Four Techniques for Identifying Chinese Military Companies

12/15/22 3 minute read

Download the Ebook

U.S. regulations in recent years have taken steps to prevent American companies from inadvertently supporting the Chinese military by doing business with military companies or indirectly facilitating the export of sensitive U.S. technologies.

But China’s Military Civil Fusion policy makes identifying Chinese military companies a real challenge.

Thankfully, there are techniques U.S. persons can employ to reduce the risk of violating U.S. export controls and/or sanctions on Chinese military companies.

This report will explain how to determine whether a target company:

  • Is on a U.S. watchlist (not always as straightforward as it sounds)
  • Is owned by a watchlisted company
  • Has investment from Chinese government-led military civil fusion investment funds
  • Has an address with ties to military companies or investment

Read the report to ensure regulatory compliance and protect your exports from risk posed by Chinese military companies.

About Sayari:

Sayari empowers government and industry to protect finance, trade and security systems by illuminating the global commercial networks through connected public data and documents. Providing commercial intelligence data from over 250 jurisdictions worldwide, Sayari delivers the entity network visualizations and intuitive risk identifications that decision makers need to stay proactively informed and power safer global commerce.

Since its founding in 2015, Sayari has earned the trust of top financial institutions, Fortune 100 corporations and government agencies, securing a $40M Series C in 2021. Sayari is headquartered in Washington, D.C., and its solutions are used by more than 3,000 frontline analysts in 35 countries.

Related Resources

All Resources
Taking On the Latest Export Control Priorities Using Networked Public Records
3 minute read
The post-pandemic trade landscape has export controls playing an increasingly important role in the United States’ national security...
Read More
Money Laundering Through Cryptocurrency: Indicators and Combined Investigative Techniques
2 minute read
While an inherently transparent technology like blockchain might seem an unlikely vehicle for money laundering, illicit use of...
Read More
Distinguishing Targets from Lookalikes: Entity Disambiguation Tactics and Examples
3 minute read
There are countless people and companies with identical names. As an investigator, how do you determine whether you’re looking at the...
Read More