SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Biotech / Medical : Biotech News -- Ignore unavailable to you. Want to Upgrade?


To: Biotech Jim who wrote (6303)8/16/2008 9:20:22 AM
From: Pogeu Mahone  Respond to of 7143
 
University of Massachusetts professor hacks heart device to expose risks

By Jessica Fargen | Friday, August 15, 2008 | bostonherald.com | Local Coverage
A UMass professor has found a way to remotely control an implantable heart defibrillator, proving that hell-bent hackers could some day terrorize the millions of people who rely on the devices to regulate their hearts.

With a homemade $1,000 radio transmitter, researchers were able to reprogram a pacemakerlike device and deliver high-energy shocks that could do all sorts of mischief, from causing a fatal heart attack to extracting personal information such as names and Social Security numbers.

But Kevin Fu, a University of Massachusetts at Amherst professor, said don’t worry yet.

“Our concern is for the future,” said Fu, who co-directs the Medical Device Security Center at UMass and presented the findings at a hacker conference in Las Vegas last week. “Today, the risk is very small. It’s a warning sign.”

Heart-attack prone Vice President Dick Cheney is one of millions of Americans who rely on pacemakers to regulate their tickers. Between 1990 and 2002, 2.6 million pacemakers and defibrillators were implanted.

And the wireless technology is only improving, increasing potential for a heart-pumping security breach.

“Could new devices be hackable? We have no definitive evidence to suggest one way or the other. But we expect the risks to increase as wireless ranges increase,” Fu said. “It’s important to understand the risks so you can protect against them.”

In research made public in March, Fu’s team, using a specially designed radio transmitter placed inches from a 2003 Medtronic defibrillator, proved they were able to hack into the device in a lab.

In reality, the devices are attached to the heart via electrodes that transmit information from the heart. A doctor retrieves the information remotely, sometimes as close as inches or feet away, and makes adjustments.

While still not a concrete threat, worries about the security of medical devices are growing.

A 2007 Food and Drug Administration draft guidance paper on wireless medical device technology warned of the potential for security breaches, but there’s no evidence that threat is real.

“Today, the chance of a patient’s (implantable cardioverter defibrillator) being reprogrammed by a malicious hacker is remote, and the safety and benefit of these devices outweigh the current risk of this kind of interference,” said FDA spokeswoman Peper Long.

Dr. William Maisel, a Harvard cardiologist and director of the Medical Device Safety Institute at Beth Israel Deaconess Medical Center, said the research team is exposing security holes, not giving hackers a how-to manual.

“We think it’s important to think about these types of things,” he said. “We don’t want to leave ourselves and our patients vulnerable.”

A spokeswoman for Medtronic, one of the top pacemaker producers, said although the risk of any patient harm is low, the company takes seriously security risks, such as the one exposed by the researchers.

“This was a very, very controlled environment,” said spokeswoman Tracy McNulty. “It’s never happened in the real world. You would literally have to be standing on top of somebody to make this work.”

She said the company is constantly working on new security technologies.

“There’s a lot of work that goes into ensuring the devices are safe from manipulation,” she said.

Article URL: bostonherald.com

Related Articles:
UMass, DEM reach settlement on water data
/news/regional/general/view.bg?articleid=1112745



To: Biotech Jim who wrote (6303)8/16/2008 6:50:53 PM
From: Gary Mohilner  Respond to of 7143
 
I agree Jim, but I really believe people suffering with terminal diseases deserve not only the right to try experimentation, but also need to sign off on documents deemed legally binding that eliminate the possibility of suing after a negative experimental outcome.

To my way of thinking the FDA is completely wrong in making drugs like Provenge await further data. Drugs need to be approved with conditions that through use will prove they work, or the don't. If they don't the patients trying them are out of choices anyway, other than perhaps some clinical trial, but many people can't or won't go into clinical trials.

In many cases the reason patients choose not to go into clinical trials is they're not being conducted where they live. When someone's given the choice of perhaps living months, or maybe years longer, but treatment is away from family, the real question often becomes, how do you want to spend the remaining time. More sights where such trials can be done might solve some of the issues, perhaps running trials where the family oncologist could administer the treatment all but once every month, or two months, etc would work. I just think that there are better way of getting more people involved in trials or experimentation.

I'm very big on permitting experimentation for those willing to accept it. I don't know if you're familiar with IMGN. If not it's IMGN901 has been in trials for SCLC for years, though right now they believe MM is the quickest course to approval. Preclinically the drug in combination with a Taxane worked extremely well for SCLC, but it's a trial that hasn't been run. IMGN's like so many biotechs, short on funds, running trials slowly to hold down expenditures, however if in an experimental setting this combination were tried, even in a single patient, it might lead to additional trials.

Gary