News
Risch, Ricketts, Kim Introduce MATCH Act; Level the Global Playing Field for U.S. Tech
University blocks job applicants from four ‘risk’ nations
Former Google Engineer Found Guilty of Economic Espionage and Theft of Confidential AI Technology
Transcript: OSTP Director Kratsios Testifies
China’s degree delisting hits Korean universities
Purdue Limits Graduate Students From China
Chinese Government Exploiting UK Universities to Advance Military Technology
Harvard Expands Screening of International Visitors
Trump announces plan to welcome 600,000 Chinese students
Trump says he’s ‘always been in favor’ of Chinese students coming to US
Danish universities reject Chinese researchers over espionage concerns
AU has rejected researchers from China, Russia and Iran for security reasons
Uncovering Chinese Academic Espionage at Stanford
BIS Settles Alleged Export Control Violations with Indiana University
US warns new Chinese counterespionage law puts companies at risk
Pelosi arrives in Taiwan vowing U.S. commitment; China enraged
Chinese National Pleads Guilty to Illegal Exports to Northwestern Polytechnical University
UNT cancels visa program for Chinese researchers
Background
Multilateral Export Control and Non-Proliferation Regimes for background on export control laws across the world.
Encrypted USB Flash Drive for storing your research.
Marking Controlled Unclassified Information (CUI) for guidance when marking controlled items.
Introduction to Marking video from the National Archives with examples for various document types.
Department of Defense CUI Training for information on the eleven training requirements for accessing, marking, safeguarding, decontrolling and destroying CUI.
Steps for using the EAR from the Code of Federal Regulations.
Why Conduct Restricted Party Screening? (PDF) from the University of Arizona.
Restricted Party Screening Guide from the University of Illinois.
Restricted Party Screening Guidelines from Rowan University.
High Risk International Travel from The University of Denver.
Travel to China or Russia from The University of Rhode Island.
Iran’s Science & Technology Ecosystem (PDF) from NSF SECURE Analytics.
Risks faced by academia from China according to the FBI (PDF) and steps that can be taken to protect from counterintelligence threats.
How China Operates on University Campuses (PDF) from the National Counterintelligence and Security Center via the Association of American Universities.
Chinese Capabilities for Computer Network Operations and Cyber Espionage (PDF) from the U.S.-China Economic and Security Review Commission.
China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States (PDF) from the U.S.-China Economic and Security Review Commission.
Overseas Chinese Students and Scholars in China’s Drive for Innovation (PDF) from the U.S.-China Economic and Security Review Commission.
The Chinese Communist Party on Campus: Opportunities & Risks (PDF) from the U.S. Department of State.
China’s National Security Laws: Implications Beyond Borders (PDF) from the Center for Naval Analyses.
Trusted Research Guidance for Academia from the UK’s National Protective Security Authority.
Foreign Malign Influence and Higher Education (PDF) from the FBI.
Safeguarding Academia (PDF) from the National Counterintelligence and Security Center (NCSC) a component of the Office of the Director of National Intelligence (ODNI).
List of High-Risk Countries from Northeastern University.
List of High Risk Entities (PDF) from Research at the University of Central Florida.
Research organizations and institutions that pose the highest risk to Canada’s national security from the government of Canada.
Universities in China supervised by the State Administration of Science, Technology and Industry for National Defense (SASTIND) (PDF) from the Australian Strategic Policy Institute.
Embargoed or Otherwise Restricted Destinations, Organizations, or Individuals from Research at UC Berkeley.