Professional Documents
Culture Documents
US-Relations Thumpers
Cyberespionage, political tensions, and national security
concerns hamper US-China S&T trade
Suttmeier 14 (Richard P. Suttmeier, Dr. Richard P. Suttmeier is a Professor of Political Science,
Emeritus, at the University of Oregon. He has written widely on science and technology development
issues in China, Trends in U.S.-China Science and Technology Cooperation: Collaborative Knowledge
Production for the Twenty-First Century?, Research Report Prepared on Behalf of the U.S.-China
Economic and Security Review Commission, September 11, 2014,
http://origin.www.uscc.gov/sites/default/files/Research/Trends%20in%20US-China%20Science%20and
%20Technology%20Cooperation.pdf)
the government-to-government
relationship is not a conduit for the transfer of sensitive technologies ,
especially technologies embedded in physical artifacts. The fact that the relationship
does involve training and visits to U.S. laboratories, however, ensures that
knowledge transfers occur. U.S. concerns over the course of the last decade about deemed
exports and human embodied transfers of sensitive scientific knowledge or technology have
led technical agencies to put in place mechanisms to vet visiting scientists and
engineers. 74 Overall, however, the government-to-government relationship is much less
a conduit for technology transfer than commercial relations or academic channels .
Security concerns have become far more prevalent in the relationship now than in
the past, in large part due to various political tensions between the two countries
and Chinas rise as a commercial and potential military competitor .
Allegations of cyberespionage activities made by both sides against the other
further highlight the increasing prevalence of information security issues. In particular,
concerns over Chinese espionage and tech nology acquisition strategies have led to
greater wariness in the conduct of relations on the U.S. side in the face of reports
from several agencies that Chinese interests in scientific collaboration seem to be
targeted at specific fields and facilities where China hopes to enhance capabilities .75
A less-than-transparent state secrecy legal environment on the Chinese side has led
to limitations on data sharing under certain protocols. This has led to U.S. frustrations over the
Technology Leakage and Security Concerns For the most part,
conduct of field research in ways that are inconsistent with the culture of scientific openness with which U.S.
perspective, U.S. export controls and visa processes (though much improved) are also manifestations of a security
intelligence agencies play a key role in identifying technology acquisition targets, which are then shared with
civilian S&T agencies as well as national security agencies.79 Since this report is being prepared on an unclassified,
open source basis, it is not possible to determine the extent to which such technology acquisition targeting enters
therefore seldom far from commercial application and from the emergence of dual-use technologies having both
China remained largely outside the export control process? First, China was
long excluded from this process. Its membership in export control regimes was
not sought by the United States or other powers. Second, there are questions of
national sovereignty and of nationalistic sensitivities; the Chinese remain
very wary of actions or policy requirements that appear intrusive in their own
decision-making process and policy-making procedures. Third, there is insufficient
support within China to connect export control to China's national security
interests. Fourth, weapons exports (including some sensitive weapons
technologies) remain alluring to Chinese institutions and policymakers for
financial as well as geopolitical reasons. Chinese enterprises, for example, have explicit sanction to
Why has
pursue hard currency earnings, given that the state is no longer fully prepared to subsidize the activities of these
There has been a wide array of activities both in the military and nonmilitary sector to enhance the attentiveness of
Chinese enterprises to market forces.
we described four principal policy goals for the United States: (1)
gaining Chinese adherence and full participation in international agreements;
Earlier in the briefing,
(2) improving the export control system in China; (3) gaining greater access to
and transparency into the Chinese military system, including military
enterprises; and (4) improving the enforcement of Chinese laws on Chinese
enterprises. This chart links the strategies we have identified to the primary policy goals. Although other
linkages exist, we judge that the ones above are of primary importance. As the chart makes clear, none of the
strategy options by themselves can address all four policy goals. Rather, a
combination of strategy options is required to subsume all the policy goals. In
particular, it is necessary to combine high-level strategies with working-level
strategies to advance all four policy goals.
The Chinese have been excluded from an important part of the international rulemaking process and denied a seat at the table in negotiating and working out
multilateral agreements for export controls. Although the United States has kept China informed
about the Wassenaar discussions, the Chinese have not been included formally in the
Wassenaar Arrangement discussions. Because they have not had much opportunity to interact with
the other national teams, the Chinese have not contributed to joint statements of principle
or other measures that could elicit increased Chinese participation . In addition, the
technical sessions in multilateral agreement negotiations are frequently staffed by Defense Department officials,
and these sessions are a principal means by which the Defense Department builds professional relations with
One of the challenges of interacting with China is the opacity of its structures and
organizations. The interrelationship between the military and civilian industrial
baseswhich entities are associated or linked to other entitiesis poorly understood. Consequently,
business relations with Chinese companies are fraught with risk. A systematic effort
to gather and make available more detailed information on the organization and
structure of Chinas military-industrial complex would benefit both U.S. industry and
the government. This effort should pay special attention to businesses that are linked
to the militarys network of research institutions. Only with this information can U.S.
businesses engage Chinese corporations, while minimizing the risk of revealing key
technologies and procedures. Moreover, such information would be invaluable for other
purposes, such as imposing sanctions and monitoring technology and weapons
transfers to pariah states. Many Chinese companies, including state-owned enterprises,
interact with unsavory regimes, such as those in Sudan and Burma, but they often
do so through a variety of fronts and subsidiaries. Sanction regimes can only hope
to affect commercial interactions by identifying these various relationships and,
ultimately, the decision makers. This suggests a need to expand the budget for the
defense and intelligence communities to undertake longer-term studies of both the
Chinese military-industrial complex and its extensive ties to Chinas enormous
commercial sector. In the face of a retrenching defense budget, it would be penny-wise, but pound-foolish, to
reduce such longer-term analyses that are essential for both commercial and security purposes.