House Report 105-851

Total Page:16

File Type:pdf, Size:1020Kb

House Report 105-851 U.S. NATIONAL SECURITY AND MILITARY/COMMERCIAL CONCERNS WITH THE PEOPLE’S REPUBLIC OF CHINA VOLUME I SELECT COMMITTEE UNITED STATES HOUSE OF REPRESENTATIVES U.S. NATIONAL SECURITY AND MILITARY/COMMERCIAL CONCERNS WITH THE PEOPLE’S REPUBLIC OF CHINA VOLUME I SELECT COMMITTEE UNITED STATES HOUSE OF REPRESENTATIVES 105TH CONGRESS REPORT HOUSE OF REPRESENTATIVES 2d Session } { 105-851 REPORT OF THE SELECT COMMITTEE ON U.S. NATIONAL SECURITY AND MILITARY/COMMERCIAL CONCERNS WITH THE PEOPLE’S REPUBLIC OF CHINA SUBMITTED BY MR. COX OF CALIFORNIA, CHAIRMAN January 3, 1999 — Committed to the Committee of the Whole House on the State of the Union and ordered to be printed (subject to declassification review) May 25, 1999 — Declassified, in part, pursuant to House Resolution 5, as amended, 106th Congress, 1st Session –––––––––– U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 1999 09-006 A NOTE ON REDACTION The Final Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the Peoples Republic of China was unanimously approved by the five Republicans and four Democrats who served on the Select Committee. This three-volume Report is a declassified, redacted version of the Final Report. The Final Report was classified Top Secret when issued on January 3, 1999, and remains so today. Certain source materials included in the Final Report were submitted to the Executive branch during the period August–December 1998 for declassification review in order to facilitate the production of a declassified report. The Select Committee sought declassification review of the entire report on January 3, 1999. The House of Representatives extended the life of the Select Committee for 90 days for the purpose of continuing to work with the Executive Branch to declassify the Final Report. A series of further extensions was voted by the House of Representatives until the final declassifica- tion review was completed in May 1999. Following an extended series of negotiations between the House of Representatives and the Executive branch, a number of material dele- tions have been made to the Final Report. As a result of these deletions, a number of significant events, facts, and analyses have been omitted from this declassified Report. In several cases, important factual exam- ples substantiating conclusions in the report have been deleted. In other cases, explicit find- ings of the Select Committee have been suppressed. The Select Committee’s classified Final Report, therefore, remains the definitive product of its investigation and analysis. U.S. Government Printing Office Washington, D.C. Top Secret Report Date: January 1999 Declassified Report Release Date: May 1999 Additional copies of this report may be obtained from the U.S. Government Printing Office, Washington, D.C. 20402 upon written request and payment of document fees and standard shipping costs. Printed in the United States of America Members of the Select Committee United States House of Representatives 105th Congress REP. CHRISTOPHER COX,CHAIRMAN Chairman, House Policy Committee Vice Chairman, Committee on Government Reform and Oversight Vice Chairman, Committee on Commerce, Subcommittee on Oversight and Investigations REP. NORM DICKS,RANKING DEMOCRAT Ranking Member, Permanent Select Committee on Intelligence Ranking Member, Committee on Appropriations, Subcommittee on the Interior REP. PORTER GOSS,VICE CHAIRMAN Chairman, Permanent Select Committee on Intelligence Chairman, Committee on Rules, Subcommittee on Legislative and Budget Process REP. DOUG BEREUTER Vice Chairman, Committee on International Relations Chairman, Subcommittee on Asia and the Pacific Member, Committee on Banking and Financial Services REP. JAMES V. H ANSEN Chairman, Committee on Standards of Official Conduct Member, Committee on National Security Chairman, Committee on Resources, Subcommittee on National Parks and Public Lands REP. JOHN M. SPRATT,JR. Member, Committee on National Security Ranking Member, Committee on the Budget REP. CURT WELDON Chairman, Committee on National Security, Subcommittee on Military Research and Development Member, Committee on Science REP. LUCILLE ROYBAL-ALLARD Member, Committee on Banking and Financial Services Member, Committee on the Budget REP. BOBBY SCOTT Ranking Member, Committee on the Judiciary, Subcommittee on the Constitution Member, Committee on Education and the Workforce VOLUME I All-Volume Overview CHAPTER 1 Commercial and Intelligence Operations: PRC Acquisition of U.S. Technology CHAPTER 2 PRC Theft of U.S. Thermonuclear Weapons Design Information CHAPTER 3 High Performance Computers CHAPTER 4 PRC Missile and Space Forces VOLUME II All-Volume Overview CHAPTER 5 Satellite Launches in the PRC: Hughes CHAPTER 6 Satellite Launches in the PRC: Loral CHAPTER 7 Protecting Sensitive Information at PRC Launch Sites CHAPTER 8 The Role of Commercial Space Insurance in Technology Transfer to the PRC VOLUME III All-Volume Overview CHAPTER 9 Statutory and Regulatory Controls: The Export of Our Militarily Sensitive Technology CHAPTER 10 Manufacturing Processes: PRC Efforts to Acquire Machine Tool and Jet Engine Technologies CHAPTER 11 Recommendations Appendices SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES VOLUME I: CONTENTS ALL-VOLUME OVERVIEW . i CHAPTER 1 PRC Acquisition of U.S. Technology CHAPTER SUMMARY . 2 THE STRUCTURE OF THE PRC GOVERNMENT . 4 COSTIND: The CCP’s Use of Corporations for Military Aims . 8 CCP Supremacy Over the State, the PLA, and the Economy . 9 DEVELOPMENT OF THE CCP’S TECHNOLOGY POLICIES . 10 The 863 and Super-863 Programs: Importing Technologies for Military Use . 10 Biological Warfare . 11 Space Technology . 11 Military Information Technology . 11 Laser Weapons . 12 Automation Technology . 12 Nuclear Weapons . 12 Exotic Materials . 12 The 16-Character Policy: ‘Give Priority to Military Products’ . 13 The PRC’s Use of Intelligence Services to Acquire U.S. Military Technology . 19 METHODS USED BY THE PRC TO ACQUIRE ADVANCED U.S. MILITARY TECHNOLOGY . 20 The ‘Princelings’ . 22 Acquisition of Military Technology from Other Governments . 25 Russia . .25 Israel . 25 The United States . 26 Joint Ventures with U.S. Companies . 27 Acquisition and Exploitation of Dual-Use Technologies . 30 Front Companies . 33 SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES Direct Collection of Technology by Non-Intelligence Agencies and Individuals . 36 Illegal Export of Military Technology Purchased in the United States . 42 PRC Purchase of Interests in U.S. Companies . 44 Methods Used by the PRC to Export Military Technology from the United States . 46 PRC Incentives for U.S. Companies to Advocate Relaxation of Export Controls . 48 THE PRC’S EFFORTS TO ASSIMILATE ADVANCED U.S. MILITARY TECHNOLOGY . 51 U.S. GOVERNMENT MONITORING OF PRC TECHNOLOGY ACQUISITION EFFORTS IN THE UNITED STATES . 53 CHAPTER 2 PRC Theft of U.S. Thermonuclear Warhead Design Information CHAPTER SUMMARY . 60 PRC THEFT OF U.S. THERMONUCLEAR WARHEAD DESIGN INFORMATION . 66 THE PRC’S NEXT GENERATION NUCLEAR WARHEADS . 69 THE IMPACT OF THE PRC’S THEFT OF U.S. THERMONUCLEAR WARHEAD DESIGN INFORMATION . 72 Mobile and Submarine-Launched Missiles . 72 Acceleration of PRC Weapons Development . 73 Effect on PRC Nuclear Doctrine . 77 Multiple Warhead Development . 77 Proliferation . 78 Russian Assistance to the PRC’s Nuclear Weapons Program . 78 HOW THE PRC ACQUIRED THERMONUCLEAR WARHEAD SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES VOLUME I: CONTENTS DESIGN INFORMATION FROM THE UNITED STATES: PRC ESPIONAGE AND OTHER PRC TECHNIQUES . 80 HOW THE U.S. GOVERNMENT LEARNED OF THE PRC’S THEFT OF OUR MOST ADVANCED THERMONUCLEAR WARHEAD DESIGN INFORMATION . 83 The “Walk-In” . 83 THE PRC’S FUTURE THERMONUCLEAR WARHEAD REQUIREMENTS: THE PRC’S NEED FOR NUCLEAR TEST DATA AND HIGH PERFORMANCE COMPUTERS . 84 U.S. GOVERNMENT INVESTIGATIONS OF NUCLEAR WEAPONS DESIGN INFORMATION LOSSES . 87 Investigation of Theft of Design Information for the Neutron Bomb . 87 Investigation of Thefts of Information Related to the Detection of Submarines and of Laser Testing of Miniature Nuclear Weapons Explosions . 87 Investigation of Theft of Design Information for the W-88 Trident D-5 Thermonuclear Warhead . 90 Investigation of Additional Incidents . 91 THE DEPARTMENT OF ENERGY’S COUNTERINTELLIGENCE PROGRAM AT THE U.S. NATIONAL WEAPONS LABORATORIES . 92 NOTIFICATION OF THE PRESIDENT AND SENIOR U.S. OFFICIALS . 95 CHAPTER 3 High Performance Computers CHAPTER SUMMARY . 98 HIGH PERFORMANCE COMPUTERS . 102 MILITARY OBJECTIVES CONTRIBUTE TO THE PRC’S INTEREST IN HIGH PERFORMANCE COMPUTERS . 106 SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES U.S. HIGH PERFORMANCE COMPUTERS HAVE THE GREATEST POTENTIAL IMPACT ON THE PRC’S NUCLEAR WEAPONS CAPABILITIES . 107 Existing PRC Nuclear Weapons . 107 New PRC Nuclear Weapons . 109 Nuclear Weapons Stockpile Stewardship . 110 TRANSFER OF HPC TECHNOLOGY CAN BENEFIT PRC INTELLIGENCE CAPABILITIES . 112 Sensors for Surveillance, Target Detection, and Target Recognition . 112 Sensor Platforms for Aerial and Space-Based Reconnaissance . 113 Cryptology . ..
Recommended publications
  • Dressing for the Times: Fashion in Tang Dynasty China (618-907)
    Dressing for the Times: Fashion in Tang Dynasty China (618-907) BuYun Chen Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2013 © 2013 BuYun Chen All rights reserved ABSTRACT Dressing for the Times: Fashion in Tang Dynasty China (618-907) BuYun Chen During the Tang dynasty, an increased capacity for change created a new value system predicated on the accumulation of wealth and the obsolescence of things that is best understood as fashion. Increased wealth among Tang elites was paralleled by a greater investment in clothes, which imbued clothes with new meaning. Intellectuals, who viewed heightened commercial activity and social mobility as symptomatic of an unstable society, found such profound changes in the vestimentary landscape unsettling. For them, a range of troubling developments, including crisis in the central government, deep suspicion of the newly empowered military and professional class, and anxiety about waste and obsolescence were all subsumed under the trope of fashionable dressing. The clamor of these intellectuals about the widespread desire to be “current” reveals the significant space fashion inhabited in the empire – a space that was repeatedly gendered female. This dissertation considers fashion as a system of social practices that is governed by material relations – a system that is also embroiled in the politics of the gendered self and the body. I demonstrate that this notion of fashion is the best way to understand the process through which competition for status and self-identification among elites gradually broke away from the imperial court and its system of official ranks.
    [Show full text]
  • US National Security and Military/Commercial
    COMMERCIAL SPACE INSURANCE VOLUME II: Chapter 8/Summary he space insurance aspect of the Intelsat 708 launch failure focuses on the exchange of controlled technical information within the insurance community. Insurance underwriters and reinsurers for the Apstar 1A satellite program — the next scheduled T satellite to be launched on the Long March 3B after the Intelsat 708 failure — were concerned about the reliability of the Long March rocket, and the fate of future launch insurance programs in the PRC. Immediately after the Intelsat 708 launch failure, space insurance under- writers for the Apstar 1A insurance program pressured the PRC to create an international and Independent Review Committee (IRC). These underwriters and reinsurers insisted on this arrangement to ensure that an adequate assessment of the risks of future Long March rocket launches was made. Representatives from J & H Marsh & McLennan, an international space insurance brokerage firm, were adamant about obtaining a report from the Independent Review Committee for the benefit of the reinsurers of the Apstar 1A satellite insurance program. Members of the space insurance community were invit- ed to attend a meeting on April 15 and 16, 1996, in the PRC. The purpose of the meet- ing was to build confidence in the Long March rocket, and to discuss the status of the Apstar 1A insurance program. The space insurance acquisition and underwriting process includes the dis- semination of technical information, the consideration of market conditions, capac- ity, and participants, and the involvement of insurance brokers, underwriters, and rein- surers. This chapter identifies several issues relating to procedures for the disclosure and handling of sensitive information by the insurance community.
    [Show full text]
  • Introduction
    NOTES Introduction 1. Robert Kagan to George Packer. Cited in Packer’s The Assassin’s Gate: America In Iraq (Faber and Faber, London, 2006): 38. 2. Stefan Halper and Jonathan Clarke, America Alone: The Neoconservatives and the Global Order (Cambridge University Press, Cambridge, 2004): 9. 3. Critiques of the war on terror and its origins include Gary Dorrien, Imperial Designs: Neoconservatism and the New Pax Americana (Routledge, New York and London, 2004); Francis Fukuyama, After the Neocons: America At the Crossroads (Profile Books, London, 2006); Ira Chernus, Monsters to Destroy: The Neoconservative War on Terror and Sin (Paradigm Publishers, Boulder, CO and London, 2006); and Jacob Heilbrunn, They Knew They Were Right: The Rise of the Neocons (Doubleday, New York, 2008). 4. A report of the PNAC, Rebuilding America’s Defenses: Strategy, Forces and Resources for a New Century, September 2000: 76. URL: http:// www.newamericancentury.org/RebuildingAmericasDefenses.pdf (15 January 2009). 5. On the first generation on Cold War neoconservatives, which has been covered far more extensively than the second, see Gary Dorrien, The Neoconservative Mind: Politics, Culture and the War of Ideology (Temple University Press, Philadelphia, 1993); Peter Steinfels, The Neoconservatives: The Men Who Are Changing America’s Politics (Simon and Schuster, New York, 1979); Murray Friedman, The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy (Cambridge University Press, New York, 2005); Murray Friedman ed. Commentary in American Life (Temple University Press, Philadelphia, 2005); Mark Gerson, The Neoconservative Vision: From the Cold War to the Culture Wars (Madison Books, Lanham MD; New York; Oxford, 1997); and Maria Ryan, “Neoconservative Intellectuals and the Limitations of Governing: The Reagan Administration and the Demise of the Cold War,” Comparative American Studies, Vol.
    [Show full text]
  • Teacher's Guide and Lesson Plans for a History of Chinese American
    Teacher’s Guide and Lesson Plans For A History of Chinese American Achievement In the United States For grade 7 – College Series produced by Centre Communications, Inc. for Ambrose Video Publishing, Inc. Executive Producer William V. Ambrose Teacher's Guide by Mark Reeder Published and Distributed by... Ambrose Video Publishing 145 West 45th St., Suite 1115 New York, NY 10036 1–800–526–4663 24–Hour Fax 212–768–9282 http://www.ambrosevideo.com This DVD is the exclusive property of the copyright holder, Copying, transmitting or reproducing in any form, or by any means, without prior written permission from the copyright holder is prohibited (Title 17, U.S. Code Section 501 and 506). (c) MMV Ambrose Video Publishing, Inc. 1 Table of Contents Page Table of Contents and Rights……………………………………………………. 2 Materials in the Series…………………………………………………...….....… 3 Instructional Notes………………………………………………………………. 3 Introduction and Summary of Series………………………………………....…. 4 Links to Curriculum Standards………………………………………………….. 6 Suggested Lesson Plans…………………………………………………………. 6 Chinese American Entrepreneurs............................................................... 6 Chinese American Heroes.......................................................................... 7 Chinese Americans Culture........................................................................ 7 Chinese Americans and Civil Rights.......................................................... 8 Chinese American Storytellers.................................................................... 8 Chinese
    [Show full text]
  • Table of Contents
    VOLUME II: CONTENTS ALL-VOLUME OVERVIEW . .i CHAPTER 5 Satellite Launches in the PRC: Hughes CHAPTER SUMMARY . 2 OPTUS B2, APSTAR 2 LAUNCH FAILURES: PRC GAINS SENSITIVE KNOWLEDGE FROM HUGHES INVESTIGATIONS . 6 THE PROHIBITION AGAINST TECHNOLOGY TRANSFER IN FOREIGN LAUNCHES . 8 International Traffic in Arms Regulations and the U.S. Munitions List . 8 Department of Defense Monitoring Role . 9 OPTUS B2 . .10 The Optus B2 Licenses . 10 The Optus B2 Fails To Achieve Orbit . 12 Failure Investigation Teams . 14 Failure Investigation Begins . .14 Hughes’ Export Administrators Deal with the Licensing Question . 17 A ‘Political’ Business Solution . 21 The Optus B3: Hughes’ Efforts to Improve the Long March Continue . 36 APSTAR 2 . .40 The Apstar 2 License . 40 The Apstar 2 Failure . 40 Failure Investigation Teams . 42 Failure Investigation Schedule . 42 The Need for a License . .42 Commerce Department Conference . 46 Same Fairing Failure Identified by Hughes . 47 A ‘Political’ Business Solution, Again? . 48 The Commerce Department Approves Data Release to the PRC . 50 SELECT COMMITTEE OF THE UNITED STATES HOUSE OF REPRESENTATIVES Hughes Tries to Get the PRC to Accept Its Findings . .. 51 CIA Analyst Visits Hughes . .. 56 A ‘Consolidated Solution’ . 58 Final Failure Investigation Report Released to the PRC by the Commerce Department . 60 Implementing the ‘Consolidated Solution’ . 64 U.S. Government Actions Following the Apstar 2 Launch Failure . 66 Defense Department Assessments of Damage to National Security . 68 Damage to National Security from the Apstar 2 Failure Investigation . 69 Damage to National Security from the Sharing of Coupled Loads Analysis . 72 Damage to National Security from Providing the PRC with Information Concerning Deficiencies in the Fairing, and Resultant Improvements to PRC Rockets and Ballistic Missiles .
    [Show full text]
  • 2017 HPC Annual Report Team Would Like to Acknowledge the Invaluable Assistance Provided by John Noe
    sandia national laboratories 2017 HIGH PERformance computing The 2017 High Performance Computing Annual Report is dedicated to John Noe and Dino Pavlakos. Building a foundational framework Editor in high performance computing Yasmin Dennig Contributing Writers Megan Davidson Sandia National Laboratories has a long history of significant contributions to the high performance computing Mattie Hensley community and industry. Our innovative computer architectures allowed the United States to become the first to break the teraflop barrier—propelling us to the international spotlight. Our advanced simulation and modeling capabilities have been integral in high consequence US operations such as Operation Burnt Frost. Strong partnerships with industry leaders, such as Cray, Inc. and Goodyear, have enabled them to leverage our high performance computing capabilities to gain a tremendous competitive edge in the marketplace. Contributing Editor Laura Sowko As part of our continuing commitment to provide modern computing infrastructure and systems in support of Sandia’s missions, we made a major investment in expanding Building 725 to serve as the new home of high performance computer (HPC) systems at Sandia. Work is expected to be completed in 2018 and will result in a modern facility of approximately 15,000 square feet of computer center space. The facility will be ready to house the newest National Nuclear Security Administration/Advanced Simulation and Computing (NNSA/ASC) prototype Design platform being acquired by Sandia, with delivery in late 2019 or early 2020. This new system will enable continuing Stacey Long advances by Sandia science and engineering staff in the areas of operating system R&D, operation cost effectiveness (power and innovative cooling technologies), user environment, and application code performance.
    [Show full text]
  • RCF Fellows Kai He.Ai
    Decision Making During Crises: Prospect Theory and China’s Foreign Policy Crisis Behavior after the Cold War Kai He Utah State University May 2012 EAI Fellows Program Working Paper Series No. 33 Knowledge-Net for a Better World The East Asia Institute(EAI) is a nonprofit and independent research organization in Korea, founded in May 2002. The EAI strives to transform East Asia into a society of nations based on liberal democracy, market economy, open society, and peace. The EAI takes no institutional position on policy issues and has no affiliation with the Korean government. All statements of fact and expressions of opinion contained in its publications are the sole responsibility of the author or authors. is a registered trademark. Copyright © 2012 by EAI This electronic publication of EAI intellectual property is provided for non-commercial use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of EAI documents to a non-EAI website is prohibited. EAI documents are protected under copyright law. The East Asia Institute 909 Sampoong B/D, 310-68 Euljiro 4-ga Jung-gu, Seoul 100-786 Republic of Korea Tel. 82 2 2277 1683 Fax 82 2 2277 1684 EAI Fellows Program Working Paper No. 33 Decision Making During Crises: Prospect Theory and China’s Foreign Policy Crisis Behavior after the Cold War* Kai He Utah State University May 2012 Abstract Through examining four notable foreign policy crises with the United States since the end of the Cold War: the 1993 Yinhe ship inspection incident, the 1995-6 Taiwan Strait crisis, the 1999 embassy bombing incident, and the 2001 EP-3 midair collision, I introduce a prospect theory- based model to systematically explain China’s foreign policy crisis behavior after the cold war.
    [Show full text]
  • Recent Articles from the China Journal of System Engineering Prepared
    Recent Articles from the China Journal of System Engineering Prepared by the University of Washington Quantum System Engineering (QSE) Group.1 Bibliography [1] Mu A-Hua, Zhou Shao-Lei, and Yu Xiao-Li. Research on fast self-adaptive genetic algorithm and its simulation. Journal of System Simulation, 16(1):122 – 5, 2004. [2] Guan Ai-Jie, Yu Da-Tai, Wang Yun-Ji, An Yue-Sheng, and Lan Rong-Qin. Simulation of recon-sat reconing process and evaluation of reconing effect. Journal of System Simulation, 16(10):2261 – 3, 2004. [3] Hao Ai-Min, Pang Guo-Feng, and Ji Yu-Chun. Study and implementation for fidelity of air roaming system above the virtual mount qomolangma. Journal of System Simulation, 12(4):356 – 9, 2000. [4] Sui Ai-Na, Wu Wei, and Zhao Qin-Ping. The analysis of the theory and technology on virtual assembly and virtual prototype. Journal of System Simulation, 12(4):386 – 8, 2000. [5] Xu An, Fan Xiu-Min, Hong Xin, Cheng Jian, and Huang Wei-Dong. Research and development on interactive simulation system for astronauts walking in the outer space. Journal of System Simulation, 16(9):1953 – 6, Sept. 2004. [6] Zhang An and Zhang Yao-Zhong. Study on effectiveness top analysis of group air-to-ground aviation weapon system. Journal of System Simulation, 14(9):1225 – 8, Sept. 2002. [7] Zhang An, He Sheng-Qiang, and Lv Ming-Qiang. Modeling simulation of group air-to-ground attack-defense confrontation system. Journal of System Simulation, 16(6):1245 – 8, 2004. [8] Wu An-Bo, Wang Jian-Hua, Geng Ying-San, and Wang Xiao-Feng.
    [Show full text]
  • The Chinese Navy: Expanding Capabilities, Evolving Roles
    The Chinese Navy: Expanding Capabilities, Evolving Roles The Chinese Navy Expanding Capabilities, Evolving Roles Saunders, EDITED BY Yung, Swaine, PhILLIP C. SAUNderS, ChrISToPher YUNG, and Yang MIChAeL Swaine, ANd ANdreW NIeN-dzU YANG CeNTer For The STUdY oF ChINeSe MilitarY AffairS INSTITUTe For NATIoNAL STrATeGIC STUdIeS NatioNAL deFeNSe UNIverSITY COVER 4 SPINE 990-219 NDU CHINESE NAVY COVER.indd 3 COVER 1 11/29/11 12:35 PM The Chinese Navy: Expanding Capabilities, Evolving Roles 990-219 NDU CHINESE NAVY.indb 1 11/29/11 12:37 PM 990-219 NDU CHINESE NAVY.indb 2 11/29/11 12:37 PM The Chinese Navy: Expanding Capabilities, Evolving Roles Edited by Phillip C. Saunders, Christopher D. Yung, Michael Swaine, and Andrew Nien-Dzu Yang Published by National Defense University Press for the Center for the Study of Chinese Military Affairs Institute for National Strategic Studies Washington, D.C. 2011 990-219 NDU CHINESE NAVY.indb 3 11/29/11 12:37 PM Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the U.S. Department of Defense or any other agency of the Federal Government. Cleared for public release; distribution unlimited. Chapter 5 was originally published as an article of the same title in Asian Security 5, no. 2 (2009), 144–169. Copyright © Taylor & Francis Group, LLC. Used by permission. Library of Congress Cataloging-in-Publication Data The Chinese Navy : expanding capabilities, evolving roles / edited by Phillip C. Saunders ... [et al.]. p. cm. Includes bibliographical references and index.
    [Show full text]
  • The Enigma Encryption Machine and Its Electronic Variant
    The Enigma Encryption Machine and its Electronic Variant Michel Barbeau, VE3EMB What is the Enigma? possible initial settings, making the total number of initial settings in the order of 10 power 16. The The Enigma is a machine devised for encrypting initial setting, taken from a code book, indicates plain text into cipher text. The machine was which pairs of letters (if any) are switched with each invented in 1918 by the German engineer Arthur other. The initial setting is called the secret key. Scherbius who lived from 1878 to 1929. The German Navy adopted the Enigma in 1925 to secure World War II was fought from 1939 to 1945 their communications. The machine was also used between the Allies (Great Britain, Russia, the by the Nazi Germany during World War II to cipher United States, France, Poland, Canada and others) radio messages. The cipher text was transmitted in and the Germans (with the Axis). To minimize the Morse code by wireless telegraph to the destination chance of the Allies cracking their code, the where a second Enigma machine was used to Germans changed the secret key each day. decrypt the cipher text back into the original plain text. Both the encrypting and decrypting Enigma The codes used for the naval Enigmas, had machines had identical settings in order for the evocative names given by the germans. Dolphin decryption to succeed. was the main naval cipher. Oyster was the officer’s variant of Dolphin. Porpoise was used for The Enigma consists of a keyboard, a scrambling Mediterranean surface vessels and shipping in the unit, a lamp board and a plug board.
    [Show full text]
  • United States House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations
    United States House Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations From Wikipedia, the free encyclopedia This article is about the 1952-1954 investigation into non-profits. For the 80s and 90s report on the People's Republic of China's covert operations within the United States, see Cox Report. The Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations was an investigative committee of the United States House of Representatives between 1952 and 1954.[1] The committee was originally created by House Resolution 561 during the 82nd Congress. The committee investigated the use of funds by tax-exempt organizations (non-profit organizations) to see if they were being used to support communism.[2][3] The committee was alternatively known as the Cox Committee and the Reece Committee after its two chairmen, Edward E. Cox and B. Carroll Reece. Contents • 1 History • 2 Members • 3 Dodd report • 4 Final report • 5 Criticisms • 6 References History In April 1952, the Select Committee to Investigate Tax-Exempt Foundations and Comparable Organizations (or just the Cox Committee Investigation), led by Edward E. Cox, of the House of Representatives began an investigation of the "educational and philanthropic foundations and other comparable organizations which are exempt from federal taxes to determine whether they were using their resources for the purposes for which they were established, and especially to determine which such foundations and organizations are using their resources for un-American activities and subversive activities or for purposes not in the interest or tradition of the United States." In the fall of 1952 all foundations with assets of $10 million or more received a questionnaire covering virtually every aspect of their operations.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]