InnoHEALTH magazine Volume 3 issue 3 | Page 49

Recently Jean and coworkers (2018) highlighted the risks of using gene sequencing technologies to corrupt the databases by altering sequences or annotations. In this article, computer scientists designed a DNA sample that when sequenced, resulted in a data file which enabled the hacker to control the sequencing computer remotely and gave access to the hacker to make changes in DNA sequences. These alterations could delay a research program acquire and use biological weapon has been significantly eroded.” The security impact of biotech advances goes beyond bioweapon. For example, developments in metabolic pathway engineering also offer opportunities to produce illegal drugs such as heroin. Scientists have already identified how to make the active compounds in other narcotics, such as for cannabis and precursors of LSD. What if terrorist group or a despotic regime tries to spread modified organisms aimed at striking troops, frightening civilians, or putting food production in disarray? The failed attempt of Japanese cult to obtain Ebola strains from South Africa is one such indicator. Over the last five years “technological barriers to Our life sciences community has been traditionally evolved to operate under an insecure system that expects participants to self-regulate with often no monitoring for security threats. Now that DNA sequencing, synthesis, manipulation, and storage are increasingly digitized, there are more ways than ever for immoral agents both inside and outside of the community to compromise security. diseases. Gene editing tools such as CRISPR-CAS9 (Clustered Regularly Interspaced Short Palindromic Repeats associated protein-9 nuclease) are being used globally for quick and precise gene editing. Researchers like to use computers to analyze DNA, operate lab machines and store genetic information. In the health sector, the digitization of biology & metabolic engineering accelerated the development of new vaccines, drugs and painkillers. Agriculture is becoming smarter/digitized, with farmers relying on data- driven decision acquired through sensors planted in the ground, satellites guiding tractor movements and other new practices. But these emerging capabilities come with a whole new category of vulnerabilities and risks. Volume 3 | Issue 3 | July-September 2018 49