Advanced Technology Acquisition Strategies of the People's Republic

Total Page:16

File Type:pdf, Size:1020Kb

Advanced Technology Acquisition Strategies of the People's Republic Advanced Technology Acquisition Strategies of the People’s Republic of China Principal Author Dallas Boyd Science Applications International Corporation Contributing Authors Jeffrey G. Lewis and Joshua H. Pollack Science Applications International Corporation September 2010 This report is the product of a collaboration between the Defense Threat Reduction Agency’s Advanced Systems and Concepts Office and Science Applications International Corporation. The views expressed herein are those of the authors and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government. This report is approved for public release; distribution is unlimited. Defense Threat Reduction Agency Advanced Systems and Concepts Office Report Number ASCO 2010-021 Contract Number DTRA01-03-D-0017, T.I. 18-09-03 The mission of the Defense Threat Reduction Agency (DTRA) is to safeguard America and its allies from weapons of mass destruction (chemical, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate, counter the threat, and mitigate its effects. The Advanced Systems and Concepts Office (ASCO) supports this mission by providing long-term rolling horizon perspectives to help DTRA leadership identify, plan, and persuasively communicate what is needed in the near-term to achieve the longer-term goals inherent in the Agency’s mission. ASCO also emphasizes the identification, integration, and further development of leading strategic thinking and analysis on the most intractable problems related to combating weapons of mass destruction. For further information on this project, or on ASCO’s broader research program, please contact: Defense Threat Reduction Agency Advanced Systems and Concepts Office 8725 John J. Kingman Road Ft. Belvoir, VA 22060-6201 [email protected] Acknowledgements The authors gratefully acknowledge Mark A. Stokes of the Project 2049 Institute for his many contributions to this report. In addition, we thank Paul Bernstein, George Ullrich, Lewis A. Dunn, Gregory Giles, and Jeffrey Cooper of Science Applications International Corporation for their thoughtful and constructive reviews of draft versions of the report. ADVANCED TECHNOLOGY ACQUISITION STRATEGIES OF THE PEOPLE’S REPUBLIC OF CHINA TABLE OF CONTENTS Acronyms....................................................................................................................................................................iii Executive Summary....................................................................................................................................................1 Introduction ................................................................................................................................................................5 Study Purpose ........................................................................................................................................................8 Report Roadmap..................................................................................................................................................11 Section 1: Overt Acquisition of Foreign Weapons and Technology .............................................................15 1.1 Russia ..............................................................................................................................................................17 1.2 Ukraine............................................................................................................................................................21 1.3 Europe ............................................................................................................................................................21 1.4 Pakistan...........................................................................................................................................................22 1.5 United States ..................................................................................................................................................23 Section 2: Unsanctioned Alliances........................................................................................................................25 Section 3: Illicit Technology Acquisitions ...........................................................................................................29 3.1 Key Players.....................................................................................................................................................29 3.2 PRC Intelligence Gathering Methodologies .............................................................................................30 3.3 Illicit Technology Acquisition Targets.......................................................................................................41 Section 4: Reverse-Engineering.............................................................................................................................43 Section 5: Indigenous Research and Development ..........................................................................................49 Section 6: Acquisition and Development of Dual-Use Technology..............................................................61 Section 7: Case Studies in Technology Acquisition ...........................................................................................67 Case Study 1: Land Attack Cruise Missiles......................................................................................................67 Case Study 2: Hit-to-Kill Technology ..............................................................................................................73 Case Study 3: Adaptive Optics for High Energy Laser Applications..........................................................81 Case Study 4: China’s Acquisition of Strategic Weapons..............................................................................85 Appendix Section 1: Overt Acquisition of Foreign Weapons and Technology .......................................97 Appendix Section 2: Unsanctioned Alliances............................................................................................... 101 Appendix Section 3: Illicit Technology Acquisitions.................................................................................. 103 Appendix Section 4: Reverse-Engineering ................................................................................................... 107 Appendix Section 5: Indigenous Research and Development .................................................................. 109 Appendix Section 6: Acquisition and Development of Dual-Use Technology...................................... 111 Appendix Literature .......................................................................................................................................... 113 i DEFENSE THREAT REDUCTION AGENGY – ADVANCED SYSTEMS AND CONCEPTS OFFICE ii ADVANCED TECHNOLOGY ACQUISITION STRATEGIES OF THE PEOPLE’S REPUBLIC OF CHINA ACRONYMS ABM anti-ballistic missile AEW airborne early warning AMRAAM Advanced Medium-range Air-to-Air Missile ASAT anti-satellite ASCM anti-ship cruise missile ASW anti-submarine warfare AVIC-II Aviation Industries of China II AWACS airborne warning and control system BIS Bureau of Industry and Security C4ISR command, control, communications, computers, intelligence, surveillance & reconnaissance CAEP China Academy of Engineering Physics CFIUS Committee on Foreign Investment in the United States CIA Central Intelligence Agency CCP Chinese Communist Party CMC Central Military Commission COSTIND Commission of Science, Technology, and Industry for National Defense DIA Defense Intelligence Agency DoD U.S. Department of Defense DOE Department of Energy DSTC Defense Science and Technology Commission ESA electronically steered phased-array FBI Federal Bureau of Investigation FBIS Foreign Broadcast Information Service FEL free electron laser FOBS Fractional Orbital Bombardment System GAD General Armaments Department GAO Government Accountability Office GDP gross domestic product iii DEFENSE THREAT REDUCTION AGENGY – ADVANCED SYSTEMS AND CONCEPTS OFFICE GERD gross domestic expenditure on R&D GLD General Logistics Department GSD General Staff Department HARP High Altitude Research Program IAPCM Institute of Applied Physics and Computational Mathematics ICBM inter-continental ballistic missile IOE Institute of Optics and Electronics IRC Independent Review Committee ISI Inter-Services Intelligence KKV kinetic kill vehicle LACM land attack cruise missile MID/PLA Military Intelligence Department of the People’s Liberation Army MSS Ministry of State Security NAIC National Air Intelligence Center NCIX National Counterintelligence Executive NIBS National Institute for Biological Sciences NITKA Ukrainian Research Test and Flying Training Center NRO National Reconnaissance Office OTH over-the-horizon PACOM United States Pacific Command PFIAB President’s Foreign Intelligence Advisory Board PLA People’s Liberation Army PLAAF People’s Liberation Army Air Force PLAN People’s Liberation Army Navy PPP purchasing power parity PRC People’s Republic of China QED quiet electric drive R&D research and development S&T science and technology SAM surface-to-air missile SCO Shanghai Cooperation Organization iv ADVANCED TECHNOLOGY ACQUISITION STRATEGIES OF THE PEOPLE’S REPUBLIC OF CHINA SCOSTIND State
Recommended publications
  • Prepared by Textore, Inc. Peter Wood, David Yang, and Roger Cliff November 2020
    AIR-TO-AIR MISSILES CAPABILITIES AND DEVELOPMENT IN CHINA Prepared by TextOre, Inc. Peter Wood, David Yang, and Roger Cliff November 2020 Printed in the United States of America by the China Aerospace Studies Institute ISBN 9798574996270 To request additional copies, please direct inquiries to Director, China Aerospace Studies Institute, Air University, 55 Lemay Plaza, Montgomery, AL 36112 All photos licensed under the Creative Commons Attribution-Share Alike 4.0 International license, or under the Fair Use Doctrine under Section 107 of the Copyright Act for nonprofit educational and noncommercial use. All other graphics created by or for China Aerospace Studies Institute Cover art is "J-10 fighter jet takes off for patrol mission," China Military Online 9 October 2018. http://eng.chinamil.com.cn/view/2018-10/09/content_9305984_3.htm E-mail: [email protected] Web: http://www.airuniversity.af.mil/CASI https://twitter.com/CASI_Research @CASI_Research https://www.facebook.com/CASI.Research.Org https://www.linkedin.com/company/11049011 Disclaimer The views expressed in this academic research paper are those of the authors and do not necessarily reflect the official policy or position of the U.S. Government or the Department of Defense. In accordance with Air Force Instruction 51-303, Intellectual Property, Patents, Patent Related Matters, Trademarks and Copyrights; this work is the property of the U.S. Government. Limited Print and Electronic Distribution Rights Reproduction and printing is subject to the Copyright Act of 1976 and applicable treaties of the United States. This document and trademark(s) contained herein are protected by law. This publication is provided for noncommercial use only.
    [Show full text]
  • US National Security and Military/Commercial
    COMMERCIAL SPACE INSURANCE VOLUME II: Chapter 8/Summary he space insurance aspect of the Intelsat 708 launch failure focuses on the exchange of controlled technical information within the insurance community. Insurance underwriters and reinsurers for the Apstar 1A satellite program — the next scheduled T satellite to be launched on the Long March 3B after the Intelsat 708 failure — were concerned about the reliability of the Long March rocket, and the fate of future launch insurance programs in the PRC. Immediately after the Intelsat 708 launch failure, space insurance under- writers for the Apstar 1A insurance program pressured the PRC to create an international and Independent Review Committee (IRC). These underwriters and reinsurers insisted on this arrangement to ensure that an adequate assessment of the risks of future Long March rocket launches was made. Representatives from J & H Marsh & McLennan, an international space insurance brokerage firm, were adamant about obtaining a report from the Independent Review Committee for the benefit of the reinsurers of the Apstar 1A satellite insurance program. Members of the space insurance community were invit- ed to attend a meeting on April 15 and 16, 1996, in the PRC. The purpose of the meet- ing was to build confidence in the Long March rocket, and to discuss the status of the Apstar 1A insurance program. The space insurance acquisition and underwriting process includes the dis- semination of technical information, the consideration of market conditions, capac- ity, and participants, and the involvement of insurance brokers, underwriters, and rein- surers. This chapter identifies several issues relating to procedures for the disclosure and handling of sensitive information by the insurance community.
    [Show full text]
  • THE G2000 GROUP Owner & Operator of G2000 & U2 Stores H a R V a R D a S I a P a C I F I C R E V I E W
    THE G2000 GROUP Owner & Operator of G2000 & U2 Stores H A R V A R D A S I A P A C I F I C R E V I E W V O L U M E VI • I S S U E 2 THE SCIENTIFIC REVOLUTION IN ASIA 6 Whither Biotechnology in Japan? Why biotechnology hasn’t yet taken off By Arthur Kornberg 10 Manchurian Plague Medicine and politics, East and West By William Summers 16 The Future of Chinese Education Educational reform and development in China By Chen Zhili 22 Libraries in Asia New life for libraries in the digital age By Hwa-Wei Lee 25 China’s Manned Space Program What is that all about? By Joan Johnson-Freese 34 Research and Development in China Traditions, transformations, and the future of science and technology policy By Zeng Guoping and Li Zhengfeng 37 Science and Technology in China Personal recommendations for the advancement of Chinese technology By Shing-Tung Yau 44 The Chinese Mindset What science and technology have done for modern China By Song Jian 46 Papermaking in China Ancient science and technology transfer By Pan Jixing 2 Fall 2002 – Volume 6, Number 2 CHINA China and the WTO 50 A report from one year after accession By Jin Liqun Globalization and Federalization 56 New challenges for Asia and the world By Wu Jiaxiang China’s Socioeconomically Disadvantaged 62 Breaking the surface of a challenging problem By Wu Junhua NORTHEAST ASIA Elections in Japan 66 How elections affect the economy By Junichiro Wada North Korea 69 Present and future By Robert Scalapino CENTRAL AND SOUTH ASIA Schooling in Iran 76 Education in Central Asia’s Most Enigmatic Country By Yadollah Mehralizadeh Globalizing What? 79 History, economics, equity, and efficiency By Amartya Sen PAN ASIA Cities and Globalization 83 The present and future of urban space By Saskia Sassen East and West 88 The ideogram versus the phonogram By Shigeru Nakayama Harvard Asia Pacific Review 3 H A R V A R D EDITOR IN CHIEF SAMUEL H.
    [Show full text]
  • Table of Contents
    VOLUME II: CONTENTS ALL-VOLUME OVERVIEW . .i CHAPTER 5 Satellite Launches in the PRC: Hughes CHAPTER SUMMARY . 2 OPTUS B2, APSTAR 2 LAUNCH FAILURES: PRC GAINS SENSITIVE KNOWLEDGE FROM HUGHES INVESTIGATIONS . 6 THE PROHIBITION AGAINST TECHNOLOGY TRANSFER IN FOREIGN LAUNCHES . 8 International Traffic in Arms Regulations and the U.S. Munitions List . 8 Department of Defense Monitoring Role . 9 OPTUS B2 . .10 The Optus B2 Licenses . 10 The Optus B2 Fails To Achieve Orbit . 12 Failure Investigation Teams . 14 Failure Investigation Begins . .14 Hughes’ Export Administrators Deal with the Licensing Question . 17 A ‘Political’ Business Solution . 21 The Optus B3: Hughes’ Efforts to Improve the Long March Continue . 36 APSTAR 2 . .40 The Apstar 2 License . 40 The Apstar 2 Failure . 40 Failure Investigation Teams . 42 Failure Investigation Schedule . 42 The Need for a License . .42 Commerce Department Conference . 46 Same Fairing Failure Identified by Hughes . 47 A ‘Political’ Business Solution, Again? . 48 The Commerce Department Approves Data Release to the PRC . 50 SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES Hughes Tries to Get the PRC to Accept Its Findings . .. 51 CIA Analyst Visits Hughes . .. 56 A ‘Consolidated Solution’ . 58 Final Failure Investigation Report Released to the PRC by the Commerce Department . 60 Implementing the ‘Consolidated Solution’ . 64 U.S. Government Actions Following the Apstar 2 Launch Failure . 66 Defense Department Assessments of Damage to National Security . 68 Damage to National Security from the Apstar 2 Failure Investigation . 69 Damage to National Security from the Sharing of Coupled Loads Analysis . 72 Damage to National Security from Providing the PRC with Information Concerning Deficiencies in the Fairing, and Resultant Improvements to PRC Rockets and Ballistic Missiles .
    [Show full text]
  • RCF Fellows Kai He.Ai
    Decision Making During Crises: Prospect Theory and China’s Foreign Policy Crisis Behavior after the Cold War Kai He Utah State University May 2012 EAI Fellows Program Working Paper Series No. 33 Knowledge-Net for a Better World The East Asia Institute(EAI) is a nonprofit and independent research organization in Korea, founded in May 2002. The EAI strives to transform East Asia into a society of nations based on liberal democracy, market economy, open society, and peace. The EAI takes no institutional position on policy issues and has no affiliation with the Korean government. All statements of fact and expressions of opinion contained in its publications are the sole responsibility of the author or authors. is a registered trademark. Copyright © 2012 by EAI This electronic publication of EAI intellectual property is provided for non-commercial use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of EAI documents to a non-EAI website is prohibited. EAI documents are protected under copyright law. The East Asia Institute 909 Sampoong B/D, 310-68 Euljiro 4-ga Jung-gu, Seoul 100-786 Republic of Korea Tel. 82 2 2277 1683 Fax 82 2 2277 1684 EAI Fellows Program Working Paper No. 33 Decision Making During Crises: Prospect Theory and China’s Foreign Policy Crisis Behavior after the Cold War* Kai He Utah State University May 2012 Abstract Through examining four notable foreign policy crises with the United States since the end of the Cold War: the 1993 Yinhe ship inspection incident, the 1995-6 Taiwan Strait crisis, the 1999 embassy bombing incident, and the 2001 EP-3 midair collision, I introduce a prospect theory- based model to systematically explain China’s foreign policy crisis behavior after the cold war.
    [Show full text]
  • The Chinese Navy: Expanding Capabilities, Evolving Roles
    The Chinese Navy: Expanding Capabilities, Evolving Roles The Chinese Navy Expanding Capabilities, Evolving Roles Saunders, EDITED BY Yung, Swaine, PhILLIP C. SAUNderS, ChrISToPher YUNG, and Yang MIChAeL Swaine, ANd ANdreW NIeN-dzU YANG CeNTer For The STUdY oF ChINeSe MilitarY AffairS INSTITUTe For NATIoNAL STrATeGIC STUdIeS NatioNAL deFeNSe UNIverSITY COVER 4 SPINE 990-219 NDU CHINESE NAVY COVER.indd 3 COVER 1 11/29/11 12:35 PM The Chinese Navy: Expanding Capabilities, Evolving Roles 990-219 NDU CHINESE NAVY.indb 1 11/29/11 12:37 PM 990-219 NDU CHINESE NAVY.indb 2 11/29/11 12:37 PM The Chinese Navy: Expanding Capabilities, Evolving Roles Edited by Phillip C. Saunders, Christopher D. Yung, Michael Swaine, and Andrew Nien-Dzu Yang Published by National Defense University Press for the Center for the Study of Chinese Military Affairs Institute for National Strategic Studies Washington, D.C. 2011 990-219 NDU CHINESE NAVY.indb 3 11/29/11 12:37 PM Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the U.S. Department of Defense or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Chapter 5 was originally published as an article of the same title in Asian Security 5, no. 2 (2009), 144–169. Copyright © Taylor & Francis Group, LLC. Used by permission. Library of Congress Cataloging-in-Publication Data The Chinese Navy : expanding capabilities, evolving roles / edited by Phillip C. Saunders ... [et al.]. p. cm. Includes bibliographical references and index.
    [Show full text]
  • Who Benefits? China-Africa Relations Through the Prism of Culture
    3/2008 3/20083/2008 3/2008 Call for Papers Call for Papers China aktuell – Journal of Current Chinese Affairs is an inter- ChinaCall aktuellnationally for – Papers Journal refereed of academicCurrent Chinesejournal published Affairs isby anthe inter-GIGA Institute nationally ofrefereed Asian Studies,academic Hamburg. journal published The quar terlyby the journal GIGA focuses Institute on current 3/2008 China aktuell – Journal of Current Chinese Affairs is an inter- 3/2008 3/2008 3/2008 of Asiannationally Studies,developments refereed Hamburg. inacademic Greater The quar journalChina.terly publishedjournalIt has a focuses circulation by the on GIGA currentof 1,200 Institute copies, developmentsof Asianmaking Studies,in Greaterit one Hamburg. of China. the world’s ItThe has quar amost circulationterly widely journal ofdistributed focuses1,200 copies, onperiodicals current on 3/2008 makingdevelopments it Asianone of affairs,the in world’sGreater and mostChina.reaches widely It hasa distributed broada circulation readership periodicals of 1,200 in oncopies,academia, Asianmaking affairs,administration it oneand ofreaches the and world’s businessa broadmost circles. widelyreadership distributedArticles in shouldacademia, periodicals be written on in administrationAsianGerman affairs, and or businessEnglishand reaches and circles. submitted a Articlesbroad exclusively shouldreadership tobe this writtenin publication. academia, in German or English and submitted exclusively to this publication. administrationChina aktuell and is businessdevoted
    [Show full text]
  • United States House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations
    United States House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations From Wikipedia, the free encyclopedia This article is about the 1952-1954 investigation into non-profits. For the 80s and 90s report on the People's Republic of China's covert operations within the United States, see Cox Report. The Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations was an investigative committee of the United States House of Representatives between 1952 and 1954.[1] The committee was originally created by House Resolution 561 during the 82nd Congress. The committee investigated the use of funds by tax-exempt organizations (non-profit organizations) to see if they were being used to support communism.[2][3] The committee was alternatively known as the Cox Committee and the Reece Committee after its two chairmen, Edward E. Cox and B. Carroll Reece. Contents • 1 History • 2 Members • 3 Dodd report • 4 Final report • 5 Criticisms • 6 References History In April 1952, the Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations (or just the Cox Committee Investigation), led by Edward E. Cox, of the House of Representatives began an investigation of the "educational and philanthropic foundations and other comparable organizations which are exempt from federal taxes to determine whether they were using their resources for the purposes for which they were established, and especially to determine which such foundations and organizations are using their resources for un-American activities and subversive activities or for purposes not in the interest or tradition of the United States." In the fall of 1952 all foundations with assets of $10 million or more received a questionnaire covering virtually every aspect of their operations.
    [Show full text]
  • NSIAD-98-176 China B-279891
    United States General Accounting Office Report to the Chairman, Joint Economic GAO Committee, U.S. Senate June 1998 CHINA Military Imports From the United States and the European Union Since the 1989 Embargoes GAO/NSIAD-98-176 United States General Accounting Office GAO Washington, D.C. 20548 National Security and International Affairs Division B-279891 June 16, 1998 The Honorable James Saxton Chairman, Joint Economic Committee United States Senate Dear Mr. Chairman: In June 1989, the United States and the members of the European Union 1 embargoed the sale of military items to China to protest China’s massacre of demonstrators in Beijing’s Tiananmen Square. You have expressed concern regarding continued Chinese access to foreign technology over the past decade, despite these embargoes. As requested, we identified (1) the terms of the EU embargo and the extent of EU military sales to China since 1989, (2) the terms of the U.S. embargo and the extent of U.S. military sales to China since 1989, and (3) the potential role that such EU and U.S. sales could play in addressing China’s defense needs. In conducting this review, we focused on military items—items that would be included on the U.S. Munitions List. This list includes both lethal items (such as missiles) and nonlethal items (such as military radars) that cannot be exported without a license.2 Because the data in this report was developed from unclassified sources, its completeness and accuracy may be subject to some uncertainty. The context for China’s foreign military imports during the 1990s lies in Background China’s recent military modernization efforts.3 Until the mid-1980s, China’s military doctrine focused on defeating technologically superior invading forces by trading territory for time and employing China’s vast reserves of manpower.
    [Show full text]
  • OECD Reviews of Innovation Policy Synthesis Report
    OECD Reviews of Innovation Policy CHINA Synthesis Report ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT in collaboration with THE MINISTRY OF SCIENCE AND TECHNOLOGY, CHINA ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population. The Organisation provides a setting where govern- ments can compare policy experiences, seek answers to common problems, identify good practice and work to co- ordinate domestic and international policies. The OECD member countries are: Australia, Austria, Belgium, Canada, the Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Slovak Republic, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. The Commission of the European Communities takes part in the work of the OECD. OECD Publishing disseminates widely the results of the Organisation’s statistics gathering and research on economic, social and environmental issues, as well as the conventions, guidelines and standards agreed by its members. © OECD 2007 No reproduction, copy, transmission or translation of this publication may be made without written permission. Applications should be sent to OECD Publishing: [email protected] 3 Foreword This synthesis report (August 2007 Beijing Conference version) summarises the main findings of the OECD review of the Chinese national innovation system (NIS) and policy.
    [Show full text]
  • INDO-PACIFIC China’S New Road-Mobile ICBM DF-41 Officially Unveiled
    INDO-PACIFIC China’s New Road-Mobile ICBM DF-41 Officially Unveiled OE Watch Commentary: On 1 October, China held a large military parade in commemoration of the 70th anniversary of the founding of the People’s Republic. The Chinese military used the occasion to show off a number of pieces of new equipment, including a new road-mobile intercontinental ballistic missile (ICBM), the DF-41. According to the accompanying article, the DF- 41 is a “mainstay of China’s…nuclear deterrent.” While China maintains a small number of silo-based DF-5 ICBMs, it has historically pursued mobile launch systems for its ballistic missiles to improve their survivability in a conflict. Adoption of an off- road-capable transporter-erector-launcher (TEL) gives the missile a much greater range of launch and concealment positions. Separate Chinese media reporting on the DF-41 noted that the missile has a range of 14,000 and can carry up to ten independently targetable nuclear warheads. However, there is a compromise between distance and “throw weight”—the number of warheads and penetration aids (decoys) that a missile Chinese Mobile ICBMs. can carry—and the missile likely carries considerably Image by Peter Wood fewer when fired to maximum range. Researchers using commercial imagery previously identified what appears to be a nuclear silo for the DF-41, likely used as part of testing the missile. Reporting in China Daily in 2017 claimed that it could be launched from trains and silos as well as the road-mobile configuration. The DF-41 was accompanied by 16 DF-31AG missiles, an improved version of the DF-31 mobile ICBM.
    [Show full text]
  • China's Access to Foreign AI Technology
    China’s Access to Foreign AI Technology AN ASSESSMENT 科 AUTHORS Wm. C. Hannas Huey-meei Chang 技 转 SEPTEMBER 2019 移 Established in January 2019, the Center for Security and Emerging Technology (CSET) at Georgetown’s Walsh School of Foreign Service is a research organization fo- cused on studying the security impacts of emerging tech- nologies, supporting academic work in security and tech- nology studies, and delivering nonpartisan analysis to the policy community. CSET aims to prepare a generation of policymakers, analysts, and diplomats to address the chal- lenges and opportunities of emerging technologies. During its first two years, CSET will focus on the effects of progress in artificial intelligence and advanced computing. CSET.GEORGETOWN.EDU | [email protected] 2 Center for Security and Emerging Technology SEPTEMBER 2019 China’s Access to Foreign AI Technology AN ASSESSMENT AUTHORS Wm. C. Hannas Huey-meei Changg ACKNOWLEDGEMENTS Wm. C. Hannas is author and CSET lead analyst. Huey-meei Chang is contributing author and CSET research analyst. Cover illustration: "Technology transfer" in Chinese. © 2019 Center for Security and Emerging Technology, All rights reserved. Contents EXECUTIVE SUMMARY iii 1 | INTRODUCTION 1 2 | CHINESE FOREIGN TECHNOLOGY TRANSFER: MYTH AND 3 REALITY 3 | CHINA’S ACCESS TO FOREIGN AI TECHNOLOGY 9 4 | SUMMARY AND RECOMMENDATIONS 23 BIBLIOGRAPHY 27 ENDNOTES 29 Center for Security and Emerging Technology i 6 Center for Security and Emerging Technology Executive Summary hina’s technology transfer programs are broad, deeply rooted, and calculated to support the country’s development of artificial C intelligence. These practices have been in use for decades and provide China early insight and access to foreign technical innovations.
    [Show full text]