PDF Version



 
   SOURCES AND METHODS OF FOREIGN NATIONALS ENGAGED IN ECONOMIC AND 
                           MILITARY ESPIONAGE

=======================================================================

                                HEARING

                               BEFORE THE

                      SUBCOMMITTEE ON IMMIGRATION,
                      BORDER SECURITY, AND CLAIMS

                                 OF THE

                       COMMITTEE ON THE JUDICIARY
                        HOUSE OF REPRESENTATIVES

                       ONE HUNDRED NINTH CONGRESS

                             FIRST SESSION

                               __________

                           SEPTEMBER 15, 2005

                               __________

                           Serial No. 109-58

                               __________

         Printed for the use of the Committee on the Judiciary


      Available via the World Wide Web: http://judiciary.house.gov


                                 ______

                    U.S. GOVERNMENT PRINTING OFFICE
23-433                      WASHINGTON : 2005
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; (202) 512ÿ091800  
Fax: (202) 512ÿ092250 Mail: Stop SSOP, Washington, DC 20402ÿ090001

                       COMMITTEE ON THE JUDICIARY

            F. JAMES SENSENBRENNER, Jr., Wisconsin, Chairman
HENRY J. HYDE, Illinois              JOHN CONYERS, Jr., Michigan
HOWARD COBLE, North Carolina         HOWARD L. BERMAN, California
LAMAR SMITH, Texas                   RICK BOUCHER, Virginia
ELTON GALLEGLY, California           JERROLD NADLER, New York
BOB GOODLATTE, Virginia              ROBERT C. SCOTT, Virginia
STEVE CHABOT, Ohio                   MELVIN L. WATT, North Carolina
DANIEL E. LUNGREN, California        ZOE LOFGREN, California
WILLIAM L. JENKINS, Tennessee        SHEILA JACKSON LEE, Texas
CHRIS CANNON, Utah                   MAXINE WATERS, California
SPENCER BACHUS, Alabama              MARTIN T. MEEHAN, Massachusetts
BOB INGLIS, South Carolina           WILLIAM D. DELAHUNT, Massachusetts
JOHN N. HOSTETTLER, Indiana          ROBERT WEXLER, Florida
MARK GREEN, Wisconsin                ANTHONY D. WEINER, New York
RIC KELLER, Florida                  ADAM B. SCHIFF, California
DARRELL ISSA, California             LINDA T. SANCHEZ, California
JEFF FLAKE, Arizona                  CHRIS VAN HOLLEN, Maryland
MIKE PENCE, Indiana                  DEBBIE WASSERMAN SCHULTZ, Florida
J. RANDY FORBES, Virginia
STEVE KING, Iowa
TOM FEENEY, Florida
TRENT FRANKS, Arizona
LOUIE GOHMERT, Texas

             Philip G. Kiko, General Counsel-Chief of Staff
               Perry H. Apelbaum, Minority Chief Counsel
                                 ------                                

        Subcommittee on Immigration, Border Security, and Claims

                 JOHN N. HOSTETTLER, Indiana, Chairman

STEVE KING, Iowa                     SHEILA JACKSON LEE, Texas
LOUIE GOHMERT, Texas                 HOWARD L. BERMAN, California
LAMAR SMITH, Texas                   ZOE LOFGREN, California
ELTON GALLEGLY, California           LINDA T. SANCHEZ, California
BOB GOODLATTE, Virginia              MAXINE WATERS, California
DANIEL E. LUNGREN, California        MARTIN T. MEEHAN, Massachusetts
JEFF FLAKE, Arizona
BOB INGLIS, South Carolina
DARRELL ISSA, California

                     George Fishman, Chief Counsel

                          Art Arthur, Counsel

                         Allison Beach, Counsel

                 Luke Bellocchi, Full Committee Counsel

                  Cindy Blackston, Professional Staff

                   Nolan Rappaport, Minority Counsel


                            C O N T E N T S

                              ----------                              

                           SEPTEMBER 15, 2005

                           OPENING STATEMENT

                                                                   Page
The Honorable John N. Hostettler, a Representative in Congress 
  from the State of Indiana, and Chairman, Subcommittee on 
  Immigration, Border Security, and Claims.......................     1
The Honorable Sheila Jackson Lee, a Representative in Congress 
  from the State of Texas, and Ranking Member, Subcommittee on 
  Immigration, Border Security, and Claims.......................     2
The Honorable Zoe Lofgren, a Representative in Congress from the 
  State of California, and Member, Subcommittee on Immigration, 
  Border Security, and Claims....................................     5

                               WITNESSES

The Honorable Michelle Van Cleave, National Counterintelligence 
  Executive, Office of the Director of National Intelligence
  Oral Testimony.................................................     7
  Prepared Statement.............................................    10
Dr. Larry Wortzel, Visiting Fellow, The Heritage Foundation
  Oral Testimony.................................................    19
  Prepared Statement.............................................    21
Mr. Maynard Anderson, President, Arcadia Group Worldwide, Inc., 
  and former Deputy Under Secretary of Defense for Security 
  Policy
  Oral Testimony.................................................    23
  Prepared Statement.............................................    25
Dr. William A. Wulf, President, National Academy of Engineering, 
  The National Academies
  Oral Testimony.................................................    30
  Prepared Statement.............................................    34

                                APPENDIX
               Material Submitted for the Hearing Record

Map on the ``Number of Patent Applications and Foreign Students 
  Per County,'' submitted by the Honorable John Hostettler, a 
  Representative in Congress from the State of Indiana, and 
  Chairman, Subcommittee on Immigration, Border Security, and 
  Claims.........................................................    57
Prepared Statement of the Honorable Sheila Jackson Lee, a 
  Representative in Congress from the State of Texas, and Ranking 
  Member, Subcommittee on Immigration, Border Security, and 
  Claims.........................................................    58
New York Times Article submitted by the Honorable Zoe Lofgren, a 
  Representative in Congress from the State of California, and 
  Member, Subcommittee on Immigration, Border Security, and 
  Claims.........................................................    59
The National Counterintelligence Strategy of the United States, 
  submitted by the Honorable Michelle Van Cleave, National 
  Counterintelligence Executive, Office of the Director of 
  National Intelligence..........................................    61
Revised Prepared Statement of Dr. Larry M. Wortzel, Visiting 
  Fellow, The Heritage Foundation................................    75


   SOURCES AND METHODS OF FOREIGN NATIONALS ENGAGED IN ECONOMIC AND 
                           MILITARY ESPIONAGE

                              ----------                              


                      THURSDAY, SEPTEMBER 15, 2005

                  House of Representatives,
                       Subcommittee on Immigration,
                       Border Security, and Claims,
                                Committee on the Judiciary,
                                                    Washington, DC.
    The Subcommittee met, pursuant to notice, at 2:26 p.m., in 
Room 2141, Rayburn House Office Building, the Honorable John 
Hostettler (Chairman of the Subcommittee) presiding.
    Mr. Hostettler. The Subcommittee will come to order.
    We pride ourselves on being an open society in America. We 
allow millions of foreign nationals to come to our shores each 
year as tourists, business visitors, and students. 
Unfortunately, some of these business visitors have come here 
to take advantage of our openness and engage in economic and 
military espionage.
    Earlier this morning in a closed session, the Subcommittee 
heard a disturbing report given by the Nation's top 
counterintelligence official regarding economic and military 
espionage by foreign nationals in the United States. We will 
shortly hear a sanitized version of this testimony.
    In the past few months alone: American University 
researcher and Chinese national Zhan Gao pled guilty to 
illegally exporting technology that can be used in missile 
guidance and airborne battle management systems for a $590,000 
payment from China. Chinese nationals, Jian Guo-qu and Ruo Ling 
Wang, were arrested in Milwaukee for conspiring to illegally 
export more than $500,000 in restricted electronic military 
radar components to China. Iranian Abbas Tavakolian was 
sentenced to 57 months incarceration for attempting to export 
F-4 and F-14 jet parts to Iran. Kwonhwan Park, a Korean 
national, pled guilty in November to illegally exporting Black 
Hawk helicopter engines to China through a Malaysian front 
company.
    Month after month, publications such as TIME magazine and 
the Washington Times have run stories concerning the theft of 
critical American technologies by foreign nationals embedded at 
research facilities.
    Nationals of many nations come to the United States to 
engage in espionage. Our closest allies are not excluded from 
this list. However, all evidence indicates that certain nations 
are the most egregious violators.
    There is no nation that engages in surreptitious illegal 
technology acquisition for purposes of both commercial piracy 
and military advancement on a scale that approaches that of the 
People's Republic of China.
    The Wall Street Journal reported last month that thousands 
of Chinese military front companies are operating in the United 
States--some as contractors for the United States military--and 
that hundreds of thousands of Chinese tourists, business 
executives and students entered the United States last year.
    Many of these visitors, even when they are visiting for 
legitimate purposes, are tasked with obtaining whatever 
technological information they can.
    There are currently at least 115 students here from China, 
studying nuclear engineering, and thousands more studying 
computer, electrical, civil and chemical engineering. As an 
engineer myself, I must ask how can we be sure that they are 
not bringing back American technological secrets to their home 
country?
    And what about Iran, a country we suspect of endeavoring to 
make nuclear weapons? There are now at least four Iranian 
nationals actively studying nuclear engineering in the U.S., 
according to the Department of Homeland Security, as well as 
350 electrical engineers, 12 biochemists and a host of other 
Iranian students studying in technical fields here.
    What is true of all these individuals is that they came to 
the United States after being approved for visas. They undergo 
Visa Mantis security checks which are designed to weed out 
those visa applicants likely to use these visits to the U.S. to 
acquire sensitive technology.
    However, the State Department's focus over the last several 
years seems to have been devoted to reducing the inconvenience 
of the Visa Mantis security checks for visa applicants as much 
as possible and to be as generous as possible in the issuance 
of multiple-entry visas.
    Now, we all want to facilitate the swift issuance of visas 
to legitimate applicants. But, I am concerned that we might not 
be paying adequate attention to the inherent security risks, 
that we may be being generous to a fault. At jeopardy are our 
military superiority and our economic competitiveness.
    Today we will ask a number of questions including: what can 
be done to enhance the existing security systems in place to 
track foreign nationals at our research facilities? Do 
background checks for visa applicants need to be improved? And 
should aliens suspected of being involved with piracy or 
illegal technology transfer be automatically ineligible for a 
visa to the United States?
    At this time I turn to my colleague, the Ranking Member 
from Texas, Ms. Jackson Lee, for purposes of making an opening 
statement.
    Ms. Jackson Lee. Thank you very much, Mr. Chairman, I want 
first of all to associate myself with the intent of this 
hearing and what I believe the Chairman's intent is and, of 
course, associating myself and joining him with that intent, 
the purpose of this hearing. That would be the legislative road 
map, the guidepost, if you will, to help us effectively become 
the America that we all know and have come to love; a country 
that respects both the investment--both investment and, of 
course, the contributions that immigrants have made over the 
long history of this Nation.
    I have always begun these hearings over the last year that 
I have had the honor of serving my colleagues and the American 
people, saying that we are a nation of immigrants and a nation 
of laws, and of course, that immigrants do not equate to 
terrorists.
    So as we look to the witnesses who are before us, let me 
ask you to keep in mind that it would be, I believe, an 
impractical nonreality to suggest that we would close the door 
to all students, all researchers, and all nationals, 
international persons attempting to do business in the United 
States.
    The subject of this hearing is foreign nationals engaged in 
economic and military espionage. According to the National 
Counterintelligence Executive report to the Congress this year, 
individuals from almost 100 countries attempted to acquire 
sensitive United States technologies in fiscal year 2004.
    The report concludes that foreign access to sensitive 
information with both military and conventional applications 
has eroded the United States military advantage and the greater 
U.S. intelligence community's ability to provide information to 
policymakers and undercut U.S. industry. It goes to my point 
that we must separate sort of the weak from whatever else is 
engaged.
    It is interesting that when all of us travel aboard--abroad 
on behalf of our respective Committees, particularly in this 
instance, the Homeland Security Committee that I am also on, 
are also interacting with heads of government who are thanking 
you for the opportunity of many of their own nationals to 
engage in training activities and opportunities--and research 
opportunities with those in the United States.
    You will constantly hear from your constituents, mostly in 
the medical and science professions, technology professions, 
the importance of the exchange and the ability to interact with 
those from other countries. This report states, however, that 
we are vulnerable to espionage because the United States has 
provided foreign entities with easy access to sophisticated 
American technologies.
    Many people thought that we were on the wrong side of the 
issue when many of our voices rose to oppose the sale of
    Unocal to a Chinese energy company. I happen to be one of 
those, and I come from what is called the energy capital of the 
world, but frankly I do believe there should be a fire wall in 
terms of important technology--and had the opportunity to speak 
to the head of China's petroleum company at the time that the 
sale was being pulled, if you will, and indicated that we hope 
we have the opportunity to do other business efforts with that 
company, but there had to be a line in the sand on important 
technologies.
    New electronic devices have vastly simplified the illegal 
retrieval of storage information, of massive amounts of 
information, including trade secrets and proprietary data. 
Globalization has mixed foreign and American companies in ways 
that have made it difficult to protect the technologies that 
these firms develop or acquire, particularly when that 
technology is required for overseas operation.
    Mr. Chairman, I just a few days ago took my son back to 
college, interacted with a few college students for a couple of 
hours, not a whole day, but I was amazed with the level of 
sophistication and the eagerness to come back and use either 
the school's technology or their own to develop new expertise--
maybe something like what Bill Gates did a decade or more ago--
dealing with now the new Microsoft, this new technology called 
Facebook, which the college students themselves designed.
    We know technologies are being fostered all over America, 
and the simplicity of being able to access some of our most 
delicate information is something we should be concerned about.
    Lastly, sophisticated information systems that transmit--
store and transmit systems have become increasingly vulnerable 
to cyber attacks, an issue that my colleague Congresswoman 
Lofgren has been a leading force on. Apparently, the 
counterintelligence community is uncertain about exactly how 
much of its intelligence collection effort--some intelligence 
collection effort is directed by foreign governments and how 
much is carried out by private businessmen and women, academics 
or scientists, for purely commercial or scientific purposes.
    It is clear, however, that some foreign governments do 
employ state actors. This includes their intelligence services 
as well as commercial enterprises.
    Most of the foreign governments that are attempting to 
acquire American technology employ tools and techniques which 
are easy to use, inexpensive, low risk and sometimes legal. In 
most cases, foreign collectors simply ask for the information 
by e-mail, a phone call, a fax, a letter or in person. The 
report asserts further that increased demand for foreign labor 
in the United States, high-tech industries and the sharp rise 
in foreign investment in the United States over the past decade 
have given foreign governments increased access to American 
businesses and consequently to U.S. trade secrets.
    In addition, recognizing neutral benefits of an unhindered 
exchange of information, the United States has opened its 
military bases, national laboratories and private defense 
suppliers to foreign visitors.
    Mr. Chairman, I am going to ask that the entirety of this 
statement be submitted as I come to a close, and I ask 
unanimous consent that the rest of my statement be submitted 
into the record.
    Mr. Hostettler. Without objection.
    Ms. Jackson Lee. But let me conclude by saying, we know the 
problems, but we also know the value and the benefits that have 
been received by the American people that have been our long-
standing commitment and our values to the opportunity of 
bringing those who are persecuted to the shores, but also those 
who have talent, who are contributors and those who just have 
brawn, who have literally built America.
    Let us not close the door to the opportunity of foreign 
students who--again, as I met with in meetings in China and 
elsewhere, who have learned both our democratic principles but 
also to share in technology and the ability to build systems 
that will benefit not China, not Germany, not the new Iraq, not 
South and Central America or the continent of Africa, but 
humanity. Let us not in our effort to avoid the transmittal of 
important technologies and important concepts here in America, 
not draw technology--draw legislation so restrictive, Mr. 
Chairman, that we cannot find a way to ensure that America 
benefits from the talent of this world. And let us make sure 
that the legislation is reflective of the security needs, but 
also the needs of the American people to be a friend to the 
world. And I yield back.
    Mr. Hostettler. I thank the gentlelady.
    Do any other Members have opening statements?
    Ms. Lofgren. Mr. Chairman, I will not take the full 5 
minutes.
    Mr. Hostettler. I recognize the gentlelady from California.
    Ms. Lofgren. Clearly, every Member of Congress is 
interested, concerned and opposed to espionage in our country. 
So that is a given. The question is how to protect ourselves 
without doing damage to ourselves, and I think it is important 
to recall. I was in elementary school in 1957 when Sputnik went 
up, and we got a little wake-up call that the country was in 
trouble and we were in a huge competition with the Soviet 
Union, and we were behind. We pulled up our socks, and we 
ultimately won that competition.
    I think in a way we are in a similar spot today, the 
American Electronic Association used this phrase: It is the 
difference between then, which was throwing the frog in the 
boiling water; now the frog is in the water as it heats up, and 
a lot of Americans don't realize that we are in this 
competition that is very serious in terms of science and 
technology and engineering talent. We have slipped in the 
number of engineering Ph.D.'s awarded in this country. We are 
falling behind; India and China and the EU are emerging as ever 
more vibrant competitors.
    The AEA--again, they just did a terrific report--cite the 
U.S. graduating 60,000 engineers a year, India graduating 
82,000 engineers a year, and China graduating four times as 
many engineers a year as the United States.
    Now, the Ph.D. level--the National Academy of Sciences 
tells us that 65 percent of the Ph.D. candidates in engineering 
are foreign students, and many of them stay on and become 
Americans with us, and that benefits us greatly. In fact, I 
come from Silicon Valley, and about 40 percent of the start-ups 
in Silicon Valley are from people who were born someplace else 
and became Americans.
    And so we need to keep in mind that if we have to have 
strength in systems to make sure that we are protected, that we 
don't end up shooting ourselves in the foot economically, and I 
would say also militarily, because the new Americans, the best 
and brightest, also help immensely in terms of the technology 
that ultimately is used, not just in the commercial world, but 
also in the defense effort.
    I hope that as we talk further about this, we can think 
about what systems we might put in place, smart systems, so 
that rather than creating bulky systems that have the result of 
deterring people we might want to have come in, and maybe not 
deterring the bad guys, we come up with streamlined systems 
that really target what we need in a way that is efficient and 
does not do damage.
    So that is what I am very interested in, and I yield back 
the balance of my time.
    Mr. Hostettler. I thank the gentlelady.
    Without objection, all Members will have--will be allowed 
to have their opening statements be made a part of the record.
    Mr. Hostettler. At this time, I would like to introduce 
Members of our panel.
    Michelle Van Cleave is the National Counterintelligence 
Executive and, as such, she is the country's top 
counterintelligence official and is charged with integrating 
and providing strategic guidance for counterintelligence 
activities across Government. She reports directly to the 
Director of National Intelligence, John Negroponte, the 
President's principal intelligence advisor.
    In the 105th Congress, Ms. Van Cleave was Chief Counsel for 
the Senate Judiciary Subcommittee on Technology, Terrorism and 
Government Information.
    In 1989, she served on the House Science Committee staff 
and was later Assistant Director in the White House Office of 
Science and Technology Policy. She has also held senior 
positions at the Department of Defense and is a graduate of the 
University of Southern California Law School.
    Dr. Larry Wortzel has been at the Heritage Foundation since 
1989 and has served as Asia Studies Director. He is a former 
Marine, Army Airborne Ranger and Army Colonel, and has worked 
for the Under Secretary of Defense for Policy to develop 
counterintelligence programs. In 1970, he served in the U.S. 
Army intercepting Chinese military communications in Vietnam 
and Laos. Later, his career took him to areas throughout Asia 
under U.S. Pacific Command and as U.S. Army Attache at U.S. 
Embassy Beijing during the Tiananmen massacre, and in 1995.
    Dr. Wortzel is the author of numerous books on Chinese 
military strategy and received his Ph.D. at the University of 
Hawaii.
    Mr. Maynard Anderson is President of Arcadia Group 
Worldwide, Incorporated. He has served in Government as Deputy 
Under Secretary of Defense for Security Policy with the 
responsibility of setting disclosure policy. In 1988, he served 
as Assistant Deputy Under Secretary of Counterintelligence of 
the Department of Defense, setting security policy and 
providing day-to-day oversight.
    Mr. Anderson also chaired the National Foreign Disclosure 
Policy Committee. Privately, he served as Chairman of the 
National Intellectual Property Law Institute Board of 
Directors. Mr. Anderson is a graduate of Luther College in Iowa 
and the Federal Executive Institute.
    William Wulf is President of the National Academy of 
Engineering and Vice Chair of the National Research Council. He 
is on leave from the University of Virginia, where he is AT&T 
Professor of Engineering and Applied Sciences. Mr. Wulf has 
served as Assistant Director of the National Science Foundation 
and Chief Executive Director of Tartan Laboratories, Inc., in 
Pittsburgh. He was also a Professor of Science at Carnegie 
Mellon University. He has authored more than 100 technical 
reports, has written three books and holds two U.S. patents.
    At this time, will the witnesses please rise to take the 
oath.
    [Witnesses sworn.]
    Mr. Hostettler. Thank you. You may be seated. Please let 
the record show that each of the witnesses answered in the 
affirmative.
    Ms. Van Cleave, you are recognized for purposes of an 
opening statement.

   TESTIMONY OF THE HONORABLE MICHELLE VAN CLEAVE, NATIONAL 
   COUNTERINTELLIGENCE EXECUTIVE, OFFICE OF THE DIRECTOR OF 
                     NATIONAL INTELLIGENCE

    Ms. Van Cleave. Thank you, Mr. Chairman. I do have a 
prepared statement I would like to submit for the record.
    Mr. Hostettler. Without objection.
    Ms. Van Cleave. Please let me summarize a few points.
    I appreciate very much the opportunity to appear before you 
today to discuss foreign intelligence threats to U.S. national 
intelligence security and our economic well-being.
    Since some of the Members of the Subcommittee may not be 
familiar with my office, I would like to take a moment to 
describe my duties. In the post-Cold War world, the U.S. 
confronts intelligence challenges from a broad array of foreign 
nations. The singular global Soviet threat of decades gone by 
has been succeeded by a diverse set of adversaries, many of 
whom have become highly skilled in using their intelligence 
services, especially their human collectors, to acquire U.S. 
national security secrets. These include the technological and 
engineering secrets that give our Armed Forces the qualitative 
edge they may need to prevail in a dangerous world.
    While the threats against us are strategic, historically 
the U.S. counterintelligence community has not been organized 
or integrated to accomplish a national strategic mission. On 
the contrary, the various counterintelligence elements have 
long been part of a loose confederation of independent 
organizations with different jurisdictions and capabilities and 
no one in charge of the enterprise.
    CI operations and investigations have tended to focus on 
individual cases with little appreciation of synergy or their 
larger strategic implications. This structural flaw has 
undercut our ability to connect the dots of intelligence 
anomalies or effectively coordinate the different CI arms of 
our Government. To help remedy this situation, the Congress 
created the position of the National Counterintelligence 
Executive, or the NCIX. The law directs that the NCIX shall 
serve as the head of counterintelligence for the U.S. 
Government, subject to the direction and control of the 
Director of National Intelligence.
    I am the first NCIX appointed by the President. It is my 
job to provide strategic direction to our Nation's 
counterintelligence efforts and to assure the integration of 
the disparate CI activities of our Government. It also includes 
the counterintelligence dimension to broad national security 
concerns such as the protection of our Nation's critical 
technologies.
    The primary focus of counterintelligence is to defeat the 
efforts of foreign intelligence services to acquire U.S. 
national security secrets. It is also our job to supply CI 
insights and options to the President and his national security 
leadership. This includes supporting the overall national 
effort to stem the outflow of sensitive technologies, including 
export controls, diplomatic measures, controls on foreign 
investments in sensitive sectors of the U.S. economy and 
industrial security agreements.
    I want to emphasize that by far the vast majority of 
foreign acquisition of U.S. technology is open and lawful, as 
are the transactions of individuals and businesses involved in 
international commerce, as well as the free exchange of ideas 
in scientific and academic forums. But let me turn to the cases 
that fall outside the bounds of what is open and lawful.
    Last year, the counterintelligence community tracked 
efforts by foreign businessmen, scientists, academics, students 
and government entities from almost 100 countries to acquire 
sensitive U.S. technologies protected by export laws or other 
means. Of those, the top 10 countries accounted for about 60 
percent of the suspicious foreign collection efforts against 
cleared defense contractors. Two of the countries that always 
rank near the top of the list are, of course, Russia and China, 
who have particularized interests, especially in dual-use 
technologies with military applications.
    But the top 10 also include some of our close allies, as 
you noted, Mr. Chairman. These allies may exploit their easy 
access to push the envelope into areas where they have not been 
invited.
    In the majority of cases, foreign collectors simply ask. By 
e-mail or phone calls or faxes or letters or in person they ask 
for the information or technology that they are interested in. 
Or they may exploit visits to U.S. businesses or military 
bases, national laboratories and private defense suppliers to 
extract protected information.
    U.S. businessmen and scientists and academics traveling 
abroad provide another valuable source of information for 
foreign countries, as do foreign students, scientists and other 
experts who to come to the U.S. to work or attend conferences.
    One indirect method used to acquire technology is for 
foreign firms to offer their services or technology, 
particularly IT-related support, to firms who have access to 
sensitive items.
    On this point, I should note that the use of cyber tools, 
as a collection technique, is of growing concern. As you know, 
cyber exploitation is inherently difficult to detect, as cyber 
intruders from one country will typically cover their tracks by 
mounting their attacks through compromised computers in other 
countries.
    Finally, state-directed espionage: State-directed espionage 
remains the central threat to our most sensitive national 
security technology secrets.
    While the Chinese, for example, are very aggressive in 
business and good at solicitation and good at positioning 
themselves for strategic investments, and they are adept at 
exploiting front companies, they also have very capable 
intelligence services that target U.S. national security 
secrets. As the Cox Commission report made clear over a decade 
ago, the Chinese did not acquire the most sensitive secret U.S. 
nuclear weapons designs by spending late nights at the library.
    It is one thing to describe these threats to you; it is 
quite another to describe what we need to do about them. We 
will never have leak-proof technology controls, just as we will 
never have enough security to protect us against all the 
threats all the time. Nor would we want to exchange the vast 
blessings of our free society for a security state.
    In my view, good security is not the answer alone. We also 
must have good counterintelligence, meaning that we must be 
more proactive in identifying, assessing and degrading foreign 
intelligence operations against us. We need to prioritize our 
efforts against the most serious threats to U.S. national 
security and our vital defense and foreign policy objectives.
    Now, in March of this year, President Bush approved the 
first national counterintelligence strategy of the United 
States, which I would like to submit for the record, if I may, 
Mr. Chairman.
    Mr. Hostettler. Without objection.
    Ms. Van Cleave. It is the first mission statement of 
counterintelligence as an instrument of U.S. national security 
policy. This is a very different concept of counterintelligence 
than the common perception of catching spies and putting them 
in jail. Counterintelligence encompasses all activities to 
identify, assess and degrade foreign intelligence threats to 
U.S. national security and our foreign policy objectives. And 
central to the President's strategy is the call for U.S. 
counterintelligence to be proactive.
    Now, this Committee has jurisdiction over America's single 
greatest resource for encountering intelligence threats, the 
Federal Bureau of Investigation. In the months to come, the FBI 
will be standing up a new national security branch that will 
span its responsibilities for counterterrorism, intelligence, 
and counterintelligence.
    Building on Director Mueller's efforts to date, the full 
integration of these disciplines should enable the FBI to 
recruit, train and develop a new generation of agents and 
support personnel dedicated to its core national security 
mission. And more complete integration of the FBI with sister 
counterintelligence agencies will augment our nation's ability 
to protect against the most serious foreign intelligence 
threats.
    In closing, Mr. Chairman, I would like to thank you very 
much for this timely hearing, and I welcome your questions.
    Mr. Hostettler. Thank you, Ms. Van Cleave.
    [The prepared statement of Ms. Van Cleave follows:]

        Prepared Statement of the Honorable Michelle Van Cleave




    Mr. Hostettler. Dr. Wortzel.

       TESTIMONY OF DR. LARRY WORTZEL, VISITING FELLOW, 
                    THE HERITAGE FOUNDATION

    Mr. Wortzel. Mr. Chairman, Members of the Committee, thank 
you for the opportunity to testify today on the theft of 
national security secrets and national security sensitive 
technology. I have a longer statement I would like to submit 
for the record, if I may.
    Mr. Hostettler. Without objection.
    Mr. Wortzel. I will focus on the intelligence collection 
posed by China. The manpower pool available to the Chinese 
Government and its intelligence services is nearly limitless, 
and it is impossible to know for certain if people are here to 
study for research or if they are here to steal our secrets.
    The People's Republic of China is methodical in its program 
to gather information from abroad. In 1986, the People's 
Republic of China launched a national high technology research 
and development program with the specific goal of benefiting 
China's medium and long-term high technology development.
    This is a centralized program; it is known as the 863 
Program for the date it was announced, and it allocates money 
to experts in China to acquire and develop things like 
biotechnology, space technology, laser technology, and advanced 
materials. Thousands of Chinese students and scientists were 
sent abroad by China over the years to pursue critical, civil 
and military dual-use technologies, and the practice still 
continues. Thus, the U.S. faces an organized program out of 
China that is designed to gather high technology information of 
military use.
    Now, today, inside China, there are entire high technology 
incubator zones that are designed to attract back students from 
the U.S. or U.S. businesses to bring technology in. It is very 
important to recognize that Chinese diplomatic missions abroad 
monitor the activities of their businessmen and students to 
cultivate informants, and before Chinese citizens get passports 
or travel permission, they are often interviewed by China's 
intelligence security services and sensitized to intelligence 
collection requirements.
    I think it is important to remember that the constitution 
of the People's Republic of China characterizes the state as a 
people's democratic dictatorship. So it is pretty hard for 
legal travelers to simply turn down the Chinese Government in 
that authoritarian state when they get asked to cooperate.
    Now, we know from Chinese defectors and Chinese security 
officials, or diplomats in places like Australia and Canada 
recently, that this approach is used not only to collect 
intelligence in the United States, but also abroad.
    In 2003, the State Department approved some 700,000 visas 
for visitors from China to the United States. That includes 
about 135,000 students. That is just a lot of folks. There were 
40,000 immigrant visas granted to Chinese citizens in 2003. I 
have to say that these numbers make it impossible for the 
Federal Bureau of Investigation to vet every one of these 
people. There are some 3,200 Chinese front companies operating 
in the United States.
    Now, the People's Liberation Army of China went into the 
business of starting companies to bring in technology in the 
1970's, late 1970's and 1980's. The General Equipment 
Department started Polytechnologies; the General Political 
Department, started Kaili or Kerry Corporation, Baoli, the 
logistics department started Xinshidai, or the New Era 
Corporation; and these are separate legal entities, not part of 
the military, but they were authorized to conduct these 
activities by the Central Military Commission of the Chinese 
Communist Party.
    They were originally manned by former officers of PLA or 
their families, in some case active officers, and they operated 
branches in the United States. They regularly brought 
delegations to the U.S. to bring in technology, and today they 
have turned into global conglomerates that have spawned some of 
those 3,200 companies that are operating in our country.
    So the Chief of FBI Counterintelligence Operations, David 
Szady, recently said that these companies are operating in such 
places as Milwaukee, Trenton, New Jersey, and Palo Alto.
    Now, I think that the Government, the U.S. Government 
security intelligence and law enforcement agencies have to 
focus on national security information. They ought to be 
looking for violations in the Arms Export Control Act, or the 
Export Administration Act, but when it comes to corporate or 
industrial espionage, proprietary secrets, that is not national 
security.
    It may be an economic problem for the United States, but I 
think that there the Government owes American companies a good 
legal infrastructure to protect patents, copyrights and 
trademarks; a system of education on industrial security here 
in our country; and a strong effort to ensure that China meets 
its own obligations to create a rule of law that protects the 
rights of ownership and intellectual property. But we shouldn't 
cross over into losing--given the number of people, into losing 
our focus on national security.
    From the standpoint of congressional action, I would point 
out that the Export Administration Act expired in 2001; it was 
a 1979 act. It needs to be revised to take account of the needs 
of 21st century technology. The Senate passed a revision in 
2001; the House did not. I think the Executive Branch has to 
regularly review the Commodity Control List to ensure that 
appropriate national security controls on exports do not unduly 
restrict the ability of American industry to compete in the 
world market.
    Generally speaking, I think that technologies that are 
widely available in the world market and not unique to the 
United States should not be restricted and subject to export 
controls unless they can be multilateral controls. I would also 
recommend that visa officers get educated by the intelligence 
community so that things like the Visas Mantis program, and the 
technology alert list, can work effectively. They have a lot of 
prerogatives when they are out in the embassy.
    Let me close by saying that I don't think it pays for us to 
be paranoid and suspect that every traveler, student and 
businessman from China, or woman from China, is a spy or is out 
to steal technology. Prudent law enforcement programs, 
counterintelligence programs, security education and industrial 
security programs are important ways to protect our Nation. But 
I would note that in places like Taiwan, the Republic of China 
and South Korea, it is these students that came out and learned 
and went back home that changed the political system there and 
created a rule of law and democracy, and that could someday 
happen in China. In the meantime, I do think we need to be 
vigilant.
    And I thank you for the opportunity to testify today.
    Mr. Hostettler. Thank you, Dr. Wortzel.
    [The prepared statement of Dr. Wortzel follows:]

                 Prepared Statement of Larry M. Wortzel

    Mr. Chairman, Members of the Committee,
    Thank you for the opportunity to testify today on the theft of 
national security sensitive technology in the United States. As a 
former military intelligence officer who has tracked the activities of 
the People's Liberation Army and Chinese intelligence services for 35 
years, I know of no more pervasive and active intelligence threat to 
America's national security than that posed by the People's Republic of 
China. The manpower available to the Chinese government and its 
corporations to devote to gathering information in the United States is 
nearly limitless. There are some 300,000 visitors to the United States 
from China each year. It is impossible to know if these people are here 
for study and research or if there are here to steal our secrets.
    In 2003, for example, the State Department granted about 27,000 
visas to Chinese ``specialty workers,'' the H1-B visa. Some of these 
were intra-company transfers coming to the United States from US firms 
operating in China. Indeed, between 1993 and 2003 there were about 
40,000 immigrant visas from China a year. The US government has handled 
about 2,410 asylum cases from China a year. In 2003, there were about 
55,000 student visas granted to Chinese students. The sheer magnitude 
if these numbers presents a great challenge to the Federal Bureau of 
Investigation, particularly when the US is also concerned about 
terrorism.
    The General Political Department of the People's Liberation Army 
has a proprietary company, Kaili, or Kerry Corporation, that operates 
in the U.S. as a real estate and investment company. The General 
Equipment Department of the PLA operates a proprietary company, 
Polytechnologies, which has offices here in the U.S. In addition, the 
Chinese Defense, Science, Technology and Industry Commission operate a 
proprietary called Xinshidai, or New Era, that has offices in our 
nation. These technically are independent legal entities, but they were 
established by the Central Military Commission of China to serve the 
interests of the military industrial complex. The PLA regularly 
operates trade fairs to attract American high technology into China.
    The Deputy Undersecretary of Defense for Technology Security and 
Counterproliferation has testified that there are between 2,000 and 
3,000 Chinese front companies operating in the United States to gather 
secret or proprietary information, much of which is national security 
technology or information.
    The nature of the Chinese state complicates the problem of knowing 
what the large numbers of travelers and students from China are 
actually doing. China is still an authoritarian, one-party state led by 
the Chinese Communist Party with a pervasive intelligence and security 
apparatus. The Chinese government is able to identify potential 
collectors of information and, if necessary, to coerce them to carry 
out missions on behalf of the government because of the lack of civil 
liberties in China. Let me quote the first three sentences of Chapter 
1, Article 1, of the Chinese Constitution: ``The People's Republic of 
China is a socialist state under the people's democratic dictatorship 
led by the working class and based on the alliance of workers and 
peasants. The socialist system is the basic system of the People's 
Republic of China. Disruption of the socialist system by any 
organization or individual is prohibited.''
    The People's Republic of China is methodical in its programs to 
gather information from abroad. In March 1986, the PRC launched a 
national high technology research and development program with the 
specific goal of benefiting China's medium and long-term high 
technology development. This centralized program, known as the ``863 
Program'' for the date when it was announced, allocates money to 
experts in China to acquire and develop bio-technology, space 
technology, information technology, laser technology, automoation 
technology, energy technology and advanced materials. The 863 program 
was proposed by China's strategic weapons scientists to emphasize 
strategic civil and military technology development. Thousands of 
students and scientists were sent abroad by China over the years to 
pursue critical civil and military, dual-use technologies. This 
practice still continues. When I was at the American Embassy in China 
and conducted due diligence checks to confirm the nature of Chinese 
companies seeking to do high technology business in the United States I 
most often found that the address identified for a company on a visa 
application turned out to be a People's Liberation Army or PRC 
government defense research institute. Thus, the United States faces an 
organized program out of China that is designed to gather high 
technology information of military use.
    My colleague today, Mr Maynard Anderson, will discuss some of the 
ways that our government and industry can defend against intelligence 
gathering by China through defensive counterintelligence and security 
education programs. It is also important to know that we have other 
programs to screen out people coming to the United States to gather our 
trade or military secrets. In January 1998, the VISAS MANTIS program 
was developed to assist the American law enforcement and intelligence 
communities in securing U.S.-produced goods and information that are 
vulnerable to theft. Travelers are subject to a world-wide name-check 
and vetting procedure when they apply for visas. The security 
objectives of this program are to prevent the proliferation of weapons 
of mass destruction and missile delivery systems; to restrain the 
development of destabilizing conventional military capabilities in 
certain regions; to precent the transfer of arms and sensitive dual-use 
items to terrorists; and to maintain United States advantages in 
militarily critical technologies. This program operates effectively and 
can vet a Chinese student in as few as 13 days. Non-students may take 
longer, as many as 56 days. However, I can tell you based on my trip to 
China two weeks ago that the American Embassy in Beijing and the 
Consulate in Guanzhou are able to process and vet in about two weeks 
visas for non-student travelers who fully and accurately outline the 
purpose and itinerary of their trip. The government also operates a 
``technology alert list'' to identify legal travelers from China that 
may benefit from exposure to advanced U.S. technology with military 
application.
    Many provinces and municipalities in China now operate high 
technology zones and ``incubator parks'' specifically designed to 
attract back Chinese nationals who have studied or worked overseas in 
critical high technology areas. When students or entrpreneurs return 
with skills or knowledge that the central government deems critical 
they are given free office space in the parks, loans, financial aid, 
and administrative help in setting up a business designed to bring in 
foreign investment and technology. Their companies are given tax 
holidays. Innovative programs such as at Beijing's Zhongguancun High 
Technology Park and Guangzhou's High Technology Economic and Trade Zone 
get central government help. These are admirable programs that will 
develop entrpreneurial skills among well-educated Chinese citizens. 
However, as students and employees of U.S. companies return home, it is 
important to know that they are not taking back American economic or 
military secrets. Good counterintelligence and industrial security 
programs are very important to U.S. security given this threat.
    Mr. Chairman, the enforcement of intellectual property protection 
laws in China is spotty and inconsistent at best. This is one of the 
major complaints of American high technology companies about China's 
compliance with its obligations under the World Trade Agreement. It 
will certainly be a subject discussed by President Bush and Chinese 
President Hu Jintao this week. The tendency to steal intellectual 
property and high technology secrets in China is worsened when 
ijntellectual property laws are not enforced there. And the problem is 
further exacerbated when centralized Chinese government programs, such 
as the ``863 Program'' I mentioned earlier in my testimony, are 
specifically designed to acquire foreign high techology with military 
application. This only creates a climate inside China that rewards 
stealing secrets.
    I believe that U.S. government security, intelligence and law 
enforcement agencies must focus on the national security. They should 
be looking for acts of espionage and for violations of the Arms Export 
Control Act or the Export Administration Act. When it comes to 
corporate or industrial espionage that is not a matter of national 
security, I believe that the government owes American companies a good 
legal infrastructure to protect trademarks, patents and copyrights; a 
system of education on industrial security; and a strong effort to 
ensure that China meets its own obligations to create a rule of law 
that protects the right of ownership and intellectual property. 
However, I do not believe that American intelligence or security 
agencies should focus on forms of economic espionage that do not 
involve national security information. From the standpoint of 
Congressional action, my view is that the Congress should reconsider 
the Export Administration Act with a view toward ensuring that its 
provisions meet the needs of 21st century technology. The 1979 Export 
Administrtion Act expired in 2001. The Senate passed a new Act in 2001, 
but no revision passed the House. And the Executive Branch must 
regularly review the Commodity Control List to ensure that appropriate 
national security controls on exports do unduly restrict the ability of 
American industry to compete in the world market. Generally, 
technologies that are widely available on the world market and not 
unique to the United States should not be unduly restricted unless they 
can be subject to mulitlateral controls.
    Finally, we cannot become paranoid and suspect that every traveler, 
student and businessman from China is a spy or is out to steal 
technology. Prudent law enforcement programs, counterintelligence 
programs, security education and industrial securty programs are 
important means to protect our nation.
    Thank you for your invitation to testify today.

    Mr. Hostettler. Mr. Anderson.

    TESTIMONY OF MAYNARD ANDERSON, PRESIDENT, ARCADIA GROUP 
 WORLDWIDE, INC., AND FORMER DEPUTY UNDER SECRETARY OF DEFENSE 
                      FOR SECURITY POLICY

    Mr. Anderson. Thank you, Mr. Chairman. I too have submitted 
a statement for the record. With your permission, I will 
summarize.
    Mr. Hostettler. Thank you.
    Mr. Anderson. Thank you, sir.
    We have proved that collectors representing foreign 
adversaries and friends use espionage, theft and other illegal 
means to take advantage of the United States and cause 
unauthorized disclosure of protected information.
    We also need to recognize that there are ethical failures 
of trusted personnel who are prepared to traffic in information 
and technology because they are greedy or because they are 
susceptible to foreign pressure, and they are threats as well.
    The United States is an open society and a prime target of 
collectors because it produces more intellectual property than 
any other nation in the world and does, to some extent, a poor 
job of protecting it. World changes, producing new alliances 
and new friendships internationally create more vulnerabilities 
to our technology. America may have won the Cold War, but we 
are losing ground economically to those who would pilfer our 
commercial secrets.
    National security and economic strength are indivisible, 
and the real test in this world of military and economic 
contests for supremacy may not be who first develops technology 
but rather who is the first to use it effectively. Technology's 
application is the key, particularly in an area of dual-use 
technology.
    Integration of the management, protection and use of 
technology is an objective to ensure that we determine what 
needs to be controlled, what can be controlled, and employment 
of the most important control mechanisms. It is imperative that 
we determine accurately whether any other nation wants our 
technology and whether any other nation has it already, because 
we can't afford to spend resources to protect things that don't 
need protection. We need to balance the protection of real 
secrets while maintaining the competitive position of American 
industry in the world market.
    It would seem prudent, therefore, to use all current legal 
remedies available to enforce contracts and personnel actions, 
to enhance enforcement opportunities against current Government 
and contractor employees who break trust, to establish new 
standards and requirements for our foreign visitors, 
particularly students and researchers, and to ensure, probably 
most of all, that our citizens know what is expected of them.
    The easiest, least-expensive and most effective protection 
technique is education. All custodians of protected information 
should be subjected to continuing education concerning threats, 
vulnerabilities and protection of information so that they 
understand the consequences of its unauthorized disclosure, 
which are obviously jobs, loss of profits and diminished 
national security.
    Everyone should be made aware that national security is 
every citizen's responsibility.
    Thank you, Mr. Chairman.
    Mr. Hostettler. Thank you, Mr. Anderson.
    [The prepared statement of Mr. Anderson follows:]

                 Prepared Statement of Maynard Anderson



    Mr. Hostettler. Dr. Wulf.

 STATEMENT OF DR. WILLIAM A. WULF, PRESIDENT, NATIONAL ACADEMY 
             OF ENGINEERING, THE NATIONAL ACADEMIES

    Mr. Wulf. Thank you very much, Mr. Chairman, Members of the 
Committee. I too, like my predecessors here, have a longer 
statement, which I will submit for the record.
    I am pleased to come to the hearing today to remind all the 
Members of the Committee of the important contributions that 
foreign-born scientists and engineers have made and continue to 
make to this country. We are more prosperous and more secure in 
large part because of them.
    Before proceeding, while I don't perhaps have the same 
credentials in intelligence that my predecessors on the panel 
have had, I would note that both my wife and I have been 
advisors to the Department of Defense for decades. We both 
carry Top Secret SCI clearances and my wife served for 5 years 
in the Pentagon as the Director of Research and Engineering, 
where she had responsibility for the oversight of all R&D in 
the Defense Department.
    I am convinced that security, real security, comes from a 
proper balance of keeping out those that would do us harm and 
welcoming those that would do us good. Throughout the last 
century, our greatest successes in creating both wealth and 
military ascendancy have been due in large part to the fact 
that we welcomed the best scientists and engineers from all 
over the world. No other country did that, and nowhere else has 
the genius for discovery and innovation flourished the way it 
has here. I am deeply concerned that our policy reactions to 9/
11 have tipped the balance in a way that is not in the long-
term interest of our Nation's security.
    Fifty years ago, our scientific leaders came from Europe. 
There were the famous names like Einstein, Fermi and Teller, 
without whom we would not have been the first to have the 
atomic bomb; von Braun, without whom we would not be ascendant 
in rockets and space; von Neumann, without whom we would not be 
world leaders in computing and information technology.
    Today, it isn't just Europeans that contribute to our 
prosperity and security. The names are those like Praveen 
Chaudhary, now Director of Brookhaven National Laboratory; C.N. 
Yang, now Nobel Laureate from the Institute for Advanced Study 
at Princeton; and Elias Zerhouni, who was born in Algeria and 
is now the Director of the National Institutes of Health.
    Between 1980 and 2000, the percentage of Ph.D. students and 
scientists and engineers employed in the United States, who 
were born abroad, increased from 24 to 37 percent. The current 
percentage of Ph.D. physicists is about 35 percent; for 
engineers, it is over 50 percent. One-fourth of the engineering 
faculty at U.S. universities were born abroad; between 1990 and 
2004, over one-third of the Nobel Prizes awarded to U.S. 
citizens were to foreign-born scientists. One-third of all U.S. 
Ph.D.'s in science and engineering are now awarded to foreign-
born graduate students.
    We have been skimming the best and brightest minds from 
around the globe and prospering because of it. We need these 
new Americans even more now as other countries become more 
technologically capable.
    If I have one message to convey to this Committee today, it 
is that it is a serious mistake to think that all important 
defense technologies originate in the United States, and hence, 
the problem is to keep our technology from being stolen by 
others.
    We talk proudly about the MIT ``Rad Lab'' that developed 
radar during World War II, but the critical technology came 
from the United Kingdom. At the end of World War II we were a 
distant third in the development of jet engines behind both 
Germany and Russia--the Soviet Union. The World Wide Web was 
invented in Switzerland, not in the United States. I could go 
on and on.
    Many U.S. corporations are now shifting their development 
to overseas locations, research and development to overseas 
locations, not just because foreign labor is cheaper; that is a 
common and comfortable myth. It is frequently because the 
quality is better overseas.
    Again, real security depends upon a very careful balance, 
in this case, a balance of openness and secrecy. Walling 
ourselves off from others, from the otherwise open exchange of 
basic scientific information, is a recipe for being surprised 
and disadvantaged.
    To be sure, 9/11 and globalization have both changed the 
balance point. The balance point for the Cold War was a 
different one than for today. We need to fundamentally rethink 
our policies. However, in my opinion, several recent policy 
changes related to visas, to the treatment of international 
visitors, to this new issue of deemed exports and so on have 
had a chilling effect.
    It has already been mentioned that the applications of 
international students to attend U.S. colleges and universities 
has declined. Scientists have chosen to hold conferences in 
other countries. U.S. businesses have had to shift critical 
meetings to locations outside our borders. In the meantime, 
foreign companies, universities and governments are marketing 
themselves as friendlier places to do business or to get an 
education. In the race to attract top international talent, we 
are losing ground.
    At the same time, science and technology are growing 
rapidly in other parts of the world. Over 70 percent of the 
papers published by the American Physical Society's world 
leading journal, The Physical Review, come from abroad--70 
percent! We do not own all of the science and technology 
information in the world. It is illustrated by a figure in my 
written testimony, the number of first degrees in science and 
engineering awarded per year in Asia is now almost three times 
greater than in North America.
    Permit me to turn to this issue of export controls for a 
minute. They were instituted in 1949 to keep weapons technology 
out of the hands of potential adversaries. In 1994, the 
disclosure of information about a controlled technology to 
certain foreign nationals even in the United States has been 
``deemed'' to be an export of that technology itself. And 
recent reports from the inspectors general of the U.S. 
Department of Commerce and State have suggested that the 
implementation of the rules governing deemed exports should be 
tightened.
    For example, they have suggested that the exemption for 
basic research should be altered and possibly eliminated and 
that the definition of access to controlled technology should 
be broadened. The university community is rightly concerned 
that a literal interpretation of the IG's suggestions would 
essentially preclude foreign graduate students from 
participating in research and would require an impossibly 
complex system to enforce.
    Given that over 55 percent of the Ph.D. students in 
engineering in the United States are foreign born, the effect 
could be catastrophic. Either universities would have to 
exclude these students, or they would have to stop doing 
research on potentially defense-related topics, which, of 
course, includes most of the fastest-moving new technologies. 
Neither of these alternatives strengthens the United States, 
they weaken it.
    One might ask if these policy changes will improve our 
security, I would point out that the United States is not the 
only research-capable country. China and India, for example, 
have recognized the value of research universities to their 
economic development and are investing heavily in them. By 
putting up barriers to the exchange of information about basic 
research, we wall ourselves off from the results in these 
countries and slow our own progress. At the same time, the 
information we are ``protecting'' is often readily available 
from other sources.
    And finally, in a country with an estimated 10 million 
illegal aliens, one must wonder whether onerous visa policies 
or demeaning practices at border crossings will deter the 
committed trained spy or terrorist from entering the country.
    The 2001 Hart-Rudman Commission, which in February of 2001 
predicted a catastrophic terrorist attack on the United States, 
and which then proposed the Department of Homeland Security, 
said, and I quote, ``The inadequacies of our system of research 
and education pose a greater threat to the United States 
national security over the next quarter century than any 
potential conventional war we might imagine.'' Their essential 
point is that further damaging our system of research and 
education, including its relation to foreign-born scholars, is 
a very dangerous strategy.
    The United States still benefits from educating and 
employing a large fraction of the world's best scientists and 
engineers. We have great research universities that remain 
attractive to the world's best and brightest. We are envied for 
our non-hierarchical tradition that allows young scientists 
with new ideas to play leading roles in research.
    We have progressed because we fostered a tradition of free 
exchange of ideas and information and embraced a tradition of 
welcoming talented people from elsewhere in the world. But that 
advantage is eroding under current and proposed policies.
    The international image of the United States was one of a 
welcoming ``land of opportunity.'' We are in the process, 
however, of destroying that image, and replacing it with one of 
a xenophobic, hostile nation. We are in the process of making 
it more likely that the world's best and brightest will take 
their talents elsewhere. The policies that superficially appear 
to make us more secure are, in fact, having precisely the 
opposite effect.
    Protecting Americans from threats must obviously be a high 
priority. But as I said earlier, real security will be achieved 
only by a proper balance of excluding those that would do us 
harm and welcoming those that would do us good by a proper 
balance of openness and secrecy. With selected, thoughtful 
changes to U.S. policies, we can achieve both goals, making our 
homeland safer and our economy stronger.
    I would like to close with another quote from the Hart-
Rudman report, ``Second only to a weapon of mass destruction 
detonated in an American city, we can think of nothing more 
dangerous than a failure to manage properly science, technology 
and education for the common good over the next quarter 
century.''
    Thank you for the opportunity to testify.
    Mr. Hostettler. Thank you, Dr. Wulf.
    [The prepared statement of Mr. Wulf follows:]

                 Prepared Statement of William A. Wulf



    Mr. Hostettler. At this time we will turn to questions from 
Members of the Subcommittee.
    Ms. Van Cleave, about 30 percent of American university 
science and engineering faculty are foreign born, according to 
your testimony, 40 percent of Ph.D.'s in these fields go to 
foreign students. You also say that foreign intelligence 
services place senior scientists and exploit academic 
activities.
    Should there be better reporting of what projects these 
individuals are involved in; and in the case of students, also 
what subjects they are enrolled in, perhaps through an enhanced 
SEVIS system.
    Ms. Van Cleave. Mr. Chairman, it would be extremely helpful 
to U.S. counterintelligence to have that kind of increased 
reporting on these individuals.
    Frankly, it is difficult to gainsay the statement that was 
just made by my fellow panel member here, that what we want to 
do is exclude those who would cause us harm and welcome those 
that would do us good. The trick is figuring out which is 
which.
    Mr. Hostettler. It is possible that an individual from a 
country of concern, if they are applying for a degree in music 
education, for example, if they start taking nuclear 
engineering courses as electives, that it would probably be 
good to know that?
    Ms. Van Cleave. It would be helpful to get the kind of 
reporting of changes in emphasis where students coming for one 
purpose then are switching their majors or emphasis to areas 
that might have national security implications.
    Mr. Hostettler. But they don't have to be major changes, I 
mean, if an individual takes, through the course of a 4-year 
degree, 10 classes in chemical engineering, that doesn't 
necessarily meet the requirements of a minor in chemical 
engineering, but it nonetheless will probably be very helpful 
in their potential work.
    Ms. Van Cleave. Yes.
    Mr. Hostettler. Thank you.
    Your testimony states that Chinese intelligence efforts 
exploit our open economic system to reduce the U.S. military 
advantage and undermine our economic competitiveness. It is 
actually about the only foreign country you have mentioned by 
name in your testimony. Knowing this, wouldn't you agree that 
the Visas Mantis clearance needs better vetting by law 
enforcement agencies, certainly as it relates to a Chinese 
national coming to the U.S.?
    Ms. Van Cleave. Yes, Mr. Chairman. I think that would be 
very helpful. I appreciate the opportunity that we had in 
closed session to discuss in more detail some of the reasons 
why.
    Mr. Hostettler. In your testimony, you state that the top 
10 collectors probably accounted for 60 percent of foreign 
collection at defense contractors last year. Could you tell us 
what countries you are talking about when you talk about the 
top 10, maybe in the order of their collection?
    Ms. Van Cleave. Mr. Chairman, we did have the opportunity 
to do that in closed session. I am reluctant to do that in open 
session. However, I am able to tell you some of the reasons 
why.
    A number of the countries that are on so-called ``top 10'' 
lists, there is not unanimity across the community about what 
countries really constitute the top 10. It depends on whether 
you are looking at incident reports of information that might 
be amalgamated by the defense security services, for example, 
or some of the case loads that the FBI might be reporting; and 
there is a different way of counting them, and so the top 10 
may vary, depending on which source data we are looking at.
    But let me give you another reason why I am reluctant to go 
into certain specifics.
    Ms. Van Cleave. Some of the Members some of the member 
States that are among the top 10 as I believe I mentioned are 
among some of our close allies, and there are many ways that we 
deal with these kinds of incidents different from calling them 
to the carpet in a public forum. There are different kinds of 
approaches that we might make to allies in trying to forestall 
this kind of activity. But the Committee can come to its own 
conclusion and speculation. Those countries that do have 
particular interests in military build up will themselves be 
looking for those technologies that can help assist in that 
military build up, and they will find in the United States a 
very rich environment in which to acquire those kinds of 
technologies. It is also the case that there is some measure of 
economic competition that drives technology acquisition where 
there is commercial advantage to be gained and a lot of money 
to be made that is yet another incentive, and so we see a great 
deal of activity to include many countries beyond just the top 
10, but indeed at least a hundred nations. Nationals from a 
hundred different nations were recorded just last year in 
targeting U.S. technologies.
    Mr. Hostettler. Ms. Van Cleave, I appreciate the point that 
you made with regard to our friends. Actually, in your oral 
testimony you did mention two of those nations, China and 
Russia. Our largest--well, I should say one of our largest 
trading partners--we have ongoing evolving relations with 
Russia. The reason why I asked the question is the exact reason 
you gave why you say you are reluctant to give us that, and 
that is, there is an assumption among many of our constituents, 
many of our citizens of the United States that our friends 
don't spy against us. But as you mentioned, in general, that is 
a very erroneous assumption to be made. And the reason why I 
asked you that question is to put on the record very 
specifically who those people are because, once again, it's 
important for us to know that, for example, through the Visa 
Waiver Program, and through other programs that don't take 
advantage of the Visa Mantis system, that there may be 
requirements for us to change the law with regard to our 
friends. And I mean, I don't mean that with quotation marks. I 
mean friends but that have reasons that may be confusing to a 
lot of us and would be very confusing to a lot of my 
constituents as to why they aggressively commit espionage 
against the United States. And so I will not press you on the 
issue, but I will simply, once again, reiterate that it's 
important for us to, in open session, if it is not classified, 
to divulge this information really for the benefit of this 
Committee and the benefit of our constituents.
    Dr. Wortzel, your testimony states that tens of thousands 
of student visas were given to Chinese nationals last year; in 
fact, one of the highest. Do you believe we're giving 
preference to China in these student visa numbers over our 
allies, over some of our allies?
    Mr. Wortzel. I don't think it's a definite preference 
toward China. I think what you're seeing, first of all, 1.3 
billion people there, there's going to be more students trying 
to get out. We're obviously a very attractive place to get an 
education, whether it's a high technology education or an 
education out in the social sciences. I think our programs are 
actually pretty restrictive. It's difficult to go into an 
American Embassy and get into the United States if you're in 
China. So I think we have to deal with the fact that there are 
just huge numbers of people there. India, only second to that, 
and that probably accounts for the numbers.
    Mr. Hostettler. Do you believe an enhanced SEVIS system 
would allow us to gain better information to provide our 
intelligence community the information they need to----
    Mr. Wortzel. I do. I'm a great advocate of data mining. I 
think that the ability to electronically sort through what is 
open-source data, who's here, what are they doing, whether 
that's by someone in immigration--they've got a right to know 
what somebody's doing at a university. Now, one can argue that 
a U.S. intelligence service getting that information might be 
objectionable to a university president. But if the immigration 
service gave somebody a visa, I think it'd be great to allow 
them, allow Customs to get in, or Immigration, I'm sorry, to 
get in and say, okay, we gave Joe Doe a visa, and he said he 
was coming here to study this. Let me see what he's studying. 
And those are things that can be done quickly, electronically, 
and things can be sorted out. I do think we should be 
approaching it that way, and I think that we have appropriate 
agencies in the Government that could look at that, and then if 
there's a reason to raise concerns about what's going on, they 
turn it over to another agency or counter-intelligence agency.
    Mr. Hostettler. Very good. Without objection, I will grant 
the Chair an additional minute to ask one additional question 
of Dr. Wulf, maybe a couple of questions actually. Very short 
answers. You might not have the information. Dr. Wulf, could 
you tell me, given the fact that Master's and Ph.D. slots for 
engineering are limited in the United States, would you have 
statistics that tell us the number of American citizens who are 
denied Master's applications, who have Master's applications 
denied, as well as Ph.D. applications denied in the United 
States? Would you happen to have those?
    Mr. Wulf. Approximately zero.
    Mr. Hostettler. So it's really unlimited--the number of 
Master's and Ph.D. slots?
    Mr. Wulf. I didn't quite say that. But the number of 
Americans who do not enter graduate programs because there's no 
space is essentially zero.
    Mr. Hostettler. Okay.
    Mr. Wulf. The trouble is they're not applying.
    Mr. Hostettler. So there are zero denied.
    Mr. Wulf. Yeah. Approximately zero. I mean, there may be 
some oddball cases I don't know about.
    Mr. Hostettler. Thank you very much.
    The Chair recognizes the gentlewoman from Texas, Ms. 
Jackson Lee.
    Ms. Jackson Lee. Thank you very much, Mr. Chairman. Your 
initial round of questioning certainly points to a dilemma 
which we face. I'd like to take some remarks that were made 
generally speaking through the testimony presented in the open 
session to indicate my agreement. Let me first of all thank 
Congresswoman Lofgren for recognizing Dr. Wulf and the 
astuteness in which she recognized you in as much as you are 
representing or certainly associated with the University of 
Virginia, and I couldn't think of a better school. I happen to 
be an alumnus. So I thank the Congresswoman very much for her 
astuteness, Dr. Wulf, and I thank you for your service, as well 
as I do the other panel members.
    But you did highlight for us the fact that we do prosper 
because we skim the best scientists from around the world. At 
the same time, I think interwoven into your remarks is the idea 
that we suffer as well from enticing students and graduate 
students into the sciences and other high technologies that are 
necessary. So I'm going to come to you and pose that question. 
But I do want to go to Ms. Van Cleave to ask, what is the 
extent that she feels that we are now able, the United States, 
your industry--your, in terms of counter intelligence--able to 
identify, right now, foreign nationals who are coming into the 
United States to engage in espionage? Do we have that capacity?
    Ms. Van Cleave. We have limited insight into the foreign 
intelligence operations into the United States, which is to 
say, to the extent that we understand the character, make-up 
and operations of foreign intelligence services of concern, we 
can identify individuals that might be sent here for those 
particular purposes. However, much of the intelligence 
collection against the U.S. technology base is carried out not 
by known intelligence officers but rather by those who are 
employing nontraditional collection means against us. And that 
is a much much more difficult problem.
    There I would have to say that we have precious little 
understanding or way of knowing when individuals who ostensibly 
are coming here for legitimate business purposes might, in 
fact, have more troubling objectives in mind.
    Ms. Jackson Lee. So, in essence, part of the road map that 
you're providing for us today is the heaping up, if you will, 
of resources to look at that component that would be 
nontraditional in the way that they would seek to secure 
information. That seems to be where we need some emphasis.
    Ms. Van Cleave. Yes. We're very much in need of tools that 
would enable us to be able to characterize who those people are 
and why they are here, that small slice that is here for 
illegitimate purposes.
    Ms. Jackson Lee. I thank you.
    Dr. Wortzel, I likewise had some agreement with some of the 
remarks that you have made. But let me just say, and I believe 
that we will wind up on the same page. We know that, as I 
started out by saying, the importance of the intellectual 
exchange and the benefits that the United States has gained by 
a vast number of individuals. And we also know, without any 
naming or, if you will, illuminating any closed sessions, we 
know that even our allies have been found to be engaged in some 
activities that we would not support. So I don't want this to 
be a hearing that stigmatizes the entire student body from 
China. They our allies and friends. We have engaged in some 
very positive exchange opportunities, both in terms of our 
student exchange but also our trade exchange. And frankly, we 
are working toward a diplomatic relationship in terms of their 
continuing improvement. And I might add, we certainly want to 
ensure that our military operations are more in sync than in 
conflict. But you did mention, and I was trying to find your 
quote, but let me just say this: I look at it that the overall 
war on terrorism has taken us away from--and don't want to 
suggest that we should diminish that effort, but we need to 
increase, if you will, the resources for the rest of the 
intelligence community. Why don't you comment on where we need 
to, if you will, lift that issue up? And in the meantime, I'll 
be finding one of the quotes that I agree with you on. And I 
guess it is the point that you made about our work should be--
that ties into my question--national security, versus the 
question that many Members--rightly so, because their 
constituents are impacted by this whole economic issue. If you 
go to China, you're inevitably talking about CDs and country 
western music and other music that they have obviously 
utilized. But that's economic. And I think you said something 
about, we should be focusing on national security. Can you 
share that with me?
    Mr. Wortzel. Well, I think we should--thank you, 
Congresswoman. We should focus on national security. We need to 
provide, as I said in the testimony, the legal structure here 
in the United States, and we need to foster a legal structure 
in China that will provide for property rights and intellectual 
property rights. But we need to worry about national security 
here. And I think that's the critical task. Refining the lists 
of controlled commodities, dual-use items, to ensure that we 
protect what is really unique to the United States. I mean, 
there are some things we're just way ahead on that nobody else 
is doing, composites that make stealth technologies, turbine 
and in jet engine technology. Nobody else does this. We need to 
think about that. I would argue generally that basic research 
in universities has got to be open, wide open, but that when 
the Department of Defense or the Department of Energy goes to a 
specific university and funds a program that moves into applied 
research, then we should be able to know who's working on it 
and what they're working on and why they're there. So I 
wouldn't worry, Mr. Chairman, about somebody taking 10 courses 
in chemistry, advanced chemistry. But if he or she is working 
to do research on an applied technology with military 
application or with application for weapons, I'd get really 
nervous about it. And I would want to be able to know that.
    Ms. Jackson Lee. Mr. Chairman, Dr. Wulf, if he might 
respond to the question I raised. Dr. Wulf, that was the 
question dealing with--I started out the whole question dealing 
with the importance of the talent that comes here to the United 
States and the lack of U.S. Citizens engaged in the sciences.
    Mr. Hostettler. No objection. The gentleman will be allowed 
to respond.
    Ms. Jackson Lee. I thank the Chairman, and I'll conclude 
with that.
    Mr. Wulf. As I said in my oral testimony, and it appears 
again in my written testimony, foreign-born nationals represent 
an enormous fraction of the science and engineering talent in 
this country. I tried to give some examples. The fact that 
somewhere between 25 and 30 percent of the faculty in 
engineering schools are foreign-born, the fact that overall, 
something like 37 percent of all of the engineers and 
scientists in the United States are foreign-born, the fact that 
a third of the Nobel Prizes awarded in the last 10 or 15 years 
to U.S. Citizens were to foreign-born. It's just really hard to 
overstate the benefits that we have reaped by skimming off the 
best and brightest minds from around the world. And we are, in 
my opinion, in serious danger of creating an atmosphere that 
those people will not want to put up with.
    Ms. Van Cleave made reference to the fact that, in the 
fifties, a number of Chinese returned to mainland China and set 
up their missile program. I would recommend to any Member of 
the Committee that feels like exploring that, that they take a 
look at a book called, The Thread of the Silk Worm, about the 
man who headed the Chinese missile program, named Tsien Hsue-
shen. He was a professor at Cal Tech, got his Ph.D. at MIT, was 
one of the leading rocket scientists, literally, in the United 
States, and quite improperly and erroneously, got caught up in 
the McCarthy hearings, was held in house arrest for, if I 
remember correctly, 2 years and, finally, in disgust returned 
to China and created the Chinese missile program. Yes, it was a 
returned Chinese. But we drove him there.
    Mr. Hostettler. Will the gentleman concede the fact that it 
was the Communist Chinese missile program?
    Mr. Wulf. Oh, yes. Absolutely.
    Mr. Hostettler. The Chair now recognizes, without 
objection, the gentleman from Texas for questions, 5 minutes.
    Mr. Gohmert. Thank you. Appreciate my colleague allowing me 
to proceed.
    I'm going to ask each of you to name the top two 
immigration practices or omissions that you believe are the 
biggest threat to our national security. But while you're 
thinking about that, I want to ask Ms. Van Cleave, are you 
familiar with the diversity visa program where we provide 
50,000 visas a year on the basis of a lottery? Are you familiar 
with that program?
    Ms. Van Cleave. Congressman, I have to say, no, I'm not.
    Mr. Gohmert. Okay. Well, then I don't guess you can tell me 
how many terrorists may have utilized that program. But anyway, 
I would suggest that you take a look at it. Some of us, we 
voted that out of this Subcommittee, a repeal of that, because 
it seemed ludicrous to some of us that we be awarding visas on 
the basis of a lottery, allowing immigration to abdicate their 
responsibilities. That's a concern of some of ours. But let me 
start with Dr. Wulf and work our way down to my left. Doctor, 
what do you see as the two biggest, two immigration practices 
or omissions that are the biggest threat to our national 
security?
    Mr. Wulf. Two? That's not easy. But the first one I would 
name is the fact that immigration visas are not awarded 
particularly on the basis of the contribution which the 
individual will make to the country. They are more typically 
family based or that sort of thing. I think we ought to give 
special consideration to those people who can really contribute 
to the country. And I have to say, the second one is 
overreaction. I really am concerned that we're in the process 
of making things worse rather than better by overreacting.
    Mr. Gohmert. Thank you.
    Mr. Anderson.
    Mr. Anderson. Yes, sir. I think perhaps the most important 
one to me is that we don't know who is arriving here. We do a 
lot of sort of superficial work, but we're rather poor in 
determining just exactly who's coming. And I don't mean to--I 
don't mean for that to sound discriminatory. But we don't ask 
those folks, for example, students and researchers coming in, 
we don't ask those folks to provide us with a great deal of 
information about who they really are. We ask it of our own 
students. We ask it of our own military personnel. We ask it of 
all kinds of people in the United States, but immigrants really 
are not subjected to very strenuous questions on who they are 
really. And I think that may be, to my mind, the greatest one. 
I'm not sure that--I'm not sure that I could name a second one. 
I don't like quotas. I don't think quotas are good. I don't 
know that that's a--I don't know that that's a threat to us. 
But I think a failure to really identify our immigrants is a 
major issue.
    Mr. Gohmert. Okay. Thank you.
    Ms. Van Cleave.
    Ms. Van Cleave. From the perspective of counter 
intelligence, immigration laws are very clear: where we have an 
individual who may be known or expected to engage in 
intelligence activities and activities inconsistent with U.S. 
laws, visas are denied. But my real concern about immigration 
laws is that, from a CI perspective, they really can't do a 
great deal for us beyond that. I mean, there isn't a panacea 
that enables or immigration laws to protect us against all of 
the things that this hearing has now convened to discuss. I 
would have to say that getting at the real question of who 
these people are who are coming into the United States, 
immigration laws can do, can provide some of that information 
to us. But that really is the point where I think that we need 
to have a layered approach of which immigration controls are 
only one part. The matter that was mentioned a little earlier 
by the Chairman----
    Mr. Gohmert. Can you help me? Maybe my mind's eye is too 
simplistic. I'm just asking you, what do you see as the biggest 
threat to national security? And from a counter intelligence--
you're saying we need a layered approach.
    Ms. Van Cleave. Because, sir, I know----
    Mr. Gohmert. So the biggest threat in your mind is that we 
don't have a layered approach?
    Ms. Van Cleave. I know that foreign intelligence services 
and foreign governments will exploit such loopholes as they can 
find to send personnel here to achieve certain ends.
    Mr. Gohmert. Bingo. That's what I'm looking for. What 
loopholes do you know of that we can fix? Number one problem. 
Number two problem.
    Ms. Van Cleave. And I believe in closed session I was asked 
to take, for the record, that particular question and to 
provide a detailed answer back to the Members of the Committee. 
But in open session, let me say that I am concerned that, where 
there is an opportunity that immigration laws present for 
foreign nationals to enter here because they present themselves 
as residents of another country, and we really don't get true 
disclosure on who they are and where they really come from, 
then that is one particular type of a loophole that I think 
that this Committee may want to consider closing as it is 
reviewing our immigration laws.
    Mr. Gohmert. So we don't get sufficient information on 
where this individual is actually coming from. Is that correct?
    Ms. Van Cleave. In certain instances, that is correct.
    Mr. Gohmert. Number one. I wasn't asking anything 
classified. Just a succinct, what do you say, number one 
problem, number two problem, and then we can go to work from 
there. We can get classified information. We can go beyond. But 
okay, so that's the number one problem. Sufficient information 
on where they're from. What else?
    Ms. Van Cleave. With respect to other aspects of our 
immigration laws, I have to tell you, if it isn't obvious 
already, that I am not an expert in U.S. immigration laws.
    Mr. Gohmert. You're hopefully an expert on counter 
terrorism or counter intelligence.
    Ms. Van Cleave. Yes, sir. That's correct. That is correct. 
And being able to avail ourselves of different kinds of 
databases and information insights on persons who are coming 
into the United States in various categories of immigration 
visas is very valuable to U.S. intelligence. And to the extent 
that we can have more robust databases on persons who are 
coming here and what they do while they are here, it is of help 
to us very much.
    Mr. Gohmert. And I apologize to you if you felt like I was 
trying to make you into an expert on immigration. And I 
apologize if I presumed too much in thinking that someone in 
counter intelligence might overlap or bump into areas of 
immigration policy where a light would go off and you say, oh, 
that's bad for our country that we have this policy. It bumps 
up against everything we know to be true and good as counter 
intelligence. Some of us may individually be counter 
intelligent. But anyway, Dr. Wortzel, if you would, very 
quickly. My time is up.
    Mr. Wortzel. I think that the Technology Alert List and the 
Visa Mantis program as a process is a good idea. I think it can 
be improved by education for the officers that actually stand 
the visa line. And my own experience in embassies is that, when 
you have an ambassador that insists on interdepartmental 
cooperation and screening of visa applications, you end up with 
better educated selections of who's getting a visa and who's 
getting denied. So I would improve that. It's something I think 
we're doing well. I think one of the greatest threats is that 
when we make it too difficult for an American company to bring 
in an intra-company transfer, either to do work in the United 
States, or for a corporate education program, we force that 
company to export its entire R&D effort to a third country or 
to China, a place like China. So I think we have to be very 
careful about this balance of what I just advocated in Visa 
Mantis and Technology Alert Lists and ensuring that when a 
company has a legitimate need for some foreign expert to come 
in here and get educated or do research and go home and manage 
or to work here, we don't force that company to export our R&D 
capability outside of United States.
    Now, Mr. Chairman, I failed to respond to one part of Ms. 
Jackson Lee's question. And if you would indulge me, I could do 
that in a minute.
    Mr. Hostettler. Without objection.
    Mr. Wortzel. Certainly. She asked about the balance between 
counter intelligence responsibilities and antiterrorism 
investigative responsibilities for the FBI. And let me say that 
my experience before and after September 11, 2001, in having to 
deal with FBI agents here in this country that you know I may 
have spoken to or may come to interview me is they're doing a 
pretty good job. I mean, these--they are able, despite the fact 
that they're out hunting terrorists and hunting people that are 
perhaps dealing in weapons of mass destruction, they're still 
able to focus on the big ball park issues that deal with what 
may be Chinese espionage, so that their people can use more 
reinforcement. I think they need more counter intelligence 
agents in the field. They can use more education. I find myself 
talking to FBI counter intelligence agents that don't know the 
history of espionage with China, and you know I'm going back 
over the fact that I'm a little older, and I've been part of 
it. But basically, I'm pretty happy with what they're doing as 
an agency, and I support the changes in the creation of a new 
division.
    Mr. Hostettler. Thank you.
    The Chair recognizes the gentlewoman from California for 5 
minutes, Ms. Lofgren.
    Ms. Lofgren. Thank you, Mr. Chairman.
    I want to focus a little bit on the Visa Mantis process 
because it is bulky and it is slow and it's causing us 
problems. And I'd ask unanimous consent to enter into the 
record an article from the New York Times this August that 
talks about a Ms. Wang, who is a cryptographer, mathematician 
actually, who was one of nine invitees to a conference on 
cryptography that was going to help the United States because 
they found a flaw, and they were going to help us. And they 
were not able actually to get in to provide that help.
    Mr. Hostettler. No objection.
    Ms. Lofgren. I'll just note also, last spring, I met with, 
I won't mention his name but a Nobel Prize winner in 
California, who told me that he will no longer organize 
scientific conferences in the United States because you can't 
get the scientists in. And so I've actually, since he said that 
I've been looking at all the high energy physics, it's all, 
it's in Toronto, it's in Europe. They're not here anymore. And 
so we're going to pay a price for that. The Visa Mantis, 
stepping back, I think someone said we need to take a look at 
our export control system. And I do--we've tried to do that. We 
lost a vote on the floor here. Secretary of State Rice suggests 
we ditch the MTOP standard--it doesn't work--and to go with a 
standard of what's readily available, which makes a lot of 
sense to many of us. If we were to do that, here's the 
question: Wouldn't that help on the Visa Mantis project? 
Because then you would have a much limited set of technologies, 
and you would be protecting it against the things you really 
needed to protect, instead of this broad area of when you go to 
Fry's Electronics and buy it, and if you can buy it at Fry's, 
it's too late. And then, wouldn't that also help on the deemed 
export problem? Because right now, we are controlling on things 
that--I mean these students are just going to go and get the 
same thing at Oxford, or you know, it's not as if we're the 
only people that are studying this. What is your reaction on 
that approach as part of the way to fix the Visa Mantis 
problem?
    Mr. Wortzel. First of all, on MTOPS, I would drop that, 
too. I think it's kind of silly to begin control and speed--I 
think you have to begin to figure out if there are certain 
software applications that have great military or cryptographic 
application that you control. And I think it's getting silly to 
control MTOPS, and I think it's getting silly to control chip 
fencing, whether it's five or 13 microns or whatever. Now, all 
these questions that you're asking really also come down to 
questions on deemed exports. And well, let me give you an 
example. You can study this stuff. I'm a political scientist. 
I'm a military officer. You know, I have done a little bit of 
intelligence work here and there. I'm not an engineer, and I 
never worked in production. And frankly, most consular officers 
on a visa line have not either.
    Ms. Lofgren. They don't know.
    Mr. Wortzel. They don't know. So their education is a very 
important part of it. And here, if you're working in an 
embassy, if you have got a good ambassador or consul general 
he's putting those people in touch with the industry people.
    Ms. Lofgren. Let me just--I know I'm going to run out of 
time. I don't want to be rude. But right now, we have the 
responsibility; the State Department with Commerce does this 
whole list. Just simply by shrinking the list we would help the 
situation to target, it seems. Would you agree Dr. Wulf?
    Mr. Wulf. As long as you shrink it by making it more 
specific. Part of the real problem is here it's a long list or 
its two long lists, and each item on the list is quite generic. 
So you hand this to some poor consular official who doesn't 
have a technical background, and they----
    Ms. Lofgren. Yes it is always easier to say no. You don't 
get called to account for saying no. Only for saying yes.
    Mr. Wulf. Right.
    Ms. Lofgren. The other thing I had, looking at it, the 
slowest part of the whole Visa Mantis program is the FBI. They 
don't have a deadline. And I've often wondered, how much do 
they really have to do? I mean, these are foreign nationals. 
They haven't in most cases been to the U.S.; they're not 
permanent residents. They don't live here. You know, maybe the 
CIA might have something on them, in which case we should get 
that information. But they're not going to be on a rap sheet in 
the FBI's computer. I mean, it just seems to me that if you're 
paying a price by having the top scientists go to other 
countries, having your scientific conferences be shoved abroad, 
or I'll tell you, as I was driving to the airport in 
California, I heard an interview of one of my constituents who 
had a huge telephone network system that he had sold to a 
company abroad. He couldn't get his customer in to teach them 
how to use the system, so he relocated his company to Vancouver 
and left California. So there's a price to be paid on all of 
this. What are we getting for it in terms of security?
    Mr. Wortzel. Well, first of all, I don't think it's wrong 
to ask universities and companies to plan ahead and figure out 
who they're going to invite. So a few months advance notice, 
you know, if you decide tomorrow morning you're going to run a 
conference and you want somebody----
    Ms. Lofgren. Right. No. I don't disagree with that.
    Mr. Wortzel. With respect to--I wouldn't eliminate any part 
of our intelligence or law enforcement community. But I do 
think that of all the agencies, from what I have seen and read 
and experienced, that's the one that can profit the most by a 
systematic automation of the records.
    Ms. Lofgren. Well, it's paper records, and that's why it 
takes so long. I mean, it's pretty shocking that they've still 
got paper.
    Mr. Wortzel. So I wouldn't eliminate it. Instead, I mean, 
you have oversight. That's where I would push for.
    Ms. Lofgren. We've yet to have a hearing on oversight of 
the FBI in the Full Committee in the 10 years I've been on the 
Judiciary Committee. I would just close. I know my time is up. 
We talked about our competitiveness. But if 2 percent of the 
population of China is really, really smart, that's more than 
the entire population of the United States. So that's what 
we're competing against, and we'd better make sure that we've 
got new Americans to do that. And I yield back.
    Mr. Hostettler. I thank the gentlewoman. The Chair 
recognize the gentleman from Iowa, Mr. King, for 5 minutes.
    Mr. King. Thank you, Mr. Chairman.
    I regret that I had to step out of this hearing for a 
period of time, and I missed some of the core of the testimony 
of the witnesses. I thank you all for your testimony and your 
written testimony. I have absorbed some of this testimony when 
the doors were closed and some of it when it's open. And I look 
back at the United States of America in 1959, and I remember 
sitting in the sixth grade when Sputnik went up into space. I 
didn't know at that day, but I found out over the years that I 
had been assigned to, and millions of American students had 
been assigned to, go down the path of science and technology 
and engineering and math and chemistry. And it was, we did an 
all out full court press. We mobilized America to educate our 
young people so that we could prevail in the race to space, and 
in the process of doing so, we also, I believe, laid the 
groundwork to prevail in the Cold War by succeeding 
economically where the Soviet Union was bankrupted and before 
they checkmated us militarily, by the way. And that backdrop of 
the history of what we did in this country to mobilize a nation 
of essentially U.S. citizen students that went into the science 
and technology was the pattern that we had in the past. And I 
would ask, to what level we have a truly, an intellectual 
exchange when we have, I think, far more students here in the 
United States studying science and technology than are studying 
in foreign countries? Is it an exchange, or is it just a 
transfer of our science and technology to foreign countries? 
And then, so then I began to think in terms of what's ahead of 
the next generation of America if we're watching these numbers 
grow. And as Dr. Wulf has testified, 25 to 30 percent of the 
engineering faculty is foreign-born; 37 percent of the 
engineering degrees are foreign-born; one third of the Nobel 
prizes are foreign-born. If that number is growing, and I 
suspect it may be, because more than 50 percent of the 
engineering doctorates are foreign-born. So are we, do we have 
an intellectual transfer here, or are we just slowly 
transferring our intellectual property and our human property 
to foreign countries? A generation from now, are they going to 
need our universities to teach this, or are they going to have 
then established in place an ability to teach that engineering? 
Are we going to send our students there at some point? At what 
point do we reach that critical mass, that tipping point where 
they're not coming to the United States, not because we haven't 
set a climate that says, please come here and learn, but 
because they have now absorbed the science and technology 
necessary for them to be the world leaders? And if we're 
looking at a nation like China, for example, that has 1.3 
billion people and the ability to mobilize all of them if they 
choose or skim the cream off of the crop, get that education, 
bring them back home again, have we already marketed some of 
America's future? And what if--and so within the context of 
that, that generational, what happens in 25 years or 30 or 50 
years? I inject another question. And that is, are the Israelis 
educating Palestinians or Arabs in military or nuclear 
technology or missile technology? Do they have an exchange 
program going on with their neighbors, their people that are 
sworn to kill them and drive them into the sea? I mean, that's 
a little microcosm possibly of this, I'll say, the risk of an 
impending crisis with China and a generation from now. So if 
the Israelis see the wisdom in not doing that with their 
neighbors sworn to their annihilation--and I remember the 
Chinese general that threatened to nuke Los Angeles. And I wish 
Mr. Gohmert were here, because he had a conversation with their 
leadership over there last month to point that out. I pose then 
my question to Mr. Wortzel. Are we thinking generationally in 
this? And what would happen to the future of this country if we 
decided that we didn't want to take a security risk or 
intellectual property risk and wanted to mobilize the young 
people in this country like we did after Sputnik?
    Mr. Wortzel. Well, I would like very much to see 
scholarships targeted toward American students rather than 
bringing foreign students into American universities. 
Particularly when you're dealing with a country that has 790 
something--or $43 billion in foreign reserves. They can afford 
to send their own students to American universities. But 
frankly, I would not keep them out. We do not know the ultimate 
result of our engagement policy with the People's Republic of 
China. It is a latent security threat, and it is certainly a 
real threat in the sense of its strategic nuclear forces 
programs not so much in its conventional forces. But I will 
tell you that there's great change there. The economic freedom 
is opening up. It hasn't resulted in a change in political 
freedom. You find the average, the average Chinese citizen in 
most urban areas, and now that's the majority of them, owns an 
apartment. They have a mortgage. You know, I mean, it's 
changing. So we don't know what the outcome will be. I think 
what we need to do, again, is to identify the most critical 
technologies and military systems--well, not military systems--
but military, dual-use technologies where the United States is 
so clearly ahead and ensure we protect them. But we should not 
be protectionist about keeping Chinese citizens out of this 
country or out of our universities.
    Mr. King. Thank you.
    Dr. Wulf.
    Mr. Wulf. I think we all should put emphasis on how we get 
more U.S. students to study math and science. Just as you 
pointed out, post-Sputnik, it became a national priority, and 
by George, a whole bunch of people from my generation took math 
and science, became engineers and scientists. And we're living 
off of them now. The trouble seems to me, is that science and 
technology is not particularly a priority in this country right 
now. I just got a letter to make a nomination for the 
Millennium Prize. This is a million euro prize that's put up by 
the Finns. Now if I remember correctly, there are 4 million 
Finns. So it's kind of a third of New York City. And they put 
up a yearly million euro prize. We haven't awarded the National 
Medals in Science and Technology for the last 3 years. We've 
named them, but they haven't been awarded. It's not been enough 
of a priority for the President to do that. We have our funding 
for physical science and mathematics, engineering research has 
been flat or declining for 2 decades. Total research budget is 
going up, but it's all going into the life sciences--I just 
read this--as our society as a whole doesn't believe that is a 
priority. And boy that's communicated to the young kids, and 
they don't see that they should be doing all that hard work 
when there's no reward for it.
    Mr. King. Thank you.
    Thank you, Mr. Chairman. I yield back.
    Mr. Hostettler. I thank the Chairman.
    Ms. Jackson Lee. Mr. Chairman, would you yield for just a 
moment?
    Mr. Hostettler. Yes, I yield to the gentlelady.
    Ms. Jackson Lee. Dr. Wulf posed this question before, and I 
won't ask you to repeat it. I'll just make this statement 
because I heard your answer to Congressman King's comments. 
This is not the Science Committee. Both Congresswoman Lofgren 
and myself are Members of the Science Committee. And I would 
simply say that the dearth and the problem is even wider than 
you might have expressed here. There has to be a parallel 
effort in order to surpass or to overcome the dilemma that 
we're in. National security, more resources in intelligence, 
but over here, a ramping up of the training of Americans in the 
sciences and the mathematics and the encouragement of grad 
students and professors and researchers and more dollars in 
basic research. Thank you.
    Mr. Hostettler. The Chair feels compelled to make an 
addition to the record given my background. Being an 
engineering student in the late seventies and early eighties, I 
can't remember a single Federal Government program that 
encouraged me to become an engineer. I do remember the 
influence of family and community and of the economy and the 
fact that I was encouraged to follow my desire to study that 
which I enjoy which is math and physical sciences. It just so 
happened that my graduation also coincided with one of the 
largest build-ups of the United States military where there was 
a huge demand for the applied sciences. And the fact that I 
also graduated at a time when the nuclear industry was, had 
gained ground. But as a result of a very limited number of 
unfortunate incidents in that industry, caused that industry to 
almost evaporate from future growth. Virtually all of my 
encouragement came not from the Federal Government, but came 
from a robust economy and a strong understanding of the strong 
national defense, which all of those needed engineers, and 
there was a tremendous demand for that. I think if we see a, I 
think we can--it's inversely proportional to the level of 
attendance that's been taken on by the Federal Government. 
Since I have been in Congress, as an engineer, I've heard 
continually about this, about the fact that we're spending more 
in the Federal Government on attention to science and 
engineering and that we are getting fewer American scientists 
and engineers. It made, once again--this is not, to reiterate, 
this is not the Science Committee. But this is a Committee that 
is going to look into in the coming months the issue, one of 
the issues that was touched on briefly here, and that is how 
we--what is the relationship between foreign-born, foreign 
nationals and our institutes of higher learning with regard to 
engineering and science and why people aren't doing what they 
did in the late 1970's, and that is going into engineering in 
fairly large numbers. If I remember, the fact that there were a 
few people that were kept out of the programs because of 
restrictions on attendance at that time. So I just make that 
addition simply out of experience.
    And I appreciate the input of all the members of the panel. 
Your testimony has been highly effective and highly beneficial 
to this discussion. All Members will be allowed 2 days to make 
additions to the record. The business before the Subcommittee 
being complete, we are adjourned.
    [Whereupon, at 4:11 p.m., the Subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              


               Material Submitted for the Hearing Record

  Map on the ``Number of Patent Applications and Foreign Students Per 
County,'' submitted by the Honorable John Hostettler, a Representative 
 in Congress from the State of Indiana, and Chairman, Subcommittee on 
                Immigration, Border Security, and Claims



       Prepared Statement of the Honorable Sheila Jackson Lee, a 
Representative in Congress from the State of Texas, and Ranking Member, 
        Subcommittee on Immigration, Border Security, and Claims

    The subject of this hearing is, ``Foreign Nationals Engaged in 
Economic and Military Espionage.'' According to the National 
Counterintelligence Executive Office's report to Congress this year, 
individuals from almost 100 countries attempted to acquire sensitive 
United States technologies in FY2004. The report concludes that foreign 
access to sensitive information with both military and commercial 
applications has eroded the United States military advantage, degraded 
the U.S. Intelligence Community's ability to provide information to 
policymakers, and undercut U.S. industry.
    The report states that we are vulnerable to such espionage because 
the openness of the United States has provided foreign entities with 
easy access to sophisticated American technologies. New electronic 
devices have vastly simplified the illegal retrieval, storage, and 
transportation of massive amounts of information, including trade 
secrets and proprietary data. Globalization has mixed foreign and 
American companies in ways that have made it difficult to protect the 
technologies these firms develop or acquire, particularly when that 
technology is required for overseas operations. Lastly, sophisticated 
information systems that create, store, and transmit sensitive 
information have become increasingly vulnerable to cyber attacks.
    Apparently, the Counterintelligence (CI) Community is uncertain 
about exactly how much of the intelligence collection effort is 
directed by foreign governments and how much is carried out by private 
businessmen, academics, or scientists for purely commercial or 
scientific purposes. It is clear, however, that some foreign 
governments do employ state actors. This includes their intelligence 
services as well as commercial enterprises. Most of the foreign 
governments that are attempting to acquire American technology employ 
tools and techniques which are easy to use, inexpensive, low risk, and 
sometimes legal. In most cases, foreign collectors simply ask for the 
information via e-mail, a phone call, a FAX, a letter, or in person.
    The report asserts further that increased demand for foreign labor 
in United States high-tech industries and the sharp rise in foreign 
investment in the United States over the past decade have given foreign 
governments increased access to American businesses and, consequently, 
to U.S. trade secrets. In addition, recognizing the mutual benefits of 
an unhindered exchange of information, the United States opens its 
military bases, national laboratories, and private defense suppliers to 
foreign visitors. There were more than 14,000 requested visits to 
official U.S. facilities in FY2004. Although facilities hosting foreign 
visitors generally employ security measures to minimize the loss of 
trade secrets and sensitive technologies during these visits, the CI 
Community continues to see reports of losses.
    These are real concerns. Nevertheless, the visits from foreign 
nationals are valuable to American companies and the United States 
government. Also, many American industries need highly educated 
professionals from other countries. The employment of such foreign 
professionals has increased American productivity and resulted in more 
jobs for American workers. In the science-oriented sectors, for 
instance, employers often need a professional with cutting edge skills 
and unique expertise and find that qualified American workers are not 
always available to fill these positions. In other fields, such as 
education, shortages exist in specific areas of the country and 
positions continue to go unfilled.
    Foreign students represent half of all United States graduate 
enrollments in engineering, mathematics, and computer science. We do 
not have enough United States students graduating with advanced degrees 
to fill the highly specialized positions and, according to the Bureau 
of Labor Statistics, the demand for these graduates will increase.
    Foreign countries, such as Germany, have updated their immigration 
laws to attract highly educated talent. If our immigration laws do not 
allow these professionals with cutting edge knowledge to remain in the 
United States, they will go to work for our competitors and additional 
jobs that could have remained in the U.S. will follow them abroad. The 
result will be American jobs lost and American projects losing out to 
foreign competition.
    Thank you.
   New York Times Article submitted by the Honorable Zoe Lofgren, a 
        Representative in Congress from the State of California



    THE NATIONAL COUNTERINTELLIGENCE STRATEGY OF THE UNITED STATES, 
       SUBMITTED BY THE HONORABLE MICHELLE VAN CLEAVE, NATIONAL 
   COUNTERINTELLIGENCE EXECUTIVE, OFFICE OF THE DIRECTOR OF NATIONAL 
                              INTELLIGENCE




 Revised Prepared Statement of Dr. Larry M. Wortzel, Visiting Fellow, 
                        The Heritage Foundation

    Mr. Chairman, Members of the Committee,
    Thank you for the opportunity to testify today on the theft of 
national security sensitive technology in the United States. As a 
former military intelligence officer who has tracked the activities of 
the People's Liberation Army and Chinese intelligence services for 35 
years, I know of no more pervasive and active intelligence threat to 
America's national security than that posed by the People's Republic of 
China. The work force available to the Chinese government and its 
corporations to devote to gathering information in the United States is 
nearly limitless. There are some 700,000 visitors to the United States 
from China each year, including 135,000 students. It is impossible to 
know if these people are here for study and research or if they are 
here to steal our secrets. The sheer numbers defy complete vetting or 
counterintelligence coverage.
    In 2003, for example, the State Department granted about 27,000 
visas to Chinese ``specialty workers,'' the H1-B visa. Some of these 
were intra-company transfers coming to the United States from US firms 
operating in China. Between 1993 and 2003, the United States has 
granted an average of 40,000 immigrant visas to Chinese each year. The 
sheer magnitude if these numbers presents a great challenge to the 
Federal Bureau of Investigation, particularly when the US is also 
concerned about terrorism, which occupies a lot of investigative time 
for agents.
    The Chinese People's Liberation Army and the defense establishment 
in China started programs in the late 1970s and 1980s to create 
companies designed to bring in needed defense technology; the goal was 
to produce defense goods for the PLA and for sale to other countries. 
The General Political Department of the People's Liberation Army 
started a proprietary company, Kaili, or Kerry Corporation, that for 
years operated in the U.S. as a real estate and investment company. The 
General Equipment Department of the PLA operated a proprietary company, 
Polytechnologies, or Baoli, that had offices here in the U.S. In 
addition, the General Logistics Department operated a proprietary 
called Xinshidai, or New Era, that had offices in our nation and 
continues to be responsible for a network on PLA manufacturing plants 
in China. These technically are independent legal entities under 
Chinese law, but the Central Military Commission of the Chinese 
Communist Party established them to serve the interests of the PLA and 
the military industrial complex. Active or retired officers of the PLA 
or their families originally staffed these companies. The PLA and 
related defense science and technology research and development 
organizations in China regularly operate trade fairs to attract 
American high technology into China.
    The Deputy Undersecretary of Defense for Technology Security and 
Counterproliferation has testified that there are between 2,000 and 
3,000 Chinese front companies operating in the United States to gather 
secret or proprietary information, much of which is national security 
technology or information. The deputy director of the Federal Bureau of 
Investigation for counterintelligence recently put the number of 
Chinese front companies in the U.S. at over 3,200. Many of these front 
companies are the spawn of the military proprietary companies discussed 
in the preceding paragraph.
    The nature of the Chinese state complicates the problem of knowing 
what the large numbers of travelers and students from China are 
actually doing. China is still an authoritarian, one-party state led by 
the Chinese Communist Party with a pervasive intelligence and security 
apparatus. The Chinese government is able to identify potential 
collectors of information and, if necessary, to coerce them to carry 
out missions on behalf of the government because of the lack of civil 
liberties in China. Let me quote the first three sentences of Chapter 
1, Article 1, of the Chinese Constitution: ``The People's Republic of 
China is a socialist state under the people's democratic dictatorship 
led by the working class and based on the alliance of workers and 
peasants. The socialist system is the basic system of the People's 
Republic of China. Disruption of the socialist system by any 
organization or individual is prohibited.''
    The People's Republic of China is methodical in its programs to 
gather information from abroad. In March 1986, the PRC launched a 
national high technology research and development program with the 
specific goal of benefiting China's medium and long-term high 
technology development. This centralized program, known as the ``863 
Program'' for the date when it was announced, allocates money to 
experts in China to acquire and develop bio-technology, space 
technology, information technology, laser technology, automation 
technology, energy technology and advanced materials. The 863 program 
was proposed by China's strategic weapons scientists to emphasize 
strategic civil and military technology development. Thousands of 
students and scientists were sent abroad by China over the years to 
pursue critical civil and military, dual-use technologies. This 
practice still continues. When I was at the American Embassy in China 
and conducted due diligence checks to confirm the nature of Chinese 
companies seeking to do high technology business in the United States I 
most often found that the address identified for a company on a visa 
application turned out to be a People's Liberation Army or PRC 
government defense research institute. Thus, the United States faces an 
organized program out of China that is designed to gather high 
technology data and equipment of military use.
    My colleague today, Mr Maynard Anderson, will discuss some of the 
ways that our government and industry can defend against intelligence 
gathering by China through defensive counterintelligence and security 
education programs. It is also important to know that we have other 
programs to screen out people coming to the United States to gather our 
trade or military secrets. In January 1998, the VISAS MANTIS program 
was developed to assist the American law enforcement and intelligence 
communities in securing U.S.-produced goods and information that are 
vulnerable to theft. Travelers are subject to a world-wide name-check 
and vetting procedure when they apply for visas. The security 
objectives of this program are to prevent the proliferation of weapons 
of mass destruction and missile delivery systems; to restrain the 
development of destabilizing conventional military capabilities in 
certain regions; to prevent the transfer of arms and sensitive dual-use 
items to terrorists; and to maintain United States advantages in 
militarily critical technologies. This program operates effectively and 
can vet a Chinese student in as few as 13 days. Non-students may take 
longer, as many as 56 days. However, I can tell you based on my trip to 
China two weeks ago that the American Embassy in Beijing and the 
Consulate in Guanzhou are able to process and vet in about two weeks 
visas for non-student travelers who fully and accurately outline the 
purpose and itinerary of their trip. Still, many U.S. companies 
complain about delays in getting visas for travelers they want to bring 
to the United States. Automation and data-mining software can speed 
visa processing to ensure these companies can be competitive. The 
government also operates a ``technology alert list'' to identify legal 
travelers from China that may benefit from exposure to advanced U.S. 
technology with military application. Of course, the consular officers 
manning visa lines in embassies must be trained to look for signs of 
espionage for screening to be effective.
    Many provinces and municipalities in China now operate high 
technology zones and ``incubator parks'' specifically designed to 
attract back Chinese nationals who have studied or worked overseas in 
critical high technology areas. When students or entrpreneurs return 
with skills or knowledge that the central government deems critical 
they are given free office space in the parks, loans, financial aid, 
and administrative help in setting up a business designed to bring in 
foreign investment and technology. Their companies are given tax 
holidays. Innovative programs such as at Beijing's Zhongguancun High 
Technology Park and Guangzhou's High Technology Economic and Trade Zone 
get central government help. These are admirable programs that will 
develop entrpreneurial skills among well-educated Chinese citizens. 
However, as students and employees of U.S. companies return home, it is 
important to know that they are not taking back American economic or 
military secrets. Good counterintelligence and industrial security 
programs are very important to U.S. security given this threat.
    Mr. Chairman, the enforcement of intellectual property protection 
laws in China is spotty and inconsistent at best. This is one of the 
major complaints of American high technology companies about China's 
compliance with its obligations under the World Trade Agreement. It 
will certainly be a subject discussed by President Bush and Chinese 
President Hu Jintao this week. The tendency to steal intellectual 
property and high technology secrets in China is worsened when 
intellectual property laws are not enforced there. And the problem is 
further exacerbated when centralized Chinese government programs, such 
as the ``863 Program'' I mentioned earlier in my testimony, are 
specifically designed to acquire foreign high techology with military 
application. This only creates a climate inside China that rewards 
stealing secrets.
    I believe that U.S. government security, intelligence and law 
enforcement agencies must focus on the national security. They should 
be looking for acts of espionage and for violations of the Arms Export 
Control Act or the Export Administration Act. When it comes to 
corporate or industrial espionage that is not a matter of national 
security, I believe that the government owes American companies a good 
legal infrastructure to protect trademarks, patents and copyrights; a 
system of education on industrial security; and a strong effort to 
ensure that China meets its own obligations to create a rule of law 
that protects the right of ownership and intellectual property. 
However, I do not believe that American intelligence or security 
agencies should focus on forms of economic espionage that do not 
involve national security information. From the standpoint of 
Congressional action, my view is that the Congress should reconsider 
the Export Administration Act with a view toward ensuring that its 
provisions meet the needs of 21st century technology. The 1979 Export 
Administrtion Act expired in 2001. The Senate passed a new Act in 2001, 
but no revision passed the House. And the Executive Branch must 
regularly review the Commodity Control List to ensure that appropriate 
national security controls on exports protect the nation's security but 
do not unduly restrict the ability of American industry to compete in 
the world market. Generally, technologies that are widely available on 
the world market and not unique to the United States should not be 
unduly restricted unless they can be subject to mulitlateral export 
controls.
    Finally, we cannot become paranoid and suspect that every traveler, 
student and businessman from China is a spy or is out to steal 
technology. Many of the people that come to the United States absorb 
our values and bring them home. We must keep in mind that in earlier 
decades, in places like the Republic of China on Taiwan and in South 
Korea, the steady flow of returning students and immigrants who were 
exposed to American values and principles eventually eroded 
dictatorships and produced multi-party democracies. The prudent course 
of action for the United States is to maintain law enforcement 
programs, counterintelligence programs, security education and 
industrial security programs as the means to protect our nation.
    Thank you for your invitation to testify today.