TITLE

The Next China Battle

AUTHOR(S)
Hirsh, Michael; Liu, Melinda; Pappas, Leslie
PUB. DATE
March 1999
SOURCE
Newsweek;3/15/1999, Vol. 133 Issue 11, p52
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports on the impact of an investigation by California Republican Christopher Cox on China stealing United States nuclear and military knowledge. The theft of nuclear labs; Allegations that operatives gained information of the top-secret W-88 nuclear warhead; Effect of the Cox report's recommendation for tougher export controls on the computer industry; Supercomputer export licenses to potential military users; How Cox wants to slow exports more by requiring inspections in China. INSET: Sales at Risk.
ACCESSION #
1610307

 

Related Articles

  • The Next China Battle. Hirsh, Michael; Liu, Melinda; Pappas, Leslie // Bulletin with Newsweek;03/16/99, Vol. 117 Issue 6165, p61 

    Reports on the impact of an investigation by California Republican Christopher Cox on China stealing United States nuclear and military knowledge. The theft of nuclear labs; Allegations that operatives gained information of the top-secret W-88 nuclear warhead; Effect of the Cox report's...

  • The Next China Battle. Hirsh, Michael; Liu, Melinda; Pappas, Leslie // Newsweek (Pacific Edition);03/15/99 (Pacific Edition), Vol. 133 Issue 11, p16 

    Reports on the impact of an investigation by California Republican Christopher Cox about China stealing United States nuclear and military knowledge. Allegations that operatives gained information of the top-secret W-88 nuclear warheads; Effect of the Cox report's recommendation for tougher...

  • The Next China Battle. Hirsh, Michael; Liu, Melinda; Pappas, Leslie // Newsweek (Atlantic Edition);03/15/99 (Atlantic Edition), Vol. 133 Issue 11, p18 

    Reports on the impact of an investigation by California Republican Christopher Cox about China stealing United States nuclear and military knowledge. Allegations that operatives gained information of the top-secret W-88 nuclear warheads; Effect of the Cox report's recommendation for tougher...

  • These Computers Contain No Information? Dettmer, Jamie // Insight on the News;08/23/99, Vol. 15 Issue 31, p6 

    Reports the sale of a surplus supercomputer that had been used by nuclear laboratories in the United States to a Chinese exporter in October 1998. National security concern over the sale of the supercomputer; Congressional hearing on the sale; Efforts to buy back the supercomputer; Speculation...

  • Computer export rules trigger security debate. Mann, Paul // Aviation Week & Space Technology;11/17/1997, Vol. 147 Issue 20, p92 

    Focuses on the debate surrounding the United States restrictions on the export of supercomputers. Considerations of national security; House and Senate attention to the export control law.

  • Will Money Buy China's Love? D'Agostino, Joseph A. // Human Events;06/02/2000, Vol. 56 Issue 20, p3 

    Enumerates the arguments against the advocates of granting permanent normal trade relations with China in the United States (US) Congress. National security threat of China to the US; Espionage activities of China in the US; Human rights violations of China.

  • House committee acts on first responder funds.  // AHA News;3/22/2004, Vol. 40 Issue 6, p3 

    Deals with the decision of the U.S. House Select Committee on Homeland Security to approve the Faster and Smarter Funding for First Responders Act in March 2004. Overview of the bill; Statement made by Select Committee Chairman Christopher Cox regarding the federal funding appropriated for...

  • GOVSEC.  // SDM: Security Distributing & Marketing;May2005, Vol. 35 Issue 5, p12 

    Reports on the Government Security Expo and Conference in Washington, D.C. in May 2005. Participation of homeland security professionals; Topics to be discussed, such as the convergence of information technology and physical security, identity theft and wireless communications; Keynote speech by...

  • TRYING TO CONNECT THE DOTS. Whitelaw, Kevin // U.S. News & World Report;9/15/2003, Vol. 135 Issue 8, p31 

    Focuses on the Terrorism Threat Integration Center (TTIC), which was created in response to intelligence failures concerning the September 11, 2001 terrorist attack in the United States. Departments involved with the TTIC; How the TTIC coordinates the counterterrorism efforts if intelligence...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics