- 382 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Biomedical Defense Principles to Counter DNA Deep Hacking
About This Book
Biomedical Defense Principles to Counter DNA Deep Hacking presents readers with a comprehensive look at the emerging threat of DNA hacking. Dr. Rocky Termanini goes in-depth to uncover the erupting technology being developed by a new generation of savvy bio-hackers who have skills and expertise in biomedical engineering and bioinformatics. The book covers the use of tools such as CRISPR for malicious purposes, which has led agencies such as the U.S. Office of the Director of National Intelligence to add gene editing to its annual list of threats posed by "weapons of mass destruction and proliferation."
Readers will learn about the methods and possible effects of bio-hacking attacks, and, in turn the best methods of autonomic and cognitive defense strategies to detect, capture, analyze, and neutralize DNA bio-hacking attacks, including the versatile DNA symmetrical AI Cognitive Defense System (ACDS). DNA bio-hackers plan to destroy, distort and contaminate confidential, healthy DNA records and potentially create corrupted genes for erroneous diagnosis of illnesses, disease genesis and even wrong DNA fingerprinting for criminal forensics investigations.
- Presents a comprehensive reference for the fascinating emerging technology of DNA storage, the first book to present this level of detail and scope of coverage of this groundbreaking field
- Helps readers understand key concepts of how DNA works as an information storage system and how it can be applied as a new technology for data storage
- Provides readers with key technical understanding of technologies used to work with DNA data encoding, such as CRISPR, as well as emerging areas of application and ethical concern, such as smart cities, cybercrime, and cyber warfare
- Includes coverage of synthesizing DNA-encoded data, sequencing DNA-encoded data, and fusing DNA with Digital Immunity Ecosystem (DIE)
Frequently asked questions
Information
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- About the Author
- Acknowledgment
- Chapter 1. The miraculous architecture of the gene pyramid
- Chapter 2. History of bio-hackers, psychological profiling, and fingerprinting of the bio-hacker
- Chapter 3. The E. coli story as the carrier of DNA malware code
- Chapter 4. CRISPR the magical knife, the good, the bad, and the ugly
- Chapter 5. The genome vandalism. âWhen ISIS meets CRISPRâ
- Chapter 6. The E. Coli plasmids and COVID-19 saga, loaded directly into DNA
- Chapter 7. DNA fingerprinting, biohacking-as-a service to alter criminal records from DNA national Banks
- Chapter 8. How to select a DNA bio attack. How to plan it, assess its damage, and its vulnerability
- Chapter 9. The drone technology, transport strategy, and risk evaluation, and biomedical revolution
- Chapter 10. Drone delivery methods and how to communicate with the destination
- Chapter 11. The DNAxnet Bio warfare and evaluation of its impact
- Chapter 12. Storage and execution of DNA contaminated code
- Chapter 13. Encryption technology and camouflaging contaminated DNA-code injection
- Chapter 14. Forecast and detection of DNA surprise bio-attacks, bio-defense and eradication. How to secure DNA data files
- Chapter 15. How to reverse engineer DNA and quantum bio-attacks
- Chapter 16. CRISPR controversy with religion and ethics advocates to control evolution and embryology enhancement, and to eliminate genetically inherited diseases
- Epilog
- Index
- Meet Dr. Josiah Zayner, the Pasteur of biohackingâŚ