Main Content

Connect

Information on Institutions at Risk of PRC Threat Actor Targeting for Research and Technology Theft

Request for Proposals

 

Deadline: April 15, 2022

Summary and Scope:

CRDF Global is seeking experts to provide information on institutions in key countries that may be vulnerable to targeting by actors associated with the People’s Republic of China (PRC) to acquire or access proprietary dual-use research and technology.

Tasks and Deliverables:

  1. Ranked Lists of At-Risk Institutions: For the following A) countries, per B) sector, and per C) technology category, provide a list of at least 10 institutions deemed “at-risk” to targeting by actors associated with the People’s Republic of China (PRC) to acquire or access proprietary dual-use research and technology (total of 1,800 institutions).  Institutions should be ranked by risk indicators (see below) within each category.
    1. Countries
      1. Brazil
      2. Chile
      3. Croatia
      4. Czech Republic
      5. Georgia
      6. Lebanon
      7. Morocco
      8. Poland
      9. Romania
      10. Serbia
      11. Singapore
      12. Slovakia
      13. Slovenia
      14. Taiwan
      15. Ukraine
    2. Sector
      1. Academia/Research sector
      2. Private sector
    3. Technology Category
      1. Artificial Intelligence and Machine Learning
      2. Biotechnology, synthetic biology, gene synthesis
      3. Quantum computing
      4. Microprocessor/high-performance computing
      5. Aerospace engineering
      6. Advanced robotics
  2. At-Risk Indicators: Provide overall criteria for how the “at-risk” designation will be made, to include a combination of, for example: nature of dual-use research/technology manufacturing at the institutions, existing relationships with PRC-affiliated entities, open-source cybersecurity vulnerabilities, etc.
  3. Institutional Contact Information: Provide contact information (at a minimum, names and email addresses) for key individuals at the identified institutions for future CRDF Global engagement to mitigate potential vulnerabilities. Contact information must be relevant to the particular department/sub-unit of concern.

Download the RFP

 

Download the Q & A