| Literature DB >> 31192204 |
Abstract
This article discusses a previously unrecognized avenue for bioterrorism and biocrime. It is suggested that new gene editing technologies may have the potential to create plants that are genetically modified in harmful ways, either in terms of their effect on the plant itself or in terms of harming those who would consume foods produced by that plant. While several risk scenarios involving GMOs-such as antibiotic resistant pathogens, synthetic biology, or mixing of non-GMO seeds with GMO seeds-have previously have been recognized, the new vulnerability is rooted in a different paradigm-that of clandestinely manipulating GMOs to create damage. The ability to actively inflict diseases on plants would pose serious health hazards to both humans and animals, have detrimental consequences to the economy, and directly threaten the food supply. As this is the first study of this kind, the full scope and impact of suck attacks-especially those involving the intended misuse of technologies such as gene-drives-merits further investigation. Herein, the plausibility of some of the new risks will be analyzed by, (1) Highlighting ownership and origination issues (esp. of event-specific GM-plants) as unrecognized risk factors; (2) Investigating the unique role of GMOs, why-and how-certified GMOs could become a new venue for such attacks; (3) Analyzing possible dual-use potentials of modern technologies and research oriented toward the advancement of GMOs, plant breeding and crop improvement. The identification and analysis of harmful genetic manipulations to utilize (covertly modified) plants (GMOs and non-GMOs) as an attack vector show that these concerns need to be taken seriously, raising the prospect not only of direct harm, but of the more likely effects in generating public concern, reputational harm of agricultural biotechnology companies, law-suits, and increased import bans of certain plants or their derived products.Entities:
Keywords: GMO authentication; GMO counterfeiting; clandestine manipulation of biological mediums; covert manipulation of non-GMOs; plants as attack vectors; unauthorized GMOs; unrecognized bio-weapons
Year: 2019 PMID: 31192204 PMCID: PMC6549539 DOI: 10.3389/fbioe.2019.00121
Source DB: PubMed Journal: Front Bioeng Biotechnol ISSN: 2296-4185
Figure 1Biocrime in form of clandestine manipulations of GMOs: A summary of the main contributing factors. Details and feasibility of these vulnerabilities are analyzed in the following sections.
Figure 2Generic overview of attacks via the clandestine exchange of GM plants with the intent to cause harm. The consequences on the right are roughly ordered from top to bottom in terms of feasibility and likelihood. The impact of some of these attacks may be profound.
Bt toxins.
| To delay evolution of pest resistance to transgenic crops producing insecticidal proteins from | |
| A new method to combat Bt toxin resistance was recently proposed by Badran et al. ( | |
| A very effective way for delaying the evolution of pest resistance to transgenic crops is the “refuge-in-a-bag” approach, which consists of a random mixture of seeds of Bt and non-Bt plants of the same crop. | An obvious form of attack would consist in creating a different mix of seeds. For instance, as cross-resistance is expected to be stronger between toxins that are more similar (Carrière et al., |
The evolution of insect resistance to Bt toxins is seen by many as one of the most serious threats to sustaining the gains offered by transgenic crops. This table considers some of the resistance management strategies that have been developed and investigates their possible dual-use potentials.
Possible dual-use potentials of gene-drives.
| Gene drives were originally invented for the alteration of sexually producing wild populations (Esvelt et al., | The consequences of a gene-drive escaped into the wild are generally believed to be profound; or catastrophic, as gene-drives enable the spread of various traits, including malignant ones, such as disrupted defense mechanisms and resistance to various herbicides. |
The scenarios described in this table do not involve gene drives made within seeds used as part of the commercial seed supply, but involves other organisms outside the GM-supply chain that may interfere with crops as they grow. The impact of such attacks could be catastrophic.
Figure 3Types of potential attacks involving the hostile use of GMOs. The individual threats are roughly ordered from bottom to top in terms of increasing risk-potential—which correlates with the difficulties attackers are facing in effectively realizing those attacks. The impact is also hierarchical. Risks at the lower level are inherited at higher-level attacks. For the feasibility of the individual attacks and further discussions, see sections 4.2, 4.3, and 4.4. HEGAA, Horizontal environmental genetic alteration agents.
Potential direct targets and attack aims.
| An attacker could rely on traditional (e.g., | (a) Designed spreading of toxins and harmful substances to targeted hosts (specific targets in the food chain). |
| Plants have innate players and mechanisms (toxins) to defend themselves against threats like pests and pathogens. The ability to produce toxins is need-based (some toxic plant pathways are inactive). An attacker could | • Increased chemical toxicity from plants into feed and food products; tailor-made increase of existing (weak) mechanisms that make plants pathogenic to consumption (e.g., possible increased toxicity in additional plant parts and/or in various stages of the growing/harvesting/processing cycle). |
| Specific promoters can not only upregulate the expression level but also lead to differential expression of transgenes in specific tissues (Arpaia et al., | • This may allow the (clandestine) introduction of toxins and harmful products, disguised as popular plant parts used for food and feed. |
| Targeted interference of cellular pathways, leading to an upregulation of immune reactions in those consuming the plant. | Disruption of immune response; induced hypersensitivity response to certain nutrients in animals and humans. |
The feasibility and impact of these types of manipulations are discussed in section 4.3, 4.2, and 4.4.
Potential off-target and indirect attacks.
| The intended deletion or silencing of genes or mechanisms with plant protective properties. | The disruption of protective mechanisms (e.g., reduced levels of secondary metabolites, Arpaia et al., |
| Attacks in form of under-appreciated relationships and off-target effects. For instance, Bt crops express specific Cry proteins within the plant. The mode of action relies on interactions with specific midgut proteins of the targeted insect pest. An attacker may heighten or broaden the toxicity of Cry protein variants to interfere with new targets (see also | The disruption of mechanisms involving off-target species (e.g., the human microbiome or viome), their relationships and synergistic effects. |
| An attacker may increase dominance of a new trait (e.g., through gene drives), or through misuse of infectious genetically modified viruses and other horizontal environmental genetic alteration agents, see Reeves et al. ( | Increased susceptibility to pests and pathogens; harmful effects on non-target-organisms; biodiversity disturbance, species displacement, and extinction; disturbance in soil micro-environment and species of ecological concern. |
See the Discussion Section for an analysis regarding their feasibility and impact.
Possible dual-use potentials of RNA-guided CRISPR-Cas9 systems to target plants.
| An attacker can direct Cas9 to cleave sequences involved in basic plant housekeeping mechanisms. | Weakening of plants, manifestation of disease, interference in plant interactions with other biota |
| Such a“miRNA stacking attack” may be targeted to deactivate the expression of critical genes in plants, which may be harmful to the plant itself and disrupt plant interactions with microbes, insects, and herbivores. | |
| • In contrast to insect herbivory, the breakdown of certain plant secondary metabolites (glucosinolates) produced during the processing of oilseed meal have a harmful effect on animal thyroid function. The use of animal feed containing these glucosinolates has a negative effect on animal nutrition because of their goitrogenic properties (Borgen et al., | |
| Apropos of indirect defense and the expression of volatile substances that attract the natural enemies of plant herbivores. This is exemplified via a specific case-analysis. | A number of detrimental effects of weakened expression of volatile substances—which would be the point of attack—are described by Pechanova and Pechan ( |
The consequences may be detrimental to the plant and pose serious health hazards to humans and animals.
On Motivations and Intent.
| Gain unauthorized access to information, in order to intimidate or coerce a government or its people in furtherance of political and social objectives. | Gain unauthorized access to power in form of blackmailing. A perpetrator may claim to have mingled manipulated seeds into the legitimate supply chain, and threatens to effect their targeted (or large-scale) release and distribution. | Low. |
| Impersonate another user or product for the purpose of: | Impersonate a developing company resp. a certified GMO for the purpose of: | High. |
| Impersonate another user or product for the purpose of: | Analogous. | High. |
| To cripple critical targets (based on political, social or religious objectives). | Diseases inflicted upon plants to harm the economy (or a competitor), to threaten the food supply, and pose health hazards on humans and animals (possibly with racist intentions). | High. |
| • Fraudulently restrict the license of others. | Introduce (a) illegal, or (b) harmful features into certified GMOs to evoke legal actions against biotechology companies and to bring certain producers or companies into discredit. | Medium (a), high (b). |
| Undermine confidence in a protocol or service by causing apparent failures in the system. | Undermine confidence in GMO production, sales, and politics. | Unpredictable. |
| Insider attacks (revenge, personal gain, personal or political motivations). | Analogous. This may include, (a) the release of inadequately performing GMOs during testing phases or trial-and-error experiments, or (b) the illicit release of those that have been manipulated in clandestine. | Low (a), high (b). |
| The challenge of breaking something that is believed to be secure; exploiting the naivety and ignorance of those susceptible to intrusion; being the first to demonstrate that attacks or security breaches are possible. | Analogous. | High. |
| Infliction of harm, (a) directly or, (b) with the aim of creating fear and shock). | Analogous. | Low (b), high (a). |
The cyber domain has been subject to possibly more attacks than most other areas. In order to comprehend possible motivations for attacks via GMOs, a comparison is made with attacks on the internet. In general, attacks involving biological materials are much more challenging to realize, especially in terms of large-scale effects (see sections 4.1, 4.3 for more details). Nonetheless, some parallels exist and need to be taken seriously.