recommended reading

U.S. recommends relaxing satellite export controls

The Defense and State Departments on Wednesday released a joint report recommending that Congress ease export controls on satellites that have become less militarily sensitive to allow American companies to better compete in the world market.

A substantial number of commercial satellite systems and components have become less critical to national security over the last 15 years, according to the White House, as they transition from military to predominantly civilian uses. The White House says relaxing U.S. export controls on such items to reflect their "decreased sensitivity" will allow the government to facilitate trade with allies and close partners while focusing its resources on controlling the most sensitive items.

Officials from the State, Defense and Commerce Departments have spent months painstakingly combing through the entire U.S. Munitions List to identify "critical" items that truly warrant the State Department's strict export controls. Their overarching goal: streamlining exports by moving the rest of the items onto a less restrictive list controlled by the Commerce Department. The payoff from the overall export-control overhaul could be huge for defense contractors, who currently need to go through State's unwieldy licensing process. Some perspective: The State Department processes about 14,000 licenses per year; after the transition, it expects to handle fewer than 7,000.

American manufacturers have long complained that the 1970s-era export-control process overly restricts items that have no real military value--or are so readily available from other countries that it strangles their ability to compete in the global economy. This week's recommendations are meant to boost the U.S. satellite industrial base. Current satellite export controls have disadvantaged the U.S. space industry and its supplier chain, the White House said. In 1995, the U.S. held 73 percent of the worldwide shares of satellite exports; by 2005, only 25 percent. Companies that may benefit from implementing the recommendations of the report, Bloomberg reports, include Northrop Grumman Corp., Honeywell International Inc., Communications Holdings Inc., and others.

House Foreign Affairs ranking member Howard Berman, D-Calif., used the release of the report to highlight his legislation with Don Manzullo, R-Ill., authorizing the president to remove commercial satellites and related components from the U.S. Munitions List and transfer them to the less restricted Commerce Control List - while blocking satellite sales to countries like Iran, North Korea and China.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.