Why Research Security is National Security

Blog

STRIDER

This is the first post of four in our Research Security blog series. To read the next post, click here.

Introduction

In today’s globalized research environment, securing funding and maintaining compliance with regulations are important for academic institutions. Research security has become a crucial issue that not only shapes national security but also directly impacts the ability of institutions to secure and keep funding. This blog will explore the importance of research security, why it is essential for compliance, and how it supports the broader goals of expanding knowledge and fostering innovation. 

What is Research Security?

Research security involves the protection of intellectual property, data, and sensitive research from theft, unauthorized access, and interference by foreign and domestic actors. It ensures that academic institutions can maintain compliance with regulatory requirements, secure funding, and foster safe international collaborations, among other benefits. 

Sethuraman Panchanathan, Director of the National Science Foundation (NSF), stated, “Research security is a critical matter. It is important that the research community, government agencies, and our international partners have frequent dialogue to share perspectives and help shape our research security policies and programs. Collaboration is critical to a vibrant science and engineering community, which includes domestic and international collaboration.”

Tightening Research Security Protocols

In recent years, the U.S. government has taken significant measures to enhance research security. One key development is National Security Presidential Memorandum-33 (NSPM-33), which directs federal agencies to strengthen requirements around disclosure of potential conflicts of interest and other forms of undue influence in federally funded research. This ensures transparency and accountability while fostering innovation and maintaining global partnerships in different communities of thought and study. 

Why are Research Security Protocols Tightening? 

Understanding real-world examples of research security breaches can help highlight the critical need for robust research security measures.

Case Study 1

One example involves an NSF-funded principal investigator who, unbeknownst to their U.S. organization, participated in a foreign talent program while holding a faculty position abroad. This case escalated when the investigator failed to disclose foreign affiliations and funding, which is required under NSF standards. The repercussions were severe: suspension of awards, resignation, and eventual government-wide debarment. This underscores the critical need for transparency from professors and the essential role that due-diligence tools will play in adherence to funding guidelines. Since the professor didn't disclose those relationships and the research security team was blind to them, the university was punished via their reputation and the loss of essential funding.

Case Study 2

Another case saw a professor exploiting federal grants for research already conducted overseas. The breach involved not just the misallocation of funds but also an active effort to obstruct investigations by submitting falsified documentation. The subsequent criminal conviction of the professor highlights the rigorous measures taken to uphold research security.

Challenges from the PRC

The People’s Republic of China (PRC) has been the leading instigator of intellectual property theft and research security breaches in the West, employing strategic approaches to exploit overseas talent and acquire advanced technologies.

Xi Jinping, the General Secretary of the Communist Party of China, has called for the PRC to "achieve high-level science and technology (S&T) self-reliance," resolve "key core technologies," and reduce dependence on foreign technology. These tactics pose risks to international research institutes and corporations, including intellectual property theft and unapproved technology transfer.

Ensuring Compliance and Securing Funding 

While research security is crucial for national defense, it is equally important for compliance and ensuring the integrity of research activities. By adhering to research security protocols, institutions can secure funding, protect their reputation, and continue their mission of expanding knowledge and fostering innovation.

Strider helps academic institutions navigate these protocols by providing actionable intelligence that ensures transparency and compliance. Our tools help institutions identify and mitigate risks associated with foreign collaborations, thereby securing funding and maintaining research integrity. Two of the biggest impacts that our tools have are:

  1. Speed to Insight: Being able to more quickly process applications, give guidance to research security teams, and provide a holistic view of personnel’s relationships with foreign entities.
  2. Validating Information Provided by Self-Disclosures: Research security teams are required to verify the information submitted by professors in self-disclosures as they seek funding. That is a tall order, and most of the time, the team doesn’t have a starting point. Sentry provides quick access to a list of publications, patents, funding records, and relationships to “malign talent programs”.

By leveraging Strider's solutions, institutions can confidently secure funding and continue their research activities without compromising on compliance or security.

Conclusion

Research security is not just a matter of national security; it is essential for academic institutions to secure and maintain funding. By understanding and addressing risks, institutions can ensure compliance, protect their reputation, and foster safe international collaborations. Leveraging tools like Strider's intelligence platform can help illuminate insights for institutions to navigate these challenges, and help ensure that research remains a catalyst for innovation and progress.

Lear more about Strider's research security platform here.