Hello, this is Hamamoto from TIMEWELL. Today, rather than introducing a tech service, I want to address a genuinely serious topic: the military diversion risk and intelligence-gathering activities lurking within the acceptance of international students and researchers, and within joint research with overseas institutions.
I fully support the internationalization of Japanese universities and research institutions. When people with diverse backgrounds come together, it expands the horizons of research. But looking at recent trends, I am seeing an unmistakable increase in cases where that "open posture" is being exploited.
Advanced technology and sensitive research data passing — inadvertently — into the hands of foreign military organizations. Written out, it may sound like a movie plot, but there are actual criminal convictions in Japan for exactly this. Given that METI, the Ministry of Education, Culture, Sports, Science and Technology (MEXT), and the U.S. EAR are all sounding alarms in unison, organizations that continue their acceptance processes without their staff knowing how to conduct background checks are, frankly, operating in a precarious position.
This article organizes everything from specific tools like the Foreign User List and CSL Search, to how to identify military connections from a resume — in a way that anyone new to this area can follow.
Why Vigilance Is Needed Now When Accepting International Students and Researchers
The boundary between military technology and civilian technology grows blurrier every year. Semiconductors, AI, quantum computing, new materials — all are standard civilian research topics, and all are also dual-use technologies with potential military applications. An outcome born in a university laboratory finding its way, through a chain of transactions, into another country's missile development. That scenario is now a realistic possibility.
Strengthening of Deemed Export Regulations
For a long time in Japan, foreign nationals residing in Japan were treated as "residents," and the provision of technology to them was excluded from export control requirements. Six months after entering the country, you are a resident. Employed at a domestic business, you are a resident. Under this framework, even a researcher acting on behalf of a foreign government could be freely taught technology as long as they were physically in Japan.
To close this loophole, METI clarified the operational framework for "deemed export" management under FEFTA in May 2022 [1]. Even residents who fall under a "specified category" — METI's term for individuals under strong influence from a foreign government — are now treated the same as if the technology were exported, requiring advance authorization from the Minister of Economy, Trade and Industry.
Concretely: researchers receiving substantial funding from foreign governments, or international students acting under the direction of foreign military-related organizations, fall under this category. The act of teaching sensitive technology in a university laboratory can itself become a regulated activity. The impact of this change should be enormous, but honestly, awareness at the operational level still feels far from sufficient.
The AIST Technology Leak Case
An incident that proved this is not a theoretical concern. A former lead researcher of Chinese nationality who was affiliated with the National Institute of Advanced Industrial Science and Technology (AIST) sent research data on fluorine compound synthesis technology to a Chinese company by email. The recipient was a company of which his wife was the representative. He was prosecuted under the Unfair Competition Prevention Act and convicted by the Tokyo District Court in February 2025: two and a half years imprisonment suspended for four years, and a fine of 2 million yen [2].
The presiding judge stated that the defendant had "betrayed the trust placed in researchers at AIST, which is funded with public money." Information removed from a national research institution by a researcher's own hand. This case lays bare not only the weakness of screening at the point of acceptance, but how vulnerable the monitoring framework was after acceptance.
China's "Defense Seven Universities" and Japanese Universities
There is another issue that cannot be ignored: the group of Chinese universities known as the "Defense Seven Universities" (国防七校).
Beijing University of Aeronautics and Astronautics, Beijing Institute of Technology, Harbin Institute of Technology, Harbin Engineering University, Nanjing University of Aeronautics and Astronautics, Nanjing University of Science and Technology, and Northwestern Polytechnical University. These seven universities are said to have deep ties to the Chinese People's Liberation Army's weapons development and "military-civil fusion" strategy. In 2020, the U.S. issued an executive order restricting visa issuance to graduate students from these universities.
And Japan? A government survey found that as of fiscal 2020, a total of 39 students from six of the Defense Seven Universities were studying at Japanese national universities and elsewhere [3], including Tohoku University, Tokyo Institute of Technology, Chiba University, Nagoya University, and Niigata University. What research laboratories they were affiliated with and what technologies they accessed was reportedly not fully traceable from records at the time.
It has also been noted that as the U.S. closed its doors, students who could no longer study there may have redirected to Japan. Personally, I believe this is a structural problem that Japanese universities need to address urgently.
How to solve export compliance challenges?
Learn about TRAFEED (formerly ZEROCK ExCHECK) features and implementation benefits in our materials.
Understanding the Rules Set by Japanese and U.S. Authorities
Before conducting background checks, it is important to understand what regulations and guidelines the relevant Japanese and U.S. government bodies have established. Here I will focus on three: METI, MEXT, and the U.S. EAR.
METI's "Foreign User List"
METI operates "catch-all controls" to prevent the leakage of technology that could be used to develop weapons of mass destruction or conventional weapons. At the core is the "Foreign User List" [4].
As of the September 2025 revision, 835 organizations from 15 countries and regions are listed. Providing technology to organizations on this list or their associates requires advance authorization from the Minister of Economy, Trade and Industry.
| Item | Details |
|---|---|
| Purpose | To provide exporters with information on foreign organizations suspected of involvement in WMD development |
| Scale | 835 organizations from 15 countries and regions (as of September 2025 revision) |
| Regulatory effect | Technology provision to listed organizations generally requires advance ministerial authorization |
| Concern categories | Clearly specified by field: biological weapons (B), chemical weapons (C), missiles (M), nuclear weapons (N), etc. |
Important to note: this is not simply a "prohibition list." Being listed does not automatically prohibit transactions — technology provision is possible if authorization is obtained. However, there is no question that accepting students or joint researchers from listed organizations creates substantial due diligence obligations.
MEXT's Promotion of "Research Integrity"
MEXT requires universities to ensure "research integrity" — the soundness and fairness of research. In March 2025, MEXT published a "Research Integrity Near-Miss Case Collection," sharing real cases of close calls that occurred at universities [5].
MEXT's guidelines require that international students and researchers being accepted accurately disclose their work history, research history, concurrent positions, and external research funding sources, and that risk assessments be conducted based on this information. The model checklist explicitly states that risk assessments should be conducted through "comparison with the Foreign User List, other countries' entity lists, and separately obtainable information."
As a side note: reading this near-miss case collection reveals vivid examples such as "a foreign researcher in a joint research project turned out to have connections to a military-related organization" and "it later emerged that an accepted international student's supervising professor in their home country was involved in a military project." I strongly recommend it to those who assume their own institutions are safe.
Extraterritorial Application of U.S. EAR and the Entity List
What makes things complicated for Japanese organizations is the U.S. EAR. This regulation, administered by the BIS of the U.S. Department of Commerce, designates organizations that conduct activities contrary to U.S. national security or foreign policy on the "Entity List" [6].
The danger of EAR is its "extraterritorial application." Even a Japanese university — if it is conducting research using U.S.-made equipment or software, or U.S.-derived technology — could be in violation of U.S. law the moment it provides the resulting research outcomes to an Entity List-designated institution. Even in a transaction conducted entirely within Japan.
If you are thinking "we don't deal directly with the U.S., so it doesn't apply to us" — that view needs to be revised. The analytical instruments in your laboratory, the software you use, the data from papers you cite: the probability that U.S.-origin technology is embedded somewhere is extremely high.
Practical Guide: How to Conduct Background Checks
From here, I will explain concrete steps for actually conducting background checks.
Identifying Military Connections from a Resume
The first step in acceptance screening is a thorough review of submitted resumes and CVs. Simply confirming educational background and work history is not enough. You need to read the documents through the following lenses.
First, verify whether the undergraduate university and affiliated institution have military connections. The Defense Seven Universities mentioned above are obvious starting points. The Australian Strategic Policy Institute (ASPI) also publishes a database called the "China Defence Universities Tracker," which allows you to verify the depth of each Chinese university's ties to military organizations, categorized by risk level.
Next, examine the nature of the research laboratory where the person previously worked. Investigate whether the supervising professor is involved in military research projects, and whether any co-authors on papers are affiliated with military institutions. Under China's "military-civil fusion" policy, even ostensibly civilian laboratories sometimes receive funding from military projects.
Verifying the source of funding is also a point that must not be overlooked. If study abroad funding or research funding comes from a foreign government scholarship program, you need to trace back and verify whether that program is linked to military-related institutions.
And finally: gaps in the resume. If there are unexplained blank periods, you cannot rule out the possibility that military organization activities are being intentionally concealed. Ask directly during the interview, and verify the consistency of the responses.
How to Use the CSL Search
The Consolidated Screening List (CSL), provided free of charge by the U.S. government, is one of the most practically useful tools for background checks [7]. It allows cross-referencing against multiple regulatory lists maintained by the Departments of Commerce, State, and the Treasury in a single search interface.
| List name | Administrator | Content |
|---|---|---|
| Entity List | Department of Commerce BIS | Organizations of security concern. Technology provision generally requires BIS authorization |
| Military End User List | Department of Commerce BIS | Organizations identified as military end-users. Provision of specific items is restricted |
| Denied Persons List | Department of Commerce BIS | Individuals and organizations whose export privileges have been revoked. Transactions are prohibited |
| SDN List | Department of the Treasury OFAC | Specially Designated Nationals List. Includes terrorists and drug organization members. All transactions prohibited |
| Non-SDN CMIC List | Department of the Treasury OFAC | List of Chinese military-industrial complex companies. Subject to investment restrictions |
The process is simple: access trade.gov/consolidated-screening-list, enter a person's or organization's name, and search. The "Fuzzy Name Search" feature supports approximate matching, handling spelling variations that arise when Chinese or Arabic names are transliterated into English. Data is updated daily at 5:00 AM U.S. Eastern Time, ensuring you are always searching against the latest information.
CSV and JSON downloads and an API are also available, so universities with high acceptance volumes can integrate the CSL into their own systems for automated screening.
Cross-Referencing Against the Foreign User List
In parallel with the CSL Search, always cross-reference against METI's Foreign User List. Verify whether the accepted individual's home institution or current affiliation is listed.
One important point: even "past affiliations" cannot be dismissed. Commentary from TMI Law Partners notes that for individuals who were previously affiliated with a listed institution, "it is necessary to verify whether the individual plans to return to that institution in the future and the certainty of that plan — confirming that the end-user has not effectively become the Foreign User List-designated institution" [8]. Resignation does not mean the person is unconnected. You must anticipate the possibility that after returning home, the person re-joins their former institution and brings technology obtained in Japan with them.
Assessing whether the technology being provided could be diverted to the areas of concern associated with the other party — for example, biological weapons or missile development — is also essential. This evaluation process must be documented. If a problem is discovered later, the documentation provides grounds for demonstrating that "the judgment at the time was reasonable."
Building the Organizational Framework
Relying on a specific individual's personal skills for background checks is dangerous. The process must be institutionalized within the organization's framework.
Monitoring After Acceptance — Not Just at Entry
Checks should not end with the initial acceptance process. An ongoing framework is needed after acceptance as well: monitoring activity within the research laboratory, the scope of data being accessed, and whether there is any suspicious external communication.
A student who initially came to Japan for basic research purposes gradually encroaching on applied technology and attempting to access sensitive data. This "scope creep" actually happens — as the AIST case demonstrates. Access rights on information systems should be limited to the minimum necessary, and access management for experimental facilities should be strictly enforced. These are mundane tasks, but neglecting them can lead to irreversible consequences.
Building Systems to Eliminate Judgment Bias
The most difficult element of risk assessment is human psychological bias.
"This researcher has a high citation count — we really want to accept them." "If this joint research comes through, we can get a large grant." When these positive motivations take the lead, people unconsciously underestimate security concerns. Conversely, right after seeing coverage of a technology leak case in the news, people may become overly suspicious of all foreign researchers, cutting off beneficial international exchanges.
That is precisely why it is important to establish an independent review committee for acceptance decisions, and to institutionalize a process of making decisions based on objective data: CSL Search results, facts from resumes, and so on. A system where individual faculty members make acceptance decisions based solely on "I trust this person" is no longer adequate.
Accelerating Export Control Framework-Building with AI
Background checks and export classification are tasks that require specialized knowledge and effort. TIMEWELL's export control AI agent TRAFEED (formerly ZEROCK ExCHECK) streamlines cross-referencing against the Foreign User List and Entity List, reducing the burden on responsible personnel.
"We want to build a proper acceptance screening workflow." "We want to reduce the person-hours spent on end-user screening." If that describes your situation, please feel free to reach out.
In Closing
Academic freedom and open science are principles that should be defended as pillars of human progress. At the same time, it is a reality that organized efforts exist to exploit that openness and systematically collect the intellectual property and sensitive technology of other countries.
I am not saying that accepting international students and researchers should stop. On the contrary, it is precisely to sustain that openness in a viable form that background checks — as a foundational element — are necessary.
Does the career history on a resume conceal hidden connections to a military organization? Is the affiliated institution flagged on the CSL Search or the Foreign User List? These verification tasks are no longer merely "good to do" — they are becoming an obligation for protecting your organization.
If your organization's acceptance workflow does not yet incorporate these checks, please begin a review today. That is the most important message I want to convey through this article.
References
[1] METI, "Clarification of Deemed Export Management" https://www.meti.go.jp/policy/anpo/law_document/minashi/jp_kigyou.pdf
[2] Yomiuri Shimbun, "Former Chinese Researcher at AIST Found Guilty; Had Sent Research Data to Chinese Company" (February 25, 2025) https://www.yomiuri.co.jp/national/20250225-OYT1T50178/
[3] Yomiuri Shimbun, "39 Students from China's 'Defense Seven Universities' with Deep Military Ties Studied at Tokyo Tech and Other Japanese Universities" (June 2, 2023) https://www.yomiuri.co.jp/politics/20230602-OYT1T50203/
[4] METI, "Foreign User List Revised" (September 2025) https://www.meti.go.jp/press/2025/09/20250929006/20250929006.html
[5] MEXT, "Research Integrity Near-Miss Case Collection" (March 2025) https://www.mext.go.jp/content/20250331-mxt_kagkoku-000019002_1.pdf
[6] TMI Law Partners, "What Is Research Integrity Compliance and What Does It Require?" https://www.tmi.gr.jp/eyes/blog/2024/15676.html
[7] U.S. Department of Commerce, "Consolidated Screening List" https://www.trade.gov/consolidated-screening-list
[8] TMI Law Partners, "What Is Research Integrity Compliance and What Does It Require?" https://www.tmi.gr.jp/eyes/blog/2024/15676.html
