Protecting Biological Materials and Services from Misuse
Opportunities for Access Monitoring and Control
ResearchPublished Oct 20, 2025
There are critical points within the biological supply network that bad actors might exploit to develop biological weapons. The authors summarize the existing U.S. biosecurity landscape, develop a threat model, and, using insights from expert interviews, identify products and services to monitor for misuse. The authors use their findings to investigate promising risk mitigations for strengthening biosecurity.
Opportunities for Access Monitoring and Control
ResearchPublished Oct 20, 2025
The widespread accessibility of biotechnological tools, particularly those outside traditional research environments, complicates biosecurity enforcement and increases the risk of malicious actors misusing biological materials. Advances in gene editing and artificial intelligence (AI), the rise of do-it-yourself and biohacking movements, and fragmented oversight mechanisms exacerbate that risk. This evolving landscape necessitates proactive measures to protect health and national security by better securing the biological supply network.
In this report, the authors explore critical points within the biological supply network that bad actors, especially nonstate actors, might exploit to develop biological weapons. The authors provide an overview of the existing biosecurity landscape in the United States and, after developing a threat model, examine tactics that malicious actors could use to exploit security gaps and avoid monitoring and detection.
The authors interviewed subject-matter experts, including biosecurity specialists, biodefense policy experts, synthetic biology experts, and working laboratory scientists, to gather insights on potential chokepoints in the biological supply network and identify areas of intervention. Specifically, the authors and experts assessed the biological supply network products and services that malicious actors would most likely target to build a weapon and, therefore, would be the best to monitor to detect misuse. The authors use their findings and the experts' insights to develop recommendations for enhancing data collection, regulatory oversight, and overall threat mitigation.
This research was independently initiated and conducted by the Meselson Center within RAND Global and Emerging Risks.
This publication is part of the RAND research report series. Research reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND research reports undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.