Spring til hovedindhold

Suggestions

Secure research

Protect your research, knowledge and national security.

Kvantecomputer

Denmark's leading position in a range of research areas makes its research communities attractive targets for foreign intelligence and influence activities. In the global fight for new and transformative knowledge, foreign states acquire the latest technology and know-how through, among other things, research collaborations and talent programmes.

 

Unwanted access to research and innovation by foreign states can have serious consequences not only for Denmark but also for specific research institutions and the individual researchers. This makes demands on the ability of the institutions to navigate and manage security-political threats themselves. Secure research is about ensuring that valuable knowledge and results are not exploited in ways that could harm Denmark, the research institutions or national security.
Read more about

Denmark holds advanced knowledge, technology and products that, in a number of areas, make its research institutions, companies and authorities attractive targets for espionage and unwanted technology and knowledge transfer. Some of the technologies that the research institutions are involved in developing could have significant economic as well as military implications in the future. It can also have severe negative consequences for Denmark and our allies if foreign states gain unauthorized access to our ground-breaking research.

Foreign states are particularly interested in high-tech and defence-related areas, in particular energy technology, biotechnology, quantum technology, space technology, robotics, defence products and products subject to export control as well as large parts of Arctic research. The dual-use nature of many research areas and products – having both civilian and military applications – adds to the complexity of the security-political and research-related issues.

Foreign states use a wide range of methods to gain access to critical research. These methods span a continuum between legal and illegal, with some falling into a problematic grey area. Typically, these methods are used in complex combinations. Knowledge transfer primarily occurs through research collaborations, talent programmes, exchange of PhD students and visiting researchers, patent applications, theft, cybercrime and espionage, including cyberespionage.

 

Read more about unwanted knowledge and technology transfer

Read more about the espionage provisions of the Danish Criminal Code: Are you breaking the law?

 

 Unwanted and illegal knowledge transfer
PET distinguishes between illegal and unwanted knowledge transfer. Illegal knowledge transfer refers to transfer of knowledge in breach of current legislation, for example via espionage by foreign intelligence services. Unwanted knowledge transfer, on the other hand, refers to cases where Danish research institutions or companies legally transfer knowledge or skills to entities with ties to non-like-minded states, such as China, Russia and Iran, which can then apply the knowledge directly in ways that are contrary to Danish interests or the interests of our allies.  For example, they may use it to build up their military capabilities, to identify vulnerabilities in critical Danish infrastructure or for other purposes that can benefit these states in the event of a crisis or conflict.

PET assesses that there is a very high threat of unwanted and illegal transfer of Danish research, technology and knowledge within several strategically important technology areas, including:

 

  • quantum technology
  • biotechnology
  • energy technology
  • defence and dual-use technologies

Denmark has a strong tradition of innovative research in these areas, which increases the interest from foreign states. The threat extends to both the technology itself and communities where new knowledge is developed and shared.

 

The Danish defence industry and associated innovation communities are also attractive targets. Actors with ties to foreign military and intelligence services continuously attempt to procure products, components and knowledge related to Danish defence and security technology.

 

Read more about the threat to Danish innovation and research in bio technology

Read more about the threat to Danish innovation and research in energy technology

Read more about the threat to Danish innovation and research in quantum technology

 

Unwanted transfer of technology and knowledge to non-like-minded states can have serious security, economic and scientific consequences.

 

Therefore, it is important for all research institutions – regardless of size – to integrate security into their core activities.

 

This includes:

 

  • prioritizing security at the management level
  • assessing risks associated with recruitment, collaborations and suppliers
  • protecting access to locations, data, key staff and students
  • actively considering the potential dual-use applications of your technology and other sensitive knowledge

 

PET provides guidance and tools to help you build an appropriate security level.

 

Read more about what you can do

Several Danish authorities and organizations contribute to protecting Danish innovation and can support you in your security work. Here you can find guidance, tools and information on relevant rules and risks.

 

The Danish Business Authority is the competent authority in Denmark for export controls on dual-use items and for investment screening. The Authority administers the rules aimed at preventing sensitive technology and knowledge from being transferred to actors that may pose a threat to national security or public order.

The Danish Emergency Management Agency (DEMA) is at part of the Denmark’s national emergency response service and has a range of operational capabilities and task related to emergency communication. Here you will find guidelines and tools for disaster and crisis preparedness for both public and private organizations.

The Danish Resilience Agency is responsible for the overall national guidance on threats facing societal. SAMSIK provides guidance to public authorities, companies, and citizens on security – cyber security, supply security and information security – and provides materials, courses and counsel.