Difference between revisions of "Journal:National and transnational security implications of asymmetric access to and use of biological data"

From LIMSWiki
Jump to navigationJump to search
(Saving and adding more.)
(Saving and adding more.)
Line 31: Line 31:
==Introduction==
==Introduction==
Advances in computer science, engineering, and data science have changed research, development, and application of biology and biotechnology in the United States and internationally. Examples of changes include: (a) increased reliance on internet connectivity for research and [[laboratory]] operations<ref name=AccentureTheFuture15">{{cite web |url=https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_20/Accenture-15-1429U-FutureOfApps-LSCS-v5-web.pdf |format=PDF |title=The Future of Applications in Life Sciences |author=Accenture |publisher=Accenture |date=2015}}</ref><ref name="BajemaTheDig18">{{cite journal |title=The digitization of biology: Understanding the new risks and implications for governance |journal=Emergence & Convergence |author=Bajema, N.E.; DiEuliis, D.; Lutes, C.; Lim, Y.-B. |page=3 |year=2018 |url=https://wmdcenter.ndu.edu/Media/News/Article/1569559/the-digitization-of-biology-understanding-the-new-risks-and-implications-for-go/}}</ref><ref name="OlenaBringing18">{{cite web |url=https://www.the-scientist.com/bio-business/bringing-the-internet-of-things-into-the-lab-64265 |title=Bringing the Internet of Things into the Lab |author=Olena, A. |work=The Scientist |date=01 June 2018}}</ref>; (b) increased use of automation in life-science laboratories<ref name="ChapmanLab03">{{cite journal |title=Lab automation and robotics: Automation on the move |journal=Nature |author=Chapman, T. |volume=421 |issue=6923 |pages=661, 663, 665–6 |year=2003 |doi=10.1038/421661a |pmid=12571603}}</ref>; (c) application of the “design-build-test” paradigm to create new biological organisms<ref name="AgapakisDesign14">{{cite journal |title=Designing synthetic biology |journal=ACS Synthetic Biology |author=Agapakis, C.M. |volume=3 |issue=3 |pages=121–8 |year=2014 |doi=10.1021/sb4001068 |pmid=24156739}}</ref><ref name="CarbonellAnAuto18">{{cite journal |title=An automated Design-Build-Test-Learn pipeline for enhanced microbial production of fine chemicals |journal=Communications Biology |author=Carbonell, P.; Jervis, A.J.; Robinson, C.J. et al. |volume=1 |pages=66 |year=2018 |doi=10.1038/s42003-018-0076-9 |pmid=30271948 |pmc=PMC6123781}}</ref>; (d) increased generation, analyses, and computational modeling of information about biological systems, cells, and molecules<ref name="ThurowLab04">{{cite journal |title=Laboratory Information Management Systems for Life Science Applications |journal=Organic Process Researh & Development |author=Thurow, K.; Göde, B.; Dingerdissen, U. Stoll, N. |volume=8 |issue=6 |pages=970–982 |year=2004 |doi=10.1021/op040017s}}</ref><ref name="WalpoleMulti13">{{cite journal |title=Multiscale computational models of complex biological systems |journal=Annual Review of Biomedical Engineering |author=Walpole, J.; Papin, J.A.; Peirce, S.M. |volume=15 |pages=137–54 |year=2013 |doi=10.1146/annurev-bioeng-071811-150104 |pmid=23642247 |pmc=PMC3970111}}</ref>; (e) treatment of organisms and DNA as materials rather than phenomena to study<ref name="ServiceDNA17">{{cite web |url=https://www.sciencemag.org/news/2017/03/dna-could-store-all-worlds-data-one-room |title=DNA could store all of the world's data in one room |author=Service, R.F. |work=Science |date=02 March 2017 |doi=10.1126/science.aal0852}}</ref><ref name="AndersonSynth18">{{cite journal |title=Synthetic biology strategies for improving microbial synthesis of "green" biopolymers |journal=Journal of Biological Chemistry |author=Anderson, L.A.; Islam, M.A.; Prather, K.L.J. |volume=293 |issue=14 |pages=5053-5061 |year=2018 |doi=10.1074/jbc.TM117.000368 |pmid=29339554 |pmc=PMC5892568}}</ref><ref name="PatelDNA18">{{cite web |url=https://spectrum.ieee.org/the-human-os/biomedical/devices/dna-data-storage-gets-random-access |title=DNA Data Storage Gets Random Access |work=IEEE Spectrum |author=Patel, P. |date=20 February 2018}}</ref>; and (f) new funders such as venture capital, crowdfunding platforms, and foreign companies and governments.<ref name="vonKroghTheChang12">{{cite journal |title=The changing face of corporate venturing in biotechnology |journal=Nature Biotechnology |author=von Krogh, G.; Battistini, B.; Pachidou, F.; Baschera, P. |volume=30 |issue=10 |pages=911–5 |year=2012 |doi=10.1038/nbt.2383 |pmid=23051802}}</ref><ref name="ChaCrowd15">{{cite web |url=https://www.washingtonpost.com/national/health-science/crowdfunding-propels-scientific-research/2015/01/18/c1937690-9758-11e4-8005-1924ede3e54a_story.html?utm_term=.734eb498edb5 |title=Crowdfunding propels scientific research |author=Cha, A.E. |work=The Washington Post |date=18 January 2015}}</ref><ref name="MervisData17">{{cite web |url=https://www.sciencemag.org/news/2017/03/data-check-us-government-share-basic-research-funding-falls-below-50 |title=Data check: U.S. government share of basic research funding falls below 50% |author=Mervis, J. |work=Science |date=09 March 2017 |doi=10.1126/science.aal0890}}</ref> These changes have transformed the scientific, agricultural, and health communities' ability to understand and manipulate the world around them. In addition, the changes have enabled an influx of new practitioners and problem-solvers into biology, providing opportunities for education and research all over the world.
Advances in computer science, engineering, and data science have changed research, development, and application of biology and biotechnology in the United States and internationally. Examples of changes include: (a) increased reliance on internet connectivity for research and [[laboratory]] operations<ref name=AccentureTheFuture15">{{cite web |url=https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_20/Accenture-15-1429U-FutureOfApps-LSCS-v5-web.pdf |format=PDF |title=The Future of Applications in Life Sciences |author=Accenture |publisher=Accenture |date=2015}}</ref><ref name="BajemaTheDig18">{{cite journal |title=The digitization of biology: Understanding the new risks and implications for governance |journal=Emergence & Convergence |author=Bajema, N.E.; DiEuliis, D.; Lutes, C.; Lim, Y.-B. |page=3 |year=2018 |url=https://wmdcenter.ndu.edu/Media/News/Article/1569559/the-digitization-of-biology-understanding-the-new-risks-and-implications-for-go/}}</ref><ref name="OlenaBringing18">{{cite web |url=https://www.the-scientist.com/bio-business/bringing-the-internet-of-things-into-the-lab-64265 |title=Bringing the Internet of Things into the Lab |author=Olena, A. |work=The Scientist |date=01 June 2018}}</ref>; (b) increased use of automation in life-science laboratories<ref name="ChapmanLab03">{{cite journal |title=Lab automation and robotics: Automation on the move |journal=Nature |author=Chapman, T. |volume=421 |issue=6923 |pages=661, 663, 665–6 |year=2003 |doi=10.1038/421661a |pmid=12571603}}</ref>; (c) application of the “design-build-test” paradigm to create new biological organisms<ref name="AgapakisDesign14">{{cite journal |title=Designing synthetic biology |journal=ACS Synthetic Biology |author=Agapakis, C.M. |volume=3 |issue=3 |pages=121–8 |year=2014 |doi=10.1021/sb4001068 |pmid=24156739}}</ref><ref name="CarbonellAnAuto18">{{cite journal |title=An automated Design-Build-Test-Learn pipeline for enhanced microbial production of fine chemicals |journal=Communications Biology |author=Carbonell, P.; Jervis, A.J.; Robinson, C.J. et al. |volume=1 |pages=66 |year=2018 |doi=10.1038/s42003-018-0076-9 |pmid=30271948 |pmc=PMC6123781}}</ref>; (d) increased generation, analyses, and computational modeling of information about biological systems, cells, and molecules<ref name="ThurowLab04">{{cite journal |title=Laboratory Information Management Systems for Life Science Applications |journal=Organic Process Researh & Development |author=Thurow, K.; Göde, B.; Dingerdissen, U. Stoll, N. |volume=8 |issue=6 |pages=970–982 |year=2004 |doi=10.1021/op040017s}}</ref><ref name="WalpoleMulti13">{{cite journal |title=Multiscale computational models of complex biological systems |journal=Annual Review of Biomedical Engineering |author=Walpole, J.; Papin, J.A.; Peirce, S.M. |volume=15 |pages=137–54 |year=2013 |doi=10.1146/annurev-bioeng-071811-150104 |pmid=23642247 |pmc=PMC3970111}}</ref>; (e) treatment of organisms and DNA as materials rather than phenomena to study<ref name="ServiceDNA17">{{cite web |url=https://www.sciencemag.org/news/2017/03/dna-could-store-all-worlds-data-one-room |title=DNA could store all of the world's data in one room |author=Service, R.F. |work=Science |date=02 March 2017 |doi=10.1126/science.aal0852}}</ref><ref name="AndersonSynth18">{{cite journal |title=Synthetic biology strategies for improving microbial synthesis of "green" biopolymers |journal=Journal of Biological Chemistry |author=Anderson, L.A.; Islam, M.A.; Prather, K.L.J. |volume=293 |issue=14 |pages=5053-5061 |year=2018 |doi=10.1074/jbc.TM117.000368 |pmid=29339554 |pmc=PMC5892568}}</ref><ref name="PatelDNA18">{{cite web |url=https://spectrum.ieee.org/the-human-os/biomedical/devices/dna-data-storage-gets-random-access |title=DNA Data Storage Gets Random Access |work=IEEE Spectrum |author=Patel, P. |date=20 February 2018}}</ref>; and (f) new funders such as venture capital, crowdfunding platforms, and foreign companies and governments.<ref name="vonKroghTheChang12">{{cite journal |title=The changing face of corporate venturing in biotechnology |journal=Nature Biotechnology |author=von Krogh, G.; Battistini, B.; Pachidou, F.; Baschera, P. |volume=30 |issue=10 |pages=911–5 |year=2012 |doi=10.1038/nbt.2383 |pmid=23051802}}</ref><ref name="ChaCrowd15">{{cite web |url=https://www.washingtonpost.com/national/health-science/crowdfunding-propels-scientific-research/2015/01/18/c1937690-9758-11e4-8005-1924ede3e54a_story.html?utm_term=.734eb498edb5 |title=Crowdfunding propels scientific research |author=Cha, A.E. |work=The Washington Post |date=18 January 2015}}</ref><ref name="MervisData17">{{cite web |url=https://www.sciencemag.org/news/2017/03/data-check-us-government-share-basic-research-funding-falls-below-50 |title=Data check: U.S. government share of basic research funding falls below 50% |author=Mervis, J. |work=Science |date=09 March 2017 |doi=10.1126/science.aal0890}}</ref> These changes have transformed the scientific, agricultural, and health communities' ability to understand and manipulate the world around them. In addition, the changes have enabled an influx of new practitioners and problem-solvers into biology, providing opportunities for education and research all over the world.
Biotechnology harnesses the capabilities of computer, data, and engineering sciences to establish and advance new fields such as synthetic biology, precision medicine, precision agriculture, and systems biology. Cloud-based platforms and open-source, easy-to-use software enable scientists from anywhere in the world to use advanced data analytics in their studies. The software and hardware emerging from these fields improve our collective understanding of molecular and systems-level genetics, new drug therapies for longer and better quality of life, and design of novel and/or unnatural organisms. Critical to these pursuits is the sharing of research results and underlying data, without which societal decision-making about human, animal, plant, and environmental health cannot be realized fully. However, during the past two decades, concerns about data sharing have been raised, resulting in the issuance of international, regional, and national-level policies governing access to different types of data, including biological data. In addition, the platforms through which data are stored, transported, and analyzed may be vulnerable to unauthorized acquisition of information by malicious actors, which could lead to significant economic and physical harms to the health, safety, and security of a population. Although not considered “dual use life sciences research of concern,”<ref name="USGovLifeSciences12">{{cite web |url=http://www.phe.gov/s3/dualuse/Documents/us-policy-durc-032812.pdf |format=PDF |title=United States Government Policy for Oversight of Life Sciences Dual Use Research of Concern |author=U.S. Government |date=March 2012}}</ref><ref name="USGovPolicy14">{{cite web |url=http://www.phe.gov/s3/dualuse/Documents/durc-policy.pdf |format=PDF |title=United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern |author=U.S. Government |date=September 2014}}</ref> the potential for both benefit and risk to humanity meets the spirit of the dual use concept.<ref name="NRCBio04">{{cite book |url=https://www.nap.edu/catalog/10827/biotechnology-research-in-an-age-of-terrorism |title=Biotechnology Research in an Age of Terrorism |author=National Research Council |publisher=National Academies Press |year=2004 |doi=10.17226/10827 |isbn=9780309166874}}</ref> Given the significant benefits afforded by data sharing and analysis, this paper highlights current data protection policies, potential risks of data exploitation by malicious actors, and potential strategies to mitigate those risks and promote rapid recovery in biotechnology fields that are breached.
The interconnectedness between the digital and biological worlds can be exploited by state actors, malicious nonstate actors, and hackers through a variety of means, resulting in harmful consequences from potential theft of information, promulgation of incorrect information, and/or disruption of activities.<ref name="LordTheReal17">{{cite web |url=https://www.forbes.com/sites/forbestechcouncil/2017/12/15/the-real-threat-of-identity-theft-is-in-your-medical-records-not-credit-cards/#445711491b59 |title=The Real Threat Of Identity Theft Is In Your Medical Records, Not Credit Cards |author=Lord, R.; Forbes Technology Council |work=Forbes |date=15 December 2017}}</ref><ref name="SouzaLessons18">{{cite journal |title=Lessons for Pharma from the Merck Cyber Attack |journal=PharmExec.com |author=Souza, C. |volume=38 |issue=12 |date=10 December 2018 |url=http://www.pharmexec.com/lessons-pharma-merck-cyber-attack |accessdate=21 January 2019}}</ref><ref name="WardISIS18">{{cite web |url=https://www.rand.org/blog/2018/12/isiss-use-of-social-media-still-poses-a-threat-to-stability.html |title=SIS's Use of Social Media Still Poses a Threat to Stability in the Middle East and Africa |author=Ward, A. |work=The RAND Blog |date=11 December 2018 |accessdate=21 January 2019}}</ref> For example, theft of proprietary information from a pharmaceutical or biotechnology company may reveal trade secrets and allow competitors to develop superior products and/or bring existing products to market more quickly<ref name="FriedmanCyber13">{{cite web |url=https://www.brookings.edu/research/cyber-theft-of-competitive-data-asking-the-right-questions/ |title=Cyber Theft of Competitive Data: Asking the Right Questions |author=Friedman, A.A. |work=Brookings |publisher=The Brookings Institution |date=25 September 2013}}</ref>, stifling innovation in the global commercial market and allowing adversaries to create harmful, untested therapies. Another example is theft of hundreds of millions of [[Electronic health record|electronic healthcare records]], the uses of which are not clear.<ref name="BogleHeath18">{{cite web |url=https://www.abc.net.au/news/science/2018-04-18/healthcare-target-for-hackers-experts-warn/9663304 |title=Healthcare data a growing target for hackers, cybersecurity experts warn |author=Bogle, A. |work=ABC.net.au |date=07 June 2018 |accessdate=23 November 2018}}</ref><ref name="CohenMassive18">{{cite web |url=https://www.sciencemag.org/news/2018/03/massive-cyber-hack-iran-allegedly-stole-research-320-universities-governments-and |title=Massive cyberhack by Iran allegedly stole research from 320 universities, governments, and companies |author=Cohen, J. |work=Science |date=23 March 2018 |doi=10.1126/science.aat6849}}</ref><ref name="HITTheBig18">{{cite web |url=https://www.healthcareitnews.com/projects/biggest-healthcare-data-breaches-2018-so-far |title=The biggest healthcare data breaches of 2018 (so far) |author=Healthcare IT News Staff |work=Healthcare IT News |date=2018 |accessdate=23 November 2018}}</ref><ref name="HuangChina18">{{cite web |url=https://www.defenseone.com/threats/2018/10/china-secretly-enrolling-military-scientists-western-universities/152383/ |title=China Is Secretly Enrolling Military Scientists in Western Universities |work=Defense One |author=Huang, E.; Steger, I. |date=29 October 2018 |accessdate=23 November 2018}}</ref><ref name="KeownSecond18">{{cite web |url=https://www.biospace.com/article/-jc1n-second-scientist-pleads-guilty-to-stealing-glaxosmithkline-trade-secrets/ |title=Second Scientist Pleads Guilty to Stealing GlaxoSmithKline Trade Secrets |author=Keown, A. |work=BioSpace |date=18 September 2018 |accessdate=23 November 2018}}</ref> Although unauthorized access to protected data may be aided by technical vulnerabilities in networked computer systems, poor security practices, insider threats in academia, industry, and health facilities, and legal business dealings also can enable adversary access to such data.<ref name="LynchBio17">{{cite web |url=https://www.ft.com/content/245a7c60-6880-11e7-9a66-93fb352ba1fe |title=Biotechnology: the US-China Dispute over Genentic Data |author=Lynch, D.J. |work=Financial Times |date=2017 |accessdate=23 November 2018}}</ref><ref name="RappeportInNew18">{{cite web |url=https://www.nytimes.com/2018/10/10/business/us-china-investment-cfius.html |title=In New Slap at China, U.S. Expands Power to Block Foreign Investments |author=Rappeport, A. |work=The New York Times |date=10 October 2018 |accessdate=23 November 2018}}</ref><ref name="BloombergChinese18">{{cite web |url=https://www.scmp.com/business/global-economy/article/2142351/chinese-funds-pour-us14b-us-biotechnology-firms-first-three |title=Chinese funds pour US$1.4b into US biotechnology firms in the first three months of the year |author=Bloomberg News |work=South China Morning Post |date=19 April 2018 |accessdate=23 November 2018}}</ref><ref name="RespautAsChina18">{{cite web |url=https://www.reuters.com/article/us-biotech-china-investment/as-china-builds-biotech-sector-cash-floods-u-s-startups-idUSKCN1M400G |title=As China builds biotech sector, cash floods U.S. startups |author=Respaut, R.; Zhu, J. |work=Reuters |date=23 September 2018 |accessdate=23 November 2018}}</ref> For examples, more than half of all data breaches at healthcare facilities are caused by healthcare personnel errors, a quarter of which resulted in unauthorized access to or disclosure of patient records through sharing of unencrypted information, sending information to the wrong patients, and accessing the data without authorization.
(Bai et al., 2017; Michigan State University, 2018) In addition, the Federal Bureau of Investigation (FBI) has raised national security concerns about foreign access to genomic data of U.S. citizens through legitimate scientific collaboration, funding of scientific research, investment in genomic sequencing companies (e.g., China-based WuXi Healthcare Ventures investment in the U.S.-based 23andMe (Biospace, 2015; Mui, 2016)), and purchase of companies (e.g., Complete Genomics) (Baker, 2012; GenomeWeb, 2012). As vulnerabilities are created through scientific advances, such as the use of machine learning algorithms to trick fingerprint authentication systems, new risks are identified (Bontrager et al., 2018; Nyu Tandon School of Engineering, 2018). Some of these concerns have resulted in the passage of the 2018 Foreign Investment Risk Review Modernization Act, which has initiated reform of the U.S. Government process for evaluating foreign investment in U.S. entities and export control of emerging technologies. (Rappeport, 2018; U.S. Congress, 2018) Yet, these policy activities largely are reactive, rather than proactive.





Revision as of 22:11, 20 May 2019

Full article title National and transnational security implications of asymmetric access to and use of biological data
Journal Frontiers in Bioengineering and Biotechnology
Author(s) Berger, Kavita M.; Schneck, Phyllis A.
Author affiliation(s) Gryphon Scientific, LLC; Promontory Financial Group, an IBM Company
Primary contact Email: kberger at gryphonscientific dot com
Editors Murch, Randall S.
Year published 2019
Volume and issue 7
Page(s) 21
DOI 10.3389/fbioe.2019.00021
ISSN 2296-4185
Distribution license Creative Commons Attribution 4.0 International
Website https://www.frontiersin.org/articles/10.3389/fbioe.2019.00021/full
Download https://www.frontiersin.org/articles/10.3389/fbioe.2019.00021/pdf (PDF)

Abstract

Biology and biotechnology have changed dramatically during the past 20 years, in part because of increases in computational capabilities and use of engineering principles to study biology. The advances in supercomputing, data storage capacity, and cloud platforms enable scientists throughout the world to generate, analyze, share, and store vast amounts of data, some of which are biological and much of which may be used to understand the human condition, agricultural systems, evolution, and environmental ecosystems. These advances and applications have enabled: (1) the emergence of data science, which involves the development of new algorithms to analyze and visualize data; and (2) the use of engineering approaches to manipulate or create new biological organisms that have specific functions, such as production of industrial chemical precursors and development of environmental bio-based sensors. Several biological sciences fields harness the capabilities of computer, data, and engineering sciences, including synthetic biology, precision medicine, precision agriculture, and systems biology. These advances and applications are not limited to one country. This capability has economic and physical consequences but is vulnerable to unauthorized intervention. Healthcare and genomic information of patients, information about pharmaceutical and biotechnology products in development, and results of scientific research have been stolen by state and non-state actors through infiltration of databases and computer systems containing this information. Countries have developed their own policies for governing data generation, access, and sharing with foreign entities, resulting in asymmetry of data sharing. This paper describes security implications of asymmetric access to and use of biological data.

Keywords: biotechnology, cybersecurity, information security, data vulnerability, biological data, biosecurity, data access, data protection

Introduction

Advances in computer science, engineering, and data science have changed research, development, and application of biology and biotechnology in the United States and internationally. Examples of changes include: (a) increased reliance on internet connectivity for research and laboratory operations[1][2][3]; (b) increased use of automation in life-science laboratories[4]; (c) application of the “design-build-test” paradigm to create new biological organisms[5][6]; (d) increased generation, analyses, and computational modeling of information about biological systems, cells, and molecules[7][8]; (e) treatment of organisms and DNA as materials rather than phenomena to study[9][10][11]; and (f) new funders such as venture capital, crowdfunding platforms, and foreign companies and governments.[12][13][14] These changes have transformed the scientific, agricultural, and health communities' ability to understand and manipulate the world around them. In addition, the changes have enabled an influx of new practitioners and problem-solvers into biology, providing opportunities for education and research all over the world.

Biotechnology harnesses the capabilities of computer, data, and engineering sciences to establish and advance new fields such as synthetic biology, precision medicine, precision agriculture, and systems biology. Cloud-based platforms and open-source, easy-to-use software enable scientists from anywhere in the world to use advanced data analytics in their studies. The software and hardware emerging from these fields improve our collective understanding of molecular and systems-level genetics, new drug therapies for longer and better quality of life, and design of novel and/or unnatural organisms. Critical to these pursuits is the sharing of research results and underlying data, without which societal decision-making about human, animal, plant, and environmental health cannot be realized fully. However, during the past two decades, concerns about data sharing have been raised, resulting in the issuance of international, regional, and national-level policies governing access to different types of data, including biological data. In addition, the platforms through which data are stored, transported, and analyzed may be vulnerable to unauthorized acquisition of information by malicious actors, which could lead to significant economic and physical harms to the health, safety, and security of a population. Although not considered “dual use life sciences research of concern,”[15][16] the potential for both benefit and risk to humanity meets the spirit of the dual use concept.[17] Given the significant benefits afforded by data sharing and analysis, this paper highlights current data protection policies, potential risks of data exploitation by malicious actors, and potential strategies to mitigate those risks and promote rapid recovery in biotechnology fields that are breached.

The interconnectedness between the digital and biological worlds can be exploited by state actors, malicious nonstate actors, and hackers through a variety of means, resulting in harmful consequences from potential theft of information, promulgation of incorrect information, and/or disruption of activities.[18][19][20] For example, theft of proprietary information from a pharmaceutical or biotechnology company may reveal trade secrets and allow competitors to develop superior products and/or bring existing products to market more quickly[21], stifling innovation in the global commercial market and allowing adversaries to create harmful, untested therapies. Another example is theft of hundreds of millions of electronic healthcare records, the uses of which are not clear.[22][23][24][25][26] Although unauthorized access to protected data may be aided by technical vulnerabilities in networked computer systems, poor security practices, insider threats in academia, industry, and health facilities, and legal business dealings also can enable adversary access to such data.[27][28][29][30] For examples, more than half of all data breaches at healthcare facilities are caused by healthcare personnel errors, a quarter of which resulted in unauthorized access to or disclosure of patient records through sharing of unencrypted information, sending information to the wrong patients, and accessing the data without authorization.

(Bai et al., 2017; Michigan State University, 2018) In addition, the Federal Bureau of Investigation (FBI) has raised national security concerns about foreign access to genomic data of U.S. citizens through legitimate scientific collaboration, funding of scientific research, investment in genomic sequencing companies (e.g., China-based WuXi Healthcare Ventures investment in the U.S.-based 23andMe (Biospace, 2015; Mui, 2016)), and purchase of companies (e.g., Complete Genomics) (Baker, 2012; GenomeWeb, 2012). As vulnerabilities are created through scientific advances, such as the use of machine learning algorithms to trick fingerprint authentication systems, new risks are identified (Bontrager et al., 2018; Nyu Tandon School of Engineering, 2018). Some of these concerns have resulted in the passage of the 2018 Foreign Investment Risk Review Modernization Act, which has initiated reform of the U.S. Government process for evaluating foreign investment in U.S. entities and export control of emerging technologies. (Rappeport, 2018; U.S. Congress, 2018) Yet, these policy activities largely are reactive, rather than proactive.


References

  1. Accenture (2015). "The Future of Applications in Life Sciences" (PDF). Accenture. https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_20/Accenture-15-1429U-FutureOfApps-LSCS-v5-web.pdf. 
  2. Bajema, N.E.; DiEuliis, D.; Lutes, C.; Lim, Y.-B. (2018). "The digitization of biology: Understanding the new risks and implications for governance". Emergence & Convergence: 3. https://wmdcenter.ndu.edu/Media/News/Article/1569559/the-digitization-of-biology-understanding-the-new-risks-and-implications-for-go/. 
  3. Olena, A. (1 June 2018). "Bringing the Internet of Things into the Lab". The Scientist. https://www.the-scientist.com/bio-business/bringing-the-internet-of-things-into-the-lab-64265. 
  4. Chapman, T. (2003). "Lab automation and robotics: Automation on the move". Nature 421 (6923): 661, 663, 665–6. doi:10.1038/421661a. PMID 12571603. 
  5. Agapakis, C.M. (2014). "Designing synthetic biology". ACS Synthetic Biology 3 (3): 121–8. doi:10.1021/sb4001068. PMID 24156739. 
  6. Carbonell, P.; Jervis, A.J.; Robinson, C.J. et al. (2018). "An automated Design-Build-Test-Learn pipeline for enhanced microbial production of fine chemicals". Communications Biology 1: 66. doi:10.1038/s42003-018-0076-9. PMC PMC6123781. PMID 30271948. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6123781. 
  7. Thurow, K.; Göde, B.; Dingerdissen, U. Stoll, N. (2004). "Laboratory Information Management Systems for Life Science Applications". Organic Process Researh & Development 8 (6): 970–982. doi:10.1021/op040017s. 
  8. Walpole, J.; Papin, J.A.; Peirce, S.M. (2013). "Multiscale computational models of complex biological systems". Annual Review of Biomedical Engineering 15: 137–54. doi:10.1146/annurev-bioeng-071811-150104. PMC PMC3970111. PMID 23642247. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3970111. 
  9. Service, R.F. (2 March 2017). "DNA could store all of the world's data in one room". Science. doi:10.1126/science.aal0852. https://www.sciencemag.org/news/2017/03/dna-could-store-all-worlds-data-one-room. 
  10. Anderson, L.A.; Islam, M.A.; Prather, K.L.J. (2018). "Synthetic biology strategies for improving microbial synthesis of "green" biopolymers". Journal of Biological Chemistry 293 (14): 5053-5061. doi:10.1074/jbc.TM117.000368. PMC PMC5892568. PMID 29339554. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5892568. 
  11. Patel, P. (20 February 2018). "DNA Data Storage Gets Random Access". IEEE Spectrum. https://spectrum.ieee.org/the-human-os/biomedical/devices/dna-data-storage-gets-random-access. 
  12. von Krogh, G.; Battistini, B.; Pachidou, F.; Baschera, P. (2012). "The changing face of corporate venturing in biotechnology". Nature Biotechnology 30 (10): 911–5. doi:10.1038/nbt.2383. PMID 23051802. 
  13. Cha, A.E. (18 January 2015). "Crowdfunding propels scientific research". The Washington Post. https://www.washingtonpost.com/national/health-science/crowdfunding-propels-scientific-research/2015/01/18/c1937690-9758-11e4-8005-1924ede3e54a_story.html?utm_term=.734eb498edb5. 
  14. Mervis, J. (9 March 2017). "Data check: U.S. government share of basic research funding falls below 50%". Science. doi:10.1126/science.aal0890. https://www.sciencemag.org/news/2017/03/data-check-us-government-share-basic-research-funding-falls-below-50. 
  15. U.S. Government (March 2012). "United States Government Policy for Oversight of Life Sciences Dual Use Research of Concern" (PDF). http://www.phe.gov/s3/dualuse/Documents/us-policy-durc-032812.pdf. 
  16. U.S. Government (September 2014). "United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern" (PDF). http://www.phe.gov/s3/dualuse/Documents/durc-policy.pdf. 
  17. National Research Council (2004). Biotechnology Research in an Age of Terrorism. National Academies Press. doi:10.17226/10827. ISBN 9780309166874. https://www.nap.edu/catalog/10827/biotechnology-research-in-an-age-of-terrorism. 
  18. Lord, R.; Forbes Technology Council (15 December 2017). "The Real Threat Of Identity Theft Is In Your Medical Records, Not Credit Cards". Forbes. https://www.forbes.com/sites/forbestechcouncil/2017/12/15/the-real-threat-of-identity-theft-is-in-your-medical-records-not-credit-cards/#445711491b59. 
  19. Souza, C. (10 December 2018). "Lessons for Pharma from the Merck Cyber Attack". PharmExec.com 38 (12). http://www.pharmexec.com/lessons-pharma-merck-cyber-attack. Retrieved 21 January 2019. 
  20. Ward, A. (11 December 2018). "SIS's Use of Social Media Still Poses a Threat to Stability in the Middle East and Africa". The RAND Blog. https://www.rand.org/blog/2018/12/isiss-use-of-social-media-still-poses-a-threat-to-stability.html. Retrieved 21 January 2019. 
  21. Friedman, A.A. (25 September 2013). "Cyber Theft of Competitive Data: Asking the Right Questions". Brookings. The Brookings Institution. https://www.brookings.edu/research/cyber-theft-of-competitive-data-asking-the-right-questions/. 
  22. Bogle, A. (7 June 2018). "Healthcare data a growing target for hackers, cybersecurity experts warn". ABC.net.au. https://www.abc.net.au/news/science/2018-04-18/healthcare-target-for-hackers-experts-warn/9663304. Retrieved 23 November 2018. 
  23. Cohen, J. (23 March 2018). "Massive cyberhack by Iran allegedly stole research from 320 universities, governments, and companies". Science. doi:10.1126/science.aat6849. https://www.sciencemag.org/news/2018/03/massive-cyber-hack-iran-allegedly-stole-research-320-universities-governments-and. 
  24. Healthcare IT News Staff (2018). "The biggest healthcare data breaches of 2018 (so far)". Healthcare IT News. https://www.healthcareitnews.com/projects/biggest-healthcare-data-breaches-2018-so-far. Retrieved 23 November 2018. 
  25. Huang, E.; Steger, I. (29 October 2018). "China Is Secretly Enrolling Military Scientists in Western Universities". Defense One. https://www.defenseone.com/threats/2018/10/china-secretly-enrolling-military-scientists-western-universities/152383/. Retrieved 23 November 2018. 
  26. Keown, A. (18 September 2018). "Second Scientist Pleads Guilty to Stealing GlaxoSmithKline Trade Secrets". BioSpace. https://www.biospace.com/article/-jc1n-second-scientist-pleads-guilty-to-stealing-glaxosmithkline-trade-secrets/. Retrieved 23 November 2018. 
  27. Lynch, D.J. (2017). "Biotechnology: the US-China Dispute over Genentic Data". Financial Times. https://www.ft.com/content/245a7c60-6880-11e7-9a66-93fb352ba1fe. Retrieved 23 November 2018. 
  28. Rappeport, A. (10 October 2018). "In New Slap at China, U.S. Expands Power to Block Foreign Investments". The New York Times. https://www.nytimes.com/2018/10/10/business/us-china-investment-cfius.html. Retrieved 23 November 2018. 
  29. Bloomberg News (19 April 2018). "Chinese funds pour US$1.4b into US biotechnology firms in the first three months of the year". South China Morning Post. https://www.scmp.com/business/global-economy/article/2142351/chinese-funds-pour-us14b-us-biotechnology-firms-first-three. Retrieved 23 November 2018. 
  30. Respaut, R.; Zhu, J. (23 September 2018). "As China builds biotech sector, cash floods U.S. startups". Reuters. https://www.reuters.com/article/us-biotech-china-investment/as-china-builds-biotech-sector-cash-floods-u-s-startups-idUSKCN1M400G. Retrieved 23 November 2018. 

Notes

This presentation is faithful to the original, with only a few minor changes to presentation, grammar, and punctuation. In some cases important information was missing from the references, and that information was added.