Recently Jean and coworkers
(2018) highlighted the risks
of using gene sequencing
technologies to corrupt the
databases by altering sequences
or annotations. In this article,
computer scientists designed
a DNA sample that when
sequenced, resulted in a data
file which enabled the hacker to
control the sequencing computer
remotely and gave access to the
hacker to make changes in DNA
sequences. These alterations
could delay a research program
acquire and use biological
weapon has been significantly
eroded.” The security impact of
biotech advances goes beyond
bioweapon.
For
example,
developments
in
metabolic
pathway engineering also offer
opportunities to produce illegal
drugs such as heroin. Scientists
have already identified how
to make the active compounds
in other narcotics, such as for
cannabis and precursors of LSD.
What if terrorist group or a
despotic regime tries to spread
modified organisms aimed at
striking
troops,
frightening
civilians,
or
putting
food
production in disarray? The
failed attempt of Japanese cult to
obtain Ebola strains from South
Africa is one such indicator.
Over the last five years
“technological
barriers
to
Our life sciences community
has
been
traditionally
evolved to operate under an
insecure system that expects
participants to self-regulate
with often no monitoring for
security threats. Now that
DNA sequencing, synthesis,
manipulation, and storage are
increasingly digitized, there
are more ways than ever for
immoral agents both inside
and outside of the community
to compromise security.
diseases. Gene editing tools
such as CRISPR-CAS9 (Clustered
Regularly Interspaced Short
Palindromic Repeats associated
protein-9 nuclease) are being
used globally for quick and
precise gene editing. Researchers
like to use computers to analyze
DNA, operate lab machines and
store genetic information. In the
health sector, the digitization of
biology & metabolic engineering
accelerated the development
of new vaccines, drugs and
painkillers.
Agriculture
is
becoming
smarter/digitized,
with farmers relying on data-
driven
decision
acquired
through sensors planted in the
ground, satellites guiding tractor
movements and other new
practices. But these emerging
capabilities come with a whole
new category of vulnerabilities
and risks.
Volume 3 | Issue 3 | July-September 2018
49