Technology Transfer to the Enemy

BY Herschel Smith
9 years, 9 months ago

The U.S. is engaging in three categories of technology transfer to the enemy: (1) It is bad but almost impossible to stop, (2) It is extremely bad and we should do a much better job of stopping it, and (3) It is extremely bad and we are intentionally doing it.

It is bad but almost impossible to stop

At Chronicles of War, John Little is covering the issue of the Technical Mujahid.  CENTCOM has published an update to “What Extremists are Saying” that outlines the basics of a new computer hardware, software and file management protocol for jihadists.

The first issue of what is indicated to be a period magazine, “Technical Mujahid? [Al-Mujahid al-Teqany], published by al-Fajr Information Center, was electronically distributed to password-protected jihadist forums Tuesday, November 28, 2006.

This edition, 64-pages in length, contains articles that primarily deal with computer and Internet security, in addition to other pieces explaining Global Positioning System (GPS) satellites and video types, editing, and encoding into different formats. The editors of the publication state that it was written to heed the directives of the Emir of al-Qaeda in Iraq, Abu Hamza al-Muhajir, and his call for technical support. Material such as this, regarding anonymity on the Internet, concealing of personal files locally on a computer, and utilizing all schemes of encryption, is to serve as electronic jihad, and a virtual means of supporting the Mujahideen.

Jihad, as a philosophy, religion and world view, is utterly incapable of sustaining technological development.  If it were possible to stop all technological development in the U.S., it is likely that jihadist technology would stay static, or freeze in place.  But because software and information technology is so readily available (consider the staggering amount of source code available over the web for free), jihadists will make ready use of this technology.  The strategy here might be to stay several steps ahead of the enemy by waging a better technology war than they do.

It is extremely bad and we should do a much better job of stopping it

The Strategy Page has this concerning technology espionage of our air defense program:

American federal prosecutors revealed that they are trying an Indian born American citizen, Noshir S. Gowadia, on charges of spying for China. Gowadia is alleged to have sold China details of the B-2 bombers engine exhaust system. This technology makes it more difficult for heat sensors (like heat seeking missiles) to detect the exhaust of the B-2 engines. Gowadia is also alleged to have helped Chinese engineers apply this technology to the design of a stealthy cruise missile. The secrets Gowadia sold would also make it easier for the Chinese to detect a B-2 bomber. Gowadia is supposed to have helped China with other matters relating to stealth technology.

Gowadia has apparently been running a Hawaii based spy ring since 1999, and made six clandestine trips to China. Gowadia worked on the B-2 project from 1968 to 1986, as one of the designers. Gowadia was arrested a year ago, and his trial will begin next Summer. He could get life in prison if convicted.

China is interested in upgrading the quality of its weapons systems, and will take every opportunity to steal military and technological secrets.  Similar to the Wen Ho Lee incident (concerning the miniturization of nuclear weapons), when the secrets are of so much importance and the loss of them so damaging, the level of security must be commensurate with this risk.  This sort of thing just cannot happen if the U.S. is to stay secure from its enemies.

It is extremely bad and we are intentionally doing it

In Our Dirty Little Secret: Technology Proliferation, I have covered the issue of higher education, and how U.S. universities are training the next generation of  PhDs in sensitive areas such as nuclear engineering, bacteriology, biochemistry, biotechnology research, microbiology and neuroscience, and atomic, chemical, molecular and nuclear physics.  Approximately 10% of the degrees awarded in these areas were awarded to students from 26 countries that are on the State Department “watch? list as being state sponsors of terrorism, including Iran, Turkey, Pakistan, Malaysia, Egypt and Jordan.

American universities are doing this with full knowledge that they are training students who do not have U.S. citizenship, will not stay in the U.S., and could potentially use the knowledge against the U.S.  And it continues unabated … while the citizens of America trust the government to keep them safe.


You are currently reading "Technology Transfer to the Enemy", entry #406 on The Captain's Journal.

This article is filed under the category(s) Technology and was published November 29th, 2006 by Herschel Smith.

If you're interested in what else the The Captain's Journal has to say, you might try thumbing through the archives and visiting the main index, or; perhaps you would like to learn more about TCJ.

26th MEU (10)
Abu Muqawama (12)
ACOG (2)
ACOGs (1)
Afghan National Army (36)
Afghan National Police (17)
Afghanistan (677)
Afghanistan SOFA (4)
Agriculture in COIN (3)
AGW (1)
Air Force (31)
Air Power (9)
al Qaeda (83)
Ali al-Sistani (1)
America (7)
Ammunition (22)
Animals in War (4)
Ansar al Sunna (15)
Anthropology (3)
Antonin Scalia (1)
AR-15s (67)
Arghandab River Valley (1)
Arlington Cemetery (2)
Army (43)
Assassinations (2)
Assault Weapon Ban (26)
Australian Army (5)
Azerbaijan (4)
Backpacking (2)
Badr Organization (8)
Baitullah Mehsud (21)
Basra (17)
BATFE (50)
Battle of Bari Alai (2)
Battle of Wanat (17)
Battle Space Weight (3)
Bin Laden (7)
Blogroll (2)
Blogs (5)
Body Armor (17)
Books (2)
Border War (7)
Brady Campaign (1)
Britain (27)
British Army (35)
Camping (4)
Canada (2)
Castle Doctrine (1)
Caucasus (6)
CENTCOM (7)
Center For a New American Security (8)
Charity (3)
China (10)
Christmas (8)
CIA (12)
Civilian National Security Force (3)
Col. Gian Gentile (9)
Combat Outposts (3)
Combat Video (2)
Concerned Citizens (6)
Constabulary Actions (3)
Coolness Factor (2)
COP Keating (4)
Corruption in COIN (4)
Council on Foreign Relations (1)
Counterinsurgency (215)
DADT (2)
David Rohde (1)
Defense Contractors (2)
Department of Defense (122)
Department of Homeland Security (13)
Disaster Preparedness (2)
Distributed Operations (5)
Dogs (6)
Drone Campaign (3)
EFV (3)
Egypt (12)
El Salvador (1)
Embassy Security (1)
Enemy Spotters (1)
Expeditionary Warfare (17)
F-22 (2)
F-35 (1)
Fallujah (17)
Far East (3)
Fathers and Sons (1)
Favorite (1)
Fazlullah (3)
FBI (3)
Featured (176)
Federal Firearms Laws (17)
Financing the Taliban (2)
Firearms (457)
Football (1)
Force Projection (35)
Force Protection (4)
Force Transformation (1)
Foreign Policy (27)
Fukushima Reactor Accident (6)
Ganjgal (1)
Garmsir (1)
general (14)
General Amos (1)
General James Mattis (1)
General McChrystal (40)
General McKiernan (6)
General Rodriguez (3)
General Suleimani (7)
Georgia (19)
GITMO (2)
Google (1)
Gulbuddin Hekmatyar (1)
Gun Control (403)
Guns (944)
Guns In National Parks (3)
Haditha Roundup (10)
Haiti (2)
HAMAS (7)
Haqqani Network (9)
Hate Mail (7)
Hekmatyar (1)
Heroism (4)
Hezbollah (12)
High Capacity Magazines (11)
High Value Targets (9)
Homecoming (1)
Homeland Security (1)
Horses (1)
Humor (13)
ICOS (1)
IEDs (7)
Immigration (45)
India (10)
Infantry (3)
Information Warfare (2)
Infrastructure (2)
Intelligence (22)
Intelligence Bulletin (6)
Iran (169)
Iraq (378)
Iraq SOFA (23)
Islamic Facism (38)
Islamists (60)
Israel (18)
Jaish al Mahdi (21)
Jalalabad (1)
Japan (2)
Jihadists (80)
John Nagl (5)
Joint Intelligence Centers (1)
JRTN (1)
Kabul (1)
Kajaki Dam (1)
Kamdesh (9)
Kandahar (12)
Karachi (7)
Kashmir (2)
Khost Province (1)
Khyber (11)
Knife Blogging (2)
Korea (4)
Korengal Valley (3)
Kunar Province (20)
Kurdistan (3)
Language in COIN (5)
Language in Statecraft (1)
Language Interpreters (2)
Lashkar-e-Taiba (2)
Law Enforcement (2)
Lawfare (6)
Leadership (5)
Lebanon (6)
Leon Panetta (2)
Let Them Fight (2)
Libya (14)
Lines of Effort (3)
Littoral Combat (8)
Logistics (49)
Long Guns (1)
Lt. Col. Allen West (2)
Marine Corps (240)
Marines in Bakwa (1)
Marines in Helmand (67)
Marjah (4)
MEDEVAC (2)
Media (23)
Memorial Day (2)
Mexican Cartels (23)
Mexico (30)
Michael Yon (5)
Micromanaging the Military (7)
Middle East (1)
Military Blogging (26)
Military Contractors (3)
Military Equipment (24)
Militia (3)
Mitt Romney (3)
Monetary Policy (1)
Moqtada al Sadr (2)
Mosul (4)
Mountains (14)
MRAPs (1)
Mullah Baradar (1)
Mullah Fazlullah (1)
Mullah Omar (3)
Musa Qala (4)
Music (16)
Muslim Brotherhood (6)
Nation Building (2)
National Internet IDs (1)
National Rifle Association (17)
NATO (15)
Navy (21)
Navy Corpsman (1)
NCOs (3)
News (1)
NGOs (2)
Nicholas Schmidle (2)
Now Zad (19)
NSA (1)
NSA James L. Jones (6)
Nuclear (53)
Nuristan (8)
Obama Administration (216)
Offshore Balancing (1)
Operation Alljah (7)
Operation Khanjar (14)
Ossetia (7)
Pakistan (165)
Paktya Province (1)
Palestine (5)
Patriotism (6)
Patrolling (1)
Pech River Valley (11)
Personal (31)
Petraeus (14)
Pictures (1)
Piracy (13)
Pistol (2)
Police (205)
Police in COIN (3)
Policy (15)
Politics (240)
Poppy (2)
PPEs (1)
Prisons in Counterinsurgency (12)
Project Gunrunner (20)
PRTs (1)
Qatar (1)
Quadrennial Defense Review (2)
Quds Force (13)
Quetta Shura (1)
RAND (3)
Recommended Reading (14)
Refueling Tanker (1)
Religion (106)
Religion and Insurgency (19)
Reuters (1)
Rick Perry (4)
Rifles (1)
Roads (4)
Rolling Stone (1)
Ron Paul (1)
ROTC (1)
Rules of Engagement (74)
Rumsfeld (1)
Russia (28)
Sabbatical (1)
Sangin (1)
Saqlawiyah (1)
Satellite Patrols (2)
Saudi Arabia (4)
Scenes from Iraq (1)
Second Amendment (159)
Second Amendment Quick Hits (2)
Secretary Gates (9)
Sharia Law (3)
Shura Ittehad-ul-Mujahiden (1)
SIIC (2)
Sirajuddin Haqqani (1)
Small Wars (72)
Snipers (9)
Sniveling Lackeys (2)
Soft Power (4)
Somalia (8)
Sons of Afghanistan (1)
Sons of Iraq (2)
Special Forces (24)
Squad Rushes (1)
State Department (17)
Statistics (1)
Sunni Insurgency (10)
Support to Infantry Ratio (1)
Supreme Court (2)
Survival (12)
SWAT Raids (53)
Syria (38)
Tactical Drills (1)
Tactical Gear (1)
Taliban (167)
Taliban Massing of Forces (4)
Tarmiyah (1)
TBI (1)
Technology (16)
Tehrik-i-Taliban (78)
Terrain in Combat (1)
Terrorism (92)
Thanksgiving (5)
The Anbar Narrative (23)
The Art of War (5)
The Fallen (1)
The Long War (20)
The Surge (3)
The Wounded (13)
Thomas Barnett (1)
Transnational Insurgencies (5)
Tribes (5)
TSA (13)
TSA Ineptitude (11)
TTPs (1)
U.S. Border Patrol (5)
U.S. Border Security (13)
U.S. Sovereignty (14)
UAVs (2)
UBL (4)
Ukraine (3)
Uncategorized (42)
Universal Background Check (3)
Unrestricted Warfare (4)
USS Iwo Jima (2)
USS San Antonio (1)
Uzbekistan (1)
V-22 Osprey (4)
Veterans (2)
Vietnam (1)
War & Warfare (210)
War & Warfare (40)
War Movies (3)
War Reporting (18)
Wardak Province (1)
Warriors (6)
Waziristan (1)
Weapons and Tactics (57)
West Point (1)
Winter Operations (1)
Women in Combat (17)
WTF? (1)
Yemen (1)

August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006

about · archives · contact · register

Copyright © 2006-2016 Captain's Journal. All rights reserved.