THE TECHNOLOGY ACQUISITION EFFORTS OF THE SOVIET INTELLIGENCE SERVICES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP84B00049R001403390009-8
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
29
Document Creation Date: 
December 20, 2016
Document Release Date: 
May 11, 2007
Sequence Number: 
9
Case Number: 
Publication Date: 
June 1, 1982
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP84B00049R001403390009-8.pdf1.54 MB
Body: 
Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Director of ? Central Intelligence The Technology Acquisition Efforts of the Soviet Intelligence Services (v) Interagency Intelligence Memorandum 2 13:3 r ;Alaaroyed For Release 2007/05/11 CIA-RDP84B00049ROO1403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 THE TECHNOLOGY ACQUISITION EFFORTS OF THE SOVIET INTELLIGENCE SERVICES (U) Information available as of 25 May 1982 was used in the preparation of this Memorandum. Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 CONTENTS PREFACE ................................................................................................................... 1 SUMMARY AND OVERVIEW ................................................................................ 3 DISCUSSION .............................................................................................................. 7 Soviet Scientific and Technical Collection Efforts: Trends and Historical Context ........................................................................... 7 Soviet Acquisitions of Militarily Significant Western Technology ..................... 7 Soviet Tasking in the Technology Acquisition Effort .......................................... 9 Military-Industrial Commission ......................................................................... 10 State Committee for Science and Technology ................................................. 10 The Soviet and East European Intelligence Services: Organization and Operational Methods in Acquiring US and Other Western Technology ... 15 The Committee for State Security (KGB) ......................................................... 15 The Main Intelligence Directorate (GRU) ........................................................ 16 S&T Collection Methodology of the Soviet Intelligence Services ................... 17 Soviet Technical Collection: Communications Intelligence ............................ 20 East European Services ...................................................................................... 21 iii SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 PREFACE This Interagency Intelligence Memorandum addresses the key role of the Soviet intelligence services and their surrogates in acquiring advanced US and other Western (including Japanese) technology. This particular focus of the Memorandum is not intended to overshadow the significance of acquisitions by other Soviet and East European organiza- tions and the consequent need for stringent US export controls. Indeed, the continuing Soviet acquisition of technology from the West using all means at Moscow's disposal is one of the most complex and vexing issues confronting US policymakers.I The term "technology transfer" connotes a wide range of scientific and technical, economic and industrial, and trade and communications activities; there is no single definition. When viewed in terms of their national security implications, the means by which technology transfers occur take on even greater significance. These means range from open- source publications through legal trade and illegal trade diversions to traditional clandestine operations. In certain instances, transfers not normally considered cost-effective in the usual commercial sense (such as reverse engineering) may be used by actual or potential adversaries that otherwise would be denied such technology This Memorandum was prepared under the auspices of the National Intelligence Council by the Central Intelligence Agency, the Defense Intelligence Agency, the Federal Bureau of Investigation, the National Security Agency, the DCI's Community Counterintelligence Staff, and the intelligence components of the Department of State, the Department of Energy, the Customs Service of the Department of the Treasury, and the Air Force, Army, and Navy. It was reviewed by and coordinated with the intelligence components of the Departments of Commerce and the Treasury. This Memorandum was approved by the DCI's Technology Transfer Intelligence Committee and, on 25 May 1982, concurred in by the National Foreign Intelligence Boar I SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 SUMMARY AND OVERVIEW The USSR is engaged in a well-organized, centrally directed, and growing worldwide program to acquire US and other Western military technology, embargoed equipment, and manufacturing technology to satisfy its military and defense-industrial needs. The Soviet intelligence services and their East European surrogates play a major role in this worldwide program through a broad range of clandestine, technical, and overt collection operations. Although these intelligence operations constitute a small part of the overall Soviet technology acquisition effort, we believe these operations are responsible for acquiring the overwhelming majority of the militarily significant Western technol- ogy t that finds its way into the Soviet Union Acquisitions of Western technology by the Soviet intelligence services and their surrogates have afforded the Warsaw Pact significant military and industrial benefits. These include: - Increasing the pace of indigenous development of weapon systems and reducing military research and development costs and risks. - Developing effective countermeasures against US and other Western military systems. - Modernizing and broadening critical sectors of the Warsaw Pact defense industrial and support bases. These and other acquisitions of Western technology by nonintelligence organizations have contributed substantially to the growth of Soviet military power and the steady erosion of the technological superiority on which US and allied security currently is based. In turn, this has stimulated the United States and its allies to make even greater efforts to overcome or defend against these enhanced Soviet capabilities= The Soviet and East European intelligence services employ a vast array of methods to acquire US and other Western technology. The most effective of these collection methods include: - Recruiting agents-in-place from business, government, military, and academic sectors both in the United States and overseas. ' As used here, militarily significant technology is defined as that equipment, material, and technology having direct and immediate impact on Soviet military research, development, and productiol I 3 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Arranging illegal trade diversions through third countries to evade US export controls. Using Communist-country-owned but locally chartered firms to acquire controlled technology and to support clandestine collection operations. Intercepting US and other Western telecommunications to acquire proprietary and controlled industrial technology and unclassified but sensitive defense program information. - Exploiting official scientific and technical exchanges and inter- national organizations. - Collecting large amounts of open-source S & T information available in Western countrielI The technology acquisition efforts of the Soviet and surrogate intelligence services have become more systematic and effective in the past 10 to 15 years. Their collection efforts-both legal and illegal-are well coordinated on a global scale to maximize the total effect of the So- viet acquisition effort. Their collection activities are closely tailored to the changing security practices of Western governments and their industrial, commercial, and academic sectors. Among the trends we have noted over time in the Soviet intelligence services' efforts are the following: - Weapon-related acquisitions increasingly are more selective, focusing on critical components and materials necessary to achieve greater performance. - Greater emphasis is being placed on acquiring Western produc- tion technology and equipment, reflecting Soviet needs to increase the efficiency of large-volume production for the Warsaw Pact; much of this technology and equipment is subject to export controls, and its acquisition often is accom- plished through intelligence-directed trade diversions. - Commercial and emerging technologies are becoming priority targets in their own rights, indicating the military value placed on them by the USSR as well as their greater vulnerability to in- telligence service acquisition methods. - Acquisitions of US technology are being stepped up abroad, reflecting a relatively freer operational environment overseas than in the United States. 4 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 - The role of the East European intelligence services has been increasing steadily over the years, and the Soviets are providing them with an ever expanding set of collection requirements; the rate of increase has risen recently as a result of Western embargoes on technology transfers to the USSR in the wake of Afghanistan and Poland. 0 As the vast array of the Soviet and East European intelligence services' scientific and technical collection activities suggests, neither the US export control community nor the Intelligence Community separately can respond adequately to this mounting threat to US national security. Furthermore, the Soviet intelligence services and their surrogates have acquired a large majority of US export-controlled and government-classified technology overseas through illegal trade diver- sions and intelligence operations. Thus, only a concerted and multi- faceted approach to this problem-combining both effective export control policies and vigorous counterintelligence programs-by the United States and its allies can counter the broad-based Soviet and East European technology acquisition effort 5 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 DISCUSSION Soviet Scientific and Technical Collection Efforts: Trends and Historical Context 1. The USSR traditionally has placed a high priority on and devoted large amounts of resources to the acquisition of Western technology by all means-legal and illegal. The primary objective of these efforts is to support Soviet and Warsaw Pact military programs, particularly in developing new weapon systems, im- proving existing ones, or developing countermeasures. The secondary aim of these acquisition efforts has been to reduce costs and increase efficiency in Soviet defense-industrial production, including those civilian sectors of the Soviet economy that support the USSR's defense effort= 2. The Soviets assign the highest priority to obtain- ing and exploiting US and other Western militarily significant technology. This effort began in the 1930s and continued throughout World War II as the Soviets reproduced US weapon systems that were provided to them under Lend-Lease auspices. The effort reached a high point in the immediate postwar period with clandestine Soviet acquisition of US atomic-weapons- related technology. From the late 1940s through the early 1960s, the Soviets continued to acquire and copy US and other Western military technology, often duplicating entire weapon systems. In a few instances, they have even tolerated short-term military depend- ence on foreign technology in order to incorporate designs and features not available through indigenous Soviet research and development, or to speed the development of high-priority weapon systems 3. Since the mid-1960s, however, the Soviets in- creasingly have been more precise in their search for military technologies in the West. Having developed a capable technological base and an evolutionary design philosophy suited to their military doctrine, they now evaluate foreign military technologies more carefully, seeking to acquire and assimilate only those Western design elements, engineering features, and production technologies that best fit Soviet military requirements and industrial capabilities. F I 4. The Soviets' well-coordinated, high-level effort to acquire US and other Western technology has enabled the USSR and the Warsaw Pact to increase their military capabilities and spurred the United States to commit even greater resources to its defense effort. In addition to their traditional emphasis on acquiring Western military technologies, and their more recent emphasis on industrial production know- how and equipment, the Soviets now appear to be targeting new, emerging technologies under develop- ment in the West. These technologies-including adaptive optics, very-high-speed integrated circuits, superconductive systems, state-of-the-art computer de- vices, and genetic engineering and recombinant DNA-generally are the most advanced and least protected technologies in the United States and other Western countries. This focus is intended by the Soviets both to satisfy their military and industrial objectives and to prevent "technological surprise"- that is, a situation in which the USSR is caught unaware of the military applications of hitherto basic scientific research.I Soviet Acquisitions of Militarily Significant Western Technology 5. The USSR is engaged in a well-organized, cen- trally directed, and growing worldwide program to acquire Western technology to satisfy its military and defense-industrial needs. (See table 1.) The Soviet intelligence services and their East European surro- gates play a major role in acquiring US and other Western military technology, embargoed equipment, and manufacturing technology required to meet Sovi- et military objectives. This effort complements the overall Soviet program for legally acquiring such technology and equipment for their military and defense-industrial needs. Although Soviet and East European intelligence services' acquisitions of militari- ly significant Western technology 2 constitute a small 2 As used here, militarily significant technology is defined as that equipment, material, and technology having direct and immediate impact on Soviet military research, development, and production. 7 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Selected Soviet and East European Legal and Illegal Acquisitions From the West Affecting Key Areas of Soviet Military Technology Computers ........................................ Illegal and legal trade acquisitions of complete systems, hardware and software, including a wide variety of Western general purpose computers and minicomputers, for military applications; clandestine acquisitions of proprietary information; exploitation of captured avionics and fire-control systems. Microelectronics ............................... Complete industrial processes and semiconductor-manufacturing equipment through legal and illegal trade channels; if combined, this equipment probably is enough to meet 100 percent of the Soviet mili- tary requirement for high-quality microelectronics. Signal Processing .............................. Illegal trade acquisition of seismic streamers and associated computers and of acoustic spectrum analyzers for antisubmarine warfare (ASW). Communications .............................. Illegal trade acquisition of low-power, low-noise, high-sensitivity receivers. Production ........................................ Legal and illegal acquisitions of automated and precision manufacturing equipment for electronics, materials, and possibly optical and laser weapons components; clandestine acquisition of documenta- tion on production technology of weapons, ammunition, aircraft parts, turbine blades, computers, and electronic components. Directed Energy .............................. Metal foils for e-beam lasers and optical components acquired through legal and illegal channels. Guidance and Navigation ............... Legal and illegal trade acquisitions of loran and other navigation receivers; illegal and clandestine acquisitions of advanced inertial guidance components, including miniature and laser gyros; captured US equipment, including terrain-following radars, antiradiation missiles, and fire-control systems; clandestine acquisitions of air-to-air and surface-to-air missiles and of ASW cruise missile and tactical ballistic missile guidance subsystems; legal acquisition of precision machinery for ball bearing production. Structural Materials ......................... Legal purchases and intelligence acquisitions of Western titanium alloys and welding equipment. Propulsion ......................................... Missile case filament-winding technology through legal and illegal trade; some ground propulsion technology through illegal and legal trade (diesels, turbines, and rotaries); submarine nuclear propulsion plant designs by clandestine means; legal and illegal purchases of advanced jet engine fabrication technology and jet engine design information through clandestine means; captured jet engines from Vietnam. Nuclear Weapons ............................. Design of various bombs, warheads, and reentry-vehicle-related data through clandestine means. Chemical Explosives ........................ Clandestine acquisition of manufacturing details of advanced high explosives for nuclear weapons. Acoustic Sensors (ASW) ................... Clandestine acquisition of underwater navigation and direction-finding equipment; seismic streamers acquired through illegal trade diversion. Nonacoustic Sensors (ASW) ............. Clandestine acquisition of selected equipment and technology. Radar ................................................ Exploitation of captured terrain-following radar and airborne intercept radar; clandestine acquisition of radars for fighter aircraft, air defense radars, and antenna designs for US surface-to-air missile systems. Electro-Optic Sensors ....................... Clandestine acquisition of information on US satellite technology; illegal trade acquisitions of laser rangefinders for tanks. 8 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 portion of the overall Soviet effort, we believe that the overwhelming majority of worldwide Soviet acquisi- tions of militarily significant Western technology is obtained through their collection operations-clandes- tine, technical, and overt. The amount of classified technology acquired is believed to be relatively small, and the vast majority of that has been acquired outside the United States 6. In addition tot a significant clandestine acquisi- tions of US nuclear weapons technology that led to Soviet nuclear bomb capabilities earlier than anticipat- ed, the Soviet intelligence services clandestinely ac- quired over the past two decades details of several US nuclear warheads; US and British manufacturing de- tails of advanced high explosives required for the production of nuclear weapons; and designs of nuclear propulsion systems, all of which have benefited Soviet military programs 7. Other clandestine acquisitions of Western tech- nology, equipment, and systems by the Soviet and East European intelligence services that have been copied in their entirety or used in designing or manufacturing new Soviet weapons include: - The US Sidewinder missile, which, when copied in its entirety, gave the Soviets their first heat- seeking air-to-air missile, the Atoll. - The US Redeye, which aided the Soviets in developing their first shoulder-fired surface-to- air missile, the SA-7. In addition, the Soviet Bloc services clandestinely acquired: - Data on the guidance subsystem of the US Minuteman ICBM. - Technical data on more than 200 gyros from a subsidiary of a US high-technology firm in Germany. - Data on solid-propellant missiles, an area in which the Soviets considerably lag US develop- ments, especially for use aboard submarines. - Data on radars used on US F-14, F-15, and F-18 fighter aircraft that are likely to be used in developing similar Soviet radars. - Data on the TOW and MILAN antitank weap- ons, probably to develop countermeasures. - A German Leopard tank engine, probably for modification and use on the newest Soviet ad- vanced tank. Although it is likely that there have been many other significant acquisitions of which we are unaware, these clandestine acquisitions by the Soviet and East Euro- pean intelligence services have permitted the Soviets to develop military capabilities much sooner than otherwise possible, and they have enabled the Soviets to reduce the qualitative edge of some Western weap- 1 :1 8. The Soviet and East European intelligence serv- ices also use overt collection operations quite effective- ly to acquire Western scientific and technical (S&T) information. Their overt collections against US and other Western technologies have contributed to Soviet military systems. These acquisitions range from data on US ICBM silos (used by the Soviets in developing silos for their first solid-fuel ICBM, the SS-13), to technical data drawn from NASA's research on super- critical wing designs (which helped the Soviets to design and to build a new transport aircraft), to technical documentation on US and other Western military systems and their associated training and maintenance procedures 9. The Soviet intelligence services and their East European surrogates also collect much Western S&T information through technical collection means, main- ly communications intercepts in the United States and abroad. We believe that the USSR has acquired technical data and design concepts on a number of Western missile, aircraft, and naval systems in this manner, and that this information is valuable to the Soviet Union's military and defense industries. Soviet Tasking in the Technology Acquisition Effort 10. The Soviet Union's effort to acquire US and other Western technology is a massive, well-planned 9 SECRET 25X 25X' 25X Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 and well-financed national-level program. Overall ap- proval for the Soviet acquisition effort is given by the Central Committee of the Communist Party of the Soviet Union (CPSU), which is the final authority for all policies of the USSR. CPSU directives concerning Soviet technology acquisition activities are implement- ed by the Council of Ministers of the USSR, which is the highest level of government in the Soviet Union and coordinates the official policies of the Soviet state. (See figure 1.Cl Military-Industrial Commission 11. The high priority the Soviets assign to the acquisition of US and other Western technology is reflected in the dominant role played by the Military- Industrial Commission (VPK) of the Presidium of the Council of Ministers. The VPK's primary role is to coordinate the development and production of Soviet weapon systems. The VPK also plays the key role in developing requirements for both legal and illegal acquisitions of military and advanced dual-use West- ern technology. The VPK directly oversees the partici- pation of the nine key Soviet defense industries in acquiring and exploiting foreign technology. (See fig- ure 2.) Requests from these and the defense-support industries for Western technology are consolidated and validated by the VPK. The VPK also centrally directs the end use of design and production technol- ogy for the Soviet defense-industrial complex, and coordinates the technical examination and exploitation of foreign weapon samples in industrial research and development organizations. Finally, the VPK provides policy guidance for Soviet technology acquisition ac- tivities abroad 12. VPK requirements are issued formally and in great detail. (See table 2.) The complete VPK require- ments list resembles a book, containing some 400 to 500 pages of requirements encompassing a broad spectrum of military hardware and related production technologies and technical data. The VPK require- ments list probably is revised and updated annually, reflecting changes in collection priorities and target availability. The VPK requirements list includes the items sought; their collection priorities; how long each requirement is valid; which Soviet ministry levied the collection requirement; the most likely sources of the technology to be acquired; and the budget for each acquisition. Provisions are also made for ad hoc, 13. The VPK requirements list is levied directly on the Soviet intelligence services. In those Western countries with extensive S&T collection targets, the residency of the GRU (see paragraph 25) probably has the entire requirements list. In most GRU residencies in the Third World, only those items likely to be available in country are specified for collection pur- poses, probably in an abstract from the larger require- ments list. The KGB (see paragraph 18) works from the VPK requirements list in much the same fashion, as its S&T collection effort includes supporting Soviet de- fense-industrial production. State Committee for Science and Technology 14. The VPK requirements list is coordinated with the State Committee for Science and Technology (GKNT) of the Council of Ministers, which supports the VPK in both legal and illegal Soviet efforts to acquire foreign technology. The GKNT's scientific and technical information gathering and processing activities are vital to the generation of Soviet require- ments for foreign technology acquisitions. These GKNT activities reside in a nationwide, centrally directed system that comprises some 100,000 individ- uals and 11,000 information departments affiliated with Soviet research institutes, design bureaus, and production facilities. The GKNT also collects technical information through a vast, complex network of scien- tific and industrial agreements and exchange programs with other countries and multinational corporations. The GKNT's All-Union Institute of Scientific and Technical Information (VNIITI) collects, translates, and disseminates scientific and technical publications, industrial patents, and technical journals from at least 117 foreign countries. Through VNIITI Soviet scien- tists, engineers, and technicians are kept abreast of foreign scientific, technical, and industrial develop- ments 15. The GKNT, in conjunction with the Ministry of Foreign Trade, also exerts substantial control over legal purchases of US and other Western technology through its control over hard currency expenditures. This control helps to ensure that all proposed pur- chases are justified in terms of defense priorities before they are executed. It also serves to prevent 10 SECRET 25X Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Figure 1 Key Organizations Contributing to Soviet Military R&D, Manufacturing, and the Acquisition of Western Technology ^ Technology Requirements, Evaluations, R&D, and Manufacturing ^ Western Technology Acquisitions Central Committee Secretary for Defense Affairs Council of Ministers Defense Council Ministry of Defense Main Intelligence Directorate (GRL) Technical Directorates of Operational Forces ? S trptegie Rockets ? Air Defense ? Naval ?Air -Ground Military- Industrial Commission (VPK) Defense- Industrial Ministries ? Aviation ? General Machine $uilding(Missites) ? Defense -Shipbuilding ? Radio -Medium Machine Building(Nuclear) -Machine Building I M unition ,) ? Electronics *Communications Equipment Committee for State Security (K(;B) East European Intelligence Services State Committee for S&T 1(;KST) Academy of Sciences Ministry of Foreign Trade Other Industrial Ministries ?:Autonl of ice ?I leave Trmspon ?Electricel ?I051 rll me nI ?Poacr ?Clteminil ? I rector and Machine Building ? Petroleum 11 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Figure 2 The Soviet Requirements, Collection, and Acquisitions Cycle Requesters ^ Collectors ^ Targets Military- Industrial Commission (VPK) Defense- Industrial Ministries Aviation General Machine Building(Missiles) Defense ?Shipbuilding ? Radio ? Medium Machine Building(Nuclear) ? Machine Building (Munitions) Electronics !? Communications Equipment Requests for Technology Other Industrial Ministries =Automotive ?lleavy Transport -Electrical ? Instrument ?Power -Chemical -Tractor and Machine Building ? Petroleum Committee for State Security (KGB) Main Intelligence Directorate (GRU) Ministry of Foreign Trade East European Intelligence Services United States Western Europe Japan Others Targeted Technology CKNT Must A From Other In Academy of Sciences pprove Requests dustrial Ministries ? Classified ? Embargoed ? Proprietary ? Emerging ? Open-Source Technology acquired by all collectors is returned to the USSR for evaluation, exploitation, and application. 12 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 a Excerpts From Early 1970s VPK Requirements List Requirement No., Priority, Period of of Validity Subject of Requirement and Quantity T062-0467 B-I 1971 T020-0164 B-II 1971 TRO20-0163 B-II 1971 photo- and radiotechnical re- connaissance of ground targets Automatic assembly line for manufacturing noncontact fuse XM596, with integrated cir- cuits, for 40-mm grenades fired from M75 rapid-fire recoilless launchers, 1 set of technical documentation System of antisubmarine guided weapon "Asroc"-"ship-to-sub- marine" type. 1 set of scientific and technical documentation The system of the antisubmar- ine guided missile "Malafon" of the ship-to-submarine type 1 set of scientific and technical documentation Maximum Ruble Cost Known Characteristics and Features or the Nature and Content of the Country, Firm per Unit Documentation (date of production) 5,000 Scientific information and technical USA documentation: - Photographic equipment-resolution of the camera in relation to altitude and distance of the object: - precision matching of the pictures Customer AF SAMSO Los Angeles AF Station, California 2,000 received to the terrain; - film supply; - design of the recovery capsule con- taining the exposed film 1. Folder of working blueprints of the Firm Lockheed Aircraft Corporation USA assembly line. 2. Technological process of assembling the fuse on the automatic assembly line Source: "Electronic News" 1968, No. 676, pp. 4-5 Harry Diamond Laboratory Universal Instru- ments and Feder- al Tool Co. 2,500 Scientific information: USA - research in the area of development of new systems of antisubmarine guided- Honeywell (1960-62) 2,500 missile defense; - reports of test results on the missile "Asroc"; - methods used to evaluate the effective- ness of antisubmarine weapons I. Scientific information: France - research in the area of development of new systems of antisubmarine guided- missile defense; - reports on the results of testing the antisubmarine guided missile "Malafon"; - method of evaluating the effectiveness of antisubmarine weapons. "Societe Latecoere" II. Technical documentation: - blueprints of the general configuration of the missile, individual units of the engine, warhead, hull, and other units; - technical description of the antisubmar- ine guided missile "Malafon"; - technical materials on the guidance de- vice and on searching and detecting of the target; - description of the guidance and homing systems; - blueprints and description of parachute and other braking systems in the above- water zone of the trajectory. 13 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Table 2 (Continued) Excerpts From Early 1970s VPK Requirements List Requirement No., Priority, Period of of Validity S015-0238 Maximum Subject of Requirement Ruble Cost and Quantity per Unit Aviation hydroacoustic station 5,000 with lowered acoustic antenna for a flying boat Known Characteristics and Features or the Nature and Content of the Documentation Technical documentation: - report with respect to the development of the acoustic station; - technical description of the complete station and its individual instruments (in the first place, the hydroacoustic antenna); - a set of the basic and functional diagrams; - operational instructions Source: 1. "Flux Revue Flugwelt nation- al," 1968, No. 9, p. 31 2. U.S. Naval Institute Proceed- ings, 1968, vol. 911, No. 2, p. 125 A042-0116 A-I 1972 Kh039-0311 B-II 1970 K022-0019R Effectiveness of various destruc- tive agents against space, aero- dynamic, and ground targets and methods of protecting them. Communications and telemetry 3,000 Technical documentation: description, dia- systems of the "Apollo" grams, drawings spacecraft 0 1. Scientific information (analyses, reports) on: - high-velocity collision of bodies; - factual data on the distribution and characteristics of micrometeorites as a function of distance from the Earth; -effect of meteor particles on space objects; 2. Technical documentation: - description of mechanisms for acceler- ating bodies of various materials to ve- locities exceeding 2-3 kilometers per second 2,500 Ultraviolet and infrared spectra of free radicals in irradiated polyethylene Country, Firm (date of production) Japan, "Oki Electric" (1968-1971) USA "Langley Research Center," "Eglin" Air Force Base "Carnegie Institute of Technology" "Armor" Research Foundation Chicago "AF Cambridge Research Center" USA "Northwestern University Evanston" (1969) USA Massachusetts Institute of Technology, "Convair Co.," "Martin Co." 5X2 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 duplication of effort across the full range of acquisi- tion methods available to the Soviet Union.= 16. The GKNT also manages efforts to acquire Western technology through the collection activities of Soviet scientists and engineers in academic, commer- cial, and official science and technology exchanges, including those sponsored by the Soviet Academy of Sciences. In addition to overseeing Soviet participation in these exchanges, the GKNT serves to coordinate technology acquisitions through them by levying col- lection requirements on officially sponsored Soviet scientists, engineers, and academicians. This GKNT collection effort is closely coordinated with that of the Soviet intelligence services to minimize overlap and duplication of effor 17. Finally, the GKNT also levies collection re- quirements on the Soviet intelligence services when US and other Western technology sought by the USSR cannot legally be obtained under its auspices. The GKNT also provides scientific and technical guidance and support to the collection activities of these serv- ice The Soviet and East European Intelligence Services: Organization and Operational Methods in Acquiring US and Other Western Technology The Committee for State Security (KGB) 18. The First (foreign operations) Chief Directorate of the Committee for State Security (KGB) is responsi- ble for a major portion of the Soviet clandestine science and technology collection effort. KGB empha- sis on S&T collection has existed since well before World War II, but has increased steadily in the postwar years in direct response to pressures from the highest levels of the Soviet Government to intensify the acquisition of US and other Western science and technology 19. Organizationally, the increased importance of S&T collection in the KGB was reflected in the upgrading of the former 10th (S&T) Department of the First Chief Directorate to directorate status in mid-1963. It was known as the Scientific and Techni- cal Directorate until 1968, when it was redesignated Directorate T. Then, in May 1971, the Central Com- mittee of the CPSU and the Council of Ministers of the USSR, after careful review, adopted a resolution spe- cifically designed to strengthen further the work of Directorate T. The resolution stressed that a scientific and technical revolution was taking place and that, in the interests of national defense and development of the national economy, it was necessary for the Soviet Government to obtain timely information on scientific and technological plans and trends throughout the world. 20. The KGB was encouraged to focus on the consequences of military and industrial application of these developments, and particularly on the possibility that there would be qualitative changes in the devel- opment of armaments and technology in enemy coun- tries. The resolution noted that it was particularly important to obtain information on works of applied military significance being carried out in the United States, the other NATO countries, and Japan 21. Directorate T intensified its efforts, as a direct result of the 1971 CC/CPSU resolution, and developed a plan with expanded operational objectives. The KGB also expanded Directorate T's Scientific Research In- stitute. This institute collects, reviews, and analyzes all S&T information available to the KGB, and it also prepares requirements for the operational components of the KGB. To accomplish these tasks, the institute was expanded in 1971 from approximately 450 to nearly 600 employees, about 50 of whom were KGB staff personnel and the rest civilian workers with various technical backgrounds. 22. Within the First Chief Directorate of the KGB, primary responsibility for conducting S&T collection operations rests in Directorate T, which has nearly 1,000 officers on its staff in the USSR and abroad. KGB foreign residencies with S&T missions have a component that goes by the name of Line X, manned by Directorate T specialists. Line X officers conduct the majority of clandestine S&T operations. There are 250 to 300 Line X officers serving abroad at present. In all instances, these a icate &T officers are assisted by other intelligence assets. 1 -1 15 SECRET 25 25 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 23. Directorate T/Line X officers in the West are concentrated largely in North America, Japan, and Western Europe. There are, however, significant Di- rectorate T operations run against S&T targets of opportunity in other countries. These include those Third World countries that may be developing indig- enous technological capabilities and/or obtaining them from the West as well as spotting, assessing, and recruiting US citizens abroad and foreign students who may study in the United States. 24. The best available insight into specific KGB tasking is contained in the long-range work plan for Directorate T, covering the period 1972-76, which outlined both operational and informational objec- tives. An analysis indicates that this plan remains valid. Among the most important of these objectives is the penetration of the leading scientific research cen- ters, firms, and government institutes in the United States, Western Europe, and Japan for the purpose of obtaining scientific and technical information, data, and documents. The KGB was, and continues to be, interested in basic research and development efforts having potential military applications. This is particularly true if such efforts have the potential to upset the strategic balance. Thus the KGB has targeted a wide range of basic research in such fields as lasers, weather modification, earthquake and tsunami wave inducement, and antigravitation. interest. The Main Intelligence Directorate (GRU) 25. The Main Intelligence Directorate (GRU) of the Soviet General Staff has put a high priority on collect- ing military S&T information since the earliest days of Soviet military intelligence. Before 1953 there was a Scientific and Technical Department within the GRU, responsible for the S&T collection program. It appar- ently was decided that this represented an unnecessary degree of specialization in a military intelligence organization, and the department was abolished in 1953. Since then, there has been no single component within the GRU responsible for clandestine S&T col- lection. Rather, the responsibility has been given to the GRU's four geographical directorates as one of their basic and integral functions. Most of the S&T collec- tion work is done by the First Directorate (Europe) and Third Directorate (North and South America). Except for Japan, the Directorates for Asia and Afri- ca/Near East have fewer S&T targets of priority 26. The GRU differs from the KGB in that the GRU has no dedicated cadre of career S&T specialists. Instead, most GRU officers have technical back- grounds and educations, and all of them include S&T collection as an integral part of their responsibilities. his operations 27. As in the KGB, GRU residencies in the West operate on the basis of an annual plan, sent from the GRU center each year, which outlines the priority collection requirements for the following year in the country in question. These requirements are drawn primarily from the VPK requirements list. The plan covers such things as the military policy of the host country, specific requirements on its armed forces, similar information concerning neighboring countries of interest, separate requirements on weapons and other specialized areas of technology, and, in a sepa- rate section, military-economic requirements. This is the framework in which the GRU resident conducts 16 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 These targets include American businessmen and gov- ernment officials; officials of foreign governments, for- eign firms, and foreign subsidiaries of US firms; repre- sentatives of international organizations having access to advanced and/or proprietary technology; and West- ern scientists, academicians, and students I 30. Illegal Diversions. Illegal diversions of tech- nology fall into two general categories. One is the illegal diversion of controlled US technology from legitimate trade channels to proscribed destinations. This is done through foreign firms willing to engage in profitable impropriety, agents-in-place in foreign firms or foreign subsidiaries of US firms, Communist- country-owned but locally chartered firms, and for- eign purchasing agents (including arms dealers 17 SECRET S&T Collection Methodology of the Soviet Intelligence Services 28. In conducting S&T collection operations, the KGB and the GRU use all of their normal operational methods, with a few refinements that seem particular- ly suited to S&T operations. Although the United States is the primary S&T target, both the GRU and the KGB have long believed that it is a comparatively difficult place in which to operate. For this reason, US technology is more easily acquired abroad. Conse- quently, third-country operations have been stressed, both against Americans abroad and against foreign firms affiliated with American companies of S&T interest 29. an es ine Operations. The basic clandestine activities of the Soviet and East European intelligence services involve the use of recruited agents-in-place to commit espionage. These services have focused their recruitment effort on both Americans and foreign nationals with access to controlled US technology. Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 diversions are accomplished through the use of forged shipping and licensing documents employed by dum- my firms either established by or having close ties with the Soviet intelligence services or their East European surrogates. In one example, East Germany's Ministry for State Security established dummy firms in Vienna for the sole purpose of acquiring advanced microelec- tronics technology illegally. The Soviet intelligence services and their surrogates are in the mainstream of this illegal trade flow. The other category is in-place diversion in which legally acquired technologies are put to illegal end uses and/or used by unauthorized end users. Both types of illegal diversions are extreme- ly difficult to detect and monitor. 31. The USSR has been the dominant force behind illegal trade diversions of Western technology, with Poland and Hungary apparently being major East European participants. The principal entities responsi- ble for illegally diverted Western technology have been located in West Germany, France, and Japan. The principal third-country intermediaries through which US technology has been illegally diverted in- clude West Germany, France, Austria, Switzerland, and Japan. Illegal trade diversions are also reported to have taken place in Belgium, the Netherlands, Spain, South Africa, India, Canada, the United Kingdom, Italy, Sweden, and some Middle Eastern and Southeast Asian countries 32. Communist-Country-Owned, Locally Char- tered Firms These firms provide an excellent base for Soviet Bloc intelligence service activities within the United States; a forward base for mounting "legal traveler" intelligence operations in the United States; an effective means for overt acquisition of controlled US technology; and an operational mecha- nism to acquire illegally US technology in high- priority sectors (electronics, precision machine tools, and complete industrial processes) subject to export controls. 33. Most West European countries have at least 20 Communist-country-owned, locally chartered firms each, with some having as many as 50. The location of these firms abroad (both legitimate and dummy firms) facilitates the acquisition of US technology because US oversight overseas is sharply limited.) 18 SECRET 25 25 25 25 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 34. Over the past few years there has been increas- ing evidence of the use of Communist-country-owned firms by Soviet and East European intelligence serv- ices in the United States to acquire controlled technol- ogy. These firms can legally purchase controlled US technology and study it without actually violating US export controls unless they attempt to ship the equip- ment or related technical data out of the United States. Such activity is difficult to assess because these com- panies are formed under state laws and are not required to incorporate with the US Government.3 Furthermore, because representatives of Communist- country-owned but US-chartered companies are not obligated to identify themselves as agents of foreign governments, there is a great risk that joint ventures between such firms and US corporations could result in serious technology losse I 35. Exploitation of Scientific and Technical Ex- changes. Efforts by the Soviets and East Europeans to acquire US technology are extensively abetted by the overt (and essentially legal) collection activities of their scientists and engineers who participate in academic, commercial, and official S&T exchanges. The Soviets believe that their scientists participating in these ex- changes are able to acquire Western technology of considerable S&T and military benefit. Soviet and East European students and technical delegations visiting the United States are generally of high quality, and we suspect many of them are associated with classified work in the country from which they com intelligence services seek to satisfy these requirements and to assess their American colleagues for potential intelligence operational purposes. On their return to the USSR, these scientists are debriefed by Soviet intelligence officers seeking to glean any S&T infor- mation of potential use to the Soviet military effort. These visits and various arrangement permit direct Soviet access to US companies are considered to be among the more important sources of technology loss because of the "hands-on" experience and collegial working relations with US counterparts gained by Soviet participants.II 36. The Soviet intelligence services play a major role in overall Soviet S&T collections in the exchanges. Soviet participants in this program are briefed on desired S&T intelligence collection targets before leav- ing for their assigned placements in the United States. Once in the United States, these co-optees of the Soviet There are statutory requirements for registering various forms of foreign investment in the United States. However, these are limited to entities that issue stock or securities. The degree to which even this information may be made available to US intelligence and law- enforcement officials is strictly limited by law. 37. The Soviet intelligence services also use the exchange program to facilitate their overall S&T collection effort. This is done in a number of ways, including supporting other clandestine, technical, and overt operations in North America. 38. Exploitation of International S&T Organiza- tions. Examples of such organizations include the International Institute for Applied Systems Analysis (IIASA), the International Atomic Energy Agency (IAEA), and various S&T offices associated with the UN. The Soviets and East Europeans have taken advantage of their positions in these organizations to acquire Western S&T information and proprietary 19 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 technology. All Soviet personnel in such organizations are obliged to acquire such information. There also have been instances where these positions have been used to facilitate the acquisition of controlled Western technology and to mount traditional clandestine intel- ligence operations 39. Overt Collection Activities. The Soviet intelli- gence services are engaged heavily in acquiring open- source scientific and technical information. Thus, So- viet intelligence officers frequently attend S&T fairs, exhibitions, and conferences. They then send written reports to their headquarters recounting the lectures and briefings they have heard, and attaching the brochures and other documents they have collected. In addition, Soviet intelligence officers subscribe heavily to S&T periodicals and other literature. These may be relayed to their headquarters simply for translation and analysis, or residencies may extract information on particular subjects over time and then write reports based on this open research. Finally, Soviet Bloc intelligence officers have been engaged in exploiting US and other Western data bases. This activity has led in the past to massive Soviet purchases of unclassified and occasionally declassified US Government techni- cal documents through the Department of Com- merce's National Technical Information Service, a practice that was ended in 1981; the East Europeans, however, continue to have access to this source of technology. The Soviets also have gained access to Western commercial computer data bases through IIASA, including the Lockheed data base Dialog, the European Space Agency's data base Diane, and the International Patent Documentation Center. The Sovi- ets also subscribe to at least one privately owned US microfilm information management system containing more than 7,000 unclassified documents published by various US Government agencies, including training manuals of the armed forces. Finally, although we have no evidence of Soviet Bloc intelligence service use of the Freedom of Information Act (FOIA) to acquire US technology, the FOIA does provide the potential for such acquisitions to the extent that useful information not subject to FOIA exemptions is con- tained in federal records. These overt collection activi- ties afford the USSR broad access to unclassified S&T information, some of which may be export controlled. Soviet Technical Collection: Communications Intelligence 40. The USSR has mounted an extensive communi- cations intelligence (COMINT) effort to acquire US and other Western technology. Through this effort, the Soviet intelligence services have been able to acquire sensitive S&T information-proprietary, export con- trolled, and even government information which in the aggregate clearly is classified'-of value to the ' Although US Government regulations require the transmission of classified R&D information via secure means, these regulations are not always strictly observed. Moreover, because of the extensive use of telecommunications by US defense contractors and other high- technology firms (often via facsimile), large amounts of export controlled and proprietary S&T information are vulnerable to the Soviet COMINT threatl I 20 SECRET 25 25 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Warsaw Pact's military and defense-industrial capa- bilities. The Soviets regularly monitor the communica- tions of US defense contractors. Assessments made with the help of such contractors revealed that acquisi- tions by this means enable the Soviets to gain signifi- cant information on key defense programs, including strategic and tactical ballistic missiles, new military aircraft, ships and submarines, and space and recon- naissance systems; some of these programs are still under development. In addition to its direct use in acquiring Western S&T information, COMINT can also be used by the Soviet intelligence services to guide their other collection efforts. the area from Norfolk, Virginia, to the Florida Keys), and periodic presence off the US west coast near the western test range. Collection of technical intelligence is likely in view of the vulnerable emanations in those areas. Surveillance of sea trials, missile testing, space operations, and shore-based naval and military signals offers the Soviets a wealth of R&D technical data with direct military application.^ Complex at Torrens, Cuba 42. COMINT Sites in the USSR. The KGB cur- rently has at least 10 intercept facilities in the USSR that have a mission of monitoring foreign communica- tions satellites. These facilities are probably used to monitor commercial traffic, which would include scientific and technological data, transmitted over the INTELSAT network 43. The GRU COMINT effort is the responsibility of the Sixth (Radio and Radio-Technical Intelligence) Directorate. This directorate is tasked with collecting intelligence derived from foreign military communi- cations and electronic emissions, primarily from the military forces of the United States, the West Europe- an countries, and China. The GRU effort also includes monitoring the INTELSAT network 44. Auxiliary General Intelligence Vessels. The more than 50 AGI vessels in the Soviet and East European inventory are charged with monitoring both communications and noncommunications electromag- netic emanations via such missions as area patrols along coastal regions, surveillance of US and NATO fleet exercises and ship transits, surveillance of sea trials, missile tests, and space operations. Established AGI patrols include one off the US east coast (covering East European Services 48. Many Soviet requirements for the acquisition of Western technology are closely coordinated among the East European intelligence services. This coordination is achieved in three general ways. The first is through a priority list of general requirements supporting economic development in the member states of the Council for Mutual Economic Assistance (CEMA). This CEMA list is approved by the chiefs of the various East European intelligence services and guides the general Bloc efforts to acquire Western technology 21 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 through illegal and/or clandestine means. The second is through direct Soviet tasking of an East European service. These special requirements are levied by the KGB and the GRU in support of Soviet military and/or economic priorities. The Soviets delegate these special assignments to particular surrogate services on the basis of their collection capabilities against specific Western technological targets. Finally, individual East European intelligence services may apprise their Sovi- et counterparts of collection opportunities outside the scope of the CEMA priority list and direct Soviet tasking. 1 771 49. The Soviets value highly the S&T collection activities of their East European satellites, and often will offer them preferential treatment in return for their acquisitions of US and other Western technology. In many instances, this preferential treatment may take the form of increased military and/or economic assistance. = 50. In the past two years, the USSR has made increased use of its East European surrogates to ac- quire Western technology. This stems primarily from the Western post-Afghanistan embargo on technology transfers to the USSR but not to Eastern Europe, and it coincides with an overall increase in Soviet and East European efforts to acquire Western technology early on in the research and development cycle before it is classified or protected by proprietary controls.0 51. The principal East European intelligence ser- vices tasked by the Soviets for acquisition of Western technology appear to be those of Bulgaria, Czechoslo- vakia, East Germany, Hungary, and Poland.,' Each of these services is discussed below. 52. Bulgaria. In 1980 the Bulgarian Directorate of State Security (DS) reorganized its First Chief Direc- torate (foreign intelligence) to upgrade the S&T com- ponent to directorate level. This reorganization reflect- ed a high-level Soviet request that the chief target of the Bulgarian service be S&T collection abroad. Bul- garian intelligence officers have said that they will do anything to get this type of information and that the specific field is not important. The prime mover behind this reorganization is Ognyan Doynov, the 5 Reporting indicates that the Romanian and Yugoslavian intelli- gence services generally are not responsive to Soviet tasking for such collection activities. Bulgarian Politburo member in charge of industry. 53. As part of the new S&T program many more Bulgarian scientists and engineers will be sent on visits to the West to acquaint themselves with the latest developments in their fields of specialty as well as to develop information and access to S&T targets of interest. In addition, many more science attaches, all of whom are DS officers, will be assigned to Bulgarian embassies in the West. The number of science attaches will be more than doubled in the near future to about 25. All are said to be technically well qualified and are, or will be, targeted against specific technical areas in their countries of assignment 25X1 25) 54. While there is no evidence that the Bulgarian military intelligence service (RUMNO) has been di- rected to collect S&T intelligence, it stands to reason that any S&T information that would have military application would be of concern to the GRU and hence RUMNO, which is under GRU tutelage ~8 55. Czechoslovakia. For more than 20 years there has been a department in Sprava I (foreign operations) of Czechoslovakia's Federal Ministry of Interior (FMV) responsible for scientific and technical oper- ations. By the beginning of the 1980s, about 200 people were assigned to this department. Between 50 and 60 serve at FMV headquarters, with another 60 to 70 assigned to the Ministry for Technological and Investment Development and various Czechoslovak foreign trading companies. The remainder are sta- tioned abroad in various Sprava I residencies. 56. In recent years the S&T department of Sprava I has increased in both size and importance. It is free to expand its budget and staff in order to carry out its mission, and it operates within the context of an executive agreement between the FMV and the KGB. The S&T department receives specific requirements from the Ministry of Technological and Investment Development and from Czechoslovak military re- search institutes) 57. There is no current reporting on the S&T operations of the Czechoslovak military intelligence service (ZSGS). We assume, however, that the ZSGS works closely with the GRU 58. East Germany. The primary point of contact for Soviet coordination of Bloc technology acquisition 22 SECRET 25 25 25 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 efforts in East Germany is that country's Ministry for State Security (MfS). The MfS executive management is responsible for cooperating with the KGB in support of the military and industrial sectors of the Soviet economy. Within the MfS, the Science and Technol- ogy Sector (SWT) of the Main Administration for Intelligence has the primary responsibility for collec- tion against Western technological targets. 59. The core target of the SWT acquisition effort is military-related technology held in the NATO coun- tries, particularly in the United States and West Germany. The most important of these technologies are those involved in the development, production, and planned combat use of nuclear, biological, and chemical weapon systems. The SWT is also tasked to collect intelligence information on new, emerging high-technology developments in fields-such as mi- croelectronics, energy (including nuclear), materials and production, and biochemistry-with potential for both military and industrial applications. end users. 60. The SWT is tasked by the KGB to collect scientific and technological intelligence in the United States and Western Europe. This collection effort is coordinated in two ways. First, the director of the SWT meets at least annually with his KGB counter- part. The thrust of these Moscow consultations prob- ably is to discuss particular collection requirements and problems. These meetings are complemented and given continuity by the presence of a KGB liaison officer on permanent assignment to the SWT. This officer is in a position to levy both written and verbal requirements on the East Germans, and selects the SWT acquisitions for distribution by the KGB to Soviet 61. Hungary. There is increasing evidence that Hungary is actively engaged in operations involving technology transfer and illegal trade diversions. These efforts are undertaken largely at the behest of the Soviets, who levy the requirements and provide the money. Although there is little available information concerning the extent to which the Hungarian intelli- gence services are involved in this activity, they obviously play a role. The III Main Group Directorate of the Ministry of Interior, Hungary's civilian intelli- gence service, uses its officers and co-optees stationed abroad in commercial positions not only to negotiate trade deals with Western companies but to obtain covertly from Western businessmen S&T information and embargoed items. Intelligence officers with tech- nical backgrounds work under cover in Hungarian foreign trade enterprises concerned with specialized fields such as electronic equipment and computers, and it must be assumed that they also are involved in illegal trade diversions 62. It is not known to what extent the Hungarian military intelligence service (VKF-II) is involved in 23 SECRET 25X1 25X1 25X1 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 technology transfer activities, but its officers stationed abroad at military attache offices are engaged in the collection of overt information in the S&T field as well as in military-related fields.1 63. Poland.6 The major Focal point io Poland for KGB coordination of efforts to acquire Western technol- ogy is the Ministry of Internal Affairs (MSW). The MSW's major external intelligence functions include the collection, evaluation, and dissemination of scientific, technological, and industrial information and materials. This effort is complemented by the Second Directorate (Z-II) of the Polish Army's General Staff, carried out with GRU coordination. The external functions of Z-II include collecting, analyzing, and disseminating scien- tific and technological information related to the capa- bilities and intentions of NATO. 6 The activities attributed to the Polish intelligence services in this section have been reduced in the wake of Poland's continuing political and economic difficulties 64. The Soviets reportedly have been impressed with the success of Polish efforts to acquire Western technology and have agreed to subsidize them by direct contribution to the Polish budget. In 1979 this subsidy reportedly amounted to $15-20 million, or roughly 30 percent of the total planned Polish expend- iture of $50 million for acquisition of Western technol- ogy 65. The MSW is under constant pressure from the KGB to procure Western production know-how in the fields of microelectronics and computers, aircraft mainframes and engines, avionics, and military-relat- ed technologies. These emphases probably reflect mounting Soviet concerns about rapidly increasing costs in both military and civilian production, as well as projected manpower shortages in the Soviet labor force, together with more traditional Soviet problems such ductivity and resource waste. 24 SECRET 25,X1 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 IMPLICATIONS AND OUTLOOK The acquisition of Western military technology and industrial production equipment by the Soviet intelli- gence services has saved the USSR's defense establish- ment valuable time and resources in its effort to keep pace with military developments in the West. Weap- ons designs and technical documentation have pro- vided proven approaches and technologies thus reduc- ing technical risks and R&D costs. Engineering insights gained from the exploitation of acquired Western military technology have permitted the Soviets to gain improved weapon performances by copying Western designs and incorporating effective countermeasures into their new systems development. Western produc- tion equipment and industrial technology-much of this acquired by illegal means-have been used to manufacture critical military components years before the Soviet defense industries could develop their own. Furthermore, the Soviets and their Warsaw Pact allies, often with direct assistance from their intelligence services, have been able to acquire much defense- related equipment, material, and technology through open and legal means. Finally, as a consequence of these and other acquisitions of Western equipment and technologies, the Soviets have been able to allocate more resources to the support of their war-fighting capabilities. F-1 The acquisition and effective use of Western tech- nology has had a detrimental effect on US national security in at least two ways. First, through acquisi- tions of Western technology the Soviets have been able to field a greater variety of more sophisticated and effective weapons in a shorter period of time. This has permitted them simultaneously to improve military capabilities and to devote more resources to the development of advanced weapons concepts such as directed-energy weapons, antisatellite programs, and titanium hull attack submarines. Second, infusions of Western technology and equipment have lightened the burden of continuing growth in Soviet R&D and defense spending. As a consequence, the United States and its allies must devote even more of their own resources to offset these increases in Soviet military power.II The operations of the Soviet and East European intelligence services continue to pose the most serious and immediate threat to the security and protection of militarily significant Western technology. Their orga- nization and central direction for the collection of Western technology have been developed to a high degree of precision over the last 10 to 15 years in order to meet the changing needs of Soviet weapons design- ers and defense manufacturers. At the same time they have developed appropriate clandestine, technical, and overt collection operations tailored to the chang- ing security practices of Western governments and their industrial and private sectors. Taking advantage of the openness of Western research centers and inadequate commercial security, Soviet and East Eu- ropean intelligence services have moved quickly to exploit these sources of new and emerging technologies for their military needs. The task of stopping Soviet intelligence operations aimed at Western military and industrial technologies already poses a formidable problem, both in the United States and abroad. This task is likely to become even more difficult in the future as several trends identified in the 1970s continue into the 1980s: - First, since the early 1970s, the Soviets and their surrogates among the East Europeans increasing- ly have used their national intelligence services to acquire Western civilian technologies-for ex- ample, automotive, energy, chemicals, and even consumer electronics. - Second, since the mid-1970s, Soviet and East European intelligence services have emphasized the collection of manufacturing-related technol- ogy, in addition to weapon technology. - Third, since the late 1970s, there has been in- creased emphasis by these hostile intelligence services on acquiring new technologies emerging from Western universities and research centers. The combined effect of these trends is a heavy focus by the Soviet intelligence services on the commercial sectors in the West-sectors that normally are not 25 SECRET Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 protected from hostile intelligence services. In addi- tion, the security provided by commercial firms is no match for the clandestine operations of such intelli- gence services. The most alarming aspect of this commercial focus by the Soviet intelligence services and their surrogates, however, is that as a result of their operations they have access to those advanced technologies that are likely to be used by the West in its own future weapon systems. The Soviet intelligence services' S&T collection units have grown in both the numbers of highly qualified scientific officers and technical collection capabilities. These services' S&T collection efforts today are worldwide, focusing first on the United States, Europe, and Japan, and secondly on those less developed countries that possess or have access to advanced Western technology. Through the use of its East European allies' intelligence services and other surrogates such as Cuba, the USSR's collection efforts pose a multifaceted threat to the West. The satisfac- tion of the Soviet Union's national-level requirements for Western equipment and military technology serve as the common denominator for the direction and coordination of this multifaceted and multinational collection program We estimate that uture oviet and East European intelligence service S&T acquisition efforts-clandes- tine, technical, and overt-will be concentrated world- wide on the following types of Western technology: - Weapons designs and related defense produc- tion technology, particularly against US technol- ogy both in the United States and abroad with some increased emphasis given to the technology of US allies. - Embargoed equipment, goods, products, and material, and associated technologies, especial- ly dual-use items obtained through the clandes- tine efforts of the Soviet and East European intelligence services. Company proprietary technology necessary to manufacture advanced commercial components and systems, using clandestine and illegal means to acquire these for future military and defense industrial applications; intelligence efforts against these types of technology are as likely to be concentrated in other Western countries as in the United States. Government-generated S&T information and unclassified but defense-applicable technology produced largely by the United States, acquired mainly by overt Soviet and East European collec- tors and through multinational open-source doc- ument procurement, organized and directed by Soviet Bloc intelligence. Emerging technology from Western govern- ment research centers and universities, using visiting Soviet and East European scholars and researchers and commercial delegations targeted and supported by Soviet Bloc intelligence; since the post-Afghanistan sanctions, these activities have declined in the United States and increased abroad, especially in West Germany and Japan. In the United States, a trend noted is that Soviet and East European visitors increasingly have made use of unofficial, non-government-spon- sored exchanges to avoid US Government con- trols associated with official exchanges. To counter the general Soviet technology acquisition effort, and in particular the collection activities of the Soviet intelligence services and their surrogates, the United States and its allies must develop a multina- tional program combining improved export control and enforcement policies with vigorous counterintelli- gence actions. Only such a concerted and multifaceted approach to the technology loss problem can oppose successfully the broad-based Soviet and East European acquisition agenda 26 SECRET 25 25X1 Secret Secret Approved For Release 2007/05/11: CIA-RDP84B00049R001403390009-8 ; T .r,..J l e 2;007/05/1,1.: CIA-RDP84B00049ROO1403390009-8