ebook img

Biomedical Defense Principles to Counter DNA Deep Hacking PDF

384 Pages·2022·14.413 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Biomedical Defense Principles to Counter DNA Deep Hacking

Biomedical Defense Principles to Counter DNA Deep Hacking This page intentionally left blank Biomedical Defense Principles to Counter DNA Deep Hacking Rocky Termanini Academic PressisanimprintofElsevier 125London Wall,LondonEC2Y5AS,UnitedKingdom 525BStreet,Suite1650,SanDiego,CA92101,UnitedStates 50HampshireStreet,5thFloor,Cambridge,MA02139,UnitedStates TheBoulevard,Langford Lane,Kidlington,OxfordOX5 1GB,UnitedKingdom Copyright©2023ElsevierInc.Allrightsreserved. Nopart ofthispublicationmay bereproduced ortransmitted inanyform orbyanymeans, electronicor mechanical,including photocopying, recording,oranyinformation storageandretrieval system,withoutpermission inwritingfromthepublisher. Details onhowtoseek permission, furtherinformation aboutthePublisher’spermissions policiesandourarrangements withorganizations suchastheCopyrightClearance CenterandtheCopyrightLicensingAgency,canbefoundatourwebsite: www.elsevier.com/permissions. Thisbookandtheindividual contributionscontainedinitareprotected undercopyrightbythePublisher (otherthanasmay benotedherein). Notices Knowledgeandbestpracticeinthisfieldareconstantlychanging. As newresearchandexperiencebroadenourunderstanding, changesinresearch methods,professional practices,ormedical treatmentmay becomenecessary. Practitionersandresearchers mustalwaysrelyontheir ownexperience andknowledgeinevaluatingandusingany information,methods,compounds,orexperiments describedherein. Inusingsuchinformation ormethodsthey shouldbe mindfuloftheirown safetyandthesafetyofothers,including partiesforwhom theyhaveaprofessional responsibility. Tothefullestextentofthelaw,neither thePublishernortheauthors,contributors, oreditors, assumeany liabilityforany injuryand/ordamagetopersonsorpropertyasamatterofproductsliability,negligence orotherwise,or fromanyuseor operation ofanymethods,products, instructions,or ideascontainedinthematerialherein. ISBN:978-0-323-99914-4 Forinformation onallAcademic Presspublications visitourwebsite at https://www.elsevier.com/books-and-journals Publisher:Mara E.Conner Acquisitions Editor: ChrisKatsaropoulos EditorialProjectManager:Emily Thomson ProductionProjectManager:Sajana DevasiP K CoverDesigner: Mark Rogers TypesetbyTNQTechnologies Dedication The Success Chariot Victory Lap I dedicate this book to my three fixtures of my life. First, my wife who is a formidable powerhouse with sparkling energy all day all the time. She is a driving force in writing and completing this wonderful subject of DNA Hacking. Second, my daughter Nadia Hinedi, the high-spirited attorney who shines with dynamic maturity, intellectual eloquence, and judgmental brilliance. Third, my son Dr. Sami Termanini MD for his audacity to climb the mountain of life, the tenacity of a marathon runner to overcome all unknown barriers, and his courage to believe he is tougher than life. God gives his hardest battles to his strongest soldiers. Despite the pandemic that has still its arms around us, few people deserve a standing ovation and a medal of Honor: My Senior Acquisitions Editor Chris Katsaropoulos, Ana Claudia Garcia, my Senior Project Editor Ms. Emily Thompson, my Content Manager Sajana Devasi PK, and Mr. Mohanraj Rajendran Copyrights Coordinator. This page intentionally left blank Contents About the Author xv The emergence of DNA bio-hacking 16 Acknowledgment xvii Hall of fame of DNA bio-hackers 16 Advanced DNA bio-hacking technologies 18 1. The miraculous architecture of The cloud of malware of DNA bio- the gene pyramid hacking 19 My name is DNA 1 Eysenck’s theory 20 Initial thoughts 1 Profiling, Dr. Edward Jones, our actor 20 Anatomyof DNA 1 Our hypothetical DNA lab 21 Watson and crick story 2 A change of belief 21 DNA double helix 2 Dr. Edward’s DNA-hacking rationale 21 What is a gene? 3 Data guardian turned into hacker 22 What is the chromosome? 3 The “toxic stress” syndrome 23 Chromosomes in forensics 3 DNA-hacker fingerprinting 23 The central dogma 3 The crime databases 24 Proteins 4 The combined DNA index system Amino acid 5 (CODIS) 24 RNA structure 5 The national crime information center DB Transcription (phase-1of central dogma) 5 (NCIC) 25 The transcription process 5 How does ransomware work? 25 Translation (phase-2 of central dogma) The storyof the recent North Korean process 5 WannaCry ransomware attack 25 Anatomyof CRISPR machine 6 What’s the next step for Dr. Edward? 26 CRISPR structure 7 Appendices 26 Drawbacks and unethical issues 8 Appendix-AGlossary: Courtesyof The Bio-hacking CRISPR, cracking the National Academies of Sciences, biological atom 8 Engineering, and Medicine 26 CRISPR cyber hacking 9 Notes: Hans Eysenck 29 Appendix 9 Recommended sources 29 Appendix-A: Glossary of DNA (courtesy E. coli MERIT CyberSecurity technical 3. The story as the carrier of library) 9 DNA malware code Appendix-B: Landmine Nobel sweet What is Escherichia coli (E. coli)? 31 irony 12 Defense by offense 32 Appendix-C: CRISPER pioneers 13 The CRISPR-Cas immunity projects 33 Recommended sources 13 CODIS data bank structures 33 The malicious code injection method 33 2. History of bio-hackers, psychological Dr. Edward’s bio-attack plan 34 profiling, and fingerprinting of the Strategic attack timeline 34 bio-hacker Anatomyof spyware 35 Spyware’s spying process 36 The chemistryof DNA bio-hacking 15 Hackers wear four colorful hats 16 Digital malware data destruction process 36 vii viii Contents DNA sequence malware setup 36 Appendix-B: CRISPR glossary from MERIT DNA fingerprinting 36 cybersecurityarchive library 58 Design of the DNA sequence Recommended sources 61 malware 37 The drone flight for malware delivery 37 5. The genome vandalism. “When ISIS DNA genome browser 37 meets CRISPR” Genome browser users 38 A precious thought 63 Appendices 39 The next generation of bio-hacking 63 Appendix-A SQL storage on DNA 39 ISIS, the army from hell 64 Appendix-B SQL command converted to ISIS was born 65 DNA code 40 The bitcoin story 65 Appendix-C DNA profiling (fingerprinting) Bio-hacking is a money-making technology 40 service 66 Appendix-D how to convert gene sequence ISIS meets CRISPR 66 into protein 41 CRISPR 101 66 Appendix-E the BLAST browser 42 DNA 101 67 Appendix-F glossary of genome technology DNA physical and sequence data extracted from MERIT cybersecurity banking 70 library 42 DNA ecosystem 70 Recommended sources 43 Anatomyof DNA synthesizers 70 Anatomyof DNA sequencers 71 4. CRISPR the magical knife, the Anatomyof CRISPR 71 good, the bad, and the ugly Miraculous power of CRISPR 72 Awarmup thought 45 Autonomyof the human genome Crystal balling the future with blurry (NHG) 72 vision 45 Mapping of the genome 73 Game-changing discovery, an eureka Hard copyof the genome 74 moment 46 Bio vandalism and geneticallyengineered Doudna and Charpentier get nobel 46 bioweaponrydthe new paradigm Historical CRISPRovation 46 shift 74 CRISPR the new sunrise of gene Bio-hacking strategies and tools 75 editing 47 Hacking the prison computer systems, The grim side of CRISPR 47 it really happened 76 The partners who are racing for CRISPR the unethical sawing machine, bio-genetics fame 49 gene-editing babies 76 Jennifer A. Doudna 49 SARS-CoV-2 omicron variant 76 Emmanuelle Charpentier 50 The virus started in Wuhan, China 77 Feng Zhang 51 Generating malicious DNA sequence 77 Embryo concerns 51 DNA forensics, going back in time with A crack in the creation 52 reverse bio-hacking 78 Doudna meets Charpentier 52 Genome vandalism 78 Nobel 2020 winners in chemistry 52 Hacking the human genome databases 79 CRISPR timeline 53 What are the databases 79 The impossible became possible 53 Bio-hacking DNA ecosystem 80 The Frankenstein unfortunate legacy 54 Bio-hacking DNA data storage 80 Genetic manipulation gone awry 55 The Trojan horse saga 80 He Jiankui, China’s Dr. Frankenstein 55 The Trojan horse malware 80 Who is He Jiankui? 55 The ransom formula 81 Lulu and Nana 56 The Dillinger ransome 81 Appendices 56 DNA bio-hacking with website-powered Appendix-A: the human genome 56 ransom attack 82 The Human Genome Project (HGP) 57 DNA bio-hacking with SQL injection (SQLI) attack 82 Contents ix DNA bio-hacking with microchip 83 AFIS (automated fingerprint identification Aword on RFID 83 system) record layout; hacking IAFIS DNA bio-hacking with external buffer system 106 overflow payload 84 The million stolen fingerprints 107 DNA bio-hacking with internal DNA profiling 107 sequenced malicious binary 84 Mitochondrial DNA 107 Appendices 85 The two bio-hacking scenarios 108 Appendix-A: Strategic terms used in DNA Scenario-1: hacking the combined DNA cyber hacking 85 index system (CODIS) 109 Appendix-B: The national center for Introduction 109 biotechnology information (BCBI) 85 Architecture of the almighty CODIS 109 Appendix-C: Immune-system arms NDIS the smart DNA indexing engine of race 86 CODIS 111 Appendix-D: DNA data format 87 CODIS technologyand DNA Recommended sources 87 analysis 112 Biohacking-as-a-service (BhaaS) E. Coli 6. The plasmids and organizations 112 COVID-19 saga, loaded directly The strategy of attack on CODIS 113 into DNA CODIS vulnerabilities 113 REDIS: remote dictionary server DNA the new beast 91 (Redis) 114 Anatomyof coronavirus 91 CODIS management 114 Bio-hacking DNAwith COVID-19 93 CODIS storage stats 114 The CORONA attack (Act-1) 93 Hacking CODIS execution 115 The CORONA attack (Act-2) 93 Hacking the combined DNA index Neuro-invasion of COVID-19 in the system (CODIS) 116 human brain 94 Scenario-1 hacking CODIS DNA E. Coli physical transport (spyware criminal database 117 delivery) 95 Hacker’s zero day 119 Pathogens transported into DNA lab 96 Scenario-2 hacking genome Lab definitions 96 databanks 120 DNA bio-hacking with FASTQ method 97 Goals for the human genome project Appendices 100 (HGP) 121 Glossary of COVID-19dfrom MERIT Medical implications 122 CyberSecurity consulting 100 First step in hacking HGP: knowing the References 101 CODIS system as a geneticist and system guru 123 7. DNA fingerprinting, biohacking- Blast search engine 123 as-a service to alter criminal Important database tools 123 records from DNA national The cancer moonshot project 124 Banks Hacking prerequisites 124 Hacking biometrics technologies 126 God created the fingers, we created A snapshot of history 126 the DNA fingerprinting 103 The medical examiner system 126 DNA is the Holy Grail 104 CODIS 126 DNA profiling is the enemyof The onion router (TOR) and the dark privacy 104 web 127 Bio-medical engineering and The dark web 128 bio-informatics 104 Appendix 129 Definition of forensic science 104 Appendix-A REDIS technology 129 In the beginning we had fingerprints 105 Appendix-B Glossaryof CODIS 129 Definition of human fingerprinting 105 Biological sibling 131 IAFISdthe integrated automated Appendix-C glossary of the dark fingerprint identification system 105 web 150

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.