Protecting Your Research—and Your Researchers
Blog
STRIDER
When it comes to your company’s research through open collaboration, who can you trust?
(It’s a big question, we know.)
America’s research enterprise continues to deliver immense benefits for our health, economy and national security—but it’s under attack.
Eric Lander, former director of the White House Office of Science and Technology Policy (OSTP), explained the importance of having strong national R&D programs.
“We’ve led the world for two key reasons: because we invest heavily, and because we do science openly,” he said. “This openness matters a great deal—and there’s strong bipartisan support for it.”
Doing science openly leads to several positive outcomes:
- Better ideas: Because of open, global competition, new concepts are critiqued and debated on their merits.
- The best people: We welcome and are a magnet for outstanding scientific talent from around the world.
- Scientific progress: We move forward rapidly, because every new breakthrough builds on those that came before it.
Mr. Lander also added a warning:
“It has become clear, though, that some foreign governments, including the Chinese government, are working vigorously to illicitly acquire, and in some cases outright steal, U.S. research and technology. There have been efforts to induce American scientists to secretively conduct research programs on behalf of foreign governments or to inappropriately disclose non-public results from research funded by U.S. government sources. Such threats are real, serious, and completely unacceptable.”
Which brings us back to the initial question: Who can you trust?
In this article, we’ll take a high-level look at the specific threat from the People’s Republic of China (PRC) and other more general security threats—as well as ways to protect yourself against those risks. For an in-depth review of these topics, check out our free white paper: Securing the Future of Academic Research.
Combating the threat from the PRC government
China has been vocal about seeking to advance its technological capabilities through international collaboration and research partnerships (such as its “Made in China 2025” initiative). It’s important, however, to read its statements with a healthy dose of skepticism, because the Chinese government is also known to target any person from any national origin who has expertise in a field that it deems necessary for self-reliance and national strength.
Consider the directive from Xi Jinping, President of the PRC, for his country’s scientists to “not forget their original intention, keep the mission firmly in mind, and adhere to the supremacy of the national interest. … Science has no borders, but scientists have motherlands."
So while the US research enterprise thrives on openness and collaboration to add diverse perspectives and accelerate innovation, these same qualities can also make it vulnerable to exploitation by China and other foreign entities.
In 2021, the United States government took action to combat potential vulnerabilities, creating National Security Presidential Memorandum 33 (NSPM-33). This directive aims to safeguard federally funded research while still fostering international collaboration and academic freedom.
Understanding NSPM-33
NSPM-33 provides detailed guidance for federal agencies and research organizations (such as public and private universities, national laboratories, or any private company receiving federal grants for R&D projects) on implementing these protections effectively.
Here’s a quick rundown of the most important aspects from NSPM-33:
- Disclosure requirements: Researchers and institutions receiving federal funds must disclose all funding sources, affiliations, and potential conflicts of interest. This ensures transparency and reduces risks of conflicts or overlapping commitments.
- Standardized guidelines: Federal agencies are instructed to harmonize disclosure forms and processes to simplify compliance for researchers and institutions.
- Digital Persistent Identifiers (DPIs): Researchers are encouraged to use DPIs to streamline their disclosures and enhance data accuracy.
- Penalties for non-compliance: Violations of disclosure requirements may result in funding suspensions, project termination, or other penalties.
- Research security programs: Institutions receiving over $50 million annually in federal R&D funding must implement security programs addressing cybersecurity, foreign travel security, research security training, and export controls.
Proactively leading the way in research security
Once you understand what the threats are and why the guidance within NSPM-33 is critical, the next step is determining how to implement practical measures to protect your research organization. Consider these recommendations:
- Develop a comprehensive research security program: Establish a dedicated team that’s responsible for developing and enforcing policies related to cybersecurity, foreign travel security, insider threat awareness, and export control compliance.
- Conduct regular training and awareness programs: Continuous education is key to maintaining compliance with NSPM-33.
- Implement advanced cybersecurity measures: Strongly consider investing in robust cybersecurity technologies, including firewalls, encryption, and monitoring systems, to safeguard your intellectual property.
- Strengthen collaboration and communication: Collaboration between departments—including IT, legal, and research—is essential for a cohesive security strategy.
- Leverage technology solutions: Technology solutions that automate and streamline compliance processes—such as software for tracking foreign travel, monitoring insider threats, and verifying disclosures—help ensure that your institution remains compliant with minimal administrative burden.
(For more ideas on how to establish secure and compliant research partnerships, check out this recent blog post.)
As compliance with NSPM-33 becomes increasingly important, those institutions that proactively lead the charge in research security will influence best practices across the sector, ultimately shaping the future of academic research.
For a deeper dive into China’s tactics, download the full white paper—or you can book a demo now to see how Strider’s security solutions can protect your most valuable assets.