Genome may be future step for virus writers

Gene genie

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Advances in genetic circuits may mean that virologists will have to look at the mechanics of Internet worms for a model of future threats.

Recent technological advances in so-called genetic circuits have brought closer a world where cells and viruses could be modified to more effectively serve humans, but also have raised concerns that programmable life could lead to a host of tailored threats similar to Internet worms.

In a paper in the 28 April issue of Nature, researchers at Princeton University and the California Institute of Technology announced that they had successfully modified the genetic code of a group of cells, programming the cluster to form different patterns based on the chemicals present in their environment. The results, while basic, highlight significant advances in the modification of biological organisms, said Ron Weiss, Associate Professor of Electrical Engineering at Princeton and a co-author of the paper.

"Developments are going to move fairly quickly," Weiss said. "At some point, we will have very good control over biological organisms, maybe to the level that we are with computers today."

While computer scientists have modeled virtual life in simulation, the new programming techniques could mean that simple, tailored-made life could be a few decades away. The current stage of development is analogous to the state of transistor research in the late 1940s and early 1950s, Weiss said. He and his colleagues have already created the biological equivalent of many logical components common in the digital world, such as AND, NAND, and NOR gates.

Significant strides are being made in related fields as well. In July 2002, researchers at State University of New York at Stony Brook announced they had recreated the polio virus using a DNA mapping downloaded from a genome database accessible on the Internet. And last December, a Harvard Medical School doctor teamed with a University of Houston researcher to create a DNA molecular chain of 14,500 chemical units, about twice that of the polio virus, effectively increasing the biological equivalent of program length.

The goal is the beneficial modification of organisms to serve specific functions, Weiss said. Plants could be modified to act as detectors of dangerous chemicals and pathogens, and specialised cells could be created to deliver non-differentiated stem cells to help regenerate tissue.

He acknowledges, however, that the technology could be abused. "With any powerful technology we have to be very careful of what we do," he said.

Yet, if the proliferation of tailored-made Internet threats is any measure, tinkering with biological code could draw a host of malicious coders. Rather than programming in 0s and 1s, future virus writers might use messenger RNA, transcription controls and segments of DNA as code. Like digital viruses, programmable pathogens would evolve through malicious modification and specialised vaccines might be necessary.

Moreover, just as the communications speed of the Internet and indirect connections to poorly secured systems lead to the rapid propagation of worms, the increasing accessibility by aircraft to parts of the world with limited medical care could lead to faster spread of viruses, both natural and man-made, said Jimmy Kuo, a research fellow for antivirus firm McAfee.

"Physical viruses have been spreading for eons through contact," he said. "Over the past century, we have increased the level of contact and that has helped viruses spread."

Until now, custom biological viruses have been the realm of science fiction. In his book Blood Music for example, author Greg Bear depicted a modified virus that accidentally spread throughout the world, changing the ecosystem. Other authors have tackled the theme of viruses that have been modified to target a single gender or race.

Just like digital viruses that target certain vulnerabilities, operating systems, or even users - the current crop of Trojan horse programs targeting bank customers are a good example - biological viruses could be made to focus on a single genetic pattern.

The potential for such specificity to become reality has worried some experts in the bioweapons field. The technology that will allow rogue scientists to target specific DNA sequences in the human genome is rapidly being developed, the British Medical Association said in a paper published in October 2004.

"While it can be hoped that ethnically specific weapons will never become a reality, it would be foolish to imagine that they are an impossibility or that incredibly precise targeting might not become possible," Malcolm Dando, Professor at the University of Bradford and a co-author of the 2004 BMA report, stated in an earlier version of the report.

The current solution is to limit access to the materials and knowledge to modify viruses. With the specialised knowledge needed to research such complex fields comes a solid understanding of the risks, said McAfee's Kuo. This coupled with restricted access to the necessary equipment and materials could reduce the threat greatly.

Princeton's Weiss agreed.

"There has been some talk in the community about limiting some of the precursors to DNA synthesis," he said. "Right now, if you are a bioterrorist, it's far easier to take something that people already know is toxic and work with that.

Yet other experts believe that controlling genetic programming and bioweapon technology will be significantly more difficult than other non-proliferation efforts, such as attempts to control the spread of nuclear and chemical weapons.

"Any biological nonproliferation regime will necessarily be less robust than its nuclear counterpart, because much of the relevant material, technology and knowledge is already far more widely distributed and will become more so in the coming decades," Christopher Chyba, Co-Director of Stanford University's Center for International Security and Cooperation, wrote in a 2002 paper on biological security.

In the article, Chyba pointed to the failure to contain most Internet threats as a picture of what is to come, stating that biological security is second only to cybersecurity in the difficulty the field poses for standard nonproliferation measures. He declined to comment for this article.

Copyright © 2005, SecurityFocus logo

Related stories

Users untouched by mobile viruses despite hype
World Cup worm gives Windows users the willies
Trojan attack exploits Google typos

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story


Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.