Meet the Scientists on the Frontlines of Protecting Humanity from a Man-Made Pathogen
Jean Peccoud wasn't expecting an email from the FBI. He definitely wasn't expecting the agency to invite him to a meeting. "My reaction was, 'What did I do wrong to be on the FBI watch list?'" he recalls.
You use those blueprints for white-hat research—which is, indeed, why the open blueprints exist—or you can do the same for a black-hat attack.
He didn't know what the feds could possibly want from him. "I was mostly scared at this point," he says. "I was deeply disturbed by the whole thing."
But he decided to go anyway, and when he traveled to San Francisco for the 2008 gathering, the reason for the e-vite became clear: The FBI was reaching out to researchers like him—scientists interested in synthetic biology—in anticipation of the potential nefarious uses of this technology. "The whole purpose of the meeting was, 'Let's start talking to each other before we actually need to talk to each other,'" says Peccoud, now a professor of chemical and biological engineering at Colorado State University. "'And let's make sure next time you get an email from the FBI, you don't freak out."
Synthetic biology—which Peccoud defines as "the application of engineering methods to biological systems"—holds great power, and with that (as always) comes great responsibility. When you can synthesize genetic material in a lab, you can create new ways of diagnosing and treating people, and even new food ingredients. But you can also "print" the genetic sequence of a virus or virulent bacterium.
And while it's not easy, it's also not as hard as it could be, in part because dangerous sequences have publicly available blueprints. You use those blueprints for white-hat research—which is, indeed, why the open blueprints exist—or you can do the same for a black-hat attack. You could synthesize a dangerous pathogen's code on purpose, or you could unwittingly do so because someone tampered with your digital instructions. Ordering synthetic genes for viral sequences, says Peccoud, would likely be more difficult today than it was a decade ago.
"There is more awareness of the industry, and they are taking this more seriously," he says. "There is no specific regulation, though."
Trying to lock down the interconnected machines that enable synthetic biology, secure its lab processes, and keep dangerous pathogens out of the hands of bad actors is part of a relatively new field: cyberbiosecurity, whose name Peccoud and colleagues introduced in a 2018 paper.
Biological threats feel especially acute right now, during the ongoing pandemic. COVID-19 is a natural pathogen -- not one engineered in a lab. But future outbreaks could start from a bug nature didn't build, if the wrong people get ahold of the right genetic sequences, and put them in the right sequence. Securing the equipment and processes that make synthetic biology possible -- so that doesn't happen -- is part of why the field of cyberbiosecurity was born.
The Origin Story
It is perhaps no coincidence that the FBI pinged Peccoud when it did: soon after a journalist ordered a sequence of smallpox DNA and wrote, for The Guardian, about how easy it was. "That was not good press for anybody," says Peccoud. Previously, in 2002, the Pentagon had funded SUNY Stonybrook researchers to try something similar: They ordered bits of polio DNA piecemeal and, over the course of three years, strung them together.
Although many years have passed since those early gotchas, the current patchwork of regulations still wouldn't necessarily prevent someone from pulling similar tricks now, and the technological systems that synthetic biology runs on are more intertwined — and so perhaps more hackable — than ever. Researchers like Peccoud are working to bring awareness to those potential problems, to promote accountability, and to provide early-detection tools that would catch the whiff of a rotten act before it became one.
Peccoud notes that if someone wants to get access to a specific pathogen, it is probably easier to collect it from the environment or take it from a biodefense lab than to whip it up synthetically. "However, people could use genetic databases to design a system that combines different genes in a way that would make them dangerous together without each of the components being dangerous on its own," he says. "This would be much more difficult to detect."
After his meeting with the FBI, Peccoud grew more interested in these sorts of security questions. So he was paying attention when, in 2010, the Department of Health and Human Services — now helping manage the response to COVID-19 — created guidance for how to screen synthetic biology orders, to make sure suppliers didn't accidentally send bad actors the sequences that make up bad genomes.
Guidance is nice, Peccoud thought, but it's just words. He wanted to turn those words into action: into a computer program. "I didn't know if it was something you can run on a desktop or if you need a supercomputer to run it," he says. So, one summer, he tasked a team of student researchers with poring over the sentences and turning them into scripts. "I let the FBI know," he says, having both learned his lesson and wanting to get in on the game.
Peccoud later joined forces with Randall Murch, a former FBI agent and current Virginia Tech professor, and a team of colleagues from both Virginia Tech and the University of Nebraska-Lincoln, on a prototype project for the Department of Defense. They went into a lab at the University of Nebraska at Lincoln and assessed all its cyberbio-vulnerabilities. The lab develops and produces prototype vaccines, therapeutics, and prophylactic components — exactly the kind of place that you always, and especially right now, want to keep secure.
"We were creating wiki of all these nasty things."
The team found dozens of Achilles' heels, and put them in a private report. Not long after that project, the two and their colleagues wrote the paper that first used the term "cyberbiosecurity." A second paper, led by Murch, came out five months later and provided a proposed definition and more comprehensive perspective on cyberbiosecurity. But although it's now a buzzword, it's the definition, not the jargon, that matters. "Frankly, I don't really care if they call it cyberbiosecurity," says Murch. Call it what you want: Just pay attention to its tenets.
A Database of Scary Sequences
Peccoud and Murch, of course, aren't the only ones working to screen sequences and secure devices. At the nonprofit Battelle Memorial Institute in Columbus, Ohio, for instance, scientists are working on solutions that balance the openness inherent to science and the closure that can stop bad stuff. "There's a challenge there that you want to enable research but you want to make sure that what people are ordering is safe," says the organization's Neeraj Rao.
Rao can't talk about the work Battelle does for the spy agency IARPA, the Intelligence Advanced Research Projects Activity, on a project called Fun GCAT, which aims to use computational tools to deep-screen gene-sequence orders to see if they pose a threat. It can, though, talk about a twin-type internal project: ThreatSEQ (pronounced, of course, "threat seek").
The project started when "a government customer" (as usual, no one will say which) asked Battelle to curate a list of dangerous toxins and pathogens, and their genetic sequences. The researchers even started tagging sequences according to their function — like whether a particular sequence is involved in a germ's virulence or toxicity. That helps if someone is trying to use synthetic biology not to gin up a yawn-inducing old bug but to engineer a totally new one. "How do you essentially predict what the function of a novel sequence is?" says Rao. You look at what other, similar bits of code do.
"We were creating wiki of all these nasty things," says Rao. As they were working, they realized that DNA manufacturers could potentially scan in sequences that people ordered, run them against the database, and see if anything scary matched up. Kind of like that plagiarism software your college professors used.
Battelle began offering their screening capability, as ThreatSEQ. When customers -- like, currently, Twist Bioscience -- throw their sequences in, and get a report back, the manufacturers make the final decision about whether to fulfill a flagged order — whether, in the analogy, to give an F for plagiarism. After all, legitimate researchers do legitimately need to have DNA from legitimately bad organisms.
"Maybe it's the CDC," says Rao. "If things check out, oftentimes [the manufacturers] will fulfill the order." If it's your aggrieved uncle seeking the virulent pathogen, maybe not. But ultimately, no one is stopping the manufacturers from doing so.
Beyond that kind of tampering, though, cyberbiosecurity also includes keeping a lockdown on the machines that make the genetic sequences. "Somebody now doesn't need physical access to infrastructure to tamper with it," says Rao. So it needs the same cyber protections as other internet-connected devices.
Scientists are also now using DNA to store data — encoding information in its bases, rather than into a hard drive. To download the data, you sequence the DNA and read it back into a computer. But if you think like a bad guy, you'd realize that a bad guy could then, for instance, insert a computer virus into the genetic code, and when the researcher went to nab her data, her desktop would crash or infect the others on the network.
Something like that actually happened in 2017 at the USENIX security symposium, an annual programming conference: Researchers from the University of Washington encoded malware into DNA, and when the gene sequencer assembled the DNA, it corrupted the sequencer's software, then the computer that controlled it.
"This vulnerability could be just the opening an adversary needs to compromise an organization's systems," Inspirion Biosciences' J. Craig Reed and Nicolas Dunaway wrote in a paper for Frontiers in Bioengineering and Biotechnology, included in an e-book that Murch edited called Mapping the Cyberbiosecurity Enterprise.
Where We Go From Here
So what to do about all this? That's hard to say, in part because we don't know how big a current problem any of it poses. As noted in Mapping the Cyberbiosecurity Enterprise, "Information about private sector infrastructure vulnerabilities or data breaches is protected from public release by the Protected Critical Infrastructure Information (PCII) Program," if the privateers share the information with the government. "Government sector vulnerabilities or data breaches," meanwhile, "are rarely shared with the public."
"What I think is encouraging right now is the fact that we're even having this discussion."
The regulations that could rein in problems aren't as robust as many would like them to be, and much good behavior is technically voluntary — although guidelines and best practices do exist from organizations like the International Gene Synthesis Consortium and the National Institute of Standards and Technology.
Rao thinks it would be smart if grant-giving agencies like the National Institutes of Health and the National Science Foundation required any scientists who took their money to work with manufacturing companies that screen sequences. But he also still thinks we're on our way to being ahead of the curve, in terms of preventing print-your-own bioproblems: "What I think is encouraging right now is the fact that we're even having this discussion," says Rao.
Peccoud, for his part, has worked to keep such conversations going, including by doing training for the FBI and planning a workshop for students in which they imagine and work to guard against the malicious use of their research. But actually, Peccoud believes that human error, flawed lab processes, and mislabeled samples might be bigger threats than the outside ones. "Way too often, I think that people think of security as, 'Oh, there is a bad guy going after me,' and the main thing you should be worried about is yourself and errors," he says.
Murch thinks we're only at the beginning of understanding where our weak points are, and how many times they've been bruised. Decreasing those contusions, though, won't just take more secure systems. "The answer won't be technical only," he says. It'll be social, political, policy-related, and economic — a cultural revolution all its own.
Friday Five: These boots were made for walking, even for people who can't
The Friday Five covers important stories in health and science research that you may have missed - usually over the previous week but, today, we're doing a lookback on breakthrough research over the month of October. There are plenty of controversies and troubling ethical issues in science – and we get into many of them in our online magazine – but this news roundup focuses on scientific creativity and progress to give you a therapeutic dose of inspiration headed into the weekend.
Listen on Apple | Listen on Spotify | Listen on Stitcher | Listen on Amazon | Listen on Google
This Friday Five episode covers the following studies published and announced over the past month:
- New boots could have you moving like Iron Man
- The problem with bedtime munching
- The perfect recipe for tiny brains
- The best sports for kids to avoid lifelong health risks
- Can virtual reality reduce pain?
Should egg and sperm donors reveal their identities? The debate pivots on genetics and medical history.
Until age 35, Cassandra Adams assumed her mother and father were her biological parents. Then she took saliva tests through two genealogy databases—23andMe and AncestryDNA—and discovered a discrepancy in her heritage. In bringing up the matter with her parents, she learned that fertility issues had led the couple to use a sperm donor.
“Most people my age were not told,” said Adams, now 40 and a stay-at-home mom in Jersey City, New Jersey, who is involved with donor-conception advocacy. “Even now, there’s still a lot of secrecy in the industry. There are still many parents who aren’t truthful or planning not to be truthful with their children.”
While some of those offspring may never know a significant part of their medical history, Adams is grateful that she does. Surprisingly, the DNA test revealed Jewish ancestry.
“There are a lot more genetic conditions that run in Jewish families, so it was really important that I get my medical history, because it’s very different from my dad who raised me,” said Adams, who has met her biological father and two of three known half-siblings. As a result of this experience, she converted to Judaism. “It has been a big journey,” she said.
In an era of advancing assisted reproduction technologies, genetics and medical history have become front and center of the debate as to whether or not egg and sperm donations should be anonymous – and whether secrecy is even possible in many cases.
Obstacles to staying anonymous
People looking to become parents can choose what’s called an “identity-release donor,” meaning their child can receive information about the donor when he or she turns 18. There’s no way to ensure that the donor will consent to a relationship at that time. Instead, if a relationship between the donor and child is a priority, parents may decide to use a known donor.
The majority of donors want to remain anonymous, said reproductive endocrinologist Robert Kiltz, founder and director of CNY Fertility in Syracuse, New York. “In general, egg and sperm donation is mostly anonymous, meaning the recipient doesn’t know the donor and the donor doesn’t know the recipient.”
Even if the donor isn’t disclosed, though, the mystery may become unraveled when a donor-conceived person undergoes direct-to-consumer genetic testing through ancestry databases, which are growing in number and popularity. These services offer DNA testing and links to relatives with identifiable information.
In the future, another obstacle to anonymity could be laws that prohibit anonymous sperm and egg donations, if they catch on. In June, Colorado became the first state in the nation to ban anonymous sperm and egg donations. The law, which takes effect in 2025, will give donor-conceived adults the legal authority to obtain their donor’s identity and medical history. It also requires banks that provide sperm and egg collection to keep current medical records and contact information for all donors. Meanwhile, it prohibits donations from those who won’t consent to identity disclosures.
“The tradition of anonymous sperm or egg donation has created a vast array of problems, most significantly that the people thus created want to know who their mommy and daddy are,” said Kenneth W. Goodman, professor and director of the Institute for Bioethics and Health Policy at the University of Miami Miller School of Medicine.
“There are counter arguments on both sides. But the current situation has led to great uncertainty and, in many cases, grief,” Goodman said.
Donors should bear some moral responsibility for their role in reproduction by allowing their identity to be disclosed to donor-conceived individuals when they turn 18, Goodman added, noting that “there are counter arguments on both sides. But the current situation has led to great uncertainty and, in many cases, grief.”
Adams, the Jersey City woman who learned she was Jewish, has channeled these feelings into several works of art and performances on stage at venues such as the Jersey City Theater Center. During these performances, she describes the trauma of “not knowing where we come from [or] who we look like.”
In the last five years, Kathleen “Casey” DiPaola, a lawyer in Albany, New York, who focuses her practice on adoption, assisted reproduction and surrogacy, has observed a big shift toward would-be parents looking to use known sperm donors. On the other hand, with egg donation, “I’m not seeing a whole lot of change,” she said. Compared to sperm donation, more medical screening is involved with egg donation, so donors are primarily found through fertility clinics and egg donor agencies that prefer anonymity. This leads to fewer options for prospective parents seeking an egg donor with disclosed identity, DiPaola said.
Some donors want to keep in touch
Rachel Lemmons, 32, who lives in Denver, grew interested in becoming an egg donor when, as a graduate student in environmental sciences, she saw an online advertisement. “It seemed like a good way to help pay off my student loan debt,” said Lemmons, who is married and has a daughter who will turn 2-years-old in December. She didn’t end up donating until many years later, after she’d paid off the debt. “The primary motivation at that point wasn’t financial,” she said. “Instead, it felt like a really wonderful way to help someone else have a family in a few weeks’ time.”
Lemmons originally donated anonymously because she didn’t know open donations existed. She was content with that until she became aware of donor-conceived individuals’ struggles. “It concerned me that I could potentially be contributing to this,” she said, adding that the egg donor and surrogacy agency and fertility clinic wouldn’t allow her to disclose her identity retroactively.
Since then, she has donated as an open donor, and kept in touch with the recipients through email and video calls. Knowing that they were finally able to have children is “incredibly rewarding,” Lemmons said.
When to tell the kids
Stanton Honig, professor of urology and division chief of sexual and reproductive medicine at Yale School of Medicine, said for years his team has recommended that couples using donor sperm inform children about the role of the donor and their identity. “Honesty is always the best policy, and it is likely that when they become of age, they might or will be able to find out about their biological sperm donor,” he said. “Hiding it creates more of a complicated situation for children in the long run.”
Amy Jones, a 45-year-old resident of Syracuse, N.Y., has three children, including twins, who know they were conceived with anonymous donor eggs from the same individual, so they share the same genetics. Jones, who is a registered nurse and asked for her real name not to be published, told them around age seven.
“The thought of using a known donor brought more concerns—what if she wanted my babies after they were born, or how would I feel if she treated them as her own every time I saw her?” said Jones.
“I did a lot of reading, and all psychologists said that it is best to start the conversation early,” she recalled. “They understood very little of what I was telling them, but through the years, I have brought it up in discussion and encouraged them to ask questions. To this day, they don't seem to be all that interested, but I expect that later on in life they may have more questions.”
Jones and her husband opted to use a donor because premature ovarian failure at age 27 had rendered her infertile. “The decision to use an egg donor was hard enough,” she said. “The thought of using a known donor brought more concerns—what if she wanted my babies after they were born, or how would I feel if she treated them as her own every time I saw her?”
Susan C. Klock, a clinical psychologist in the section of fertility and reproductive medicine at Northwestern University Feinberg School of Medicine, said, “Anonymity is virtually impossible in the age of direct-to-consumer genetic testing.” In addition, “selecting an identity-release donor is typically not the first thing parents are looking at when they select a donor. First and foremost, they are looking for a donor with a healthy medical background. Then they may consider donor characteristics that resemble the parents.”
The donor’s medical history can be critical
Donor agencies rely on the self-reported medical history of egg and sperm donors, which can lead to gaps in learning important information. Knowing a donor’s medical history may have led some families to make different or more well-informed choices.
After Steven Gunner, a donor-conceived adult, suffered from schizophrenia and died of a drug overdose at age 27 in 2020, his parents, who live in New York, learned of a potential genetic link to his mental illness. A website, Donor Sibling Registry, revealed that the sperm donor the couple had used, a college student at the time of donation, had been hospitalized during childhood for schizophrenia and died of a drug overdose at age 46. Gunner’s story inspired Steven’s Law, a bill that was introduced in Congress in July. If passed, it would mandate sperm banks to collect information on donors’ medical conditions, and donors would have to disclose medical information the banks weren’t able to find.
With limited exceptions, the U.S. Food and Drug Administration requires donors to be screened and tested for relevant communicable disease agents and diseases such as HIV, hepatitis viruses B and C, the Zika virus and several STDs. With current technology, it is also impossible to screen for thousands of rare genetic diseases. “If a couple is using IVF (in vitro fertilization) to conceive with the donor gamete, some may opt for pre-implantation genetic testing to assess for chromosomal abnormalities,” Klock said.
Even these precautions wouldn't cover every disease, and some would-be parents don't get the genetic screening. In a situation where one donor has a large number of offspring, it is concerning that he or she can spread a rare disease to multiple people, said Nick Isel, 37, of Yorkville, Illinois, who was conceived with donor sperm due to his parents’ fertility issues. They told him the truth when he was a teenager, and he found his biological father with a journalist’s help.
Since 2016, Isel, who owns a roofing company, has been petitioning the FDA to extend the retention of medical records, requiring the fertility establishment to maintain information on sperm and egg donors for 50 years instead of the current 10-year mandate.
“The lack of family health information,” he said, “is an ongoing, slow-motion public health crisis since donor conception began being regulated by the FDA as a practice.”