Export Controls
Agencies Should Assess Vulnerabilities and Improve Guidance for Protecting Export-Controlled Information at Companies
Gao ID: GAO-07-69 December 5, 2006
The U.S. government controls exports of defense-related goods and services by companies and the export of information associated with their design, production, and use, to ensure they meet U.S. interests. Globalization and communication technologies facilitate exports of controlled information providing benefits to U.S. companies and increase interactions between U.S. and foreign companies, making it challenging to protect such exports. GAO assessed (1) how the government's export control processes apply to the protection of export-controlled information, and (2) steps the government has taken to identify and help mitigate the risks in protecting export-controlled information. To do this, GAO analyzed agency regulations and practices and interviewed officials from 46 companies with a wide range of exporting experiences.
U.S. government export control agencies, primarily the departments of Commerce and State, have less oversight on exports of controlled information than they do on exports of controlled goods. Commerce's and State's export control requirements and processes provide physical checkpoints on the means and methods companies use to export controlled goods to help the agencies ensure such exports are made under their license terms, but the agencies cannot easily apply these same requirements and processes to exports of controlled information. For example, companies are generally required to report their shipments of export controlled goods overseas with Customs and Border Protection for exports made under a license, but such reporting is not applicable to the export of controlled information. Commerce and State expect individual companies to be responsible for implementing practices to protect export-controlled information. One third of the companies GAO interviewed did not have internal control plans to protect export-controlled information, which set requirements for access to such material by foreign employees and visitors. Commerce and State have not fully assessed the risks of companies using a variety of means to protect export-controlled information. The agencies have not used existing resources, such as license data, to help identify the minimal protections for such exports. As companies use a variety of measures for protecting export-controlled information, increased knowledge of the risks associated with protecting such information could improve agency outreach and training efforts, which now offer limited assistance to companies to mitigate those risks. GAO's internal control standards highlight the identification and management of risk as a key element of an organization's management control program. GAO also found that Commerce's and State's communications with companies do not focus on export-controlled information. For example, Commerce's and State's Internet Web sites do not provide specific guidance on how to protect electronic transfers of export-controlled information, a point raised by almost one fourth of the company officials GAO interviewed.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-07-69, Export Controls: Agencies Should Assess Vulnerabilities and Improve Guidance for Protecting Export-Controlled Information at Companies
This is the accessible text file for GAO report number GAO-07-69
entitled 'Export Controls: Agencies Should Assess Vulnerabilities and
Improve Guidance for Protecting Export-Controlled Information at
Companies' which was released on December 5, 2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
December 2006:
Export Controls:
Agencies Should Assess Vulnerabilities and Improve Guidance for
Protecting Export-Controlled Information at Companies:
GAO-07-69:
GAO Highlights:
Highlights of GAO-07-69, a report to congressional requesters
Why GAO Did This Study:
The U.S. government controls exports of defense-related goods and
services by companies and the export of information associated with
their design, production, and use, to ensure they meet U.S. interests.
Globalization and communication technologies facilitate exports of
controlled information providing benefits to U.S. companies and
increase interactions between U.S. and foreign companies, making it
challenging to protect such exports.
GAO assessed (1) how the government‘s export control processes apply to
the protection of export-controlled information, and (2) steps the
government has taken to identify and help mitigate the risks in
protecting export-controlled information. To do this, GAO analyzed
agency regulations and practices and interviewed officials from 46
companies with a wide range of exporting experiences.
What GAO Found:
U.S. government export control agencies, primarily the departments of
Commerce and State, have less oversight on exports of controlled
information than they do on exports of controlled goods. Commerce‘s and
State‘s export control requirements and processes provide physical
checkpoints on the means and methods companies use to export controlled
goods to help the agencies ensure such exports are made under their
license terms, but the agencies cannot easily apply these same
requirements and processes to exports of controlled information. (These
checkpoints are summarized in table 1.) For example, companies are
generally required to report their shipments of export controlled goods
overseas with Customs and Border Protection for exports made under a
license, but such reporting is not applicable to the export of
controlled information. Commerce and State expect individual companies
to be responsible for implementing practices to protect export-
controlled information. One third of the companies GAO interviewed did
not have internal control plans to protect export-controlled
information, which set requirements for access to such material by
foreign employees and visitors.
Table 1: Key Agency Checkpoints on Exports of Controlled Goods and
Information:
Summary of key agency requirements and processes: Means of
transportation or transfer reported on export documentation: *
Shippers' Export Declaration Form;
Applicable to exports of: Goods: Yes;
Applicable to exports of: Information: No.
Summary of key agency requirements and processes: Means of
transportation or transfer reported on export documentation: * License
applications;
Applicable to exports of: Goods: Yes;
Applicable to exports of: Information: No.
Summary of key agency requirements and processes: Reporting
requirements: Companies are required to report all instances of an
export under a specific export license to the government;
Applicable to exports of: Goods: Yes;
Applicable to exports of: Information: No.
Summary of key agency requirements and processes: Monitoring: Agencies
have documentation and data that enables them to track when an export
leaves the U.S;
Applicable to exports of: Goods: Yes;
Applicable to exports of: Information: No.
Source: GAO analysis.
[End of Table]
Commerce and State have not fully assessed the risks of companies using
a variety of means to protect export-controlled information. The
agencies have not used existing resources, such as license data, to
help identify the minimal protections for such exports. As companies
use a variety of measures for protecting export-controlled information,
increased knowledge of the risks associated with protecting such
information could improve agency outreach and training efforts, which
now offer limited assistance to companies to mitigate those risks.
GAO‘s internal control standards highlight the identification and
management of risk as a key element of an organization‘s management
control program. GAO also found that Commerce‘s and State‘s
communications with companies do not focus on export-controlled
information. For example, Commerce‘s and State‘s Internet Web sites do
not provide specific guidance on how to protect electronic transfers of
export-controlled information, a point raised by almost one fourth of
the company officials GAO interviewed.
What GAO Recommends:
To improve oversight of export-controlled information at companies, GAO
recommends Commerce and State strategically assess vulnerabilities and
improve guidance for protecting such exports. Commerce agreed with
GAO‘s recommendations. State agreed to improve its guidance, but
disagreed on the need to improve risk assessments. Broader assessments
would increase its knowledge of risks and help improve its guidance to
companies.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-69].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact John Hutton at (202) 512-
4841 or huttonj@gao.gov.
[End of Section]
Contents:
Letter:
Results in Brief:
Background:
Agency Processes Provide Limited Oversight of Export-Controlled
Information and Rely on Companies for Its Protection:
Government Lacks Sufficient Knowledge of the Risks Associated with the
Protection of Export-Controlled Information to Identify the Minimal
Safeguards:
Conclusion:
Recommendations:
Agency Comments and our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: Comments from the Department of Commerce:
Appendix III: Comments from the Department of State:
Table:
Table 1: Key Agency Checkpoints on Exports of Controlled Goods and
Information:
Figures:
Figure 1: Illustration of Various Types of Exchanges of Export-
Controlled Information in Relation to the Export of Goods:
Figure 2: Risk Assessment and Agency Decision-Making Model:
Abbreviations:
BIS: Bureau of Industry and Security:
CBP: Customs and Border Protection:
DDTC: Directorate of Defense Trade Controls:
DETRA: Defense Trade Application:
DFARS: Defense Federal Acquisition Regulation Supplement:
DOD: Department of Defense:
DOL: Department of Labor:
DTSA: Defense Technology Security Administration:
EAR: Export Administration Regulations:
ECASS: Export Control Automated Support System:
FBI: Federal Bureau of Investigations:
ITAR: International Traffic in Arms Regulations:
OMB: Office of Management and Budget:
RDT&E: Research Development Test and Evaluation:
SED: Shippers' Export Declaration:
SIA: Society for International Affairs:
TCP: Technology Control Plan:
USML: U.S. Munitions List:
United States Government Accountability Office:
Washington, DC 20548:
December 5, 2006:
The Honorable F. James Sensenbrenner, Jr.
Chairman:
Committee on the Judiciary:
House of Representatives:
The Honorable Lamar Smith:
Chairman:
The Honorable Howard L. Berman:
Ranking Minority Member:
Subcommittee on Courts, The Internet, and Intellectual Property:
House of Representatives:
The U.S. government controls the export of defense-related goods and
services by U.S. companies--as well as the export of information
associated with their design, production, and use--to help ensure they
are consistent with national security and foreign policy interests.
However, significant advancements in communications technology have
changed the face of global commerce and sped the communication of
business information to promote economic growth, increasing
interactions between U.S. and foreign companies and making it
challenging to protect the cutting-edge technologies that U.S. firms
develop or acquire. For example, U.S. businesses increasingly rely on
daily exchanges of information with foreign parties abroad and foreign
nationals they employ domestically to share services, technical data,
and software more efficiently. These information transfers between U.S.
businesses and foreign nationals can occur with ease in a wide variety
of commonplace business practices, such as using e-mails to send data
files, site visits that involve visual inspections of U.S. equipment
and facilities, and oral exchanges of information in the U.S. or abroad
when foreign nationals work side-by-side with U.S. citizens. U.S.
companies have also used such means to collaborate with international
partners to design and develop fighter aircraft currently being
produced by the U.S. military. Such "intangible" information exchanges,
should they involve export-controlled technology, can be subject to
U.S. government's export control laws and regulations just like the
physical shipment of defense-related goods. For purposes of this report
such exports, regardless of whether they are transmitted electronically
or conducted through other intangible means, are referred to as export-
controlled information[Footnote 1].
The U.S. government's export control functions are largely carried out
by the departments of Commerce and State and are based on laws
established decades ago, before rapid advances in communications
technologies and the increasingly globalized economy. Based on your
request that we review how the government oversees the protection of
export-controlled information at companies and recognizing the ease
with which such information can be shared, this report assesses: (1)
how the government's export control processes apply to the protection
of export-controlled information, and (2) steps the government has
taken to identify and help mitigate the risks in protecting export-
controlled information.
To determine how the government's existing export control processes
apply to the protection of export-controlled information, we analyzed
Commerce's and State's export control regulations and policies. We
interviewed agency officials from Commerce's Bureau of Industry and
Security (BIS), State's Directorate of Defense Trade Controls (DDTC),
and reviewed and analyzed both agencies' activities to mitigate the
risks in protecting such information, such as company visit and
compliance planning documents, training, and outreach programs. We also
interviewed Department of Defense (DOD) officials who review State and
Commerce export licenses for national security concerns and analyzed
applicable policies. We interviewed officials from 46 companies of
various sizes representing defense and commercial sectors with a range
of exporting experiences to obtain information on the companies'
policies for export-controlled information and the officials'
perspectives on agency training and outreach efforts to help them
mitigate risks in protecting such information. The information and
insights provided from these companies may not be generalizable to the
broad universe of U.S. companies that export. Additional information on
our methodology is provided in appendix I. We performed our review from
January through November 2006 in accordance with generally accepted
government auditing standards.
Results in Brief:
U.S. government export control agencies have less oversight on exports
of controlled information than they do on exports of controlled goods.
Commerce's and State's export control requirements and processes
provide physical checkpoints on the means and methods companies use to
export-controlled goods to help them ensure such exports are made under
license terms, but the agencies cannot easily apply these same
requirements and processes to exports of controlled information. For
example, companies are generally required to report their shipments of
export-controlled goods overseas to Customs and Border Protection for
exports made under a license, but such reporting is not applicable to
export-controlled information. Commerce and State expect individual
companies to be responsible for implementing practices to protect
export-controlled information. One third of the companies we
interviewed told us they do not have internal control plans to protect
their export-controlled information, which set requirements for access
to such material by foreign employees and visitors. Also, almost half
of the company officials we interviewed told us they encounter
uncertainties when determining what measures should be included within
their internal control plans to help protect export-controlled
information.
Commerce and State have not fully assessed the risks of companies'
using a variety of means to protect export-controlled information. The
agencies have not used existing resources, such as license data, to
help identify the minimal protections for such exports. As companies
use a variety of measures for protecting export-controlled information,
increased knowledge of the risks associated with such information could
improve agency outreach and training efforts, which now offer limited
assistance to companies to mitigate those risks. Our internal control
standards highlight the identification and management of risk as a key
element of an organization's management control program. Further,
Commerce's and State's communications with companies do not focus on
export-controlled information. For example, Commerce's and State's
Internet Web sites do not provide specific guidance on how to protect
electronic transfers of export-controlled information, a point raised
by about one fourth of the company officials we interviewed.
We are making several recommendations aimed at improving the
departments of Commerce's and State's knowledge of the potential
vulnerabilities in the protection of export-controlled information at
companies, the guidance both agencies provide to companies to improve
their understanding of how to protect export-controlled information,
and compliance activities on company protection of export-controlled
information. We provided a draft of this report to the departments of
Commerce, Defense, and State for their review and comment. Commerce and
State provided written comments, which are reprinted in appendixes II
and III, respectively. Defense did not have any comments. Commerce
generally agreed with our recommendations to assess potential
vulnerabilities related to export-controlled information and to conduct
more targeted outreach and compliance activities. State agreed with our
recommendation to improve guidance for exports of controlled
information and disagreed with our report's finding that it does not
assess the potential vulnerabilities associated with export-controlled
information. While the actions State cited in its response may help
inform it in making individual licensing decisions and identifying
specific companies for compliance visits, it is not using such
information to strategically assess the vulnerabilities specifically
associated with the transfer of export-controlled information. Such
assessments will help the department identify ways to improve its
oversight of export-controlled information and its guidance to
companies.
Background:
Under the U.S. export control system, agencies expect companies to be
responsible for determining if the items or information they intend to
export are controlled by the government's export control regulations
and for implementing procedures to safeguard their protection and
transfer. The corresponding regulations are designed to keep specific
military and dual-use items[Footnote 2] and technologies from being
diverted to improper end users. These export control regulations,
initially established more than 30-years ago, aim to balance national
security, foreign policy, and economic interests. In today's global
economy, U.S. companies' exchanges of technology and information occur
with ease and include the transfer of export-controlled technologies to
foreign nationals through routine business practices such as:
* transmission of a data file via an e-mail sent from a laptop
computer, cell phone, or a personal digital assistant,
* using company electronic networks to make intra-company transfers of
information to overseas subsidiaries or affiliates,
* visual inspection of U.S. equipment and facilities during company
site visits,
* e-commerce transactions--sales of software over the Internet to
overseas customers, and:
* oral exchanges of information when working side-by-side with U.S.
citizens.
See figure 1 for an illustration of various types of exchanges of
export-controlled information in relation to the export of goods.
Figure 1: Illustration of Various Types of Exchanges of Export-
Controlled Information in Relation to the Export of Goods:
[See PDF for image]
Sources: GAO (data); PhotoDisc (images).
[End of figure]
While an export often involves the actual shipment of goods or
technology out of the U.S., under Commerce's and State's export control
regulations, transfers of U.S. export-controlled information to foreign
nationals within the U.S. are also considered to be an export to the
home country of the foreign national and thus may require an export
license.[Footnote 3] For export control purposes, the term "foreign
national" includes any person who is not a U.S. citizen or lawful
permanent resident.[Footnote 4]
The U.S. government's controls on the export of defense-related items
are primarily divided between the departments of Commerce and State,
with the assistance of the Department of Defense (DOD).
Department of Commerce: Commerce, through its Bureau of Industry and
Security (BIS), controls the export of dual-use items and information
primarily through implementation of the Export Administration
Act.[Footnote 5] Commerce's Export Administration Regulations
(EAR)[Footnote 6] establish the Commerce Control List, which generally
contains detailed controls for dual-use items. BIS has two branches:
Export Administration and Export Enforcement. Export Administration is
responsible for processing export license applications, outreach, and
counseling efforts to help ensure exporters' compliance with the EAR as
well as monitoring certain license conditions to determine exporters'
compliance with their conditions. Export Enforcement investigates
alleged dual-use export control violations and coordinates its
enforcement activities with other federal agencies, such as the
Department of Justice's Federal Bureau of Investigations (FBI) and the
Department of Homeland Security's Customs and Border Protection (CBP).
Department of State: State, through its Directorate of Defense Trade
Controls (DDTC), regulates exports of defense items and information
under the authority of the Arms Export Control Act.[Footnote 7] State's
International Traffic in Arms Regulations (ITAR)[Footnote 8] provides
controls over defense articles and services, which are identified in
broad categories on the U.S. Munitions List (USML). DDTC works to
implement and enforce these laws and regulations using three key
offices: Licensing, Compliance, and Policy. The Office of Licensing is
responsible for reviewing license applications and addressing
correspondence from exporters, such as providing advice on questions to
businesses, known as advisory opinions. The Office of Compliance checks
for company violations of the export regulations and conducts end-use
checks on exports and company visits to achieve this goal. The Policy
Office provides training through a third party organization, and
outreach to companies on the export regulations.
DOD: The Defense Technology Security Administration (DTSA) represents
DOD on export control issues and administers development and
implementation of technology security policies for the international
transfers of defense-related goods, services and technologies, which
DOD oversees. DTSA serves an advisory role in State's and Commerce's
export license review processes and offers technical reviews on
licenses for national security concerns. DTSA may also provide guidance
regarding commodity jurisdiction requests from State, and DTSA often
issues advice regarding advisory opinions submitted to both State and
Commerce. The agency is responsible for maintaining contact with
industry regarding changes in technologies and licensing initiatives.
DTSA plays a significant role in coordinating any proposed changes to
the ITAR or EAR, with DTSA's opinion serving as the final DOD position
regarding such matters.
Recent congressional hearings and intelligence reports have highlighted
threats to U.S. companies' sensitive information--such as intellectual
property, trade secrets, and financial data--from foreign economic and
military surveillance and the associated challenges of balancing U.S.
security and economic interests. These threats may weaken U.S. military
capability and hinder U.S. industry's competitive position in the world
marketplace.[Footnote 9] According to a recent counterintelligence
estimate, factors that have contributed to U.S. economic and
technological success have also facilitated foreign entities'
technology acquisition efforts. For example, the openness of the United
States has provided foreign entities easy access to sophisticated
technologies; new electronic devices have vastly simplified the
potential for illegal retrieval, storage, and transportation of massive
amounts of information, including trade secrets and proprietary data;
and information systems that create, store, process, and transmit
sensitive information have become increasingly vulnerable to hacking
attempts.[Footnote 10]
The challenges to the government in protecting export-controlled
information at companies are interrelated to the challenges we
previously reported facing the departments of Commerce, State, and
Defense in overseeing the export of controlled technologies in today's
rapidly evolving international security and business environments. For
example, in June 2006, we reported Commerce has not systematically
evaluated the overall effectiveness and efficiency of its dual-use
export control processes to determine whether it is meeting its goal of
protecting U.S. national security and economic interests in the wake of
the September 2001 terror attacks.[Footnote 11] In 2005, we reported
that State has not made significant changes to its arms export control
regulations in response to the terror attacks.[Footnote 12]
Agency Processes Provide Limited Oversight of Export-Controlled
Information and Rely on Companies for Its Protection:
U.S. government export control agencies have less oversight on exports
of controlled information than they do on exports of controlled goods.
Commerce's and State's export control requirements and processes--such
as export documentation, reporting requirements, and monitoring--
provide physical checkpoints on the means and methods companies use to
export controlled goods to help them ensure such exports are made under
their license terms, but the agencies cannot easily apply these same
requirements and processes to exports of controlled information.
Consequently, U.S. export control agencies rely on individual companies
to develop practices for the protection of export-controlled
information. Officials from one third of the companies we interviewed
told us they do not have internal control plans to protect their export-
controlled information.
Some Current Export Control Processes and Requirements Are Not Easily
Applied to Export-Controlled Information:
Government export control processes provide physical checkpoints for
the export of goods, but the same checkpoints are not easily applied to
electronic and other intangible transfers of export-controlled
information. Both Commerce and State oversee exports of goods and
information--regardless of their form or method of transfer--through
their licensing and compliance programs. Both agencies' programs
require companies to apply for export licenses under their respective
regulations and to keep records on such exports for possible agency
monitoring and inspection. However, certain export documentation,
agency reporting requirements, and agency monitoring processes for
exports of controlled goods are not easy or practical to apply to the
oversight of exports of information, which limits the agencies' ability
to monitor exports of licensed controlled information.
* Means of Transportation or Transfer Reported on Export Documentation:
When shipping a controlled good overseas, a company is generally
required to file a Census Bureau Shippers' Export Declaration (SED)
form with CBP, within the Department of Homeland Security.[Footnote
13]Companies generally are required to file the SED form for every
export made under a specific license, which requires companies to
specify the method of transportation for the exported goods, such as
vessel or air. However, exports of controlled information transmitted
electronically or in an otherwise intangible form are specifically
exempted from SED filing.[Footnote 14] Commerce and State export
license applications require exporting companies to report the name of
the freight forwarder or other agents to be used for the shipment of
goods, which provides the agencies with some oversight on how companies
intend to conduct such exports. However, agency export license
applications do not require companies to report information on the
means of transmission they intend to use to transfer export-controlled
information.[Footnote 15] In the absence of information on the means of
transmission used to export-controlled information, Commerce and State
lack information that could help provide some level of oversight as
they do for physical shipment of goods.
* Agency Reporting Requirements: Certain agency reporting requirements
for goods do not apply to export-controlled information. Companies are
generally required to present the SED form before any export.[Footnote
16] As previously described, the SED Form is not required for
electronically transmitted export-controlled information.[Footnote 17]
Further, companies are not otherwise required to notify Commerce when
exports of licensed controlled information take place. While in certain
circumstances State requires companies to notify it when they transmit
licensed export-controlled information, this requirement only applies
to the first instance of transfer.[Footnote 18] Beyond these
notifications, Commerce and State cannot be sure that all exports of
controlled information under the license are made to the designated end-
user and are within the terms of the license approval.
* Agency Monitoring: Commerce and State monitor exports to help ensure
company compliance with license requirements and to assess industry
areas where export licenses may be required. However, the two agencies'
efforts focus on export-controlled goods, and not information, due in
part to the nature of transfers of export-controlled information, which
makes elements of agency monitoring processes inapplicable. For goods,
the SED can be used to aid the government in tracking exported goods
and determining whether or not they reach the specified end-user. The
SED also provides a feedback mechanism, which the lead export-control
agencies may use to measure the effectiveness of their activities and
processes. A similar feedback mechanism does not exist for export-
controlled information transmitted electronically and by other
intangible methods. Since the agencies cannot completely monitor these
exports, their reliance on companies to implement control mechanisms
becomes increasingly important for protecting export-controlled
information.
For example, Commerce and State do not systematically monitor whether
companies abide by the conditions of their "deemed" export licenses,
which permit the transfer of export-controlled information to specific
foreign nationals. Consequently, agencies have no way of knowing if all
licensed export-controlled information was exported according to the
terms of the license--for example, if it was sent within the permitted
time period, if the information exported was appropriate, and if the
export reached its intended end-user. In 2002, we recommended that
Commerce--in consultation with the Secretaries of Defense, State, and
Energy--establish a risk-based program to monitor compliance with
deemed export license conditions.[Footnote 19] Commerce officials told
us they recently completed a limited pilot program to monitor company
compliance with deemed exports and did not find any compliance issues
in the sample of deemed export licenses they reviewed. However,
Commerce officials told us that this pilot did not address the issue of
export-controlled information transferred by electronic means, such as
e-mail, and that they have not decided whether they will perform
similar monitoring efforts on an annual basis.
Table 1 provides an overview of the key agency checkpoints generally
related to export-controlled goods and information.
Table 1: Key Agency Checkpoints on Exports of Controlled Goods and
Information:
Summary of key agency requirements and processes: Means of
transportation or transfer reported on export documentation: *
Shippers' Export Declaration Form;
Applicable to exports of: Goods: Yes[A];
Applicable to exports of: Information: No[B].
Summary of key agency requirements and processes: Means of
transportation or transfer reported on export documentation: * License
applications;
Applicable to exports of: Goods: Yes[C];
Applicable to exports of: Information: No.
Summary of key agency requirements and processes: Reporting
requirements: Companies are required to report all instances of an
export under a specific export license to the government;
Applicable to exports of: Goods: Yes[D];
Applicable to exports of: Information: No[B].
Summary of key agency requirements and processes: Monitoring: Agencies
have documentation and data that enables them to track when an export
leaves the U.S;
Applicable to exports of: Goods: Yes[E];
Applicable to exports of: Information: No[B].
Source: GAO analysis.
[A] 15 C.F.R. Secs. 30.1, 30.7, as exempted in 15 C.F.R. 30.50 through
30.58.
[B] For export-controlled information transmitted electronically or in
otherwise intangible form, 15 C.F.R. Sec. 758.1(b).
[C] 15 C.F.R. Sec. 748.5 and Pt. 748, Supp. 1; 22 C.F.R. Sec. 126.13.
[D] 15 C.F.R. Sec. 30.6 requires a separate SED form for each shipment,
unless otherwise exempted.
[E] 15 C.F.R. Sec. 30.12.
[End of table]
Companies Use a Variety of Practices to Protect Export-Controlled
Information:
Under the U.S. export control system, companies are responsible for
implementing procedures to protect export-controlled information
regardless of how it is exported. We found a range of company practices
for protecting export-controlled information from our discussions with
officials from 46 companies, including the use of internal control
plans, limiting employee access, and computer security technologies.
Almost two thirds of the company officials we interviewed told us their
companies use internal control plans, which establish procedures to
protect proprietary and export-controlled information and also set
requirements for access to such material by foreign employees and
visitors.[Footnote 20] However, other companies we interviewed exported
controlled information or employed foreign nationals, but had not yet
developed internal control plans for such transactions. While Commerce
and State generally do not require companies that export controlled
information to use such plans, an industry report on export control
best practices includes internal control plans as a best practice to
safeguard export-controlled products and technologies against improper
access by foreign nationals--employees, customers, and
visitors.[Footnote 21] For example, companies can use such internal
control plans to provide specific procedures and processes addressing
physical and computer access to export-controlled information; such as
employee badging, record-keeping procedures for all relevant export-
related documents; the use of internal audits on export transactions;
and the use of electronic surveillance, such as hidden cameras, where
appropriate, for physical security. Almost half of the company
officials we interviewed told us they encounter uncertainties when
determining what measures should be included within their internal
control plans to help ensure the proper protection of export-controlled
information. Officials from larger companies who expressed such
concerns added that these uncertainties may be magnified in smaller
companies due to their inexperience with export regulations, a point
confirmed by officials from five small companies we interviewed.
In addition to the companies' stated use of internal control plans, we
found companies also had practices related to employee access and
foreign national access to export-controlled information. Examples
include the following:
* Two thirds of the companies indicated that all employees--including
foreign nationals--wear identification badges that contain information
such as a picture, a color-code indicating the employee's security
clearance, and encoded data that allows access to only those areas
authorized for the employee.
* About three fifths of the companies we interviewed indicated that
they protect export-controlled information by storing it within
restricted components of the company's computer server, and requiring
employees to gain permission through a network administrator before
obtaining access to such information.
Some companies also use information security protections for their
electronic transfers of export-controlled information. More than two
fifths of the companies we interviewed use encryption; an information
technology process used to obscure data files, making them inaccessible
without the appropriate code to decipher the meaning. Neither
Commerce's nor State's regulations require companies to use encryption
when transferring export-controlled information. According to the
International Standards Organization, a nongovernmental organization
that provides technical standards to the public and private sectors,
organizations should consider using some form of encryption when
transferring sensitive information.[Footnote 22] Commerce and State
export control officials told us they do not specifically recommend
that companies use encryption for various reasons, such as agencies'
inability to keep current on rapid developments in this field and
possible liability issues surrounding their recommendation of a
particular encryption product for e-mail security.
Our review of selected companies' export control internal control
practices highlights how uneven company practices can contribute to
vulnerabilities associated with the protection of export-controlled
information. For example, officials from three of the companies we
interviewed told us that they exported controlled information--through
electronic transmissions or interpersonal interactions with foreign
nationals--but that they did not have technology control plans that
provided company-wide policies and procedures to limit their foreign
national employees' access to export-controlled information. However,
in situations when companies manufacture or research sensitive
technologies that are export-controlled, they are required to register
with the government, even if they are not planning to export.[Footnote
23] In situations including these, the extent of company internal
control practices could affect its vulnerability. For example, a
nanotechnology company official intending to export technology in the
immediate future told us a former Chinese foreign national employee had
full electronic access to the same sensitive company information as its
U.S. employees. The official also told us this foreign employee was not
physically segregated from any portions of the company facilities or
lab where more sensitive technology functions were performed. Under
these circumstances, we believe that the company official could not
have determined whether the employee improperly accessed company
information that potentially could be export-controlled.
Government Lacks Sufficient Knowledge of the Risks Associated with the
Protection of Export-Controlled Information to Identify the Minimal
Safeguards:
The lead government agencies have not fully assessed the risks of
protecting export-controlled information to help identify the minimal
level of protection for such exports. Commerce and State do not
strategically use existing resources, such as export license data, to
identify potential risks when such information is exported and are not
fully aware of the consequences of companies using a variety of
measures for protecting export-controlled information. Such analysis is
critical because government export-control processes provide less
oversight for export-controlled information than exports of goods.
Improved knowledge of the risks associated with such exports could
improve agency outreach and training efforts, which now offer limited
assistance to companies to mitigate risks when protecting such
information.
Agencies Have Not Systematically Assessed the Risks with Company
Protection of Export-Controlled Information:
Commerce and State have not strategically used existing information
resources, such as export license data, to identify possible
vulnerabilities and risks related to company protection of export-
controlled information for use in oversight of such exports. GAO has
identified managing risk both as an emerging area of high risk for the
government and a part of governance challenges for the 21st
century.[Footnote 24]
Commerce and State do collect a range of basic information on company
exports, some of which could prove valuable in understanding export-
controlled information, such as technologies exported and their end-
users. However, neither Commerce nor State has implemented systematic
risk-assessment practices for its oversight of export-controlled
information. Applying systematic risk-based strategies to export-
controlled information could enable Commerce and State officials to
focus their resources on information exports that may pose a higher
risk to national security. As shown in figure 2, risk management aims
to integrate systematic concern for risk into the usual cycle of agency
decision-making and implementation.
Figure 2: Risk Assessment and Agency Decision-Making Model:
[See PDF for image]
Source: GAO.
[End of figure]
Threat, vulnerability, and criticality are frequently used aspects of
risk assessment.[Footnote 25] Our internal control standards state that
once risks have been identified, they should be analyzed for their
possible effects.[Footnote 26] Our standards also state that because
economic and industry conditions continually change, entities should
provide mechanisms to identify and deal with any special risks prompted
by such changes. Risk analysis generally includes estimating the risk's
significance, assessing the likelihood of its occurrence, and deciding
how to manage the risk and what actions should be taken. The threats to
the protection and transfer of export-controlled information include
the inadvertent exposure of such information to unauthorized foreign
parties as well as foreign economic espionage. For example, several of
the larger defense and commercial companies we interviewed told us
their computer networks are routinely subject to hacking attempts by
individuals attempting to steal or corrupt information, which officials
said can number in the hundreds daily. Currently, Commerce and State
rely on companies to identify and protect export-controlled information
whether it is transferred orally, electronically, or visually--or
through traditional physical shipment methods used for goods, such as a
courier transporting a compact disk containing export-controlled
information to a customer. The vulnerability of export-controlled
information may be increased by companies not using computer or
physical security mechanisms that help protect against physical and
electronic diversions during its transmission. The consequences of such
risks to export-controlled information may include the loss of
sensitive information to foreign entities with interests contrary to
our own as well as significant and costly civil and criminal penalties
for violations of the export control regulations.
At present, both agencies' approaches to conducting company compliance
visits generally target specific industries and industry practices, but
are not based on thorough knowledge of possible weaknesses and
vulnerabilities in company protection of export-controlled information.
Commerce officials told us the agency primarily conducts company visits
based on company size and technology produced. Commerce officials also
told us they also target companies and industry associations based on a
variety of other factors, including their analysis of license data and
publicized company export control developments, such as announcements
in local business newsletters reviewed by Commerce export officials.
Through its company visit plan, State performs its company compliance
visits based on general knowledge of topic areas its staff believe may
be vulnerable to compliance problems and discrete compliance issues,
such as companies that employ foreign nationals. However, Commerce and
State do not use available licensing data to strategically target both
established and emerging business sectors to aid in their monitoring
and oversight of exports of controlled information. For example, agency
license databases and company records provide a pool of information,
which Commerce and State could analyze to help them discern trends in
export-controlled information, such as identifying which companies are
involved in cutting-edge commercial and military technology
developments. Increased agency knowledge in these technology fields
that transmit export-controlled information and are known to be subject
to foreign espionage[Footnote 27] would help increase agency oversight
and may reduce such vulnerabilities.[Footnote 28]
State and Commerce told us they perform company outreach and training
visits as part of their oversight of company export control activities,
but neither agency considers export-controlled information in
determining which companies they should visit. For example, State
officials told us they conduct these visits when requested by
companies. Consequently, companies without knowledge of the export
regulations would not know to request this additional assistance.
Commerce officials told us the agency conducts over 100 company
training seminars nationwide annually on topics ranging from an
exporting primer, product classifications, and deemed exports for both
novice and experienced exporters. These seminars are held in
conjunction with local business cosponsors, and Commerce develops
specific training topics to reflect the interests of local industry.
Commerce officials told us they conduct a limited number of visits to
specific companies as part of their company outreach, which are usually
prompted by information and intelligence obtained through their
compliance efforts. Such training and outreach is particularly
important because we found during our company interviews that newly-
formed smaller businesses working in advanced technology areas were not
as aware of the extent of their responsibilities to protect export-
controlled information, and their company officials suggested that
their protection measures did not follow best practices to safeguard
such information as used by experienced exporters. Furthermore, in our
prior work we recommended that Commerce and State should better
coordinate their efforts on analysis and export oversight.[Footnote 29]
Improved Knowledge of the Risks Associated with the Protection of
Export-Controlled Information Could Improve Agency Outreach and
Training:
Government export control agencies use a variety of means--including
Internet Web sites, advisory opinions, and company training to
communicate information on export controls to industry. However, we
found that because these agency outreach and training efforts are not
developed based on a thorough knowledge of the risks associated with
such exports, they do not specifically address the protection of export-
controlled information.
* Agency Internet Web sites: Commerce and State have Internet Web sites
that provide the public information about the agencies' export control
roles and responsibilities. However, these Web sites do not communicate
information such as industry best practices or identify specific
protection measures for companies to use to securely transfer export-
controlled information electronically. For example, we found while
Commerce's Web site provides information to businesses on the Export
Administration Regulations, such as frequently asked questions and
guidance for deemed exports, it does not provide information on
measures companies could use to protect the transmission of export-
controlled information, such as encrypting e-mails used to transmit
export-controlled information to a company's foreign subsidiary.
State's Web site does not provide information or guidance to exporters
on accepted practices for protecting export-controlled information and
managing deemed exports, such as suggested security measures to
implement when foreign employees work in close proximity to export-
controlled information. Almost one fourth of the company officials we
interviewed told us they would like additional guidance on export-
controlled information posted on Commerce's and State's Web sites, such
as agency-accepted employee training on export-controlled information.
Commerce and State export control officials told us they have not
provided such guidance on their Internet Web sites for reasons such as
their inability to keep current on developments in these areas, such as
recommended particular encryption standards, and possible liability
issues related to recommending a particular protection measure.
In 2004, the Office of Management and Budget (OMB) endorsed
recommendations from the Interagency Committee on Government
Information on guidelines to help make federal agency Web sites more
user-friendly and to better enable companies to understand agencies'
regulatory requirements.[Footnote 30] These standards for agency Web
sites include providing a list of frequently asked questions to users
and Web links to other federal agencies that can provide additional
information on a particular issue. State's Web site does not provide
users with answers to frequently asked questions, such as common
questions companies have on the export process. The State Web site also
does not link to the Commerce Web site or provide information on best
practices companies use to comply with the regulations. By providing
this type of information on its Web site, State could help enhance its
communication to companies and alleviate company confusion surrounding
the protection of export-controlled information.
* Advisory Opinions: As part of their export control activities,
Commerce and State provide nonbinding advice to companies, called
advisory opinions, on specific questions they submit to the agencies
regarding the export regulations. Officials from about two fifths of
the companies we interviewed told us they submitted questions to the
agencies regarding export-controlled information. However, under the
Commerce and State advisory opinion programs, the agencies do not
publicly share all agency responses to these requests for guidance and
information due to concerns about inadvertently releasing a company's
proprietary information to the public as well as agency officials'
judgment that such opinions do not have broad utility to the export
community. From our review of Commerce's and State's export control
activities, we found while Commerce provides a few public examples of
advisory opinions on its Web site that address deemed exports and the
employment of foreign nationals, none specifically address the
electronic transfer of export-controlled information. State officials
told us State does not provide any advisory opinions to the public. By
publicizing their advisory opinions, Commerce and State could possibly
leverage their limited outreach resources and help a greater number of
companies attain clarifying information on agency policies on export-
controlled information.
Other federal agencies, such as the Department of Labor (DOL), share
advisory opinions with the public on their Web sites but redact company
proprietary information to protect identifying information. This allows
other companies with similar questions to benefit from the additional
agency guidance. One company export control official we interviewed
suggested companies could submit two letters simultaneously to either
Commerce or State to request advisory opinions on export control
issues. In the first letter the company would include all necessary
information to distinguish the export, so the agency could make an
appropriate decision on the specific export control matter. In the
second letter the company would redact all proprietary and company
identifying information, which the agency would be allowed to publicize
to other companies. DOL uses this approach to alleviate itself of the
burden from identifying and redacting proprietary information from
advisory opinions it shares publicly.
* Agency Training on Export-Controlled Information: While Commerce and
State provide export-control training to companies, we found the
agencies do not strategically target companies and industry sectors
where the greatest risk of violations of the export regulations on
export-controlled information may exist. While Commerce and State have
significantly different approaches towards company training,[Footnote
31] neither offers specific training opportunities focusing exclusively
on export-controlled information. Furthermore, officials from
approximately 20 percent of the companies we interviewed told us agency
training on export controls does not provide specific guidance to
companies on the adequate protection of export-controlled information.
For example, these officials said agency training does not provide
information protection options to companies, such as using dedicated
communication lines for e-mail transmissions or limiting employee
access to servers that contain export-controlled information. Company
officials told us government-sponsored training does not target smaller
companies new to the exporting process, which may not be familiar with
necessary measures to securely transfer export-controlled information.
Furthermore, we found agency training, in particular State's training,
is limited to specific geographic regions of the U.S., which company
officials stated hinders smaller companies with limited budgets from
attending. Although State and Commerce have separate export control
jurisdictions, the 2004 Interagency Offices of Inspector General report
stated that Commerce and State could improve their outreach by
providing joint training that explains the differences between the two
agencies' licensing requirements and procedures--a recommendation that,
according to the report, was shared by company officials.[Footnote 32]
Conclusion:
The globalization of the U.S. economy and economic interdependence with
the rest of the world has many dimensions. While the export of
controlled information from U.S. companies to foreign business partners
is a key component to maintaining a strong and developing economy, the
improper export of such technology can be detrimental to U.S. security
and economic interests. Developing effective oversight to help ensure
the protection of export-controlled information poses a challenge to
the federal agencies responsible for export control. These risks may
increase as electronic communications and information-transfer
capabilities used by companies that export-controlled information
continue to grow. Moreover, the lack of coordination between Commerce
and State on outreach, analysis, and oversight could hamper their
ability to determine whether export-controlled information may be at
risk when foreign nationals are in U.S. company settings. Without
leveraging and properly utilizing available export license data, these
agencies will not be able to fully understand and assess potential
risks associated with the export of controlled information and develop
the proper protections and outreach to help mitigate the risks
associated with such information. Further, in the absence of guidance
from the government, some U.S. companies may not fully understand these
associated risks and the need for applying corresponding measures of
protection.
Recommendations:
To improve the Department of Commerce's oversight of export-controlled
information at companies, we recommend that the Secretary of Commerce
direct the Administrator of the Bureau of Industry and Security to take
the following actions:
* Strategically assess potential vulnerabilities in the protection of
export-controlled information using available resources, such as
licensing data, and evaluate company practices for protecting such
information.
* Based on such a strategic assessment, improve its interagency
coordination with the Department of State in the following areas (1)
provide specific guidance, outreach, and training on how to protect
export-controlled information and (2) better target compliance
activities on company protection of export-controlled information.
To improve the Department of State's oversight of export-controlled
information at companies, we recommend that the Secretary of State
direct the Director of the Directorate of Defense Trade Controls to
take the following actions:
* Strategically assess potential vulnerabilities in the protection of
export-controlled information using available resources, such as
licensing data, and evaluate company practices for protecting such
information.
* Based on such a strategic assessment, improve its interagency
coordination with the Department of Commerce in the following areas (1)
provide specific guidance, outreach, and training on how to protect
export-controlled information and (2) better target compliance
activities on company protection of export-controlled information.
Agency Comments and our Evaluation:
We provided a draft of this report to the departments of Commerce,
Defense, and State for their review and comment. Commerce and State
provided written comments, which are reprinted in appendixes II and
III, respectively.[Footnote 33] Defense did not have any comments on
our draft report.
Commerce generally agreed with our recommendations to assess potential
vulnerabilities related to export-controlled information and to conduct
more targeted outreach and compliance activities. Commerce, in its
response, described planned and recent activities related to its
oversight and outreach efforts on deemed exports, such as the Deemed
Export Advisory Committee and increased export outreach and compliance
activities. While these activities address some unique cases where
companies are required to have a Technology Control Plan (TCP) in place
when employing foreign nationals, they do not fully address how to
protect export-controlled information when transferred electronically
and by other intangible means. As noted in our report, almost half of
the company officials we interviewed told us they have difficulty
determining the proper measures to protect export-controlled
information. Commerce also cited a September 2006 American Society for
Industrial Security trade association meeting where it addressed the
protection of export-controlled information. Actions such as this, if
conducted on a regular basis, could improve companies' understanding of
how to protect export-controlled information in today's commonplace
business transactions, such as e-mail, e-commerce exchanges, and
intracompany transfers.
State agreed with our recommendation to improve guidance for exports of
controlled information and disagreed with our report's finding that it
does not assess the potential vulnerabilities associated with export-
controlled information. State responded that it recently tasked its
Defense Trade Advisory Group to develop a best practice guide for
industry on how to comply with the regulations. Such guidance,
particularly if it addresses export-controlled information and is
shared on State's Web site, can help to improve companies'
understanding of accepted practices for protecting such information.
Regarding its assessment of potential vulnerabilities associated with
export-controlled information, State responded that its individual
licensing and compliance activities strategically target its concerns
related to exports of controlled technical data. State added that its
assessments of the vulnerabilities and risks associated with export-
controlled information form the basis for topics addressed at training
events and industry conferences, as well as many regulatory changes.
While State's activities may help inform its individual licensing
decisions and identification of specific companies for possible
compliance visits, we found that State is not proactively using
available information to strategically assess the vulnerabilities
associated with the transfer of export-controlled information. For
example, we found State does not use available data from its licensing
activities to strategically target established and emerging business
sectors to aid in its monitoring and oversight of exports of controlled
information. These license data and company records provide a pool of
information, which State could analyze to help discern trends in export-
controlled information. Furthermore, State told us its outreach visits
do not consider export-controlled information in determining companies
to visit and we found that State's training does not provide specific
guidance on export-controlled information. Broader assessments of the
risks and vulnerabilities associated with export- controlled
information will help the department identify ways to improve its
oversight of these exports and its guidance to companies.
We are sending copies of this report to appropriate congressional
committees and to the Secretary of Commerce, the Secretary of Defense,
the Secretary of State. Copies will be made available to others upon
request. In addition, this report will be available at no charge on the
GAO Web site at [Hyperlink, http://www.gao.gov].
If you or your staff have any questions about this report, please
contact me at (202) 512-4841 or John Neumann, Assistant Director. Other
major contributors to this report were Marie Ahearn, Patrick Baetjer,
Jessica Berkholtz, Amanda Seese, Karen Sloan, Najeema Washington, and
Anthony Wysocki.
Signed by:
John P. Hutton, Acting Director:
Acquisition and Sourcing Management:
[End of section]
Appendix I: Scope and Methodology:
To assess how the government's export control processes apply to the
protection of export-controlled information by U.S. companies, we
analyzed the export control regulations, policies, and compliance
practices of the Department of State and the Department of Commerce.
Our analyses of the regulations included the review, comparison, and
contrast of the Department of State's International Traffic in Arms
Regulations (ITAR) and the Department of Commerce's Export
Administration Regulations (EAR), identifying information pertinent to
the export of controlled information via electronic means and other
intangible transfers, or through foreign national access. We also
reviewed export-control policies and practices within the Department of
Defense, including proposed changes to the Defense Federal Acquisition
Regulation Supplement (DFARS) to identify requirements related to
export controls and foreign national access to sensitive information.
We interviewed officials from DTSA to gain more information regarding
the agency's activities as they relate to the export control practices
and policies of Commerce and State. We interviewed agency officials
from the Commerce Department's Bureau of Industry and Security (BIS)
who perform export control related functions, such as enforcement and
administration. Within the State Department's Directorate of Defense
Trade Controls (DDTC), we interviewed officials from the areas of
licensing, compliance, and policy to obtain information on agency
efforts to protect export-controlled information. We also analyzed
information on existing data the lead agencies have at their disposal
regarding the export of controlled information.
To assess steps the government has taken to identify and mitigate risks
in protecting export-controlled information, we analyzed Commerce's and
State's use of existing resources, such as licensing data, to identify
trends and vulnerable areas within company transfers of controlled
information and assessed each agency's export control training and
outreach programs. We examined the extent to which agency resources are
leveraged to mitigate risks associated with the export of controlled
information by reviewing other government-accepted forms of risk
assessment. We reviewed our prior work on risk assessment, which
includes items such as the Federal Information Systems Controls Audit
Manual and the Internal Control Management and Evaluation Tool.
To assess Commerce's and State's export control training and outreach
programs, we reviewed each agency's Web site and training materials
issued by the agencies. We assessed training seminars sponsored by the
Departments of State and Commerce. Specifically, we reviewed
information and practices used at Society for International Affairs
(SIA) conferences, which State sponsors, and BIS training seminars. We
also reviewed the agencies' methodologies for conducting company
outreach visits. As part of our work, we attended several agency-
sponsored export control training events aimed at increasing company
knowledge of the export control regulations.
To further assess our objectives, we interviewed officials from 46 U.S.
companies. We asked them how they protect export-controlled information
through the use of internal controls. We reviewed, and in some
instances obtained various company export control-related documents
including, internal control plans, technology control plans, training
manuals related to export controls, and policies regarding the transfer
of electronic controlled information, including when accessed by
foreign national employees. We also asked company officials to share
their views and experiences regarding government training and outreach
pertinent to the area of export-controlled information. Company
officials responded to our targeted questions regarding export-
controlled information, including views on the effectiveness of
government training seminars, the extent of content provided on agency
Web sites, and the quality of advice provided on agency customer
service telephone lines.
We selected our sample of 46 companies from a universe of companies we
developed to represent a wide variety of companies, industry types, and
exporting experiences by analyzing the following sources and databases:
* Commerce Department's Export Control Automated Support System (ECASS)
export license database, looking specifically for companies that held
licenses in the D (Software) and E (Technology) product groups, which
are more prone to be export-controlled information, for fiscal years
2000-2004.[Footnote 34]
* State Department's Defense Trade Application (DETRA) licensing
database, looking specifically for companies that held a permanent
license for the export of technical data, which are more prone to be
export-controlled information over fiscal years 2000-2004.
* DOD's Contracting Action Report database (DD 350), for Research
Development Test and Evaluation (RDT&E) contracts with small businesses
that are more prone to be export-controlled information, for fiscal
years 2000-2004.
* Commerce's and State's industry outreach, training, and advisory
committee membership lists.
* Industry-specific company directories and our work with agency and
industry experts.
To select companies from the universe that represented a range of
company experiences, we applied selection criteria, specifically;
companies had to meet at least one of the following criteria:
* Held a Commerce Department ECASS export license in the D (Software)
and E (Technology) product groups.
* Held a State Department DETRA permanent license for technical data.
* Held both Commerce and State export licenses. Specifically, the
company held both the aforementioned Commerce Department ECASS export
licenses as well as the State Department DETRA licenses.
* Exporter frequency. We classified a company as a high, medium, or low
frequency exporter based upon its number of export applications
submitted to Commerce, for the Commerce ECASS D&E product group
licenses; and State for DETRA permanent technical data licenses, using
the following categories:
- high--800 or more licenses,
- medium--100-799 licenses, and:
- low--1-99 licenses.
* Had a foreign employee presence. The company held Commerce and/or
State export licenses for the export of controlled information to its
foreign national employees, or conducts business with foreign
subsidiaries or partners.
* Was a small business recipient of a DOD RDT&E contract, for fiscal
years 2000-2004.
* Were new exporters or potential exporters, in the process of applying
for an export license to either Commerce or State.
We did not generalize the information and findings we developed from
our work with these 46 companies to the broad universe of all U.S.
companies that export. We conducted this review from January through
November 2006 in accordance with generally accepted government auditing
standards.
[End of section]
Appendix II: Comments from the Department of Commerce:
The Secretary Of Commerce:
Washington, 0,C, 20230:
Mr. John Hutton:
Acting Director, Acquisition and Sourcing Management:
Government Accountability Office:
441 G Street, NW, Room 4718:
Washington, DC 20548:
Dear Mr. Hutton:
Thank you for the opportunity to provide comments on two related
Government Accountability Office (GAO) Draft Reports, Export Controls:
Agencies Should Assess Vulnerabilities and Improve Guidance for
Protecting Export-Controlled Information at Companies, GAO-07-69, and
Export Controls: Agencies Should Assess Vulnerabilities and Improve
Guidance on Protecting Export-Controlled Information at Universities,
GAO-07-70.
Along with a March 2004 report by the Commerce Department's Office of
Inspector General (Inspection Report No. IPE-16176), these reports help
draw attention to the importance of protecting sensitive export-
controlled information without impeding the competitive position of
U.S. industry and academia, Indeed, the issue of deemed exports is one
that has received and continues to receive considerable attention from
the Commerce Department's Bureau of Industry and Security (BIS).
Noting that deemed exports under the Export Administration Regulations
(EAR) are separate from technology transfer restrictions under the
International Trade in Arms Regulations (ITAR), we generally agree with
the reports' recommendations to assess potential vulnerabilities within
industry and academia and then conduct more targeted deemed export
outreach and compliance activities. As the reports note, BIS has
already taken significant action in this regard. In September, the
Commerce Department established the Deemed Export Advisory Committee
(DEAC), co-chaired by Robert Gates, President of Texas A&M University,
and Norman Augustine, retired Chairman and CEO of Lockheed Martin
Corporation, to review the entire issue of deemed exports. (Dr, Gates
was subsequently nominated by President Bush as Secretary of Defense,
and we are in the process of identifying a replacement as co-chair.)
The DEAC has high-level members from industry, academia, and the
security field who will review and make recommendations to me on how
best to ensure that transfers of sensitive technologies to foreign
nationals protect vital national security interests while ensuring that
U.S. companies and universities continue to be the world's leaders in
research and development.
In addition, BIS has expanded its already robust deemed export outreach
program in all high-technology sectors, including universities,
industry, and government laboratories. Significant outreach efforts
have been undertaken with industry sectors and compliance officials on
the requirements for deemed exports, including the requirement that
license applications have in place a Technology Control Plan (TCP) to
protect export-controlled information from unauthorized release, BIS
publishes best practices guidance on TCPs on its website and discusses
TCP requirements in enforcement outreach visits, Significantly, in
September 2006, BIS officials addressed the annual convention of the
American Society for Industrial Security (ASIS), a trade association of
information and physical security management professionals, on the
protection of export-controlled information and essential elements of
TCPs in protecting such information from unauthorized access and
release.
In addition to its Fiscal Year 2005 pilot program for deemed export
compliance verification, BIS has also initiated a formal Deemed Export
Compliance Review Program. Under this program, BIS conducts formal
compliance reviews of deemed export license holders' compliance with
license conditions, including the efficacy of their required TCPs.
Deemed export licenses are targeted for review based on the
sensitivities of the technology involved (e.g., such as that connected
with weapons of mass destruction development) and countries involved.
BIS completed 14 reviews under this program in Fiscal Year 2006, and
will continue reviews under the program in Fiscal Year 2007.
Finally, BIS has worked closely with other agencies to gather data on
potential risks of unauthorized technology transfers at universities.
We have found that existing data, such as that found in the Department
of Homeland Security's Student and Exchange Visitor Information System,
is often too general to be useful in identifying whether foreign
nationals will be subject to deemed export license requirements.
Therefore, we have taken specific steps to improve this data, such as
suggesting revisions to the relevant visa application form to collect
information needed to assess technology transfer vulnerabilities from
foreign nationals in the United States.
Based on the Department's work to date and the findings of your reports
and other studies, it is clear that some universities and research
institutions need to acquire a better understanding of deemed export
control requirements. Because we recognize the important need to
improve understanding of deemed export license requirements at
universities, about one-third of BIS's 120 annual deemed export
outreach activities now focus on the academic community. At the same
time, however, it is important to note that deemed export licensing
consideration is required only if a foreign national has access to
export-controlled technology. The EAR identifies a larger universe of
information that is not subject to the Department's regulatory
oversight and, therefore, is not export-controlled. The full context of
this universe bears mentioning since it is not fully addressed in the
report, which focuses primarily on the concept of fundamental research.
As noted in Section 734.3(3) of the EAR, certain publicly available
technology is not subject to the requirements of the EAR. This includes
information that is already published or will be published. Section
734.8 of the EAR clarifies that the information resulting from
fundamental research which is intended for publication is considered
publicly available and thus not subject to the EAR.
Informed by the reports' findings and recommendations and actions taken
to date, BIS will continue to assess vulnerabilities and work to more
precisely target outreach and compliance efforts. BIS's efforts will
also be significantly informed by the recommendations of the DEAC,
which we currently expect to receive in the fall of 2007.
Sincerely,
Signed by:
Carlos M. Guiterrez:
[End of section]
Appendix III: Comments from the Department of State:
United States Department of State:
Assistant Secretary for Resource Management and Chief Financial
Officer:
Washington, D.C. 20520:
Ms. Jacquelyn Williams-Bridgers:
Managing Director:
International Affairs and Trade:
Government Accountability Office:
441 G Street, N. W.
Washington, D.C. 20548-0001:
Nov 2 8 2006:
Dear Ms. Williams-Bridgers:
We appreciate the opportunity to review your draft report, "Export
Controls: Agencies Should Assess Vulnerabilities and Improve Guidance
for Protecting Export-Controlled Information at Companies," GAO Job
Code 120513.
The enclosed Department of State comments are provided for
incorporation with this letter as an appendix to the final report.
If you have any questions concerning this response, please contact
Daniel Buzby, Deputy Director, Bureau of Political and Military Affairs
at (202) 663-2812.
Sincerely,
Signed by:
Bradford R. Higgins:
cc: GAO - John Neumann:
PM - Gregory Suchan:
State/OIG - Mark Duda:
Department of State Comments on GAO Draft Report:
Export Controls: Agencies Should Assess Vulnerabilities and Improve
Guidance for Protecting Export-Controlled Information at Companies GAO-
07-69/GAO Code 120513:
Thank you for allowing the Department of State the opportunity to
comment on the draft report Export Controls: Agencies Should Assess
Vulnerabilities and Improve Guidance for Protecting Export-Controlled
Information at Companies.
The report highlights the multiple means by which technical data,
subject to control by the Department under the International Traffic in
Arms Regulations (ITAR), may be exported to a foreign person. The
report also notes the potential risk to national security by
inadvertent or unauthorized export of technical data. The Department
shares these concerns and takes seriously our responsibility to impose
appropriate licensing and compliance requirements on U.S. companies
without impeding vital defense trade with our friends and allies around
the globe.
We disagree with the report's suggestion that the Department does not
assess the potential vulnerabilities and risks associated with export-
controlled information. Our assessments are integral to each license
decision and compliance investigation and underpin the strategic
targeting of companies and issues in our Company Visit Program.
Moreover, the Department's assessments of these risks form the basis
for topics and issues addressed at training events and industry
conferences. The assessments also form the basis for many regulatory
changes. The Department however agrees with the GAO recommendation to
continue our educational outreach efforts regarding the export of
technical data and, as resources permit, will increase our presence at
joint training conferences with the Department of Commerce. In this
vein, the Department has already asked its Defense Trade Advisory Group
to develop a best practice guide for industry on how best to comply
with the regulations.
[End of Section]
FOOTNOTES
[1] Specifically, export-controlled information includes technical
data, which is required for the design, development, production,
manufacture, assembly, operation, repair, testing, maintenance or
modification of defense articles and software directly related to
defense articles (22 C.F.R. Sec. 120.10). It also includes specific
information necessary for the development, production, or use of items
on the Commerce Control List (15 C.F.R. Sec. 772.1, defining
technology), commonly referred to as dual-use items, which can serve
defense and commercial purposes.
[2] Dual use items and technologies can serve both military and
commercial purposes.
[3] These transfers are commonly referred to as "deemed" exports.
Commerce's export control regulations (15 C.F.R. Sec. 734.2(b)(2)(ii)
specifically utilizes the term "deemed export" to describe these
transfers. While the ITAR does not use a precise corresponding term,
State Department officials told us the concept of a "deemed" export is
covered under the ITAR's general definition of an export--i.e., an
export means "Disclosing (including oral or visual disclosure) or
transferring technical data to a foreign person, whether in the United
States or abroad." (see 22 C.F.R. Sec. 120.17), and the ITAR
requirements for the export of unclassified technical data which state
"—a license is required for the oral, visual, or documentary disclosure
of technical data by U.S. persons to foreign persons—regardless of the
manner in which the technical data is transmitted (e.g., in person, by
telephone, correspondence, electronic means, etc.) (see 22 C.F.R. Sec.
125.2(a) and (c). State officials told us they also refer to these
transfers as "deemed exports."
[4] "Foreign national" is the term used in the EAR 15 C.F.R. Sec. 734.2
(b)(2)(ii). "Foreign person" is the term used in the ITAR, 22 C.F.R.
Sec. 120.16, and also includes a foreign corporation or business entity
or group incorporated to do business in the U.S. as well international
organizations and foreign governments.
[5] 50 U.S.C. App. Secs. 2401 et seq. Although the Act has lapsed,
export control regulations have been extended through executive orders,
of which Executive Order 13222 (Aug. 17, 2001) is the most recent.
[6] 15 C.F.R. Secs. 730-774.
[7] 22 U.S.C. Sec. 2778 authorizes the President to control the export
of defense articles and services. The statutory authority of the
President to promulgate regulations on these exports was delegated to
the Secretary of State by Executive Order 11958, as amended.
[8] 22 C.F.R. Secs. 120-130.
[9] For example, Sources And Methods of Foreign Nationals Engaged In
Economic And Military Espionage, Hearing before the Subcommittee on
Immigration, Border Security, and Claims of the Committee on the
Judiciary, House of Representatives (Washington, D.C.: Sept. 15, 2005).
[10] Office of the National Counterintelligence Executive, Annual
Report to Congress on Foreign Economic Collection and Industrial
Espionage, 2004 (April 2005).
[11] GAO, Export Controls: Improvements to Commerce's Dual-Use System
Needed to Ensure Protection of U.S. Interests in the Post-9/11
Environment, GAO-06-638 (Washington, D.C.: June 26, 2006).
[12] GAO, Defense Trade: Arms Export Control System in the Post-9/11
Environment, GAO-05-234 (Washington, D.C.: Feb. 16, 2005).
[13] The SED form is an export document that requires companies to
report a detailed description of exported commodities including their
export control number, quantity and weight, method of transport,
loading pier, dollar value, and the forwarding agent. The Census Bureau
uses this information to compile the official export statistics for the
U.S. 15 C.F.R. Part 30 and Sec. 758.1(f).
[14] 15 C.F.R. Secs. 30.1(d), 30.55, and 758.1(b).
[15] In this regard, Commerce requires an additional letter of
explanation for license applications of controlled technology, which by
definition includes information. 15 C.F.R., Pt. 748, Supp. 2 (o) and
Sec. 772.1 (defining technology). While the information is required for
the letter, the means of transfer or transmission is not specifically
required.
[16] 15 C.F.R. Secs. 30.12, 758.1; 22 C.F.R. Sec. 123.22.
[17] 15 C.F.R. Sec. 758.1(b).
[18] 22 C.F.R. Sec. 123.22(b)(3).
[19] GAO, Export Controls: Department of Commerce Controls over
Transfers of Technology to Foreign Nationals Need Improvement, GAO-02-
972 (Washington, D.C.: Sept. 6, 2002). In March 2004, the Commerce OIG
also released a report recommending that BIS implement a compliance
program for deemed exports, such as on-site company inspections to
ensure compliance with license conditions. See Commerce Department,
Deemed Export Controls May Not Stop the Transfer of Sensitive
Technology to Foreign Nationals in the U.S. (Washington, D.C.: March
2004).
[20] In some cases, DOD requires companies to use specific Technology
Control Plans (TCP), which provide specific measures to control access
for all export-controlled information and protect it from improper
access by foreign nationals assigned to or employed at security-cleared
contractor facilities. DOD 5220.22-M, National Industrial Security
Program Operating Manual, Sec. 10-509 (Feb. 2006). State and Commerce
require companies to use TCPs and Internal Control Plans, respectively
for a limited set of technologies, such as satellites (22 C.F.R Sec.
124.15) and items under the Special Comprehensive License (15 C.F.R.
Sec. 752.11). State provides that export-license-application processing
will be facilitated by providing a TCP when foreign nationals are
employed at or assigned to security-cleared facilities. 22 C.F.R. Sec.
126.13. Also, Commerce's Web site provides basic guidelines to
companies submitting license applications for foreign nationals
pursuant to the "deemed export" rule encouraging them to provide a
description of any internal technology control plan or measures they
intend to use to prevent unauthorized access by foreign nationals to
controlled technologies or software.
[21] Nunn-Wolfowitz Task Force Report: Industry "Best Practices"
Regarding Export Compliance Programs (July 25, 2000).
[22] See the following International Standards Organization guidelines:
International Standards Organization /IEC 17799:2005 Code of Practice
for Information Security Management and International Standards
Organization/IEC 18033, Encryption Algorithms.
[23] Under the ITAR, all manufacturers, exporters, and brokers of
defense articles, defense services, or related technical data, as
defined in the United States Munitions List, are required to register
with the State Department and maintain records concerning their
manufacture, acquisition, and disposition of defense articles,
services, and technical data. (22 C.F.R. Sec. 122.1) Manufacturers who
do not export must nevertheless register; such registration does not
confer export rights or privileges, but is a precondition for the
issuance of any license or other approval for export. Under the EAR,
companies are required to obtain export licenses from the Commerce
Department when foreign nationals access export-controlled information.
[24] See GAO, High-Risk Series: An Update, GAO-05-207 (Washington,
D.C.: January 2005), and GAO, 21st Century Challenges: Reexamining the
Base of the Federal Government, GAO-05-325SP (Washington, D.C.:
February 2005).
[25] Carl A. Roper, Risk Management for Security Professionals (Boston:
Butterworth Heinemann, 1999); J. Moteff, Risk Management and Critical
Infrastructure Protection: Assessing, Integrating, and Managing
Threats, Vulnerabilities, and Consequences, CRS, RL32561 (Washington,
D.C.: Sept. 2, 2004); R. E. Chapman and C. J. Leng, Cost-Effective
Responses to Terrorist Risks in Constructed Facilities, (National
Institute of Standards and Technology, March 2004).
[26] GAO, Standards for Internal Control in the Federal Government,
(Washington, D.C.: November 1999).
[27] Office of the National Counterintelligence Executive, Annual
Report to Congress on Foreign Economic Collection and Industrial
Espionage, 2004, (April 2005).
[28] BIS recently established a Deemed Export Advisory Committee,
compromised of representatives from academia and business to address
issues surrounding transfers of dual-use technologies to foreign
nationals. BIS officials told us they believe the committee will help
improve its oversight of deemed exports.
[29] See GAO, Export Controls: Improvements to Commerce's Dual-Use
System Needed to Ensure Protection of U.S. Interests in the Post-9/11
Environment, GAO-06-638 (Washington, D.C.: June 26, 2006); GAO, Export
Controls: Department of Commerce Controls over Transfers of Technology
to Foreign Nationals Need Improvement, GAO-02-972 (Washington, D.C.:
Sept. 6, 2002); and GAO, Export Controls: Processes for Determining
Proper Control of Defense-Related Items Need Improvement, GAO-02-996
(Washington, D.C.: Sept. 20, 2002).
[30] See Recommendations for the Effective Management of Government
Information on the Internet and Other Electronic Records, Interagency
Committee on Government Information (Washington, D.C.: Dec. 16, 2004).
OMB, as the lead agency overseeing the management of these initiatives,
developed a strategy to expand electronic government, which it
published in February 2002. The Interagency Committee on Government
Information (ICGI) was created in June 2003 to implement Section 207 of
the E-Government Act of 2002, Pub. L. No. 107-347 (2002).
[31] Commerce conducts over 100 training events per year. State relies
on a third-party provider for all of its training events. Specifically,
State uses the Society for International Affairs (SIA), a non-profit
organization to run its company training events, which number four
events annually.
[32] Offices of Inspectors General, Interagency Review of Foreign
National Access to Export-Controlled Technology in the United States,
Report No. D-2004-062 (Washington, D.C.: Apr. 16, 2004).
[33] Commerce's response letter also included comments on our draft
report on export controls at universities, GAO, Export Controls:
Agencies Should Assess Vulnerabilities and Improve Guidance for
Protecting Export-Controlled Information at Universities, GAO-07-70
(Washington, D.C.: Dec. 5, 2006).
[34] At the time of our request, fiscal year 2004 was the most current
license data available from Commerce and State.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: