SUMMARY REPORT ON TECHNOLOGY TRANSFER TO COMMUNIST COUNTRIES AND THE INTELLIGENCE COMMUNITY S ROLE AND EFFECTIVENESS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85T00176R000900020001-5
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
33
Document Creation Date: 
December 20, 2016
Document Release Date: 
March 23, 2007
Sequence Number: 
1
Case Number: 
Publication Date: 
October 1, 1981
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP85T00176R000900020001-5.pdf1.32 MB
Body: 
Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Director of Secret Central Intelligence Summary Report on Technology Transfer to Communist Countries and the Intelligence Community's Role and Effectiveness Secret TTIC 81-001 October 1981 Copy 1 1 7 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TO0176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Director of Secret Central Intelligence Summary Report on Technology Transfer to Communist Countries and the Intelligence Community's Role and Effectiveness Submitted by the Director of Central Intelligence to the Senate Select Committee on Intelligence Secret TTIC 81-001 October 1981 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret The Honorable Barry Goldwater Chairman Senate Select Committee on Intelligence United States Senate Washington, D.C. 20515 During several appearances before your committee by Admiral Inman and myself earlier this year, we discussed the problem of US and Western technology losses to Communist countries, and the need to do something about these losses. Your concern centered on three key questions: ? What is the role of the Intelligence Community in controlling technology transfer and how effective has the Community been in helping to prevent the loss of sensitive technology related to US national security? ? What are the nature and extent of US and Western losses and the benefits to the Communist countries acquiring our technology? ? What improvements would enhance the Community's capabilities to assist the appropriate agencies in protecting US and Western technol- ogy? I 25X I share your concern and am pleased to present to you this summary report in response to your three questions. Detailed backup material upon which this report is based is available for your review. This report focuses principally on losses of US (and Free World) technology to the USSR and Eastern Europe. A special section (appendix) was prepared on China but should .~iewed in the context of the changing US policy regarding China. I I It is my conclusion, based on this report, that the concerns of the Senate Select Committee on Intelligence are well founded. The Soviets and East Europeans have for some time been trying to obtain the most sophisticated US and Western technology, to satisfy both military and economic needs, through all means at their disposal and with many notable successes. A va- riety of transfer mechanisms have been used, including lawful purchases and trade arrangements; short- and long-term visits to the United States by scientists, students, and trade representatives; unlawful diversions of materials from approved destinations abroad; and clandestine intelligence operations. The result has been the strengthening of the Soviet and East European industrial and military sectors, accompanied by a difficult-to- measure, but identifiable, reduction in the security posture of the United States and its Western allies.II 25X iii Secret Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Although the Intelligence Community (IC) has only had a marginal role in US programs that regulate technology transfer, it has provided intelligence support to those departments and agencies that have sought it; however, those departments and agencies for various reasons have not been able to make the best use of the available IC support. The only specific statutory responsibility of the intelligence agencies is limited to assisting Commerce in determining the foreign availability of controlled US technology. The enforcement responsibilities for export control statutes are assigned to the Departments of Commerce, State, and Treasury. Only the FBI, among the Intelligence Community organizations, becomes involved in the prevention of US technology losses in an enforcement sense and that mainly as the re- sult of the Bureau's foreign counterintelligence and other criminal investi- gations. The Intelligence Community performs many support and ad hoc functions in this area, but its primary role consists of the collection, analysis, production, and dissemination of foreign intelligence concerning Soviet and East European needs for, methods of, successes in, and benefits from acquisitions of US and Western technology. Given this very limited role, the Intelligence Community can do little by itself to improve the protection given to US and Western technology. Direct improvement is limited to increasing the efficiency and timeliness of the intelligence and counterintelligence efforts in this area. F] Since assuming the Directorship of Central Intelligence, I have initiated several actions that address the most serious IC-related problems identified in this report, including: ? Charging the Deputy Director of Central Intelligence for Foreign Assessment (DD/NFA) with enhancing the Intelligence Community's overall capability to support both national policymakers and the US Export Control Community's decisionmakers. ? Establishing a Technology Transfer Assessment Center within CIA. ? Developing an offensive counterintelligence program to counter hostile intelligence service efforts to acquire US technology abroad. ? Assigning the technology transfer issue to my Critical Collection Prob- lems Committee for increased focus by collectors. ? Establishing a DCI Committee that incorporates my Committee on Exchanges (COMEX) to deal with all forms of US and Western technology transfer; this Technology Transfer Intelligence Committee is to ensure that optimum use is made of IC resources on this problem and that the IC's support of the Export Control Community is responsive and properly coordinatedi I Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret 25X f I would also like to call to your attention several important efforts that have been undertaken recently by elements of the Intelligence Community to improve intelligence support to export control policy and decision- making: ? The Defense Intelligence Agency now ensures that the military implica- tions of technology transfers are factored into all appropriate DOD foreign weapon systems studies and that foreign technology availability assessments are being conducted in support of the Military Critical Technology List program levied on DOD by the Export Administration Act. ? The intelligence components of Commerce and Treasury, with the assistance of NSA and CIA, have taken the initiative to define their intelligence needs more precisely, and as a result the flow of relevant foreign intelligence for use in their export control efforts has increased. Several important problems remain to be addressed by the IC, but I intend to pursue them vigorously with all the resources I have available. Further- more, I have asked Admiral Inman to conduct a review of the IC's current resource capability to address the remaining problems, and we will take appropriate steps to ameliorate those that are not adequately coveredQ 25X The review conducted in preparing this report also identified a number of other important problems that affect US technology losses to the Commu- nist countries but that are beyond the Intelligence Community's area of responsibility. These problems are identified in section III of the report. I am prepared to work with you and the appropriate departments and agencies to stop these illegal, unauthorized, or unintentional transfers of US technology. F] Sincerely, William J. Casey Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 CPrrrt Summary Report on Technology Transfer to Communist Countries and the Intelligence Community's Role and Effectivenes I Approved For Release 2007/03/24: CIA-RDP85TOO176ROO0900020001-5 This report addresses three questions expressed by members of the Senate Select Committee on Intelligence concerning technology transfer to Com- munist countries: 1) What is the Intelligence Community's role; 2) What is the nature and extent of Western technology loss; and 3) What steps might be taken b the IC to improve the Community's role in helping to stop such losses? II The transfer of Western technology to Communist countries continues to be one of the most complex issues facing our government. The prevention of US technology loss is particularly complicated because it not only involves activities that are spread throughout the US Government, but also requires the active cooperation of foreign governments. In addition, the prevention and protective measures that can be taken by the US Govern- ment include such complex and diverse elements as US foreign trade policy and domestic and international export controls; domestic and foreign law enforcement and counterintelligence activities; and export control licensing requirements and the control of both unclassified and classified national defense information. The role of the Intelligence Community in this area has been poorly defined and other than the traditional responsibilities of collection, analysis, and the production of finished intelligence on East- West technology transfers, the Community has provided only support that has been directly requested. In the past the IC considered this responsibil- ity to be a secondary priority, at best This report addresses the technology transfer loss problem and its national security implications. The term technology transfer connotes a wide range of trade, scientific, industrial, and communications activities; there is no single definition. When viewed in the context of technology loss the means of transfer becomes a greatly enlarged set, ranging from open source publications to war losses and traditional espionage. Transfer mechanisms that would not be considered cost-effective in commercial transfers, such as reverse engineering an illegally acquired missile component, become useful means to military adversaries who otherwise would be denied such technology. "Technology transfer" as used in this report means the conveyance of technical knowledge by legal or illegal means, including technical journals and memorandums, blueprints, technical proposals, official and personal conversations and plant tours, manufacturing equip- ment, whole plants, and end products.II ix Secret TTIC 81-001 October 1981 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 This report was prepared by the Central Intelligence Agency, the Defense Intelligence Agency, the Federal Bureau of Investigation, the National Security Agency, the Department of Energy, the DCI's Committee on Exchanges (COMEX), and the DCI's Community Counterintelligence Staff. It was reviewed and coordinated by the intelligence components of the Departments of Commerce, State, and Treasury. The report was reviewed and concurred in by the National Foreign Intelligence Council on October 13, 1981F7 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret Technology Transfer and the Role of the Intelligence Community 1 Benefits to the Soviet Military and Defense Industrial Sectors 13 Benefits From the Acquisition of Selected Key Technologies 17 Intelligence Community Efforts Regarding Technology Losses and Areas Where Improvement Is Needed 21 The Chinese Technology Transfer Problem 27 1. Intelligence Community Coverage and Support Related to Export Control and Technology Transfer Responsibilities 5 2. Selected Technology Transfer Mechanisms and Controls 7 3. Soviet Clandestine Acquisition of US Military Technology 19 4. Selected Soviet Systems Projected for Initial Operational Capability in the 1990s. 15 5. Acquisitions From the West in the Key Areas of Soviet Military Technology. 16 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TO0176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret Technology Transfer and the Role of the Intelligence Community The Problem The Intelligence Community (IC) shares the committee's concern regard- ing the transfer of Western technology that benefits the defense efforts of Communist countries. Our intelligence indicates that the Soviets and their Warsaw Pact allies have acquired large amounts of such US and Western technology and equipment through legal and illegal means, including their intelligence services. The Soviets have tried and succeeded in acquiring the most advanced Western technology. They have used their scientific and technological agreements with the West to facilitate access to the new technologies that are emerging from our applied scientific research efforts. They have used their scarce hard currency to legally purchase uncontrolled advanced Western technologies having defense-industrial applications. And, they have used their intelligence services to ac uire those US technologies that are classified and export controlled 25X The Soviets and their Warsaw Pact allies have acquired militarily signifi- cant US technology through all possible technology transfer channels. Their effort to acquire US and Western technology is well planned and managed, its primary objective being to support Soviet and Warsaw Pact defense programs and to selectively fill gaps in their industrial base. Our intelligence indicates that this effort has been quite successful. Tables of selected US and Western technology and equipment acquired by the Soviets can be found in the tabular appendix to this report.n Over the last decade the KGB,' the GRU,2 and the East European Intelligence Services have acquired key military technologies, such as US ballistic missile guidance components and designs; sonar and related antisubmarine warfare (ASW) technology; tank and antiarmor technol- ogies; and wide varieties of missile and aerodynamic weapons technologies from the United States and its NATO allies. They have also been able to acquire large quantities of controlled technology such as semiconductor design and manufacturing equipment from the United States and other Western nations; we estimate that they may have acquired enough 'The Soviet Committee for State Security] I r--" 25X 2 The Chief Intelligence Directorate of the Soviet General Staff. Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 equipment to set upi 1, ntegrated-circuit production lines. Similarly, Soviet and East Europea cquisitions of US computer technology have been responsible for many of their advances in general purpose and minicomputers. The Intelligence Community has concentrated its efforts over the last several years in determining the nature and extent of Western technology losses 25X1 We have only recently begun to focus our analytical equipment has saved the Soviets' defense production ministries millions of dollars in R&D funds, not to mention the developmental time it has saved. The Soviets' need to reduce Warsaw Pact military production costs is cited as one of the primary reasons for acquiring advanced Western production- related technology sources also have cited the innovative effect of Western technology on Soviet industry as another reason for its acquisition and use. For example, we believe the extensive effort to acquire US-controlled semiconductor production equipment is an effort to modern- ize the whole Soviet electronic component industry, a key sector in the Soviet defense industry. Direct military applications of Western technology are hard to confirm, but we believe that most Western technology acquired by Soviet and East European intelligence services is used in some fashion by defense industry designers and manufacturers. We believe that such technology, which is usually acquired in response to specific requirements, is used directly or indirectly in both military R&D and countermeasure development. 25X1 actual Soviet use of acquired Western equipment and technology is limited we do know that the Soviets value Western technology quite highly. 25X1 ~ave stated that the acquisition of Western technology and 25X1 efforts on assessing the military value of these technology losses to the Soviets and their Warsaw Pact allies. Although our intelligence concerning While it was Soviet practice in the 1950s and 1960s to copy Western military technology and in some cases entire weapon systems (for example, the Sidewinder air-to-air missile, which became their ATOLL missile), their present inclination is to be far more discriminating, evaluating the foreign technology carefully and choosing only those design elements and engineering approaches that best fit their military needs and industrial capabilities. More and more, Western technology is needed only on a selective basis to upgrade key subsystems to achieve new performance objectives. The acquisition and copying of US inertial guidance compo- nents, for example, is believed to have helped the Soviets in achieving their Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret current ballistic missile accuracy. Soviet antisubmarine warfare (ASW) capabilities have been significantly upgraded as a result of illegal acquisi- tions of Western equipment and technology, and Soviet tanks have profited from acquired Western technology. To date we have not been able to assess the military and industrial implications of many known Soviet techinaloory acquisitions: we plan to, as time and resources permit, in the future. 5X L_E5X The Role of the Intelligence Community The role of the Intelligence Community concerning unauthorized and illegal transfers of US technology to Communist countries includes the following: 3 1. Collecting information on and monitoring the transfer of controlled technology to foreign countries and disseminating relevant intelligence to the appropriate US export control agencies. 2. Producing finished intelligence on the military, economic, and political implications of actual and proposed technology transfers to controlled- country destinations. 3. Providing support to the NSC and high-level policy and decisionmaking organizations within the US export control community-that is, Com- merce, State, Treasury, Energy, Defense, and the several interagency bodies that exist. 4. Providing intelligence support-as requested-to US Departments and Agencies (Commerce, State, Treasury, and Energy) that are responsible for administering export controls. 5. Disseminating that foreign intelligence information concerning possible violations of US export control statutes to the Department of Justice and to the appropriate investigative and enforcement agencies. 6. Disseminating intelligence and foreign counterintelligence information to the National Disclosure Policy Committee to aid in making decisions concerning the release of US classified military information and material to eligible foreign nations. 3 The IC's responsibilities concerning the loss of US technology are derived from a number of executive policy and decision memorandums as well as executive orders, including Executive Order 12036 and related Attorney General Guidelines concerning the reporting of possible export control violations, Presidential Review Memorandum (PRM-) 31 and its NSC Decision Memorandum, and NSC 953 establishing the Interagency Working Group on Export Control. Specific statutory responsibilities, however, are limited to the foreign availability responsibilities cited in the Export Administration Act of 1979 and to the Espionage Statute= 3 Secret Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 7. Providing current reporting and analysis of foreign intelligence on illegal, including clandestine, acquisitions of US technology to those export control organizations responsible for domestic and foreign compliance actions. 8. Using foreign counterintelligence operations, as appropriate, to prevent US technology losses involving hostile intelligence services. Table 1 lists the principal responsibilities of the Community and identifies the support of the IC organizations that perform them The FBI is the primary member of the Intelligence Community with law enforcement responsibilities related to technology losses, but it has no statutory responsibility for enforcing the Export Administration Act or the Arms Export Control Act. The enforcement responsibilities for these statutes are assigned to the Department of Commerce (Export Administra- tion Act) and the Department of State (Arms Export Control Act); these Departments call on the Customs Service for inspection and investigation assistance. The FBI does become involved in the prevention of US technology losses, however, when such losses are encountered in the course of its foreign counterintelligence investigations and in the course of its enforcement of espionage, foreign agent registration, and other criminal statutes. Other members of the IC (CIA and the military services) also conduct counterintelligence investigations which relate to US technology losses Although the IC has very limited responsibilities concerning the prevention of technology losses, its normal collection, analysis, and intelligence- production efforts regularly result in the production of foreign intelligence useful to the export control policy and enforcement agencies. These efforts have been of some assistance in strengthening US Government enforce- ment of national security export controls, in preventing potential unauthor- ized and illegal transfers, and in avoiding potential technology losses.I The IC supports US export controls by providing timely reporting and analysis to those government agencies and interagency working groups concerned with domestic and international compliance. With respect to domestic efforts, the IC provides foreign intelligence support to the Commerce Department's Office of Export Administration compliance Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 effort and to the Customs Service through regular dissemination of unevaluated intelligence, as well as through analytical support on particu- lar export cases, as requested. The IC also participates in the new Interagency Working Group on Export Control, chaired by the Depart- ment of Justice, which is responsible for the oversight and coordination of domestic enforcement activities of the US Government Similarly, the IC provides analytic and advisory support to the US Government's international monitoring and enforcement efforts through the Economic Defense Advisory Committee's (EDAC) Working Group II (WGII). This group is responsible for coordinating US Government positions on illegal diversions and enforcement issues involving negotiations bilaterally with other governments and multilaterally in the Coordinating Committee (CoCom).'Q The DCI's Committee on Exchanges (COMEX) coordinates IC efforts concerning official US Government exchanges and bilateral cooperative agreements, as well as commercial visits and related activities, with the USSR, China, and East European countries. COMEX advises the State Department and other agencies involved regarding possible science and technology gains and losses and the potential intelligence benefits to the United States of proposed, ongoing, or contemplated exchange programs. The committee advises State and others regarding ways that visits might be constrained in order to reduce the potential for adverse technology transfer. Under US national security export control regulations, the release of technical data to foreign visitors may be a form of export. When the pro- gram of a prospective visitor might require review by licensing authorities in Munitions Control or Commerce, these agencies are so advised. II At the present time the responsibilities and activities cited above are diffused throughout the Intelligence Community, and there is no central focus within the IC for overseeing and coordinating their execution. Composed of the following countries: the United States, United Kingdom, France, Italy, the Netherlands, Belgium, Luxembourg, Norwa nmark, Canada, Federal Republic of Germany, Portugal, Japan, Greece, and Turkey Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret The Technology Loss Problem The Nature of the Losses The USSR has traditionally given high priority and devoted large amounts of resources to the acquisition of US and Western technology by all means at its disposal. The efforts include legal acquisitions through legitimate trade, scientific and technological exchanges, open source publications, and international organizations and conferences; illegal purchases and trade activities, including diversions through trade channels that evade US export control, as well as traditional recruited agents, industrial espionage 25X Table 2 provides a general view of some of the many technology transfer mechanisms that must be monitored to detect illegal and unauthorized transfers. The table also identifies some of the control mechanisms that help stem our technology losses Among the many sources of Western technology accessible to the Soviets, the acquisitions that have the most immediate impact on Soviet military development have resulted from clandestine collection and trade diversions of defense-related technology. The most significant Soviet military acquisi- tions have been weapon designs, manufacturing plans and drawings, critical components, subsystems, and some complete weapon systems. The Soviets also have profited from the exploitation of captured Western military equipment (as in Vietnam) The Soviet clandestine collection program is approved at the highest levels of the government-that is, the Central Committee of the Communist Party and the Council of Ministers. These illegal acquisition efforts are driven first by the needs of the military, the defense industrial ministries, as voiced through the Military-Industrial Commission (VPK); and, second- ly, by the needs of the civilian sectors of Soviet industry that support defense production. The technology acquisition efforts of the Soviet intelligence services are worldwide, centrally directed, and very selective. They are closely coordinated with overt acquisitions and legitimate pur- chases, particularly those efforts under the auspices of the State Commit- tees for Science and Technology (GKNT). The USSR's acquisition efforts ively supported by the other members of the Warsaw Pact The Soviets and their Warsaw Pact allies also have acquired-mainly through illegal trade means-export controlled dual-use and defense- related production equipment. Over the last five years, Soviet illegal trade efforts have concentrated on computers, microelectronics, airbreathing propulsion technology, guidance and navigation systems, acoustic sensors, optical technologies (including lasers), and modern production equipment 5X Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Selected Technology Transfer Mechanisms and Controls Mechanisms a ? Direct investment ? Complete (turnkey) plant sales ? Patents and licenses with extensive teaching effort ? Joint ventures and joint production development ? Technical exchanges with ongoing contact ? "Know-how"-training, consulting in high-technology areas ? Processing equipment (with know-how) ? Technical data and engineering documents ? Proposals, presale negotiations, and sales presentations ? Commercial visits ? Governmental- and industrial-equipment sales ? Sales of products ? S&T and student exchanges ? Open literature (journals, magazines, technical articles, for example) ? S&T conferences, trade shows, and exhibits ? Hostile intelligence service acquisitions ? Recruited agents and industrial espionage ? Illegal arms trade ? Illegal trade ? End-user diversions ? Third-country diversions ? Foreign SIGINT ? Capture in war Controls ? Export controls (national and international) ? Government security and regulations ? Industrial security ? Company management ? Visitor control (governmental and industrial) ? Prerelease reviews of open literature a All transfer mechanisms can be employed with or without the participation of hostile intelligence service personnel. The involve- ment of such personnel can range from the overt, legal collection of unclassified, unembargoed technology to the clandestine acquisition of classified, military technology by agents working pursuant to the direction of hostile intelligence service personnel. Furthermore, most of the transfer mechanisms can be legally or illegally employed. Some of the mechanisms, such as capture in war, make the concept of legality moot. and technology. Detected diversions and evasions over the last several years were particularly heavy in the field of semiconductor manufacturing equipment, and they indicate Soviet and East European efforts to improve their whole electronic components industrial sector. The controlled technol- ogies being acquired by the Soviets and the Warsaw Pact are a revealing indication of their defense needs Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret Major Loss Problems The USSR and its Warsaw Pact allies are acquiring militarily critical and other significant Western technology through almost all possible technol- ogy transfer mechanisms. Because of their well-planned and exhaustive technology acquisition effort, the Soviets are able to fully exploit the open and legal sources available in the West at minimal cost and risk before em- ploying their intelligence services to acquire the more difficult export controlled and classified technologies they need for defense purposes. We have identified below some of the most serious technology transfer problems currently facing the United States and its allies 1. Losses resulting from Soviet and East European intelligence service operations (that is, recruited agents and industrial espionage), particular- ly abroad: The problems of protecting US technology from hostile intelligence services abroad are particularly difficult because the United States must rely mainly on the domestic security and counterintellfizence services of host governments.17 5X Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 2. US technology losses through trade diversions abroad: Whether the losses are the result of hostile intelligence operations or just illegal trade practices, the United States must in large part rely on the law enforcement efforts of those of its allies in whose countries these trade diversions take place. IThe Soviets have been a dominant force behind these illegal trade diversions of Western technology, with Poland and Hungary being their major East European surrogates. The US Government framework for dealing with these diversions is not now adequate to deal with large-scale, widespread losses or illegal losses involving US technology and US people abroad. The related task of coping with the possible end use or in-place diversions (that is, from civil to military applications) of equipment sold legally to the Communist countries is very difficult; this situation reflects both the great ease of affecting such diversions in closed societies and the enormous difficulties of detecting them. 4. Legal sales that contribute to Soviet defense capabilities: Legal purchases of Western equipment have played a major role in developing the Soviet industrial base. The Soviets have purchased billions of dollars Approved For Release 2007/03/24: CIA-RDP85TO0176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret worth of Western equipment and machinery over the last decade. These purchases have included a number of categories having potential defense application-advanced materials and fabrication equipment, modern elec- tronic componentry, laboratory and industrial test equipment, and auto- mated production equipment and technology. Such purchases, requiring hard currency, are closely controlled by the State Committee for Science and Technology (GKNT) and those meeting the direct or partial needs of Soviet industry for defense purposes are given the highest priority.^ The present Commodity Control List concentrates heavily on electronic technologies and treats to a lesser degree many industrial technologies- for example, metallurgy and chemical areas which are needed to manufac- ture modern weapons. The US system of general license authorizations permits legal sales of equipment and relatively low-level technical informa- tion without specific government review. The general license authorizations also permit the possession of equipment from which design details may be extracted, provide vast quantities of commercial technical literature, permit detailed contract bid documentation during negotiations for pro- spective sales, facilitate personal contacts and plant visits, and continued commercial relationships using normal maintenance, repair, and operation arrangements. 7 5. Transfers resulting from Soviet and East European exploitation of S&T exchanges pose a continuing loss problem: Soviet and East European efforts to acquire US technology are extensively abetted by the overt (and essentially legal) collection activities of their scientists and engineers that participate in academic, commercial, and official S&T exchanges. The S&T agreements are judged to provide valuable scientific information and technology for the USSR. The Soviets believe that their scientists partici- pating in these exchanges are able to acquire Western technology of considerable S&T and military benefit. Soviet and East European students and visiting technical delegations to the United States are generally of high quality, and we suspect many of them are associated with classified work in the country from which they come. These visits and various arrangements that permit direct Soviet access to US companies are considered to be among the more important sources of technology loss 6. Open source publications, particularly US Government documents, in which sensitive technology is made available prematurely, provides a major opportunity for Soviet and East European acquisitions: Soviet use of overt collection methods to acquire Western information and technology is so extensive that it is almost impossible to assess; no thorough study has ever been made on the subject. The Soviets have certainly recognized the value and utility of the open source literature-they regularly purchase almost all US Government - published S&T documents. The USSR Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 maintains an elaborate network for collecting, processing, and disseminat- ing information on Western science and technology. In all, 100,000 to 130,000 people are believed to be employed in this network. Soviet weapons designers are reported to follow such open source information very closely. US Government publication, dissemination, and classification/declassifica- tion procedures provide the Soviets an ever-increasing source of S&T information. Automatic-and often premature-declassification of gov- ernment R&D reports and their availability to the public at large offers the Soviets access to US technology that is very valuable to them in building their own industrial-military capability and countering US weapons devel- opment. US Government sales and information exchanges of unclassified S&T information with our allies, as well as with Communist countries, facilitates this access. 7. Losses through Communist-owned, locally chartered firms in the United States, Japan, and West European countries: There are at least 30 of these firms in the United States (five Soviet, 17 Polish, five Czechoslova- kian, and three Hungarian); most European countries have at least 20 each, with some having as many as 50. The location of Communist-owned firm"s abroad (both legitimate firms and dummies) facilitates the acquisition of US technology due to the sharply limited US oversight overseas. Over the past few years there has been evidence of the increased use of Communist-owned firms by Soviet and East European Intelligence Serv- ices in the United States to acquire controlled technology. These firms can legally purchase controlled US technology, and study it without actually violating US export controls unless they attempt to ship the equipment or related technical data out of the United States. Such activity is difficult to assess because these companies are formed under state laws and are thus not registered with the US Government. Furthermore, since representa- tives of Communist-owned but US-chartered companies are not obligated to identify themselves as agents of foreign governments, there is a great risk that joint ventures between such firms and US corporations could result in serious technology losses= 25X1 25X1 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret 8. Losses through Soviet and East European personnel in key positions in international S&T organizations: Examples of such organizations include the International Institute for Applied Systems Analysis (IIASA), the International Atomic Energy Agency (IAEA), and various S&T offices associated with the UN. The Soviets and East Europeans have taken advantage of their positions in these organizations to acquire Western S&T information and proprietary technology. All Soviet personnel in such organizations are required to acquire such information. There also have been instances where these positions have been used to facilitate the acquisition of controlled Western technology and to mount traditional clandestine intelligence operations II I indicates that the Vienna-based IIASA, 25X jointly funded by 17 member nations from the East and West, is increasingly being used by the Soviets for technology transfer purposes and for intelligence activities directed at the United States and its Western allies. The Soviet technology acquisition efforts there include: influencing the selection of research programs at the Institute that produce greater benefit to the Soviets than the West; exploiting assigned Western S&T personnel and their sponsors, particularly those from industry; and, the massive exploitation of IIASA's computer access to Western S&T comput- er data bases 25X 9. Losses of newly emerging and commercial technologies by all mecha- nisms: One of the most significant future loss problems concerns the lack of protection for commercial and emerging technologies. Many of these advanced technologies today will become the critical technologies of future Western weapon systems. Applications for new technologies just emerging from the research stage are often not yet firmly identified, and, conse- quently, there is a period when such technology is not protected by classification export control or p r o p r i e t a r y means 2 X I :: 2 X Moreover, as commercial interests continue to rep ace 25X governmental programs as the primary impetus behind US research and development, a larger sector of our advanced technology will fall initially outside the normal defense security sphere. The protection of such technology early on, and its denial to Communist countries, poses a significant and intractable problem. 25X Benefits to the Soviet Military and Defense-Industrial Sectors For the past 15 years the Soviet Union vigorously pursued a program to de- velop and modernize its strategic forces. This program continues unabated into the 1980s as the Soviets expand an already large military R&D and production establishment to provide the weapons needed to support their Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 leadership's broad military and political objectives. A basic component in the advancement of this military-industrial establishment has been the acquisition and exploitation of both technology and hardware from the West. Examples of systems and technologies acquired are listed in the tabular appendix The Soviets have been able to satisfy three basic R&D objectives through the selective acquisition of Western technology: ? First, the reduction of risk by following or copying proven Western designs. ? Second, the reduction of R&D time and costs by the use of Western designs and technology, including production-related technology and equipment. ? Third, the incorporation of countermeasures early in the Soviet weapons development process.= Similarly, the Soviets have been able to upgrade critical industrial sectors such as computers, semiconductors, and metallurgy, as well as to modern- ize Warsaw Pact industrial manufacturin capabilities in order to keep military production costs under control The fact that the Soviets historically have given high priority and devoted large amounts of resources to the acquisition of Western technology using all means at their disposal indicates that such technology is of great value to them. One way to measure the value of Western technology to the Soviets is to compare the technologies they have been acquiring to what we estimate their technological needs and gaps are for projected future weapons systems. At present, the Soviets have under way about 90 major military programs, at least a dozen of which are devoted to strategic ballistic missile systems. We expect the numbers of new or modified Soviet weapon systems reaching operational status in the 1980s to remain near historical levels, some 200 weapon systems in each of the past several decades. While the Soviet approach to military R&D relies mostly on evolutionary steps to minimize risks and avoid production problems, new generations of existing weapons requiring significant improvements in technology and some high- risk, innovative approaches also are undertaken. It is in these areas that So- viet illegal acquisition efforts are most likely to be concentrated. A selection of future systems projected for the Soviets in significant mission areas for the 1990s is shown in the left column of Table 4.0 Approved For Release 2007/03/24: CIA-RDP85TOO176ROO0900020001-5 Secret Projected High Probability of Occurrence Improved air-superiority Advanced lookdown/ Materials, guidance, computers, aircraft shootdown; possibly control microelectronics configured New weapon system for Accuracy (CEP) of 500 to 600 Computers, guidance/ Typhoon ballistic missile meters navigation, materials submarine b Modernized theater command, Versatile survivable equipment, Microelectronics computers, control, and communication automated control system production communication systems (widespread deployment) New class of attack submarine High speed, great depth, Production, materials, quietness propulsion T-80 tank follow-on b Improved day/night cross- Sensors, materials country mobility; armor protection Advanced space station Permanently manned, Sensors, signal processing (permanently manned) b multimission Space-based laser antisatellite Multiple target capability Directed energy, power sources system Improved Moscow ABM system Reentry vehicle discrimination, Computers, signal processing improved target-handling capability Projected Low Probability of Occurrence Enhanced neutron warheads Broad-area antitank weapon Production (for artillery rounds) (limited collateral damage) Air- and space-based submarine Broad-area search (if concept Signal processing, sensors wake detectors (feasibility has feasible) not been established for these concepts) a Key technology available for systems development. b May reach initial operational capability in the late 1980s. The key technologies that are required by the Soviets for these potential systems are displayed in the right column of Table 4.~ Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TO0176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85T00176R000900020001-5 Secret A Soviet technology is considered key or critical if it is basic to a number of significant military functions or concepts, or if it is a pacing factor for a specific military capability. For example, among the Soviet military - systems projected for the 1990s (Table 4), computer technology is basic to new performance in strategic and tactical systems for command, control, and communications; in a follow-on to the Typhoon ballistic missile submarine (SSBN/SLBM) system; and in an air-superiority fighter (in- cluding control configuration). As another example, the development of high-bypass-ratio turbofan engines in the propulsion technology area is the pacing factor in our projection of new Soviet performance capability in large transport aircraft capable of strategic airlift missions 25X The Department of Defense's initial list of militarily critical technologies, as placed in the Federal Register in October 1980, was prepared in response to the Export Administration Act of 1979. DOD's critical technologies list does not contain an explicit list of technologies critical to the USSR. It is principally a list of those technologies critical to US weapons that should be "protected" from the Communist countries. A comparable list of critical Soviet technologies has not been developed by the Intelligence Community for export control applications.) 2510 Benefits From the Acquisition of Selected Key Technologies Microelectronics. Since about 1965, the Soviets have placed a high priority on microelectronics R&D, and their military oversees the development and production of advanced integrated circuits. The Soviet practice has been to copy US devices. Many of their own devices are designed for compatibility with Western parts, and they rely on legally or illegally obtained Western parts to supplement their own base. The latest Soviet device design capability is now only about three years behind that of the United States while the production capability lag is about nine years. 25X Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 We expect Soviet military systems designers to continue to use devices that are pin-for-pin compatible with Western parts, thus decreasing the devel- opment time for their new systems. Indigenously produced parts can then be used when they become available. Thus, through the acquisition of Western components, the Soviets' future military applications of microe- lectronic technology may be more advanced than their general technology level would suggest There has been substantial evidence over the past decade that the USSR has obtained large amounts of Western materials and manufacturing and test equipment for microelectronic fabrication. These acquisitions cover nearly every area of the material input and manufacturing steps of microelectronic production. From this we have concluded that Western materials and equipment have played a very important, if not crucial, role in developing Soviet microelectronic manufacturing capability and produc- tion capacity. There has been little evidence to suggest that the Soviets have made significant progress in reducing their dependence on Western technology. Moreover, with the rapid progress that has continued in Western microe- lectronic technology and means of production, we estimate that the USSR will remain de endent on Western technology acquisitions well into the late 1980s" Among the Eastern European countries, only East Germany appears to have concentrated its efforts on the development of advanced microelec- tronic production equipment. Recent evidence indicates that the Soviets have pressured East Germany to assume an expanded role in supporting Soviet needs. We believe that more effective international control of microelectronics fabrication equipment and materials exported to the USSR and Eastern Europe would have a serious impact on the Warsaw Pact countries' future development of military-related electronics. The USSR and, to a more limited degree, the East European countries are about to enter large-scale production of LSI devices and will require increasing amounts of Western equipment and materials. It is unlikely that individually or collectively the Warsaw Pact countries can accomplish this modernization quickly and effectively without access to Western technology Computers. Soviet computer technology has been limited by fabrication and production technology problems and by difficulties in software devel- opment. Since 1969 the USSR and East European countries have been developing a family of general purpose computers known as the Ryad series. These computers essentially make up the total Soviet and East Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret tion of IBM designs0 25X European effort in general purpose computers, and they have been and will continue to be used in a wide variety of civil and military applications. The architectural designs of the Ryad computers are patterned after those of the highly successful US IBM 360 and 370 series of computers; the Ryad computers also use some Western engineering concepts in the implementa- Western technology has been important to the Ryad development because it has provided proven design directions both at the system and component levels. Thus, Soviet and East European computer production efforts have been devoted to the most successful Western computer designs that have ever been mass-produced, computers that could be used in a wide range of applications and could be highly serviceable in the field. With this approach the Soviets and East Europeans eliminated many of the risks in undertaking the development and production of a new series of general purpose com uters, and in some cases they saved considerable manpower and time.II 25X aircraft industry. Soviet and East European development of the Ryad computer systems has been aided by virtually all available acquisition means-legal and illegal, including clandestine-for acquiring technical know-how 25X information (mainly acquired by clandestine means) an 25X openly available data, however, was of greater benefit to the Ryad developers than were the acquisition (including illegal diversions) and study of actual IBM hardwarel 25X Production Technology. A major weakness in the Soviets' ability to incorporate advanced component technology in military systems lies in their outdated manufacturing equipment and production technology. The Soviets generally are not advanced by Western standards in production processes where large quantities of high-technology products are con- cerned. Their industrial production is generally marked by deficiencies in quality control, automation, and mechanization. As a result, Soviet production erformance even in high-priority military areas, has been uneven. II 25X Defense hardware production-characterized at present by labor-intensive processing-will continue to need key technological acquisitions from the West. Some improvements in productivity and machining accuracy will come from the introduction of Western automated manufacturing centers and other numerically controlled machine tools. Recent large purchases of machining centers from Japan and Western Europe may have already benefited some military manufacturing sectors, particularly the Soviet Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Current Soviet foreign technology acquisition efforts seem most concen- trated in obtaining numerically controlled machines (including robots) for precision, repeatable machining operations. They are also interested in materials and materials processing, including powdered metallurgy proc- esses and powder forming and pressing equipment, with some emphasis on steel casting methods and composite materials (carbon-carbon, metal matrix, ceramic matrix, and high-performance polymer matrix) produc- tion. They have sought electron-beam and other automatic welders, casting and drilling techniques and equipment, and chemical milling processes. Radar and Acoustic Signal Processing. The Soviets' theoretical under- standing of most aspects of signal propagation, as well as of signal processing techniques and algorithms, probably is on par with that of the West. They lag the West, however, by five to 10 years in the speed of digi- tal computer signal processing equipment and in its production. Because of their new military needs, as well as this lag, they have been attempting to acquire this Western technology To make up for some of their sonar signal processing deficiencies, for example, the Soviets purchased a number of real-time, narrowband acoustic signal analyzers (CoCom controlled) from Denmark in the mid-to- late 1970s. The Danish firm claimed it was unaware that the processors were CoCom controlled. The technology in the processors is more advanced than the technology the Soviets have, and it could significantly improve Soviet ASW capabilities to passively classify US submarines and extend passive sonar detection ranges against US submarines Airbreathing Propulsion Technology. Soviet indigenous R&D in airbreath- ing aerospace propulsion technology shows a strong commitment to high- temperature operation of turbine-based systems through advances in materials, cooling`, and surface coating and manufacturing technologies with the goal of building more efficient, more compact jet engines. The So- viets are somewhat deficient in the development of these technologies, which are key for use in C-5A-sized transports or cruise missile carriers and for improved turbojet and low-bypass-ratio turbofan engines used in strategic bombers, fighters, and attack aircraft 1: Western technology acquisitions by the Soviets over the last five years have been effected by a wide range of requirements in these same technological areas. Inquiries, acquisitions, and acquisition attempts include almost all technologies and equipment to build high-temperature, jet engine, gas generator cores including cooling technology and film-cooled turbine-blade Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Secret designs; turbine-blade fabrication processes and equipment; and high- temperature superalloys used in the actual blade-fabrication process including pressing, stamping, forging, drilling, casting, and welding tech- niques. In addition, the Soviets have been very active, although unsuccess- ful, in efforts to obtain very large, high-bypass-ratio, turbofan engines which use high-temperature engine cores. Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5 Approved For Release 2007/03/24: CIA-RDP85TOO176R000900020001-5