CSET报告 加强美国研究安全-2020年

VIP文档

ID:26233

大小:0.15 MB

页数:1页

时间:2022-12-03

金币:10

上传者:战必胜
SUBJECT: Establishing a new public-private institution to improve American research security
FROM: Melissa Flagg and Zachary Arnold
BACKGROUND
U.S. adversaries are extracting valuable data, know-how, and intellectual property from American
research
institutions, including businesses, universities, and government labs.
Currently, federal authorities address this issue by prosecuting researchers who conceal relationships wit
h
Chinese entities, investigating research institutions, restricting visas for certain Chinese students and
researchers, and conducting outreach to university administrators.
KEY POINTS
Fed
eral authorities can’t secure American research on their own.
Federal agencies and law enforcers have limited and uneven authority over most U.S. R&D: federal
jurisdiction typically relies on the presence of federal research funding, but federal funding has limited
reach, especially in the large industrial R&D space.
90% of R&D occurs outside of government, mainly in industry (73%) and universities (13%).
The federal government funds 51% of university R&D, but only 22% of total U.S. R&D.
FBI Director Wray emphasizes the need for “a whole-of-society response [to research security threats],
with government and the private sector working together.”
Many, if not most, researchers will not proactively collaborate with law enforcement.
A 2009 survey by the Federation of American Scientists and the FBI concluded that “scientists are
suspicious of the FBI and feel that they do not work well with the scientific community.”
Law enforcement often lacks the expertise to assess suspicious activity within R&D. In the 2009 survey,
76% of respondents agreed that law enforcement “[did] not understand their work.”
Researchers need support that is difficult for law enforcement and intelligence agencies to provide.
Federal authorities have limited or no jurisdiction over Chinese technology transfer strategies, which are
often legal (or at least not clearly illegal).
Classification and confidentiality concerns frequently prevent federal agencies from sharing actionable
“threat intelligence” with researchers and their institutions.
RECOMMENDATIONS
Convene and fund an independent, public-private institution to inform and support research
security
efforts throughout America’s R&D ecosystem.
The institution should:
Provide researchers and their institutions with context-specific, data-driven threat assessments,
allowing them to assess risks to research security in any specific situation.
Track security trends and threats across the U.S. research landscape, whether or not those
threats
implicate violations of law, and develop and disseminate defensive best practices.
Employ staff with technical expertise and experience in R&D, counterintelligence,
data
visualization, and open-source data analysis.
Potential models include but are not limited to public-private cybersecurity operations centers, industry
self-regulatory bodies, and intelligence fusion centers.”
To win the research community’s trust and ensure the greatest possible scope of action, the institution
must be meaningfully independent from law enforcement.
As an initial step, survey the research community to identify the most important unmet needs
and
opportunities in research security.
cset.georgetown.edu | cset@georgetown.edu
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭