Academic Solicitation
Definition
Academic Solicitation refers to the improper use of students, faculty, researchers, or visiting scholars to acquire sensitive or proprietary information under the guise of legitimate academic collaboration. These efforts often involve foreign entities placing individuals at U.S. research institutions to gain access to emerging technologies and cutting-edge research.
Common Tactics Include
- Requests for peer review of academic papers or presentations
- Invitations to collaborate or consult with faculty
- Attempts to access software, datasets, or dual-use technologies
- Unsolicited applications for research positions or access to publications
- Offers of funding or equipment from foreign institutions or governments
While many academic interactions are genuine, some foreign actors may exploit these relationships to advance their national research and development agendas.
Who Is Targeted?
- Researchers and scientists affiliated with U.S. Government-funded projects
- Faculty and experts with published work or conference presentations
- Graduate and postdoctoral students with access to technical data
- Individuals working on advanced or dual-use technologies
- Instructors of technical or scientific courses
What to Report
Suspicious contacts—whether by email, phone, or in person—should be reported if they involve:
- Unsolicited requests for research collaboration or access
- Invitations to international conferences without clear context
- Offers of gifts, grants, or equipment from foreign sources
Reporting Channels
Contact Export@unh.edu to ensure compliance and assess whether a potential international program is appropriate
Economic Espionage: Protecting Our Intellectual Capital
Definition
Economic espionage involves foreign-sponsored efforts to unlawfully obtain sensitive economic, financial, or technological information. These activities can undermine U.S. competitiveness and result in billions of dollars in losses annually.
Espionage Methods
- Recruiting insiders or former employees
- Technical operations such as wiretapping, bribery, or data theft
- Establishing business partnerships to gain access to proprietary data
What Are Trade Secrets?
Trade secrets include any confidential financial, scientific, technical, or engineering information that has economic value due to its secrecy and is protected by reasonable security measures.
Acquisition Techniques
- Theft or deception
- Unauthorized copying, downloading, or transmitting
- Possession of stolen or misappropriated information
Warning Signs
- Working odd hours or accessing restricted systems
- Copying or removing proprietary materials
- Ignoring IT policies or downloading confidential data
- Conducting unauthorized research
Behavioral Indicators
- Unexplained travel or financial activity
- Suspicious contacts with competitors or foreign entities
- Personal crises or dissatisfaction at work
- Vulnerability to coercion or blackmail
High-Risk Sectors
- Information and communication technology
- Military and aerospace systems
- Clean energy, healthcare, and agricultural technologies
- Business intelligence related to scarce resources
References
Victor Sosa, Director
Contracts & Export Controls
Phone: (603) 862-2001
Email: victor.sosa@unh.edu
Melissa McGee, Assistant Director
Research Integrity Services
Phone: (603) 862-2005
Email: melissa.mcgee@unh.edu