2019
DOI: 10.3389/fbioe.2019.00189
|View full text |Cite
|
Sign up to set email alerts
|

On DNA Signatures, Their Dual-Use Potential for GMO Counterfeiting, and a Cyber-Based Security Solution

Abstract: This study investigates the role and functionality of special nucleotide sequences (“DNA signatures”) to detect the presence of an organism and to distinguish it from all others. After highlighting vulnerabilities of the prevalent DNA signature paradigm for the identification of agricultural genetically modified (GM) organisms it will be argued that these so-called signatures really are no signatures at all - when compared to the notion of traditional (handwritten) signatures and their generalizations in the m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
73
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 16 publications
(75 citation statements)
references
References 36 publications
0
73
0
Order By: Relevance
“…Nonetheless, cyberbiosecurity is still in its infancy. There is still limited expertise to fully characterize and assess the emerging cyberbio risks [ 8 ], and it has been recognized that generic cyber and information security measures are insufficient [ [8] , [9] , [10] , [11] , [12] , [13] , [14] ].…”
Section: Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…Nonetheless, cyberbiosecurity is still in its infancy. There is still limited expertise to fully characterize and assess the emerging cyberbio risks [ 8 ], and it has been recognized that generic cyber and information security measures are insufficient [ [8] , [9] , [10] , [11] , [12] , [13] , [14] ].…”
Section: Motivationmentioning
confidence: 99%
“… CP “attackers may cause sensors to report false data or modify algorithms in control systems in ways that can jeopardize product quality, damage manufacturing equipment, and potentially induce occupational hazards.” [ 23 ] CP Regarding “smart labs” of the future: “adjustment of fan speeds in building ventilation systems… can lead to potential exposure of any building occupant to infectious microorganisms or their toxic products, contamination of the facility, or airborne release of pathogens to the surrounding external environment… changes to chemical concentration and/or holding time in liquid effluent decontamination systems which can result in premature discharge of infectious, toxic byproducts or genetically altered microorganisms to the municipal waste stream.” [ 21 ] CP “To obscure the identity and/or functional properties of the final product several biofoundries can be used, each synthesizing seemingly innocuous products representing only a portion of the final product.” [ 5 ] G, U Food, Agriculture, Water “The health and security… of agriculture and food systems is unclear from a cyberbiosecurity perspective. We reason that vulnerable critical links and nodes exist throughout this highly complex global and national ecosystem.” [ 39 ] V “a recent contamination event of an unauthorized GM Bacillus subtilis strain (Paracchini et al, 2017) in Europe could have been - or the same way could be - the consequence of exploiting gaps of prevailing DNA signatures.” “DNA signatures may intentionally be exploited to support the counterfeiting or even weaponization of GM organisms.” [ 14 ] CP,G “The identification and analysis of harmful genetic manipulations to utilize (covertly modified) plants (GMOs and non-GMOs) as an attack vector show that these concerns need to be taken seriously, raising the prospect not only of direct harm, but of the more likely effects in generating public concern, reputational harm of agricultural biotechnology companies, law-suits, and increased import bans of certain plants or their derived products.” [ 40 ] CP,G,U Water security exemplified via harmful algal blooms (HAB): “it is imperative to envision water security from the perspective of a cyber-physical system (CPS).” Attacks on HAB-monitoring systems include “data injection attacks, automated system hijacking attacks, node forgery attacks, and attacks on learning algorithms.” [ 68 ] CP a For the citations within quotations, please see the citing literature for details. …”
Section: The Uniqueness and Challenge Of Cyberbio Protectionmentioning
confidence: 99%
See 3 more Smart Citations