Academic Solicitation: What You Need to Know

Academic Solicitation

Definition
Academic Solicitation refers to the improper use of students, faculty, researchers, or visiting scholars to acquire sensitive or proprietary information under the guise of legitimate academic collaboration. These efforts often involve foreign entities placing individuals at U.S. research institutions to gain access to emerging technologies and cutting-edge research.

Common Tactics Include 

  • Requests for peer review of academic papers or presentations
  • Invitations to collaborate or consult with faculty
  • Attempts to access software, datasets, or dual-use technologies
  • Unsolicited applications for research positions or access to publications
  • Offers of funding or equipment from foreign institutions or governments

While many academic interactions are genuine, some foreign actors may exploit these relationships to advance their national research and development agendas.

Who Is Targeted? 

  • Researchers and scientists affiliated with U.S. Government-funded projects
  • Faculty and experts with published work or conference presentations
  • Graduate and postdoctoral students with access to technical data
  • Individuals working on advanced or dual-use technologies
  • Instructors of technical or scientific courses

What to Report
Suspicious contacts—whether by email, phone, or in person—should be reported if they involve: 

  • Unsolicited requests for research collaboration or access
  • Invitations to international conferences without clear context
  • Offers of gifts, grants, or equipment from foreign sources

Reporting Channels
Contact Export@unh.edu to ensure compliance and assess whether a potential international program is appropriate

Economic Espionage: Protecting Our Intellectual Capital

Definition
Economic espionage involves foreign-sponsored efforts to unlawfully obtain sensitive economic, financial, or technological information. These activities can undermine U.S. competitiveness and result in billions of dollars in losses annually.

Espionage Methods 

  • Recruiting insiders or former employees
  • Technical operations such as wiretapping, bribery, or data theft
  • Establishing business partnerships to gain access to proprietary data

What Are Trade Secrets?
Trade secrets include any confidential financial, scientific, technical, or engineering information that has economic value due to its secrecy and is protected by reasonable security measures.

Acquisition Techniques 

  • Theft or deception
  • Unauthorized copying, downloading, or transmitting
  • Possession of stolen or misappropriated information

Warning Signs 

  • Working odd hours or accessing restricted systems
  • Copying or removing proprietary materials
  • Ignoring IT policies or downloading confidential data
  • Conducting unauthorized research

Behavioral Indicators 

  • Unexplained travel or financial activity
  • Suspicious contacts with competitors or foreign entities
  • Personal crises or dissatisfaction at work
  • Vulnerability to coercion or blackmail

High-Risk Sectors 

  • Information and communication technology
  • Military and aerospace systems
  • Clean energy, healthcare, and agricultural technologies
  • Business intelligence related to scarce resources

References

[1] Safeguarding Academia

[2] Quick Reference Guide for Students and Researchers

[3] Quick Reference Guide for Academic Institutions

Contact Information

Victor Sosa, Director
Contracts & Export Controls
Phone: (603) 862-2001
Email: victor.sosa@unh.edu

Melissa McGee, Assistant Director
Research Integrity Services
Phone: (603) 862-2005
Email: melissa.mcgee@unh.edu

Report a Research Security Concern