Knowledge Regulation and National Security in Postwar America


Book Description

The first historical study of export control regulations as a tool for the sharing and withholding of knowledge. In this groundbreaking book, Mario Daniels and John Krige set out to show the enormous political relevance that export control regulations have had for American debates about national security, foreign policy, and trade policy since 1945. Indeed, they argue that from the 1940s to today the issue of how to control the transnational movement of information has been central to the thinking and actions of the guardians of the American national security state. The expansion of control over knowledge and know-how is apparent from the increasingly systematic inclusion of universities and research institutions into a system that in the 1950s and 1960s mainly targeted business activities. As this book vividly reveals, classification was not the only—and not even the most important—regulatory instrument that came into being in the postwar era.




Knowledge Regulation and National Security in Postwar America


Book Description

The first historical study of export control regulations as a tool for the sharing and withholding of knowledge. In this groundbreaking book, Mario Daniels and John Krige set out to show the enormous political relevance that export control regulations have had for American debates about national security, foreign policy, and trade policy since 1945. Indeed, they argue that from the 1940s to today the issue of how to control the transnational movement of information has been central to the thinking and actions of the guardians of the American national security state. The expansion of control over knowledge and know-how is apparent from the increasingly systematic inclusion of universities and research institutions into a system that in the 1950s and 1960s mainly targeted business activities. As this book vividly reveals, classification was not the only—and not even the most important—regulatory instrument that came into being in the postwar era.




Trading with the Enemy


Book Description

In light of the intertwining logics of military competition and economic interdependence at play in US-China relations, Trading with the Enemy examines how the United States has balanced its potentially conflicting national security and economic interests in its relationship with the People's Republic of China (PRC). To do so, Hugo Meijer investigates a strategically sensitive yet under-explored facet of US-China relations: the making of American export control policy on military-related technology transfers to China since 1979. Trading with the Enemy is the first monograph on this dimension of the US-China relationship in the post-Cold War. Based on 199 interviews, declassified documents, and diplomatic cables leaked by Wikileaks, two major findings emerge from this book. First, the US is no longer able to apply a strategy of military/technology containment of China in the same way it did with the Soviet Union during the Cold War. This is because of the erosion of its capacity to restrict the transfer of military-related technology to the PRC. Secondly, a growing number of actors in Washington have reassessed the nexus between national security and economic interests at stake in the US-China relationship - by moving beyond the Cold War trade-off between the two - in order to maintain American military preeminence vis-à-vis its strategic rivals. By focusing on how states manage the heterogeneous and potentially competing security and economic interests at stake in a bilateral relationship, this book seeks to shed light on the evolving character of interstate rivalry in a globalized economy, where rivals in the military realm are also economically interdependent.




Knowledge Flows in a Global Age


Book Description

A transnational approach to understanding and analyzing knowledge circulation. The contributors to this collection focus on what happens to knowledge and know-how at national borders. Rather than treating it as flowing like currents across them, or diffusing out from center to periphery, they stress the human intervention that shapes how knowledge is processed, mobilized, and repurposed in transnational transactions to serve diverse interests, constraints, and environments. The chapters consider both what knowledge travels and how it travels across borders of varying permeability that impede or facilitate its movement. They look closely at a variety of platforms and objects of knowledge, from tangible commodities—like hybrid wheat seeds, penicillin, Robusta coffee, naval weaponry, seed banks, satellites and high-performance computers—to the more conceptual apparatuses of plant phenotype data and statistics. Moreover, this volume decenters the Global North, tracking how knowledge moves along multiple paths across the borders of Mexico, India, Portugal, Guinea-Bissau, the Soviet Union, China, Angola, Palestine and the West Bank, as well as the United States and the United Kingdom. An important new work of transnational history, this collection recasts the way we understand and analyze knowledge circulation.




Knowledge Flows in a Global Age


Book Description

A transnational approach to understanding and analyzing knowledge circulation. Focusing on what happens to knowledge at national borders, rather than treating it as flowing like currents across them, or diffusing out from center to periphery, the contributors to this collection stress the human intervention that shapes and drives how knowledge is processed, mobilized, and repurposed in transnational transactions to serve differing and uneven interests, constraints, and environments. The chapters consider both what knowledge travels and how it travels across borders of varying permeability that impede or facilitate its movement. They look closely at a vast range of platforms and objects of knowledge, from tangible commodities--like hybrid wheat seeds, penicillin, Robusta coffee, naval weaponry, and high-performance computers--to the more conceptual apparatuses of telecommunications, statistics, and food sovereignty. Moreover, this volume decenters the Global North, tracking how knowledge moves along multiple paths across the borders of Mexico, India, Portugal, Guinea-Bissau, the Soviet Union, China, Angola, and Palestine and the West Bank, as well as the United States and United Kingdom. The variety of the kinds of knowledge addressed in the chapters brings forth an extraordinary array of state and non-state actors and institutions committed to performing the work needed to move knowledge across national borders.




Economic Security: Neglected Dimension of National Security ?


Book Description

On August 24-25, 2010, the National Defense University held a conference titled “Economic Security: Neglected Dimension of National Security?” to explore the economic element of national power. This special collection of selected papers from the conference represents the view of several keynote speakers and participants in six panel discussions. It explores the complexity surrounding this subject and examines the major elements that, interacting as a system, define the economic component of national security.




Creating the National Security State


Book Description

For the last sixty years, American foreign and defense policymaking has been dominated by a network of institutions created by one piece of legislation--the 1947 National Security Act. This is the definitive study of the intense political and bureaucratic struggles that surrounded the passage and initial implementation of the law. Focusing on the critical years from 1937 to 1960, Douglas Stuart shows how disputes over the lessons of Pearl Harbor and World War II informed the debates that culminated in the legislation, and how the new national security agencies were subsequently transformed by battles over missions, budgets, and influence during the early cold war. Stuart provides an in-depth account of the fight over Truman's plan for unification of the armed services, demonstrating how this dispute colored debates about institutional reform. He traces the rise of the Office of the Secretary of Defense, the transformation of the CIA, and the institutionalization of the National Security Council. He also illustrates how the development of this network of national security institutions resulted in the progressive marginalization of the State Department. Stuart concludes with some insights that will be of value to anyone interested in the current debate over institutional reform.







Beyond 'Fortress America'


Book Description

The national security controls that regulate access to and export of science and technology are broken. As currently structured, many of these controls undermine our national and homeland security and stifle American engagement in the global economy, and in science and technology. These unintended consequences arise from policies that were crafted for an earlier era. In the name of maintaining superiority, the U.S. now runs the risk of becoming less secure, less competitive and less prosperous. Beyond "Fortress America" provides an account of the costs associated with building walls that hamper our access to global science and technology that dampen our economic potential. The book also makes recommendations to reform the export control process, ensure scientific and technological competitiveness, and improve the non-immigrant visa system that regulates entry into the United States of foreign science and engineering students, scholars, and professionals. Beyond "Fortress America" contains vital information and action items for the President and policy makers that will affect the United States' ability to compete globally. Interested parties-including military personnel, engineers, scientists, professionals, industrialists, and scholars-will find this book a valuable tool for stemming a serious decline affecting broad areas of the nation's security and economy.




Analog Superpowers


Book Description

A gripping history that spans law, international affairs, and top-secret technology to unmask the tension between intellectual property rights and national security. At the beginning of the twentieth century, two British inventors, Arthur Pollen and Harold Isherwood, became fascinated by a major military question: how to aim the big guns of battleships. These warships—of enormous geopolitical import before the advent of intercontinental missiles or drones—had to shoot in poor light and choppy seas at distant moving targets, conditions that impeded accurate gunfire. Seeing the need to account for a plethora of variables, Pollen and Isherwood built an integrated system for gathering data, calculating predictions, and transmitting the results to the gunners. At the heart of their invention was the most advanced analog computer of the day, a technological breakthrough that anticipated the famous Norden bombsight of World War II, the inertial guidance systems of nuclear missiles, and the networked “smart” systems that dominate combat today. Recognizing the value of Pollen and Isherwood’s invention, the British Royal Navy and the United States Navy pirated it, one after the other. When the inventors sued, both the British and US governments invoked secrecy, citing national security concerns. Drawing on a wealth of archival evidence, Analog Superpowers analyzes these and related legal battles over naval technology, exploring how national defense tested the two countries’ commitment to individual rights and the free market. Katherine C. Epstein deftly sets out Pollen’s and Isherwood’s pioneering achievements, the patent questions raised, the geopolitical rivalry between Britain and the United States, and the legal precedents each country developed to control military tools built by private contractors. Epstein’s account reveals that long before the US national security state sought to restrict information about atomic energy, it was already embroiled in another contest between innovation and secrecy. The America portrayed in this sweeping and accessible history isn’t yet a global hegemon but a rising superpower ready to acquire foreign technology by fair means or foul—much as it accuses China of doing today.