On DNA Signatures, Their Dual-Use Potential for GMO Counterfeiting, and a Cyber-Based Security Solution
- PMID: 31440503
- PMCID: PMC6693310
- DOI: 10.3389/fbioe.2019.00189
On DNA Signatures, Their Dual-Use Potential for GMO Counterfeiting, and a Cyber-Based Security Solution
Abstract
This study investigates the role and functionality of special nucleotide sequences ("DNA signatures") to detect the presence of an organism and to distinguish it from all others. After highlighting vulnerabilities of the prevalent DNA signature paradigm for the identification of agricultural genetically modified (GM) organisms it will be argued that these so-called signatures really are no signatures at all - when compared to the notion of traditional (handwritten) signatures and their generalizations in the modern (digital) world. It is suggested that a recent contamination event of an unauthorized GM Bacillus subtilis strain (Paracchini et al., 2017) in Europe could have been-or the same way could be - the consequence of exploiting gaps of prevailing DNA signatures. Moreover, a recent study (Mueller, 2019) proposes that such DNA signatures may intentionally be exploited to support the counterfeiting or even weaponization of GM organisms (GMOs). These concerns mandate a re-conceptualization of how DNA signatures need to be realized. After identifying central issues of the new vulnerabilities and overlying them with practical challenges that bio-cyber hackers would be facing, recommendations are made how DNA signatures may be enhanced. To overcome the core problem of signature transferability in bioengineered mediums, it is necessary that the identifier needs to remain secret during the entire verification process. On the other hand, however, the goal of DNA signatures is to enable public verifiability, leading to a paradoxical dilemma. It is shown that this can be addressed with ideas that underlie special cryptographic signatures, in particular those of "zero-knowledge" and "invisibility." This means more than mere signature hiding, but relies on a knowledge-based proof and differentiation of a secret (here, as assigned to specific clones) which can be realized without explicit demonstration of that secret. A re-conceptualization of these principles can be used in form of a combined (digital and physical) method to establish confidentiality and prevent un-impersonation of the manufacturer. As a result, this helps mitigate the circulation of possibly hazardous GMO counterfeits and also addresses the situation whereby attackers try to blame producers for deliberately implanting illicit adulterations hidden within authorized GMOs.
Keywords: DNA signatures; GMO counterfeiting; bio-cryptanalysis; bio-cyber hacker; cryptographic applications; cyberbiosecurity; insecure channel; knowledge-based methods.
Figures







Similar articles
-
Are Market GM Plants an Unrecognized Platform for Bioterrorism and Biocrime?Front Bioeng Biotechnol. 2019 May 29;7:121. doi: 10.3389/fbioe.2019.00121. eCollection 2019. Front Bioeng Biotechnol. 2019. PMID: 31192204 Free PMC article.
-
JRC GMO-Amplicons: a collection of nucleic acid sequences related to genetically modified organisms.Database (Oxford). 2015 Sep 30;2015:bav101. doi: 10.1093/database/bav101. Print 2015. Database (Oxford). 2015. PMID: 26424080 Free PMC article.
-
Optimization of digital droplet polymerase chain reaction for quantification of genetically modified organisms.Biomol Detect Quantif. 2016 Jan 7;7:9-20. doi: 10.1016/j.bdq.2015.12.003. eCollection 2016 Mar. Biomol Detect Quantif. 2016. PMID: 27077048 Free PMC article.
-
How Can We Better Detect Unauthorized GMOs in Food and Feed Chains?Trends Biotechnol. 2017 Jun;35(6):508-517. doi: 10.1016/j.tibtech.2017.03.002. Epub 2017 Mar 24. Trends Biotechnol. 2017. PMID: 28347568 Review.
-
Genetically modified seeds and plant propagating material in Europe: potential routes of entrance and current status.Heliyon. 2019 Feb 15;5(2):e01242. doi: 10.1016/j.heliyon.2019.e01242. eCollection 2019 Feb. Heliyon. 2019. PMID: 30815609 Free PMC article. Review.
Cited by
-
The need for adaptability in detection, characterization, and attribution of biosecurity threats.Nat Commun. 2024 Dec 19;15(1):10699. doi: 10.1038/s41467-024-55436-y. Nat Commun. 2024. PMID: 39702312 Free PMC article. Review.
-
Cryptographic approaches to authenticating synthetic DNA sequences.Trends Biotechnol. 2024 Aug;42(8):1002-1016. doi: 10.1016/j.tibtech.2024.02.002. Epub 2024 Feb 27. Trends Biotechnol. 2024. PMID: 38418329 Free PMC article. Review.
-
Self-authenticating genomic materials in Escherichia coli via advanced genome signatures.Commun Biol. 2025 May 16;8(1):762. doi: 10.1038/s42003-025-08171-z. Commun Biol. 2025. PMID: 40379889 Free PMC article.
-
Facing the 2020 pandemic: What does cyberbiosecurity want us to know to safeguard the future?Biosaf Health. 2021 Feb;3(1):11-21. doi: 10.1016/j.bsheal.2020.09.007. Epub 2020 Sep 25. Biosaf Health. 2021. PMID: 33015604 Free PMC article. Review.
-
Genetic Information Insecurity as State of the Art.Front Bioeng Biotechnol. 2020 Dec 8;8:591980. doi: 10.3389/fbioe.2020.591980. eCollection 2020. Front Bioeng Biotechnol. 2020. PMID: 33381496 Free PMC article.
References
-
- Ateniese G. (2004). Verifiable encryption of digital signatures and applications. ACM Trans. Inform. Syst. Sec. 7, 1–20. 10.1145/984334.984335 - DOI
-
- Barbau-Piednoir E., Keersmaecker S. C. J. D., Wuyts V., Gau C., Pirovano W., Costessi A., et al. . (2015). Genome sequence of EU-unauthorized genetically modified bacillus subtilis strain 2014-3557 overproducing riboflavin, isolated from a vitamin B2 80% feed additive. Genome Announc. 3:e00214-15. 10.1128/genomeA.00214-15 - DOI - PMC - PubMed
-
- Berrada A., Liang M., Jung L., Jensen K. (2017). Alkaline Activation for Immobilization of DNA Taggants. US9790538B2. Available online at: https://patents.google.com/patent/US9790538B2/en
LinkOut - more resources
Full Text Sources
Research Materials