Science Sleuths Using Technology to Find Fakery, Plagiarism in Published Research

Part of an early model central processing unit is seen on display at the Computer History Museum on January 19, 2024 in Mountain View, California, as the museum celebrates Mac's 40th birthday. (Photo by Loren Elliott / AFP)
Part of an early model central processing unit is seen on display at the Computer History Museum on January 19, 2024 in Mountain View, California, as the museum celebrates Mac's 40th birthday. (Photo by Loren Elliott / AFP)
TT

Science Sleuths Using Technology to Find Fakery, Plagiarism in Published Research

Part of an early model central processing unit is seen on display at the Computer History Museum on January 19, 2024 in Mountain View, California, as the museum celebrates Mac's 40th birthday. (Photo by Loren Elliott / AFP)
Part of an early model central processing unit is seen on display at the Computer History Museum on January 19, 2024 in Mountain View, California, as the museum celebrates Mac's 40th birthday. (Photo by Loren Elliott / AFP)

Allegations of research fakery at a leading cancer center have turned a spotlight on scientific integrity and the amateur sleuths uncovering image manipulation in published research.
Dana-Farber Cancer Institute, a Harvard Medical School affiliate, announced Jan. 22 it's requesting retractions and corrections of scientific papers after a British blogger flagged problems in early January.
The blogger, 32-year-old Sholto David, of Pontypridd, Wales, is a scientist-sleuth who detects cut-and-paste image manipulation in published scientific papers.
He's not the only hobbyist poking through pixels. Other champions of scientific integrity are keeping researchers and science journals on their toes. They use special software, oversize computer monitors and their eagle eyes to find flipped, duplicated and stretched images, along with potential plagiarism, The Associated Press reported.
A look at the situation at Dana-Farber and the sleuths hunting sloppy errors and outright fabrications:
WHAT HAPPENED AT DANA-FARBER?
In a Jan. 2 blog post, Sholto David presented suspicious images from more than 30 published papers by four Dana-Farber scientists, including CEO Laurie Glimcher and COO William Hahn.
Many images appeared to have duplicated segments that would make the scientists' results look stronger. The papers under scrutiny involve lab research on the workings of cells. One involved samples from bone marrow from human volunteers.
The blog post included problems spotted by David and others previously exposed by sleuths on PubPeer, a site that allows anonymous comments on scientific papers.
Student journalists at The Harvard Crimson covered the story on Jan. 12, followed by reports in other news media. Sharpening the attention was the recent plagiarism investigation involving former Harvard president Claudine Gay, who resigned early this year.
HOW DID DANA-FARBER RESPOND?
Dana-Farber said it already had been looking into some of the problems before the blog post. By Jan. 22, the institution said it was in the process of requesting six retractions of published research and that another 31 papers warranted corrections.
Retractions are serious. When a journal retracts an article that usually means the research is so severely flawed that the findings are no longer reliable.
Dr. Barrett Rollins, research integrity officer at Dana-Farber, said in a statement: “Following the usual practice at Dana-Farber to review any potential data error and make corrections when warranted, the institution and its scientists already have taken prompt and decisive action in 97 percent of the cases that had been flagged by blogger Sholto David."
WHO ARE THE SLEUTHS?
California microbiologist Elisabeth Bik, 57, has been sleuthing for a decade. Based on her work, scientific journals have retracted 1,133 articles, corrected 1,017 others and printed 153 expressions of concern, according to a spreadsheet where she tracks what happens after she reports problems.
She has found doctored images of bacteria, cell cultures and western blots, a lab technique for detecting proteins.
“Science should be about finding the truth,” Bik told The Associated Press. She published an analysis in the American Society for Microbiology in 2016: Of more than 20,000 peer-reviewed papers, nearly 4% had image problems, about half where the manipulation seemed intentional.
Bik's work brings donations from Patreon subscribers of about $2,300 per month and occasional honoraria from speaking engagements. David told AP his Patreon income recently picked up to $216 per month.
Technology has made it easier to root out image manipulation and plagiarism, said New York University science educator Ivan Oransky, co-founder of the Retraction Watch blog. The sleuths download scientific papers and use software tools to help find problems.
Others doing the investigative work remain anonymous and post their findings under pseudonyms. Together, they have “changed the equation” in scientific publication, Oransky said.
“They want science to be and do better,” Oransky said. “And they are frustrated by how uninterested most people in academia — and certainly in publishing — are in correcting the record.” They're also concerned about the erosion of public trust in science. WHAT MOTIVATES MISCONDUCT?
Bik said some mistakes could be sloppy errors where images were mislabeled or “somebody just grabbed the wrong photo.”
But some images are obviously altered with sections duplicated or rotated or flipped. Scientists building their careers or seeking tenure face pressure to get published. Some may intentionally falsify data, knowing that the process of peer review — when a journal sends a manuscript to experts for comments — is unlikely to catch fakery.
“At the end of the day, the motivation is to get published,” Oransky said. “When the images don’t match the story you’re trying to tell, you beautify them.”
WHAT HAPPENS NEXT?
Scientific journals investigate errors brought to their attention but usually keep their processes confidential until they take action with a retraction or correction.
Some journals told the AP they are aware of the concerns raised by David's blog post and were looking into the matter.



North Korean Charged in Cyberattacks on US Hospitals, NASA and Military Bases

A man who allegedly carried out cybercrimes for a North Korean military intelligence agency has been indicted in a conspiracy to hack hospitals and health care providers in several US states. - The AP
A man who allegedly carried out cybercrimes for a North Korean military intelligence agency has been indicted in a conspiracy to hack hospitals and health care providers in several US states. - The AP
TT

North Korean Charged in Cyberattacks on US Hospitals, NASA and Military Bases

A man who allegedly carried out cybercrimes for a North Korean military intelligence agency has been indicted in a conspiracy to hack hospitals and health care providers in several US states. - The AP
A man who allegedly carried out cybercrimes for a North Korean military intelligence agency has been indicted in a conspiracy to hack hospitals and health care providers in several US states. - The AP

A North Korean military intelligence operative has been indicted in a conspiracy to hack into American health care providers, NASA, US military bases and international entities, stealing sensitive information and installing ransomware to fund more attacks, federal prosecutors announced Thursday.

The indictment of Rim Jong Hyok by a grand jury in Kansas City, Kansas, accuses him of laundering the money through a Chinese bank and then using it to buy computer servers and fund more cyberattacks on defense, technology and government entities around the world.

The hacks on American hospitals and other health care providers disrupted the treatment of patients, officials said. He's accused of targeting 17 entities across 11 US states, including NASA and US military bases, as well as defense and energy companies in China, Taiwan and South Korea, according to The AP.

For more than three months, Rim and other members of the Andariel Unit of North Korea's Reconnaissance General Bureau had access to NASA’s computer system, extracting over 17 gigabytes of unclassified data, the indictment says. They also reached inside computer systems for defense companies in Michigan and California, as well as Randolph Air Force base in Texas and Robins Air Force base in Georgia, authorities say.

The malware enabled the state-sponsored Andariel group to send stolen information to North Korean military intelligence, furthering the country’s military and nuclear aspirations, federal prosecutors said. They've gone after details of fighter aircraft, missile defense systems, satellite communications and radar systems, a senior FBI official said.

“While North Korea uses these types of cyber crimes to circumvent international sanctions and fund its political and military ambitions, the impact of these wanton acts have a direct impact on the citizens of Kansas,” said Stephen A. Cyrus, an FBI agent based in Kansas City.

Online court records do not list an attorney for Rim, who has lived in North Korea and worked at the military intelligence agency’s offices in both Pyongyang and Sinuiju, according to court records. A reward of up to $10 million has been offered for information that could lead to him or other foreign government operatives who target critical US infrastructure.

The Justice Department has prosecuted multiple cases related to North Korean hacking, often alleging a profit-driven motive that sets the nation's cybercriminals apart from hackers in Russia and China. In 2021, for instance, the department charged three North Korean computer programmers in a broad range of hacks including a destructive attack targeting an American movie studio and the attempted theft and extortion of more than $1.3 billion from banks and companies around the world.

In this case, the FBI was alerted by a Kansas medical center that was hit in May 2021. Hackers had encrypted its files and servers, blocking access to patient files, laboratory test results and computers needed to operate hospital equipment. A Colorado health care provider was affected by the same Maui ransomware variant.

A ransom note sent to the Kansas hospital demanded Bitcoin payments valued then at about $100,000, to be sent to a cryptocurrency address.

“Otherwise all of your files will be posted in the Internet which may lead you to loss of reputation and cause the troubles for your business,” the note reads. “Please do not waste your time! You have 48 hours only! After that the Main server will double your price.”

Federal investigators said they traced blockchains to follow the money: An unnamed co-conspirator transferred the Bitcoin to a virtual currency address belonging to two Hong Kong residents before it was converted into Chinese currency and transferred to a Chinese bank. The money was then accessed from an ATM in China next to the Sino-Korean Friendship Bridge connecting China and North Korea, according to court records.

In 2022, the Justice Department said the FBI seized approximately $500,000 in ransom payments from the money laundering accounts, including the entire ransom payment from the hospital.

An arrest of Rim is unlikely, so the biggest outcome of the indictment is that it may lead to sanctions that could cripple the ability of North Korea to collect ransoms this way, which could in turn remove the motivation to conduct cyber attacks on entities like hospitals in the future, according to Allan Liska, an analyst with the cybersecurity firm Recorded Future.

“Now, unfortunately, that will force them to do more cryptocurrency theft. So it’s not going to stop their activity. But the hope is that we won’t have hospitals disrupted by ransomware attacks because they’ll know that they can’t get paid,” Liska said.

He also noted that a Chinese entity was among the victims and questioned what the country, which is an ally of North Korea, thinks of being targeted.

“China can’t be too thrilled about that,” he said.