Meet the Scientists on the Frontlines of Protecting Humanity from a Man-Made Pathogen
Jean Peccoud wasn't expecting an email from the FBI. He definitely wasn't expecting the agency to invite him to a meeting. "My reaction was, 'What did I do wrong to be on the FBI watch list?'" he recalls.
You use those blueprints for white-hat research—which is, indeed, why the open blueprints exist—or you can do the same for a black-hat attack.
He didn't know what the feds could possibly want from him. "I was mostly scared at this point," he says. "I was deeply disturbed by the whole thing."
But he decided to go anyway, and when he traveled to San Francisco for the 2008 gathering, the reason for the e-vite became clear: The FBI was reaching out to researchers like him—scientists interested in synthetic biology—in anticipation of the potential nefarious uses of this technology. "The whole purpose of the meeting was, 'Let's start talking to each other before we actually need to talk to each other,'" says Peccoud, now a professor of chemical and biological engineering at Colorado State University. "'And let's make sure next time you get an email from the FBI, you don't freak out."
Synthetic biology—which Peccoud defines as "the application of engineering methods to biological systems"—holds great power, and with that (as always) comes great responsibility. When you can synthesize genetic material in a lab, you can create new ways of diagnosing and treating people, and even new food ingredients. But you can also "print" the genetic sequence of a virus or virulent bacterium.
And while it's not easy, it's also not as hard as it could be, in part because dangerous sequences have publicly available blueprints. You use those blueprints for white-hat research—which is, indeed, why the open blueprints exist—or you can do the same for a black-hat attack. You could synthesize a dangerous pathogen's code on purpose, or you could unwittingly do so because someone tampered with your digital instructions. Ordering synthetic genes for viral sequences, says Peccoud, would likely be more difficult today than it was a decade ago.
"There is more awareness of the industry, and they are taking this more seriously," he says. "There is no specific regulation, though."
Trying to lock down the interconnected machines that enable synthetic biology, secure its lab processes, and keep dangerous pathogens out of the hands of bad actors is part of a relatively new field: cyberbiosecurity, whose name Peccoud and colleagues introduced in a 2018 paper.
Biological threats feel especially acute right now, during the ongoing pandemic. COVID-19 is a natural pathogen -- not one engineered in a lab. But future outbreaks could start from a bug nature didn't build, if the wrong people get ahold of the right genetic sequences, and put them in the right sequence. Securing the equipment and processes that make synthetic biology possible -- so that doesn't happen -- is part of why the field of cyberbiosecurity was born.
The Origin Story
It is perhaps no coincidence that the FBI pinged Peccoud when it did: soon after a journalist ordered a sequence of smallpox DNA and wrote, for The Guardian, about how easy it was. "That was not good press for anybody," says Peccoud. Previously, in 2002, the Pentagon had funded SUNY Stonybrook researchers to try something similar: They ordered bits of polio DNA piecemeal and, over the course of three years, strung them together.
Although many years have passed since those early gotchas, the current patchwork of regulations still wouldn't necessarily prevent someone from pulling similar tricks now, and the technological systems that synthetic biology runs on are more intertwined — and so perhaps more hackable — than ever. Researchers like Peccoud are working to bring awareness to those potential problems, to promote accountability, and to provide early-detection tools that would catch the whiff of a rotten act before it became one.
Peccoud notes that if someone wants to get access to a specific pathogen, it is probably easier to collect it from the environment or take it from a biodefense lab than to whip it up synthetically. "However, people could use genetic databases to design a system that combines different genes in a way that would make them dangerous together without each of the components being dangerous on its own," he says. "This would be much more difficult to detect."
After his meeting with the FBI, Peccoud grew more interested in these sorts of security questions. So he was paying attention when, in 2010, the Department of Health and Human Services — now helping manage the response to COVID-19 — created guidance for how to screen synthetic biology orders, to make sure suppliers didn't accidentally send bad actors the sequences that make up bad genomes.
Guidance is nice, Peccoud thought, but it's just words. He wanted to turn those words into action: into a computer program. "I didn't know if it was something you can run on a desktop or if you need a supercomputer to run it," he says. So, one summer, he tasked a team of student researchers with poring over the sentences and turning them into scripts. "I let the FBI know," he says, having both learned his lesson and wanting to get in on the game.
Peccoud later joined forces with Randall Murch, a former FBI agent and current Virginia Tech professor, and a team of colleagues from both Virginia Tech and the University of Nebraska-Lincoln, on a prototype project for the Department of Defense. They went into a lab at the University of Nebraska at Lincoln and assessed all its cyberbio-vulnerabilities. The lab develops and produces prototype vaccines, therapeutics, and prophylactic components — exactly the kind of place that you always, and especially right now, want to keep secure.
"We were creating wiki of all these nasty things."
The team found dozens of Achilles' heels, and put them in a private report. Not long after that project, the two and their colleagues wrote the paper that first used the term "cyberbiosecurity." A second paper, led by Murch, came out five months later and provided a proposed definition and more comprehensive perspective on cyberbiosecurity. But although it's now a buzzword, it's the definition, not the jargon, that matters. "Frankly, I don't really care if they call it cyberbiosecurity," says Murch. Call it what you want: Just pay attention to its tenets.
A Database of Scary Sequences
Peccoud and Murch, of course, aren't the only ones working to screen sequences and secure devices. At the nonprofit Battelle Memorial Institute in Columbus, Ohio, for instance, scientists are working on solutions that balance the openness inherent to science and the closure that can stop bad stuff. "There's a challenge there that you want to enable research but you want to make sure that what people are ordering is safe," says the organization's Neeraj Rao.
Rao can't talk about the work Battelle does for the spy agency IARPA, the Intelligence Advanced Research Projects Activity, on a project called Fun GCAT, which aims to use computational tools to deep-screen gene-sequence orders to see if they pose a threat. It can, though, talk about a twin-type internal project: ThreatSEQ (pronounced, of course, "threat seek").
The project started when "a government customer" (as usual, no one will say which) asked Battelle to curate a list of dangerous toxins and pathogens, and their genetic sequences. The researchers even started tagging sequences according to their function — like whether a particular sequence is involved in a germ's virulence or toxicity. That helps if someone is trying to use synthetic biology not to gin up a yawn-inducing old bug but to engineer a totally new one. "How do you essentially predict what the function of a novel sequence is?" says Rao. You look at what other, similar bits of code do.
"We were creating wiki of all these nasty things," says Rao. As they were working, they realized that DNA manufacturers could potentially scan in sequences that people ordered, run them against the database, and see if anything scary matched up. Kind of like that plagiarism software your college professors used.
Battelle began offering their screening capability, as ThreatSEQ. When customers -- like, currently, Twist Bioscience -- throw their sequences in, and get a report back, the manufacturers make the final decision about whether to fulfill a flagged order — whether, in the analogy, to give an F for plagiarism. After all, legitimate researchers do legitimately need to have DNA from legitimately bad organisms.
"Maybe it's the CDC," says Rao. "If things check out, oftentimes [the manufacturers] will fulfill the order." If it's your aggrieved uncle seeking the virulent pathogen, maybe not. But ultimately, no one is stopping the manufacturers from doing so.
Beyond that kind of tampering, though, cyberbiosecurity also includes keeping a lockdown on the machines that make the genetic sequences. "Somebody now doesn't need physical access to infrastructure to tamper with it," says Rao. So it needs the same cyber protections as other internet-connected devices.
Scientists are also now using DNA to store data — encoding information in its bases, rather than into a hard drive. To download the data, you sequence the DNA and read it back into a computer. But if you think like a bad guy, you'd realize that a bad guy could then, for instance, insert a computer virus into the genetic code, and when the researcher went to nab her data, her desktop would crash or infect the others on the network.
Something like that actually happened in 2017 at the USENIX security symposium, an annual programming conference: Researchers from the University of Washington encoded malware into DNA, and when the gene sequencer assembled the DNA, it corrupted the sequencer's software, then the computer that controlled it.
"This vulnerability could be just the opening an adversary needs to compromise an organization's systems," Inspirion Biosciences' J. Craig Reed and Nicolas Dunaway wrote in a paper for Frontiers in Bioengineering and Biotechnology, included in an e-book that Murch edited called Mapping the Cyberbiosecurity Enterprise.
Where We Go From Here
So what to do about all this? That's hard to say, in part because we don't know how big a current problem any of it poses. As noted in Mapping the Cyberbiosecurity Enterprise, "Information about private sector infrastructure vulnerabilities or data breaches is protected from public release by the Protected Critical Infrastructure Information (PCII) Program," if the privateers share the information with the government. "Government sector vulnerabilities or data breaches," meanwhile, "are rarely shared with the public."
"What I think is encouraging right now is the fact that we're even having this discussion."
The regulations that could rein in problems aren't as robust as many would like them to be, and much good behavior is technically voluntary — although guidelines and best practices do exist from organizations like the International Gene Synthesis Consortium and the National Institute of Standards and Technology.
Rao thinks it would be smart if grant-giving agencies like the National Institutes of Health and the National Science Foundation required any scientists who took their money to work with manufacturing companies that screen sequences. But he also still thinks we're on our way to being ahead of the curve, in terms of preventing print-your-own bioproblems: "What I think is encouraging right now is the fact that we're even having this discussion," says Rao.
Peccoud, for his part, has worked to keep such conversations going, including by doing training for the FBI and planning a workshop for students in which they imagine and work to guard against the malicious use of their research. But actually, Peccoud believes that human error, flawed lab processes, and mislabeled samples might be bigger threats than the outside ones. "Way too often, I think that people think of security as, 'Oh, there is a bad guy going after me,' and the main thing you should be worried about is yourself and errors," he says.
Murch thinks we're only at the beginning of understanding where our weak points are, and how many times they've been bruised. Decreasing those contusions, though, won't just take more secure systems. "The answer won't be technical only," he says. It'll be social, political, policy-related, and economic — a cultural revolution all its own.
CandyCodes could provide sweet justice against fake pills
When we swallow a pill, we hope it will work without side effects. Few of us know to worry about a growing issue facing the pharmaceutical industry: counterfeit medications. These pills, patches, and other medical products might look just like the real thing. But they’re often stuffed with fillers that dilute the medication’s potency or they’re simply substituted for lookalikes that contain none of the prescribed medication at all.
Now, bioengineer William Grover at the University of California, Riverside, may have a solution. Inspired by the tiny, multi-colored sprinkles called nonpareils that decorate baked goods and candies, Grover created CandyCodes pill coatings to prevent counterfeits.
The idea was borne out of pandemic boredom. Confined to his home, Grover was struck by the patterns of nonpareils he saw on candies, and found himself counting the number of little balls on each one. “It’s random, how they’re applied,” he says. “I wondered if it ever repeats itself or if each of these candies is unique in the entire world.” He suspected the latter, and some quick math proved his hypothesis: Given dozens of nonpareils per candy in a handful of different colors, it’s highly unlikely that the sprinklings on any two candies would be identical.
He quickly realized his finding could have practical applications: pills or capsules could be coated with similar “sprinkles,” with the manufacturer photographing each pill or capsule before selling its products. Consumers looking to weed out fakes could potentially take a photo with their cell phones and go online to compare images of their own pills to the manufacturer’s database, with the help of an algorithm that would determine their authenticity. Or, a computer could generate another type of unique identifier, such as a text-based code, tracking to the color and location of the sprinkles. This would allow for a speedier validation than a photo-based comparison, Grover says. “It could be done very quickly, in a fraction of a second.”
Researchers and manufacturers have already developed some anti-counterfeit tools, including built-in identifiers like edible papers with scannable QR codes. But such methods, while functional, can be costly to implement, Grover says.
It wouldn’t be paranoid to take such precautions. Counterfeits are a growing problem, according to Young Kim, a biomedical engineer at Purdue University who was not involved in the CandyCodes study. “There are approximately 40,000 online pharmacies that one can access via the Internet,” he says. “Only three to four percent of them are operated legally.” Purchases from online pharmacies rose dramatically during the pandemic, and Kim expects a boom in counterfeit medical products alongside it.
The FDA warns that U.S. consumers can be exposed to counterfeits through online purchases, in particular. The problem is magnified in low- to middle-income nations, where one in 10 medical products are counterfeit, according to a World Health Organization estimate. Cost doesn’t seem to be a factor, either; antimalarials and antibiotics are most often reported as counterfeits or fakes, and generic medications are swapped as often as brand-name drugs, according to the same WHO report.
Counterfeits weren’t tracked globally until 2013; since then, there have been 1,500 reports to the WHO, with actual incidences of counterfeiting likely much higher. Fake medicines have been estimated to result in costs of $200 billion each year, and are blamed for more than 72,000 pneumonia- and 116,000 malaria-related deaths.
Researchers and manufacturers have already developed some anti-counterfeit tools, including built-in identifiers like edible papers with scannable QR codes or barcodes that are stamped onto or otherwise incorporated into pills and other medical products. But such methods, while functional, can be costly to implement, Grover says.
CandyCodes could provide unique identifiers for at least 41 million pills for every person on the planet.
William Grover
“Putting universal codes on each pill and each dosage is attractive,” he says. “The challenge is, how can we do it in a way that requires as little modification to the existing manufacturing process as possible? That's where I hope CandyCodes have an edge. It's not zero modification, but I hope it is as minor a modification of the manufacturing process as possible.”
Kim calls the concept “a clever idea to introduce entropy for high-level security” even if it may not be as close to market as other emerging technologies, including some edible watermarks he’s helped develop. He points out that CandyCodes still needs to be tested for reproducibility and readability.
The possibilities are already intriguing, though. Grover’s recent research, published in Scientific Reports, predicts that unique codes could be used for at least 41 million pills for every person on the planet.
Sadly, CandyCodes’ multicolored bits probably won’t taste like candy. They must be made of non-caloric ingredients to meet the international regulatory standards that govern food dyes and colorants. But Grover hopes CandyCodes represent a simple, accessible solution to a heart-wrenching issue. “This feels like trying to track down and go after bad guys,” he says. “Someone who would pass off a medicine intended for a child or a sick person and pass it off as something effective, I can't imagine anything much more evil than that. It's fun and, and a little fulfilling to try to develop technologies that chip away at that.”
Waste smothering our oceans is worth billions – here’s what we can do with all that sh$t
There’s hardly a person out there who hasn’t heard of the Great Pacific Garbage Patch. That type of pollution is impossible to miss. It stares you in the face from pictures and videos of sea turtles with drinking straws up their noses and acres of plastic swirling in the sea.
It demands you to solve the problem—and it works. The campaign to raise awareness about plastic pollution in the oceans has resulted in new policies, including bans on microplastics in personal care products, technology to clean up the plastic, and even new plastic-like materials that are better for the environment.
But there’s a different type of pollution smothering the ocean as you read this. Unfortunately, this one is almost invisible, but no less damaging. In fact, it’s even more serious than plastic and most people have no idea it even exists. It is literally under our noses, destroying our oceans, lakes, and rivers – and yet we are missing it completely while contributing to it daily. In fact, we exacerbate it multiple times a day—every time we use the bathroom.
It is the way we do our sewage.
Most of us don’t think much about what happens after we flush the toilet. Most of us probably assume that the substances we flush go “somewhere” and are dealt with safely. But we typically don’t think about it beyond that.
Most of us also probably don’t think about what’s in the ocean or lakes we swim in. Since others are swimming, jumping in is just fine. But our waterways are far from clean. In fact, at times they are incredibly filthy. In the US, we are dumping 1.2 trillion of gallons of untreated sewage into the environment every year. Just New York City alone discharges 27 billion gallons into the Hudson River basin annually.
How does this happen? Part of it is the unfortunate side effect of our sewage system design that dates back to over a century ago when cities were smaller and fewer people were living so close together.
Back then, engineers designed the so-called “combine sewer overflow systems,” or CSOs, in which the storm water pipes are connected to the sanitary sewer pipes. In normal conditions, the sewage effluent from homes flows to the treatment plants where it gets cleaned and released into the waterways. But when it rains, the pipe system becomes so overwhelmed with water that the treatment plant can’t process it fast enough. So the treatment plant has to release the excess water through its discharge pipes—directly, without treatment, into streams, rivers and the ocean.
The 1.2 trillion gallons of CSO releases isn’t even the full picture. There are also discharges from poorly maintained septic systems, cesspools and busted pipes of the aging wastewater infrastructure. The state of Hawaii alone has 88,000 cesspools that need replacing and are currently leaking 53 million gallons of raw sewage daily into their coastal waters. You may think twice about swimming on your Hawaii vacations.
Overall, the US is facing a $271 billion backlog in wastewater infrastructure projects to update these aging systems. Across the Western world, countries are facing similar challenges with their aging sewage systems, especially the UK and European Union.
That’s not to say that other parts of the planet are in better shape. Out of the 7+ billion people populating our earth, 4.2 billion don’t have access to safe sanitation. Included in this insane number are roughly 2 billion people who have no toilet at all. Whether washed by rains or dumped directly into the waterways, a lot of this sludge pollutes the environment, the drinking water, and ultimately the ocean.
Pipes pour water onto a rocky shore in Jakarta, Indonesia.
Tom Fisk
What complicates this from an ocean health perspective is that it’s not just poop and pee that gets dumped into nearby waterways. It is all the things we put in and on our bodies and flush down our drains. That vicious mix of chemicals includes caffeine, antibiotics, antidepressants, painkillers, hormones, microplastics, cocaine, cooking oils, paint thinners, and PFAS—the forever chemicals present in everything from breathable clothing to fire retardant fabrics of our living room couches. Recent reports have found all of the above substances in fish—and then some.
Why do we allow so much untreated sewage spill into the sea? Frankly speaking, for decades scientists and engineers thought that the ocean could handle it. The mantra back then was “dilution is the solution to pollution,” which might’ve worked when there were much fewer people living on earth—but not now. Today science is telling us that this old approach doesn’t hold. That marine habitats are much more sensitive than we had expected and can’t handle the amount of wastewater we are discharging into them.
The excess nitrogen and phosphorus that the sewage (and agricultural runoff) dumps into the water causes harmful algal blooms, more commonly known as red or brown tides. The water column is overtaken by tiny algae that sucks up all the oxygen from the water, creating dead zones like the big fish kills in the Gulf of Mexico. These algae also cause public health issues by releasing gases toxic to people and animals, including dementia, neurological damage, and respiratory illness. Marshes and mangroves end up with weakened root systems and start dying off. In a wastewater modeling study I published last year, we found that 31 percent of salt marshes globally were heavily polluted with human sewage. Coral reefs get riddled with disease and overgrown by seaweed.
We could convert sewage into high-value goods. It can be used to generate electricity, fertilizer, and drinking water. The technologies not only exist but are getting better and more efficient all the time.
Moreover, by way of our sewage, we managed to transmit a human pathogen—Serratia marcescens, which causes urinary, respiratory and other infections in people—to corals! Recent reports from the Florida Keys are showing white pox disease popping up in elk horn corals caused by S.marcescens, which somehow managed to jump species. Many recent studies have documented just how common this type of pollution is across the globe.
Yet, there is some good news in that abysmal sewage flow. Just like with plastic pollution, realizing that there’s a problem is the first step, so awareness is key. That’s exactly why I co-founded Ocean Sewage Alliance last year—a nonprofit that aims to “re-potty train the world” by breaking taboos in talking about the poop and pee problem, as well as uniting experts from various key sectors to work together to end sewage pollution in coastal areas.
To end this pollution, we have to change the ways we handle our sewage. Even more exciting is that by solving the sewage problem we can create all sorts of economic benefits. In 2015, human poop was valued at $9.5 billion a year globally, which today would be $11.5 billion per year.
What would one do with that sh$t?
We could convert it into high-value goods. Sewage can be used to generate electricity, fertilizer, and drinking water. The technologies not only exist but are getting better and more efficient all the time. Some exciting examples include biodigesters and urine diversion (or peecycling) systems that can produce fertilizer and biogas, essentially natural gas. The United Nations estimates that the biogas produced from poop could provide electricity for 138 million homes. And the recovered and cleaned water can be used for irrigation, laundry and flushing toilets. It can even be refined to the point that it is safe for drinking water – just ask the folks in Orange County, CA who have been doing so for the last few decades.
How do we deal with all the human-made pollutants in our sewage? There is technology for that too. Called pyrolysis, it heats up sludge to high temperatures in the absence of oxygen, which causes most of the substances to degrade and fall apart.
There are solutions to the problems—as long as we acknowledge that the problems exist. The fact that you are reading this means that you are part of the solution already. The next time you flush your toilet, think about where this output may flow. Does your septic system work properly? Does your local treatment plant discharge raw sewage on rainy days? Can that plant implement newer technologies that can upcycle waste? These questions are part of re-potty training the world, one household at a time. And together, these households are the force that can turn back the toxic sewage tide. And keep our oceans blue.