Protecting Critical Technologies: Intelligence Support for Technology Security
Abstract: Today, the most significant reform of the
0314hrs, 10 June 2018, Straits of
If the scenario above sounds too far fetched, consider that the F-35’s source code is ‘the holy grail’ for “controlling everything from weapons integration to radar to flight dynamics.”[1] Then consider that hackers have stolen several terabytes of information related to the F-35’s design and electronics systems; in certain instances the stolen information was encrypted so officials are not certain what data was compromised.
[2] This vignette serves to highlight vulnerabilities to
Robust intelligence support that goes beyond the intelligence community’s (IC) current stove-piped structures and missions is required to assist in recognizing threats to
Background. The [3] At one end of the spectrum, these technologies help to ensure that a U.S. soldier, airman, seaman, or marine does not have to fight a ‘fair fight’, at the other end they provide capabilities that ensure national survival, such as protection against weapons of mass destruction. The compromise of critical
Of course the easiest way to protect advanced
Consequently any [5]
Coupling the aforementioned trends with an arms transfer system designed for the cold war makes cooperation with foreign partners difficult and does not necessarily protect critical technologies.[6] President Barack Obama recognized these challenges and initiated a comprehensive interagency review to reform the export system. As the
Export Control Reform and Intelligence Support. The comprehensive review of export controls determined the current system required substantial reform in all four areas of control: what is controlled, how it’s controlled, how the [7] Towards this end, the Administration envisions the establishment of a single control list, a single licensing authority, a single enforcement coordination agency, and a single information technology system.
[8]
Despite the significance of [9] However, there remains a readily apparent and, indeed, a pressing need for the IC to be integrated throughout the transfer process to provide critical functions in each of the core areas of export control.
Intelligence Support to | ||
Core Area | Intelligence Requirement/Opportunities | |
What We Control | Single Control List | · Assist in Determining Tier One Technology · Identify Critical Foreign/Advisory Requirements o WMD Technologies o Dual-Use / Commercial Off-the-Shelf · Identify Foreign Leading-Edge Technologies · Assess Foreign Availability of Tier One Technology |
How We Control It | Single Licensing Agency | · Integrated with Policy-Maker for Responsive Intel Support · Validate End-Use and End-User o Assess End-User Capability and Intent to Protect Sensitive o Assess Diversion Risks · Provide Country or Technology Specific Risk Assessments · Leverage Transfers to Strategic Intelligence Requirements |
How We Enforce Controls | · Identify Diversion of US Controlled Technologies · Identify Attempts to Defeat of US Anti-Tamper or Protection Schemes · Monitor Rouge-State Imports · Identify and Defeat Foreign Cyber Threats to Tier One Technologies · Identify Unauthorized Transfers · Implement Technology Counter-Intelligence Program | |
How We Manage our Controls | Single IT System | · Monitor Single IT System for Trends Analysis of Potential Threats, Diversions, or Unintended Consequences of US Transfers |
Intelligence Support to the Single Control List. Currently the State Department has executive responsibility for the transfer of military capabilities that are on the Munitions List, and the Commerce Department oversees transfers of dual-use capabilities (items or services that have both a civilian and military function). The reform effort proposes a single control list that is tiered to allow the [10]
The IC should assist the policy community in identifying higher tier technologies based on foreign capabilities and the risks they present to the U.S. Likewise, the IC should assist in identifying critical requirements for foreign governments’ programs, such as their WMD programs. While they may not be viewed as critical technologies for the [11]
Intelligence Support to the Single Licensing Authority. As with the control list, licensing authorities are divided between the Departments of State and Commerce. Reform efforts include the creation of a Single Licensing Authority. If properly integrated, the IC could be a responsive asset in the development and execution of export control policies and decisions.[12]
This means moving beyond the traditional intelligence support to license reviews or assessments concerning a partner’s ability to protect sensitive technology or data. While these functions are still extremely important, the establishment of a single licensing authority is an opportunity to better integrate intelligence into transfer decisions. Similarly, this integration could permit the IC to leverage certain transfers in a systematic process that may assist in meeting other strategic-level intelligence requirements or facilitate the development of intelligence sharing arrangements with new foreign intelligence partners. To achieve this higher level of coordination, a senior representative from the DNI should serve in a prominent position on the Single Licensing Agency staff.[13]
Intelligence Support to the [14]
The ease with which information, including design and electronics system schematics of our most prized fighter aircraft as noted above, can be accessed and transferred around the world in seconds requires an evaluation of risks emanating from the cyber domain as well.[15] The IC has unique capabilities that can assist in enforcement efforts in this area too. The IC’s full integration into the center with a broader focus than presently envisioned would improve enforcement capabilities.
Intelligence Support to the Single IT System. Currently, each stakeholder in the export control process manages its processes through separate IT systems. The administration plans on integrating these disparate systems into one single system. In addition to being the vehicle to managing transfer requests, this system could provide the IC with a powerful analytical tool to assist in identifying the acquisition trends of foreign governments, spot vulnerabilities for certain commodities, note unusual volume of certain technologies that may indicate diversion, or provide any number of assessments or information resulting from the consolidation of the various export control IT systems.
Conclusion. The overarching theme of increasing intelligence support to the export control system highlights the opportunities and benefits to be gained by the IC’s integration throughout the export process. The present reform efforts within the IC dovetail perfectly with reforms currently underway in the export control arena. As the DNI stands up National Intelligence Mission Managers along country or functional area considerations, a Technology Security Mission Manager should be created to coordinate intelligence support requirements associated with the protection of [16] The Technology Security Mission Manager should ensure the policy community’s technology security intelligence requirements are properly integrated into the National Intelligence Priorities Framework (NIPF) and are adjusted to reflect the ever-changing nature of technology.
[17] The systematic integration of intelligence support across all four core areas of export control would significantly enhance the government’s ability to protect its most critical technologies.
The
[1] Jim Wolf, Reuters, “US to Withhold F-35 Fighter Software Source Code,” 24 Nov 09, http://www.reuters.com/article/idUSTRE5AO01F20091125?pageNumber=1.

[2] U.S. officials suspect China was behind this theft. Siobhan Gorman, August Cole, and Yochi Dreazen, Wall Street Journal, “Computer Spies Breach Fighter-Jet Project,” http://online.wsj.com/article/SB124027491029837401.html.
[3] Examples include technologies that permit the targeting and killing of terrorists with unmanned drones from vast distances; technologies that produce the most advance missiles capable of intercepting ballistic missiles traveling at mach speed. These technologies are also going from the laboratories to the battlefield seemingly overnight.
[4] The revolution in information is not limited to computing power and communications. The revolution has led to the development of nanotechnologies, facilitating the end-item’s mobility and concealment. Likewise, ever increasing computing power provides even the lowliest individual with the capability of modeling anything from new biological elements to nuclear weapons. The revolution has brought capabilities to and empowered non-state actors and individuals in arenas that were formally the sole purview of the state.
[5] The digitalization of technologies poses additional control challenges as it permits plans, software, source code, counter-measures, or any number of data parameters to be transmitted around the world with the click of a mouse.
[6] Robert Gates, Remarks by Secretary Gates to the Business Executives for National Security on the U.S. Export Control System, 20 Apr 10, http://www.defense.gov/transcripts/transcript.aspx?transcriptid=4613.

[7] Barak Obama, Video Remarks by the President to the Department of Commerce Annual Export Controls Update Conference, 30 August 2010.
[8] Whitehouse Fact Sheet, 20 Apr 10, http://www.whitehouse.gov/the-press-office/fact-sheet-presidents-export-control-reform-initiative.
[9] Executive Order, dtd 9 Nov 10, “
[10] Towards this end, the IC produced a National Intelligence Estimate (NIE) on Export Controls in August 2010 focusing primarily on traditional threats and risks from other state actors. A broader assessment into other non-traditional risks may have been more helpful considering the scope of the export control reform.
[11]For example, in 1998
[12] Wile serving as the Deputy Director for Analysis at the CIA, Secretary Gates noted the requirement for ‘intelligence’ is that it must be useful or ‘
[13] In addition, the administration could consider dual-hatting the IC official as the Technology Security Mission Manager.
[14] Abroad, the IC would have an important role in identifying attempts to defeat U.S. anti-tamper or protection schemes, unauthorized third party transfers (especially to rouge states), or any other range of threats to controlled technologies. Additionally, the IC could assist the export community by implementing a comprehensive Counter-Intelligence (CI) programs across the entire custody chain of certain critical technologies (from laboratories, to manufacturer, to transfer agents -i.e. foreign consignees [including electronic transfers], and ultimately to the end-users).
[15] The security assistance community also needs to take a much broader perspective on cyber threats. It must include cyber and other IT considerations and vulnerabilities in the development of protection plans. Plans, schematic, sensitive algorithms, anything that can be digitalized, can be transferred over the internet (maybe even unwittingly by an individual in business development).
[16] See DNI Instruction at http://www.dni.gov/electronic_reading_room/ICD_900.pdf. The mission-focused concept of this IC reform efforts calls for management and structure based on national security missions rather than collection. The mission manager concept is ideally suited for the rapidly changing technology environment and the threats the
[17] Mark Lowenthal, Intelligence: From Secrets to Policy, 2009, 57-9.