Threats to the US Research Enterprise: China's Talent Recruitment

Total Page:16

File Type:pdf, Size:1020Kb

Threats to the US Research Enterprise: China's Talent Recruitment United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans TABLE OF CONTENTS I. EXECUTIVE SUMMARY .................................................................................. 1 II. FINDINGS OF FACT AND RECOMMENDATIONS ................................... 7 III. BACKGROUND ................................................................................................ 14 A. China’s Goal to be the Science and Technology Leader by 2050 .................. 14 1. From Brain Drain to Brain Gain .............................................................. 15 2. China’s Systematic Targeting of Critical Technologies ........................... 17 3. China’s Military-Civilian Fusion Strategy .............................................. 18 4. China’s Strategic Plan for Talent Recruitment ....................................... 20 B. Congressional Testimony on Chinese Talent Recruitment Plans ................ 30 C. China Deletes References to the Thousand Talents Plan ............................. 32 D. After Implementation of Talent Recruitment Plans, More Chinese Students, Researchers, and Scientists are Returning to China .................................... 35 IV. EFFORTS TO SECURE U.S. RESEARCH .................................................. 37 A. THE NATIONAL SCIENCE FOUNDATION ............................................... 39 1. Fundamental Research ............................................................................. 40 2. The NSF Grant Process ............................................................................ 41 3. Foreign Support and Affiliation Disclosure ............................................. 42 4. The NSF is Unprepared to Stop Foreign Talent Recruitment Plan Members From Misappropriating U.S.-Funded Research ...................... 44 5. Talent Recruitment Plan Members Misappropriated NSF Research .... 48 B. THE NATIONAL INSTITUTES OF HEALTH ............................................. 50 1. NIH Grant Process .................................................................................... 51 2. Disclosure of Foreign Support and Affiliations ....................................... 52 3. NIH’s Division of Grants Compliance and Oversight ............................. 53 4. The HHS IG Identified Weaknesses in Tracking and Reporting Foreign Financial Conflicts of Interest .................................................................. 54 i 5. Weaknesses in NIH’s Internal Controls for Monitoring and Permitting Foreign Access to Sensitive Data ............................................................. 57 6. TTP Members Misappropriated NIH Research ....................................... 58 C. THE DEPARTMENT OF ENERGY .............................................................. 65 1. National Laboratories ............................................................................... 66 2. Foreign Scientists and the Department of Energy .................................. 67 3. Department of Energy Financial Assistance Programs .......................... 68 4. Energy Did Not Implement Policies Prohibiting Involvement in Foreign Talent Recruitment Plans Until 2019 ...................................................... 70 5. TTP Members Likely Stole Energy Research and Intellectual Property 72 D. THE DEPARTMENT OF STATE .................................................................. 75 1. The Nonimmigrant Visa Application Review Process ............................. 75 2. Security Advisory Opinions ...................................................................... 76 3. Consular Affairs Has Limited Authority to Deny Visa Applicants on National Security Grounds Related to Intellectual Property Theft ....... 78 4. Consular Officers Manually Search State’s “Technology Alert List” and Other Supporting Documentation ............................................................ 79 5. Chinese Visa Applicants Comprise a Majority of Visa Mantis Reviews, But Are Rarely Denied .............................................................................. 80 6. Ongoing Criminal Prosecution Highlights Problems with State’s Lack of Scrutiny of Research Scholar Visas .......................................................... 81 E. THE DEPARTMENT OF COMMERCE ........................................................ 83 1. Deemed Export Licensing ......................................................................... 84 2. A Majority of Deemed Export Licenses are for Chinese Nationals ........ 87 3. Commerce Rarely Denies License Applications ...................................... 88 4. Commerce Issued Deemed Export Licenses for Chinese Nationals Linked to Talent Recruitment Plans and Other Concerning Entities .... 88 F. THE FEDERAL BUREAU OF INVESTIGATION ....................................... 92 1. The FBI was Slow to Recognize the Threat ............................................. 93 2. The FBI Took Nearly Two Years to Disseminate Talent Recruitment Plan Information to Federal Grant-Making Agencies ............................. 94 ii 3. The FBI Disbanded its National Security Higher Education Advisory Board ......................................................................................................... 95 4. The FBI Continues to Lack a Coordinated National Outreach Program on the Threat from Talent Recruitment Plans ........................................ 97 G. THE OFFICE OF SCIENCE AND TECHNOLOGY POLICY .................... 100 1. The National Science and Technology Council ...................................... 100 2. Joint Committee on the Research Environment ................................... 101 3. Inconsistent Federal Grant Policies and Outreach Efforts Complicate OSTP’s Ability to Respond to Foreign Talent Recruitment Plans ........ 103 iii I. EXECUTIVE SUMMARY American taxpayers contribute over $150 billion each year to scientific research in the United States. Through entities like the National Science Foundation, the National Institutes of Health and the Department of Energy’s National Labs, taxpayers fund innovations that contribute to our national security and profoundly change the way we live. America built this successful research enterprise on certain values: reciprocity, integrity, merit-based competition, and transparency. These values foster a free exchange of ideas, encourage the most rigorous research results to flourish, and ensure that researchers receive the benefit of their intellectual capital. The open nature of research in America is manifest; we encourage our researchers and scientists to “stand on the shoulders of giants.” In turn, America attracts the best and brightest. Foreign researchers and scholars travel to the United States just to participate in the advancement of science and technology. Some countries, however, seek to exploit America’s openness to advance their own national interests. The most aggressive of them has been China. China primarily does this through its more than 200 talent recruitment plans—the most prominent of which is the Thousand Talents Plan. Launched in 2008, the Thousand Talents Plan incentivizes individuals engaged in research and development in the United States to transmit the knowledge and research they gain here to China in exchange for salaries, research funding, lab space, and other incentives. China unfairly uses the American research and expertise it obtains for its own economic and military gain. In recent years, federal agencies have discovered talent recruitment plan members who downloaded sensitive electronic research files before leaving to return to China, submitted false information when applying for grant funds, and willfully failed to disclose receiving money from the Chinese government on U.S. grant applications. This report exposes how American taxpayer funded research has contributed to China’s global rise over the last 20 years. During that time, China openly recruited U.S.-based researchers, scientists, and experts in the public and private sector to provide China with knowledge and intellectual capital in exchange for monetary gain and other benefits. At the same time, the federal government’s grant-making agencies did little to prevent this from happening, nor did the FBI and other federal agencies develop a coordinated response to mitigate the threat. These failures continue to undermine the integrity of the American research enterprise and endanger our national security. * * * * China aims to be the world’s leader in science and technology (“S&T”) by 2050. To achieve its S&T goals, China has implemented a whole-of-government campaign to recruit talent and foreign experts from around the world. China’s campaign is well financed. According to an analysis by the FBI, China has pledged 1 to spend 15 percent of its gross domestic product on improving human resources from 2008 to 2020. That amounts to an investment of more than $2 trillion. For the Chinese government, international scientific collaboration is not about advancing science, it is to advance China’s national security interests. China’s Talent Recruitment Plans. Foreign trained scientists and experts provide China access to know-how, expertise, and foreign technology—all necessary for China’s economic development
Recommended publications
  • Threat Vector (Thorndike Perss Large Print Basic) by Tom Clancy
    Threat Vector (Thorndike Perss Large Print Basic) by Tom Clancy Ebook Threat Vector (Thorndike Perss Large Print Basic) currently available for review only, if you need complete ebook Threat Vector (Thorndike Perss Large Print Basic) please fill out registration form to access in our databases Download here >> Series:::: Thorndike Perss Large Print Basic+++Paperback:::: 960 pages+++Publisher:::: Large Print Press; Large Print edition (December 3, 2013)+++Language:::: English+++ISBN-10:::: 1594136688+++ISBN-13:::: 978-1594136689+++Product Dimensions::::5.5 x 1 x 8.5 inches++++++ ISBN10 1594136688 ISBN13 978-1594136 Download here >> Description: As China plans to invade Taiwan, and launches a cyber attack on the U.S., President Jack Ryan, his son and the team at the Campus have to act fast if they are going to stop the increasingly rogue nation. (suspense). THREAT VECTOR is a Tom Clancy novel with Jack Ryan written by Mark Greaney. The fact that it’s a Jack Ryan novel makes the story appealing. The book’s relevance to today’s (2016) real world crises with China and Russia makes it even more enticing. As in most Clancy/Greaney novels the first 20 percent of the book is filled with superfluous and boring background narration. If you can wind your way through this early part you will be rewarded. Most of the action takes place in China and the South China Sea. The book is full of exciting, action- packed scenarios. There’s even a couple of good air-to-air battles thrown in to indulge the flyboys among us. President Ryan and Jack Junior play key roles in these scenarios.
    [Show full text]
  • Jeffrey W. Pitts, Esq
    JEFFREY W. PITTS, ESQ. OZISIK PLLC 29 Broadway, Suite 1500 New York, NY 10006 Tel: (212) 509-0099 Email: [email protected] www.ozisiklaw.com Introduction Presentation Outline ! Consular Visa Processing ! What is involved in the typical visa process. ! Administrative Processing ! What is it and why. ! How to Prepare ! Documents to include with your visa application; focus of the consular officer’s questions; what to do once “in process.” Appendix - Technology Alert List (TAL) CONSULAR VISA PROCESSING CONSULAR VISA PROCESSING ! F-1 students also must provide Form I-20 from the school, and confirmation of payment of the I-901 Student and Exchange Visitor Information System (SEVIS) fee. ! J-1 visa applicants must provide Form DS-2019 from the Program Sponsor, and the I-901 SEVIS fee payment confirmation. ! H-1B applicants provide the original I-797, Notice of Action, approving the H-1B petition, as well as a copy of the H-1B petition and supporting documentation ! Consulates often have specific procedures, so it is important to review the particular consulate’s visa process prior to making an appointment. ! At the conclusion of the interview, most applicants are notified if the visa is approved and provided information on when the visa will be available. CONSULAR VISA PROCESSING ! Some visa applicants are notified at their interview that their visa application requires “additional processing.” ! Generally, the applicant is given a notice indicating the visa is denied under Section 221(g) of the INA and what action the applicant needs to take to continue the processing of the visa. ! This type of visa denial is termed “Administrative Processing.” ADMINISTRATIVE PROCESSING ADMINISTRATIVE PROCESSING ADMINISTRATIVE PROCESSING ADMINISTRATIVE PROCESSING ADMINISTRATIVE PROCESSING Technology Alert Lists related Administrative Processing occurs when an applicant’s intended commercial or academic activity triggers concerns about the possible illegal transfer of technology as defined in the Technology Alert List (TAL).
    [Show full text]
  • Read Book > Tom Clancy Locked on and Threat Vector
    AXIP4PC16STW ^ PDF ^ Tom Clancy Locked on and Threat Vector (2-In-1 Collection) Tom Clancy Locked on and Th reat V ector (2-In-1 Collection) Filesize: 3.31 MB Reviews Comprehensive guideline! Its such a good read through. It is actually writter in basic words and not confusing. I am just easily could possibly get a enjoyment of reading a composed book. (Lonzo Wilderman) DISCLAIMER | DMCA KQP66MYYB4CV Book < Tom Clancy Locked on and Threat Vector (2-In-1 Collection) TOM CLANCY LOCKED ON AND THREAT VECTOR (2-IN-1 COLLECTION) To save Tom Clancy Locked on and Threat Vector (2-In-1 Collection) PDF, you should click the web link beneath and download the file or have accessibility to other information which are have conjunction with TOM CLANCY LOCKED ON AND THREAT VECTOR (2-IN-1 COLLECTION) book. BRILLIANCE AUDIO, United States, 2015. CD-Audio. Book Condition: New. Unabridged. 170 x 135 mm. Language: English . Brand New. Two Tom Clancy novels in one collection. Locked On Although his father had been reluctant to become a field operative, Jack Ryan Jr. wants nothing more. Privately training with a seasoned Special Forces drill instructor, he s honing his skills to transition his work within The Campus from intelligence analysis to hunting down and eliminating terrorists wherever he can even as Jack Ryan Sr. campaigns for re-election as President of the United States. But what neither father nor son knows is that the political and the personal have just become equally dangerous. A devout enemy of Jack Sr. launches a privately funded vendetta to discredit him by connecting the presidential candidate to a mysterious killing in the past by John Clark, his longtime ally.
    [Show full text]
  • Post 9/11 Maritime Security Measures : Global Maritime Security Versus Facilitation of Global Maritime Trade Norhasliza Mat Salleh World Maritime University
    World Maritime University The Maritime Commons: Digital Repository of the World Maritime University World Maritime University Dissertations Dissertations 2006 Post 9/11 maritime security measures : global maritime security versus facilitation of global maritime trade Norhasliza Mat Salleh World Maritime University Follow this and additional works at: http://commons.wmu.se/all_dissertations Part of the Defense and Security Studies Commons Recommended Citation Mat Salleh, Norhasliza, "Post 9/11 maritime security measures : global maritime security versus facilitation of global maritime trade" (2006). World Maritime University Dissertations. 98. http://commons.wmu.se/all_dissertations/98 This Dissertation is brought to you courtesy of Maritime Commons. Open Access items may be downloaded for non-commercial, fair use academic purposes. No items may be hosted on another server or web site without express written permission from the World Maritime University. For more information, please contact [email protected]. WORLD MARITIME UNIVERSITY Malmö, Sweden POST 9/11 MARITIME SECURITY MEASURES: Global Maritime Security versus the Facilitation of Global Maritime Trade By NORHASLIZA MAT SALLEH Malaysia A dissertation submitted to the World Maritime University in partial fulfilment of the requirements for the award of the degree of MASTERS OF SCIENCE in MARITIME AFFAIRS (MARITIME ADMINISTRATION) 2006 © Copyright Norhasliza MAT SALLEH, 2006 DECLARATION I certify that all material in this dissertation that is not my own work has been identified, and that no material is included for which a degree has previously been conferred on me. The content of this dissertation reflect my own personal views, and are not necessarily endorsed by the University. Signature : …………………………… Date : ……………………………. Supervised by: Cdr.
    [Show full text]
  • Travel Advisory for International Students
    NATIONAL IMMIGRATION PROJECT of the NATIONAL LAWYERS GUILD TRAVEL ADVISORY FOR INTERNATIONAL STUDENTS Prepared by Leila Laoudji* -- Post 9-11 Project Attorney May 23, 2003 I. Documentation Due to the current climate, when you are traveling, it is important that you have all the following documents in order, even when taking a brief trip to Mexico or Canada or along the Southern border of the United States. 1. Valid passport (When you come back to the U.S. your passport must be valid for six months longer than you plan to stay in the U.S.). 2. I-94 card. 3. New SEVIS Form I-20 with a signature from your international student advisor (“ISO”) that will not be older than 6 months by the time you come back to the U.S. You and each member of your family must have a SEVIS I-20 by August 1, 2003 to return to the U.S. 4. Valid F-1 stamp in passport (See Section on F-1 visa stamp below). 5. Evidence of financial support (Your personal bank statement, scholarship letter). 6. Proof of Enrollment (Transcript or letter of enrollment from your ISO). II. Your Student Visa Stamp If you have an expired visa stamp and want to travel abroad, it is not guaranteed that the U.S. Consulate will renew your stamp and as a result, you may not be able to return to the U.S. to finish your studies. You cannot renew your visa stamp in the United States. If you have an expired student visa and are traveling back to the U.S.
    [Show full text]
  • Corrupting the College Board
    n exchange for generous Chinese government funding, the College Board has given China strategic access to American K-12 education. Since at least 2003, the College Board has sponsored Confucius Institutes at K-12 Ischools, served as a recruiter for Chinese government programs, and helped the Chinese Communist Party design and gain control over American teacher train- ing programs. This report details the College Board’s corruption by the Chinese government and outlines key policy changes to protect and restore the integrity of the American Corrupting the education system. College Board Confucius Institutes and K-12 Education Rachelle Peterson, a senior research fellow at the National Association of Scholars, is also the author of Outsourced to China: Confucius Institutes and Soft Power in American Higher Education (2017). Rachelle Peterson September 2020 Corrupting the College Board Confucius Institutes and K-12 Education A report by the Cover Design by Chance Layton 420 Madison Avenue, 7th Floor Interior Design by Chance Layton New York, NY 10017 © 2020 National Association of Scholars Corrupting the College Board Confucius Institutes and K-12 Education Authored by Rachelle Peterson Senior Research Fellow Introduction by Peter W. Wood President, National Association of Scholars Cover Design by Chance Layton Interior Design by Chance Layton © 2020 National Association of Scholars About the National Association of Scholars Mission The National Association of Scholars is an independent membership association of academics and others working to sustain the tradition of reasoned scholarship and civil debate in America’s colleges and univer- sities. We uphold the standards of a liberal arts education that fosters intellectual freedom, searches for the truth, and promotes virtuous citizenship.
    [Show full text]
  • List of 2019 SJTU Undergraduate Programs in Chinese” Entrance Test Applicants Who Cannot Provide the Certificates Listed in Term NO
    No.59 QS World University Ranking Top 5 China University Undergraduate Engineering Ranking Cluster Program in French for International Students Founded in 1896, Shanghai Jiao Tong University (SJTU) is one of the internationally recognized, top-tier research universities in China, with strong commitment to nurturing future leaders with innovative drives and global visions. The Engineering Cluster Program is a new undergraduate international program designed to combine the strengths of engineering-related fields at SJTU. Offering all major courses in English or French, the Cluster Program welcomes prospective students with an interest in engineering studies from all over the world. The SJTU Undergraduate Engineering Cluster program in French includes > SJTU-ParisTech Elite Institute of Technology (SPEIT) Cluster students will take introductory science courses in > The School of Materials Science and Engineering the first 1.5 years at SJTU-Paris Tech Elite Institute of > The School of Electronic, Information and Electrical Technology (SPEIT). After meeting this requirement, Engineering, Information Engineering Cluster students may choose to continue their studies at > The School of Naval Architecture, Ocean and Civil Engineering SPEIT (in French) or transfer to another engineering > The School of Mechanical Engineering school (in English or Chinese) to complete their bache- lor’s degree. The Cluster Program covers various engineering-related disciplines such as: Reminder: Although all Cluster courses are taught in > Mechanical Engineering French, Cluster students are required to take Chinese > Electrical and Computer Engineering culture and language courses while enrolling in their > Materials Science and Engineering respective degree programs. All Cluster students are > Computer Science and Technology expected to meet HSK 4 (Chinese Language Test) as the > Information Engineering minimal Chinese language requirement for graduation.
    [Show full text]
  • AN INTRODUCTION to the F-1 INTERNATIONAL STUDENT a Guide to Assist Clemson University Departments with Their International Student Population
    AN INTRODUCTION TO THE F-1 INTERNATIONAL STUDENT A guide to assist Clemson University departments with their international student population Office of International Affairs E-303 Martin Hall Clemson University Clemson, SC 29634-5714 TABLE OF CONTENTS I. Introduction …………………………………………………………… 3 II. Glossary of Terms …………………………………………………….. 3 III. What is F-1 Status? ……………………………………………………. 5 IV. How does an international student obtain F-1 status? ………………… 5 V. SEVIS …………………………………………………………………. 6 VI. Obtaining the visa ……………………………………………………... 6 VII. After the visa is issued ………………………………………………… 7 VIII. Arrival on campus ……………………………………………………... 8 IX. Maintenance of status …………………………………………………. 8 X. Departure ……………………………………………………………….. 9 XI. Other F-1 areas …………………………………………………………. 9 XII. What the department can do ……………………………………………. 10 XIII. Conclusion ………………………………………………………………. 11 2 I. Introduction As the number of international students in the US returns to its pre-9/11 level, and the commitment the US Government has shown towards once again making the US a top academic destination for the world’s brightest, the CU community needs to have an understanding of the regulatory and procedural concepts affecting our largest international population, the F-1 non-immigrant student. The purpose of this handbook is to provide CU faculty and staff working with the international population exposure to a brief/general description of the status, its concerns, as well as of the steps taken by the Office of International Affairs once the international student has been admitted until their departure from the university. II. Glossary of Terms GLOSSARY OF TERMS Adjudicated When the student’s immigration documents have been “stamped” by the immigration official at the POE as having met the requirements for entering the US in F-1 status.
    [Show full text]
  • China As a "Cyber Great Power": Beijing's Two Voices In
    SECURITY, STRATEGY, AND ORDER APRIL 2021 CHINA AS A “CYBER GREAT POWER” BEIJING’S TWO VOICES IN TELECOMMUNICATIONS RUSH DOSHI, EMILY DE LA BRUYÈRE, NATHAN PICARSIC, AND JOHN FERGUSON CHINA AS A “CYBER GREAT POWER” BEIJING’S TWO VOICES IN TELECOMMUNICATIONS RUSH DOSHI, EMILY DE LA BRUYÈRE, NATHAN PICARSIC, AND JOHN FERGUSON EXECUTIVE SUMMARY External Chinese government and commercial messaging on information technology (IT) speaks in one voice. Domestically, one hears a different, second voice. The former stresses free markets, openness, collaboration, and interdependence, themes that suggest Huawei and other Chinese companies ought to be treated like other global private sector actors and welcomed into foreign networks. Meanwhile, domestic Chinese government, commercial, and academic discourse emphasizes the limits of free markets and the dangers of reliance on foreign technologies — and, accordingly, the need for industrial policy and government control to protect technologies, companies, and networks. Domestic Chinese discourse also indicates that commercial communication networks, including telecommunications systems, might be used to project power and influence offensively; that international technical standards offer a means with which to cement such power and influence; and — above all — that IT architectures are a domain of zero-sum competition. That external Chinese government and corporate messaging might be disingenuous is by no means a novel conclusion. However, the core differences between that messaging and Chinese internal discussion on IT remain largely undocumented — despite China’s increasing development of and influence over international IT infrastructures, technologies, and norms. This report seeks to fill that gap, documenting the tension between external and internal Chinese discussions on telecommunications, as well as IT more broadly.
    [Show full text]
  • China's Quest for Global Primacy: an Analysis of Chinese International
    C O R P O R A T I O N TIMOTHY R. HEATH, DEREK GROSSMAN, ASHA CLARK China’s Quest for Global Primacy An Analysis of Chinese International and Defense Strategies to Outcompete the United States For more information on this publication, visit www.rand.org/t/RRA447-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0615-6 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover images: prospective56/iStock/ Getty Images Plus; MF3d/iStock/Getty Images Plus Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This research explores possible international and defense strategies that China might employ to outcompete the United States and achieve a position of international primacy.
    [Show full text]
  • Visas Mantis Program Has Lowered Burden on Foreign Science Students and Scholars, but Further Refinements Needed
    United States Government Accountability Office GAO Report to Congressional Requesters February 2005 BORDER SECURITY Streamlined Visas Mantis Program Has Lowered Burden on Foreign Science Students and Scholars, but Further Refinements Needed a GAO-05-198 Contents Letter 1 Results In Brief 2 Background 4 Mantis Processing Times Have Declined 7 Actions Taken to Improve the Mantis Process, but Some Issues Are Unresolved 9 Conclusions 19 Recommendations for Executive Action 20 Agency Comments and Our Evaluation 20 Appendixes Appendix I: Objectives, Scope, and Methodology 22 Appendix II: Comments from the Department of State 25 Appendix III: Comments from the Department of Homeland Security 28 GAO Comment 30 Appendix IV: Comments from the Department of Justice 31 GAO Comment 33 Appendix V: GAO Contacts and Staff Acknowledgments 34 GAO Contacts 34 Acknowledgments 34 Table Table 1: Actions Taken to Improve Visas Mantis and Address Other Obstacles Faced by Students and Scholars in Obtaining Visas 10 Figures Figure 1: Visa Adjudication Process 6 Figure 2: Average Time to Close Mantis Cases by Month 8 Figure 3: Pending Mantis Cases as of November 30, 2004 9 Figure 4: Comparison of Mantis Processing Timelines for Non-Student Nonimmigrant Visa Applicants and Student Nonimmigrant Visa Applicants in Shanghai, China, June 2004 15 Page i GAO-05-198 Visas for Science Students and Scholars Contents Abbreviations CCD Consular Consolidated Database CLASS Consular Lookout and Support System DHS Department of Homeland Security FBI Federal Bureau of Investigation INA Immigration and Nationality Act NP Bureau of Nonproliferation SAO Security Advisory Opinion SAO IP Security Advisory Opinion Improvement Project SEVIS Student and Exchange Visitor Information System TAL Technology Alert List This is a work of the U.S.
    [Show full text]
  • Threats to the US Research Enterprise: China's Talent Recruitment
    United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE Threats to the U.S. Research Enterprise: China’s Talent Recruitment Plans TABLE OF CONTENTS I. EXECUTIVE SUMMARY .................................................................................. 1 II. FINDINGS OF FACT AND RECOMMENDATIONS ................................... 7 III. BACKGROUND ................................................................................................ 14 A. China’s Goal to be the Science and Technology Leader by 2050 .................. 14 1. From Brain Drain to Brain Gain .............................................................. 15 2. China’s Systematic Targeting of Critical Technologies ........................... 17 3. China’s Military-Civilian Fusion Strategy .............................................. 18 4. China’s Strategic Plan for Talent Recruitment ....................................... 20 B. Congressional Testimony on Chinese Talent Recruitment Plans ................ 30 C. China Deletes References to the Thousand Talents Plan ............................. 32 D. After Implementation of Talent Recruitment Plans, More Chinese Students, Researchers, and Scientists are Returning to China .................................... 35 IV. EFFORTS TO SECURE U.S. RESEARCH .................................................
    [Show full text]