Congressional Investigations Document China's Massive

Total Page:16

File Type:pdf, Size:1020Kb

Congressional Investigations Document China's Massive Congressional investigations document China’s massive acquisition of US technology. The China Problem n 1992, US intelligence agencies has detailed years of systematic PRC started to become concerned spying, outraging many members about China’s designs for its of Congress. It might well have an next-generation nuclear weap- impact on the relationship between ons. A series of explosions Washington and Beijing for years I monitored by the West suggested to come. that the People’s Republic of That US companies, through their China was working on smaller, own laxity or greed, may have speed- lighter thermonuclear warheads, with ed the loss of secrets is faint comfort an increased yield-to-weight ratio. to Washington. China has obtained US officials did not think Chinese everything from US nuclear data to science was advanced enough to crucial help in missile upgrades and produce such sophisticated weapons US computers and machine tools far on its own. They suspected something more powerful than domestic Chinese else—that the PRC had stolen US models. nuclear secrets. Many of the details alluded to in Three years later the US received the House report remain classified apparent confirmation of such thefts and beyond public view. In general, from the Chinese themselves. An however, purloined US technology unsolicited Chinese individual—a and data could allow the Chinese to “walk-in,” in the argot of espionage— produce state-of-the-art nuclear weap- turned a pile of PRC documents over ons, upgrade their combat aircraft and to the CIA. Among them was a paper submarines, conduct more extensive stamped “secret” which contained and effective anti-submarine warfare, design information on perhaps the equalize battlefields via information most advanced warhead in the US warfare, and improve their command- arsenal, the Trident II’s W88. and-control capabilities, according to Since then, the CIA has come to the Congressional study. believe that the walk-in was a plant, “The PRC seeks foreign military someone who in fact worked for PRC technology as part of its efforts to intelligence. The US conclusion is place the PRC at the forefront of na- that China, for some reason known tions,” concludes the House Select only to its own top officials, had de- Committee on US National Security By Peter Grier cided to flash a glimpse of its stolen and Military/Commercial Concerns knowledge in front of US eyes. If with the People’s Republic of China that is the case, it could turn out to report—more simply called the Cox have been a colossal misjudgment. report. “The PRC’s long-run geopo- The recent report of a special House litical goals include incorporating panel, chaired by Rep. Christopher Taiwan into the PRC and becoming Cox (R–Calif.), on Chinese espionage the primary power in Asia.” 70 AIR FORCE Magazine / August 1999 Use of Western military technol- The report alleges that, at one re- China has focused espionage ac- ogy obtained under questionable cent international arms exhibit, PRC tivities on the relatively open envi- circumstances is not new for China, nationals were seen videotaping every ronment of the US national labs for of course. Its current arsenal of CSS-4 static display and collecting all pos- decades, according to the report of nuclear-tipped ICBMs traces its de- sible brochures. When a contractor the select panel. The penetration sign lineage to the US Titan ICBMs left his booth unattended, Chinese “almost certainly continues today,” of the 1950s, thanks to CSS-4 lead spies stole a display videocassette that claims the study. designer Qian Xuesen, who worked had been playing continual informa- Impetus for the PRC effort came on the Titan program. tion on the US Theater High Altitude following the end of the domestic A Chinese citizen educated in the Area Defense system, a theater mis- chaos of the Cultural Revolution in US during the Japanese occupation sile defense program. 1976, when military planners sat of China, Qian became one of the “Converting the stolen cassette to a back and assessed the state of their world’s top experts on jet propulsion frame-by-frame sequence could yield atomic weapons. PRC warheads of the during World War II. After earning valuable intelligence information to late 1970s were large, multimegaton a PhD at the California Institute of the PRC,” says the select committee devices comparable to US technol- Technology and then working with report. ogy of the 1950s. Officials may have a Cal Tech rocket research group, he Simple purchase of equipment decided that it was time to move to was recruited to join the US mili- plays a part in PRC intelligence more advanced warheads and a new tary’s long-range missile programs. gathering. Chinese front companies generation of ballistic missiles. He received a direct commission to take advantage of US military down- Over the years, the Chinese colonel in the US Army Air Forces sizing to buy surplus high-tech US made major moves on American and began work on what became military goods, including some that national laboratories located at the Titan. However, spy allegations are proscribed from export to all but Los Alamos and Sandia, N.M., dogged Qian, and eventually he lost close allies. Livermore, Cal if., and Oak Ridge, his security clearances. Negotiations Two years ago, the US Customs Tenn. The effort evidently yielded between the US and the PRC resulted Service seized more than $36 million the PRC a trove of stolen secrets. in his return to China in 1955. After in excess military property being The Cox report says the Chinese serving as chief project manager in shipped overseas illegally. Among the obtained classified information all PRC ballistic missile programs, goods bound for the PRC and Hong on every currently deployed US he became head of the government Kong were 37 inertial navigation Intercontinental Ballistic Missile arm responsible for all aeronautics units for F-117 and FB-111 aircraft, and Submarine-Launched Ballistic and missile development research. Patriot missile parts, 500 electron Missile. Details remain classified, tubes used in the F-14 fighter, and but the study says the warheads on Theft and Diversion 26,000 encryption devices. which the PRC obtained informa- Today, China uses what US intel- Military goods that find their way tion include the W56 warhead for ligence calls a “mosaic” approach to the PRC can be reverse-engineered, the Minuteman II; the W62 for the to the collection of technical data, or copied, for indigenous models. Minuteman III; the W76 Trident which takes small bits of information Thus the PRC’s C-801 anti-ship cruise C-4 SLBM, the W78 Minuteman III collected by many individuals, then missile is thought to be a copy of Mark 12A ICBM; the W87 Peace- pieces them together in the PRC. the French Exocet anti-ship cruise keeper ICBM; the W88 Trident D-5 Classic spying remains a major missile. The Chinese Z-11 helicopter SLBM; and the W70 Lance short- part of this approach. Witness the is a reverse-engineered French Aero- range ballistic missile. case of Peter Lee, a Taiwanese–born, spatiale AS-350 Ecureuil, according In 1996, US intelligence reported naturalized US citizen who worked to the Cox report. that China had stolen technology for at US national laboratories until Because of the decentralized na- the neutron bomb, which is intended evidence of espionage surfaced. In ture of the Chinese collection effort, to maximize radiation damage while 1997, Lee passed China classified Washington finds it very difficult to reducing heat and blast. Such a US developmental research on very track, according to the report. It adds weapon would be a useful tool if its sensitive detection techniques that that, because of the FBI’s historic possessor wished to wipe out human could be used to threaten previously focus on the Soviet Union during the defenders but occupy the battlefield invulnerable US nuclear subs, alleges decades of the Cold War, the US has following conflict and avoid inflicting the Cox report. In 1985, Lee passed never made monitoring the PRC’s destruction on the area. to China data about the use of lasers acquisition activities a priority. The PRC has also stolen data on to create nuclear explosions on a “There is little or no coordina- weapons design concepts, on weap- miniature scale. tion within the US government of onization features, and on re-entry Mosaic intelligence also takes ad- counterintelligence that is conducted vehicles—the hardened shells which vantage of the relative openness of against the PRC–directed efforts to protect warheads during their plunge US society. PRC nationals attend US acquire sensitive US technology,” back into the atmosphere. universities, host foreign scientific concludes the Cox report. It may have obtained classified delegations, and pump visiting sci- nuclear weapons computer codes. entists for information that is on the Nuclear Weapons Theft of the so-called legacy com- edge of classified. The PRC also gets It is in the area of nuclear weaponry puter codes, such as those used in valuable bits from open forums such that this lack of spy defenses may development of the W88 Trident as arms exhibits and computer shows. have hurt the US the most. warhead, would fill in gaps in Chi- AIR FORCE Magazine / August 1999 71 nese knowledge about how advanced For one thing, smaller, more command-and-control installations thermonuclear devices perform when efficient designs could allow the benefit from HPC power. exploded. To successfully produce PRC to deploy missiles tipped with To keep HPCs from being used a W88–like weapon, the PRC may Multiple Independently Targetable for military purposes, the Commerce need dynamic, three-dimensional data Re-entry Vehicle warheads.
Recommended publications
  • America in the World: Forging a New Vision for Foreign Policy and International Security.”
    SPECIAL PRESENTATION “AMERICA IN THE WORLD: FORGING A NEW VISION FOR FOREIGN POLICY AND INTERNATIONAL SECURITY.” CLOSING REMARKS: SAMUEL R. BERGER, FORMER NATIONAL SECURITY ADVISER TO PRESIDENT BILL CLINTON 5:15 PM – 5:30 PM TUESDAY, JUNE 12, 2007 TRANSCRIPT PROVIDED BY DC TRANSCRIPTION & MEDIA REPURPOSING MR. JOSEPH CIRINCIONE: We are now fortunate enough to have a closing speaker who has graciously agreed to help us make some sense of today’s proceedings, to sum this up for us, and to offer his own perspectives. Right before I introduce him, I want to remind everybody in the audience that we’re going to have transcripts of this discussion posted on the Center for American Progress website, americanprogress.org. We’re going to have video highlights of the conference posted. And you’ll be able to go online tonight and see some of the comments from some of the bloggers who have been here. We’ve had some of the best national security bloggers in the Untied States here, including some from the Nation, the Atlantic Monthly, the National Security Network, the American Prospect, and a half a dozen others. You may think that you already know everything you need know about our next speaker, Samuel R. Berger, the 19th national security advisor to the president of United States. You may know that Sandy Berger worked for the former mayor of New York City, John Lindsay, and for former Senator Harold Hughes, or that he was deputy director of the State Department’s Policy Planning staff. You may know that he headed the international trade group of
    [Show full text]
  • Process Makes Perfect Best Practices in the Art of National Security Policymaking
    AP PHOTO/CHARLES DHARAPAK PHOTO/CHARLES AP Process Makes Perfect Best Practices in the Art of National Security Policymaking By Kori Schake, Hoover Institution, and William F. Wechsler, Center for American Progress January 2017 WWW.AMERICANPROGRESS.ORG Process Makes Perfect Best Practices in the Art of National Security Policymaking By Kori Schake, Hoover Institution, and William F. Wechsler, Center for American Progress January 2017 Contents 1 Introduction and summary 6 Findings 14 First-order questions for the next president 17 Best practices to consider 26 Policymaking versus oversight versus crisis management 36 Meetings, meetings, and more meetings 61 Internal NSC staff management 72 Appendix A 73 About the authors 74 Endnotes Introduction and summary Most modern presidents have found that the transition from campaigning to governing presents a unique set of challenges, especially regarding their newfound national security responsibilities. Regardless of their party affiliation or preferred diplomatic priorities, presidents have invariably come to appreciate that they can- not afford to make foreign policy decisions in the same manner as they did when they were a candidate. The requirements of managing an enormous and complex national security bureau- cracy reward careful deliberation and strategic consistency, while sharply punishing the kind of policy shifts that are more common on the campaign trail. Statements by the president are taken far more seriously abroad than are promises by a candidate, by both allies and adversaries alike. And while policy mistakes made before entering office can damage a candidate’s personal political prospects, a serious misstep made once in office can put the country itself at risk.
    [Show full text]
  • The Progressive
    Books 9.2004 8/11/04 1:51 PM Page 45 Books Who’s to Blame for September 11? The 9/11 Commission Report: team had evaded security checks dur- demanding to know why the United Final Report of the National Com- ing a recent trial run at an unidenti- States had to put up with such mission on Terrorist Attacks upon fied New York airport.” attacks—that Tenet walked out of a the United States meeting of the principals.” Berger also Thomas H. Kean, Chair Sandy Berger stressed to the Bush transition team, W. W. Norton. 567 pages. $10.00. Clinton’s National Security Adviser and especially Condoleezza Rice, the also comes off well. He was alert to the gravity of the Al Qaeda threat. By Matthew Rothschild risk of terrorism earlier than most. He deputized counterterrorism expert William Cohen and the Joint Chiefs n page 340 of The 9/11 Richard Clarke and gave him wide Clinton’s Defense Secretary Commission Report is this authority, placing him on an equal William Cohen was exceptionally Osentence: “If the govern- footing with cabinet members cautious. Relying on the advice of ment’s leaders understood the gravity involved in national security. Berger Joint Chiefs of Staff head General of the threat they faced and under- and Clarke worked admirably together Hugh Shelton, Cohen scorned the stood at the same time that their poli- to prevent the Millennium Plot from idea of attacking bin Laden and his cies to eliminate it were not likely to coming to fruition at the end of 1999, operations.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Congressional Record—House H3511
    May 25, 1999 CONGRESSIONAL RECORD Ð HOUSE H3511 COX REPORT RELEASED; IT IS Mr. WICKER. Mr. Speaker, the long- and pledge my efforts to be a protector of our ABOUT TIME awaited Cox Report on Chinese espio- nation's children. (Mr. GIBBONS asked and was given nage becomes public today, and we al- f permission to address the House for 1 ready know many of the stunning de- CHINESE THEFT OF NUCLEAR minute and to revise and extend his re- tails about the loss of our most sen- TECHNOLOGY HAS ADVANCED marks.) sitive nuclear secrets. THREAT BY A GENERATION Mr. GIBBONS. Mr. Speaker, ``The The President's press secretary says Phantom Menace'' is the title to the this goes back 20 years and there is no (Mr. CHABOT asked and was given new popular Star Wars movie. But it Democrat or Republican face on it. He permission to address the House for 1 might also be an apt description of the is using the ``everybody does it'' de- minute and to revise and extend his re- Chinese espionage efforts against the fense. The Energy Secretary has cau- marks.) United States as outlined in the Cox tioned us not to overreact. Mr. CHABOT. Mr. Speaker, the Report. But how should we react to the worst Rosenbergs were executed for giving Unlike this popular movie, however, spy case in American history? It is the former Soviet Union secret infor- this Chinese espionage is not fiction, clear that Clinton-Gore administration mation which allowed them to advance and it may have far-reaching national did not react at all after this was dis- their atomic weapons program by 5 security consequences long into the fu- covered in 1995.
    [Show full text]
  • Passing the Baton 2021: Securing America’S Future Together
    Passing the Baton 2021: Securing America’s Future Together United States Institute of Peace Friday, January 29, 2021 Stephen Hadley: Good morning everyone. My name is Steve Hadley. I chair the board of the United States Institute of Peace, and I'm delighted to welcome you to Passing the Baton: Securing America's Future Together. USIP has hosted the Passing the Baton event after every change in administration for the last 20 years, starting in 2001, when President Clinton's National Security Advisor Sandy Berger, passed the baton to his successor, Condoleezza Rice, who we are honored to have with us again today. This year, we gather in the wake of a violent insurrection against our Capitol, the symbol and foundation of our democracy. The insurrection was marked by hateful expressions of white supremacy and anti-Semitism. These never are, and never can, be tolerated. There is no question that January 6 was one of the greatest tests of American democracy in recent memory. But as lawmakers gathered that same night to fulfill their constitutional duty, it was also the greatest measure of our democracy’s resilience. Ultimately, the events of January 6 underscore that despite the challenges and the fault lines, our democratic system remains the strongest, most powerful form of governance on earth, and the most effective vehicle for driving sustainable peace. Today, as we consider the formidable foreign policy and national security challenges facing the nation, we must recommit to navigating the road ahead together in the spirit, tradition, and principles of liberty and union that have been the bedrock of our republic.
    [Show full text]
  • Tough Love: My Story of Things Worth Fighting for by Susan Rice
    Tough Love: My Story of Things Worth Fighting For by Susan Rice • Featured on episode 456 • Planning to purchase this book? Support the show by using the Amazon link inside our book library. Dave’s Reading Highlights In those early days, it was hard to grasp the depth and force of the reaction to my appearances. It was harder still to imagine that it would endure, not only through the entirety of the 2012 presidential campaign, but long thereafter. I became a household name and the poster child for bilious Obama-haters on Fox and in right-wing social media. For months, it was relentless. And though it ebbed, it has never ended. Ever since my name became synonymous with Benghazi, I have wanted to tell my story. Almost overnight, I went from being a respected if relatively low-profile cabinet official to a nationally notorious villain or heroine, depending on one’s political perspective and what cable news channel you watch. I am neither. The portrayals of me on both sides are superficial and uninformed by who I am and where I come from, by what motivates and truly defines me. I could not tell my own story—until I left government. When I was a senior official who spoke publicly, I was speaking on behalf of the United States of America and our president. For the five years after Benghazi until I returned to private life, I was compelled to allow myself to be defined by others—something I never had to do before or otherwise would have tolerated.
    [Show full text]
  • China: Suspected Acquisition of U.S
    Order Code RL30143 CRS Report for Congress Received through the CRS Web China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Updated February 1, 2006 Shirley A. Kan Specialist in National Security Policy Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress China: Suspected Acquisition of U.S. Nuclear Weapon Secrets Summary This CRS Report discusses China’s suspected acquisition of U.S. nuclear weapon secrets, including that on the W88, the newest U.S. nuclear warhead. This serious controversy became public in early 1999 and raised policy issues about whether U.S. security was further threatened by China’s suspected use of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration’s response to the security problems was effective or mishandled and whether it fairly used or abused its investigative and prosecuting authority. The Clinton Administration acknowledged that improved security was needed at the weapons labs but said that it took actions in response to indications in 1995 that China may have obtained U.S. nuclear weapon secrets. Critics in Congress and elsewhere argued that the Administration was slow to respond to security concerns, mishandled the too narrow investigation, downplayed information potentially unfavorable to China and the labs, and failed to notify Congress fully. On April 7, 1999, President Clinton gave his assurance that partly “because of our engagement, China has, at best, only marginally increased its deployed nuclear threat in the last 15 years” and that the strategic balance with China “remains overwhelmingly in our favor.” On April 21, 1999, Director of Central Intelligence (DCI) George Tenet, reported the Intelligence Community’s damage assessment.
    [Show full text]
  • CONGRESSIONAL RECORD—HOUSE May 6, 1999
    May 6, 1999 CONGRESSIONAL RECORD—HOUSE 8791 I also submit for printing in the CONGRES- These good people and thousands of ligence, briefed Sandy Berger about the SIONAL RECORD an adjusted fiscal year 2000 others are hauling off all of their full extent of Chinese spying. Berger allocation to the House Committee on Appro- worldly possessions in the trunk of a was told that China had stolen W–88 priations to reflect $1,838,000,000 in additional car or even a wheelbarrow. So many nuclear warhead designs and the neu- new budget authority and $1,774,000,000 in more were not that fortunate. tron bomb data. He was told that a spy additional outlays for designated emergency Nothing can contain their will, their might still be passing secrets to China spending. In addition, the outlay effect of the faith, and their fight. God bless Okla- at Los Alamos. He was even told that fiscal year 1999 budget authority of H.R. 1664 homa. Pray for Oklahoma. the theft of neutron bomb data oc- will result in additional outlays of f curred in 1995 under President Clin- $5,243,000,000 for fiscal year 2000. This will ton’s administration. So if he was told CHINA’S THEFTS OF U.S. NUCLEAR increase the allocation to the Appropriations all that, why did he not go right into SECRETS Committee to $538,109,000,000 in budget au- the Oval Office and tell the President? thority and $577,962,000,000 in outlays for fis- The SPEAKER pro tempore. Under Well, I believe he did, and the Presi- cal year 2000.
    [Show full text]
  • Why America's Grand Strategy Has Not Changed
    Why America’s Grand Strategy Has Not Changed Why America’s Grand Patrick Porter Strategy Has Not Changed Power, Habit, and the U.S. Foreign Policy Establishment Why has U.S. grand strategy persisted since the end of the Cold War? If grand strategy is the long- term orchestration of power and commitments to secure oneself in a world where war is possible, the United States’ way of pursuing security has been re- markably stable.1 Long before the fall of the Soviet Union, the United States formed a grand strategy of “primacy,” often coined as “leadership.”2 This strategy was interrupted only occasionally. By the 1960s, it had set the parame- ters for Washington’s foreign policy debate.3 The strategy has four interlock- ing parts: to be militarily preponderant; to reassure and contain allies; to integrate other states into U.S.-designed institutions and markets; and to inhibit the spread of nuclear weapons.4 These fundamental security commit- ments have proven hard to change, even amid shocks. Patrick Porter is Professor of International Security and Strategy at the University of Birmingham. The author is grateful to the anonymous reviewers and to Stephane Baele, Tarak Barkawi, Gregorio Bettiza, David Blagden, Sergio Catignani, Peter Feaver, Francis Gavin, Jonathan Golub, Ryan Grauer, Ted Hopf, Burak Kadercan, Michael Lind, Beverley Loke, Jason Reiºer, Robert Saunders, Catarina Thomson, and Hugh White. 1. See Barry R. Posen, The Sources of Military Doctrine: France, Britain, and Germany between the World Wars (Ithaca, N.Y.: Cornell University Press, 1984), p. 13. 2. For accounts of U.S.
    [Show full text]
  • CONGRESSIONAL RECORD—HOUSE May 25, 1999 and It May Have Far-Reaching National Clear That Clinton-Gore Administration Mr
    May 25, 1999 CONGRESSIONAL RECORD—HOUSE 10787 b 1000 flect on our own lax standards and se- the Missing, Exploited and Runaway curity. Children’s Act. AFTER RECESS Do the initials ‘‘CIA’’ ring a bell? We In my own district, Jimmy Ryce and The recess having expired, the House spend billions on similar activities Shannon Melendi were preyed upon by was called to order by the Speaker pro around the world, but we should be monsters. tempore (Mr. SUNUNU) at 10 a.m. more concerned with protecting our Jimmy was abducted, raped, killed, f own vital national security. and dismembered as he walked home If I were the White House today read- from his school bus stop. Jimmy’s par- PRAYER ing some of the headlines, ‘‘China Stole ents channeled their grief into the es- The Chaplain, the Reverend James Nuclear Secrets for Bombs, White tablishment of the Jimmy Ryce Cen- David Ford, D.D., offered the following House Seeks to Minimize that Type of ter. prayer: Problem,’’ then I would want to change Shannon disappeared from a softball Let us pray using the words of Psalm the subject, too. I would want to talk field and was never seen again. Shan- 147. about campaign finance reform. I non’s parents have taken their daugh- ‘‘Praise the Lord! would want to talk about gun control ter’s case to the public, pushing for ‘‘How good it is to sing praises to our God; in America. I would want to do any- stronger laws to keep sexual predators for He is gracious, and a song of thing to change the tone and tenor of off the streets.
    [Show full text]
  • N Ext Steps in Ko S
    OCTOBER 199 9 Inside 4 PRESIDENT’S MESSAGE The Institute at 15 Vol. V, No. 6 5 DONOR PROFILE Edna Fuerth Lemle UN I T E D STAT E S IN S T I T U T E O F PE A C E ■ WA S H I N G T O N, DC 6 NORTH KOREA William Perry on Normalization 6 EAST TIMOR Ne xt Steps in Kos o vo Ramos Horta 7 Amb. Kampelman Receives Top Berger, Albright, and Kosovar Albanian leaders consider the steps necessary Honor to achieve a prosperous, democratic future for the province. 8 Women & Peacebuilding hile the Liberation Army (KLA)—at the fighting in request of the State Department. Kosovo has The facilitation was chaired by stopped and Chester A. Crocker, chairman of peacekeeping the Institute’s board of directors, troops are in and organized by place, victory Daniel Serwer, will come only when Kosovo and director of the southeast Europe are “so tightly Institute's integrated into the rest of Europe Balkans that another war is inconceiv- Initiative, and able,” says Samuel “Sandy” executive vice Berger, national security adviser president Harriet to President Clinton. Hentges. At the Clockwise: Berger discussed the challenges meeting, 39 lead- Bujar Bukoshi, facing peace in Kosovo at the U.S. ers of the feuding Madeleine Institute of Peace on September factions, journal- Albright, 30. He chose the Institute as the ists, economists, Hashim Thaqi, site for his address on Kosovo and representatives of nongovern- and Samuel because of the Institute's extensive mental organizations hammered “Sandy” Berger. work on the Balkans.
    [Show full text]