U.S. Department of Defense
Technology theft can cost companies billions of dollars each year but also loss of military superiority.

DoD Task Force Focuses on Preventing Technology Theft

Dec. 4, 2019
Technology theft can cost companies billions of dollars each year, but also loss of military superiority.

Technology theft plagues not just commercial and industrial businesses but advanced military electronic systems as well. Attempts are made each year by foreign governments to steal technological resources and intellectual property (IP) worth billions of U.S. dollars, prompting the Department of Defense (DoD) to establish its Protecting Critical Technology Task Force. Although the technology theft usually occurs via the communications networks of contracting companies and their computer networks, the results are as devastating to the DoD as to the company.

The officer leading the DoD’s Protecting Critical Technology Task Force, Air Force Major General Thomas E. Murphy, admits that the technology theft is in the area of billions of dollars, although it is the negative effects on this country’s military capabilities that is a much greater concern: “The consequence is the erosion of the lethality of the joint force. You cannot put a price on that.” He explains that it may not be possible to prevent a country from hacking into a company’s computer network to steal technology, but it is important for the DoD to learn about the loss as quickly as possible.

When Murphy was put in charge of the task force, he was told to be aggressive and take whatever steps were necessary to prevent military technology theft, even when he realized that the Pentagon tends to take smaller, slower steps. “We tend to be more measured,” he says. “But I have a time-limited task force. I don’t have time to go slow and steady. And neither does our nation when it comes to losing our critical technology to China.”

The task force is a small-but-robust group, attempting to reach realistic goals within the next several years that include protection of the defense industrial base, protection for research and development efforts (including at laboratories and academic institutions), and using existing authority to prevent U.S. technology from being purchased by adversaries. An important part of these protection strategies is defining which technologies require protection. As Murphy explains: “If you treat everything as if it's most important, you protect nothing very well. You have to make those tough choices.”

Reference

C. Todd Lopez, “Task Force Curbs Technology Theft to Keep Joint Force Strong", November 26, 2019, U.S. Department of Defense.

Sponsored Recommendations

UHF to mmWave Cavity Filter Solutions

April 12, 2024
Cavity filters achieve much higher Q, steeper rejection skirts, and higher power handling than other filter technologies, such as ceramic resonator filters, and are utilized where...

Wideband MMIC Variable Gain Amplifier

April 12, 2024
The PVGA-273+ low noise, variable gain MMIC amplifier features an NF of 2.6 dB, 13.9 dB gain, +15 dBm P1dB, and +29 dBm OIP3. This VGA affords a gain control range of 30 dB with...

Fast-Switching GaAs Switches Are a High-Performance, Low-Cost Alternative to SOI

April 12, 2024
While many MMIC switch designs have gravitated toward Silicon-on-Insulator (SOI) technology due to its ability to achieve fast switching, high power handling and wide bandwidths...

Request a free Micro 3D Printed sample part

April 11, 2024
The best way to understand the part quality we can achieve is by seeing it first-hand. Request a free 3D printed high-precision sample part.