Make your work easier and more efficient installing the rrojasdatabank  toolbar ( you can customize it ) in your browser. 
Counter visits from more than 160  countries and 1400 universities (details)

The political economy of development
This academic site promotes excellence in teaching and researching economics and development, and the advancing of describing, understanding, explaining and theorizing.
About us- Castellano- Français - Dedication
Home- Themes- Reports- Statistics/Search- Lecture notes/News- People's Century- Puro Chile- Mapuche



China's intelligence on U.S. nuclear arsenal

Chapter 3 High Performance Computers. This chapter was edited by   Dr. Róbinson Rojas from the House of Representatives release in order to facilitate understanding .

_______________________________________________________________________

Contents

CHAPTER SUMMARY
HIGH PERFORMANCE COMPUTERS
MILITARY OBJECTIVES CONTRIBUTE TO THE PRC'S
INTEREST IN HIGH PERFORMANCE COMPUTERS
U.S. HIGH PERFORMANCE COMPUTERS HAVE
THE GREATEST POTENTIAL IMPACT ON THE PRC'S
NUCLEAR WEAPONS CAPABILITIES

Existing PRC Nuclear Weapons

New PRC Nuclear Weapons

Nuclear Weapons Stockpile Stewardship

TRANSFER OF HPS TECHNOLOGY CAN BENEFIT
PRC INTELLIGENCE CAPABILITIES

Sensors for Surveillance, Target Detection,
and Target Recognition

Sensor Platforms for Aerial and Space-Based Reconnaissance

Cryptology

TRANSFER OF HIGH PERFORMANCE COMPUTER TECHNOLOGY
TO THE PRC COULD CONTRIBUTE TO THE MANUFACTURE
OF WEAPONS OF MASS DESTRUCTION, MISSILES,
AND OTHER WEAPONS

Missiles

Chemical and Biological Weapons

Information Warfare

TRANSFER OF HIGH PERFORMANCE COMPUTER
TECHNOLOGY TO THE PRC COULD SUPPORT ATTAINMENT
OF OTHER PRC MILITARY OBJECTIVES

Command, Control, and Communications

Meteorology for Military Operations

Cartography for Military Operations

Military Training Systems

NATIONAL SECURITY IMPLICATIONS OF HIGH PERFORMANCE
COMPUTER USE BY THE PRC MILITARY
U.S. EXPORT POLICY HAS GRADUALLY RELAXED CONTROLS
ON HIGH PERFORMANCE COMPUTERS

Some Reviews That Contributed to High Performance Computer Policy Changes in 1996 Have Been Criticized

The Stanford Study

Defense Department Review of
Military Applications for HPCs

Institute for Defense Analyses Technical Assessment

Defense Department Proliferation Criteria

Details of the 1996 High Performance Computer Export Control Policy Changes

Export Administration Act Provisions and Export Administration Regulations Currently Applicable to
High Performance Computers

The Second Stanford Study

Arms Export Control Act Provisions and International Traffic in Arms Regulations Currently Applicable to Computers

CONCERNS OVER HIGH PERFORMANCE COMPUTER
EXPORTERS' ABILITY TO REVIEW END-USERS IN THE PRC
PROMPTED THE REQUIREMENT FOR PRIOR NOTIFICATION

The U.S. Government Has Conducted Only One End-Use Check for High Performance Computers in the PRC

Some U.S. High Performance Computer Exports to the PRC Have Violated U.S. Restrictions

New World Transtechnology

Compaq Computer Corporation

Digital Creations

Lansing Technologies Corporation

HIGH PERFORMANCE COMPUTERS AT U.S. NATIONAL WEAPONS LABORATORIES ARE TARGETS FOR PRC ESPIONAGE

U.S. National Weapons Laboratories Have Failed to Obtain Required Export Licenses for Foreign High Performance Computer Use

PRC Students Have U.S. Citizen-Like Access to High Performance Computers at the National Weapons Laboratories

MANY TYPES OF COMPUTER TECHNOLOGY HAVE
BEEN MADE AVAILABLE TOTHE PRC THAT
COULD FACILITATE RUNNING PROGRAMS OF
NATIONAL SECURITY IMPORTANCE
THE PRC HAS A LIMITED CAPABILITY TO PRODUCE
HIGH PERFORMANCE COMPUTERS
U.S. HIGH PERFORMANCE COMPUTER EXPORTS
TO THE PRC ARE INCREASING DRAMATICALLY
THE PRC IS OBTAINING SOFTWARE FROM
U.S. AND DOMESTIC SOURCES
POTENTIAL METHODS OF IMPROVING END-USE VERIFICATION

Tagging

Technical Safeguards

Other Possibilities

TECHNICAL AFTERWORD: Changing High Performance Computer Technology Is Making Export Control More Difficult
NOTES

Summary

High Performance Computers (HPCs) are important for many military applications and essential for some. Although there is limited information on how the PRC is using HPCs for military applications, HPCs could facilitate many of the PRC's military modernization objectives.

PRC organizations involved in the research and development of missiles, spacecraft, submarines, aircraft, military system components, command and control, communications, and microwave and laser sensors have obtained HPCs from the United States. Given the lack of a proven and effective verification regime, it is possible that these HPCs have been diverted for unauthorized uses, which could include the following:

· Upgrading and maintaining nuclear and chemical weapons

· Equipping mobile forces with high-technology weapons

· Building a modern fleet of combat and combat-support aircraft and submarines

· Conducting anti-submarine warfare

· Developing a reliable, accurate ballistic and cruise missile force

· Equalizing a battlefield with electronic or information warfare

· Improving command, control, communications, and intelligence capabilities

To realize the full potential of the acquired HPCs, the PRC must be able to perform system integration, develop or procure application software, obtain weapon systems test data, and institute quality-controlled production processes. The contribution of HPCs to military modernization is also dependent on related technologies such as telecommunications and microelectronics.

The Select Committee judges that the PRC has been using high performance computers for nuclear weapons applications. The computer workstations recently acquired from the U.S. represent a major increase in the PRC's computing power. Although not necessary to design nuclear warheads, HPCs of 2,000 million theoretical operations per second (MTOPS) or more can be used for such applications. In addition to nuclear weapons design, another major concern is how the PRC can use U.S. HPCs to improve and maintain its nuclear weapons.

If the PRC complies with the Comprehensive Test Ban Treaty, then its need for HPCs to design, weaponize, deploy, and maintain nuclear weapons will be greater than that of any other nation, according to the U.S. Department of Energy. The exact extent to which HPCs can assist the PRC depends in part on the goals of the PRC nuclear weapons program and the degree of uncertainty it is willing to accept in warhead performance.

HPCs are useful to the two- and critical to the three-dimensional computer modeling that is necessary for the PRC to develop, modify, and maintain its nuclear weapons in the absence of testing. The utility of such modeling depends on the amount of data available from tests, the computing capacity that is available, and programmer expertise. Complete three-dimensional models, critical to stockpile maintenance and assessment of the effect of major warhead modifications in the absence of testing, require HPCs of one million MTOPS or more. Assessing the effects of a new warhead without testing would require three-dimensional modeling. In the absence of physical testing, two dimensional models are important for estimating the effects of less substantial changes to warhead designs, although the utility of such modeling decreases as the designs become more sophisticated. However, the fidelity of any two-dimensional model is inherently limited, and some level of uncertainty will always remain. Should the PRC resume physical (rather than virtual) nuclear testing, the resulting data would permit more accurate two-dimensional modeling of subsequent design changes. Although HPCs in the 2,000 to 10,000 MTOPS range are useful for such modeling, their precise utility for such applications is unclear. These HPCs may be powerful enough to help the PRC make use of design information that it stole from the United States, including design information for the W-70 neutron bomb and the W-88 Trident D-5 thermonuclear warhead - without further physical testing.

The U.S. Government, citing rapid advances in computer technology, has steadily relaxed export controls on HPCs. A Stanford University study commissioned by the U.S. Government was a key element in the relaxation of export controls on HPCs in 1996. The study concluded that U.S.-manufactured computer technology between 4,000 to 5,000 MTOPS was uncontrollable worldwide and would become available worldwide at 7,000 MTOPS by 1997. The study also concluded that many HPC applications used in U.S. national security programs occur at about 7,000 MTOPS and at or above 10,000 MTOPS. Criticisms of this and other studies that were used to justify the 1996 HPC export control policy changes focus on flaws in the methodology of the studies and the lack of empirical evidence and analysis to support their conclusions. These critics also claim that the U.S. Government revised the export controls on HPCs without having adequate information on how countries of concern would use HPCs for military and proliferation activities.

Until June 1998, the U.S. Government's ability to verify the location and use of HPCs in the PRC was blocked by the PRC's resistance to post-shipment, on-site verification visits. A new agreement affords the U.S. Government the right to request access to some American HPCs, but includes substantial limitations on such requests and any visits. Moreover, the post-shipment visits that are allowed can verify the location of an HPC, but not how it is used.

Rapid advances in computer technology have altered traditional concepts of what constitutes an HPC. Observers in the computer industry and academia state that HPC-level performance can be obtained by linking together inexpensive commodity processors. For some applications the efficiency and effectiveness of the linked commodity processors depends on the application, skill of the programmer, and interconnection software. The resources and time needed to effectively modify and operate significant defense applications for such linked systems have not yet been demonstrated. Nonetheless, the U.S. is pursuing research and development on the use of linked systems for three-dimensional modeling for nuclear stockpile maintenance.

While it is difficult to ascertain the full measure of HPC resources that have been made available to the PRC from all sources, available data indicates that U.S. HPCs dominate the market in the PRC and there really is no domestic PRC HPC industry. While the PRC has a large market for workstations and high-end servers, there is a smaller market for parallel computers that is entirely dominated by non-PRC companies such as IBM, Silicon Graphics/Cray, and the Japanese NEC. However, there continues to be significant market resistance to Japanese HPC products in Asia, especially as U.S. products are beginning to have significant market penetration. The PRC has assembled several HPCs in recent years, using U.S.-origin microprocessing chips. The latest such HPC may perform at 10,000 MTOPS. However, the PRC's HPC application software lags farther behind world levels than its HPC systems.

Since the 1996 relaxation of U.S. export controls on HPCs, U.S. sales of HPCs between 2,000 and 7,000 MTOPS to the PRC have burgeoned. Of computers not requiring licenses under the 1996 regulations, 23 HPCs in this performance range were exported in 1996 and 123 in 1997. An additional 434 HPCs were to be exported in the first three quarters of 1998. Between 1994 and 1998, the U.S. Government approved licenses for 23 HPCs greater than 2,000 MTOPS.

Thus, the PRC may have received a total of 603 U.S. HPCs since 1996. In 1998, the United States approved licenses for two HPCs in excess of 10,000 MTOPS. Approximately 77 percent of the U.S. HPCs that have been exported to the PRC were under 4,000 MTOPS.

The aggregate of these computational resources is complemented by millions of non-export controlled low-end machines ­ about 4.5 million desktops, portable personal computers, personal computer servers, and workstations in 1998 alone. Ninety percent of these machines are being used by the PRC Government, industry, and educational institutions. About 60 percent of these machines are being produced by PRC companies.


HIGH-PERFORMANCE
COMPUTERS

High Performance Computers (HPCs) are useful in a broad range of applications. These include pharmaceutical development, automobile crash modeling, aerospace engineering, petrochemical research, financial market and credit analysis, weather prediction, academic research, and national security applications.

A recent report by the Defense Department defines high performance computers as:

the mid-range of the speed scale. These computers are used for internet servers, Local Area Network (LAN) servers, affordable number crunchers, Computer Aided Design (CAD)/Computer Aided Manufacturing (CAM), publishing, billing, databases, data mining, banking, and much more. Presently these
computers are in the speed range of 1500 - 40,000
Millions of Theoretical Operations Per Second (MTOPS).1

Current U.S. export controls define HPCs by establishing the threshold for license consideration at 2,000 or more MTOPS.

In the realm of national security, HPCs are valuable in the design, development, manufacturing, performance, and testing of weapons and weapons platforms. These systems include:

· Nuclear, chemical, and biological weapons

· Tactical aircraft

· Cruise and ballistic missiles

· Submarines

· Anti-submarine warfare

· Command, control, and communications

· Information warfare

HPCs are also useful in the collection, processing, analysis, and dissemination of intelligence and in the encryption or decryption of communications.2

In addition, military applications such as target tracking and recognition, radar mapping, armor and anti-armor design, protective structures, aerodynamics, real-time modeling, and tactical weather prediction are substantially facilitated by the use of HPCs.3

While a broad array of potential applications for HPCs is known, the specific ways in which potential adversaries of the United States are using them is much harder to determine. For example, a 1998 study of the viability of U.S. export controls on HPCs stated:

It is difficult to acquire good information on the use of HPC[s] for national security-related applications by countries of national security concern. This is true whether one assumes foreign practice is the same as U.S. practice, or foreign practice involves different or more clever ways that might not have the same computing requirements.4

In short, there is limited information about how specific countries of national security concern, including the PRC, use HPCs.5

Another complicating factor in determining whether and how HPCs are being used by the PRC and others for national security applications is ambiguity as to the HPC performance minimally required for specific applications. Researchers are usually interested in improving their applications if they have access to more computing power. Therefore, the "bigger and faster" computers are, the better. Speed helps make optimum use of a researcher's time.6 Many computer programs can be executed on less capable computer hardware, although there may be penalties in level of detail and turnaround time.7

The requirement to use the most powerful computers available may also be closely related to program economics.8 The use of less powerful computers leads to longer processing runs. This situation leaves expensive people and facilities idle, making the purchase of an expensive HPC necessary to employ all the resources available efficiently.9

There are many potential national security applications for which the PRC could use HPCs. The following figure10 shows that the U.S. defense community uses HPCs for national security applications over a full range of MTOPS performance levels. Although nearly 44 percent of the applications currently being run in the U.S. defense community are being run at performance levels below 7,000 MTOPS, many critical applications require processing power in excess of that threshold. The relative importance of the national security applications cannot be ascertained based on the MTOPS requirement.11 As newer computer systems with increased performance become available to the market, an increasing number of applications will appear in the higher MTOPS range (that is, above 30,000 MTOPS).12 These applications will be similar to current applications, but will require greater resolution or ability to address larger-sized problems than is possible on current systems.13

U.S. HPCs recently sold to PRC organizations are useful for a number of military purposes including:

· Information warfare

· Cryptography

· Military command and control

· Intelligence collection

· Intelligence instrument research and development

· Development of high technology

· Ballistic and cruise missiles

· Ballistic missile defense

· Mobile force development

· Designing submarine nuclear reactors

· Combat simulation

These PRC organizations are engaged in governmental, military, academic, and commercial work. In the absence of an end-use verification regime, the United States has no means of determining to what use a particular HPC is applied by such PRC organizations.

 

Military Objectives Contribute to the PRC's
Interest in High Performance Computers

PRC military objectives require superior battlefield management, including:

· Intelligence

· Surveillance

· Reconnaissance

· Guidance and control

· Communications

They also require superior weapons and platform design, testing, and maintenance. Satisfying these requirements can be facilitated by HPC capabilities.14

The PRC is seeking HPC software for:

· Satellite launch and missile guidance simulation

· Computer assisted design and manufacturing systems

· System simulators

· Applications of artificial intelligence15

The PRC is convinced that the United States has the most advanced HPC technology. Thus, it seeks to acquire as much of it as it can without jeopardizing PRC national security interests by, for example, becoming susceptible to computer viruses and information attacks.16

The specific ways the PRC is using HPCs for military applications is difficult to determine.17 During this investigation, reports regarding the PRC's military objectives, information concerning the application of HPCs in support of national security objectives, and data concerning HPC sales to the PRC were analyzed.

The results of this analysis provide a basis for assessing the risk to U.S. national security and regional security interests that accrues from the PRC's acquisition of HPCs. This assessment is summarized in the following paragraphs.

 

U.S. High Performance Computers Have the Greatest Potential Impact On the PRC's
Nuclear Weapons Capabilities

The Department of Energy judges that the PRC's acquisition and application of HPCs to nuclear weapons development have the greatest potential impact on the PRC's nuclear program. This is particularly true since the PRC has agreed to the ban on nuclear testing.18

Existing PRC Nuclear Weapons

The computing power required to simulate the performance of a specific nuclear weapon depends on the sophistication of the design, and the availability of nuclear and non-nuclear test data for the new and aging materials the weapon contains.19

For existing weapons with supporting test data, more powerful computing resources allow simulations that include more physical processes and more fundamental representations.20

One means of enhancing model fidelity - the extent to which the model accurately represents the real phenomena - is to represent all dimensions of the process being modeled.

The explosion of a nuclear weapon is a three-dimensional process that cannot be accurately represented in one or two dimensions. Augmenting model fidelity by shifting from two to three dimensions requires an increase in computer performance capacity to one million MTOPS.21

Results from higher-fidelity models allow scientists and decision-makers to develop a better estimation and understanding of the reliability and performance of the weapon.22

Another factor bearing on model fidelity and confidence in model results is the extent to which the model has been validated. Validation consists of running a simulation of a previously conducted test, and verifying that the computed results are close to the test results. The more the simulated situation differs from the actual test, the less confidence can be placed in the computed results.23

The fewer the tests that have been conducted, the more gaps there are in the understanding of nuclear weapons science.24

HPCs may help scientists gain insight and understanding by allowing many simulation runs to be conducted, changing one variable value at a time to create a range of solutions for comparison to test data. HPCs allow those calculations to be completed in an acceptable length of time.25

The following table illustrates HPC performance demand as a function of model complexity, test data, and weapons maturity. Row 1 of the table focuses on a full exploration of the weapons design category with data from tests of pristine and aged weapons. Row 2 of the table assumes the number of tests dedicated to each warhead class is between one and six. Row 3 assumes few proof-of-concept tests or zero nuclear tests conducted of the design after components have aged for ten years.

* If PRC has obtained U.S. or Russian nuclear test codes.

Ý The PRC is known to possess some test data for certain advanced nuclear weapons, but may be without test data for others.

As the table indicates, the PRC's demand for HPCs covers a broad range of computing capability, and it is unclear where the PRC's requirements fall within that broad range.

To date, the most powerful HPCs exported to the PRC from the U.S. - two in 1998 - have been at the 10,000 MTOPS level.

Even HPCs in the 2,000 to 10,000 MTOPS range are useful for nuclear weapons applications, although their precise utility is dependent on the amount of test data the PRC possesses.

New PRC Nuclear Weapons

The PRC's nuclear weapons program has advanced rapidly, largely through the theft of U.S. nuclear weapons design information.

Originally, the PRC built large, heavy nuclear weapons for air or missile delivery. The PRC is now moving to new generation nuclear weapons, and has been significantly assisted by the theft of U.S. design data. These new nuclear weapons are smaller, lighter, and have higher yield-to-weight ratios.27 The Select Committee judges that the PRC has the infrastructure and ability to use the stolen U.S. design information to emulate elements of U.S. thermonuclear warheads for its next generation of thermonuclear warheads.

HPCs could be valuable to the PRC in connection with the production of these next generation nuclear weapons based on elements of U.S. design information, because they would enable scientists to examine many values for many uncertainties quickly.28

Similarly, HPCs could be useful in connection with maintaining the current PRC nuclear weapons stockpile for which test data exist, although the exact MTOPS range needed is uncertain. HPCs would permit analysis of any uncertainty with respect to the performance of these weapons.29

In addition, as military missions evolve and delivery platforms develop, the PRC may be forced to make modifications in tested designs to accommodate new size and weight goals. For example, a PRC focus on small-scale regional conflict would suggest the development of compact, low-yield nuclear devices. Evaluating the effects of these design changes would require sophisticated computer models run on HPCs. If the changes to the PLA's nuclear weapons are significant, the need for modeling accuracy would require three-dimensional testing, possible only with computers that have a performance capability of a million MTOPS or more. For less extensive changes, including any changes required to weaponize new nuclear warhead designs that the PRC has already successfully tested, two-dimensional modeling may be sufficient. HPCs as low as 2,000 to 7,000 MTOPS are helpful in such applications, although the optimal MTOPS level required for such modeling is unclear.

Nuclear Weapons Stockpile Stewardship

Assuming compliance with the Comprehensive Test Ban Treaty, the designers of new or modified PRC nuclear devices will have to certify the performance of aging weapons by using a combination of treaty compliant experiments and computer simulations.30

Identifying, predicting and mitigating the effects of aging on nuclear weapons is computationally intensive, requiring three-dimensional modeling and simulation involving many uncertainties. For the PRC, the computing demands are even greater because of the limited amount of nuclear test data to support the modeling.

Thus, HPCs at high MTOPS levels would be particularly useful in helping explore many values for many variables quickly.31 As the United States is finding with its Stockpile Stewardship Program, maximum HPC performance in the range of millions of MTOPS is necessary for three-dimensional modeling of the aging of nuclear weapons.

For this reason, the Select Committee judges that the PRC is almost certain to use U.S. HPCs to perform nuclear weapons applications. Moreover, the PRC continues to seek HPCs and the related computer programs (known as codes) for these applications.

The U.S. national weapons laboratories are currently modernizing their test data or "legacy codes" based on data from the large number of U.S. tests. The Select Committee judges that if the PRC were to acquire nuclear test codes and data from the United States, then the PRC could access empirical data from the large number of U.S. tests that were conducted before the Comprehensive Test Ban Treaty.

The possession of stolen U.S. test data would greatly reduce the level of HPC performance required.

It is also likely that the PRC seeks access to the Los Alamos National Laboratory-based Dual Axis Radiographic Hydrodynamic Test Facility, for the reason that it uses powerful X-rays to analyze the effects of implosions during non-nuclear tests.

The PRC is also likely to seek information regarding the use of lasers for high energy density studies.

Transfer of HPC Technology Can Benefit PRC Intelligence Capabilities

The PRC is improving its capabilities in intelligence collection and unmanned aerial vehicles. The PRC is also a user of encryption technology in its government networks.32 HPCs are useful in the design and operation of intelligence collection platforms, including unmanned aerial vehicles, and are essential to running the computer codes that process intelligence data and perform encryption tasks.

Sensors for Surveillance, Target Detection,
and Target Recognition

Radars, acoustic and non-acoustic sensors, and signal and image processing appear to be continuing targets for acquisition by the PRC.33

Based on U.S. experience, HPCs can be used to facilitate research and development of sensors for surveillance, target detection, and target recognition. Use of HPCs in this manner results in sensor systems that are more capable of detecting stealthy platforms, such as aircraft, missiles, and submarines.34

In the design phase, these applications can be computationally intensive, depending upon the level of realism required. For example, U.S. computational requirements range from 500 to over 40,000 MTOPS.35

Also, many of the resultant systems require HPCs and advanced software for their operation. For example, a deployed X-band phased-array radar for ballistic missile search, fire control, and kill assessment requires an HPC to control the radar, detect, identify, and track targets, and compute fire control solutions of multiple high-speed targets.36

In general, timely detection of targets using radar requires homogeneous, tightly coupled systems. The radar system functions by creating images of remote objects and processing the resulting images for review by humans or input into automated guidance or decision support systems. This operation is computationally intensive since large volumes of data must be filtered, enhanced, and interpreted, often in real time.37

In the United States, some radar processing applications - for example, the processing of data from synthetic aperture radars - require 32,000 to 115,000 MTOPS.38 Although less capable computers may be useful for these applications, they are not suitable for operational environments that require real-time detection of targets with weak radar signatures, or target discrimination in high target-density environments. Further, radar system performance requires high-quality target templates and empirical validation, in addition to HPC processing speed.39

Sensor Platforms for Aerial and Space-Based Reconnaissance

The PRC is interested in acquiring unmanned aerial vehicles (UAVs) that are used for day/night aerial reconnaissance, battlefield surveillance, target positioning, artillery spotting, border patrol, nuclear radiation sampling, and aerial photography.40

The HPC challenge is to provide a sufficient on-board-sensor data processing capability to allow wide-area searches at high resolution, while minimizing communications requirements.41

Satisfying such sensor data processing requirements could also be of value to the PRC's efforts to improve space-based information gathering capabilities.42

Cryptology

Another potential application of HPCs by the PRC is cryptology - the design and breaking of encoded communications. This application demands fast processing, and the ability to handle large amounts of data. As a point of reference, the U.S. National Security Agency uses some of the highest performance computers available. However, significant cryptologic capabilities can be achieved through the use of widely available computer equipment, such as networked workstations or parallel processors.43

 

Transfer of High Performance Computer Technology To the PRC Could Contribute to the Manufacture of Weapons of Mass Destruction, Missiles,
and Other Weapons

While there is little information regarding the specific ways that HPCs are being used in the PRC to achieve military objectives,44 open source reporting and stated PRC military modernization goals tend to support the belief that the PRC could be using HPCs in the design, development, and operation of missiles, anti-armor weapons, chemical and biological weapons, and information warfare technologies.45

Missiles

The PRC is developing advanced cruise missiles, anti-ship missiles, and conventional short-range ballistic missiles (SRBMs).

While the PRC could design, for example, a stealthy cruise missile without using HPCs, HPCs facilitate the design of such weapons, particularly in exploring guidance and stealth concepts.46 For instance, the Beijing Simulation Center is using hardware-in-the-loop testing in the development of homing guided missiles. Given that such testing involves near real-time processing, HPCs are particularly useful.47

The PRC is also developing new tanks, and new multiple-launch rocket systems. HPCs are useful for executing the detailed, physics-based simulations of weapons effects. Such simulations are useful in assessing the effectiveness and vulnerabilities of these new systems. The calculations are complex, and HPCs are required for efficient processing.48

Chemical and Biological Weapons

The PRC has mature chemical and biological weapons programs that have produced a variety of chemical and biological agents since the 1960s. Such weapons could serve deterrent, retaliatory, or offensive purposes.49

Computer-aided design and computer-aided manufacturing (CAD/CAM), a classic use of HPCs, would be useful in planning and designing the integration of chemical warfare agent development processes with chemical industries.50 This possibility is consistent with papers published by PRC scientists concerning chemical and manufacturing processes.51

The PRC can deliver chemical and biological agents with a variety of weapons systems, including missiles and artillery. Since the PRC can employ a variety of delivery means for such agents, key operational considerations for the PRC include how dispersion patterns vary as a function of delivery method and weather. This is a computationally demanding area in which HPCs are extremely useful.

The Select Committee concludes from evidence it has received that the PRC is interested in HPC modeling of dispersion patterns of chemical and biological weapons based on different weapons delivery systems and varying weather conditions.52 In addition, the PRC could be employing HPCs to model the negative effects on the opponent of casualties, and of cumbersome protective gear for a given dispersion pattern of chemical and biological weapons.53

Finally, the PRC may also be using HPCs to design chemical agent detection sensors and protective measures. Such applications can require computational power ranging from 2,000 to 30,000 MTOPS.54

Information Warfare

Several PRC scholars and leading military strategists indicate that the PRC has an ambitious, albeit nascent, offensive information warfare program. Currently, the PRC's primary focus for information warfare is military conflict. Concluding that information is becoming a key determinant of military power and victory in war, the PRC has identified the development of information warfare capabilities as a key modernization goal of the PLA.

The PRC should . . . fully bring into play the guiding role of information warfare research in building the military and seek measures by which to launch vital strikes in future warfare, so as to damage the enemy's intelligence gathering and transmission abilities, and weaken the enemy's information warfare capacity.55

HPCs could prove valuable to the PRC in the evolution of this strategy by exploring U.S. information networks and their vulnerabilities, and the technologies that are associated with information warfare such as jammers, microwave weapons, and anti-satellite weapons.56


 

Transfer of High Performance Computer Technology To the PRC Could Support Attainment Of Other PRC Military Objectives

The effectiveness of military operations depends heavily on support functions that include:

· Command, control, and communications

· Weather prediction

· Cartography

· Combat forces training57

HPCs can be used to enhance all of these functions.

In military operations, size, weight, and power consumption limitations are all stressing requirements that may necessitate the use of customized or embedded HPCs, rather than commercially available systems.58

Command, Control, and Communications

Leading PRC military strategists and political/military scholars in the PRC have publicly recommended that the PLA give high priority to the development of improved automated command, control, and communications networks.59

The recommendations include:

· That the command, control, and communications system at and above the battalion level of various service arms be turned into an integrated mutually linked network

· That the traditional vertical and tiered command system be converted into a network command structure, in order to meet the demands of time and flexibility in command

· That the centralized type command system should be developed into a dispersed command60

Another PRC writer has stated that multi-dimensional interconnected networks on the ground, in the air (and outer space), and underwater - as well as terminals, modems, and software - are not only instruments, but also weapons.61

The PLA has begun research on the technologies necessary to develop an Integrated Battlefield Area Communications System.62 In addition, research is underway on related subjects such as real-time intelligent decision-making for fighter aircraft maneuver simulation systems.63

Full implementation of these goals will require exceptional computational power. However, this power can be efficiently provided by distributed computer systems.64 Battle management functions are also readily scalable, making them suitable for initial implementation on commercially available computer equipment.

Meteorology for Military Operations

Weather modeling and prediction is essential in military operations in that it effects force deployments, protection against chemical, biological, and nuclear environments, weapons effectiveness, and logistics.65

While a typical global weather model with 75-mile resolution can be executed on a workstation with performance in the 200 MTOPS range, typical tactical weather models with 30-mile resolution require computers rated in excess of 10,000 MTOPS. Calculation of weather forecasts in littoral areas to resolve complex air-ocean interactions is even more demanding.66

Cartography for Military Operations

Depending on the perceived requirements of military commanders, cartography requires high computational levels. For instance, processing topographic data in a timely manner to support military operations may require up to 24,000 MTOPS. For military planning purposes in which time is not a factor, cartographic applications can be accomplished at lower MTOPS levels - less than 4,600 MTOPS - and computer hardware can be selected based on cost rather than speed and memory capacity.67

Military Training Systems

Research underway at the PRC's Harbin Institute of Technology indicates the PRC is focused on large-scale training systems.68 The computer performance requirements in this regard depend on the level of fidelity that is needed, the complexity of the training objectives, and the time that is available. For training objectives that require realism and representation of large-scale forces, HPC performance may exceed 10,000 MTOPS.69

 

National Security Implications of High Performance Computer Use by the PRC Military

The Select Committee judges that the PRC is attempting to achieve parity with U.S. systems and capabilities through its military modernization efforts. The PRC intends by this effort to increase its regional power projection capabilities and augment its ability to hold the neighboring countries of Taiwan, India, and Japan at risk.

The PRC's use of HPCs for its military modernization poses risks to U.S. national security. Significant improvements in PRC information warfare and military operations may increase the threat to U.S. military systems and personnel in a way that cannot be easily countered.70 HPCs of varying capability could assist the PRC in this endeavor.71

Further, the PRC is likely to modernize its nuclear arsenal, with the help of HPCs. In this regard, it is believed that, if the PRC maintains its current path, it will still be a second-class nuclear power compared to the United States and Russia for the next several decades. However, if Washington and Moscow were to reduce their nuclear forces to about 1,000 warheads, as President Yeltsin has suggested, the PRC could conceivably expand its nuclear forces in an attempt to reach numerical parity.

The PRC's continuing chemical and biological weapons programs, and improvement of weapons delivery platforms such as cruise missiles, may also be the beneficiaries of increased HPC capability. Continued development or use of chemical or biological weapons by the PRC could have serious strategic and tactical implications for the United States.72

If it is to fully exploit HPC hardware capabilities for military applications, the PRC requires improved system integration, quality production processes, and development of doctrine and tactics.73 The PRC also requires technologies that are interdependent with HPCs in military applications, such as telecommunications and microelectronics.

Control or monitoring of these HPC-related services and technologies may provide additional opportunities to influence the pace of the PRC's attainment of its military modernization objectives.

 

U.S. Export Policy Has Gradually Relaxed
Controls on High Performance Computers

In 1988, exporters of HPCs were required to obtain a Department of Commerce license to export computers with a performance level - called a Composite Theoretical Performance (CTP) - of 12.5 MTOPS or more to most destinations. A supercomputer was defined as any computer with a performance level of 195 MTOPS or greater.74

Foreign policy controls were imposed on supercomputers performing at 195 MTOPS and higher in May 1992, based on a bilateral arrangement with Japan, the other major supercomputer-exporting country.75

As required by the Export Enhancement Act of 1992, the Trade Promotion Coordinating Committee submitted to Congress a report entitled "Toward a National Strategy" in September 1993.76 That report presented a strategic plan that included as one key element changing the standard for a supercomputer from 195 MTOPS to 2,000 MTOPS.77

In February 1994, the Department of Commerce raised the licensing threshold for the export of supercomputers to most destinations from 195 MTOPS to 1,500 MTOPS or higher. At the same time, the United States announced that it had reached agreement with Japan, the other partner in the "supercomputer regime," regarding the new supercomputer definition of 1,500 MTOPS. The United States also announced that it would continue to seek Japan's agreement to further increase the supercomputer threshold to 2,000 MTOPS.78

In April 1994, the Department of Commerce established a new General License "GLX," which would allow certain shipments of any items, including computers up to 1,000 MTOPS that formerly required an individual validated license, to civil end users and nonproliferation end uses in formerly proscribed destinations, including the PRC. The purpose of the new general license was to reduce paperwork and licensing delays for exporters, while focusing controls on exports of "direct strategic concern." The Department of Commerce stated that it established the "GLX" designation to bridge the transition between the termination of COCOM in March 1994 and the establishment of a successor regime.79

In January 1995, the Department of Commerce again revised certain supercomputer requirements. Specifically, Commerce noted that it would conduct annual reviews of the supercomputer definition, threshold levels, safeguards, supercomputer country groupings, and supercomputer licensing requirements. The reviews would examine HPC controls in light of national security and proliferation concerns, technical advancements, and changes in market conditions, and would consider recommendations to revise the controls. The regulations included the following country requirements:

· A "general license" - meaning no license required - was available for all supercomputer exports to supplier countries, which then included only Japan

· A validated license or re-export authorization was required to export, re-export, or transfer within the country for: Australia, Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, and the United Kingdom

· In addition to a validated license or re-export authorization, a safeguard plan signed by the ultimate consignee, and a certification from the government of the importing country (for supercomputers equal to or greater than 1,950 MTOPS) was required for several countries. These included Austria, Finland, Iceland, Mexico, Singapore, the Republic of Korea, Sweden, Switzerland, and Venezuela

· A validated license or re-export authorization was required to export or re-export supercomputers to the PRC, and applications were generally to be denied. In the event a license was issued, it would include among the licensing conditions certain safeguards selected from the security conditions listed in the Export Administration Regulations80

Some Reviews That Contributed to High Performance Computer
Policy Changes in 1996 Have Been Criticized

On January 25, 1996, after the first periodic review, the Department of Commerce published revised controls for computers in the Export Administration Regulations and identified four computer country groups for export purposes. In announcing the January 1996 revision, the Executive branch stated that one goal of the changes was to permit the government to calibrate control levels and licensing conditions to the national security or proliferation risk posed at a specific destination.81

The Stanford Study
A key element of the 1995 Executive branch review of HPC export controls was a Stanford University study that was commissioned jointly by the Commerce and Defense Departments.82 Among other things, the study was tasked to assess the availability of HPCs in selected countries, and the capabilities of those countries to use HPCs for military and other defense applications.83 The study, released in November 1995, concluded:

· U.S.-manufactured computer technology between 4,000 and 5,000 MTOPS was widely available and uncontrollable worldwide

· U.S.-manufactured computer technology up to 7,000 MTOPS would become widely available worldwide and uncontrollable by 1997

· Many HPC applications used in U.S. national security programs occur at about 7,000 MTOPS and at or above 10,000 MTOPS84

The study also concluded that it would be too expensive for the U.S. Government and industry to maintain the effective control of computing systems with performance levels below 7,000 MTOPS. Further, the study stated that attempts to control computer exports below this level would become increasingly ineffectual, would harm the credibility of export controls, and would unreasonably burden a vital sector of the computer industry. The study also raised concerns about the ability of the U.S. Government to control HPC exports in the future, in light of advances in computing technology and its dispersal worldwide.85

However, the Stanford study had several methodological limitations. It lacked empirical evidence or analysis to support its conclusion that HPCs were "uncontrollable" given both worldwide availability and insufficient resources to control them. Neither the study nor the U.S. Government made estimates of these resources. Also, the study did not assess the capabilities of countries of concern to use HPCs for designated military and proliferation applications, even though that was required by the tasking.86

Seymour Goodman, one of the authors of the 1995 Stanford study, acknowledged that U.S. Government data were inadequate to make this assessment, and the study recommended that better data be gathered.87 Furthermore, the study noted that data used from the High Performance Computing Modernization Office were not optimal for the study's purposes, although it stated that the data were sufficient to "conjecture" that the majority of national security applications were already possible at uncontrollable levels. Also, the study stated that time constraints did not allow a comprehensive review of defense applications.88

In addition to the Stanford study, Executive branch officials have said that they also relied on other analytical products as part of the HPC review process.89 These included:

· A Defense Department review of military applications90

· An August 1995 Institute for Defense Analyses (IDA) technical assessment of clustering computers91

· Defense-developed criteria for weapons of mass destruction proliferation behavior92

· Internet information related to the computer market93

Some officials also referred to two 1995 Commerce Department studies on the worldwide "supercomputer" market and technology trends. These documents supported the conclusion that foreign availability of HPCs, especially in countries of proliferation concern, was limited in 1995, but that technology trends would make HPC technology more readily available throughout the world in the future.94 As a result, it appeared that denying HPC access to proliferating countries in the next century would become increasingly difficult, and perhaps impossible.

Another factor that may have figured in the decision to relax HPC export controls is that the National Security Agency (NSA) - which had been quite active in the past in HPC controls, including reviewing Commerce license applications to the Commerce Department for exports of HPCs - changed its approach. Around 1993, the NSA began to ease its involvement in computer export controls. By 1995, NSA had moved away from its activities in the supercomputer area, and had backed out of the high performance computer export control debate entirely.

The stated justification for this change in policy was concern for the health of the U.S. computer industry and the industry's need for exports.

Defense Department Review of Military Applications for HPCs
Pentagon officials advised the General Accounting Office that there was no document that summarized the results of the Department of Defense review of military applications for HPCs.95 One Defense Department official stated that these results were incorporated into the Stanford study.96 An August 24, 1995 Defense Technology Security Administration (DTSA) memorandum summarized some general points of a Defense Department "Supercomputing Study" that reviewed military applications.97 The DTSA memorandum concluded:

· The maximum practical computing performance level available to Defense Department research laboratories at the time was the Cray C90 vector computer at 21,000 MTOPS (for a full 16-processor configuration)

· Massively parallel processors provide higher composite theoretical performance, but not all of it is usable processing

· High performance computing would play a critical role in the Defense Department's future plans to maintain technological superiority, and the Cray vector computer was the primary computer used for the most computing-intensive applications

· Researchers need high performance computing to resolve significant problems in a reasonable time, and to reach effective conclusions rapidly regarding next steps to be taken

· Massively parallel processors (such as the IBM SP2 and Cray T3D) had limited applicability to most of the Defense Department's then-current research efforts. Software did not exist to permit massively parallel processors to simultaneously be used on those applications

· Workstations are critical to Defense Department programs. They are used to prepare programs and data for HPC runs and to analyze HPC data runs. However, they were not replacing HPCs, either in networked or clustered configurations

· Symmetric multi-processors (such as the SGI Power Challenge and the DEC Alpha) would be major factors in future Defense Department research in spite of the higher performance of the Cray vector computers, because the lower overall costs of symmetric multi-processors make them affordable in a constrained defense budget environment

· Symmetrical multi-processors were not being run effectively at Defense Department laboratories with more than 12 single processor workstation levels of between 200 and 500 MTOPS. Other symmetrical multi-processors were being run at levels between 1,000 and 5,000 MTOPS; vector computers were being run at levels between 10,000 and 20,000 MTOPS; and massively parallel processors were being run at levels over 5,000 MTOPS because of their scalability in parallel signal processing applications

· There was no significant relationship between the maximum composite theoretical performance of the vector computers and the massively parallel processors. Therefore, export control levels should not be set on the basis of the maximum number of processors that can be included in a massively parallel processor98

Institute of Defense Analyses Technical Assessment
An IDA technical assessment reported that a consensus of computing experts, supported by available data, believed that supercomputing restrictions for systems above 10,000 MTOPS, but below about 20,000 MTOPS, could be circumvented to some extent by aggregating lower performance processors. However, the IDA assessment stated that it was difficult to go beyond this level as of 1996, except for a small set of "embarrassingly parallel problems" - that is, problems that could easily be broken up into parts that could be solved simultaneously.99

The assessment predicted that, by 1996, users should be able to interconnect systems with a total of 40,000 to 80,000 MTOPS. Such a configuration could be programmed, according to IDA, "to yield computational capabilities approximating that of a single 20,000 CTP computer for a given problem or constrained set of problems." A user may achieve this by investing from six months to a year's worth of effort, although the resulting system would be neither user-friendly nor economically competitive in the world market.100

The IDA assessment also stated that the security risk would depend on whether there are militarily critical problems that demand high performance computing capability between 10,000 and 20,000 MTOPS, and that cannot be attacked for some technical reason by aggregation. If such problems exist, IDA advised, the issue would become how much benefit to U.S. national security it is to delay or degrade a foreign entity's ability to achieve certain results for a given class of problems. The IDA study concluded that a user faced with limited computing power would simply run the program for a longer period of time or run it with coarser granularity.101 (Granularity of an application refers to the amount of computation relative to the amount of movement of data between processors.102 When this relationship becomes a processing bottleneck in the interconnect between processors, problems that are more easily broken up into parts - that is, "coarsely grained" - are those that can be run effectively.103)

The IDA assessment and its sponsors, Dr. Joseph Golden, Director of Multinational Technology Programs in the Office of the Deputy Undersecretary of Defense for International and Commercial Programs, and Norman Jorstad, Director of IDA's Technology Identification and Analysis Center, provided only minimal support and documentation (four articles) for the study's conclusions.104

As IDA officials subsequently explained to General Accounting Office, IDA had assembled a group of specialists from the U.S. Government and the computer industry who discussed the issues and produced the report following a series of meetings. While the specialists might have assembled documentation, IDA retained none of it.105

A Defense Technology Security Administration official commented in July 1998 that the agency had concerns about the study.106

Defense Department Proliferation Criteria
In the 1995 effort to develop the country tier system, Defense Department officials assessed countries for the HPC export control review process on the basis of six criteria and assigned each country to a particular HPC country tier.107 Part of the information used in this process was a ranking of each country in the world by the level of risk associated with that country's proliferation record. The PRC was ranked at the highest level of risk.

Former Deputy Assistant Secretary of Defense for Counterproliferation Policy Mitchel Wallerstein explained to the General Accounting Office that the Defense Department did not conduct a threat assessment regarding HPCs because it was not tasked do so.108 Wallerstein later said that he had consulted with a counterpart on the Joint Staff about the risk associated with the levels of HPC being considered for export, and that, while the Joint Staff had concerns, the risk was considered reasonable.109

The six assessment criteria used by the Defense Department to create HPC country tiers were:

· Evidence of ongoing programs of U.S. national security concern, including proliferation of weapons of mass destruction with associated delivery systems and regional stability and conventional threats

· Membership in or adherence to nonproliferation and export control regimes

· An effective export control system including enforcement and compliance programs and an associated assessment of diversion risks

· Overall relations with the United States

· Whether United Nations sanctions had been imposed

· Prior licensing history110

Details of the 1996 High Performance Computer
Export Control Policy Changes

The export control policy announced in October 1995 and implemented in January 1996 removed license requirements for most HPC exports with performance levels up to 2,000 MTOPS.111

The policy also organized countries into four "computer tiers." Tier 1 represents the lowest level of concern to U.S. security interests, and each subsequent tier represents a higher level.112

The revised HPC policy was applied as follows:

· Tier 1 (28 countries): Western Europe, Japan, Canada, Mexico, Australia, New Zealand. No prior government review or license for any computer exports, but U.S. companies must keep records regarding higher performance shipments (that is, over 2,000 MTOPS) and these records will be provided to the U.S. Government as directed.

· Tier 2 (106 countries): Latin America, the Republic of Korea, Association of Southeast Asian Nations, Hungary, Poland, Czech Republic, the Slovak Republic, Slovenia, South Africa. No prior government review or license for computer exports up to 10,000 MTOPS, with record-keeping and reporting by U.S. companies as directed by the U.S. Government. Prior government review and an individual license are required for HPCs above 10,000 MTOPS. Above 20,000 MTOPS, the U.S. Government may require safeguards at the end-user location.

· Tier 3 (50 countries): the PRC, India, Pakistan, the Middle East/Maghreb, the former Soviet Union, Vietnam, and the rest of Eastern Europe. No prior government review or license is required for computer exports up to 2,000 MTOPS. Prior government review and a license are required for HPC exports for military and proliferation-related end uses and end users. No government review or license is required for civil end users of computers between 2,000 MTOPS and 7,000 MTOPS, with record-keeping and reporting by U.S. companies as directed by the U.S. Government. Prior government review and a license are required for HPC exports above 7,000 MTOPS to all end users. Above 10,000 MTOPS, additional safeguards may be required at the end-user location.

· Tier 4 (7 countries): Iraq, Iran, Libya, North Korea, Cuba, Sudan, and Syria. There is a virtual embargo on all computer exports.113

The U.S. Government continues to implement the Enhanced Proliferation Control Initiative, which seeks to block exports of computers of any level in cases involving exports to end uses or end users of proliferation concern, or risks of diversion to proliferation activities.114 Criminal as well as civil penalties apply to violators of the Initiative.115

Export Administration Act Provisions and Export Administration Regulations Currently Applicable to
High Performance Computers

Specific provisions of the Export Administration Act of 1979, as amended, and the Export Administration Regulations apply to HPCs. In addition, Export Administration Regulations that regulate dual-use exports generally apply to HPCs.

The Commerce Department's Bureau of Export Administration maintains the Commerce Control List that includes items (commodities, software, and technology) subject to the authority of the Bureau. HPC technology is included on the Commerce Control List under Category 4, "Computers." HPCs specifically fall under 4A003 (which includes "Digital computers," "electronic assemblies," and "related equipment, and specially designed components") and D001 ("Software specially designed or modified for the 'development', 'production' or 'use' of equipment or 'software' controlled by" various other export control categories).116

The Export Administration Regulations identify six bases for controlling HPC technology, in order of restrictiveness. Those requiring licenses for a larger number of countries or items are listed first:

· National security

· Missile technology

· Crime control

· Anti-terrorism

· Nuclear nonproliferation

· Computers117

The Export Administration Regulations state the terms of the Composite Theoretical Performance license exception and the country tier structure. They also detail the new requirements on notification, post-shipment verifications for Tier 3 countries mandated by the Fiscal 1998 National Defense Authorization Act, and other restrictions and reporting requirements.118

The Export Administration Regulations contain special provisions for exports, re-exports, and certain intra-country transfers of HPCs, including software and technology. License requirements reflected in this section are based on particular destinations, end users, and end uses. These license requirements supplement those that apply for other control reasons, such as nuclear nonproliferation.119

License applications for HPC technology covered by this section are also to be reviewed for nuclear nonproliferation licensing policy. The Commerce Department may also require end-use certifications issued by the government of the importing country and safeguard conditions on the license.120

The Export Administration Regulations state security conditions and safeguard plans for the export, re-export, or in-country transfer of HPCs that the Bureau of Export Administration may impose to certain destinations. Up to 36 safeguard conditions are available.121 These include the following:

· Applicant's responsibility for providing adequate security against physical diversion of the computer during shipment

· No re-export or intra-country transfer of the computer without prior written authorization of the Bureau of Export Administration

· Inspection of usage logs daily to ensure conformity with conditions of the license and retention of records of these logs for at least a year

· Independent auditing of the end user quarterly by an independent consultant, including auditing of computer usage and implementation of safeguards122

The Export Administration Regulations contain prohibitions against exports, re-exports, and selected transfers to certain end users and end uses. They state that the exporter may not export or re-export any item without a license to any destination, other than those specified in the regulations, if at the time of the export, the exporter knows the item will be used directly or indirectly in proscribed activities.123

These activities include nuclear, missile, chemical, and biological end uses.124 The Export Administration Regulations define "knowledge" of a circumstance not only as positive knowledge that the circumstance exists or is substantially certain to occur, but also an awareness of a high probability of its existence or future occurrence.125 Such awareness is inferred from evidence of the conscious disregard of facts known to a person, and is also inferred from a person's willful avoidance of facts.126

The Export Administration Act provides that the Secretary of Commerce and his designees may conduct, outside the United States, pre-license investigations and post-shipment verifications of items licensed for export.127

The Second Stanford Study

Two of the three authors of the 1995 Stanford study were again engaged and funded by the Departments of Commerce and Defense to prepare a second paper as a contribution to the periodic review of HPC export controls.128

This paper, released in April 1998, concluded that rapid advances in computer technology were continuing. However, it also suggested that a proposed change in licensing procedure - to review each HPC at its highest attainable level, rather than its configuration at the time of the export - would remove the concern that HPCs were being upgraded without the knowledge of exporters or the U.S. Government.129

As of the date of this report, no further Executive branch action has been reported or notified to Congress concerning further revisions to export controls on HPCs.

Arms Export Control Act Provisions and International Traffic In Arms Regulations Currently Applicable to Computers

The Arms Export Control Act and International Traffic In Arms Regulations treat certain computers differently than the dual-use computers that are regulated by the Export Administration Act and Export Administration Regulations.130

The United States Munitions List, which is included in the International Traffic in Arms Regulations, controls computers that have been modified for rugged conditions and "Tempested" - made ready for secure use - specifically for military systems.131 It also controls software specifically designed for military uses and technical data, which is often paper converted to software.132

The State Department, which has license authority over Munitions List items, restricts the export of computers designed for military uses and does not distinguish among computers based on MTOPS or other performance measures.133


 

Concerns Over High Performance Computer Exporters' Ability to Review End-Users in the PRC
Prompted the Requirement for Prior Notification

The January 1996 revisions to the Export Administration Regulations governing HPCs made several other important changes. Most importantly, they made exporters responsible for determining whether an export license is required, based on the MTOPS level of the computer, and for screening end users and end uses for military or proliferation concerns.134

Thus, U.S. companies that wish to export HPCs are now authorized to determine their own eligibility for a license exception.135

Prior to this change, only U.S. HPC exports to Japan were allowed without an individual license. At that time, a violation of the Export Administration Regulations could be identified by an export of an HPC that occurred without a license.

Since the change, in order to prove a violation of the regulations, the Commerce Department must demonstrate that an exporter improperly used the Composite Theoretical Performance license exception and knew or had reason to know that the intended end user would be engaged in military or proliferation activities.136

Also, the revised Export Administration Regulations required that exporters keep records and report to the Commerce Department on exports of computers with performance levels at or above 2,000 MTOPS. In addition to existing record-keeping requirements, the regulations added requirements for the date of the shipment, the name and address of the end user and of each intermediate consignee, and the end use of each exported computer. Although these records have been reported to the Commerce Department on a quarterly basis for the past two years, some companies have reported inconsistent and incomplete data for resellers or distributors as end users.137

Since U.S. HPCs obtained by countries of proliferation concern could be used in weapons-related activities, the Congress enacted a provision in the Fiscal Year 1998 National Defense Authorization Act138 that required exporters to notify the Commerce Department of all proposed HPC sales over 2,000 MTOPS to Tier 3 countries. The Act gives the U.S. Government an opportunity to assess these exports within 10 days and determine the need for a license. Following such notification, the Departments of Commerce, State, Defense, and Energy, and the U.S. Arms Control and Disarmament Agency, can review a proposed HPC sale and object to its proceeding without an export license. The Commerce Department announced regulations implementing the law on February 3, 1998.139

A November 1998 Defense Department study, however, identified potential problems with the 10-day notification procedure. The study noted that the Defense Department provides comments on export notices referred to it regarding those end users for which the Defense Department has information. The study also noted that:

The operating assumption is that, if there is no information on the end-user, then the end-user is assumed to be legitimate. This is probably true in most cases; however, there is no means to verify that high performance computers are not making their way to end-users of concern to the United States.140

Furthermore, the Defense Department study expressed concern that foreign buyers might circumvent current Export Administration Regulations provisions requiring attestation to the buyer's knowledge that the export will have no military or proliferation end user or end use.141 By designating a company in the United States to act on its behalf, the foreign company could have its U.S. designee submit the HPC notification to the Commerce Department; the U.S. designee and not the foreign buyer would then be responsible for all compliance with notification procedures.142 The U.S. designee would be responsible only for shipping the item and would not take title of the item.143

Under the Export Administration Regulations, the U.S. designee could complete the notification to its knowledge, which might be useless if the U.S. designee is in fact ignorant of the actual end use. The Defense Department study noted the obvious problems with this system.

The study also observed that the 10-day notification period was insufficient to ensure that U.S. designees and foreign buyers are providing accurate and complete information.144

Finally, the Defense Department study warned that foreign buyers of U.S. computer technology might circumvent the notification procedure by notifying the Commerce Department that they are purchasing a system that is not above the 7,000 MTOPS threshold, but later upgrading the system with processors that are below the 2,000 MTOPS level. There would be no requirement to notify the Commerce Department of the acquisition of the lower than 2,000 MTOPS upgrades to the previously-notified system.145

The U.S. Government Has Conducted Only One End-Use Check for High Performance Computers in the PRC

The Fiscal 1998 National Defense Authorization Act now requires the Commerce Department to perform post-shipment verifications on all HPC exports of HPCs to Tier 3 countries with performance levels over 2,000 MTOPS.146

Post-shipment verifications are important for detecting and deterring physical diversions of HPCs, but they do not always verify the end use of HPCs.147

The PRC traditionally has not allowed the United States to conduct post-shipment verifications, based on claims of national sovereignty, despite U.S. Government efforts since the early 1980s.148 This obduracy has had little consequence for the PRC, since HPC exports have continued to be approved and, in fact, have increased in recent years.

In June 1998, the PRC agreed with the United States to cooperate and allow post-shipment verifications for all exports, including HPCs.149 PRC conditions on the implementation of post-shipment verifications for HPCs, however, render the agreement useless.150 Specifically:

· The PRC considers requests from the U.S. Commerce Department to verify the actual end-use of a U.S. HPC to be non-binding

· The PRC insists that any end-use verification, if it agrees to one, be conducted by one of its own ministries, not by U.S. representatives

· The PRC takes the view that U.S. Embassy and Consulate commercial service personnel may not attend an end-use verification, unless they are invited by the PRC

· The PRC argues scheduling of any end-use verification - or indeed, whether to permit it at all - is at the PRC's discretion

· The PRC will not permit any end-use verification of a U.S. HPC at any time after the first six months of the computer's arrival in the PRC

The Select Committee has reviewed the terms of the U.S.-PRC agreement and found them wholly inadequate. The Clinton administration has, however, advised the Select Committee that the PRC would object to making the terms of the agreement public. As a result, the Clinton administration has determined that no further description of the agreement may be included in this report.

According to Iain S. Baird, Deputy Assistant Secretary of Commerce for Export Administration within the Bureau of Export Administration, post-shipment verifications are conducted by the PRC's Ministry of Foreign Trade and Economic Cooperation for U.S. computers having over 2,000 MTOPS that are exported to the PRC. He says such verifications are done in the presence of the U.S. commercial attaché.151

Commerce reported on November 17, 1998, that no post-shipment verifications would be performed on HPCs that were exported to the PRC from November 18, 1997 through June 25, 1998 because the PRC/U.S. agreement applies only prospectively from June 26.

Since June 26, the Commerce Department reported, only one post-shipment verification has been completed and one was pending as of November 12, 1998. Commerce also stated that "Post shipment verifications were not done on most of the others [HPCs] because the transactions do not conform to our arrangement with the PRC for end use checks."152

Thus, post-shipment verifications will not be done on any HPCs exported to the PRC prior to the agreement, nor on any HPCs shipped that are exported in the future under the Composite Theoretical Performance license exception (that is, those between 2,000 and 7,000 MTOPS) to civilian end users.

According to Commerce Department Under Secretary for Export Enforcement William Reinsch, a pending regulatory change will instruct HPC exporters to seek end-use certificates from the PRC Government. Where PRC end-use certificates are obtained, this regulation purportedly would allow more post-shipment verifications to be requested consistent with the PRC-U.S. agreement.153

Reinsch stated that the PRC has indicated that it would be willing to issue end-use certificates. However, the PRC office in question reportedly has a staff of five, which would severely limit the number of post-shipment verifications it could implement.154

According to a September 1998 report from the General Accounting Office, U.S. Government officials agreed that the manner in which post-shipment verifications for computers traditionally have been conducted has limited their value because they establish only the physical presence of an HPC, not its actual use. In any event, according to national weapons laboratory officials within the Energy Department, it is easy to conceal how a computer is being used.155

Even when U.S. Government officials perform the post-shipment verification, the verifying officials have received no specific computer training and are capable of doing little more than verifying the computer's location. It is possible to verify an HPC's use by reviewing internal computer data, but this is costly and intrusive, and requires sophisticated computer analysis.156

The General Accounting Office report also noted that the U.S. Government makes limited efforts to monitor exporter and end-user compliance with explicit conditions that are often attached to HPC export licenses for sensitive end users. The U.S. Government relies largely on the HPC exporters to monitor end use, and may require them or the end users to safeguard the exports by limiting access to the computers or inspecting computer logs and outputs.157

The end user may also be required to agree to on-site inspections, even on short notice, by the U.S. Government or exporter. These inspections would include review of the programs and software that are being used on the computer, or remote electronic monitoring of the computer.158

Commerce officials stated to GAO that they may have reviewed computer logs in the past, but do not do so anymore, and that they have not conducted any short-notice visits. They also acknowledged that they currently do not do any remote monitoring of HPC use anywhere and that, ultimately, monitoring compliance with safeguards plans and their conditions is the HPC exporter's responsibility.159

Some U.S. High Performance Computer Exports
to the PRC Have Violated U.S. Restrictions

During the 1990s, there have been several cases of export control violations involving computer technology shipments to the PRC. One ongoing case concerns the diversion of a Sun Microsystems HPC from Hong Kong to the PRC.160

On December 26, 1996, a Hong Kong reseller for Sun Microsystems, Automated Systems Ltd., sold an HPC to the PRC Scientific Institute, a technical institute under the Chinese Academy of Sciences - a State laboratory specializing in parallel and distributed processing. At some point after the sale but before delivery, the computer was sold to Changsha Science and Technology Institute in Changsha, Hunan Province. The machine was delivered directly to that Institute in March 1997.161

Automated Systems of Hong Kong claimed to Sun officials in June 1997 that it had understood that the Changsha Institute was "an educational institute in Wuhan Province providing technological studies under the Ministry of Education." The end use there, according to Automated Systems, was to be for "education and research studies in the college and sometimes for application development for outside projects." Sun was recommended to contact the end user, the Changsha Institute, for more specific end-use information.162

The HPC sale came to the attention of the Deputy Assistant Secretary for Export Enforcement, Frank Deliberti. He queried the U.S. Embassy in Beijing about the Changsha Institute. Deliberti gave the information he obtained to Sun Microsystems, which then initiated efforts to have its computer returned.163

During the same period, the Foreign Commercial Officer at the U.S. Embassy in Beijing consulted his contacts at the PRC's Ministry of Foreign Trade and Economic Cooperation. The Ministry denied that the Changsha Institute was affiliated with the PRC military.164

Subsequently, the Ministry called the FCO to inform him that the actual buyer of the computer was an entity called the Yuanwang Corporation, and that Sun Microsystems had been aware of this corporation's PRC military ties. Reportedly, Yuanwang is an entity of the Commission on Science, Technology, and Industry for National Defense (COSTIND). So far as the PRC's Ministry of Foreign Trade and Economic Cooperation reportedly could determine, the end-use statements that had been provided to Sun through Automated Systems of Hong Kong were totally fictitious. The Changsha Science and Technology Institute, according to the Ministry, did not exist.165

The official position of the Ministry of Foreign Trade and Economic Cooperation was that the PRC Government would not help to obtain the return of the computer. The role of the PRC Government, the Ministry asserted, had been merely to help two private parties rectify a misunderstanding. In any event, the computer was returned to the United States on November 6, 1997.166 The Commerce Department investigation reportedly is continuing.167

A number of other violations of U.S. laws and regulations concerning computers exported to the PRC have been investigated by the Commerce Department:

New World Transtechnology
On December 20, 1996, New World Transtechnology of Galveston, Texas, pled guilty to charges that it violated the export control laws and engaged in false statements by illegally exporting controlled computers to a nuclear equipment factory in the PRC in August 1992. The company was also charged with attempting to illegally export an additional computer to the PRC through Hong Kong in October 1992. The company was sentenced to pay a $10,000 criminal fine and a $600 special assessment fee.168

Compaq Computer Corporation
On April 18, 1997, the Commerce Department imposed a $55,000 civil penalty on Compaq Computer Corporation of Houston, Texas, for alleged violations of the Export Administration Regulations. The Commerce Department alleged that, on three separate occasions between September 17, 1992 and June 11, 1993, Compaq exported computer equipment from the United States to several countries, including the PRC, without obtaining required export licenses. Compaq agreed to pay the civil penalty to settle the allegations.169

Digital Creations
On June 12, 1997, Digital Creations Corporation of Closter, New Jersey, was sentenced to pay an $800,000 criminal fine for violating the Export Administration Act and Regulations in connection with exports of computers to the PRC. Digital had previously pled guilty in December 1994 to charges that it had violated the Export Administration Regulations by illegally exporting a Digital Equipment Corporation computer to the PRC without obtaining the required export license.170

Lansing Technologies Corporation
On June 17, 1997, Lansing Technologies Corporation, of Flushing, New York, pled guilty to charges that it violated the Export Administration Regulations in 1992 by exporting a Digital Equipment Corporation computer vector processor and a data acquisition control system to the PRC without obtaining the required export licenses from the Commerce Department.171

Other serious violations of HPC export control laws and regulations have occurred in recent years, but these concerned Russia. On July 31, 1998, for example, the Department of Justice announced that IBM East Europe/Asia Ltd. entered a guilty plea. IBM received the maximum allowable fine of $8.5 million for 17 counts of violating U.S. export laws through the sale of HPCs to a Russian nuclear weapons laboratory known as Arzamus-16. In another example, an ongoing U.S. Government investigation of Silicon Graphics Incorporated/Convex is examining whether a violation of law occurred in a sale of HPCs to another Russian nuclear weapons laboratory, Chelyabinsk-70.172

 

High Performance Computers
at U.S. National Weapons Laboratories
Are Targets for PRC Espionage

No other place in the world exceeds the computational power found within the U.S. national weapons laboratories. For this reason, both the computational power and the data it can generate have been the focus of the PRC's and other countries' intelligence collection efforts.

The desire for access to this computing power and data, in turn, is one of the reasons so many foreign nationals want to visit the laboratories.

According to David Nokes, the network administrator at Los Alamos National Laboratory, all operating systems have vulnerabilities that can be exploited by a knowledgeable, valid user.173 Nokes also says that there are a few solutions to issues of HPC network security. These include:

· Allowing only U.S. students to use the networks

· Limiting physical access to high performance computer networks at universities

· Enhancing physical security and security education at universities174

U.S. National Weapons Laboratories Have Failed
to Obtain Required Export Licenses for
Foreign High Performance Computer Use

When foreign nationals use the U.S. national weapons laboratories' HPCs, their activities should generally be considered "deemed exports." The "deemed export" rule [15 CFR 734.2 (b) (ii)] covers those situations in which an export-controlled technology or software-source code information is released to a visiting foreign national, for which a license would have been required. In such situations, an "export" is "deemed" to have occurred.

The Select Committee is concerned that HPC system managers in the U.S. national weapons laboratories lack an essential understanding of the deemed export rule. This lack of understanding was substantiated by interviews with representatives from the Department of Commerce who had no recollection of ever having seen an application for a deemed export from any of the U.S. national weapons laboratories.

When PRC nationals visit and use the HPCs at a U.S. national weapons laboratory, their access should be limited to the same computing capabilities to which the PRC itself is restricted, especially for military uses.175 The Select Committee discovered, however, that the laboratories do not even measure the computational power of their HPCs in MTOPS. Moreover, many of the laboratories have difficulty in converting to MTOPS from the units they use to measure the power of an HPC.

The Department of Commerce could not recall a laboratory ever having sought guidance on how to compute an HPC's MTOPS rating. Significantly, the Select Committee discovered that a rather modest HPC (by Department of Energy standards) in a U.S. National Laboratory used by foreign nationals had a substantially higher MTOPS rating than the controlled threshold. No licenses, however, had ever been obtained.

The "deemed export" rule also applies in those instances in which a PRC national or entity accesses an HPC remotely via the Internet.

In the absence of an effective audit system, which monitors the codes being run by the PRC user, the U.S. national weapons laboratories cannot verify that they are in compliance with the law, or that PLA or PRC intelligence is not using the HPCs for the design or testing of nuclear or other weapons.

PRC Students Have U.S. Citizen-Like Access To High Performance Computers at the National Weapons Laboratories

The U.S. national weapons laboratories rely upon nuclear weapons test simulation software and computers provided by the Accelerated Strategic Computer Initiative (ASCI). Five major U.S. universities support ASCI through the Academic Strategic Alliances Program (ASAP).

As a result, hundreds of research students and staff at these universities have access to the HPCs used by the national weapons laboratories for U.S. nuclear weapons research and testing. As many as 50 percent of these research students and staff are foreign nationals, some of whom may have foreign intelligence affiliations.

Holders of Immigration and Naturalization Service "green cards" - PRC nationals who have declared their intent to remain permanently in the U.S. - are treated as U.S. citizens for export control purposes. They are then given U.S. citizen-like HPC access, free to return to the PRC once their objectives are fulfilled.

In November 1998, the Secretary of Energy issued an Action Plan that includes a task force to review HPC usage by foreign nationals and provide a report to the Secretary within six months. The Department of Energy is currently preparing an implementation plan to address counterintelligence issues identified in a July 1998 report, entitled "Mapping the Future of the Department of Energy's Counterintelligence Program," including HPC usage by foreign nationals.

 

Many Types of Computer Technology
Have Been Made Available to the PRC
That Could Facilitate Running Programs
Of National Security Importance

One of the bases for the 1996 increase in export control thresholds was that individual PCs were widely available on the open market in the United States, but not able to be exported to the potentially huge PRC market.176 What was an HPC in 1993 (those capable of 195 or more MTOPS) was no longer even considered necessary to control for weapons proliferation concerns.177

By 1997, PCs and workstations assembled in the PRC captured approximately 60 percent of the PRC's domestic market.178 All of these locally-assembled computers used imported parts - over 70 percent contained United States-produced Pentium microprocessors.179

Three of the largest manufacturers in the PRC were affiliates of IBM, Hewlett Packard, and Compaq, with a combined market share of approximately 21 percent.180 A large share (but probably not more than 20 percent) of the PC assembly in the PRC was done by small, independent assembly shops.181

The largest individual producer of PCs and workstations in the PRC is the Legend enterprise, a spin-off of the Chinese Academy of Sciences.182 This domestic computer assembly industry dovetails well with Beijing's overall plans for economic modernization. Beijing reportedly desires an independent PRC source of most high-technology items to avoid reliance on foreign providers for these goods.

To participate more fully in the PRC market, United States firms have been pressured by the PRC government to relinquish technological advantage for short-term market opportunities. The PRC requires that foreign firms be granted access to the PRC market only in exchange for transferring technology that would enable the state-run enterprises to eventually capture the home market and begin to compete internationally.

However, the PRC's strategy of coercing technology from foreign firms has not enabled state-run industries to close the technology gap with more developed nations. In the context of establishing domestic production of computers for sale in the PRC, this PRC "technology coercion" policy appears to have worked.183 The PRC now has a growing industrial base of small computer assemblers. For the most part, these companies are not State-run. The technology that was "coerced" from U.S. computer manufacturers as a cost of entering the PRC market apparently better serves the expansion needs of small, relatively independent enterprises and not the intended needs of central planners in Beijing.

90 percent of PRC consumers of PCs and workstations are business, government, and educational entities, with individual purchases accounting for only 10 percent of the PRC's PC market.184 To illustrate the size of the individual purchaser segment of the PRC's market, it is estimated that only 5 million individuals out of the PRC's 1.2 billion have the expendable funds required to purchase a low-end PC in the PRC.185

Despite the limited number of individual purchasers, the actual size of the PRC PC and workstation market was 2.18 million units in 1996; 3 million units in 1997; and 4.5 million units in 1998. It is anticipated the PRC PC and workstation market will grow at the rate of 1.5 million to 2 million units per year through the year 2000. According to figures provided by the Asia Technology Information Project, an independent research foundation, non-PRC manufacturers of PCs and workstations, including U.S. manufacturers, could expect to partake of a portion of the almost 2 million units expected to be imported for sale in the PRC in 1998.186

 

The PRC Has a Limited Capability to Produce High Performance Computers

The PRC has demonstrated the capability to produce an HPC using U.S.-origin microprocessors over the current threshold of 7,000 MTOPS. The PRC "unveiled" a 10,000 MTOPS HPC - the Galaxy III - in 1997 based on Western microprocessors.

But PRC HPC application software lags farther behind world levels than its HPC systems. Also, despite the existence of a few PRC-produced HPCs based on Western components, the PRC cannot cost-effectively mass-produce HPCs currently. There really is no domestic HPC industry in the PRC today.

While it is difficult to ascertain the full measure of HPC resources that have been made available to the PRC from all sources, available data indicates that U.S. HPCs dominate the market in the PRC.187

Although the PRC has a large market for workstations and high-end servers, there is a smaller market for parallel computers which is entirely dominated by non-PRC companies such as IBM, Silicon Graphics/Cray, and the Japanese NEC. However, there continues to be significant market resistance to Japanese HPC products in Asia, especially as U.S. products are beginning to have significant market penetration.188

 

U.S. High Performance Computer Exports
To the PRC Are Increasing Dramatically

A review of Commerce Department information regarding the total of HPC license applications that were received for the time frame January 1, 1992 to September 23, 1997, revealed the following:

· Only one HPC export license to Hong Kong (with a value of $300,000) was rejected

· 100 HPC export licenses to the PRC (with a total value of $11,831,140) were rejected by Commerce

· 37 HPC export licenses to Hong Kong (with a total value of $55,879,177) were approved

· 23 HPC export licenses to the PRC for HPCs within the 2,000 to 7,000 MTOPS range (with a total value of $28,067,626) were approved

· Two of the 23 HPC export licenses to the PRC for HPCs within the 11,000 to 12,800 MTOPS range (with a total value of $2,550,000) were approved in 1998189

The approximate total value of the HPCs exported, of whatever description, to both Hong Kong and the PRC, for the six-year period ending September 23, 1997, was only $86 million.190

The nine-month period between January 1998 and September 1998, however, saw U.S. exporters notify the Commerce Department of their intention to export 434 HPCs (in the 2,000 to 7,000 MTOPS range) to the PRC (total value $96,882,799).191 Nine times the number of HPCs were exported in one-ninth the time.192

During approximately the same time frame (calendar year 1998) it is estimated that 9,680,000 individual PCs and workstations were sold in the PRC. The market share that U.S. exporters could reasonably expect to benefit from was approximately 3,872,000 units, worth approximately $1.8 billion.193

Apparently, the proximate cause of U.S. computer manufacturers aggressively lobbying for the raising and maintaining of export thresholds above the PC level was to capture this $1.8 billion per year market share.

The United States dominates the PRC's HPC market, but U.S. exports clearly do not dominate the PRC's personal computer and workstation market.194 The difference between the 460-unit, $100 million HPC market described above, stretched over a six-year period, and the yearly 3.8 million-unit PC and workstation market, with a value of $1.8 billion, is dramatic.

The performance levels of U.S. HPCs reported to be exported to the PRC over the past year continued to be predominantly in lower-end machines, as shown in the following table. For example, 77 percent of U.S. HPCs (a total of 388 machines) have performance levels below 4,000 MTOPS.

 

The PRC Is Obtaining Software
From U.S. and Domestic Sources

In June 1997, it was estimated that 96 percent of software programs sold in the PRC were pirated versions of commercially available U.S. programs. These programs were designed for use on PCs and workstations, and are not considered useful for the very sophisticated programming done on HPCs.

Some major U.S. software producers have begun contracting with PRC programming firms. These PRC software firms are comprised of recently-graduated PRC university students. They are attempting to write programs in Chinese to capitalize on a huge domestic market.196

Two factors mitigate against the success of the PRC developing its domestic programming industry.

The first factor is that street-level "software pirates" sell dozens of U.S. computer programs at a time on one CD-ROM for a small fee (reportedly $20). In other words, one can meet most or all of one's programming needs in the PRC for a nominal fee. It is anticipated that it will be difficult, if not impossible, for a domestic software industry to recoup the start up costs associated with just one software program, let alone the dozens needed to compete with the street level dealers.

The second factor is that these pirated U.S.-produced, English language programs are more mature, widespread, and robust than PRC programs.197 It is axiomatic that any new product will have "bugs in the system." It is considered unlikely that new, unproven, and possibly weak software programs will effectively compete with cheap, proven, and robust software that is widely available at such nominal fees. It is conceivable that the PRC will abandon instituting a domestic programming industry altogether.198

 

Potential Methods of
Improving End-Use Verification

According to a 1996 RAND study, there are non-intrusive and intrusive approaches to assessing the manner in which a buyer is actually applying dual-use technologies. Among the non-intrusive methods are:

· Memoranda of understanding and agreements

· National technical means of verification

· Limitations designed into the transferred technologies

· Transparency measures

Among the intrusive methods are:

· Inspections

· Tagging199

Tagging

Tagging is achieved by attaching an active system to the item that is to be exported, rather than just a passive tag for identification during an inspection. The active system would both monitor the object tagged and communicate that information back to the United States. The RAND study noted that in practice, this means the objects to be tagged must be physically large systems, such as a machine-tool cell, or a major component of some larger system, such as a turbine engine in a helicopter.200

According to the RAND study, the tag should be capable of at least communicating information about the item's physical location. Some sensors may provide other kinds of information, as well. The information could be communicated to a satellite or over a data link. Early versions of such devices were already in use in 1996 to monitor nuclear materials and technologies.201

These "smart" tags exploit the potential of several technologies, according to the RAND study. They combine encryption, the Global Positioning System, and emerging global wireless communications systems, such as Iridium or Orbcomm. These technologies would allow the tags to report back on the status and location of the tagged object. In principle, such tags could report the position of an object at any given time in order to verify limitations on their location. Such tags could also report on the activities of a "smart" system to which they are attached. For example, a machine-tool cell could report whether the machine had been used to make parts resembling aircraft components.202

Such tags could have many applications in a cooperative regime. Their application and use in a prohibited environment would be more difficult and consequential.203

The RAND study cautioned that all sellers of a particular technology must participate in the tagging and that this would probably also require cooperation of the buyers. Otherwise, buyers would gravitate to untagged items, if they were available. Attempts to conceal system location or deviate from a pattern of cooperation would be considered evidence of a potential failure of performance by the buyer. The study concluded that tagging may become an important oversight method for controlling technology transfers, but that it should never become the sole means of oversight.204

Technical Safeguards

In 1994 several types of technical safeguards were in advanced development in the United States. The technologies required for these safeguards were expected to enter testing within the next two years. They included:

· Controlled-execution UNIX - a modified computer operating system that could run only certain pre-approved programs; likely to be most useful for computers sold to facilities such as weather-forecasting centers, oil companies, automobile manufacturers, and banks

· "Black box" monitoring hardware - inexpensive, secure, long-term audit recording devices, possibly based on write-once optical storage units that could be embedded in mass-produced workstations; analogous to the black box flight-data recorders that are installed in aircraft and used for post-crash accident analysis

· "Meltdown" software - modified operating system programs designed to require updating by the manufacturer at fixed times; if not updated, the computer refuses to run

· Automated auditing tools - pattern-recognition or rule-based software; would assist monitoring agencies to more effectively inspect huge collections of data from system activity logs and detect the (presumably few) incidents worth detailed analysis

Although these technical safeguards seem feasible, none had been proved to be inexpensive, sensitive enough to detect most illegal activity, and difficult to circumvent by determined adversaries. The auditing tools under development showed great promise, however. Authorities were pessimistic about the likelihood that technical high-performance computer safeguards would be widely adopted and able to succeed in the near future.

Other Possibilities

Officials of the Mitre Corporation made several suggestions to strengthen U.S. national security in the context of HPC export controls. These included:

· Improving and enforcing end-use and end-user verification

· Controlling embedded HPC systems that are useful in military applications

· Monitoring or precluding the expansion capability of computer hardware

· Marketing aggressively all generic computing capabilities, such as scanning, to the PRC to maximize profits and to keep the PRC market-dependent on the United States

· Focusing on control of any hardware, software, tools, and services that uniquely support PRC military applications that are strategic in nature or could facilitate the tactical turning point in a conflict205


Technical Afterward

CHANGING HIGH PERFORMANCE
COMPUTER TECHNOLOGY
IS MAKING EXPORT
CONTROL MORE DIFFICULT

New designs in HPCs and systems of computers, as well as availability of more advanced and less costly processors, software, and peripheral equipment, is rendering the challenge of applying export controls to HPCs more difficult.

For certain types of computer designs, the ability to add processors or boards could increase the machine's performance beyond authorized levels. In addition, advances in computer processor communications technology have facilitated the clustering of personal computers and workstations into effective parallel computers.

The usefulness of clustered computers is application-dependent. Some U.S. Government and computer industry experts have concluded that for many problems, networks of workstations could not compete with appropriately designed high performance computers.206 Most traditional HPCs achieve far greater efficiency than parallel machines, due to their use of custom-made components.

Foreign access to high performance computers through networks is possible because of inadequate security measures.

 

Vector Architectures

Vector architecture relies on custom-designed processors to move a complex problem through computer processing units in sequential stages. This type of machine is designed to handle arithmetic operations efficiently on elements of arrays, called vectors.207

Vector systems are especially useful in high-performance scientific computing.208 Vector systems, also called "pipeline" architectures, work like an assembly line. They work best with many similar tasks that can be broken down into steps.

The memory interface in vector machines is custom-made, and subject to export controls.

Vector machines are useful for cryptography, modeling fluids, and in the design of weapons. In particular, vector systems are suited to problems in which data at one point influence other variables in the problem, a common situation in national security applications.209

It is more straightforward for a programmer to use a vector system than a system comprised of parallel processors (discussed below), since it is easier to obtain maximum performance with one or a few high-power processors than with a collection of many lower capability processors.210

Since one of the main concerns with any HPC system is the rate of speed with which data can be retrieved from memory, another advantage is that a vector machine has a very fast memory.211

Still further advantages of vector systems are that they feature high memory bandwidth and low memory latency - that is, very large amounts of data can travel to and from memory very efficiently. A related advantage is that vector systems have the ability to seek multiple memory locations at the same time. This translates into very fast computational speed.

A disadvantage of a vector machine is that vector system software is not really portable. It cannot be readily transported to other vector machines.212

The main disadvantage of vector systems, however, is their high cost. Significant improvements in software and hardware allow the purchase of a parallel processing system for $40,000, as opposed to $1 million for a comparable vector computer.213

At the Defense Department's High Performance Computer Management Office, vector systems are being phased out in favor of parallel processing systems. Out of a total of 40 HPCs in the High Performance Computer Management Office inventory, fewer than 10 are now vector systems.214

 

Parallel Processing: The Connection of Computers Into a Powerful Central Resource

A parallel processing computer is a collection of processors that are connected through a communications network.215 The type of processor, the network configuration, and the operating system that coordinates the activities distinguish parallel processing systems.

Many national security applications involve problems that can be separated into independent variables, and it is for these types of problems that parallel processing is best suited.216

The fastest parallel machines are all based on commodity processors - that is, processors that are commercially available on the market.217 This approach has been applied to virtually every area of theoretical and applied physics.218

 

Massively Parallel Processors

A massively parallel processor is a collection of computers, or central processing units, linked together.219 Each computer that is part of the whole massively parallel processor has its own memory, input/output system, and central processing unit.220 Massively parallel processors now use commodity processors, and can utilize commodity interconnects to communicate between the individual computers that make up the system.221 Some massively parallel processors use custom-made, very fast interconnect switches that are not commodities and are subject to export control.222

An advantage of a massively parallel processor is that an unlimited quantity of processors can be incorporated into the design of the machine. In a massively parallel processor, the more processors, the greater the computing speed of the machine.223

Because each processor is equipped with its own memory, massively parallel processors have much more memory than traditional supercomputers. The extra memory, in turn, suits these machines to data-intensive applications, such as imaging or comparing observational data with the predictions of models.224

A disadvantage of massively parallel processors is that memory latency is a bigger problem because the processors have to share the available memory. Another disadvantage is that each one of the computers that is part of the system has to be instructed what to do individually.225 This phenomenon requires specialized, extremely proficient programmers to create efficient communications between the individual computers.

The commercial availability of inexpensive, powerful microprocessors has given massively parallel processors a boost in their competition with vector machines for the supercomputer market. IBM, for example, more than doubled the number of its computers in the Top 500 list (discussed below) between November 1997 and June 1998 by introducing the SP2, which strings together up to 512 of the company's RSI6000 workstation microprocessors.226

If optimum speed is desired, this massively parallel configuration is the best of all HPC designs.227 The fastest high performance computer now available is the ASCI Blue Pacific.228 That machine is part of the Department of Energy's Accelerated Strategic Computing Initiative (ASCI) program and is located at Lawrence Livermore National Laboratory. Developed in conjunction with IBM, it is a 5,856-processor machine, boasting a top speed of 3.8 teraflops229 (Tflops) with 2.6 terabytes (Tbytes) of memory.230 In the next phase of the ASCI initiative, IBM will deliver a 10-Tflops machine to the Department of Energy in mid-2000.231

 

Symmetrical Multiprocessor Systems

Symmetrical multiprocessor systems use multiple commodity central processing units (CPUs) that are tightly coupled via shared memory. The number of processors can be as low as two and as many as about 128.232

Symmetrical multiprocessor systems treat their multiple CPUs as one very fast CPU.233 The CPUs in a symmetrical multiprocessor system are arranged on a single motherboard and share the same memory, input/output devices, operating system, and communications path.

Although symmetrical multiprocessor systems use multiple CPUs, they still perform sequential processing,234 and allow multiple concurrent processes to be executed in parallel within different processors.235

An advantage of symmetrical multiprocessor systems is that the programming required to control the CPUs is simplified because of the sharing of common components.236

Another major advantage is cost. A Silicon Graphics symmetrical multiprocessor system, for example, with 18 microprocessors, each rated at 300 megaflops (MFLOPS)237 or more, and a peak speed of more than 5 gigaflops (GFLOPS), costs about $1 million, whereas a Cray C90 costs about $30 million.238

Even though the Silicon Graphics machine is about a third as fast as the Cray machine, it is still very popular with consumers of these types of machines. The University of Illinois Supercomputing Center reportedly likes the price, flexibility, and future promise of symmetrical multiprocessor systems so much that it plans to use them exclusively within two years. Its older Crays were "cut up for scrap" at the beginning of this year, and its massively parallel computers will be phased out by 1997.239

One disadvantage of a symmetrical multiprocessor system is that all the CPUs on a single board share the resources of that board. This sharing limits the number of CPUs that can be placed on a single board.240

Although the programming model that a symmetrical multiprocessor system provides has proved to be user-friendly, the programmer must exercise care to produce efficient and correct parallel programs. To limit latency in individual jobs, most software requires enhancement - for example, employing special programming techniques to prevent components of the computer program from competing for system resources - thereby increasing inefficiency.

For this reason, symmetrical multiprocessor systems are not good platforms for high-performance real-time applications.241

In a symmetrical multiprocessor system design, as is true with a massively parallel processor system, the number of CPUs determines how fast a machine potentially will operate. This fact causes a problem for export controls because it is possible to add CPUs to the boards of a symmetrical multiprocessor system, or boards to a massively parallel processor system, and push the machine over export control thresholds after the original export-licensed purchase.242

 

Clusters of Commercial Off-the-Shelf
Computers and Networks

Recent advances in the process of computer-to-computer communication, or networking, allow computers to be linked together, or "clustered." Networking has allowed the clustering of personal computers and workstations into well-balanced effective parallel computers, with much higher computing capabilities than any one of the clustered computers.243

Four thresholds have been crossed in connecting commercial-off-the-shelf components to create parallel computers:

· Using commercial-off-the-shelf components to create parallel computers is simple because of the ease of hardware configuration and the availability of all necessary system software from market vendors

· It is versatile because a wide range of possible network designs with excellent communication characteristics and scalability to large sizes is now available

· Clustered systems performance has now matured to the point that network communication speed is within 50 percent of that in vendor-assembled parallel computers244

· Commercial-off-the-shelf clusters are now affordable

According to officials at the Lawrence Livermore National Laboratory, networking represents only a 10 percent additional cost over the cost of the computing hardware for large systems. Thus, up to approximately 50,000 MTOPS, the computing capability available to any country today is limited only by the amount of money that is available to be spent on commercial-off-the-shelf networking.245

A typical commercial-off-the-shelf networking technology contains five essential elements. They are all inexpensive and widely available. The three hardware elements are switches (approximate cost: $2,000), cables (approximate cost: $100), and interface cards (approximate cost: $1,500). The two software elements are low-level network drivers for common operating systems, and industry standard communication libraries. The hardware and software technology necessary to successfully cluster commercial-off-the-shelf CPUs into effective parallel computers is well developed and disseminated in open, international collaborations worldwide.246

The concept of clustering commercial-off-the-shelf computers has been a subject of open academic study for over a decade. Today, the Beowulf Consortium acts as a focal point for information on clustering technology and has links to many projects. One Beowulf project is the Avalon computer at Los Alamos National Laboratory. Avalon can operate at 37,905 MTOPS247 and was built in four days in April 1998 entirely from commodity personal computer technology (70 DEC Alpha CPUs) for $150,000.

Although commercial-off-the-shelf networking technology has only recently become effective, it has been adopted rapidly. There currently are at least seven competing high-performance network technologies (over 100 megabytes per second or higher): Myrinet, HIPPI, FiberChannel, Gigabit Ethernet, SCI, ATM, and VIA. One network vendor reported over 150 installations in the United States and 17 foreign countries including Australia, Brazil, Canada, the Netherlands, England, France, India, Israel, Italy, Japan, the Republic of Korea, and the PRC.248

Gigabit Ethernet is of particular interest because it is being developed by a cooperative, worldwide industry effort called the Gigabit Ethernet Alliance. 74 companies have pledged to develop products for the open standard - that is, the source software is available openly to software developers. Foreign companies are alliance members and also participate as members of the steering committee and the certification process for compliance. Gigabit Ethernet is projected to be a $3 billion market by the year 2000, which at today's prices translates into approximately 300,000 network switches per year.249

On October 15, 1997, a group of experts met to discuss computer performance metrics for export control purposes. The computer and high-tech industries were represented by Hewlett-Packard, Silicon Graphics/Cray Research, IBM, Digital Equipment Corporation, Intel, Sun Microsystems, the Center for Computing Sciences, the Institute for Defense Analyses, and Centerpoint Ventures. The U.S. Government was represented by the National Institute of Standards and Technology, the Naval Research Laboratory, the Defense Advanced Research Projects Agency, the National Security Agency, Lawrence Livermore National Laboratory, the Defense Technology Security Administration, and the Department of Commerce Bureau of Export Administration.250

The consensus of the discussion was that commercial-off-the-shelf networking is not so significant a threat to replace HPCs as might at first appear to be the case:

Networks of workstations using [commercial-off-the-shelf] networking technology differ from supercomputers. Some problems will run easily and effectively on such networks, while other classes of problems important to national security concerns will not run effectively without a major software redesign effort. For many problems no amount of software redesign will allow networks of workstations to compete with appropriately designed high performance computers.

Even if a "rogue state" assembled such a large network of workstations by legitimately acquiring large numbers of commodity processors, the actual effort to produce the software necessary to realize the full potential of such an aggregate system would take several years. During this time, the state of the art of computational technology would have increased by approximately an order of magnitude.

After considerable discussion, most of the participants were in
agreement that there was a fundamental difference between a system designed by a single vendor that was built as an aggregate of many commodity processors and included the software to enable these processors to cooperatively work on solving single problems of national concern, and a large collection of commodity processors not subject to export
control that are externally networked together.251

According to one expert, many universities have clustered systems, as they are easy to establish. For $70,000, a 12-node system with two Pentium II processors at 300 megahertz (MHz) each would produce a system with 7,200 GFLOPS.. However, the system must be properly structured to perform well, and performance will vary depending on the application, the programmer's ability, and the connection of the machines. An integrated system from Silicon Graphics/Cray will achieve between 10-20 percent of peak performance at best.252

An example of a powerful commercial-off-the-shelf network can be found at the Illinois Supercomputing Center. Four eight-processor and two 16-processor machines from Silicon Graphics are connected in a cluster with a peak speed of nearly 20 GFLOPS.253

According to one expert, it does not require any special expertise to network workstations using commercial-off-the-shelf technology. The software engineering techniques are being taught to undergraduates as part of standard courses in advanced computing, but anyone with programming knowledge should be able to create a network as well.254

The parallel supercomputers of today have peak speeds of over 100 billion floating point operations per second (100 GFLOPS). This is roughly 100 times the peak speed of a Cray YMP class machine, which was the standard for high-performance computing of just five years ago.255

However, it is difficult to achieve a high percentage of this peak performance on a parallel machine.

Whereas a tuned code running on a Cray might reach 80-90 percent of peak speed, codes running on parallel computers typically execute at only 10-20 percent of peak.256 There are two reasons for this:

· The first is that Cray-class computers incorporate extremely expensive, custom-designed processors with vector-processing hardware. These processors are designed to stream large amounts of data through a highly efficient calculational pipeline. Codes that have been tuned to take advantage of this hardware ("vectorized" codes) tend to run at high percentages of peak speed.257

Parallel machines, on the other hand, are generally built from much simpler building blocks. For example, they may use the same processors that are used in stand-alone computer workstations. Individually, these processors are not nearly so sophisticated or so efficient as the vector processors. Thus, it is not possible to achieve so high a percentage of peak speed.258

Some parallel machines contain custom processors (TMC CM-5 vector units) or custom modifications of off-the-shelf processors (Cray T-3D modified DEC alpha chips). Even in those cases, however, the percent of peak achievable on a single node is still on the order of 50 percent or less. In parallel computer design, there is constant tension between the need to use commodity parts as the computational building blocks in order to achieve economies of scale, and the desire to achieve ever-higher percentages of peak performance through the implementation of custom hardware.259

· The second reason that parallel computers run at lower percentages of peak speeds than vector supercomputers is communications overhead. On parallel computers, the extraordinary peak speeds of 100 GFLOPS or more are achieved by linking hundreds or even thousands of processors with a fast communications network.

Virtually all parallel computers today are "distributed memory" computers. This means that the random access memory (RAM) is spread though the machine, typically 32 megabytes at each node. When a calculation is performed on a parallel machine, access is frequently needed to pieces of data on different nodes.

It may be possible to overlap this communication with another computation in a different part of the program in order not to delay the entire program while waiting for the communication, but this is not always the case. Since the timing clock continues while the communication is taking place, even though no calculational work is being performed, the measured performance of the code goes down and a lower percentage of peak performance is recorded.260

 

Domain Decomposition

"Domain decomposition" involves partitioning the data to be processed by a parallel program across the machine's processors.261

In distributed memory architectures, each processor has direct access only to the portion of main memory that is physically located on its node. In order to access other memory on the machine, it must communicate with the node on which that memory is located and send explicit requests to that node for data.262 Figuring out the optimal domain decomposition for a problem is one of the most basic and important tasks in parallel computing, since it determines the balance between communication and computation in a program and, ultimately, how fast that program will run.263

Memory access constitutes an inherent bottleneck in shared-memory systems.264

 

Highly Parallel Technology

Microprocessor-based supercomputing has brought about a major change in accessibility and affordability. Massively parallel processors continue to account for more than half of all installed supercomputers worldwide, but there is a move toward shared memory, including the use of more symmetrical multiprocessor systems and of distributed-shared memory. There is also a tendency to promote scalability through the clustering of shared memory machines because of the increased efficiency of message passing this offers. The task of data parallel programming has been helped by standardization efforts such as Message Passing Interface and High-Performance Fortran.265

Highly parallel technology is becoming popular for the following reasons. First, affordable parallel systems now out-perform the best conventional supercomputers. Cost is, of course, a strong factor, and the performance per dollar of parallel systems is particularly favorable.266 The reliability of these systems has greatly improved. Both third-party scientific and engineering applications, as well as business applications, are now appearing. Thus, commercial customers, not just research labs, are acquiring parallel systems.267

Twice a year the "Top 500 list," a compendium of the 500 most powerful computer systems, is published.268 On the previous page is an example of the numbers and types of systems in the biannual list of the top 500 fastest computers. As this chart points out, massively parallel processors and symmetrical multiprocessor systems are on the rise, while vector systems are losing ground.269

 

Microprocessor Technology

While vector and massively parallel computers have been contending for the supercomputing market, an important new factor has become the availability of extremely powerful commodity microprocessors, the mass-produced chips at the heart of computer workstations.

Ten years ago, workstation microprocessors were far slower than the processors in supercomputers. The fastest microprocessor in 1988, for example, was rated at one million floating point operations per second (MFLOPS) while Cray's processors were rated at 200 MFLOPS.270 A floating-point operation is the equivalent of multiplying two 15-digit numbers. Today, Cray's processors have improved by a factor of ten, to two gigaflops in the brand-new T90; but the fastest microprocessor runs at 600 MFLOPS, an improvement by a factor of 600.

Commercial off-the-shelf microprocessor power is available for a fraction of the cost of a traditional vector processor. Unlike vector processors, which consist of complex collections of chips and are only fabricated by the hundreds each year, commercial off-the-shelf microprocessors are designed for mass production based on two decades of experience making integrated circuits. Research and development costs for each commercial off-the-shelf microprocessor are spread over hundreds of thousands of chips.271

Microprocessors, also known as CPUs, are integrated circuits. They can be divided into broad categories of logic family technologies. The selection of a certain logic technology in the design of an integrated circuit is made after determining an application and weighing the advantages of each type of logic family. Among these are:

· Emitter-Coupled Logic (ECL) is used for circuits that will operate in a high-speed environment, as it offers the fastest switching speeds of all logic families; it is the first type HPC chip. ECL, however, is power-hungry, requires complex cooling techniques, and is expensive.272

· Complementary Metal-Oxide Semiconductor Logic (CMOS) is relatively inexpensive, compact and requires small amounts of power. CMOS off-the-shelf is the standard PC or workstation chip; proprietary CMOS is custom-built, specially designed for the particular HPC and incompatible with PCs and workstations.

Realizing the differences between logic technologies gives a perspective to understanding where CPU technology is headed, and the reasons that the market is driving one technology faster than another. As the following chart illustrates, commercial off-the-shelf, inexpensive CPUs are coming to dominate the high performance computing world.273

 

Interconnect Technology

In multiprocessor systems, actual performance is strongly influenced by the quality of the "interconnect" that moves data among processors and memory subsystems.274

Traditionally, interconnects could be grouped into two categories: proprietary high-performance interconnects that were used within the products of individual vendors, and industry standard interconnects that were more readily available on the market, such as local area networks.275 The two categories featured different capabilities, measured in bandwidth and latency.

Recently, a new class of interconnect has emerged: clustering interconnects. These offer much higher bandwidth and lower latency than local area networks. Their shortcomings are comparable to proprietary high-performance interconnects, including lower bandwidth, higher latency, and greater performance degradation in large configurations or immature system software environments.276

 

Message Passing Interface

Message Passing Interface (MPI) is a program containing a set of sub-routines that provide a method of communication that enables various components of a parallel computer system to act in concert. The communications protocol that MPI uses is the same utilized by the Internet. According to Dr. Jeff Hollingsworth of the University of Maryland Computer Science Department, an example of how each of the different software applications interact with the hardware would be as follows:277

Application (Code)

MPI

TCP/IP

Linux

Windows NT (Operating system)

Hardware

Some software, says Hollingsworth, is sold in a version that is compatible with MPI. One example is automobile crash simulation software. This software, which is essentially code to simulate a physical system in three dimensions, is adaptable to other scientific applications such as fluid dynamics, according to Hollingsworth.278

Hollingsworth states that software that is not already "MPI ready" can be modified into code that can be run in an MPI, or parallel, environment. Modifying this software to enable it to run in an MPI environment can be very difficult, or quite easy, says Hollingsworth, depending on "data decomposition." 279

The ease of converting software that is not "MPI ready" into an "MPI ready" version is dependent on the expertise of the software engineers and scientists working on the problem. For a single application and a single computer program, the level of expertise required to convert a computer program in this way is attainable in graduate level, and some undergraduate level, college courses, according to Hollingsworth.280

It has not been possible to determine which, if any, commercially available software is both MPI ready and applicable to defense-related scientific work.


Notes

1 Background Paper on High Performance Computers to Countries of Concern, Defense Department, November 19, 1998.
2 Ibid.
3 Memorandum for the Record by Paul Koenig, Defense Technical Security Administration, August 24, 1995.
4 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, Peter Wolcott, Patrick Homer, May 1998.
5 "Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196.
6 Memorandum for the Record by Paul Koenig, Defense Technical Security Administration, August 24, 1995.
7 Interview of Dr. David Kahaner, October 19, 1998.
8 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, Peter Wolcott, Grey Burkhart, Center for International Security and Arms Control, Stanford University, November 1995.
9 Ibid.
10 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
11 Ibid.
12 Ibid.
13 Ibid.
14 Commander in Chief, U.S. Pacific Command Memorandum to the Joint Chiefs of Staff, Ser: 444-98, November 9, 1998.
15 "PR China: System Simulation Activities," Asian Technology Information Program, December 24, 1992.
16 "Chinese Prove To Be Attentive Students of Information Warfare," Jane's Intelligence Review, October 1997.
17 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.; "Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196.
18 Department of Energy, Office of Intelligence, Technical Intelligence Note on Computers, Nuclear Weapons, and U.S. Security, May 6, 1998.
19 Ibid.
20 Ibid.
21 "Export Controls and China," briefing prepared for the House Committee on Commerce by Dr. Thomas L. Cook, Los Alamos National Laboratory, September 17, 1998.
22 Testimony of Notra Trulock.
23 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
24 "Export Controls and China," briefing prepared for the House Committee on Commerce by Dr. Thomas L. Cook, Los Alamos National Laboratory, September 17, 1998.
25 Testimony of Dr. Thomas L. Cook, Los Alamos National Laboratory, December 16, 1998.
26 "Export Controls and China," briefing prepared for the House Committee on Commerce by Dr. Thomas L. Cook, Los Alamos National Laboratory, September 17, 1998.
27 Commander in Chief, U.S. Pacific Command Memorandum to the Joint Chiefs of Staff, Ser: 444-98, November 9, 1998.
28 "Export Controls and China," briefing prepared for the House Committee on Commerce by Dr. Thomas L. Cook, Los Alamos National Laboratory, September 17, 1998.
29 Department of Energy, Office of Intelligence, Technical Intelligence Note on Computers, Nuclear Weapons, and U.S. Security, May 6, 1998.
30 Department of Energy, Office of Intelligence, Technical Intelligence Note on Computers, Nuclear Weapons, and U.S. Security, May 6, 1998, Attachment.
31 "Export Controls and China," briefing prepared for the House Committee on Commerce by Dr. Thomas L. Cook, Los Alamos National Laboratory, September 17, 1998.
32 "Key Projects in China's Computerization," Asian Technology Information Program report 98.048.
33 "PR China: System Simulation Activities," Asian Technology Information Program, December 24, 1992.
34 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
35 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
36 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
37 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
38 Ibid.
39 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
40 "Information Warfare Grips China," Jane's Intelligence Review.
41 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the l990s," Seymour Goodman, et. al.
42 "Information Warfare Grips China," Jane's Intelligence Review.
43 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the l990s," Seymour Goodman, et. al.
44 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
45 "The Militarily Critical Technologies List Part I: Weapons Systems Technologies," June 1996, Department of Defense, p. 8-7, Background Paper on High Performance Computers to Countries of Concern, Defense Intelligence Agency, November 19, 1998, cover letter to the Honorable Floyd Spence.
46 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
47 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
48 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
49 Commander in Chief, U.S. Pacific Command Memorandum to the Joint Chiefs of Staff, Ser: 444-98, November 9, 1998.
50 "The Militarily Critical Technologies List Part I: Weapons Systems Technologies," June 1996, Department of Defense, Commander in Chief, U.S. Pacific Command Memorandum to the Joint Chiefs of Staff, Ser: 444-98, November 9, 1998.
51 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
52 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
53 Ibid.
54 Ibid.
55 "Chinese Prove To Be Attentive Students of Information Warfare," Jane's Intelligence Review, October 1997.
56 "Quicklook Report for Military Trends Workshop," Strategic Assessment Center, Science Applications International Corporation, June 8, 1998.
57 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.; "Information Warfare Grips China," Jane's Intelligence Review.
58 Memorandum for the Record, Joint Investigative Staff Visit to the Mitre Corporation, Bedford, MA, October 6, 1988.
59 "Chinese Prove To Be Attentive Students of Information Warfare," Jane's Intelligence Review, October 1997; "Information Warfare Grips China," Jane's Intelligence Review.
60 "Chinese Prove To Be Attentive Students of Information Warfare," Jane's Intelligence Review, October 1997.
61 Ibid.
62 "Information Warfare Grips China," Jane's Intelligence Review.
63 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
64 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
65 Ibid.
66 Ibid.
67 Ibid.
68 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
69 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
70 "Quicklook Report for Military Trends Workshop," Strategic Assessment Center, Science Applications International Corporation, June 8, 1998.
71 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
72 "Quicklook Report for Military Trends Workshop," Strategic Assessment Center, Science Applications International Corporation, June 8, 1998.
73 Commander in Chief, U.S. Pacific Command Memorandum to the Joint Chiefs of Staff, Ser: 444-98, November 9, 1998.
74 Export Administration Annual Report Fiscal Year 1991.
75 "Export Control on Supercomputers," Federal Register, May 18, 1992, Vol. 57, No. 96.
76 "Toward a National Export Strategy," Trade Promotion Coordinating Committee report, September 30, 1993, Chapter 5.
77 Export Administration Annual Report 1995 and 1996 on Foreign Policy Export Controls.
78 Federal Register, February 24, 1994.
79 Federal Register, April 4, 1994.
80 Code of Federal Regulations, p. 349-356.
81 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
82 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
83 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
84 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
85 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
86 Ibid.
87 Ibid.
88 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
89 U.S. General Accounting Office staff interview of Paul Koenig et. al., November 24, 1997, and February 19, 1998.
90 Defense internal memorandum for the record from Paul Koening on "Supercomputing Study," August 24, 1995, and U.S. General Accounting Office staff interview of Paul Koenig, et.al., November 24, 1997.
91 "High Performance Computing Technical Assessment, Summary Report Findings," Institute for Defense Analyses, Technology Identification & Analyses Center, Prepared for: Principal Deputy Assistant Secretary of Defense (Dual-Use Technology Policy & International Programs), August 1995.
92 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
93 U.S. General Accounting Office staff interview of Oksana Nesterczuk, July 21, 1998.
94 "Supercomputer Technology Status and Trends Over the Next Two Years," June 2, 1995; "Global Supercomputer Industry and Market Assessment," Department of Commerce, Office of Strategic Industries and Economic Security, Economic Analysis Division, June 2, 1995.
95 U.S. General Accounting Office staff interview of Defense Technology Security Administration officials, November 23, 1997.
96 U.S. General Accounting Office staff interview of Defense Technology Security Administration officials, February 19, 1998.
97 Defense internal memorandum for the record from Paul Koening on "Supercomputing Study," August 24, 1995.
98 Ibid.
99 "High Performance Computing Technical Assessment, Summary Report Findings," Institute for Defense Analyses, Technology Identification & Analyses Center, Prepared for: Principal Deputy Assistant Secretary of Defense (Dual-Use Technology Policy & International Programs), August 1995.
100 Ibid.
101 Ibid.
102 Bandwidth (through-put) and latency (transmission delay) are crucial parameters of the interconnect between processors. The lower the bandwidth, the higher the latency, and the less scalable the interconnect, the more of a bottleneck the interconnect becomes. The more the interconnect is a bottleneck, the more "coarsely grained" an application must be to run effectively on the system. See "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
103 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
104 U.S. General Accounting Office staff interview of Institute for Defense Analyses and Office of the Secretary of Defense officials and written response.
105 Ibid.
106 U.S. General Accounting Office staff interview of Defense Technology Security Administration officials, July 21, 1998.
107 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
108 Ibid.
109 Interview of Mitchel Wallerstein, November 25, 1998.
110 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
111 Export Administration Regulations, January 25, 1996.
112 Ibid.
113 Ibid.
114 Ibid.
115 Ibid.
116 Export Administration Regulations, April 1998, Supplement No. 1 to Part 774.
117 Ibid.
118 Export Administration Regulations, April 1998, Supplement No. 1 to Part 774, Part 740.7.
119 Export Administration Regulations, April 1998, Supplement No. 1 to Part 742.12, Part 742.12, "High Performance Computers.''
120 Ibid.
121 Export Administration Regulations, April 1998, Supplement No. 3 to Part 742, "Safeguard Conditions and Related Information."
122 Ibid.
123 Export Administration Regulations, April 1998, Part 744, "Control Policy: End-User and End-Use Based."
124 Ibid.
125 Ibid.
126 Export Administration Regulations, April 1998, Part 772.
127 Export Administration Regulations, April 1998, Legal Authority, Section 12, "Enforcement," April 1998.
128 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
129 Ibid.
130 Interview of Will Lowell, November 19, 1998; International Traffic in Arms Regulations, Section 120.
131 Ibid.
132 Ibid.
133 Ibid.
134 End-use screening is the process exporters follow to evaluate whether a transaction involves an unacceptable risk of use in, or diversion to, a proliferator or military end user. "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
135 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
136 Export Administration Regulations, April 1998, Part 744, "Control Policy: End-User and End-Use Based."
137 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
138 Public Law 105-85.
139 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
140 Department of Defense Study, November 19, 1998, Enclosure 7, "Expected Developments."
141 Ibid.
142 Ibid.
143 Ibid.
144 Ibid.
145 Ibid.
146 PSVs are on-site visits, generally by U.S. government officials, to locations where goods are shipped for the purpose of ensuring that they have not been diverted to other locations. ("Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.)
147 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
148 Ibid.
149 Arrangement between the United States and China for end-use visits.
150 Ibid.
151 Interview of Iain S. Baird, November 17, 1998.
152 Response to Committee questions from William Reinsch, James Lewis, and Mark Menefee, November 17, 1998.
153 Interview of William Reinsch, November 19, 1998.
154 Ibid.
155 "Export Controls: Information on the Decision to Revise High Performance Computer Controls," GAO/NSIAD-98-196, September 16, 1998.
156 Ibid.
157 Ibid.
158 Ibid.
159 Ibid.
160 U.S. General Accounting Office Staff Summary of Sun Microsystems HPC diversion, April 1998.
161 Ibid.
162 Ibid.
163 Ibid.
164 Ibid.
165 Ibid.
166 Ibid.
167 Ibid.
168 Export Administration Annual Report, Export Enforcement, March 1998.
169 Ibid.
170 Ibid.
171 Ibid.
172 Export Controls: Information on the Decision to Revise High Performance Computer Controls, GAO/NSIAD-98-196, September 16, 1998.
173 Memorandum for the Record, "Report on National Lab Briefings of September 28 and 29, 1998," Joint Staff, October 2, 1998.
174 Ibid.
175 The military uses are the design or development of nuclear, biological or chemical weapons; the design or development of weapons of mass destruction; the design or development of missile or rocket systems; and any cryptoanalytic or cryptographic purpose.
176 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.; Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
177 Ibid.
178 "Computers in China/Korea/Hong Kong, ATIP, 97.048," Asian Technology Information Project Selected Reports, Book #1.
179 "U.S. Technology Transfers to the People's Republic of China," by Kathleen Walsh, DFI International, dated December, 1997. This report was produced at the request of the Commerce Department's Bureau of Export Administration. It was the first in a series of studies into technology transfers to the PRC commissioned by BXA.
180 "Computers in China/Korea/Hong Kong, ATIP, 97.048," Asian Technology Information Project Selected Reports, Book #1.
181 Ibid.
182 "U.S. Technology Transfers to the People's Republic of China," by Kathleen Walsh, DFI International, dated December, 1997. This report was produced at the request of the Commerce Department's Bureau of Export Administration. It was the first in a series of studies into technology transfers to the PRC commissioned by BXA.
183 "Computers in China/Korea/Hong Kong, ATIP, 97.048," Asian Technology Information Project Selected Reports, Book #1.
184 Ibid.
185 Ibid.
186 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Selected Reports of Asian Technology Information Project, Book #1.
187 Ibid.
188 "High Performance Computing (HPC) in Japan (1)," May 16, 1997, Asian Technology Information Project report # ATIP97.044, Selected Reports of Asian Technology Information Project, Book #1.
189 Commerce Department, Bureau of Export Administration's Export Control Automated Support System (ECASS).
190 Ibid.
191 These notifications included three machines for Hong Kong, a Tier 2 country, that did not need to be reported under the 1998 notification regulations. Their total value was about $256,000. Commerce Department, Bureau of Export Administration's Export Control Automated Support System (ECASS).
192 Commerce Department, Bureau of Export Administration's Export Control Automated Support System (ECASS).
193 Advanced Computing Technologies in China, March 24, 1998, Asian Technology Information Project report #ATIP98.022, Book #1, Selected Reports of Asian Technology Information Project.
194 "Computers in China/Korea/Hong Kong, ATIP, 97.048," page 10, Asian Technology Information Project Selected Reports, Book #1.
195 Three HPC exports for Hong Kong were included in the data for China.
196 "Computers in China/Korea/Hong Kong, ATIP, 97.048," Asian Technology Information Project Selected Reports, Book #1.
197 Ibid.
198 Michael Evans, a computer programmer for the Federal Bureau of Investigation with 13 years private sector programming experience, and 3 years criminal investigative experience regarding computer crimes, Memorandum For the Record dated, December 15, 1998.
199 "Arms Proliferation Policy, Support to the Presidential Advisory Board," RAND, 1996.
200 Ibid.
201 Ibid.
202 Ibid.
203 Ibid.
204 Ibid.
205 Interview of Bob Nesbit, October 6, 1998.
206 "The Round Table on Computer Performance Metrics for Export Control: Discussions and Results," Alfred E. Brenner, Task leader, and Norman R. Howes. Document of the Institute For Defense Analyses, December 1997. IDA Document D-2116.
207 "NHSE Review 1996 Volume," 1996, Aad J. van der Steen and Jack J. Dongarra.
208 "Practical Parallel Computing (Physics 500)," Lecture Series, University of New Mexico, Fall 1995, Dr. Michael Warren.
209 Memorandum for the Record, Joint Staff Interview of Dr. David Kahaner, October 19, 1998.
210 Ibid.
211 Memorandum for the Record, Joint Staff Interview of Dr. Jeff Hollingsworth, November 5, 1998.
212 Interview of Tom Dunn by Joint Staff, October 29, 1998.
213 Ibid.
214 Ibid.
215 "Practical Parallel Computing (Physics 500)," Lecture Series, University of New Mexico, Fall 1995, Dr. Michael Warren.
216 Memorandum for the Record, Joint Staff Interview of Dr. David Kahaner, October 19, 1998.
217 Interview of Dr. Jack Dongarra, by U.S. General Accounting Office, February 6, 1998.
218 "Practical Parallel Computing (Physics 500)," Lecture Series, University of New Mexico, Fall 1995, Dr. Michael Warren.
219 "Off-the-Shelf Chips Conquer The Heights of Computing," Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
220 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
221 Interview of Dr. Jack Dongarra, by U.S. General Accounting Office, February 6, 1998.
222 Memorandum for the Record, Joint Staff, November 2, 1998 DOD HPC briefing.
223 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
224 "Off-the-Shelf Chips Conquer The Heights of Computing", Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
225 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
226 "Off-the-Shelf Chips Conquer The Heights of Computing", Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
227 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
228 "ASCI Blue Pacific can bring IBM on first position in TOP500", Primeur Analysis, October 28, 1998, Ad Emmen.
229 "Teraflop" is a term used to describe a trillion floating point operations a second. "Terabyte refers to a trillion bytes of data.
230 "ASCI Blue Pacific can bring IBM on first position in "TOP500," Primeur Analysis, October 28, 1998, Ad Emmen.
231 Ibid.
232 "Lawrence Livermore National Laboratory Presentations on China, Nuclear Weapons and High Performance Computing" September 15, 1998.
233 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
234 Ibid.
235 "Fitting Architecture to Application: Choosing between SMP and RACE," Mercury Computer Systems, Inc., June 17, 1996.
236 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
237 An approximation is that the composite theoretical performance rating in MTOPS is about 75 percent the value in MFLOPS. Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
238 "Off-the-Shelf Chips Conquer The Heights of Computing", Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
239 Ibid.
240 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
241 "Fitting Architecture to Application: Choosing between SMP and RACE", Mercury Computer Systems, Inc., June 17, 1996.
242 Defense Intelligence Agency Study, "Distribution of U.S. and Allied High Performance Computers . . . ," November 19, 1998.
243 "Lawrence Livermore National Laboratory Presentations on China, Nuclear Weapons and High Performance Computing," September 15, 1998.
244 Ibid.
245 Ibid.
246 Ibid.
247 Ibid.
248 Ibid.
249 Ibid.
250 "The Round Table on Computer Performance Metrics for Export Control: Discussions and Results," Institute For Defense Analyses, December 1997.
251 Ibid.
252 Interview of Dr. Jack Dongarra by U.S. General Accounting Office, February 6, 1998.
253 "Off-the-Shelf Chips Conquer The Heights of Computing," Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
254 Interview of Dr. Jack Dongarra, by U.S. General Accounting Office, February 6, 1998.
255 "Practical Parallel Computing (Physics 500)," Lecture Series, University of New Mexico, Fall 1995, Dr. Michael Warren.
256 Ibid.
257 Ibid.
258 Ibid.
259 Ibid.
260 Ibid.
261 Ibid.
262 Ibid.
263 Http://www.phys.unm.edu
264 "Building on the Basics: An Examination of High-Performance Computing Export Control Policy in the 1990s," Seymour Goodman, et. al.
265 "High-Performance Computing Technologies: Where We Are Today," Jack Dongarra, University of Tennessee and Oak Ridge National Laboratory.
266 Ibid.
267 "Off-the-Shelf Chips Conquer The Heights of Computing," Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
268 University of Mannheim and Netlib (a repository maintained by Bell Laboratories, Oak Ridge National Laboratory, and the University of Tennessee to serve the computer community) publish statistics on HPCs to, among other things, provide a better understanding of the HPC market.
269 "Top500 Supercomputer List at Mannheim University and Netlib," "Slides about Top500," November 1998, Netlib.
270 "Off-the-Shelf Chips Conquer The Heights of Computing," Science, September 8, 1995, American Association for the Advancement of Science, Robert Pool.
271 Ibid.
272 "Logic Design for Array-Based Circuits," Dr. Donnamaie E. White, September 11, 1996.
273 "Top500 Supercomputer List at Mannheim University and Netlib," "Slides about Top500," November, 1998, Netlib.
274 "High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century," Seymour Goodman, et. al.
275 Ibid.
276 Ibid.
277 Interview of Dr. Jeff Hollingsworth by Joint Staff, November 5, 1998.
278 Ibid.
279 Ibid.
280 Ibid.

______________________________________________________________________

BACK to TOP                                   BACK to COX REPORT