Difference between revisions of "Journal:Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy"

From LIMSWiki
Jump to navigationJump to search
(Saving and adding more.)
(Saving and adding more.)
Line 37: Line 37:
Simply stated, since its inception, biosecurity has been primarily focused on reducing the risks associated with the misuse of science which could cause harm to humans, animals, plants, and the environment through the creation, production, and deliberate or accidental release of infectious disease agents or their byproducts (e.g., toxins). Cybersecurity has been a separate field which has been primarily focused on the security of information technology systems, from personal computers and communications devices to large infrastructures and networks. Up until just the past few years, the “cyber” overlaps with biosecurity have not been realized or fleshed out. The important interrelationship between biosecurity and cybersecurity is gaining increasing attention. We posit that the two must work collaboratively and will not be effective working separately. Cyberbiosecurity actually started with thinking about a particular set of problems being confronted by the life sciences. As a result of our recent work, described below, other dimensions are being added. Establishing a unifying discipline, crafting its systematics, and identifying an evolutionary path forward are within reach.
Simply stated, since its inception, biosecurity has been primarily focused on reducing the risks associated with the misuse of science which could cause harm to humans, animals, plants, and the environment through the creation, production, and deliberate or accidental release of infectious disease agents or their byproducts (e.g., toxins). Cybersecurity has been a separate field which has been primarily focused on the security of information technology systems, from personal computers and communications devices to large infrastructures and networks. Up until just the past few years, the “cyber” overlaps with biosecurity have not been realized or fleshed out. The important interrelationship between biosecurity and cybersecurity is gaining increasing attention. We posit that the two must work collaboratively and will not be effective working separately. Cyberbiosecurity actually started with thinking about a particular set of problems being confronted by the life sciences. As a result of our recent work, described below, other dimensions are being added. Establishing a unifying discipline, crafting its systematics, and identifying an evolutionary path forward are within reach.


The economic strength and growth of the United States have been due to a culture and environment that foster innovation. Those developments could not be possible without significant contributions by science and engineering. The intersection among economic growth and the biological sciences contributions—the bioeconomy—has recently been recognized as an important component of national security. For the U.S., the bioeconomy accounts for an estimated $4 trillion annually, nearly 25% of the GDP. That contribution ranges from pharmaceuticals to renewable energy, from environmental remediation to public health resilience, and from agriculture to emerging disease response. As part of the U.S. national security architecture, “safeguarding the sciences” is a priority. In doing so, the U.S. Federal Bureau of Investigation (FBI) and other federal agencies also fulfill the U.S. obligation to the Biological Toxins and Weapons Convention (BTWC) and compliance to the United Nations Security Council Resolution (UNSCR) 1540, preventing the misuse of biological material, technology, and expertise, and encouraging the enforcement of the related statutes. The FBI also sponsors and actively engages the International Genetically Engineered Machine (iGEM) competition to inculcate a culture of security among international students, who will become leaders of research, industry, and policymaking. At the same time, the FBI works with U.S. policymakers<ref name="YouSafe17">{{cite web |url=https://www.ehidc.org/sites/default/files/resources/files/Ed_You_Testimony_USCC.pdf |format=PDF |title=Safeguarding the Bioeconomy: U.S. Opportunities and Challenges - Testimony for the U.S.-China Economic and Security Review Commission |author=You, E.H. |date=16 March 2017}}</ref> to redefine the scope of the biosecurity spectrum for the twenty-first century, a century with an unprecedented pace of biological research and innovation, and the use of diverse and large datasets (big data) to assist global scientific and societal priorities and opportunities. Concomitant to both realized and future benefits and growth, the life sciences are becoming increasingly digitized—while at the same time intellectual property protection, cyber intrusion, and the protection of personal medical and genomic information becoming more important—and the impacts on science, trade, and commerce loom large. Engagements with the science media<ref name="KozminskiBio15" /> and testimonies<ref name="YouSafe17" /> have raised these issues to advance both U.S. competitiveness and national security.
The economic strength and growth of the United States have been due to a culture and environment that foster innovation. Those developments could not be possible without significant contributions by science and engineering. The intersection among economic growth and the biological sciences contributions—the bioeconomy—has recently been recognized as an important component of national security. For the U.S., the bioeconomy accounts for an estimated $4 trillion annually, nearly 25% of the GDP. That contribution ranges from pharmaceuticals to renewable energy, from environmental remediation to public health resilience, and from agriculture to emerging disease response. As part of the U.S. national security architecture, “safeguarding the sciences” is a priority. In doing so, the U.S. Federal Bureau of Investigation (FBI) and other federal agencies also fulfill the U.S. obligation to the Biological Toxins and Weapons Convention (BTWC) and compliance to the United Nations Security Council Resolution (UNSCR) 1540, preventing the misuse of biological material, technology, and expertise, and encouraging the enforcement of the related statutes. The FBI also sponsors and actively engages the International Genetically Engineered Machine (iGEM) competition to inculcate a culture of security among international students, who will become leaders of research, industry, and policymaking. At the same time, the FBI works with U.S. policymakers<ref name="YouSafe17">{{cite web |url=https://www.ehidc.org/sites/default/files/resources/files/Ed_You_Testimony_USCC.pdf |format=PDF |title=Safeguarding the Bioeconomy: U.S. Opportunities and Challenges - Testimony for the U.S.-China Economic and Security Review Commission |author=You, E.H. |date=16 March 2017}}</ref> to redefine the scope of the biosecurity spectrum for the twenty-first century, a century with an unprecedented pace of biological research and innovation, and the use of diverse and large datasets (big data) to assist global scientific and societal priorities and opportunities. Concomitant to both realized and future benefits and growth, the life sciences are becoming increasingly digitized—while at the same time intellectual property protection, cyber intrusion, and the protection of personal medical and [[Genomics|genomic]] information becoming more important—and the impacts on science, trade, and commerce loom large. Engagements with the science media<ref name="KozminskiBio15" /> and testimonies<ref name="YouSafe17" /> have raised these issues to advance both U.S. competitiveness and national security.
 
In 2014, the American Association for the Advancement of Science (AAAS), FBI, and the United Nations Interregional Crime and Justice Research Institute (UNICRI) published a report entitled “National and Transnational Security Implications of Big Data in the Life Sciences.<ref name="AAASNat14" /> Briefly, this report starts by helping to understand “big data”; massive, diverse data sets that are created, reside, are analyzed in, and move in information ecosystems. For the life sciences, big data refers to datasets including “raw data, combined data, or published data from the health-care system, pharmaceutical industry, genomics and other –omics fields, clinical research, environment, agriculture, and microbiome efforts.” Further, they state that big data also includes analytic technologies and outputs, such as from “data integration, data mining, data fusion, image and speech recognition, natural language processing, machine learning, social media analysis, and Bayesian analysis.” A number of areas that have drawn and need attention are pointed out, such as the security of the cyber infrastructure and data repositories, and the privacy and confidentiality of individuals. In our view, their focus on the security risks of big data in the life sciences falls into just two major categories, i.e., inappropriate access to data and analytic technologies through vulnerabilities in the data and cyber infrastructure. As such, the use of big data technologies to integrate current data and enable the design of a harmful biological agent should be revisited and refined. Thanks to this team's efforts, not only do we have a useful topology of big data, the beginnings of a structure for thinking about security implications at the bio-cyber interface (technical, legal, institutional, and individual) and a set of high-level recommendations for a path forward.
 
From 2014 to 2016, three workshops were organized by the U.S. National Academies on behalf of the FBI under the theme of “Safeguarding the Bioeconomy.” The first<ref name="NASEMMeeting14" /> laid the foundation for the next two. Presentations and discussions focused on the security implications of the convergence in the life and chemical sciences with physical, mathematical, computational, engineering, and social and behavioral sciences. In addition to broader contexts, two specific technologies received focus: neuromorphic computing and 3-D bioprinting. The second workshop<ref name="NASEMSafe15" /> introduced a range of new threats to and vulnerabilities of the bioeconomy, which at the time had not received focused consideration with respect to U.S. “competiveness, security, economic growth, and global leadership in research and innovation.” This workshop was built on three major themes: the role of [[informatics]] in the bioeconomy, criminal threats and vulnerabilities in the existing and near-future bioeconomy, and securing and flourishing the bioeconomy for the future. Rapid growth of this sector creates increasing security risks to proprietary materials and informatics, brings about an increase in frequency in industrial espionage and data hacks, and decreases the effectiveness of traditional security measures. Still, alternative and adaptive security measures could be implemented even with the inherent openness of emerging technologies upon which the bioeconomy is dependent. Workshop participants not only provided more detail on the threats and vulnerabilities but also both comprehensive categories and specific approaches that could be taken to address the problems and concerns identified. The third workshop<ref name="NASEMSafe16" /> principally focused on data generation and access with respect to the bioeconomy within several categories of both clinical and non-clinical data, from the perspectives of biosecurity, data policy and regulation, future implications, technology advances, data sovereignty and sharing, cybersecurity, and international implications. Taken together, these events significantly expanded the view of what the emerging discipline of cyberbiosecurity could encompass.
 
Pauwels and her co-authors also raise important concerns and recommendations for the security of biotechnology in cyberspace. In the first, she and Vidyarthi<ref name="PauwelsHow16" /> raise concerns over data breaches of health care [[information]] and what it means for the biotechnology industry. Protecting digital DNA and personal medical information is highlighted, as well as the fact that a then recent U.S. Presidential cybersecurity initiative put significant resources into shoring up cyberinfrastructure. Unfortunately, the need for improvements to protecting the bioeconomy, which is heavily dependent on information systems and infrastructure, was not recognized. The report outlined the implications of not protecting the bioeconomy dimension. Their recommendations were primarily focused on protecting genomic data. In the second report, Pauwels and Dunlap<ref name="PauwelsTheInt17" /> go into more depth framing potential cyber-vulnerabilities for specific types of biotechnologies: genome-editing; DNA assembly, synthesis and printing; portable genomic sequencers; artificial intelligence for understanding biological complexity; autonomous systems and robotics in cloud labs; and lab-on-a-chip and microfluidic technologies, all of which have cyber-physical interfaces. These authors also suggest governance systems and policy recommendations which might be harnessed to address the lab-focused concerns they raise.
 
Other recent publications also highlight the complexity of the enterprise we are terming “cyberbiosecurity” and concerns over security, robustness, and resiliency. These include:
 
* security of personal genomic data when foreign companies purchase all or part of a U.S. company or are contracted for genomic or health care data services, which provides access to sensitive personal information<ref name="PauwelsWho17" />;
* the continuing vulnerability of [[electronic health record]]s<ref name="WeiseMillions15">{{cite web |url=https://www.usatoday.com/story/tech/2015/02/05/anthem-health-care-computer-security-breach/22917635/ |title=Millions of Anthem customers alerted to hack |author=Weise, E. |work=USA Today |date=05 February 2015}}</ref> and health care systems<ref name="HackettUCLA15">{{cite web |url=http://fortune.com/2015/07/17/ucla-health-system-data-breach/ |title=UCLA Health System data breach may affect millions |author=Hackett, R. |work=Fortune |date=17 July 2015}}</ref><ref name="WintonHolly16">{{cite web |url=https://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html |title=Hollywood hospital pays $17,000 in bitcoin to hackers; FBI investigating |author=Winton, R. |work=Los Angeles Times |date=18 February 2016}}</ref><ref name="GriffinNHS17">{{cite web |url=https://www.independent.co.uk/news/uk/home-news/nhs-cyber-attack-hack-hospitals-16-patients-turned-away-wanna-decryptor-a7733196.html |title=NHS hack: Cyber attack takes 16 hospitals offline as patients are turned away |author=Griffin, A. |work=Independent |date=12 May 2017}}</ref>;
* imposing control over DNA sequencing through DNA-encoded malware<ref name="GreenbergBio17">{{cite web |url=https://www.wired.com/story/malware-dna-hack/ |title=Biohackers encoded malware in a strand of DNA |author=Greenberg, A. |work=Wired |date=10 August 2017}}</ref>;
* synthetic biology supply chain vulnerabilities<ref name="FrazarDefining17">{{cite journal |title=Defining the synthetic biology supply chain |journal=Health Security |author=Frazar, S.L.; Hund, G.E.; Bonheyo, G.T. et al. |volume=15 |issue=4 |pages=392-400 |year=2017 |doi=10.1089/hs.2016.0083 |pmid=28767286}}</ref>;
* cybersecurity compromise of large industrial biopharma companies<ref name="CollierMerck17">{{cite web |url=https://www.cyberscoop.com/merck-petya-ransomware-ukraine/ |title=Merck IT systems still crippled in Petya's aftermath |author=Collier, K. |work=CyberScoop |date=30 June 2017}}</ref><ref name="ShabanPharma17">{{cite web |url=https://www.washingtonpost.com/news/the-switch/wp/2017/06/27/pharmaceutical-giant-rocked-by-ransomware-attack |title=Pharmaceutical giant rocked by ransomware attack |author=Shaban, H.; Nakashima, E. |work=The Washington Post |date=27 June 2017}}</ref>; and
* high-level studies which are systematically examining U.S. biodefense programs and capabilities.<ref name="BlueANat15">{{cite web |url=https://www.hudson.org/research/11824-a-national-blueprint-for-biodefense-leadership-and-major-reform-needed-to-optimize-efforts |title=A National Blueprint for Biodefense: Leadership and Major Reform Needed To Optimize Efforts |author=Blue Ribbon Study Panel on Biodefense |publisher=Hudson Institute |date=28 October 2015}}</ref><ref name="CenterEmergence17">{{cite book |title=Emergence and Convergence Deep Dive: the Age of Genomic Data. Technical Executive Summary |author=Center for the Study of Weapons of Mass Destruction |publisher=National Defense University |year=2017}}</ref>
 
The darkweb/darknet<ref name="BeckettTheDark09">{{cite web |url=https://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet |title=The dark side of the internet |author=Beckett, A. |work=The Guardian |date=25 November 2009}}</ref><ref name="InterpolPharma15">{{cite web |url=https://www.gwern.net/docs/sr/2015-interpol-pharmaceuticals.pdf |format=PDF |title=Pharmaceutical Crime on the Darknet |author=INTERPOL |date=24 February 2015}}</ref><ref name="LangewiescheWelcome16">{{cite web |url=https://www.vanityfair.com/news/2016/09/welcome-to-the-dark-net?verso=true |title=Welcome to the dark net, a wilderness where invisible world wars are fought and hackers roam free |author=Langewiesche, W. |work=Vanity Fair |date=11 September 2016}}</ref> could be included as it interfaces with dual use life science endeavors and biopharma research, development, intellectual property, and products, compromising the integrity of critical life science and health cyber-supported technologies and infrastructures. Because of the reliance on [[bioinformatics]], the security of synthetic DNA could also be included, as well.<ref name="AdamStrengths11">{{cite journal |title=Strengths and limitations of the federal guidance on synthetic DNA |journal=Nature Biotechnology |author=Adam, L.; Kozar, M.; Letort, G. et al. |volume=29 |issue=3 |pages=208-10 |year=2011 |doi=10.1038/nbt.1802 |pmid=21390018}}</ref> Clearly, this rapidly expanding galaxy does needs a universally accepted definition, common terms of reference, and defined boundaries and structure for best value, ordered evolution, and impact.
 


==References==
==References==

Revision as of 19:20, 22 April 2019

Full article title Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy
Journal Frontiers in Bioengineering and Biotechnology
Author(s) Murch, Randall S.; So, William K.; Buchholz, Wallace G.; Raman, Sanjay; Peccoud, Jean
Author affiliation(s) Virginia Tech, Federal Bureau of Investigation, University of Nebraska, Colorado State University
Primary contact Email: rmurch at vt dot edu
Editors Berns, Kenneth I.
Year published 2019
Volume and issue 6
Page(s) 39
DOI 10.3389/fbioe.2018.00039
ISSN 2296-4185
Distribution license Creative Commons Attribution 4.0 International
Website https://www.frontiersin.org/articles/10.3389/fbioe.2018.00039/full
Download https://www.frontiersin.org/articles/10.3389/fbioe.2018.00039/pdf (PDF)

Abstract

Cyberbiosecurity is being proposed as a formal new enterprise which encompasses cybersecurity, cyber-physical security, and biosecurity as applied to biological and biomedical-based systems. In recent years, an array of important meetings and public discussions, commentaries, and publications have occurred that highlight numerous vulnerabilities. While necessary first steps, they do not provide a systematized structure for effectively promoting communication, education and training, elucidation, and prioritization for analysis, research, development, testing and evaluation, and implementation of scientific and technological standards of practice, policy, or regulatory or legal considerations for protecting the bioeconomy. Further, experts in biosecurity and cybersecurity are generally not aware of each other's domains, expertise, perspectives, priorities, or where mutually supported opportunities exist for which positive outcomes could result. Creating, promoting, and advancing a new discipline can assist with formal, beneficial, and continuing engagements. Recent key activities and publications that inform the creation of cyberbiosecurity are briefly reviewed, as is the expansion of cyberbiosecurity to include biomanufacturing, which is supported by a rigorous analysis of a biomanufacturing facility. Recommendations are provided to initialize cyberbiosecurity and place it on a trajectory to establish a structured and sustainable discipline, forum, and enterprise.

Keywords: cyberbiosecurity, bioeconomy, biosecurity, biomanufacturing, cybersecurity, cyber-physical security, supply chain

Introduction

We propose “cyberbiosecurity” as an emerging hybridized discipline at the interface of cybersecurity, cyber-physical security, and biosecurity. Initially, we define this term as “understanding the vulnerabilities to unwanted surveillance, intrusions, and malicious and harmful activities which can occur within or at the interfaces of commingled life and medical sciences, cyber, cyber-physical, supply chain, and infrastructure systems, and developing and instituting measures to prevent, protect against, mitigate, investigate, and attribute such threats as it pertains to security, competitiveness, and resilience.” We emphasize this is an initial definition; we fully expect that the definition and the landscape will rapidly evolve, requiring the definition to be revised. We also contend that, because of its diversity and extent, cyberbiosecurity needs its own systematics, so that it can be better communicated, organized, explored, advanced, and implemented. Here, we also posit that cyberbiosecurity contributes to a larger strategic objective of “safeguarding the bioeconomy,”[1] a concept advanced in the U.S. which seeks to increase security and resilience of the bioeconomy to protect its rapidly changing cyber-life science topology.

Thus far, what we are proposing to call cyberbiosecurity has primarily been initiated out of two principal sets of activities. The first set of activities involved a study[2] and three workshops[1][3][4], which were primarily focused on security issues with respect to “big data” and the relationship with the “bioeconomy.” The second set was a first-ever systems analysis of a biomanufacturing facility, which expands the view to include a different “target set” and approach to understanding vulnerabilities with sharp acuity. This tasked study was conducted to comprehensively understand the vulnerabilities with respect to a wide range of unwanted intrusions and nefarious activities in the life science, cyber, cyber-physical, infrastructure, and supply chain aspects, and determine what measures could be taken or developed and implemented to anticipate, detect, identify, prevent, mitigate, respond to, and attribute such potential exploitation. The first published paper on cyberbiosecurity primarily focuses on the security of the biotechnology interface with cyberspace.[5] In addition to the system analysis as part of the second set, a small workshop was held in the U.S. that sought to scope and stimulate interest in the government, academic, corporate, and non-profit sectors, create a core constituency, understand what topics and themes could constitute cyberbiosecurity, identify priorities, and begin to develop a campaign and timeline. The workshop was highly successful. These endeavors, together with additional recent activities and publications[6][7][8][9], have added to scoping the future of cyberbiosecurity yet to come.

Background

Simply stated, since its inception, biosecurity has been primarily focused on reducing the risks associated with the misuse of science which could cause harm to humans, animals, plants, and the environment through the creation, production, and deliberate or accidental release of infectious disease agents or their byproducts (e.g., toxins). Cybersecurity has been a separate field which has been primarily focused on the security of information technology systems, from personal computers and communications devices to large infrastructures and networks. Up until just the past few years, the “cyber” overlaps with biosecurity have not been realized or fleshed out. The important interrelationship between biosecurity and cybersecurity is gaining increasing attention. We posit that the two must work collaboratively and will not be effective working separately. Cyberbiosecurity actually started with thinking about a particular set of problems being confronted by the life sciences. As a result of our recent work, described below, other dimensions are being added. Establishing a unifying discipline, crafting its systematics, and identifying an evolutionary path forward are within reach.

The economic strength and growth of the United States have been due to a culture and environment that foster innovation. Those developments could not be possible without significant contributions by science and engineering. The intersection among economic growth and the biological sciences contributions—the bioeconomy—has recently been recognized as an important component of national security. For the U.S., the bioeconomy accounts for an estimated $4 trillion annually, nearly 25% of the GDP. That contribution ranges from pharmaceuticals to renewable energy, from environmental remediation to public health resilience, and from agriculture to emerging disease response. As part of the U.S. national security architecture, “safeguarding the sciences” is a priority. In doing so, the U.S. Federal Bureau of Investigation (FBI) and other federal agencies also fulfill the U.S. obligation to the Biological Toxins and Weapons Convention (BTWC) and compliance to the United Nations Security Council Resolution (UNSCR) 1540, preventing the misuse of biological material, technology, and expertise, and encouraging the enforcement of the related statutes. The FBI also sponsors and actively engages the International Genetically Engineered Machine (iGEM) competition to inculcate a culture of security among international students, who will become leaders of research, industry, and policymaking. At the same time, the FBI works with U.S. policymakers[10] to redefine the scope of the biosecurity spectrum for the twenty-first century, a century with an unprecedented pace of biological research and innovation, and the use of diverse and large datasets (big data) to assist global scientific and societal priorities and opportunities. Concomitant to both realized and future benefits and growth, the life sciences are becoming increasingly digitized—while at the same time intellectual property protection, cyber intrusion, and the protection of personal medical and genomic information becoming more important—and the impacts on science, trade, and commerce loom large. Engagements with the science media[6] and testimonies[10] have raised these issues to advance both U.S. competitiveness and national security.

In 2014, the American Association for the Advancement of Science (AAAS), FBI, and the United Nations Interregional Crime and Justice Research Institute (UNICRI) published a report entitled “National and Transnational Security Implications of Big Data in the Life Sciences.[2] Briefly, this report starts by helping to understand “big data”; massive, diverse data sets that are created, reside, are analyzed in, and move in information ecosystems. For the life sciences, big data refers to datasets including “raw data, combined data, or published data from the health-care system, pharmaceutical industry, genomics and other –omics fields, clinical research, environment, agriculture, and microbiome efforts.” Further, they state that big data also includes analytic technologies and outputs, such as from “data integration, data mining, data fusion, image and speech recognition, natural language processing, machine learning, social media analysis, and Bayesian analysis.” A number of areas that have drawn and need attention are pointed out, such as the security of the cyber infrastructure and data repositories, and the privacy and confidentiality of individuals. In our view, their focus on the security risks of big data in the life sciences falls into just two major categories, i.e., inappropriate access to data and analytic technologies through vulnerabilities in the data and cyber infrastructure. As such, the use of big data technologies to integrate current data and enable the design of a harmful biological agent should be revisited and refined. Thanks to this team's efforts, not only do we have a useful topology of big data, the beginnings of a structure for thinking about security implications at the bio-cyber interface (technical, legal, institutional, and individual) and a set of high-level recommendations for a path forward.

From 2014 to 2016, three workshops were organized by the U.S. National Academies on behalf of the FBI under the theme of “Safeguarding the Bioeconomy.” The first[1] laid the foundation for the next two. Presentations and discussions focused on the security implications of the convergence in the life and chemical sciences with physical, mathematical, computational, engineering, and social and behavioral sciences. In addition to broader contexts, two specific technologies received focus: neuromorphic computing and 3-D bioprinting. The second workshop[3] introduced a range of new threats to and vulnerabilities of the bioeconomy, which at the time had not received focused consideration with respect to U.S. “competiveness, security, economic growth, and global leadership in research and innovation.” This workshop was built on three major themes: the role of informatics in the bioeconomy, criminal threats and vulnerabilities in the existing and near-future bioeconomy, and securing and flourishing the bioeconomy for the future. Rapid growth of this sector creates increasing security risks to proprietary materials and informatics, brings about an increase in frequency in industrial espionage and data hacks, and decreases the effectiveness of traditional security measures. Still, alternative and adaptive security measures could be implemented even with the inherent openness of emerging technologies upon which the bioeconomy is dependent. Workshop participants not only provided more detail on the threats and vulnerabilities but also both comprehensive categories and specific approaches that could be taken to address the problems and concerns identified. The third workshop[4] principally focused on data generation and access with respect to the bioeconomy within several categories of both clinical and non-clinical data, from the perspectives of biosecurity, data policy and regulation, future implications, technology advances, data sovereignty and sharing, cybersecurity, and international implications. Taken together, these events significantly expanded the view of what the emerging discipline of cyberbiosecurity could encompass.

Pauwels and her co-authors also raise important concerns and recommendations for the security of biotechnology in cyberspace. In the first, she and Vidyarthi[7] raise concerns over data breaches of health care information and what it means for the biotechnology industry. Protecting digital DNA and personal medical information is highlighted, as well as the fact that a then recent U.S. Presidential cybersecurity initiative put significant resources into shoring up cyberinfrastructure. Unfortunately, the need for improvements to protecting the bioeconomy, which is heavily dependent on information systems and infrastructure, was not recognized. The report outlined the implications of not protecting the bioeconomy dimension. Their recommendations were primarily focused on protecting genomic data. In the second report, Pauwels and Dunlap[9] go into more depth framing potential cyber-vulnerabilities for specific types of biotechnologies: genome-editing; DNA assembly, synthesis and printing; portable genomic sequencers; artificial intelligence for understanding biological complexity; autonomous systems and robotics in cloud labs; and lab-on-a-chip and microfluidic technologies, all of which have cyber-physical interfaces. These authors also suggest governance systems and policy recommendations which might be harnessed to address the lab-focused concerns they raise.

Other recent publications also highlight the complexity of the enterprise we are terming “cyberbiosecurity” and concerns over security, robustness, and resiliency. These include:

  • security of personal genomic data when foreign companies purchase all or part of a U.S. company or are contracted for genomic or health care data services, which provides access to sensitive personal information[8];
  • the continuing vulnerability of electronic health records[11] and health care systems[12][13][14];
  • imposing control over DNA sequencing through DNA-encoded malware[15];
  • synthetic biology supply chain vulnerabilities[16];
  • cybersecurity compromise of large industrial biopharma companies[17][18]; and
  • high-level studies which are systematically examining U.S. biodefense programs and capabilities.[19][20]

The darkweb/darknet[21][22][23] could be included as it interfaces with dual use life science endeavors and biopharma research, development, intellectual property, and products, compromising the integrity of critical life science and health cyber-supported technologies and infrastructures. Because of the reliance on bioinformatics, the security of synthetic DNA could also be included, as well.[24] Clearly, this rapidly expanding galaxy does needs a universally accepted definition, common terms of reference, and defined boundaries and structure for best value, ordered evolution, and impact.


References

  1. 1.0 1.1 1.2 Board on Chemical Sciences and Technology; Board on Life Sciences (2014). Meeting Recap: Workshop - Convergence: Safeguarding Technology in the Bioeconomy. The National Academies of Sciences, Engineering, and Medicine. 
  2. 2.0 2.1 FBI WMD Directorate, American Association for the Advancement of Science, United Nations Interregional Crime and Justice Research Institute (2014). "National and Transnational Security Implications of Big Data in the Life Sciences" (PDF). AAAS. http://www.aaas.org/sites/default/files/AAAS-FBI-UNICRI_Big_Data_Report_111014.pdf. 
  3. 3.0 3.1 Board on Chemical Sciences and Technology (2015) (PDF). Meeting Recap: Safeguarding the Bioeconomy: Applications and Implications of Emerging Science. The National Academies of Sciences, Engineering, and Medicine. https://www.ehidc.org/sites/default/files/resources/files/Safeguarding%20the%20Bioeconomy_II_Recap%20Final%20090815.pdf. 
  4. 4.0 4.1 Board on Life Sciences and Board on Chemical Sciences and Technology (2016) (PDF). Meeting Recap: Safeguarding the Bioeconomy III: Securing Life Sciences Data. The National Academies of Sciences, Engineering, and Medicine. https://www.ibpforum.org/sites/default/files/Safeguarding_the_Bioeconomy_III_Recap.pdf. 
  5. Peccoud, J.; Gallegos, J.E.; Murch, R. et al. (2018). "Cyberbiosecurity: From Naive Trust to Risk Awareness". Trends in Biotechnology 36 (1): 4–7. doi:10.1016/j.tibtech.2017.10.012. PMID 29224719. 
  6. 6.0 6.1 Kozminski, K.G.; Drubin, D.G. (2015). "Biosecurity in the age of Big Data: A conversation with the FBI". Molecular Biology of the Cell 26 (22): 3894–97. doi:10.1091/mbc.E14-01-0027. PMC PMC4710219. PMID 26543195. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4710219. 
  7. 7.0 7.1 Pauwels, E.; Vidyarthi, A. (29 March 2016). "How Our Unhealthy Cybersecurity Infrastructure Is Hurting Biotechnology". Wilson Briefs. Wilson Center. https://www.wilsoncenter.org/publication/how-our-unhealthy-cybersecurity-infrastructure-hurting-biotechnology. 
  8. 8.0 8.1 Pauwels, E.; Vidyarthi, A. (19 November 2017). "Who Will Own The Secrets In Our Genes? A U.S. – China Race in Artificial Intelligence and Genomics". Wilson Briefs. Wilson Center. https://www.wilsoncenter.org/publication/who-will-own-the-secrets-our-genes-us-china-race-artificial-intelligence-and-genomics. 
  9. 9.0 9.1 Pauwels, E.; Dunlap, E. (7 September 2017). "The Intelligent and Connected Bio-Labs of the Future: Promise and Peril in the Fourth Industrial Revolution". Wilson Briefs. Wilson Center. https://www.wilsoncenter.org/publication/the-intelligent-and-connected-bio-labs-the-future-promise-and-peril-the-fourth. 
  10. 10.0 10.1 You, E.H. (16 March 2017). "Safeguarding the Bioeconomy: U.S. Opportunities and Challenges - Testimony for the U.S.-China Economic and Security Review Commission" (PDF). https://www.ehidc.org/sites/default/files/resources/files/Ed_You_Testimony_USCC.pdf. 
  11. Weise, E. (5 February 2015). "Millions of Anthem customers alerted to hack". USA Today. https://www.usatoday.com/story/tech/2015/02/05/anthem-health-care-computer-security-breach/22917635/. 
  12. Hackett, R. (17 July 2015). "UCLA Health System data breach may affect millions". Fortune. http://fortune.com/2015/07/17/ucla-health-system-data-breach/. 
  13. Winton, R. (18 February 2016). "Hollywood hospital pays $17,000 in bitcoin to hackers; FBI investigating". Los Angeles Times. https://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html. 
  14. Griffin, A. (12 May 2017). "NHS hack: Cyber attack takes 16 hospitals offline as patients are turned away". Independent. https://www.independent.co.uk/news/uk/home-news/nhs-cyber-attack-hack-hospitals-16-patients-turned-away-wanna-decryptor-a7733196.html. 
  15. Greenberg, A. (10 August 2017). "Biohackers encoded malware in a strand of DNA". Wired. https://www.wired.com/story/malware-dna-hack/. 
  16. Frazar, S.L.; Hund, G.E.; Bonheyo, G.T. et al. (2017). "Defining the synthetic biology supply chain". Health Security 15 (4): 392-400. doi:10.1089/hs.2016.0083. PMID 28767286. 
  17. Collier, K. (30 June 2017). "Merck IT systems still crippled in Petya's aftermath". CyberScoop. https://www.cyberscoop.com/merck-petya-ransomware-ukraine/. 
  18. Shaban, H.; Nakashima, E. (27 June 2017). "Pharmaceutical giant rocked by ransomware attack". The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2017/06/27/pharmaceutical-giant-rocked-by-ransomware-attack. 
  19. Blue Ribbon Study Panel on Biodefense (28 October 2015). "A National Blueprint for Biodefense: Leadership and Major Reform Needed To Optimize Efforts". Hudson Institute. https://www.hudson.org/research/11824-a-national-blueprint-for-biodefense-leadership-and-major-reform-needed-to-optimize-efforts. 
  20. Center for the Study of Weapons of Mass Destruction (2017). Emergence and Convergence Deep Dive: the Age of Genomic Data. Technical Executive Summary. National Defense University. 
  21. Beckett, A. (25 November 2009). "The dark side of the internet". The Guardian. https://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet. 
  22. INTERPOL (24 February 2015). "Pharmaceutical Crime on the Darknet" (PDF). https://www.gwern.net/docs/sr/2015-interpol-pharmaceuticals.pdf. 
  23. Langewiesche, W. (11 September 2016). "Welcome to the dark net, a wilderness where invisible world wars are fought and hackers roam free". Vanity Fair. https://www.vanityfair.com/news/2016/09/welcome-to-the-dark-net?verso=true. 
  24. Adam, L.; Kozar, M.; Letort, G. et al. (2011). "Strengths and limitations of the federal guidance on synthetic DNA". Nature Biotechnology 29 (3): 208-10. doi:10.1038/nbt.1802. PMID 21390018. 

Notes

This presentation is faithful to the original, with only a few minor changes to presentation, grammar, and punctuation. In some cases important information was missing from the references, and that information was added.