel. The back-
grounds of the two employees were reviewed and it was agreed
that both were qualified for the grades at which they were hired.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
647
FINDING 15: The Compliance Division lacks virtually any law enforcement
equipment although such equipment is needed to conduct
investigations effectively.
RECCMMENDATION: The Department should purchase the essential investigative
equipment required by the Compliance Division.
RESPONSE: The Office of Export Administration had $30,000 in its FY 1981
and 1982 budget allocations for the purchase of equipment and
has spent only $10,000 through April 30, 1982. Thus, it is not
clear that this is a resource problem, so much as Export
Administration's lack of positive action to secure needed
equipment.
Nevertheless, we agree with the conclusion that the export
enforcement investigative staff is inadequately equipped. It is
essential that this situation be remedied without delay.
Accordingly, the procurement of such equipment will be given
increased priority, both in terms of funding and acquisition.
FINDING 46: The Compliance Division's current intelligence operations are
almost exclusively reactive rather than proactive in nature. An
efficient and effective intelligence operation cannot be
conducted in such a manner.
BECCMMENMATION: The Commerce Department and its compliance Division must
increase its cooperation with and the flow of relevant
information from the U.S. and =OM intelligence
communities, including specific information on the Soviet
Bloc's Western technology import strategy and targets,
exporters of controlled technologies, their diversionary
routes and schemes, and third country participants in such
schemes. ?
The Intelligence Branch should be given sufficient computer
specialist and analytical staff, and full access to LARS,
to enhance their in-house intelligence operations. The
LRS data base should be expanded to include distribution
license information and other available data which may be
useful to the intelligence operation.
RESPONSE: The new Office of Export Enforcement will move aggressively to
develop intelligence leads on two fronts. First, through
improved staffing and training of its intelligence division, it
will develop the capacity to generate intelligence information
on its own initiative, as well as to use intelligence informa-
tion received from other sources. Second, it will encourage its
intelligence and investigative personnel to work more closely
with other intelligence and law enforcement
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
647
FINDING 15: The Compliance Division lacks virtually any law enforcement
equipment although such equipment is needed to conduct
investigations effectively.
RECCMMENDATION: The Department should purchase the essential investigative
equipment required by the Compliance Division.
RESPONSE: The Office of Export Administration had $30,000 in its FY 1981
and 1982 budget allocations for the purchase of equipment and
has spent only $10,000 through April 30, 1982. Thus, it is not
clear that this is a resource problem, so much as Export
Administration's lack of positive action to secure needed
equipment.
Nevertheless, we agree with the conclusion that the export
enforcement investigative staff is inadequately equipped. It is
essential that this situation be remedied without delay.
Accordingly, the procurement of such equipment will be given
increased priority, both in terms of funding and acquisition.
FINDING 46: The Compliance Division's current intelligence operations are
almost exclusively reactive rather than proactive in nature. An
efficient and effective intelligence operation cannot be
conducted in such a manner.
BECCMMENMATION: The Commerce Department and its compliance Division must
increase its cooperation with and the flow of relevant
information from the U.S. and =OM intelligence
communities, including specific information on the Soviet
Bloc's Western technology import strategy and targets,
exporters of controlled technologies, their diversionary
routes and schemes, and third country participants in such
schemes. ?
The Intelligence Branch should be given sufficient computer
specialist and analytical staff, and full access to LARS,
to enhance their in-house intelligence operations. The
LRS data base should be expanded to include distribution
license information and other available data which may be
useful to the intelligence operation.
RESPONSE: The new Office of Export Enforcement will move aggressively to
develop intelligence leads on two fronts. First, through
improved staffing and training of its intelligence division, it
will develop the capacity to generate intelligence information
on its own initiative, as well as to use intelligence informa-
tion received from other sources. Second, it will encourage its
intelligence and investigative personnel to work more closely
with other intelligence and law enforcement
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
649
/ORME: We agree with the conclusions of the Report concerning the case
backlog. The DAS/EE has directed that the backlog be
inventoried, analyzed and assigned priorities without delay, add
this is being done. Once this phase is completed, he will
decide what further resources must be applied to disposition of
the backlog, and what case processing priorities must be
followed.
Finally, we are committed to the complete and deliberate review
of the entire intelligence collection, analysis and distribution
process relating to export enforcement. Moreover, we intend to
draw upon appropriate resources in the intelligence community to
assist us in this endeavor. In the short time he has held his
new post, the DAS/EE has already begun to establish smooth
working relations with representatives of the intelligence
community.
FINDING 18: 0EA's license application screening, which is vital to the
compliance function, is an antiquated manual process which, in
practice, does little to help detect violations of export laws.
and regulations.
RECCHSENDATION: We understand that OE A is now planning an overall review of
computer applications for various 0EA functions. Priority
should be given to automation of the screen process and the
Compliance Division's intelligence gathering and internal
control needs. Such automated systems, which can be
accessed by all appropriate agencies, are needed for
immediate entry of data on all current investigations, new
violations, and new suspects from the intelligence
community and other sources. The new automated screen
process should also be able to go far beyond a simple match
of names; it should help detect deceptive submissions,
ommissions or substitutions by applicants, or at least flag
the more obvious ones for further review.
RESP0mM% We agree that the current manual screening process leaves much
to be desired. 0EA is now planning an overall review of
computer applications for various CEA functions. Priority will
be given to automation of the "screens process, intelligence
gathering, and internal control needs. Such automated aystems,
Which can be accessed by all appropriate agencies, are needed
for immediate entry of data on all current investigations, new
violations, and new suspects from the intelligence comunity and
other sources. The new automated screen process Should also be
able to go far beyond a simple match of names; it should help
detect deceptive submissions, omissions or substitutions by
applicants, or at least flag the more obvious ones for further
review.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
650
FINDING 19: Cooperation and coordination between the Cbmpliance Division and
the U.S. Customs Service are inadequate and adversely affect
enforcement of export laws.
RECOIMENDATION: The Assistant Secretary for Trade Administration should
make a policy commitment to and negotiate strong CUstoms-
0EA/CD cooperation. This: commitment must be communicated
down through the ranks of both agencies as operating policy.
Written guidelines and procedures should be developed to
support improved cooperation; they should clearly spell out
the jurisdiction of each agency, how and what constitutes
liaison, what arrangements and resources exist for domestic
and overseas support, and what are the responsibilities and
obligations of each agency to a unified export enforcement
effort. (Also see Finding #10.)
RESPONSE: Progress in dealing with perceived difficulties involving
Section 12(c) of the Export Administration Act of 1979 has been
made by the signing on June 18, 1982 by Secretary Baldrige of a
blanket determination under that section permitting the
Department of Justice to use certain protected information in
connection with prosecution of export control violation arising
from 'Operation Exodus'.
Both Assistant Secretary Brady and Deputy Assistant Secretary Wu
are totally supportive of improved cooperation and coordination
between the Office of Export Enforcement and the Customs
Service. They have each met with their counterparts at Treasury
as a first step in producing a comprehensive written
understanding allocating responsibilities between the two
agencies. We believe that this will result in a more efficient
utilization of existing resources, such as the assignment of
primary
responsibility for inspections at points of exit to Customs,
which is already staffed, equipped and trained to take the lead
in performing this function. Moreover, we anticipate these
discussions will help to eliminate jurisdictional overlaps and
conflicts between the two agencies and to foster a spirit of
reciprocal cooperation. We expect that Customs and Commerce
will, through better communication and teamwork, present a
united front in this Nation's fight against illegal diversion of
technology.
We concur in the conclusion of the Report that the liaison
function between IDEA and Customs, now performed by an outside
consultant, should be fully integrated into the Office of Export
Enforcement organization. It will be.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
651
FINDING 110: CEA and Compliance Division officials are not aware of the
actual level of support furnished by the U.S. Customs Service
for ITA 's export control compliance matters. The transfer of
appropriated funds from the Compliance Division accounts could
be excessive.
RECCMMENDATTON: A follow-up request should be sent to the U.S. Customs
Service by the Assistant Secretary for Trade Administration
to obtain a record of actual services rendered by Customs
in FY 1982 and under the FY 1981 interagency agreement.
Such documentation is necessary to support ITA certifi-
cation that the SF 10Ells are correct and proper for payment.
RESPONSE: The U.S. Customs Service indicated in an April 30, 1981 letter
that to track actual costs incurred against an agreement would
require additional staff-hours which Customs did not have. They
maintained that the reimbursable agreement was insufficient to
cover the additional expense which would be incurred by
Customs. However, pursuant to the recommendation of the Report,
a follow-up request will be sent by ITA to Customs in order to
obtain a record of actual services rendered by Customs in FY 82
and under the FY 81 interagency agreement.
The Report also recommends that the Office of Export Enforcement
maintain its own cost accounting records. We do not agree.
This would unnecessarily duplicate the accounting support
provided ITA by the Office of the Secretary.
FINDING Ill: A strict construction on a narrow interpretation of paragraph
12(c) of the Export Administration Act of 1979, by the Office of
Export Administration and the General Counsel's Office has
impeded the progress of criminal investigations and prosecutions.
RECcEmENDATION: The Secretary of Commerce should issue blanket authority
for release of Paragraph 12(c) type information in law
enforcement efforts. -
RESPONSE: This finding reveals a serious misunderstanding regarding the
Department's position with respect to Section 12(c) of the
Export Administration Act. The Department has always shared
information subject to Section 12(c) with other agencies for
their use in assisting the Department in administering and
enforcing the Act. However, these agencies, and the Department,
are precluded from making the information public unless the
Secretary of COmmercedetermines that the withholding of the
information is contrary to the national interest. Contrary to
the statement made in the Report, Section 12(c) has never
delayed any criminal enforcement proceeding. Indeed, the
Department is unaware of any instance in which intelligence or
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
pproved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
652
law enforcement agency access to information needed for a
criminal investigation and subject to Section 12(c) has been
blocked by denial of such a determination Although Cbmmerce has
historically dealt with such requests on a case by case basis,
Secretary Baldrige recently issued a "blanket national interest
determination authorizing the use by the Justice Department of
Section 12(c) information (as well as Shipper's Export Declara-
tions which are subject to the confidentiality provisions of the
Census Act), for the purpose of criminal prosecution of Export
Administration Act violations discovered through *Operation
Exodus', subject to certain conditions.
It is important to note that the information subject to Section
12(c)'s confidentiality provisions includes confidential
business information which is submitted to the United States
Government only in order to receive an export license.
Accordingly, great care must be taken by the Department to
ensure that the confidentiality of such information not be
compromised.
FINDING 112: The Deputy Assistant Secretary for Export Administration and the
Director of OSA have circumvented 0EA/CD management and become
personally and directly involved in the conduct and disposition
of investigations. This has tended to:
- denigrate the established chain of command and management;
- create multiple sources of concurrent supervisory
instruction to the operating staff; and
- detract from the efficent and effective operation of the
Compliance Division.
RECCMENDATION: Investigations of potentially criminal violations and
national security matters should be conducted by trained
CEA/CD investigators, without interference in their
day-to-day fact-finding operations.
The Department should obtain qualified individuals to
manage the 0EA/CD, if they are not now available. This
would include the employment of Theodore Wu as a new DAS
for Export Enforcement to oversee intelligence and
enforcement operations. }however, it should also extend
down to the management of all 0E1/CD operating units.
Efforts should be made to upgrade the quality of the
existing staff and resources. These efforts should include
the development and implementation of a training program,
inasmuch as newly hired personnel learn on the job from
investigators whose own qualifications are limited. (See
Finding #4).
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
653
RESPONSE: We concur in the recommendation, but the record should show that
the DAS for Export Administration and the Acting Director of CEA
state they never got personally involved in the day-to-day fact
finding process of the Compliance Division or in the details of
investigations. As a prerogative of management, however, they
did inquire as to what compliance Division personnel were doing
with their time, to get an idea of the Division's effectiveness.
It should be noted that in those cases in which they were
involved, the Deputy Assistant Secretary for Export Administra-
tion and Acting Director of CEA (who was involved in only one
case) did so solely for the purpose of enlisting the cooperation
of concerned foreign governments in paving the way for
Compliance Division and investigators. Their respective conduct
in these cases was entirely proper and consistent with the
practice of other law enforcement agencies, whose senior
officials often take initiatives to enlist the cooperation of
their senior foreign government counterparts in paving the way
for U.S. agency investigators.
FINDING 113: The Deputy Assistant Secretary for Export Administration has
weakened the Compliance Division by shifting part of its
functions and responsibilities to a consultant and task force
which operate outside of the Division. The DAB has misused this
expert consultant whom he hired ostensibly to evaluate and
upgrade the compliance function. Personnel regulations have
been violated, as well as sound management practices, by
interjecting this consultant in an operative role for which he
has little expertise.
RBCCMENDATICO: The consultant's task force should be disbanded; the work
initiated by the task force should be continued by the
Compliance Division as follows:
The liaison function with the U.S. Customs Service
should be continued and enhanced by the Intelligence
Branch;
-- The expanded use of the LARS data base for
intelligence gathering operations sould continue to be
pursued by the Intelligence Branch with CEA's computer
experts.
To the extent that the Compliance Division and the DAB
believe that there is a need to continue the services of
this or another expert/consultant, the latter Should report
to the Director Of the Compliance Division. Certain aspects
of the consultant's efforts have significant merit, but
appear far outside the scope of his position description as
currently written. A written agreement should be prepared
to specify his mission and work products.
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
654
Both the DAS and 0EA/CD should adhere to all appropriate
personnel regulations concerning the hiring and use of
experts/consultants. Special care must be taken to avoid
assigning consultants to, operational duties which would
normally be handled by civil servants. Rules regarding
extension of term appointments and financial compensation
should be followed.
RESPONSE: The comments regarding the consultant doing work not
comprehended in his position description are correct. His
position was accurately designated as non-critical sensitive.
Although he later requested a TOp Secret and Special Access
clearance, it has not been granted. Accordingly, as the Report
says, he should not have access to such information. ITA has
taken steps to have the consultant conform to the terms of his
employment and appropriate security regulations.
FINDING 114: The Compliance Division does not have an effective management
information system or automated administrative process,
including case control and time reporting systems and
storage. The current manual processes waste staff
time, lend themselves to human errors, and do not provide
management with sufficient information to effectively and
efficiently carry out the compliance function.
RECCMMENDATION: An analysis of computer applications within the Compliance
Division should be performed. This can be done in
conjunction with the requirements analysis being arranged
by the OSA Operations Division. Wherever the benefits
outweigh the costs, management information and administra-
tive processes should be automated. Strong consideration
should also be given to the creation of a dedicated, secured
system for the licensing and compliance operations, due to
the national security issues involved and the use of
sensitive and classified information.
RESPONSE: The Report accurately describes the need for improved management
information systems and automated administrative processes.
(See responsb to Finding #8.)
FINDING #15: Operational policies and procedures of the Compliance Division
were found to be nonexistent or outdated and not widely
disseminated to staff members.
RECOMENDATION: OEVCID operating procedures and manuals hould be updated
and readily available to staff. If classified information
must be included in the agent's manual, it should be
restricted to a separate appendix to permit free and ready
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2
655
access by agents to the manual's basic operating procedures and
information. Considering the present lack of training provided
new investigators, an agent's manual is an absolute necessity.
RESPONSE: One of the highest priorities of the new DAS/EE will be the
development of standardized and rationalized operating
procedures. These will be incorporated by the staff of the
DAS/EE into a new CEE manual, as well as into a comprehensive,
up-to-date manual for special agents.
FINDIM 116: The Compliance Division has maintained inaccurate accounting
records of its travel costs. Its reports to the Office of
Export Administration in Fiscal Year 1982 significantly
understated actual monthly travel costs.
RECOMENDATICN: The Compliance Division should reconstruct its travel costs
for FY 1982 and provide the Office of Export Administration
with corrected financial reports. An accurate internal
financial accounting system should be established and
maintained by 0EA/CD to ensure proper and effective use of
all available 0EA/CD funds.'
RESPONSE: While it is not clear in this finding exactly what categories of
-travel the Compliance Division was asked to report on, the
problem could have been one of interpretation, timing, or part
of the overall problem ITA is having in obtaining accurate
accounting data from the Department's accounting system. It is
not the Department's, policy to have the program units keep
their own accounting systems.
FINDING 117: The assigned working space;of the compliance Division is
inadequate and has an adverse effect on the ability of the
Division to perform its mission.
Racialmalmoti: The Department should provide adequate and secure working
and file space for the Compliance Division.
RESPONSE: We concur in this finding and expect that the Department will
move expeditiously to adopt the recommendations of the Report on
this matter. -
Approved For Release 2007/12/11 : CIA-RDP85M00364R001001520004-2