Methods for safely sharing dual-use genetic data
Some genetic data has dual-use potential. Sharing pathogen data has shown tremendous value. For example therapeutic development and lineage tracking during the COVID pandemic. This data sharing is complicated by the fact that these data have the potential to be used for harm. The genome sequence of a pathogen can be used to enable malicious genetic engineering approaches or to recreate the pathogen from synthetic DNA. Standard data security methods can be applied to genetic data, but when data is shared between institutions, ensuring appropriate security can be difficult. Sensitive data that is shared internationally among a wide array of institutions can be especially difficult to control. Methods for securely storing and sharing genetic data with potential for dual-use are needed to mitigate this potential harm.
Genetic Information Insecurity as State of Art
Genetic information is being generated at an increasingly rapid pace, offering advances in science and medicine that are paralleled only by the threats and risk present within the responsible ecosystem. Human genetic information is identifiable and contains sensitive information, but genetic data security is only recently gaining attention. Genetic data is generated in an evolving and distributed cyber-physical ecosystem, with multiple systems that handle data and multiple partners that utilize the data. This paper defines security classifications of genetic information and discusses the threats, vulnerabilities, and risk found throughout the entire genetic information ecosystem. Laboratory security was found to be especially challenging, primarily due to devices and protocols that were not designed with security in mind. Likewise, other industry standards and best practices threaten the security of the ecosystem. A breach or exposure anywhere in the ecosystem can compromise sensitive information. Extensive development will be required to realize the potential of this emerging field while protecting the bioeconomy and all of its stakeholders.
Benefits & Dangers of Genetic Information
Method Comparison
Basics of Molecular Cryptography
Generate Security Tags
DNA can be synthesized into short "tags" that can then be attached to your DNA.
Collect Samples
A group of DNA samples are collected by the lab preparing to apply molecular cryptography.
Securely Tag Samples
Each DNA molecule in each sample receives its own unique DNA tag. Knowledge about which tag belongs to which sample is kept secret.
Combine Samples To Hide Info
When the samples are combined, information from the samples is concealed. The resulting pool of DNA can be analyzed while keeping the data secure.
*patented
What Is Genetic Information?
To understand how to protect genetic data, an understanding of genetic information is required. The following PDF describes various forms of genetic information, and the methods by which this information can be concealed using molecular cryptography.
Artificial Intelligence and the Weaponization of Genetic Data
Advancements in genetics have the ability to rapidly improve medicine, with a number of factors converging to push the integration of genomics into mainstream healthcare. As technologies that use genetic data begin to expand, so does exposure to risks. The cost and harms from the misuse of genetic data can be latent. The immutability, uniqueness, and information-rich nature of DNA renders it a high-value target. Knowledge and control asymmetries exist between individuals, industry, and governments. Genetic data's value as an asset is mirrored in the potential degree of harm if abused. This article highlights the critical threats and vulnerabilities associated with genetic data risk, from identification and profiling, to exposure of health and medical conditions and susceptibility, as well as to the broader social welfare risk associated with biowarfare. All of these threats are rapidly actualizing from the advancement of artificial intelligence (AI). Here we outline the ways in which data science is improving genetics and how that can ultimately lead to its weaponization.
Technical Paper
The privacy offered by molecular cryptography can be measured using standard privacy metrics. In the following white paper, the privacy obtained by various theoretical molecular cryptography techniques is measured. The amount of privacy obtained by any specific depends on a range of factors, and these factors are discussed in technical detail.