| 
			
			 The products under review by the agency's Industrial Control Systems 
			Cyber Emergency Response Team, or ICS-CERT, include an infusion pump 
			from Hospira Inc and implantable heart devices from Medtronic Inc 
			and St Jude Medical Inc, according to other people familiar with the 
			cases, who asked not to be identified because the probes are 
			confidential. 
 These people said they do not know of any instances of hackers 
			attacking patients through these devices, so the cyber threat should 
			not be overstated. Still, the agency is concerned that malicious 
			actors may try to gain control of the devices remotely and create 
			problems, such as instructing an infusion pump to overdose a patient 
			with drugs, or forcing a heart implant to deliver a deadly jolt of 
			electricity, the sources said.
 
 The senior DHS official said the agency is working with 
			manufacturers to identify and repair software coding bugs and other 
			vulnerabilities that hackers can potentially use to expose 
			confidential data or attack hospital equipment. He declined to name 
			the companies.
 
 "These are the things that shows like 'Homeland' are built from," 
			said the official, referring to the U.S. television spy drama in 
			which the fictional vice president of the United States is killed by 
			a cyber attack on his pacemaker.
 
			 
			"It isn't out of the realm of the possible to cause severe injury or 
			death," said the official, who did not want to be identified due to 
			the sensitive nature of his work.
 Hospira, Medtronic and St Jude Medical declined to comment on the 
			DHS investigations. All three companies said they take cybersecurity 
			seriously and have made changes to improve product safety, but 
			declined to give details.
 
 CONNECTED DEVICES
 
 ICS-CERT's mandate is to help protect critical U.S. infrastructure 
			from cyber threats, whether they are introduced through human error, 
			virus infections, or through attacks by criminals or extremists.
 
 According to the senior DHS official, the agency started examining 
			healthcare equipment about two years ago, when cybersecurity 
			researchers were becoming more interested in medical devices that 
			increasingly contained computer chips, software, wireless technology 
			and Internet connectivity, making them more susceptible to hacking.
 
 The U.S. Food and Drug Administration, which regulates the sale of 
			medical devices, recently released guidelines for manufacturers and 
			healthcare providers to better secure medical devices and is holding 
			its first public conference on the topic this week.
 
 "The conventional wisdom in the past was that products only had to 
			be protected from unintentional threats. Now they also have to be 
			protected from intentional threats too," said William Maisel, chief 
			scientist at the FDA's Center for Devices and Radiological Health. 
			He declined to comment on the DHS reviews.
 
 The senior DHS official said the two dozen cases currently under 
			investigation cover a wide range of equipment, including medical 
			imaging equipment and hospital networking systems. A DHS review does 
			not imply the government thinks a company has done anything wrong - 
			it means the agency is looking into a suspected vulnerability to try 
			to help rectify it.
 
 One of the cases involves an alleged vulnerability in a type of 
			infusion pump, a piece of hospital equipment that delivers 
			medication directly into a patient's bloodstream. Private 
			cybersecurity researcher Billy Rios said he discovered the alleged 
			bug but declined to identify the manufacturer of the pump. Two 
			people familiar with his research said the manufacturer was Hospira.
 
 Rios said he wrote a program that could remotely force multiple 
			pumps to dose patients with potentially lethal amounts of drugs. He 
			submitted his analysis to the DHS.
 
			
			 
			"This is a issue that is going to be extremely difficult to patch," 
			said Rios, a former Marine platoon commander who has worked for 
			several Silicon Valley technology firms and recently founded 
			security startup Laconicly.
 Reuters was not able to independently review his research or 
			identify the type of pump Rios studied from Hospira's line, which 
			includes multiple models.
 
 Hospira spokeswoman Tareta Adams, while declining to comment on 
			specifics, said the company is working to improve the security of 
			its products.
 
 "Hospira has implemented software adjustments, distributed customer 
			communications and made a commitment to evaluate other changes going 
			forward, while ensuring we are not adversely impacting the ability 
			of our devices to meet hospital and patient needs, and maintain 
			compliance with FDA product requirements," Adams said in the 
			statement.
 
			
            [to top of second column] | 
 
			MORE AWARENESS
 Hospital security officers say there is increasing awareness about 
			cyber threats, and medical centers around the country have been 
			shoring up networks to better defend against hackers.
 
			At the University of Texas MD Anderson Cancer Center, all medical 
			devices will soon need to be tested to make sure they meet security 
			standards before they can be put on the hospital's network, 
			according to Lessley Stoltenberg, the center's chief information 
			security officer.
 "I'm pretty concerned," said Stoltenberg. "Coming out of the block, 
			medical devices don't really have security built into them."
 
 The DHS is also reviewing suspected vulnerabilities in implantable 
			heart devices from Medtronic and St Jude Medical, according to two 
			people familiar with the matter.
 
 They said the probe was based in part on research by Barnaby Jack, a 
			well-known hacker who died in July 2013. Jack had said he could hack 
			into wireless communications systems that link implanted pacemakers 
			and defibrillators with bedside monitors.
 
			Medtronic spokeswoman Marie Yarroll said in an email that the 
			company has "made changes to enhance the security" of its 
			implantable cardiac devices, but declined to give specifics "in the 
			interest of patient safety."
 St. Jude Medical spokeswoman Candace Steele Flippin also declined to 
			discuss specific products but said the company has "an ongoing 
			program to perform extensive security testing on our medical devices 
			and networked equipment. If a risk is identified, we will issue 
			patches for any known issues."
 
 CHENEY'S DEFIBRILLATOR
 
 Experts said it is important that security vulnerabilities in 
			medical devices are exposed so manufacturers can fix them, but many 
			said there was no need for patients to panic.
 
 "It's very easy to sort of sensationalize these problems," said 
			Kevin Fu, who runs the Archimedes Research Center for Medical Device 
			Security at the University of Michigan.
 
			Still, worries about cybersecurity have made some individuals wary 
			of medical devices with wireless and Internet connections.
 
			
			 
			In 2007, then-U.S. Vice President Dick Cheney ordered some of the 
			wireless features to be disabled on his defibrillator due to 
			security concerns. When asked if he would recommend other patients 
			do the same, Cheney said not necessarily.
 
 "You've got to look at all eventualities and do whatever you have to 
			safeguard the capabilities of the individual," Cheney told Reuters 
			on Tuesday. "In terms of how it would affect others, I think the 
			president and vice president are in relatively unique 
			circumstances."
 
 Cyber researcher Jay Radcliffe used to be among the hundreds of 
			thousands of diabetics relying on computerized insulin pumps. He 
			said he stopped using his Medtronic pump after he found that he 
			could hack into its wireless communications system and potentially 
			dump fatal doses of insulin into his body.
 
			"I don't feel safe wearing these devices," said Radcliffe, who works 
			for Rapid7, a security software maker. "It's better for me to stick 
			myself with a needle."
 Medtronic said it has made security improvements to its insulin 
			pumps, though the company declined to give specifics.
 
 George Grunberger, who has led the insulin pump management task 
			force of the American Association of Clinical Endocrynologists, said 
			he believes the benefits of pumps far outweigh any cyber risks, so 
			he would not advise patients to follow Radcliffe's example.
 
 (Reporting by Jim Finkle; Editing by Tiffany Wu)
 
			[© 2014 Thomson Reuters. All rights 
				reserved.] Copyright 2014 Reuters. All rights reserved. This material may not be published, 
			broadcast, rewritten or redistributed. 
			
			
			 
			
			 |