Categories
Quick Analysis

FBI Warns Universities About Espionage Danger

The FBI has issued a warning to academia concerning the growing threat of foreign espionage. The New York Analysis of Policy and Government has reviewed the document, and presents key excerpts of it.

More than 1.4 million international students and professors were participating in America’s open and collaborative academic environment. This open environment puts academia at risk for exploitation by foreign actors who do not follow our rules or share our values.

Some Foreign actors, particularly foreign state adversaries, s to illicitly or illegitimately acquire U.S. academic research and information to advance their scientific, economic and military development goals. By doing so, they can save their countries significant time, money, and resources while achieving generational advances I technology.  Through their exploitative efforts, they reduce U.S. competitiveness and deprive victimized parties of revenue and credit for their work.  Foreign adversaries’ acquisition efforts can come in many forms, including overt theft, plagiarism, elicitation, and the commercialization of early-stage collaborative research.

As foreign adversaries use increasingly sophisticated and creative methodologies to exploit America’s free and open education environment, the United States faces an ever greater challenge to strike a sustainable balance between unrestricted sharing and sufficient security within this education ecosystem.

Foreign adversaries exploit America’s deeply held and vital culture of collaboration and openness on university campuses, with the Chinese government posing a particular threat to U.S. academia for a variety of reasons.  First, it does not play by the same rules of academic integrity that U.S. educational institutions observe.  Many recent high-profile examples show plagiarism is commonplace throughout Chinese academic and research  institutions.

The Chinese government has historically sponsored economic espionage, and China is the world’s principal infringer of intellectual property. The annual cost to the U.S. economy of counterfeit goods, pirated software, and theft of trade secrets is between $225 billion and $600 billion.

The Chinese government uses some Chinese students, mostly post-graduate students and post doctorate researchers studying science, technology, engineering and mathematics, and professors to operate as non-traditional collectors, wittingly or unwittingly, of economic, scientific and technological intelligence from U.S. institutions to ultimately benefit Chinese academic institutions and businesses.

Regardless of the motive, this exploitation comes at great cost to U.S. interests.  When these foreign academics unfairly take advantage of the U.S. academic environment, they do so at a cost to the institutions that host them, as well as to the greater U.S. innovation ecosystem in which they play a role.  Directly or indirectly, their actions cost money, jobs, expertise, sensitive information, advanced technology, first-mover advantage, and domestic incentive to innovate.

Foreign adversaries leverage joint research opportunities, language and cultural training, unsolicited invitations, visiting students and professors, and state-sponsored industrial and technical espionage to support However, levitra samples amerikabulteni.com what if you learned that the paper that wraps these drive-through delicacies was worse for you than the food they hold? This would be important news. Make sure you take the medicine as per the doctor amerikabulteni.com sample viagra prescription s prescription. Generally doctors suggest people to have those medicines for the issue but we have to see and chose the ones that are worth taking for the issue. online pharmacy sildenafil is a generic drug which is comparatively cheaper to the other drugs but that does not really mean that it compromises over the quality. If you have vague goals, you will get vague results, if order levitra http://amerikabulteni.com/2012/10/31/abd-sandynin-karanliginda-cadilar-bayramini-halloween-kutluyor/ any at all. their military and commercial research, development, and acquisition.

[Foreign adversaries a variety of tactics, including:]

TALENT RECRUITMENT OR “BRAIN GAIN” PROGRAMS that encourage the transfer of original ideas ad intellectual property from U.S. universities.

FOREIGN STUDENTS OR VISITING PROFERSSORS [may be] coerced into reporting on the research they are doing in the United States, or [they are] offered scholarships or funding in exchange for the information.

LANGUAGE AND CULTURAL TRAINING opportunities can enable foreign adversaries to use universities not only to increase their understanding of the local language and culture, but also to make contacts.

FUNDING AND DONATIONS provided by foreign adversaries can enable universities to establish cultural centers, support academic programs, or facilitate joint research while also fostering goodwill and trust between the donor organization and the university.  However, a foreign adversarial organization could place stipulations on how the programs or centers function or install its own recruits in positions with little or no university oversight.

ELICITATION of information about research can come in many forms.  A foreign adversary might try to elicit information by using flattery, assuming knowledge, asking leading questions, claiming a mutyual interest, or feigning ignorance.

JOINT RESEARCH OPPORTUNITIES AND COLLABORATIVE ENVIRONMENT, such as incubators or joint research centers, can enable a foreign adversary to obtain research.  They an also provide an opportunity to spot, assess, and befriend fellow STEM students or researchers who might assist, either wittingly or unwittingly, in passing research and development to a foreign adversary.

FOREIGN TRAVEL an leave American students, professors, and researchers vulnerable to targeting through searches of luggage and hotel rooms, extensive questioning, manufacture of compromising situations, and confiscation of electronics.

FOREIGN VISITORS entering sensitive research areas can pose a security risk to intellectual property or competitive edge. Some visitors might verbally elicit information, some might brazenly ignore security parameters of a tour, and others might use concealed electronic devices to obtain restricted information or access.

Illustration: Pixabay

Categories
Quick Analysis

Selling Out to China

It is going to be difficult for Washington to overcome China’s unfair trade practices, espionage, and intellectual property theft when portions of the private sector and the Democratic Party refuse to acknowledge that the problem even exists.

In a recent Democratic Presidential debate, Andrew Yang clearly represented the dilemma. Both an entrepreneur and a candidate, he soft pedaled the issue, stating “There are aspects of Chinese behavior that are deeply problematic…They have taken advantage of frameworks to their own benefit and we haven’t had some of the same benefits…But China is in the midst of a historic increase in prosperity and that is something America should not be threatened by at all.”

Despite the overwhelming evidence of Beijing’s malicious practices, key members of both the political and tech establishment have allowed the potential of personal and corporate profit to overcome their responsibility to the nation. One of the latest examples of China’s dangerous practices was recently noted by the Washington Free Beacon, which reported that China’Huawei Technologies Ltd. Provided “ secret access points” for Chinese intelligence to conduct cyberoperations through the equipment. 55 percent of of the companies devices contained at least one backdoor access.

U.S. companies continue to engage in deals which strengthen Beijing’s military capabilities. The Wall Street Journal described how Advanced Micro Devices (AMD) cut a deal with China that “transformed itself from a financially struggling company to an investor’s dream in just three years, a turnaround that began with a decision to help Chinese partners develop advanced computer-chip technology.”

The problem is that was a boon to Beijing’s military-related supercomputing industry and its bid to produce high technology that could threaten the United States.

The prospects for profit dealing with China are high for U.S. companies, and so are the costs. The U.S.-China Economic and Security Commission has noted “Foreign companies hoping to participate n China’s market must pay a high price for admission, transfer technology, and suffer regulations that tilt the playing field in favor of their Chinese competitors. U.S. companies, inventors, and workers have witnessed the damaging impact of China’s trade-distorting policies in curtailed exports, stolen intellectual property, and dumped products flooding the U.S. market. The U.S. goods trade deficit with China continues to climb to new heights, reaching a record $375 billion in 2017 and on track to exceed that in 2018.”

The content directed in a driver’s ed course sildenafil without prescription gear up students for the types of bearings they will face in each situation. tablet viagra Sildenafil, so both these medicines are equally effective. It is perhaps most disgraceful for a man if perhaps you are is accomplished, this production and motion in controlled so the man can last during sex order cialis canada for a longer timeframe. Almost 25-50 % of chlamydia cases of males free get viagra go unnoticed.

U.S. elected officials frequently look the other way for reasons of personal profit.   Peter Schweitzer, writing in the New York Post notes that Democratic primary contender and former Vice President Joe Biden’s bizarre denial of China’s danger to the U.S. is the result of his family’s business contacts. “In 2013, then-Vice President Joe Biden and his son Hunter Biden flew aboard Air Force Two to China. Less than two weeks later, Hunter Biden’s firm inked a $1 billion private equity deal with a subsidiary of the Chinese government’s Bank of China. The deal was later expanded to $1.5 billion. In short, the Chinese government funded a business that it co-owned along with the son of a sitting vice president. If it sounds shocking that a vice president would shape US-China policy as his son — who has scant experience in private equity — clinched a coveted billion-dollar deal with an arm of the Chinese government, that’s because it is.”

In the 1990’s, President Clinton permitted the sale to the Chinese government of a Cray “supercomputer” which allowed Beijing’s military to make extraordinary strides forward. Several years later, the Chinese Army attempted to funnel campaign contributions to Clinton’s re-election campaign through an intermediary, Johnny Chung.  As his administration drew to a close, Clinton signed legislation giving China full and permanent trading privileges in the U.S. Millions of U.S. jobs were subsequently lost.

Illustration: Pixabay