AI Chip Smuggler Used Japanese Front Company to Evade Export Controls
Tokyo, Saturday, 28 March 2026.
An accused AI chip smuggler used a Tokyo front company to deal with major Japanese corporations, even sharing an address with a publicly traded firm to bypass trade restrictions.
Uncovering the Underground Supply Chain
On March 19, the United States Department of Justice formally indicted three individuals associated with server manufacturer Super Micro Computer Inc. (SMCI) for orchestrating an illicit network designed to bypass severe export controls [4]. The accused include Yih-Shyan Liaw, a former senior vice president of business development at Super Micro, Ting-Wei Sun, an external contractor, and Ruei-Tsang Chang, a Taiwan-based business manager who currently remains at large [4]. The illicit operations spanned from 2024 to the spring of 2025, successfully masking the true destination of the hardware for roughly 1 year before authorities dismantled the network [4]. The trio allegedly funneled high-performance servers equipped with advanced graphics processing units (GPUs) through Southeast Asia [4]. By falsely declaring Southeast Asian nations as the final destination, the operatives successfully repackaged and diverted the critical hardware to China [4]. This sophisticated rerouting highlights a persistent vulnerability in global tech distribution, a reality further evidenced by recent reports on March 27, 2026, revealing that Chinese universities with military affiliations successfully acquired Super Micro servers containing restricted AI chips [2].
Deepening Corporate Entanglements
While many of Hashcat Japan’s claimed partnerships were fabricated, the entity did successfully infiltrate the legitimate Japanese corporate sector. Investigative reports confirm that Hashcat actively engaged in business with major domestic players, most notably Sony Semiconductor and the Tokyo Stock Exchange-listed Shinto Holdings [1][2]. The relationship with Shinto Holdings was particularly extensive. Shinto entered into a formal data center business cooperation agreement with both Hashcat Japan and Super Micro, an alliance underscored by the personal attendance of suspects Liaw and Sun at a Shinto corporate event in Shizuoka Prefecture [4].
Corporate Fallout and Compliance Risks
The exposure of this multi-layered evasion tactic has triggered immediate corporate restructuring at Super Micro. In response to the federal indictments, the company announced that Liaw had resigned from his board position and was suspended pending investigation [4]. Furthermore, Super Micro terminated its contractual relationship with Sun and suspended Chang [4]. The United States has strictly monitored the export of advanced GPUs and AI servers to China since the Biden administration, citing profound economic and national security concerns [4]. Yet, the Hashcat Japan case demonstrates that the financial incentives driving the ‘origin-washing’ of restricted hardware remain intensely powerful [4]. As multinational tech companies navigate these tightening regulations, the imperative for rigorous, multi-tier supply chain audits has never been more critical to prevent severe compliance failures [GPT]. Concurrently, as foreign imports face stricter hurdles, Chinese domestic equipment makers such as Naura Technology Group are aggressively expanding their product lineups, as showcased at the recent Semicon China exhibition, highlighting the dual pressure of import restrictions and domestic technological advancement [3].