{"id":4234,"date":"2015-08-16T05:03:01","date_gmt":"2015-08-16T05:03:01","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=4234"},"modified":"2015-08-16T05:03:01","modified_gmt":"2015-08-16T05:03:01","slug":"researchers-carefully-protect-dangerous-pathogens-but","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/researchers-carefully-protect-dangerous-pathogens-but\/","title":{"rendered":"Researchers carefully protect dangerous pathogens \u2013 but&#8230;"},"content":{"rendered":"<h1>Researchers carefully protect dangerous pathogens \u2013 but how secure are all their data?<\/h1>\n<p><span><a href=\"http:\/\/theconversation.com\/profiles\/carole-baskin-178726\">Carole Baskin<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/saint-louis-university\">Saint Louis University<\/a><\/em><\/span><\/p>\n<p>Ebola, smallpox, anthrax and many others: the most dangerous microorganisms are strictly <a href=\"http:\/\/www.selectagents.gov\/regulations.html\">regulated<\/a> in the United States. The federal government oversees use of 65 so-called <a href=\"http:\/\/www.selectagents.gov\/SelectAgentsandToxinsList.html\">select agents<\/a> with \u201cthe potential to pose a severe threat to public, animal or plant health, or to animal or plant products.\u201d Before scientists can work with them to learn more, find cures or create vaccines, they must meet a long list of conditions. The goal is to keep deadly infectious agents safely under lock and key, where they can\u2019t threaten the general population or fall into the wrong hands.<\/p>\n<p>But even the most physically secure research lab could be the site of a devastating data security breach. As they stand now, <a href=\"http:\/\/www.selectagents.gov\/resources\/Information_Systems_Security_Control_Guidance_version_3_English.pdf\">information security guidelines<\/a> published by science regulators with regard to select agents lack the critical level of detail needed to protect data effectively.<\/p>\n<p>There has <a href=\"https:\/\/www.ctc.usma.edu\/posts\/bioterrorism-still-a-threat-to-the-united-states\">never been as much research<\/a> performed with these pathogens as in the past decade. The sprawl of high containment laboratories has led to a parallel increase in individuals with access to these agents. As of January 2015, <a href=\"http:\/\/www.selectagents.gov\/about.html\">approximately 11,000 individuals<\/a> were on the list.<\/p>\n<p>As the amount of research done on these deadly microorganisms continues to grow, the scientific community needs to wise up about information security threats and toughen up its defenses. The stakes are high. The goal is to avoid a data security breach that could, for instance, provide bioterrorists with information they could use to make already dangerous agents even more so.<\/p>\n<p><figure class=\"align-center zoomable\">\n        <a href=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91823\/area14mp\/image-20150813-21425-1u1z7lg.jpg\"><img alt=\"\" src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91823\/width668\/image-20150813-21425-1u1z7lg.jpg\"><\/a><figcaption>\n          <span class=\"caption\">Virus researchers know how to protect themselves and their samples.<\/span><br \/>\n          <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.flickr.com\/photos\/unmeer\/16268639330\">UNMEER<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/span><br \/>\n        <\/figcaption><\/figure>\n<\/p>\n<h2>Physically securing dangerous pathogens<\/h2>\n<p>The government has mandated strong security measures for people working with deadly microorganisms since 2001, subsequent to the <a href=\"https:\/\/www.fbi.gov\/about-us\/history\/famous-cases\/anthrax-amerithrax\">anthrax events that followed 9\/11<\/a>.<\/p>\n<p>Today, research has to be reviewed internally by a scientist\u2019s institution to assess whether safety precautions are adequate. In some cases, it\u2019s reviewed externally as well by the National Institutes of Health (<a href=\"http:\/\/www.ors.od.nih.gov\/sr\/dohs\/BioSafety\/SA\/Pages\/select_agents.aspx\">NIH<\/a>) (one of the major federal sources of funding for researchers). The NIH takes particular note if potential results could be used for nefarious purposes or if <a href=\"http:\/\/osp.od.nih.gov\/sites\/default\/files\/NIH_Guidelines_0.pdf\">recombined genetic materials<\/a> are to be administered to human beings.<\/p>\n<p>Personnel must pass stringent background checks. Facilities must be inspected for proper containment and physical security. Standard operating procedures must be in place to ensure protection of the agents, scientists, community and environment. All of these precautions are meant to ensure that dangerous pathogens don\u2019t infect anyone and stay safely in the lab.<\/p>\n<p><figure class=\"align-center zoomable\">\n        <a href=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91825\/area14mp\/image-20150813-21425-1l2wgkn.jpg\"><img alt=\"\" src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91825\/width668\/image-20150813-21425-1l2wgkn.jpg\"><\/a><figcaption>\n          <span class=\"caption\">Researchers are used to sharing their science in publications and presentations.<\/span><br \/>\n          <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.flickr.com\/photos\/z0\/5544858239\">tales of a wandering youkai<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/span><br \/>\n        <\/figcaption><\/figure>\n<\/p>\n<h2>Limiting open discussion<\/h2>\n<p>There are also <a href=\"http:\/\/www.phe.gov\/s3\/dualuse\/Documents\/durc-policy.pdf\">policies<\/a> in place that curtail how freely researchers can intentionally share information about their work on these dangerous microorganisms.<\/p>\n<p>Since the implementation of the federal government\u2019s <a href=\"http:\/\/www.phe.gov\/s3\/dualuse\/Documents\/us-policy-durc-032812.pdf\">first Dual Use Research Policy in 2012<\/a>, the notion that some nonclassified research information may need to be withheld has marked a big change from science\u2019s typical culture of openness. Researchers are used to running studies and experiments, then publishing details and results in freely available peer-reviewed journals.<\/p>\n<p>Never before has the US scientific enterprise been as constrained as it currently is. There is even an ongoing moratorium on so-called <a href=\"http:\/\/www.phe.gov\/s3\/dualuse\/documents\/gain-of-function.pdf\">gain-of-function experiments<\/a> that involve certain agents potentially capable of causing a pandemic.<\/p>\n<h2>Information security at least as vulnerable<\/h2>\n<p>Recent <a href=\"http:\/\/doi.org\/10.1038\/nature.2014.15570\">safety lapses by government laboratories<\/a> involving anthrax and H5N1 flu prove that despite all precautions, the system is far from perfect. And the bad news is there might be more to worry about \u2013 even if the microbes remain under lock and key and the researchers aren\u2019t deliberately sharing sensitive findings.<\/p>\n<p>Vulnerabilities in information security can directly affect the physical security of dangerous pathogens. For instance, someone gaining access to a computerized key card system could use that information to enter a restricted area.<\/p>\n<p>So-called \u201c<a href=\"http:\/\/www.phe.gov\/s3\/dualuse\/Documents\/durc-policy.pdf\">dual-use<\/a>\u201d knowledge, which could be used to weaponize some of these agents, is also at risk. In theory, a hacker could gain access to a researcher\u2019s data on how a particular microbe could become more pathogenic: for instance, by increasing its resistance to available therapeutic or prophylactic drugs.<\/p>\n<p>My colleagues and I recently <a href=\"http:\/\/doi.org\/10.1089\/hs.2014.0090\">published an article<\/a> in the journal Health Security describing these kinds of vulnerabilities. It was the result of a unique collaboration. I am an associate professor of environmental and occupational health who specializes in <a href=\"http:\/\/biosecurity.slu.edu\/faculty.html\">biosecurity<\/a>. Nick Lewis came from an information security perspective. And Mark Campbell is a biosafety officer and select agent responsible official at Saint Louis University.<\/p>\n<p>We found that current information security guidelines are inadequate. For instance, government agencies must abide by the Federal Information Security Management Act (<a href=\"http:\/\/www.dhs.gov\/federal-information-security-management-act-fisma\">FISMA<\/a>), which is considered the gold standard for a risk-based approach. Unfortunately, current government-mandated information security around dangerous pathogens does not meet even the lowest standard of the act. One example: FISMA specifies how to configure a firewall in <a href=\"http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r4.pdf\">great detail<\/a>; on the other hand, select agent information security guidelines mention firewalls, but don\u2019t specify how to configure or manage the firewall securely.<\/p>\n<h2>Why isn\u2019t research\u2019s data security cutting-edge?<\/h2>\n<p>Understanding of the threats unique to the academic and research environment is still evolving. There\u2019s very poor communication between the scientific community, the security community and the information technology community.<\/p>\n<p>Scientists themselves are largely uneducated in matters of information security. For instance, many remain unaware that they might be targeted to divulge sensitive information through a variety of stealth tactics. Since advances in science often depend on open communication and sharing data, scientists aren\u2019t trained to be wary of inquiries about their work.<\/p>\n<p>Many also don\u2019t recognize that shared computer systems and laboratory equipment capable of storing or transmitting data \u2013 from microscopes with digital photography capability to freezers that send emails when temperatures are too high \u2013 are sources of vulnerabilities. After all, everything connected to a computer network is at risk, even if it doesn\u2019t look like a computer.<\/p>\n<p><figure class=\"align-center zoomable\">\n        <a href=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91824\/area14mp\/image-20150813-21432-1g81ntr.jpg\"><img alt=\"\" src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/91824\/width668\/image-20150813-21432-1g81ntr.jpg\"><\/a><figcaption>\n          <span class=\"caption\">Most biological researchers don\u2019t have cyber defense on their minds.<\/span><br \/>\n          <span class=\"attribution\"><span class=\"source\">Jim Urquhart\/Reuters<\/span><\/span><br \/>\n        <\/figcaption><\/figure>\n<\/p>\n<h2>How to lock down the information, too<\/h2>\n<p>First (and obviously), the standards required for government agencies by FISMA should be implemented for information related to research with dangerous pathogens. This is a matter of carrying out what the law already calls for.<\/p>\n<p>Secondly, there should be a secure way for research institutions to exchange information about current information security threats, as well as effective strategies to protect scientific data that could be misused. While implementing these measures now is not without monetary and time costs, they would prevent the big security and research expenses that would be incurred after a major security breach and implementation of reactive measures.<\/p>\n<p>Finally, there should be more concrete efforts at effective communication between science, information technology, and security experts, so they may understand each other\u2019s disciplines better. An effective approach could include educational opportunities for individuals who are interested in working at the interface of these very different communities.<\/p>\n<p>My colleagues and I found writing our research paper to be difficult because we were all outside of our comfort zones. Professionals, whether they are life scientists or computer people, do not like to admit that they don\u2019t know or understand something. When we had to ask each other for explanations regarding simple concepts in the others\u2019 fields, it was humbling.<\/p>\n<p>But we have proved it can be done. The cross-disciplinary conversations must continue. Information security concerns are not going away, so we need to awaken to this reality before a major disaster happens.<\/p>\n<p><img loading=\"lazy\" alt=\"The Conversation\" height=\"1\" src=\"https:\/\/counter.theconversation.edu.au\/content\/44391\/count.gif\" width=\"1\" \/><\/p>\n<p><span><a href=\"http:\/\/theconversation.com\/profiles\/carole-baskin-178726\">Carole Baskin<\/a> is Associate Professor of Environmental &amp; Occupational Health at <em><a href=\"http:\/\/theconversation.com\/institutions\/saint-louis-university\">Saint Louis University<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"http:\/\/theconversation.com\/researchers-carefully-protect-dangerous-pathogens-but-how-secure-are-all-their-data-44391\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers carefully protect dangerous pathogens \u2013 but how secure are all their data? Carole Baskin, Saint Louis University Ebola, smallpox, anthrax and many others: the most dangerous microorganisms are strictly regulated in the United States. The federal government oversees use of 65 so-called select agents with \u201cthe potential to pose a severe threat to public, [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":4235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[150,209,193,240],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4234"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=4234"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4234\/revisions"}],"predecessor-version":[{"id":4236,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4234\/revisions\/4236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/4235"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=4234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=4234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=4234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}