National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop (2025)

Chapter: 5 University and National Lab Responses on Research Security

Previous Chapter: 4 The Nature of the Geopolitical Challenge
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

5

University and National Lab Responses on Research Security

Chaouki Abdallah (Georgia Institute of Technology) moderated a session that considered the evolution of university and national laboratory responses to research security threats and strategies. The National Science, Technology, and Security Roundtable (NSTSR) sought to understand whether the threat to our research system is qualitatively different from previous threats, or simply larger in size. The conclusion was that the problem is qualitatively different because adversaries have greater resources than in the past. Abdallah called for a “neighborhood watch” approach, where research security is the responsibility of all those working at a university. The security of the United States’ science and technology (S&T) system is only as strong as our weakest link; some less-resourced institutions cannot afford to address the challenge of research security, and some international partners and small- and medium-sized companies are not even aware of the issue.

Peter Fisher (Massachusetts Institute of Technology [MIT]) said that he became familiar with research security when the National Science Foundation (NSF) asked JASON, a group of professors that advises the government on matters that are typically classified, to undertake a report on research security in 2019.1 The report identified research security stakeholders in the research enterprise, which included principal investigators

___________________

1 JASON. 2019. Fundamental Research Security. https://www.nsf.gov/news/special_reports/jasonsecurity/JSR-19-2IFundamentalResearchSecurity_12062019FINAL.pdf.

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

(PIs), research leaders, research institutions, professional societies, federal funding agencies, political leadership, and the general public. PIs are key because they set norms for their research groups and how research groups communicate. PIs also recruit, train, and arrange for researcher compensation (including researchers from overseas). Professional societies were also identified as key stakeholders because they provide guidance to PIs based on norms in their particular fields of research.

The authors of the JASON report attempted to create a list of the norms that govern research. However, it was difficult because different S&T fields have different cultures, histories, and perspectives on sharing data and ideas. The report instead identified a set of tools for researchers for assessing engagements in fundamental research. The assessment tools included the questions: Are the terms of the engagement made clear in writing? Have all participants been identified? Are all the participants’ conflicts of interest and commitment documented? Is there any aspect of the engagement that seems unusual, unnecessary, or poorly specified?

John Sarrao (SLAC National Accelerator Laboratory), drawing upon his experiences at national laboratories, said that the U.S. research enterprise cannot be effective without international engagement. If we chose not to engage internationally, then we would have nothing worth stealing. However, it is true that real risks exist when others do not share our values. A grand challenge and key priority is to strike an appropriate and dynamic balance between international engagement and research security. Sarrao suggested that we are doing a better job on research security today than we were a couple of years ago and that the NSTSR has played an important role. If we can achieve the right balance, it will do a lot to mitigate the “chill” in international engagements that has been evidenced.

“We, as a U.S. research enterprise, cannot be successful [without] international engagement. Real risks exist … when other players in the ecosystem don’t share our values. … The grand challenge is how do we strike that balance appropriately.”

John Sarrao
SLAC National Accelerator Laboratory

In addition to seeking compliance, Sarrao said, the U.S. government must also provide education and awareness regarding research security. Articulating to researchers that the United States’ objective is to ensure that researchers’ work is protected (and that they get appropriate credit for it) is

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

a powerful lever. We should think about international colleagues as targets of activities carried out by the adversarial governments designed to interfere with the U.S. research system, rather than as threats. Talent is critical to national labs, but the broader research ecosystem is also important because national labs, which are not degree-granting institutions, rely on universities to train talent.

Sarrao said that it is important to focus on protecting the future rather than relitigating the past. Signals about international collaboration from institutional leaders and the government 5 to 10 years ago were very different from today. It is useful to think about research security culture as we think about lab safety culture. Ideally, concerns and issues could be brought forward without fear of reprisal, and there would also be confidence that labs and institutions foster a system of fairness and accountability.

Sarrao said that we must share best practices but recognize that one single approach does not work for all circumstances. Having policies in common across federal agencies for disclosures by those seeking a federal grant are an important starting point. Once commonalities are identified, agencies can tailor disclosure requirements. Every restriction or protection measure comes with an opportunity cost.

It is important to celebrate and communicate the good work we are doing at national labs, Sarrao said, but also to acknowledge that we have much more work to do. He foresees the development of an approach to assess international collaborations in the Department of Energy (DOE) that will bring consistency, transparency, and objectivity by examining the “who,” or the affiliation history and role within DOE; the “what,” or the scope of the work; and the “where,” or acknowledging variability in site access restrictions across laboratories.

Joe Elabd (Texas A&M University System) shared his experiences with research security at the Texas A&M University System. Composed of 11 universities and 8 state agencies, the A&M System is one of the largest in the country, with an enrollment of 157,000 students. It has an annual research portfolio of over $1.5 billion, and it includes a large R1 university, four R2 universities,2 and a historically Black university.

___________________

2 R1 universities are defined as Ph.D.-granting universities with very high research activity, and R2 universities are defined as Ph.D.-granting universities with high research activity, according to the Carnegie Classification of Institutions of Higher Education. See https://carnegieclassifications.acenet.edu/carnegie-classification/classification-methodology/basic-classification/#:~:text=R1%3A%20Doctoral%20Universities%20%E2%80%93%20Very%20high,%2FPU%3A%20Doctoral%2FProfessional%20Universities.

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

The A&M System has a robust and well-staffed research security program, and smaller universities within the system can make use of systemwide resources. In 2021, A&M performed a systemwide review of international agreements with countries of concern. This review included close to 100 research agreements, academic collaborative agreements, memoranda of understanding, and letters of intent. In-depth risk analyses were performed on each agreement and, as a result, a majority were terminated and the remainder were identified for mitigating measures. A&M found that a significant number of zero-dollar agreements (e.g., foreign exchange programs) were being signed off on by individuals who did not realize that there were risks associated with signing the agreement.

In 2022, A&M instituted a program called High Risk Global Engagements and High Risk International Collaborations, where all foreign engagements are proactively assessed, including travel and co-authorships. Proposed international engagements must be submitted for review to the university’s export control officer. Legal, foreign influence, institutional, and reputational risks, among other risks, are evaluated. Reviewers include Elabd as A&M vice chancellor for research and the general counsel. Outcomes of the review include approval, approval with mitigating measures, or denial. About 20 international engagements are reviewed each week. This process has shown the importance of communication and the need for education of faculty researchers, leadership, and the broader community about research security concerns.

DISCUSSION

During discussion, consistency of decision-making across academic institutions on international engagement was raised and panelists expressed the viewpoint that different institutions have different risk profiles. Maria Zuber (MIT) said that risk management policies and procedures should be consistent within an institution, but that safeguards in place for research at universities that perform classified research should be increased compared with those at universities that do not perform classified research. Sarrao said that it should be acceptable for different institutions with differing risk profiles to arrive at different risk management decisions, so long as decisions are transparent.

Elabd shared that China, Russia, North Korea, and Iran were subject to intense scrutiny at A&M, but that, while country provides a starting point for analysis, specific foreign entities must also be considered. Fisher said

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

that faculty members are encouraged to take risks, but that it is important from a scientific and international engagement perspective to have the resources that enable investigators to understand risk. He said that it is challenging when a researcher does something without understanding the risk they are taking. Additional discussion focused on the challenges universities face ensuring that faculty have risk management resources for their decision-making in potential private-sector pursuits.

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.

This page intentionally left blank.

Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 29
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 30
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 31
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 32
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 33
Suggested Citation: "5 University and National Lab Responses on Research Security." National Academies of Sciences, Engineering, and Medicine. 2025. National Science, Technology, and Security Roundtable Capstone: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/27976.
Page 34
Next Chapter: 6 Funding Agency Responses
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.