Assessing Research Security Efforts in Higher Education
A Meeting of Experts
National Academy of Sciences Building
Room 125
2101 Constitution Avenue, NW
Washington, DC 20418
September 16–17, 2024
AGENDA
Monday, September 16, 2024
| 8:30 am* | Breakfast Available |
| 9:00 am | Welcome, Introductions, Purpose of Meeting |
| Steven Kendall, Project Director and Senior Program Officer, Policy and Global Affairs, National Academies of Sciences, Engineering, and Medicine |
___________________
* All times U.S. Eastern
| Tom Wang, Senior Director, U.S. Science and Innovation Policy, Policy and Global Affairs, National Academies of Sciences, Engineering, and Medicine | |
| Kristopher E. Gardner, Director for Science and Technology Protection, Office of Science and Technology Program Protection (S&TPP), Office of the Under Secretary of Defense for Research and Engineering, U.S. Department of Defense | |
| 9:15 am | Research Security Defined |
Framing and Questions:
The NSPM-33 implementation guidance1 defines research security as “safeguarding the research enterprise against the misappropriation of research and development to the detriment of national or economic security, related violations of research integrity, and foreign government interference.”
Given this definition (and considering the types of research security policies and requirements currently in place), when thinking about achieving research security goals,
Speaker:
Kelvin K. Droegemeier, Professor of Atmospheric Science and Special Advisor to the Chancellor for Science and Policy, University of Illinois at Urbana–Champaign (virtual)
___________________
1 Joint Committee on the Research Environment Subcommittee on Research Security, Guidance for Implementing National Security Presidential Memorandum 33 (NSPM-33) on National Security Strategy for United States Government-Supported Research and Development, January 2022, p. 24.
| 9:45 am | Break |
| 10:00 am | Ensuring Research Security While Advancing the Progress of Science, Engineering, and Medicine – Perspectives from Federal Funding Agencies |
Scope:
Taking the NSPM-33 implementation guidance definition of research security as our default, consider what successful research security looks like (bearing in mind that the impact of research security policies and requirements is different than the effectiveness of research security policies and requirements).
Questions:
___________________
2 White House Office of Science and Technology Policy, Guidelines for Research Security Programs at Covered Institutions, July 9, 2024.
Facilitator:
Steven Kendall, National Academies of Sciences, Engineering, and Medicine
Discussants:
Sara Barber, Science Policy Advisor, Office of the Chief of Research Security Strategy and Policy, National Science Foundation
Jeremy Ison, Senior Advisor for Research Security, Office of Science, U.S. Department of Energy
Michael Lauer, Deputy Director for Extramural Research, National Institutes of Health
Bindu Nair, Director of Basic Research, U.S. Department of Defense
| 12:00 pm | Lunch |
| 1:00 pm | Institutions of Higher Education: Impacts of Research Security Policies and Requirements on the U.S. Open Research Ecosystem |
Scope:
Consider:
Questions:
Facilitator:
Tom Wang, National Academies of Sciences, Engineering, and Medicine
Discussants:
Deborah Altenburg, Vice President for Research Policy and Advocacy, Association of Public and Land Grant Universities (APLU)
Toby Smith, Vice President for Policy, Association of American Universities (AAU)
Sarah Spreitzer, Vice President and Chief of Staff, Government Relations, American Council on Education (ACE)
Kevin Wozniak, Director of Research Security and Intellectual Property, Council on Governmental Relations (COGR)
| 3:00 pm | Break |
| 3:15 pm | The Impacts of Implementing Research Security Policies in Academia |
Scope:
Consider:
Questions:
Facilitator:
Steven Kendall, National Academies of Sciences, Engineering, and Medicine
Discussants:
Chaouki Abdallah, Professor of Electrical and Computer Engineering, Georgia Institute of Technology
Holly Bante, Associate Vice President, Research Security and Ethics, University of Cincinnati
Dan Engebretson, Vice President for Research and Sponsored Programs, University of South Dakota
Kevin Gamache, Chief Research Security Officer, Texas A&M University System/Academic Security and Counter-Exploitation Program (ASCE)
Mark Haselkorn, Professor of Human Centered Design & Engineering, University of Washington (virtual)
Michele Masucci, Vice Chancellor for Research and Economic Development, University System of Maryland
Sonya T. Smith, Executive Director, Research Institute for Tactical Autonomy (RITA), Howard University
| 5:15 pm | Adjourn |
Tuesday, September 17, 2024
| 8:30 am* | Breakfast Available |
| 9:00 am | Welcome and Summary of Day 1 |
Speakers:
National Academies Staff
| 9:15 am | Research Security, Economic Security, and National Security |
Scope:
National security, economic security, and research security have become increasingly interlinked:
“Definitions of national security have an important economic dimension and the economy cannot be easily separated from National Security. The relationship between the national security and economic spheres is complex and characterized by many close interconnections and feedback loops.”
RAND3
“Gaining and maintaining leadership in technology and innovation is set to be a key feature of global competition throughout the twenty-first century. With today’s intermingling of economic competitiveness and
___________________
* All times U.S. Eastern
3 Lucia Retter, Erik Frinking, Stijn Hoorens, Alice Lynch, Fook Nederveen, and William Phillips, Relationships between the Economy and National Security Analysis and Considerations for Economic Security Policy in the Netherlands, RAND, 2020, p. 94, https://www.rand.org/content/dam/rand/pubs/research_reports/RR4200/RR4287/RAND_RR4287.pdf/.
defense, staying ahead of the technology curve is a cornerstone of national security. The United States, to further its geopolitical interests and maintain a strong domestic economy, must approach every aspect of economic and trade policy through the lens of global technology competition.”
Center for Strategic and International Studies4
“U.S. leadership in technology innovation is central to the nation’s interests, including its security, economic prosperity, and quality of life . . . Research, training, and teaching conducted in an open environment benefit the United States because they attract research talent, foster creative and innovative conditions for discovery, and speed the development of new ideas and technologies. At the same time, conducting this work in an open environment poses a risk that knowledge, know-how, or results may flow to adversaries as a result of the movement of either information or people.”
National Academies of Sciences, Engineering, and Medicine5
“Economic security is national security. America is safer when important technology and essential products are produced domestically. Today, our nation’s economic prosperity and security are challenged by competitors and adversaries that engage in illegal trade practices, steal intellectual property (IP), and engage in cybercrime.”
U.S. Department of Commerce6
___________________
4 Thibault Denamiel, Taylar Rajic, William Alan Reinsch, James Andrew Lewis, and Julia Brock, Beyond Economics: How U.S. Policies Can Undermine National Security Goals, Center for Strategic and International Studies, May 2024, p. 1, https://csis-websiteprod.s3.amazonaws.com/s3fs-public/2024-05/240503_Reinsch_Beyond_Economics_0.pdf?VersionId=_nEz_mgcpHO5ZQMBpzKGuMLSG7uzxfrP.
5 National Academies of Sciences, Engineering, and Medicine, Protecting U.S. Technological Advantage, Washington, DC: The National Academies Press, 2022, p. 1, https://doi.org/10.17226/26647.
6 U.S. Department of Commerce, Strengthen U.S. Economic and National Security, https://2017-2021.commerce.gov/about/strategic-plan/strengthen-us-economic-and-nationalsecurity.html.
Consider:
Questions:
Facilitator:
Tom Wang, National Academies of Sciences, Engineering, and Medicine
Discussants:
Patrick Gallagher, Professor, Department of Physics and Astronomy, University of Pittsburgh (virtual)
Benjamin F. Jones, Gordon and Llura Gund Family Professor of Entrepreneurship and Professor of Strategy, Northwestern University
Nayantara Hensel, Chief Economist and Senior Advisor, Seaborne Defense (virtual)
Caroline Wagner, Professor, John Glenn College of Public Affairs, Ohio State University (virtual)
Priscilla Yeon-Vogelheim, Supervisory Intelligence Analyst, Federal Bureau of Investigation
| 11:15 am | Break |
| 11:30 am | Meeting Takeaways and Next Steps |
Facilitator:
Steven Kendall, National Academies of Sciences, Engineering, and Medicine
Questions:
Discussants:
Meeting of Experts Participants
| 12:30 pm | Adjourn |