Back to National Journal
10 of 22 results     Previous Story | Next Story | Back to Results List

NATIONAL SECURITY - Deceptive Engagement

By John Maggs, National Journal
© National Journal Group Inc.
Saturday, May 29, 1999

	      Samuel R. ''Sandy'' Berger, President Clinton's national 
security adviser, gave a speech on January 12 about the worldwide 
proliferation of weapons of mass destruction. Berger was among 
friends that day. His audience was, in essence, the security 
policy establishment. The venue was the annual conference of the 
Carnegie Endowment for International Peace, the best-known and 
most respected American think tank in its area. 
	     With the news seeping out daily about China's theft of 
U.S. nuclear secrets, Berger's speech, which promised a 
comprehensive rundown of major proliferation issues, somehow 
managed to omit any reference to China. But it's unlikely that 
many in Berger's audience regarded this as an oversight. During 
the two-day Carnegie conference, with 16 sessions and 71 
distinguished speakers, not a single speech included a direct 
reference to the accumulating evidence of China's theft of U.S. 
secrets about nuclear bombs and missiles and its diversion of 
supercomputers and other technologies from peaceful uses to 
nuclear weapons development. 
	     Instead, and quite to the contrary, the conference 
featured a luncheon address by China's chief arms control 
official, Sha Zukang. Sha, who was warmly received, talked about 
the threats posed by other countries, tweaked the United States 
for failing to ratify a ban on nuclear testing, and called for 
other nations to join China in its peaceful ways and in its 
efforts to ban all nuclear weapons. Even as U.S. newspapers were 
daily divulging China's large espionage effort aimed at 
developing and deploying a mobile ''second strike'' nuclear 
force--one that could fight on, after suffering a first strike-- 
Sha repeated China's long-standing plea that NATO adopt a policy 
of never firing a first strike against any adversary. 
	     The mind-set exhibited at the Carnegie conference may 
help explain why there is even a need for a Cox Report. The 
foreign policy experts, rightly or wrongly, do not, by and large, 
view China as a potential threat to the United States, nor have 
they for the past two decades. 
	     The Cox Report shows that the American government has 
consistently ignored warnings about Chinese espionage over 20 
years. The report does not substantiate charges that President 
Clinton and his aides covered up problems, either for corrupt 
reasons or to advance a policy of closer ties with Beijing. (Cox 
investigators reportedly weighed, and then rejected, allegations 
that Chinese campaign contributions influenced White House 
handling of nuclear spying charges.) On the other hand, the sheer 
breadth of the security lapses, misguided policy shifts, and 
negligence by U.S. agencies just since 1992 strains the logic of 
the official explanation: that it was all the result of many 
separate and coincidental instances of bureaucratic incompetence. 
	     If Berger, in his speech in January, managed to avoid the 
untidy details of what is now public knowledge in the Cox Report, 
he did provide a clue about how such a large and consistent 
policy failure might come about. The centerpiece of U.S. arms 
control efforts, said Berger, was ratification and enlargement of 
the Comprehensive Nuclear Test Ban Treaty (CTBT), a pact he 
called (quoting Clinton) ''the longest-sought, hardest-fought 
prize in the history of arms control.'' Berger called for the 
Senate to ratify the treaty this year, knowing full well that 
this will be its last chance for approval during the Clinton 
presidency, before the 2000 campaign stalls major initiatives. 
	     Ratifying and preserving the test ban has become the 
primary goal. This has blinded many to the possibility, as the 
Cox Report suggests, that the CTBT may not be enough to deter 
China from nuclear advances. 
	     First proposed by President Eisenhower, the CTBT was 
conceived as a way to block the deployment and advancement of 
nuclear weapons around the world. If countries are enjoined from 
testing weapons, the reasoning goes, then they cannot develop 
them. This 1950s-era doctrine is largely unquestioned today by 
the foreign policy establishment: No country has ever deployed a 
nuclear explosive without testing it first. Berger repeated this 
creed during his Carnegie speech: ''The treaty will constrain the 
development of more-advanced nuclear weapons.'' 
	     The Cox Report shows that this statement is simply not 
true. In 1996, China signed the CTBT and thereby agreed to cease 
testing. But China is continuing to develop advanced nuclear 
warheads, equipped with all of the essential technology in the 
U.S. arsenal. China is doing this the same way as the United 
States and Russia and other nuclear powers are doing it: through 
sophisticated computer modeling made possible by high-speed 
computers, which China has purchased as the United States and the 
other exporters have dismantled their Cold War controls on such 
machines. More important, however, China may be benefiting from 
access to stolen U.S. ''legacy codes,'' the raw computer data on 
the testing of U.S. nuclear weapon designs going back decades. 
These codes, allegedly stolen from Los Alamos National Laboratory 
sometime in the 1990s, could help China fill in the gaps in any 
of its design information. 
	     The establishment view on the implications of the 
possible loss of the legacy codes is summed up in the response of 
one well-known security expert to news of this particular breach. 
Assuming that China has acquired and used the legacy codes (which 
is suggested but not demonstrated conclusively in the Cox 
Report), ''the crucial question is what Chinese intentions are,'' 
said Jonathan D. Pollack, senior adviser at RAND, a think tank in 
Santa Monica, Calif. ''If you believe, like most analysts, that 
the Chinese do not intend to field a nuclear force to threaten 
the United States or U.S. allies in (Asia), then you look at 
things very differently. 
	     ''We have succeeded in getting the Chinese to sign the 
CTBT,'' Pollack continued. ''Is it bad or is it good that they 
are developing the means (that is, computer simulations) to 
successfully maintain their nuclear capabilities without testing? 
Is it bad that China may have gotten the means to advance those 
(computer simulations) from us? Of course, it is bad if we let 
(the codes) get away. But that doesn't mean it is bad they have 
them,'' said Pollack. 
	     Pollack's view was echoed last week by Charles Ferguson, 
a senior research analyst at the Federation of American 
Scientists who was working at Los Alamos in the 1980s when much 
of the Chinese espionage took place. Assuming that China did 
indeed acquire U.S. warhead designs and the legacy codes to help 
test them, Ferguson said, ''even then, they would need to conduct 
nuclear tests to verify what they actually have.'' 
	     But the Pollack-Ferguson view rests on an assumption that 
China cannot advance its nuclear program without actual testing-- 
an assumption that the Cox Report challenges. Through 
supercomputers, through the theft of test data, through the 
acquisition of other technology used to further nuclear research 
without a full-fledged test explosion, the report warns, China is 
developing, and preparing to deploy, new weapons based on U.S. 
designs. 
	     The single-minded reliance on a test ban as the arms 
control panacea also appears to be little questioned in U.S. 
efforts to persuade Russia to join the CTBT. Few noticed the 
congressional testimony a year ago of a career Defense Department 
official who raised questions about the inducements the United 
States may have offered Russia to sign the treaty. Peter Leitner, 
senior strategic trade adviser at Defense, pointedly told the 
Joint Economic Committee on April 28, 1998, that he was 
testifying ''as a private citizen and not as an employee of the 
Department of Defense.'' Leitner said that some Russian officials 
have accused the Clinton Administration of reneging on a promise 
to facilitate the transfer of supercomputer technology to Russia 
to help it catch up with the U.S. advantage in computer 
simulation. ''If, as a price for Russia's signature, the Clinton 
Administration was willing to provide the means to circumvent 
both the spirit and explicit goals (of the CTBT), then the treaty 
should be regarded as little more than a sham,'' Leitner 
testified. 
	     As long as a treaty stands in the way of any country's 
deployment of new nuclear weapons, the ruling logic goes, all 
evidence of research and development, including the possible 
theft of U.S. designs, is of only hypothetical significance. 
Indeed, say the adherents of this logic, the theft of U.S. test 
data and misuse of supercomputers can actually help 
nonproliferation efforts, by discouraging China from breaking the 
test ban. 
	     It is understandable, at least in emotional terms, that 
people should be reluctant to abandon the optimistic view of 
China's intentions, and of the use to which China may put stolen 
American nuclear secrets. The alternative is to face the 
possibility that the United States is not much safer than it was 
during the Cold War, with that long conflict's crushing expenses, 
its terror, and its distortion of domestic priorities and 
politics. The lengthy history of largely unrestricted exchanges 
with Chinese scientists at U.S. nuclear labs demonstrates our 
sense of security. To end or sharply limit such visits, a move 
strongly resisted even by most Republican critics of the 
Administration, would be to return to the Cold War way of life. 
Likewise, the loosening of export controls is a signal that, in 
the post-Soviet world, the United States enjoys the luxury of 
worrying more about boosting exports than about retarding 
military advances abroad. To reverse that would be to suggest 
that economic growth may have to be sacrificed, again, for the 
nation's defense. Satellite joint ventures in China are a welcome 
symbol of how capitalism and technology are banishing suspicion 
and bridging differences with the United States. To admit that 
China is plundering these ventures for military know-how would 
be, well, depressing. 
	     Sandy Berger, President Clinton, and a host of foreign 
policy experts, in the days since the Cox Report was released, 
have reconfirmed their worldview, sincerely held, that even if 
China steals our nuclear secrets and pursues some interests 
inimical to the United States, America is still better off with 
''constructive engagement.'' If China can be brought into the 
fold of Western-oriented capitalist economies, the thinking goes, 
then eventually and inexorably, China will move closer to 
democracy. Globalists (Republican and American corporate leaders 
among them) further argue that it is impossible to restrict most 
technology nowadays, and trying to restrict it deprives America 
of business and possibly of a chance to influence how that 
technology is used. These are the dominant views shaping the 
American approach to China, and they may prove to be sound ones. 
But they may also have played a role in concealing, or playing 
down, the findings revealed in the Cox Report.


10 of 22 results     Previous Story | Next Story | Back to Results List