Scientific research integrity demands transparency — the law should require it too – The Hill

science lab microscope 051319getty ProxyEgg Scientific research integrity demands transparency — the law should require it too - The Hill

China may be using the U.S.’s system of scientific openness to advance its military power while stealing future US economic growth. China pays scientific researchers in the U.S. to “share” their innovations in exchange for money, access to research laboratories and access to speaking and publication opportunities. They do this irrespective of the researchers’ ethnicities or countries of citizenship and they require the researchers to keep these agreements secret from their employers or the U.S. government. Perhaps it is time for the U.S. to codify scientific transparency into law.

In November 2019, the Senate Homeland Security and Government Affairs Permanent Subcommittee on Investigations published 150 pages of evidence that the government of China has been systematically, aggressively, clandestinely and strategically stealing from America’s scientific research enterprise, exploiting the fact that this enterprise was built on American values of “reciprocity, integrity, merit-based competition, and transparency.” 

Bill Priestap, Assistant Director of Counterintelligence for the FBI, said, “The Chinese government is attempting to acquire or steal, not only the plans and intentions of the United States government, but also the ideas and innovations of the very people that make our economy so incredibly successful.” William Evanina, Director of the National Counterintelligence and Security Center, quantified this theft in terms of future innovation, future patents, and future American jobs — from China and not all countries combined — as “$400B per year in economic loss.” 


Consider the case of a senior scientist specializing in nanoscience while allegedly receiving $50,000 per month, plus living expenses, from a Chinese university. Under U.S. law, he had thus far committed no crime, even though he had allegedly hidden his secret agreement with China from his employer. Only when he lied on a federal grant application, according to federal prosecutors, did the U.S. have recourse to arrest him. Meanwhile the university in China is required by law to share any and all information with the government for use in China’s national security, including to advance its military. 

U.S. employers are often in the dark, completely unaware of their employees’ secret relationships with China, and therefore unable to manage the risk these relationships create. Some large technology firms respond with internal policies, but these employers’ only available tools are civil litigation. Leaders at scientific entities that do not handle intellectual property, like many universities and research laboratories, have told me that they struggle to implement internal policies without risking losing their talent to competitor organizations that have no such policies.

Scientific research integrity and the free and open sharing of scientific ideas insists on transparency. Foreign researchers immigrate to America because of these ethics, as well as our nation’s scientific brainpower and world-leading research facilities. Secret contracts with confidentiality clauses and large cash payments in exchange for access to research conducted in someone else’s lab should not be what the concept of reciprocity stands for.

One solution could put valuable information in employers’ hands while fostering international research collaboration and providing the transparency that scientific integrity demands. Congress could write a law making it illegal for an employee to withhold information about their financial or nonfinancial ties to a foreign organization. Such a law would not prevent employees in the U.S. from engaging in relationships with foreign governments, rather it would only ban them from keeping the relationship secret from their employer.

During discussions about conflict of interest or conflict of commitment, parties assume transparency, and this law could legally require it to be so. This law could give employees a duty to report that they have entered into a relationship with a foreign organization and when scientists and researchers hide this information from their research institutes, companies, or universities, they would have committed a crime. 

Employees who obey the law and self-report would demonstrate their integrity while initiating discussions about whether to continue on their current projects, move to different projects, or sever ties with the foreign entity. Employers could decide whether a conflict of interest exists or whether a risk to intellectual property needs to be mitigated.

For employees who ignore the law, the government and employers would have a criminal recourse for breaches of contract, foreign technology transfer, or intellectual property theft before damage occurs. If the lie is discovered, the employee could be fired for cause or prosecuted and if that employee or researcher were working in the U.S. on a visa, a prosecution could become grounds for deportation.

Because employees would report this information to their employer — and not to the government — there would be no need for a massive government database, a new bureaucracy, or concerns for how the government would handle the data. This reporting could be treated the same as the I-9 form: information to be kept on file by the employer.

Additional discussions would need to determine which organizations, job categories, or roles should be affected; whether certain employee statuses should be exempt (such as part-time employees or 1099 contractors); and how to scope reportable information, particularly for non-financial relationships. 

This law could create the transparency that scientists in the U.S. expect of scientific research. The scientific research ethos of reciprocity and integrity insist that scientific exchanges occur in the light of day, not hidden behind secret, confidential contracts that offer money and benefits for stolen innovations. These are not the ethics the U.S. scientific research community stands for, and the law has an opportunity to catch up.

Cortney Weinbaum is a senior researcher at the nonprofit, nonpartisan RAND Corporation, where she specializes in intelligence and national security. She has researched and published on scientific research ethics, and she recently served in the Office of the undersecretary of Defense for Research and Engineering.

Source of this news:

Related posts:

Flowers Energy Sees Promise in SK ecoplant Deal supports Sovereign Wealth Fund Health and wellness
Submitted to 10/25/2021 SK ecoplant Co., Ltd., part of the SK Group, is always buying 10, 000, thousand shares of zero ticket, non-voting redeemable convertible Pipe A preferred stock, equal foot...
Shape 424B4 Argo Blockchain Plc - StreetInsider. com
History of Share Cash Found on incorporation, the issued as well as , allotted share capital appeared to be to £1 divided into 1 peculiar share of £1. Concerned with December  20, 2017:...
New to Telegram? Here are five advanced features every user should know - The Indian Express
Telegram is recognised widely as a feature-packed app that can do a lot more in terms of functionality compared to rivals like WhatsApp and Signal. We recently covered the Top 10 Telegram features th...
How to Automate YouTube Accounts? - Tech Critter
YouTube is not a social network, like Instagram or Facebook, but as a social media, it is often used even more than television to get news, various shows, streams of events, and everything in betwe...
Proven methods to Set up a Proxy Ip of 2022 [April] - BollyInside
This tutorial relates to the How to Set up a nice Proxy Server. We will do our utmost so that you understand this guide. Discover ways to you like this blog How to Set up a Proxy Server . If y...
Attackers Now Scanning for 'ProxyShell' Vulnerabilities in Exchange Server -
News Attackers Now Scanning for 'ProxyShell' Vulnerabilities in Exchange Server By Kurt Mackie08/13/2021 Recent scanning for a "Critical" remote code execution vulnerability (CVE-2021-34473) in E...
Your Digital Identity's Evil Shadow - Dark Reading
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.When digital identity is mentioned, most pe...
Madero Alto Networks: Personal VPNs pose risks to associations - TechTarget
The rise in remote exercise continues to expose network security measures concerns within the enterprise establishing, and a new report by Palo Alto Networks imparts yet another risk -- applying ...
Investigators Demonstrate New Way to Spot MITM Phishing Kits during Wild - The Hacker News
No fewer than 1, 230 Man-in-the-Middle (MitM) phishing world wide web have been discovered as looking for popular online services are fond of Instagram, Google, PayPal, Later on, Twitter, and L...
No, Apple's Private Relay is not a VPN - CNET
Apple touted its privacy work at its online WWDC event for developers. Apple; screenshot by Stephen Shankland/CNET This story is part of Apple Event, our full coverage of the latest news from Apple ...
The Proxy Fight for Iranian Democracy - CircleID
If you put 65 million people in a locked room, they're going to find all the exits pretty quickly, and maybe make a few of their own. In the case of Iran's crippled-but-still-connected Internet, that...
Military Seeks Cloud-Based Platform you can Simulate Cyberattacks - MeriTalk
The Ough. S. Army is searching for a cloud-based community that it can use to copy a real-world attacker punching the Department of Defense Guidance Network (DoDIN). In a request for informat...
Find Tracing - What You Need to Know difficult techPresident
Contact tracing was, and is, a critical feature in aiding governments monitor the multiplication of the covid-19 virus. Our own NSO-group was right at you see, the forefront of contact searching for...
Apple wants to replace passwords with your iPhone or Mac - AppleInsider
Apple is working toward a future without passwords with a new iCloud Keychain "passkey" feature that was previewed at WWDC 2021. In a WWDC developer session called "Move beyond passwords," Apple teas...
How to Conceal Your Digital Fingerprint with Smartproxy’s X Browser - Beebom
Living in the digital age is great; you get access to an almost infinite pool of information on pretty much anything you’re looking for. However, there are two sides to every coin, and the digital ...
Solution to watch restricted YouTube presentations without signing in? important Gadget Bridge
Streaming YouTube has become a synonym available for watching videos on the internet. Facebook uploads a wide range of content cross binge-watch with no difficulties. But rather YouTube does also...
TerraMaster F4-421 NAS Review (2021 Model) - Mighty Gadget
Sharing is caring! Facebook Twitter TerraMaster F4-421 NAS Review Rating (2021 Model) Summary The TerraMaster F4-421 is an excellent affordable NAS that is ideal as a backup solut...
Dallas Invents: 109 Patents Granted for Week of Nov. 30 » Dallas Innovates -
Dallas Invents is a weekly look at U.S. patents granted with a connection to the Dallas-Fort Worth-Arlington metro area. Listings include patents granted to local assignees and/or those with a N...

IP Rotating Proxy Onsale


First month free with coupon code FREE30