Jump to ContentJump to Main Navigation
Trading with the EnemyThe Making of US Export Control Policy toward the People's Republic of China$
Users without a subscription are not able to see the full content.

Hugo Meijer

Print publication date: 2016

Print ISBN-13: 9780190277697

Published to Oxford Scholarship Online: March 2016

DOI: 10.1093/acprof:oso/9780190277697.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 07 June 2020

Supercomputers, Telecommunications Equipment, and China’s Military Modernization

Supercomputers, Telecommunications Equipment, and China’s Military Modernization

Chapter:
(p.165) 5 Supercomputers, Telecommunications Equipment, and China’s Military Modernization
Source:
Trading with the Enemy
Author(s):

Hugo Meijer

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190277697.003.0006

The competition between the two contending coalitions, Control Hawks and the Run Faster coalition, resulted in diverging policy outcomes in the two technology areas of dual-use information and communications technology (ICT) and satellites. Chapter 5 demonstrates how, in the area of dual-use information and communications technology, that could be used for both civilian and military applications by the PRC, the Run Faster coalition was able to overcome the resistance and opposition of the Control Hawks and to significantly liberalize export controls during the first decade of the post-Cold War era. To do so, the making of US export controls toward China is examined respectively in the areas of high performance computers (or supercomputers) and telecommunications equipment (section). It will be shown that the same international, bilateral, and domestic factors coalesced in molding American export control policy toward China in these two strategically sensitive areas.

Keywords:   foreign technology acquisition, telecommunications equipment, eavesdropping, US export control policy, National Security Agency, IT industry, lobbying, 1990s

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .