Biomedical Defense Principles to Counter DNA Deep Hacking

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Biomedical Defense Principles to Counter DNA Deep Hacking presents readers with a comprehensive look at the emerging threat of DNA hacking. Dr. Rocky Termanini goes in-depth to uncover the erupting technology being developed by a new generation of savvy bio-hackers who have skills and expertise in biomedical engineering and bioinformatics. The book covers the use of tools such as CRISPR for malicious purposes, which has led agencies such as the U.S. Office of the Director of National Intelligence to add gene editing to its annual list of threats posed by "weapons of mass destruction and proliferation."

Readers will learn about the methods and possible effects of bio-hacking attacks, and, in turn the best methods of autonomic and cognitive defense strategies to detect, capture, analyze, and neutralize DNA bio-hacking attacks, including the versatile DNA symmetrical AI Cognitive Defense System (ACDS). DNA bio-hackers plan to destroy, distort and contaminate confidential, healthy DNA records and potentially create corrupted genes for erroneous diagnosis of illnesses, disease genesis and even wrong DNA fingerprinting for criminal forensics investigations.

Author(s): Rocky Termanini
Publisher: Academic Press
Year: 2022

Language: English
Pages: 381
City: London

Front Cover
Biomedical Defense Principles to Counter DNA Deep Hacking
Biomedical Defense Principles to Counter DNA Deep Hacking
Copyright
Dedication
Contents
About the Author
Acknowledgment
1 - The miraculous architecture of the gene pyramid
My name is DNA
Initial thoughts
Anatomy of DNA
Watson and crick story
DNA double helix
What is a gene?
What is the chromosome?
Chromosomes in forensics
The central dogma
Proteins
Amino acid
RNA structure
Transcription (phase-1 of central dogma)
The transcription process
Translation (phase-2 of central dogma) process
Anatomy of CRISPR machine
CRISPR structure
Drawbacks and unethical issues
Bio-hacking CRISPR, cracking the biological atom
CRISPR cyber hacking
Appendix
Appendix-A: Glossary of DNA (courtesy MERIT CyberSecurity technical library)
Appendix-B: Landmine Nobel sweet irony
Appendix-C: CRISPER pioneers
Recommended sources
2 - History of bio-hackers, psychological profiling, and fingerprinting of the bio-hacker
The chemistry of DNA bio-hacking
Hackers wear four colorful hats
The emergence of DNA bio-hacking
Hall of fame of DNA bio-hackers
Advanced DNA bio-hacking technologies
The cloud of malware of DNA bio-hacking
Eysenck's theory
Profiling, Dr. Edward Jones, our actor
Our hypothetical DNA lab
A change of belief
Dr. Edward's DNA-hacking rationale
Data guardian turned into hacker
The ``toxic stress'' syndrome
DNA-hacker fingerprinting
The crime databases
The combined DNA index system (CODIS)
The national crime information center DB (NCIC)
How does ransomware work?
The story of the recent North Korean WannaCry ransomware attack
What's the next step for Dr. Edward?
Appendices
Appendix-A Glossary: Courtesy of The National Academies of Sciences, Engineering, and Medicine
Notes: Hans Eysenck
Recommended sources
3 - The E. coli story as the carrier of DNA malware code
What is Escherichia coli (E. coli)?
Defense by offense
The CRISPR-Cas immunity projects
CODIS data bank structures
The malicious code injection method
Dr. Edward's bio-attack plan
Strategic attack timeline
Anatomy of spyware
Spyware's spying process
Digital malware data destruction process
DNA sequence malware setup
DNA fingerprinting
Design of the DNA sequence malware
The drone flight for malware delivery
DNA genome browser
Genome browser users
Appendices
Appendix-A SQL storage on DNA
Appendix-B SQL command converted to DNA code
Appendix-C DNA profiling (fingerprinting) technology
Appendix-D how to convert gene sequence into protein
Appendix-E the BLAST browser
Appendix-F glossary of genome technology extracted from MERIT cybersecurity library
Recommended sources
4 - CRISPR the magical knife, the good, the bad, and the ugly
A warmup thought
Crystal balling the future with blurry vision
Game-changing discovery, an eureka moment
Doudna and Charpentier get nobel
Historical CRISPR ovation
CRISPR the new sunrise of gene editing
The grim side of CRISPR
The partners who are racing for bio-genetics fame
Jennifer A. Doudna
Emmanuelle Charpentier
Feng Zhang
Embryo concerns
A crack in the creation
Doudna meets Charpentier
Nobel 2020 winners in chemistry
CRISPR timeline
The impossible became possible
The Frankenstein unfortunate legacy
Genetic manipulation gone awry
He Jiankui, China's Dr. Frankenstein
Who is He Jiankui?
Lulu and Nana
Appendices
Appendix-A: the human genome
The Human Genome Project (HGP)
Appendix-B: CRISPR glossary from MERIT cybersecurity archive library
Recommended sources
5 - The genome vandalism. ``When ISIS meets CRISPR''
A precious thought
The next generation of bio-hacking
ISIS, the army from hell
ISIS was born
The bitcoin story
Bio-hacking is a money-making service
ISIS meets CRISPR
CRISPR 101
DNA 101
DNA physical and sequence data banking
DNA ecosystem
Anatomy of DNA synthesizers
Anatomy of DNA sequencers
Anatomy of CRISPR
Miraculous power of CRISPR
Autonomy of the human genome (NHG)
Mapping of the genome
Hard copy of the genome
Bio vandalism and genetically engineered bioweaponry-the new paradigm shift
Bio-hacking strategies and tools
Hacking the prison computer systems, it really happened
CRISPR the unethical sawing machine, gene-editing babies
SARS-CoV-2 omicron variant
The virus started in Wuhan, China
Generating malicious DNA sequence
DNA forensics, going back in time with reverse bio-hacking
Genome vandalism
Hacking the human genome databases
What are the databases
Bio-hacking DNA ecosystem
Bio-hacking DNA data storage
The Trojan horse saga
The Trojan horse malware
The ransom formula
The Dillinger ransome
DNA bio-hacking with website-powered ransom attack
DNA bio-hacking with SQL injection (SQLI) attack
DNA bio-hacking with microchip
A word on RFID
DNA bio-hacking with external buffer overflow payload
DNA bio-hacking with internal sequenced malicious binary
Appendices
Appendix-A: Strategic terms used in DNA cyber hacking
Appendix-B: The national center for biotechnology information (BCBI)
Appendix-C: Immune-system arms race
Appendix-D: DNA data format
Recommended sources
6 - The E. Coli plasmids and COVID-19 saga, loaded directly into DNA
DNA the new beast
Anatomy of coronavirus
Bio-hacking DNA with COVID-19
The CORONA attack (Act-1)
The CORONA attack (Act-2)
Neuro-invasion of COVID-19 in the human brain
E. Coli physical transport (spyware delivery)
Pathogens transported into DNA lab
Lab definitions
DNA bio-hacking with FASTQ method
Appendices
Glossary of COVID-19-from MERIT CyberSecurity consulting
References
7 - DNA fingerprinting, biohacking-as-a service to alter criminal records from DNA national Banks
God created the fingers, we created the DNA fingerprinting
DNA is the Holy Grail
DNA profiling is the enemy of privacy
Bio-medical engineering and bio-informatics
Definition of forensic science
In the beginning we had fingerprints
Definition of human fingerprinting
IAFIS-the integrated automated fingerprint identification system
AFIS (automated fingerprint identification system) record layout; hacking IAFIS system
The million stolen fingerprints
DNA profiling
Mitochondrial DNA
The two bio-hacking scenarios
Scenario-1: hacking the combined DNA index system (CODIS)
Introduction
Architecture of the almighty CODIS
NDIS the smart DNA indexing engine of CODIS
CODIS technology and DNA analysis
Biohacking-as-a-service (BhaaS) organizations
The strategy of attack on CODIS
CODIS vulnerabilities
REDIS: remote dictionary server (Redis)
CODIS management
CODIS storage stats
Hacking CODIS execution
Hacking the combined DNA index system (CODIS)
Scenario-1 hacking CODIS DNA criminal database
Hacker's zero day
Scenario-2 hacking genome databanks
Goals for the human genome project (HGP)
Medical implications
The human genome data resources
First step in hacking HGP: knowing the CODIS system as a geneticist and system guru
Blast search engine
Important database tools
The cancer moonshot project
Hacking prerequisites
Biometrics technologies
Group-1 biological evidence
Group-2 biometric evidence
Group-3 external evidence
Hacking biometrics technologies
A snapshot of history
The medical examiner system
CODIS
The onion router (TOR) and the dark web
The onion router
The dark web
Appendix
Appendix-A REDIS technology
Appendix-B Glossary of CODIS
ASCII
Accredited laboratory
Administrative removal
Allele
Arrestee
Arrestee hit
Arrestee index
Assessment
Auto searcher
Base pair distance
Benchwork match
Biological child
Biological father/mother
Biological sibling
Cambridge reference
Candidate match
Candidate profile
Case disposition
Case report
Casework laboratory
CJIS-WAN
CMF
CODIS
CODIS administrator
CODIS core loci
CODIS information technology (IT) user
CODIS custodian/supervisor
CODIS user
CODIS user role (in the CODIS software)
Contract laboratory
Control certification form
Cold hit
Composite DNA profile
Convicted offender
Convicted offender index
Convicted offender lab
Convicted offender sample
Convicted offender profile
Conviction match
Criminal justice agency
Criminal history record
DAO
Databank coordinator
DCJS
DCJS match letter
Deduced missing person
Detainee
Detainee index
DNA analysis backlog elimination act
DNA analyst
DNA databank
DNA hits
DNA identification act
DNA profile
DNA record
Elimination sample
Employee
Exact match
Executive law article 49-B section 995
Expert system
Expungement
Familial search
FBI
Forensic DNA laboratory
Forensic DNA profile
Forensic DNA testing
Forensic hit (FH)
Forensic index
Forensic mixture category
Forensic mixture index
Forensic match letter
Forensic partial category
Forensic partial index
Forensic SDIS only category
Forensic SDIS only index
Forensic sample
Forensic targeted
Forensic unknown
Heteroplasmy
High stringency
High stringency match
Homopolymeric regions
Hypervariable region I
Hypervariable region II
Identification aided
Identification confirmed
Identifying information
Identification pending (ID pending)
Index offense
Indictment
Interpreting analyst
Investigating agency
Investigations aided (IA)
Juvenile
Keyboard search
Keyboard search request
Keyboard search result letter
Known sample
Laboratory
Lab-types
LDIS
LDIS only specimen category
LDIS only index
Learning management system (LMS)
Legal (sample)
Legal index
LINKAGE
LINKAGE user
Low copy number or low template DNA analysis
Low copy number specimen category
Low copy number profile
Low stringency
Low stringency match
Marked/unmarked profile
Match
Match confirmation
Match estimation utility
Match manager
Match report
Match stringency
Maternal relative
Methodology
Mis-match (search)
Missing person
Missing person index
Mitochondrial DNA
Mitotype
Moderate match estimation (MME) value
Moderate stringency
Moderate stringency match
NamUs
NCIC
NCIC miscellaneous field
NCIC unidentified person file
NCMEC
NDIS
NDIS standards for acceptance of DNA data
Negative amplification blank
Negative control
Negative reagent blank
NIST
No match
No suspect case
NYPD
NYS CODIS administrator
NYS DNA databank
NYSID number
Obligate allele
Offender
Offender duplicate
Offender hit (OH)
Offender laboratory
Offender match letter
ORI
Other (pattern)
Ownership
Partial locus
Partial match
Paternal relative
Pedigree tree (index)
Pending
Perpetrator
Personally identifiable information
Platform
Positive human DNA control
Popstats
Privacy act
Proficiency testing
Qualified auditor
Qualified DNA analyst
Quality assurance
Quality control
Ranks
Reference sample
Relatives of missing person (index)
Requesting laboratory
Required allele
Required alleles specimen category (no longer exists under this name)
Revised Cambridge reference sequence (rCRS)
``Scientific reason''
SDIS
SDIS custodian
Search
Search stringency parameters
Search results
Searcher
Single typed node
Specimen/sample
Specimen category
Specimen ID
Specimen manager
Spouse
Spouse index
State defined #1, 2, 3, 4, five
Statute of limitation
Stringency
Subject index
Submission form
Submitting agency
Suspect
Suspect case
Target DNA profile
Technical leader
Technology
Unidentified human (remains) index
Unidentified person
Upload
User
Use and dissemination agreement
Waiting for more data
Warm match/hit
XML format
Appendix-C glossary of the dark web
Alias
Bitcoin
Blockchain
Carding
Clearnet
Cryptocurrency
Darknet
Doxing
Encryption
Firewall
Honeypot
IP address (aka internet protocol)
Malware
Sandbox
Spoofing
Tor (aka the onion router)
VPN
Appendix-C the onion router (TOR) glossary
Appendix-D the open system interconnection (OSI) model
Recommended sources
8 - How to select a DNA bio attack. How to plan it, assess its damage, and its vulnerability
DNA bioweaponry and DNA bio-hacking warfare
CRISPR the two-edged sword
CRISPR is the new DNA bio-bomb
Life-extension and age reversing euphoria
Why is synthesis biology the right arm for bio-hacking?
Bio-hacker hacking qualifications
Bio-hack method-1(Boobytrap)
Bio-hack method-2 (remote control)
Stuxnet the devil's terminator
Stuxnet missile architecture
Now we have DNAxnet
DNA bio-hacking categories
DNAxnet work of the devil
The possibilities to hack DNA databanks
Josiah Zayner ``the first body biohacker'' story
Zayner's pioneering work
The awesome postmortem bio-hacking story
Evaluation of the critical success factors (CSF) for DNA bio-hack mission
DNA bio-hack success factors
Factor-1: criticality of the mission, exhibited in the critical success factors
Factor-2: evaluation the risk in DNA bio-hack mission
Factor-3: evaluation of the vulnerability in DNA bio-hack mission
Evaluation of success in DNA bio-hack mission
Appendices
Appendix-A Chinese scientist who produced genetically altered babies
Making gene editing an equal playing field
Appendix-B the story of stuxnet, the missile from hell
Appendix-C glossary of hacking terms list of important terms used in the field of hacking
Recommended sources
9 - The drone technology, transport strategy, and risk evaluation, and biomedical revolution
Introduction
Stepping a little deeper into DNA forensics
The world of biohackers
Knowing thy enemy
Nanotechnology the new paradigm shift
Nano technology, the sunrise of the future
The nano DNA bio-hacking, a new disruptive technology
Internet-of-Nano-Things (IoNT), the next thing in bio-hacking
CODIS, the DNA crime profile system, the crime magnifier
Memorandum of attach agreement with bio-hacking organization
Strategy of attack of the nano Bio-drone
Stage-1: Attack planning and engineering
Stage-2: Drone flight
Stage-3: bio-hack episode
Targeted Killing with nano drones-the new DNA vandalism
The launch of the nano DNA bio-drone attack
Anatomy of the nano DNA biohack drone
Anatomy of Nano-DNAxnet, the futuristic biohack nano chip
Engineering of the DNAxnet nanochip
DNAxnet nanochip components
DNAxnet missile design specifications
REDIS/CODIS technology
Functionality of the zookeeper, the frontend traffic coordinator
Functionalities of the CODIS/proxies, the smart IP filter
Functionality of CODIS load balancer
Functionalities of the REDIS Sentinel
REDIS memory specifications
CODIS transaction sequence
The nano DNA-bio-drone attack
Strategy of the attack
Launching the attack
DNAxnet delivery on board the nano-drone
Then, what happened after the hack
Removing CODIS records is slippery slope
The digital immunity ecosystem (DIE) and The Smart Vaccine
Appendix
Appendix A
Appendix B
References
10 - Drone delivery methods and how to communicate with the destination
History of drones
Nanotechnology, the sunrise is so bright
Bio-hacking services adopted drone nanotechnology
Give law enforcement a hand
Quantum computers, quantum supremacy
Quantum computing, the fertile ground for bio-hackers
Nano quantum computing
Delivery methods
Weaponized Nano Bio-Hacking (WNBH)
Quantum droning and delivery
Quantum Network
Everything is connected
Appendices
Appendix-A: god and time
Appendix-B: Shor's algorithm in the quantum computing
Appendix-C: Glossary of quantum computing: National Academies of Sciences, Engineering, and Medicine. 2019.
Recommended sources
11 - The DNAxnet Bio warfare and evaluation of its impact
What is DNA bio-hacking-as-a-service?
Stuxnet is the devil's key to hell
The bio DNAxnet, the fruit from hell
The attack scenario
Design of the bio DNAxnet nano-chip
Bio DNAxnet missile uses UNIX
How did the bio-hackers simulate the attack?
Environmental data
Hacking background and technical experience
Results of the bio-hacking simulation model
The dashboard screen
The activity screen
The graphics screens
The launch of the DNAxnet Trojan daemon
Post attack impact and tracking the CODIS sabotage
Biohack risk computation
Further bio-hacking success formulas
Criticality is determined by number of components
What is criticality?
What is severity?
Human critical survivability
Appendices
Appendix-A the complete story of stuxnet
Two attack strategies
The crack in the door
Damages
Historical background
Recommended sources
12 - Storage and execution of DNA contaminated code
We're still on crutches
Even concert walls cry
Solar winds crater
The central dogma
Stepping into God's domain, CRISPR gene editing
Anatomy of CRISPR, the two-edge sword
This is how CRISPR works
A snap of CRISP history
CRISPR the tool to hack the human genome
Injecting bio-malware with CRISPR
The three contamination attack scenarios
Scenarios of DNA genes contamination and distribution
Appendices
Appendix-A: Glossary Of DNA And Protein (Courtesy of the National Center for Biotechnology Information); MERIT CyberSecurit ...
Appendix-B: Glossary of CRISPR (Courtesy of the US Library of Medicine)
Appendix-C: Glossary of Genetics (From MERIT Bio-Engineering Library)
Recommended sources
13 - Encryption technology and camouflaging contaminated DNA-code injection
In the beginning, there was Caesar's cipher
Interesting facts about the man who broke the Enigma-Alan turing
Alain Turing the hacker
The universal Turing machine, the granddaddy of computing
DNA gene bio-hacking technologies
DNA bio-hacking with cryptography (first camouflage technology)
DNA bio-hacking with cryptography, the holy grail of bio-hackers
The Rosetta Stone story
Bio-hackers the DNA Houdinis
DNA bio-hacking with watermarking, (second camouflage technology)
Bio-hackers and advantages of watermarking
Watermarking and masking optimization
Steganography background
DNA bio-hacking with steganography-(third camouflage technology)
Bio-hackers are playing the war drums
The CODIS penetration plan
CODIS bio-hacking process
Bio-hacking with quantum cryptography
Advantages of QC and quantum key distribution
Bio-hackers are the masters of quantum key distribution (QKD)
Bio-hacking reaction to quantum computing
Google's quantum computer, the Sycamore
Bio-hacking attack manifesto
Bio-hacking with blockchain
A slide of history
Bio-enterprise-hackers, getting ready for bitcoin and blockchain
Appendix
Appendix-A: Quantum Cryptography Glossary. National Academies of Sciences, Engineering, and Medicine. 2019. Quantum Computi ...
Recommended sources
14 - Forecast and detection of DNA surprise bio-attacks, bio-defense and eradication. How to secure DNA data files
Bio-attack since the beginning of time
The Plague of Kaffa
Detection of surprise DNA bio-attack
The story of GenBank DNA sequence database
Building an autonomic AI-centric smart system to stop DNA bio-attack
The DNA bio-response
Could DNA protect itself?
Government response to DNA bio-attack
The DNA bio-hacking achilles' heel
America is facing new type of bio-attack
The view Covid-19 attack for DNA sabotage
Biotechnology impact on bio-hacking
The new plan for a national Bio-Defense Department (BDD)
Architecture of the National DNA Defense Center Against the Unknown (NDDATU)
Security measures of The National DNA Defense Center against the Unknown (NDDCATU)
A look at the quantum computing
How does quantum entanglement work?
How does quantum teleportation work?
Teleportation by optical tweezers
Human teleportation, what?
Our daily digital computers razzle dazzle will soon rest in peace
Appendix
Appendix-A: The SARS-CoV-2, National Institute of Allergy, and Infectious Diseases (NIAID)
Profile of the Covid-19
Coronavirus-2, The Delta variant
Appendix-B: NCBI's GenBank Reactor … The source of medical knowledge
Recommended source
15 - How to reverse engineer DNA and quantum bio-attacks
Reverse engineering, tool of survival
Anatomy of a DNA bio-hacking
Anatomy of our DNA
What is cryonics, death-2-life reverse engineering
Bio-hackers love DNA treasures
How to reverse engineer a DNA bio-attack
Bio-hackers will simulate the future of the attack
Portfolio of bio-hacking attacks
The Turin reverse-engineering process that saved the war
Cracking the Enigma
Reverse engineering is breakdown, copy and rebuild engineering
Reverse engineering strategy in DNA bio-hacking
The four steps of reverse engineering
Reverse engineering-reformulation-find from known protein the proper DNA
Reverse-engineering implementation in quantum bio-attacks
Digital circuitry and phenomenon of Moore's law
And then, quantum computing prevailed
How can bio-hacking penetrate quantum computing
Bio-hacking strategic plan of attack
Bio-hacking organizations attack targets
Anatomy of the quantum computer
Quantum hardware
Software and tutorials from quantum computer hardware providers
Quantum software and quantum programming
Finally, quantum internet (QI), the favorite for bio-hacking
The future dream
Goals of bio-hacking organizations for quantum computing and quantum internet
The other surprise, quantum internet of things
Bio-hacking organizations are going after the Quantum Internet of Medical Things (QIoMT)
Now the quantum cloud, capital of the quantum Internet of Medical Things (IoM)
Design of quantum bio-hack applications for Internet of Medical Things (IoMT)
Design of the quantum Internet of Medical Devices (IoMD), the medical yellow pages
Testing the quantum killer application with simulation
The architecture of a bio-med data center model
Appendix
Appendix-A: software companies that have Software Development Kits (SDKs) for quantum computing
Appendix-B: companies giving access to quantum computers
Appendix-C: technical comparison between classical software and quantum software
Recommended sources
16 - CRISPR controversy with religion and ethics advocates to control evolution and embryology enhancement, and to ...
A thought from the launch pad
CRISPR anatomy
CRISPR the silent guillotine apparatus
Bio-hackers are getting ready to use biological weapons
Drones have become part of the bio-weaponry
Let's not forget Dr. Zhang contribution in CRISPR
CRISPR best invention in the world
Peace between science and religion-injecting ``scriptural'' DNA into the body
The Adrien Locatelli Saga
Stepping into the domain of god
CRISPR's religion enigma
Playing hard ball CRISPR
Bio-academia, intelligence enhancement, better education
The blessing of bacteria
What is more important DNA or religion (extracted from the telegraph 3-3-2019)
Bio-hacking affinity for CRISPR
Some atheistic arrogance
The Dr. Francis Collins defense, director of the national institutes of health
He Jiankui gene-editing scandal
Religious communities are not happy
Dr. Crick and Churchill arguments
Nobel scientist happy to ``play god'' with DNA
Now religion speaks about DNA
Conflict between science and religion on evolution
Where does CRISPR fit between creation and evolution
FranCoise Baylis
Weighing CRISPR on the scale
Concluding thoughts
Religion fighting religion
Appendices
Appendix-A: Glossary of CRISPR
Appendix-B: Watch: meet one of the world's most groundbreaking scientists. He is 34
Recommended sources
Epilog
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
Z
Meet Dr. Josiah Zayner, the Pasteur of biohacking…
Back Cover