On October 29, 2001, President Bush issued a Homeland Security Presidential Directive, designed to "to help combat terrorism through more effective immigration policies and practices."
Among the provisions in the directive was one that would "prohibit certain international students from receiving education and training in sensitive areas, including areas of study with direct application to the development and use of weapons of mass destruction."
On May 7, 2002, the White House Office of Science and Technology Policy (OSTP) announced a proposed Interagency Panel on Advanced Science and Security (IPASS). The panel would review certain international student and exchange visitor visa applicants, who wish to study or do research in advanced science and technology uniquely available in the United States, to determine their potential threat to U.S. national security. It was reported that this new policy applied only to certain science and technology fields, studied at the graduate or post doctoral level, that are available for study only in the United States.
To date (April 2003), IPASS has never been implemented, but U.S. visa officials worldwide have been requesting Security Advisory Opinions (SAOs) from Washington for non-immigrant visa applicants wishing to enter the United States for educational or business purposes that involve "sensitive areas of study." Visa officers use the "Technology Alert List" when determining whether a visa application will need to be forwarded to Washington for a SAO before the visa can be approved. Such a clearance can add two months or longer to the normal visa processing time.
Nationals applying for non-immigrant visas who are from countries identified by the U.S. State Department as being state sponsors of terrorism will warrant special scrutiny if their purpose for entering the United States involves "sensitive areas of study." Those countries are: Cuba, Iran, Iraq, Libya, North Korea, Sudan, and Syria.
Nationals applying for non-immigrant visas from a second group of countries; India, China, Israel, Pakistan, and Russia, will have their visa applications examined closely for "sensitive area of study" issues because these countries are considered to possess nuclear capability that is of concern to U.S. national security.
But, even if a foreign national is not a citizen of one of the countries listed above, their field of study (especially if it is in the sciences, technology or engineering) might require the visa application to undergo a security clearance REGARDLESS of the country they are from.
Thus, it is important for Binghamton University faculty and students to know the fields of study that can trigger a security review.
What follows is the complete Technology Alert List (TAL) as well as guidance from the U.S. Department of State that has been edited from the original text. The complete document was posted by the U.S. Department of State Visa Office on October 18, 2002 as a telegram to consular sections around the world. To read the entire document (unedited), go to: http://travel.state.gov/visa/laws/telegrams/telegrams_2840.html and scroll down to Using The Technology Alert List (Update) 10/18/2002.
Using the Technology Alert List (Update)UTE3502
------------------D39353 020507Z /38
P 012302Z AUG 02
FM SECSTATE WASHDC
TO ALL DIPLOMATIC AND CONSULAR POSTS PRIORITY
SUBJECT: USING THE TECHNOLOGY ALERT LIST: UPDATE
U.S. laws and regulations prohibit the export of certain goods and technologies from the U.S. Section 212 (a)(3)(a) of the INA [Immigration and Nationality Act] renders inadmissible aliens who there is reason to believe seek to enter the U.S. to violate or evade these laws. This means that with sufficient information, the CONOFF [Consular Officer] has the power to prevent sensitive technology or material, e.g., controlled nuclear or biotechnical information, from falling into the wrong hands. The Technology Alert List (TAL) was designed to assist in this effort.
Not since the Cold War has the transfer of sensitive technology to hostile individuals or regimes been more in the news. The increasing sophistication of off-the-shelf technology, dual-use technologies (technologies which have both civilian and military applications), allegations of lack of sufficient information about and controls on foreign students in the U.S., recent tensions in the Middle East, and the September 11 terrorist attacks have combined to renew concern among the law enforcement and intelligence communities that controlled U.S.-origin goods and information are vulnerable to theft.
The TAL was originally designed to help maintain technological superiority over the Warsaw Pact and was targeted at individuals from the Soviet Union and other Communist countries. In 1996, the TAL was revised to broaden its focus and reflect more accurately current laws restricting or prohibiting the export of goods and technologies. These laws are designed to further four important security objectives:
-- Stem the proliferation of weapons of mass destruction and missile delivery systems;
-- Restrain the development of destabilizing conventional military capabilities in certain regions of the world;
-- Prevent the transfer of arms and sensitive dual-use items to terrorist states; and
-- Maintain U.S. advantages in certain militarily critical technologies.
HOW TO USE THE TECHNOLOGY ALERT LIST
When applying the TAL, CONOFFs should first: -- Determine whether the applicant proposes to engage in advanced (doctoral, postdoctoral or research scholar) research or studies or business activity (ies) involving any of the scientific/technical fields listed in Tab A.
-- If the applicant's planned activities raise questions of possible ineligibility under INA 212 (a)(3)(a), especially in light of the four broad policy objectives enumerated in para. 6, submit a Security Advisory Opinion (SAO) in the form of visas Donkey Mantis or Eagle Mantis. Detailed guidance on the Mantis program is contained in Ref D. Please note: an SAO is MANDATORY in all cases of applicants bearing passports of, or employed by, states designated as State Sponsors of Terrorism (see Tab B for List) who seek to engage in activitIes involving one of the critical fields.
-- When an SAO is submitted in a TAL case, CONOFFs should gather and report as much information as possible about the applicant's background, proposed activities, and travel plans. The effectiveness of the name check (and the turn-around time) is directly related to the completeness of the information in the SAO. For example: what are the applicant's research or business interests? What is his current position and where does he work? What is the address and phone number of the company(ies) he intends to visit? Who is his point of contact? What are the specifics of his advanced (doctoral, postdoctoral or research scholar) research or studies or business in the U.S.? Who is funding the travel or education? Will he be returning to work in a country that sponsors terrorism or to an entity that is under sanctions? How, and where, does the applicant plan to use the goods or knowledge acquired?
-- CONOFFs should encourage TAL applicants to provide supporting documentation from their home organizations. For example, complete resumes and complete lists of publications of the applicant and, if accompanying the applicant, the spouse; project descriptions; annual reports; and letters of recommendation from a U.S. source or from abroad can be useful in helping to flesh out an applicant's real motives for travel. Such documents should be described by CONOFF in the SAO and held until the case has been closed. The Department encourages CONOFF to provide as much information and details as possible in the SAO.
WHEN IN DOUBT, ASK
With the exception of applicants who are nationals or employees of states sponsoring terrorism, tech transfer SAOs are not mandatory for all scientific and technical visitors seeking to engage in one of the critical fields in Tab A. However, CONOFFs should use caution in adjudicating all such cases. Only when CONOFFs believe (3)(a) clearly does not apply should the case be processed to conclusion without seeking the department's opinion.
TRUSTING YOUR INSTINCTS
Please bear in mind that while the TAL is a valuable tool for recognizing possible illegal technology transfer, it is not the only mechanism for identifying such cases. There may be times when the CONOFF suspects, for whatever reason, that an applicant may be (3)(a) despite the absence of the applicant's profession or area of study on the TAL. Such cases can and should be submitted in an SAO for the Department's advisory opinion.
Additional information about some of the technologies on the Technology Alert List is available on the TecWorld website, the Department's unclassified Intranet science and technology reference site managed by the Bureau of Intelligence and Research. You can access TecWorld on OpenNet at http://www.state.gov/s/inr/.
TAB A - CRITICAL FIELDS LIST
A. CONVENTIONAL MUNITIONS: Technologies associated with:
-- Warheads and other large caliber projectiles
-- Reactive armor and warhead defeat systems
-- Fusing and arming systems.
-- Electronic countermeasures and systems
-- New or novel explosives and formulations
-- Automated explosive detection methods and equipment
B. NUCLEAR TECHNOLOGY: Technologies associated with production and use of nuclear material for both peaceful and military applications. Included are technologies for:
-- Enrichment of fissile material
-- Reprocessing irradiated nuclear fuel to recover produced plutonium
-- Production of heavy water for moderator material
-- Plutonium and tritium handling
Also, certain associated technologies related to nuclear physics and/or nuclear engineering. Includes materials, equipment or technology associated with:
-- Power reactors, breeder and production reactors
-- Fissile or special nuclear materials
-- Uranium enrichment, including gaseous diffusion, centrifuge, aerodynamic, chemical, Electromagnetic Isotopic Separation (EMIS), Laser Isotope Separation (LIS)
-- Spent fuel reprocessing, plutonium, mixed oxide nuclear research Inertial Confinement Fusion (ICF)
-- Magnetic confinement fusion
-- Laser fusion, high power lasers, plasma,
-- Nuclear fuel fabrication including Mixed Oxide (uranium-plutonium) fuels (MOX)
-- Heavy water production
-- Tritium production and use
-- Hardening technology
C. ROCKET SYSTEMS (including ballistic missile systems, space launch vehicles and sounding rockets) and Unmanned Air Vehicles (UAV) (including cruise missiles, target drones, and reconnaissance drones): Technologies associated with rocket systems and UAV systems. The
technology needed to develop a satellite launch vehicle is virtually identical to that needed to build a ballistic missile.
D. ROCKET SYSTEM AND UNMANNED AIR VEHICLE (UAV) SUBSYSTEMS:
Propulsion technologies include solid rocket motor stages, and liquid propellant engines. Other critical subsystems include re-entry vehicles, guidance sets, thrust vector controls and warhead safing, arming and fusing. Many of these technologies are dual-use. Technologies include:
-- Liquid and solid rocket propulsion systems
-- Missile propulsion and systems integration
-- Individual rocket stages or staging/separation mechanism
-- Aerospace thermal (such as superalloys) and high-performance structures
-- Propulsion systems test facilities
E. NAVIGATION, AVIONICS AND FLIGHT CONTROL USEABLE IN ROCKET SYSTEMS AND UNMANNED AIR VEHICLES (UAV): These capabilities directly determine the delivery accuracy and lethality of both unguided and guided weapons. The long-term costs to design, build and apply these technologies have been a limiting proliferation factor. Technologies include those associated with:
-- Internal navigation systems
-- Tracking and terminal homing devices
-- Accelerometers and gyroscopes
-- Rocket and UAV and flight control systems.
-- Global Positioning System (GPS)
F. CHEMICAL, BIOTECHNOLOGY AND BIOMEDICAL ENGINEERING: The technology used to produce chemical and biological weapons is inherently dual-use. The same technologies that could be applied to develop and produce chemical and biological weapons are used widely by civilian research laboratories and industry; these technologies are relatively common in many countries. Advanced biotechnology has the potential to support biological weapons research. In the biological area, look for interest in technologies associated with:
-- Aerobiology (study of microorganisms found in the air or in aerosol form)
-- Growth and culturing of microorganisms
-- Pathology (study of diseases)
-- Study of toxins
-- Virulence factors
-- Genetic engineering, recombinant DNA technology
-- Identification of nucleic acid sequences associated with pathogenecity
-- Freeze-drying (lyophilization)
-- Fermentation technology
-- Cross-filtration equipment
-- High "DOP-rated filters" (e.g., HEPA filters, ULPA filters)
-- Aerosol sprayers and technology, aerosol and aerosolization technology
-- Spray or drum drying technology
-- Milling equipment or technology intended for the production of micron-sized particles
-- Technology for eliminating electrostatic charges of small particles
-- Flight training
-- Crop-dusting, aerosol dissemination
-- Unmanned aerial vehicle (UAV) technology
-- Fuses, detonators, and other munitions technology
-- Submunitions technology
-- Computer modeling of dissemination or contagion
-- Chemical absorption (nuclear-biological-chemical (NBC) protection)
In the chemical area, look for:
-- Organo-phosphate chemistry
-- Chemical engineering
-- Chemical separation technology
-- Pesticide production technology
-- Pharmaceutical production technology
-- Chemical separation technology
-- Detection of toxic chemical aerosols
-- Chemical absorption (Nuclear-Biological-Chemical (NBC) protection)
-- Production of glass-lined steel reactors/vessels, pipes, flanges, and other equipment
-- Aerosol sprayers and technology
-- Flight training
-- Crop-dusting, aerosol dissemination
-- Unmanned Aerial Vehicle (UAV) technology
-- Fuses, detonators, and other munitions technology
-- Submunitions technology
-- Computer modeling of dissemination
G. REMOTE SENSING, IMAGING AND RECONNAISSANCE: Satellite and aircraft remote sensing technologies are inherently dual-use; increasingly sophisticated technologies can be used for civilian imagery projects or for military and intelligence reconnaissance activities. Drones and remotely piloted vehicles also augment satellite capabilities. Key-word associated technologies are:
-- Remote sensing satellites
-- High resolution multi-spectral, electro-optical and radar data/imagery
-- Imagery instruments, cameras, optics, and synthetic aperture radar systems
-- Ground receiving stations and data/image processing systems
-- Imagery data and information products
-- Piloted aircraft
-- Unmanned Air Vehicles (UAV)
-- Remotely-piloted vehicles; and drones
H. ADVANCED COMPUTER/MICROELECTRONIC TECHNOLOGY: Advanced computers and software play a useful (but not necessarily critical) role in the development and deployment of missiles and missile systems, and in the development and production of nuclear weapons. Advanced computer capabilities are also used in over-the-horizon targeting, airborne early warning targeting, Electronic Countermeasures (ECM) processors. These technologies are associated with:
-- Supercomputing, hybrid computing
-- Speech processing/recognition systems
-- Neural networks
-- Data fusion
-- Quantum wells, resonant tunneling
-- Advance optoelectronics
-- Acoustic wave devices,
-- Superconducting electron devices
-- Flash discharge type x-ray systems
-- Frequency synthesizers
-- Microcomputer compensated crystal oscillators
I. MATERIALS TECHNOLOGY: The metallic, ceramic and composite materials are primarily related to structural functions in aircraft, spacecraft, missiles, undersea vehicles, and propulsion devices. Polymers provide seals and sealants for containment of identified fluids and lubricants for various vehicles and devices. High density graphite is used in missile nosetips, jet vanes and nozzle throats. Selected specialty materials (i.e., stealth and the performance of these materials) provide critical capabilities that exploit electromagnetic absorption, magnetic, or superconductivity characteristics. These technologies are associated with:
-- Advanced metals and alloys
-- Non-composite ceramic materials
-- Ceramic, cermet, organic and carbon materials
-- Polymeric materials
-- Synthetics fluids
-- Hot isostatic
-- Liquid and solid lubricant
-- Magnetic metals and superconductive conductors
J. INFORMATION SECURITY: Technologies associated with cryptography and cryptographic systems to ensure secrecy for communications, video, data and related software.
K. LASER AND DIRECTED ENERGY SYSTEMS TECHNOLOGY: Lasers have critical military applications, including incorporation in guided ordinance such as laser guided bombs and ranging devices. Directed energy technologies are used to generate electromagnetic radiation or particle beams and to project that energy on a specific target. Kinetic energy technologies are those used to impart a high velocity to a mass and direct it to a target. Directed energy and kinetic energy technologies have potential utility in countering missiles and other applications. Look for technologies associated with:
-- Atomic Vapor Laser Isotope Separation (AVLIS)
-- Molecular Laser Isotope Separation (MLIS)
-- High Energy Lasers (HEL) (i.e., laser welders)
-- Low Energy Lasers (LEL)
-- Semiconductor lasers
-- Free electron lasers
-- Directed Energy (DE) systems
-- Kinetic Energy (KE) systems
-- Particle beam, beam rider, electromagnetic guns, Optoelectronics/electro-optics (Europe)
-- Optical tracking (i.e., target designators)
-- High energy density
-- High-speed pulse generation, pulsed power
-- Hypersonic and/or hypervelocity
L. SENSORS AND SENSOR TECHNOLOGY: Sensors provide real-time information and data, and could provide a significant military advantage in a conflict. Marine acoustics is critical in anti-submarine warfare; gravity meters are essential for missile launch calibration. Look for technologies associated with:
-- Marine acoustics
-- Optical sensors
-- Night vision devices, image intensification devices
-- Gravity meters
-- High speed photographic equipment
M. MARINE TECHNOLOGY: Marine technologies are often associated with submarines and other deep submersible vessels; propulsion systems designed for undersea use and navigation and quieting systems are associated with reducing detectability and enhancing operations survivability. Look for technologies connected with:
-- Submarines and submersibles
-- Undersea robots
-- Marine propulsion systems
-- Signature recognition
-- Acoustic and non-acoustic detection
-- Acoustic, wake, radar and magnetic signature reduction
_ Stirling engines and other air independent propulsion systems
N. ROBOTICS: Technologies associated with:
-- Artificial intelligence
-- Computer-controlled machine tools
-- Pattern recognition technologies.
Last Updated: 3/8/12