Skip to main content

DNA Synthesis Security

  • Protocol
  • First Online:
Gene Synthesis

Part of the book series: Methods in Molecular Biology ((MIMB,volume 852))

Abstract

It is generally assumed that genetic engineering advances will, inevitably, facilitate the misapplication of biotechnology toward the production of biological weapons. Unexpectedly, however, some of these very advances in the areas of DNA synthesis and sequencing may enable the implementation of automated and nonintrusive safeguards to avert the illicit applications of biotechnology. In the case of DNA synthesis, automated DNA screening tools could be built into DNA synthesizers in order to block the synthesis of hazardous agents. In addition, a comprehensive safety and security regime for dual-use genetic engineering research could include nonintrusive monitoring of DNA sequencing. This is increasingly feasible as laboratories outsource this service to just a few centralized sequencing factories. The adoption of automated, nonintrusive monitoring and surveillance of the DNA synthesis and sequencing pipelines may avert many risks associated with dual-use biotechnology. Here, we describe the historical background and current challenges associated with dual-use biotechnologies and propose strategies to address these challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Protocol
USD 49.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Watson JD, Crick FH (1953) Molecular structure of nucleic acids; a structure for deoxyribose nucleic acid. Nature. 171:737–8.

    Article  PubMed  CAS  Google Scholar 

  2. Franklin RE and Gosling RG (1953) Molecular configuration in sodium thymonucleate. Nature 171, 740–741 (1953).

    Article  PubMed  CAS  Google Scholar 

  3. Crick FH, Barnett L, Brenner S, Watts-Tobin RJ (1961) General nature of the genetic code for proteins Nature 192:1227–32.

    CAS  Google Scholar 

  4. Moore, G (1965) Cramming More Components onto Integrated Circuits. Electronics pp114–7.

    Google Scholar 

  5. National Research Council (2006) Committee on Advances in Technology and the Prevention of their Application to Next Generation Biowarfare Threats; Globalization, Biosecurity, and the Future of the Life Sciences. Washington, DC: National Academies Press.

    Google Scholar 

  6. Nouri A and Chyba CF (2008) Biotechnology and biosecurity. In: Bostrom N and Cirkovic MM (eds) Global Catastrophic Risks. Oxford University Press.

    Google Scholar 

  7. Wheelis, M (2002) Biological Warfare at the 1346 Siege of Caffa. Emerg Infect Dis 8:971–5.

    PubMed  Google Scholar 

  8. Unit 731 Criminal Evidence Museum (2005). Unit 731: Japanese Germ Warfare Unit in China. China Intercontinental Press.

    Google Scholar 

  9. Shane S (2010). F.B.I., Laying Out Evidence, Closes Anthrax Case. The New York Times, February 19.

    Google Scholar 

  10. Jackson RJ et al (2001) Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. J Virol 75:1205–10.

    Article  PubMed  CAS  Google Scholar 

  11. Cello JP, Paul AV and Wimmer E (2002) Chemical synthesis of poliovirus cDNA: generation of infectious virus in the absence of natural template. Science 297:1016–8.

    Article  PubMed  CAS  Google Scholar 

  12. Tumpey TM et al (2005) Characterization of the reconstructed 1918 Spanish influenza pandemic virus. Science 310:77–80.

    Article  PubMed  CAS  Google Scholar 

  13. National Academy of Sciences (2003) Biotechnology research in an age of terrorism: Confronting the ‘dual use’ dilemma.5th ed National Academies Press, Washington DC.

    Google Scholar 

  14. Committee on Advances in Technology and the Prevention of their Application to Next Generation Biowarfare Threats, Globalization, Biosecurity, and the Future of the Life Sciences. National Academies Press Washington DC.

    Google Scholar 

  15. The Royal Society (2009) New Approaches to Biological Risk Assessment. Royal Society Policy Document, United Kingdom.

    Google Scholar 

  16. Fu P (2006) A perspective of synthetic biology: Assembling building blocks for novel functions. Biotechnol J 1:690–9.

    Article  PubMed  CAS  Google Scholar 

  17. Gibson DG et al (2010) Creation of a bacterial cell controlled by a chemically synthesized genome. Science 329:52–6.

    Article  PubMed  CAS  Google Scholar 

  18. US President Obama’s letter to his bioethics committee. www.bioethics.gov/documents/Letter-from-President-Obama-05.20.10.pdf.

  19. Chyba CF. (2006) Biotechnology and the Challenge to Arms Control. Arms Control Today. http://www.armscontrol.org/act/2006_10/BioTechFeature.asp.

  20. Church G (2005) Let us go forth and safely multiply Nature 438:423.

    CAS  Google Scholar 

  21. Bugl, H et al (2007) DNA synthesis and biological security Nat. Biotechnol 25:627–629 (2007).

    Article  Google Scholar 

  22. Nouri A and Chyba CF (2009). Proliferation-resistant biotechnology: an approach to improve biological security. Nat Biotechnol 27: 234–236.

    Article  PubMed  CAS  Google Scholar 

  23. National Research Council (2010) Committee on Scientific Milestones for the Development of a Gene-Sequence-Based Classification System for the Oversight of Select Agents, Sequence-Based Classification of Select Agents: A Brighter Line. National Academies Press Washington, DC.

    Google Scholar 

  24. U.S. MSPPSA report on DNA Sequencing Market Analysis (2005/2006). http://www.phortech.com/2005seq.htm.

  25. Franco C (2008). Billions for Biodefense. Biosecurity and Bioterrorism 6:131–146.

    Article  PubMed  Google Scholar 

  26. National Research Council (2009) Committee on Laboratory Security and Personnel Reliability Assurance Systems for Laboratories Conducting Research on Biological Select Agents and Toxins; Responsible Research with Select Agents and Toxins. National Academies Press Washington DC.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Nouri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Sceince+Business Media, LLC

About this protocol

Cite this protocol

Nouri, A., Chyba, C.F. (2012). DNA Synthesis Security. In: Peccoud, J. (eds) Gene Synthesis. Methods in Molecular Biology, vol 852. Humana Press. https://doi.org/10.1007/978-1-61779-564-0_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-61779-564-0_21

  • Published:

  • Publisher Name: Humana Press

  • Print ISBN: 978-1-61779-563-3

  • Online ISBN: 978-1-61779-564-0

  • eBook Packages: Springer Protocols

Publish with us

Policies and ethics