Skip to main content

Biomedical Defense Principles to Counter DNA Deep Hacking

  • 1st Edition - December 2, 2022
  • Latest edition
  • Author: Rocky Termanini
  • Language: English

Biomedical Defense Principles to Counter DNA Deep Hacking presents readers with a comprehensive look at the emerging threat of DNA hacking. Dr. Rocky Termanini goes in-depth… Read more

World Book Day celebration

Where learning shapes lives

Up to 25% off trusted resources that support research, study, and discovery.

Description

Biomedical Defense Principles to Counter DNA Deep Hacking presents readers with a comprehensive look at the emerging threat of DNA hacking. Dr. Rocky Termanini goes in-depth to uncover the erupting technology being developed by a new generation of savvy bio-hackers who have skills and expertise in biomedical engineering and bioinformatics. The book covers the use of tools such as CRISPR for malicious purposes, which has led agencies such as the U.S. Office of the Director of National Intelligence to add gene editing to its annual list of threats posed by "weapons of mass destruction and proliferation."

Readers will learn about the methods and possible effects of bio-hacking attacks, and, in turn the best methods of autonomic and cognitive defense strategies to detect, capture, analyze, and neutralize DNA bio-hacking attacks, including the versatile DNA symmetrical AI Cognitive Defense System (ACDS). DNA bio-hackers plan to destroy, distort and contaminate confidential, healthy DNA records and potentially create corrupted genes for erroneous diagnosis of illnesses, disease genesis and even wrong DNA fingerprinting for criminal forensics investigations.

Key features

  • Presents a comprehensive reference for the fascinating emerging technology of DNA storage, the first book to present this level of detail and scope of coverage of this groundbreaking field
  • Helps readers understand key concepts of how DNA works as an information storage system and how it can be applied as a new technology for data storage
  • Provides readers with key technical understanding of technologies used to work with DNA data encoding, such as CRISPR, as well as emerging areas of application and ethical concern, such as smart cities, cybercrime, and cyber warfare
  • Includes coverage of synthesizing DNA-encoded data, sequencing DNA-encoded data, and fusing DNA with Digital Immunity Ecosystem (DIE)

Readership

Graduates, PhD students and lecturers in computer science, biomedical engineering and bioinformatics, as well as scientific researchers in biomedical fields such as genetics

Table of contents

1. Structure of DNA and the landscape of DNA Deep Hacking (DDH)

2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack

3. Code injection and the E. Coli story as the carrier of malware DNA code

4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly

5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code

6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story

7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR)

8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack

9. The Drone technology, Transport strategy and risk evaluation

10. Drone delivery methods, how to communicate with the destination

11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results.

12. Translation and storage of the DNA contaminated code

13. Encryption technology and camouflaging contaminated DNA-code injection

14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files

15. Reverse Engineering technology

16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases
Appendix
Epilogue

Product details

  • Edition: 1
  • Latest edition
  • Published: December 2, 2022
  • Language: English

About the author

RT

Rocky Termanini

Dr. Rocky Termanini, CEO of MERIT CyberSecurity Group, is a subject matter expert in IT security and brings 46 years of cross-industry experience at national and international levels. He received his Ph.D. in Computer Science, Artificial Intelligence, from Yale University. He is the designer of the "Cognitive Early-Warning Predictive System" and "The Smart Vaccine™" which replicates the human immune system to protect the critical infrastructures against future cyber wars. Dr. Termanini spent five years in the Middle East working as a security consultant in Saudi Arabia, Bahrain, and the UAE. Professor Termanini’s teaching experience spans over 30 years. He taught Information Systems courses at Connecticut State University, Quinnipiac University, University of Bahrain, University College of Bahrain, Abu Dhabi University, and lectured at Zayed University in Dubai. Dr. Rocky Termanini is a senior advisor to the Department of Homeland Security and other Federal Law Enforcement agencies, as well as an advisor to the FBI on Cyber-terrorism and global malware. Dr. Termanini was the security manager of the Saudi e-Government project for the Saudi Ministry of Interior. Presently, Dr. Termanini helps companies set up cyber-security plans to protect their information assets and to monitor employee loyalty. He is a visiting professor to several universities in the Persian Gulf region, giving short courses in Digital Forensics and ethical hacking. Dr. Termanini has experience in preparing DARPA solicitations for cyber security grants and is the author of two books on Cybersecurity from CRC Press. He is the author of Storing Digital Binary Data into Cellular DNA: The New Paradigm from Elsevier Academic Press.
Affiliations and expertise
CEO, Merit CyberSecurity Consulting, San Francisco, California, USA

View book on ScienceDirect

Read Biomedical Defense Principles to Counter DNA Deep Hacking on ScienceDirect