Bad Actors Getting Your Health Data Is the FBI’s Latest Worry
In February 2015, the health insurer Anthem revealed that criminal hackers had gained access to the company's servers, exposing the personal information of nearly 79 million patients. It's the largest known healthcare breach in history.
FBI agents worry that the vast amounts of healthcare data being generated for precision medicine efforts could leave the U.S. vulnerable to cyber and biological attacks.
That year, the data of millions more would be compromised in one cyberattack after another on American insurers and other healthcare organizations. In fact, for the past several years, the number of reported data breaches has increased each year, from 199 in 2010 to 344 in 2017, according to a September 2018 analysis in the Journal of the American Medical Association.
The FBI's Edward You sees this as a worrying trend. He says hackers aren't just interested in your social security or credit card number. They're increasingly interested in stealing your medical information. Hackers can currently use this information to make fake identities, file fraudulent insurance claims, and order and sell expensive drugs and medical equipment. But beyond that, a new kind of cybersecurity threat is around the corner.
Mr. You and others worry that the vast amounts of healthcare data being generated for precision medicine efforts could leave the U.S. vulnerable to cyber and biological attacks. In the wrong hands, this data could be used to exploit or extort an individual, discriminate against certain groups of people, make targeted bioweapons, or give another country an economic advantage.
Precision medicine, of course, is the idea that medical treatments can be tailored to individuals based on their genetics, environment, lifestyle or other traits. But to do that requires collecting and analyzing huge quantities of health data from diverse populations. One research effort, called All of Us, launched by the U.S. National Institutes of Health last year, aims to collect genomic and other healthcare data from one million participants with the goal of advancing personalized medical care.
Other initiatives are underway by academic institutions and healthcare organizations. Electronic medical records, genetic tests, wearable health trackers, mobile apps, and social media are all sources of valuable healthcare data that a bad actor could potentially use to learn more about an individual or group of people.
"When you aggregate all of that data together, that becomes a very powerful profile of who you are," Mr. You says.
A supervisory special agent in the biological countermeasures unit within the FBI's weapons of mass destruction directorate, it's Mr. You's job to imagine worst-case bioterror scenarios and figure out how to prevent and prepare for them.
That used to mean focusing on threats like anthrax, Ebola, and smallpox—pathogens that could be used to intentionally infect people—"basically the dangerous bugs," as he puts it. In recent years, advances in gene editing and synthetic biology have given rise to fears that rogue, or even well-intentioned, scientists could create a virulent virus that's intentionally, or unintentionally, released outside the lab.
"If a foreign source, especially a criminal one, has your biological information, then they might have some particular insights into what your future medical needs might be and exploit that."
While Mr. You is still tracking those threats, he's been traveling around the country talking to scientists, lawyers, software engineers, cyber security professionals, government officials and CEOs about new security threats—those posed by genetic and other biological data.
Emerging threats
Mr. You says one possible situation he can imagine is the potential for nefarious actors to use an individual's sensitive medical information to extort or blackmail that person.
"If a foreign source, especially a criminal one, has your biological information, then they might have some particular insights into what your future medical needs might be and exploit that," he says. For instance, "what happens if you have a singular medical condition and an outside entity says they have a treatment for your condition?" You could get talked into paying a huge sum of money for a treatment that ends up being bogus.
Or what if hackers got a hold of a politician or high-profile CEO's health records? Say that person had a disease-causing genetic mutation that could affect their ability to carry out their job in the future and hackers threatened to expose that information. These scenarios may seem far-fetched, but Mr. You thinks they're becoming increasingly plausible.
On a wider scale, Kavita Berger, a scientist at Gryphon Scientific, a Washington, D.C.-area life sciences consulting firm, worries that data from different populations could be used to discriminate against certain groups of people, like minorities and immigrants.
For instance, the advocacy group Human Rights Watch in 2017 flagged a concerning trend in China's Xinjiang territory, a region with a history of government repression. Police there had purchased 12 DNA sequencers and were collecting and cataloging DNA samples from people to build a national database.
"The concern is that this particular province has a huge population of the Muslim minority in China," Ms. Berger says. "Now they have a really huge database of genetic sequences. You have to ask, why does a police station need 12 next-generation sequencers?"
Also alarming is the potential that large amounts of data from different groups of people could lead to customized bioweapons if that data ends up in the wrong hands.
Eleonore Pauwels, a research fellow on emerging cybertechnologies at United Nations University's Centre for Policy Research, says new insights gained from genomic and other data will give scientists a better understanding of how diseases occur and why certain people are more susceptible to certain diseases.
"As you get more and more knowledge about the genomic picture and how the microbiome and the immune system of different populations function, you could get a much deeper understanding about how you could target different populations for treatment but also how you could eventually target them with different forms of bioagents," Ms. Pauwels says.
Economic competitiveness
Another reason hackers might want to gain access to large genomic and other healthcare datasets is to give their country a leg up economically. Many large cyber-attacks on U.S. healthcare organizations have been tied to Chinese hacking groups.
"This is a biological space race and we just haven't woken up to the fact that we're in this race."
"It's becoming clear that China is increasingly interested in getting access to massive data sets that come from different countries," Ms. Pauwels says.
A year after U.S. President Barack Obama conceived of the Precision Medicine Initiative in 2015—later renamed All of Us—China followed suit, announcing the launch of a 15-year, $9 billion precision health effort aimed at turning China into a global leader in genomics.
Chinese genomics companies, too, are expanding their reach outside of Asia. One company, WuXi NextCODE, which has offices in Shanghai, Reykjavik, and Cambridge, Massachusetts, has built an extensive library of genomes from the U.S., China and Iceland, and is now setting its sights on Ireland.
Another Chinese company, BGI, has partnered with Children's Hospital of Philadelphia and Sinai Health System in Toronto, and also formed a collaboration with the Smithsonian Institute to sequence all species on the planet. BGI has built its own advanced genomic sequencing machines to compete with U.S.-based Illumina.
Mr. You says having access to all this data could lead to major breakthroughs in healthcare, such as new blockbuster drugs. "Whoever has the largest, most diverse dataset is truly going to win the day and come up with something very profitable," he says.
Some direct-to-consumer genetic testing companies with offices in the U.S., like Dante Labs, also use BGI to process customers' DNA.
Experts worry that China could race ahead the U.S. in precision medicine because of Chinese laws governing data sharing. Currently, China prohibits the exportation of genetic data without explicit permission from the government. Mr. You says this creates an asymmetry in data sharing between the U.S. and China.
"This is a biological space race and we just haven't woken up to the fact that we're in this race," he said in January at an American Society for Microbiology conference in Washington, D.C. "We don't have access to their data. There is absolutely no reciprocity."
Protecting your data
While Mr. You has been stressing the importance of data security to anyone who will listen, the National Academies of Sciences, Engineering, and Medicine, which makes scientific and policy recommendations on issues of national importance, has commissioned a study on "safeguarding the bioeconomy."
In the meantime, Ms. Berger says organizations that deal with people's health data should assess their security risks and identify potential vulnerabilities in their systems.
As for what individuals can do to protect themselves, she urges people to think about the different ways they're sharing healthcare data—such as via mobile health apps and wearables.
"Ask yourself, what's the benefit of sharing this? What are the potential consequences of sharing this?" she says.
Mr. You also cautions people to think twice before taking consumer DNA tests. They may seem harmless, he says, but at the end of the day, most people don't know where their genetic information is going. "If your genetic sequence is taken, once it's gone, it's gone. There's nothing you can do about it."
This Mom Is On a Mission to End Sickle Cell Disease
[Editor's Note: This video is the third of a five-part series titled "The Future Is Now: The Revolutionary Power of Stem Cell Research." Produced in partnership with the Regenerative Medicine Foundation, and filmed at the annual 2019 World Stem Cell Summit, this series illustrates how stem cell research will profoundly impact human life.]
Kira Peikoff was the editor-in-chief of Leaps.org from 2017 to 2021. As a journalist, her work has appeared in The New York Times, Newsweek, Nautilus, Popular Mechanics, The New York Academy of Sciences, and other outlets. She is also the author of four suspense novels that explore controversial issues arising from scientific innovation: Living Proof, No Time to Die, Die Again Tomorrow, and Mother Knows Best. Peikoff holds a B.A. in Journalism from New York University and an M.S. in Bioethics from Columbia University. She lives in New Jersey with her husband and two young sons. Follow her on Twitter @KiraPeikoff.
Dadbot, Wifebot, Friendbot: The Future of Memorializing Avatars
In 2016, when my family found out that my father was dying from cancer, I did something that at the time felt completely obvious: I started building a chatbot replica of him.
I simply wanted to create an interactive way to share key parts of his life story.
I was not under any delusion that the Dadbot, as I soon began calling it, would be a true avatar of him. From my research about the voice computing revolution—Siri, Alexa, the Google Assistant—I knew that fully humanlike AIs, like you see in the movies, were a vast ways from technological reality. Replicating my dad in any real sense was never the goal, anyway; that notion gave me the creeps.
Instead, I simply wanted to create an interactive way to share key parts of his life story: facts about his ancestors in Greece. Memories from growing up. Stories about his hobbies, family life, and career. And I wanted the Dadbot, which sent text messages and audio clips over Facebook Messenger, to remind me of his personality—warm, erudite, and funny. So I programmed it to use his distinctive phrasings; to tell a few of his signature jokes and sing his favorite songs.
While creating the Dadbot, a laborious undertaking that sprawled into 2017, I fixated on two things. The first was getting the programming right, which I did using a conversational agent authoring platform called PullString. The second, far more wrenching concern was my father's health. Failing to improve after chemotherapy and immunotherapy, and steadily losing energy, weight, and the animating sparkle of life, he died on February 9.
John Vlahos at a family reunion in the summer of 2016, a few months after his cancer diagnosis.
(Courtesy James Vlahos)
After a magazine article that I wrote about the Dadbot came out in the summer of 2017, messages poured in from readers. While most people simply expressed sympathy, some conveyed a more urgent message: They wanted their own memorializing chatbots. One man implored me to make a bot for him; he had been diagnosed with cancer and wanted his six-month-old daughter to have a way to remember him. A technology entrepreneur needed advice on replicating what I did for her father, who had stage IV cancer. And a teacher in India asked me to engineer a conversational replica of her son, who had recently been struck and killed by a bus.
Journalists from around the world also got in touch for interviews, and they inevitably came around to the same question. Will virtual immortality, they asked, ever become a business?
The prospect of this happening had never crossed my mind. I was consumed by my father's struggle and my own grief. But the notion has since become head-slappingly obvious. I am not the only person to confront the loss of a loved one; the experience is universal. And I am not alone in craving a way to keep memories alive. Of course people like the ones who wrote me will get Dadbots, Mombots, and Childbots of their own. If a moonlighting writer like me can create a minimum viable product, then a company employing actual computer scientists could do much more.
But this prospect raises unanswered and unsettling questions. For businesses, profit, and not some deeply personal mission, will be the motivation. This shift will raise issues that I didn't have to confront. To make money, a virtual immortality company could follow the lucrative but controversial business model that has worked so well for Google and Facebook. To wit, a company could provide the memorializing chatbot for free and then find ways to monetize the attention and data of whoever communicated with it. Given the copious amount of personal information flowing back and forth in conversations with replica bots, this would be a data gold mine for the company—and a massive privacy risk for users.
Virtual immortality as commercial product will doubtless become more sophisticated.
Alternately, a company could charge for memorializing avatars, perhaps with an annual subscription fee. This would put the business in a powerful position. Imagine the fee getting hiked each year. A customer like me would find himself facing a terrible decision—grit my teeth and keep paying, or be forced to pull the plug on the best, closest reminder of a loved one that I have. The same person would effectively wind up dying twice.
Another way that a beloved digital avatar could die is if the company that creates it ceases to exist. This is no mere academic concern for me: Earlier this year, PullString was swallowed up by Apple. I'm still able to access the Dadbot on my own computer, fortunately, but the acquisition means that other friends and family members can no longer chat with him remotely.
Startups like PullString, of course, are characterized by impermanence; they tend to get snapped up by bigger companies or run out of venture capital and fold. But even if big players like, say, Facebook or Google get into the virtual immortality game, we can't count on them existing even a few decades from now, which means that the avatars enabled by their technology would die, too.
The permanence problem is the biggest hurdle faced by the fledgling enterprise of virtual immortality. So some entrepreneurs are attempting to enable avatars whose existence isn't reliant upon any one company or set of computer servers. "By leveraging the power of blockchain and decentralized software to replicate information, we help users create avatars that live on forever," says Alex Roy, the founder and CEO of the startup Everlife.ai. But until this type of solution exists, give props to conventional technology for preserving memories: printed photos and words on paper can last for centuries.
The fidelity of avatars—just how lifelike they are—also raises serious concerns. Before I started creating the Dadbot, I worried that the tech might be just good enough to remind my family of the man it emulated, but so far off from my real father that it gave us all the creeps. But because the Dadbot was a simple chatbot and not some all-knowing AI, and because the interface was a messaging app, there was no danger of him encroaching on the reality of my actual dad.
But virtual immortality as commercial product will doubtless become more sophisticated. Avatars will have brains built by teams of computer scientists employing the latest techniques in conversational AI. The replicas will not just text but also speak, using synthetic voices that emulate the ones of the people being memorialized. They may even come to life as animated clones on computer screens or in 3D with the help of virtual reality headsets.
What fascinates me is how technology can help to preserve the past—genuine facts and memories from peoples' lives.
These are all lines that I don't personally want to cross; replicating my dad was never the goal. I also never aspired to have some synthetic version of him that continued to exist in the present, capable of acquiring knowledge about the world or my life and of reacting to it in real time.
Instead, what fascinates me is how technology can help to preserve the past—genuine facts and memories from people's lives—and their actual voices so that their stories can be shared interactively after they have gone. I'm working on ideas for doing this via voice computing platforms like Alexa and Assistant, and while I don't have all of the answers yet, I'm excited to figure out what might be possible.
[Adapted from Talk to Me: How Voice Computing Will Transform the Way We Live, Work, and Think (Houghton Mifflin Harcourt, March 26, 2019).]