Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Biomedical Defense Principles to

Counter DNA Deep Hacking Rocky


Termanini
Visit to download the full and correct content document:
https://ebookmass.com/product/biomedical-defense-principles-to-counter-dna-deep-h
acking-rocky-termanini/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Hands-On Ethical Hacking and Network Defense Third


Edition Michael T. Simpson

https://ebookmass.com/product/hands-on-ethical-hacking-and-
network-defense-third-edition-michael-t-simpson/

(eBook PDF) Principles of Biomedical Ethics 8th Edition

https://ebookmass.com/product/ebook-pdf-principles-of-biomedical-
ethics-8th-edition/

Principles of Biomedical Sciences and Industry Markus


Hinder

https://ebookmass.com/product/principles-of-biomedical-sciences-
and-industry-markus-hinder/

Network Defense and Countermeasures: Principles and


Practices, 4th Edition William Easttom

https://ebookmass.com/product/network-defense-and-
countermeasures-principles-and-practices-4th-edition-william-
easttom/
Hands-On Ethical Hacking and Network Defense (MindTap
Course List) [Team-IRA] [True PDF] 4th Edition Rob
Wilson

https://ebookmass.com/product/hands-on-ethical-hacking-and-
network-defense-mindtap-course-list-team-ira-true-pdf-4th-
edition-rob-wilson/

Two Cowboy Promises (Returning to Rocky Ridge, Book 2)


April Murdock

https://ebookmass.com/product/two-cowboy-promises-returning-to-
rocky-ridge-book-2-april-murdock/

Three Times Charmed (Returning to Rocky Ridge Book 3)


April Murdock

https://ebookmass.com/product/three-times-charmed-returning-to-
rocky-ridge-book-3-april-murdock/

One Last Chance (Returning to Rocky Ridge Book 1) April


Murdock

https://ebookmass.com/product/one-last-chance-returning-to-rocky-
ridge-book-1-april-murdock/

Principles and Labs for Deep Learning 5th Edition Shih-


Chia Huang

https://ebookmass.com/product/principles-and-labs-for-deep-
learning-5th-edition-shih-chia-huang/
Biomedical Defense Principles to Counter DNA
Deep Hacking
This page intentionally left blank
Biomedical Defense Principles
to Counter DNA Deep
Hacking

Rocky Termanini
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom

Copyright © 2023 Elsevier Inc. All rights reserved.


No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher.
Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements
with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may
be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding,
changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any
information, methods, compounds, or experiments described herein. In using such information or methods they should be
mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any
injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or
operation of any methods, products, instructions, or ideas contained in the material herein.

ISBN: 978-0-323-99914-4

For information on all Academic Press publications visit our website at


https://www.elsevier.com/books-and-journals

Publisher: Mara E. Conner


Acquisitions Editor: Chris Katsaropoulos
Editorial Project Manager: Emily Thomson
Production Project Manager: Sajana Devasi P K
Cover Designer: Mark Rogers

Typeset by TNQ Technologies


Dedication

The Success Chariot Victory Lap


I dedicate this book to my three fixtures of my life. First, my
wife who is a formidable powerhouse with sparkling energy all
day all the time. She is a driving force in writing and completing
this wonderful subject of DNA Hacking. Second, my daughter
Nadia Hinedi, the high-spirited attorney who shines with
dynamic maturity, intellectual eloquence, and judgmental
brilliance. Third, my son Dr. Sami Termanini MD for his
audacity to climb the mountain of life, the tenacity of a
marathon runner to overcome all unknown barriers, and his
courage to believe he is tougher than life. God gives his hardest
battles to his strongest soldiers.
Despite the pandemic that has still its arms around us, few
people deserve a standing ovation and a medal of Honor: My
Senior Acquisitions Editor Chris Katsaropoulos, Ana Claudia
Garcia, my Senior Project Editor Ms. Emily Thompson,
my Content Manager Sajana Devasi PK, and Mr. Mohanraj
Rajendran Copyrights Coordinator.
This page intentionally left blank
Contents

About the Author xv The emergence of DNA bio-hacking 16


Acknowledgment xvii Hall of fame of DNA bio-hackers 16
Advanced DNA bio-hacking
technologies 18
1. The miraculous architecture of The cloud of malware of DNA bio-
the gene pyramid hacking 19
My name is DNA 1 Eysenck’s theory 20
Initial thoughts 1 Profiling, Dr. Edward Jones, our actor 20
Anatomy of DNA 1 Our hypothetical DNA lab 21
Watson and crick story 2 A change of belief 21
DNA double helix 2 Dr. Edward’s DNA-hacking rationale 21
What is a gene? 3 Data guardian turned into hacker 22
What is the chromosome? 3 The “toxic stress” syndrome 23
Chromosomes in forensics 3 DNA-hacker fingerprinting 23
The central dogma 3 The crime databases 24
Proteins 4 The combined DNA index system
Amino acid 5 (CODIS) 24
RNA structure 5 The national crime information center DB
Transcription (phase-1 of central dogma) 5 (NCIC) 25
The transcription process 5 How does ransomware work? 25
Translation (phase-2 of central dogma) The story of the recent North Korean
process 5 WannaCry ransomware attack 25
Anatomy of CRISPR machine 6 What’s the next step for Dr. Edward? 26
CRISPR structure 7 Appendices 26
Drawbacks and unethical issues 8 Appendix-A Glossary: Courtesy of The
Bio-hacking CRISPR, cracking the National Academies of Sciences,
biological atom 8 Engineering, and Medicine 26
CRISPR cyber hacking 9 Notes: Hans Eysenck 29
Appendix 9 Recommended sources 29
Appendix-A: Glossary of DNA (courtesy
MERIT CyberSecurity technical 3. The E. coli story as the carrier of
library) 9 DNA malware code
Appendix-B: Landmine Nobel sweet
What is Escherichia coli (E. coli)? 31
irony 12
Defense by offense 32
Appendix-C: CRISPER pioneers 13
The CRISPR-Cas immunity projects 33
Recommended sources 13
CODIS data bank structures 33
The malicious code injection method 33
2. History of bio-hackers, psychological Dr. Edward’s bio-attack plan 34
profiling, and fingerprinting of the Strategic attack timeline 34
bio-hacker Anatomy of spyware 35
The chemistry of DNA bio-hacking 15 Spyware’s spying process 36
Hackers wear four colorful hats 16 Digital malware data destruction
process 36

vii
viii Contents

DNA sequence malware setup 36 Appendix-B: CRISPR glossary from MERIT


DNA fingerprinting 36 cybersecurity archive library 58
Design of the DNA sequence Recommended sources 61
malware 37
The drone flight for malware delivery 37 5. The genome vandalism. “When ISIS
DNA genome browser 37 meets CRISPR”
Genome browser users 38
Appendices 39 A precious thought 63
Appendix-A SQL storage on DNA 39 The next generation of bio-hacking 63
Appendix-B SQL command converted to ISIS, the army from hell 64
DNA code 40 ISIS was born 65
Appendix-C DNA profiling (fingerprinting) The bitcoin story 65
technology 40 Bio-hacking is a money-making
Appendix-D how to convert gene sequence service 66
into protein 41 ISIS meets CRISPR 66
Appendix-E the BLAST browser 42 CRISPR 101 66
Appendix-F glossary of genome technology DNA 101 67
extracted from MERIT cybersecurity DNA physical and sequence data
library 42 banking 70
Recommended sources 43 DNA ecosystem 70
Anatomy of DNA synthesizers 70
Anatomy of DNA sequencers 71
4. CRISPR the magical knife, the
Anatomy of CRISPR 71
good, the bad, and the ugly
Miraculous power of CRISPR 72
A warmup thought 45 Autonomy of the human genome
Crystal balling the future with blurry (NHG) 72
vision 45 Mapping of the genome 73
Game-changing discovery, an eureka Hard copy of the genome 74
moment 46 Bio vandalism and genetically engineered
Doudna and Charpentier get nobel 46 bioweaponrydthe new paradigm
Historical CRISPR ovation 46 shift 74
CRISPR the new sunrise of gene Bio-hacking strategies and tools 75
editing 47 Hacking the prison computer systems,
The grim side of CRISPR 47 it really happened 76
The partners who are racing for CRISPR the unethical sawing machine,
bio-genetics fame 49 gene-editing babies 76
Jennifer A. Doudna 49 SARS-CoV-2 omicron variant 76
Emmanuelle Charpentier 50 The virus started in Wuhan, China 77
Feng Zhang 51 Generating malicious DNA sequence 77
Embryo concerns 51 DNA forensics, going back in time with
A crack in the creation 52 reverse bio-hacking 78
Doudna meets Charpentier 52 Genome vandalism 78
Nobel 2020 winners in chemistry 52 Hacking the human genome databases 79
CRISPR timeline 53 What are the databases 79
The impossible became possible 53 Bio-hacking DNA ecosystem 80
The Frankenstein unfortunate legacy 54 Bio-hacking DNA data storage 80
Genetic manipulation gone awry 55 The Trojan horse saga 80
He Jiankui, China’s Dr. Frankenstein 55 The Trojan horse malware 80
Who is He Jiankui? 55 The ransom formula 81
Lulu and Nana 56 The Dillinger ransome 81
Appendices 56 DNA bio-hacking with website-powered
Appendix-A: the human genome 56 ransom attack 82
The Human Genome Project (HGP) 57 DNA bio-hacking with SQL injection
(SQLI) attack 82
Contents ix

DNA bio-hacking with microchip 83 AFIS (automated fingerprint identification


A word on RFID 83 system) record layout; hacking IAFIS
DNA bio-hacking with external buffer system 106
overflow payload 84 The million stolen fingerprints 107
DNA bio-hacking with internal DNA profiling 107
sequenced malicious binary 84 Mitochondrial DNA 107
Appendices 85 The two bio-hacking scenarios 108
Appendix-A: Strategic terms used in DNA Scenario-1: hacking the combined DNA
cyber hacking 85 index system (CODIS) 109
Appendix-B: The national center for Introduction 109
biotechnology information (BCBI) 85 Architecture of the almighty CODIS 109
Appendix-C: Immune-system arms NDIS the smart DNA indexing engine of
race 86 CODIS 111
Appendix-D: DNA data format 87 CODIS technology and DNA
Recommended sources 87 analysis 112
Biohacking-as-a-service (BhaaS)
6. The E. Coli plasmids and organizations 112
COVID-19 saga, loaded directly The strategy of attack on CODIS 113
into DNA CODIS vulnerabilities 113
REDIS: remote dictionary server
DNA the new beast 91 (Redis) 114
Anatomy of coronavirus 91 CODIS management 114
Bio-hacking DNA with COVID-19 93 CODIS storage stats 114
The CORONA attack (Act-1) 93 Hacking CODIS execution 115
The CORONA attack (Act-2) 93 Hacking the combined DNA index
Neuro-invasion of COVID-19 in the system (CODIS) 116
human brain 94 Scenario-1 hacking CODIS DNA
E. Coli physical transport (spyware criminal database 117
delivery) 95 Hacker’s zero day 119
Pathogens transported into DNA lab 96 Scenario-2 hacking genome
Lab definitions 96 databanks 120
DNA bio-hacking with FASTQ method 97 Goals for the human genome project
Appendices 100 (HGP) 121
Glossary of COVID-19dfrom MERIT Medical implications 122
CyberSecurity consulting 100 First step in hacking HGP: knowing the
References 101 CODIS system as a geneticist and
system guru 123
7. DNA fingerprinting, biohacking- Blast search engine 123
as-a service to alter criminal Important database tools 123
records from DNA national The cancer moonshot project 124
Banks Hacking prerequisites 124
Hacking biometrics technologies 126
God created the fingers, we created
A snapshot of history 126
the DNA fingerprinting 103
The medical examiner system 126
DNA is the Holy Grail 104
CODIS 126
DNA profiling is the enemy of
The onion router (TOR) and the dark
privacy 104
web 127
Bio-medical engineering and
The dark web 128
bio-informatics 104
Appendix 129
Definition of forensic science 104
Appendix-A REDIS technology 129
In the beginning we had fingerprints 105
Appendix-B Glossary of CODIS 129
Definition of human fingerprinting 105
Biological sibling 131
IAFISdthe integrated automated
Appendix-C glossary of the dark
fingerprint identification system 105
web 150
x Contents

Appendix-C the onion router (TOR) 9. The drone technology, transport


glossary 153 strategy, and risk evaluation, and
Appendix-D the open system biomedical revolution
interconnection (OSI) model 153
Recommended sources 154 Introduction 177
Stepping a little deeper into DNA
8. How to select a DNA bio forensics 179
attack. How to plan it, assess The world of biohackers 179
Knowing thy enemy 180
its damage, and its
Nanotechnology the new paradigm
vulnerability shift 180
DNA bioweaponry and DNA bio-hacking Nano technology, the sunrise of the
warfare 155 future 181
CRISPR the two-edged sword 156 The nano DNA bio-hacking, a new
CRISPR is the new DNA bio-bomb 156 disruptive technology 182
Life-extension and age reversing Internet-of-Nano-Things (IoNT), the
euphoria 156 next thing in bio-hacking 182
Why is synthesis biology the right arm CODIS, the DNA crime profile system,
for bio-hacking? 157 the crime magnifier 183
Bio-hacker hacking qualifications 159 Memorandum of attach agreement with
Bio-hack method-1(Boobytrap) 159 bio-hacking organization 184
Bio-hack method-2 (remote control) 160 Strategy of attack of the nano
Stuxnet the devil’s terminator 161 Bio-drone 185
Stuxnet missile architecture 161 Stage-1: Attack planning and
Now we have DNAxnet 162 engineering 185
DNA bio-hacking categories 162 Stage-2: Drone flight 185
DNAxnet work of the devil 163 Stage-3: bio-hack episode 185
The possibilities to hack DNA Targeted Killing with nano drones-the
databanks 165 new DNA vandalism 186
Josiah Zayner “the first body biohacker” The launch of the nano DNA bio-drone
story 165 attack 186
Zayner’s pioneering work 165 Anatomy of the nano DNA biohack
The awesome postmortem bio-hacking drone 186
story 166 Anatomy of Nano-DNAxnet, the
Evaluation of the critical success factors futuristic biohack nano chip 187
(CSF) for DNA bio-hack mission 166 Engineering of the DNAxnet
DNA bio-hack success factors 167 nanochip 188
Evaluation of success in DNA bio-hack DNAxnet nanochip components 189
mission 169 DNAxnet missile design
Appendices 172 specifications 189
Appendix-A Chinese scientist who REDIS/CODIS technology 191
produced genetically altered Functionality of the zookeeper, the
babies 172 frontend traffic coordinator 192
Making gene editing an equal playing Functionalities of the CODIS/proxies,
field 172 the smart IP filter 192
Appendix-B the story of stuxnet, the Functionality of CODIS load balancer 192
missile from hell 173 Functionalities of the REDIS Sentinel 193
Appendix-C glossary of hacking terms REDIS memory specifications 193
list of important terms used in the CODIS transaction sequence 194
field of hacking 173 The nano DNA-bio-drone attack 194
Recommended sources 175 Strategy of the attack 194
Contents xi

Launching the attack 195 How did the bio-hackers simulate the
DNAxnet delivery on board the attack? 226
nano-drone 196 Environmental data 226
Then, what happened after the hack 196 Hacking background and technical
Removing CODIS records is slippery experience 226
slope 196 Results of the bio-hacking simulation
The digital immunity ecosystem (DIE) model 226
and The Smart Vaccine 198 The dashboard screen 227
Appendix 199 The activity screen 227
Appendix A 199 The graphics screens 228
Appendix B 201 The launch of the DNAxnet Trojan
References 203 daemon 228
Post attack impact and tracking the
10. Drone delivery methods CODIS sabotage 229
and how to communicate Biohack risk computation 230
with the destination Further bio-hacking success
formulas 231
History of drones 205 Criticality is determined by number of
Nanotechnology, the sunrise is so components 231
bright 207 What is criticality? 232
Bio-hacking services adopted drone What is severity? 232
nanotechnology 207 Human critical survivability 232
Give law enforcement a hand 208 Appendices 234
Quantum computers, quantum Appendix-A the complete story of
supremacy 208 stuxnet 234
Quantum computing, the fertile ground Recommended sources 237
for bio-hackers 209
Nano quantum computing 211
Delivery methods 211 12. Storage and execution
Weaponized Nano Bio-Hacking of DNA contaminated
(WNBH) 212 code
Quantum droning and delivery 213
Quantum Network 213 We’re still on crutches 239
Everything is connected 214 Even concert walls cry 240
Appendices 215 Solar winds crater 240
Appendix-A: god and time 215 The central dogma 240
Appendix-B: Shor’s algorithm in the Stepping into God’s domain,
quantum computing 216 CRISPR gene editing 241
Appendix-C: Glossary of quantum Anatomy of CRISPR, the two-edge
computing: National Academies of sword 241
Sciences, Engineering, and Medicine. This is how CRISPR works 241
2019 216 A snap of CRISP history 242
Recommended sources 219 CRISPR the tool to hack the human
genome 243
11. The DNAxnet Bio warfare Injecting bio-malware with
CRISPR 243
and evaluation of its
The three contamination attack
impact scenarios 244
What is DNA bio-hacking-as- Scenarios of DNA genes contamination
a-service? 221 and distribution 244
Stuxnet is the devil’s key to hell 221 Appendices 246
The bio DNAxnet, the fruit from Appendix-A: Glossary Of DNA And
hell 224 Protein (Courtesy of the National
The attack scenario 224 Center for Biotechnology
Design of the bio DNAxnet Information); MERIT CyberSecurity
nano-chip 224 is a member of the National Institute
Bio DNAxnet missile uses UNIX 225 of Health 246
xii Contents

Appendix-B: Glossary of CRISPR 14. Forecast and detection of DNA sur-


(Courtesy of the US Library of prise bio-attacks, bio-defense and
Medicine) 255 eradication. How to secure DNA
Appendix-C: Glossary of Genetics data files
(From MERIT Bio-Engineering
Library) 256 Bio-attack since the beginning of
Recommended sources 263 time 289
The Plague of Kaffa 289
13. Encryption technology and Detection of surprise DNA
camouflaging contaminated bio-attack 290
DNA-code injection The story of GenBank DNA sequence
database 291
In the beginning, there was Caesar’s Building an autonomic AI-centric
cipher 265 smart system to stop DNA
Interesting facts about the man who bio-attack 293
broke the EnigmadAlan turing 266 The DNA bio-response 295
Alain Turing the hacker 267 Could DNA protect itself? 295
The universal Turing machine, the Government response to DNA
granddaddy of computing 267 bio-attack 295
DNA gene bio-hacking technologies 267 The DNA bio-hacking achilles’
DNA bio-hacking with cryptography heel 296
(first camouflage technology) 269 America is facing new type of
DNA bio-hacking with cryptography, bio-attack 296
the holy grail of bio-hackers 271 The view Covid-19 attack for DNA
The Rosetta Stone story 271 sabotage 296
Bio-hackers the DNA Houdinis 272 Biotechnology impact on
DNA bio-hacking with watermarking, bio-hacking 297
(second camouflage technology) 273 The new plan for a national
Bio-hackers and advantages of Bio-Defense Department
watermarking 274 (BDD) 297
Watermarking and masking Architecture of the National DNA
optimization 274 Defense Center Against the
DNA bio-hacking with Unknown (NDDATU) 298
steganographyd Security measures of The National
(third camouflage technology) 275 DNA Defense Center against the
CODIS bio-hacking process 278 Unknown (NDDCATU) 299
Bio-hacking with quantum A look at the quantum
cryptography 279 computing 300
Advantages of QC and quantum key How does quantum entanglement
distribution 279 work? 301
Bio-hackers are the masters of quantum How does quantum teleportation
key distribution (QKD) 279 work? 301
Bio-hacking reaction to quantum Teleportation by optical
computing 280 tweezers 302
Google’s quantum computer, the Human teleportation, what? 302
Sycamore 280 Our daily digital computers
Bio-hacking attack manifesto 281 razzle dazzle will soon rest
Appendix 285 in peace 303
Appendix-A: Quantum Cryptography Appendix 303
Glossary. National Academies of Appendix-A: The SARS-CoV-2,
Sciences, Engineering, and National Institute of Allergy, and
Medicine. 2019. Quantum Computing: Infectious Diseases (NIAID) 303
Progress and Prospects. Washington, Appendix-B: NCBI’s GenBank
DC: The National Academies Reactor . The source of medical
Press. 285 knowledge 304
Recommended sources 287 Recommended source 305
Contents xiii

15. How to reverse engineer DNA Now the quantum cloud, capital of the
and quantum bio-attacks quantum Internet of Medical Things
(IoM) 325
Reverse engineering, tool of Design of quantum bio-hack applications
survival 307 for Internet of Medical Things
Anatomy of a DNA bio-hacking 308 (IoMT) 326
Anatomy of our DNA 309 Design of the quantum Internet of
What is cryonics, death-2-life reverse Medical Devices (IoMD), the medical
engineering 310 yellow pages 326
Bio-hackers love DNA treasures 311 Testing the quantum killer application
How to reverse engineer a DNA bio- with simulation 327
attack 311 The architecture of a bio-med data
Bio-hackers will simulate the future center model 329
of the attack 312 Appendix 330
Portfolio of bio-hacking attacks 312 Appendix-A: software companies
The Turin reverse-engineering process that have Software Development Kits
that saved the war 312 (SDKs) for quantum computing 330
Cracking the Enigma 312 Appendix-B: companies giving access
Reverse engineering is breakdown, to quantum computers 331
copy and rebuild engineering 313 Appendix-C: technical comparison
Reverse engineering strategy in DNA between classical software and
bio-hacking 314 quantum software 331
The four steps of reverse Recommended sources 331
engineering 314
Reverse engineeringdreformulationd 16. CRISPR controversy with religion
find from known protein the proper
and ethics advocates to control
DNA 315
Reverse-engineering implementation in
evolution and embryology
quantum bio-attacks 316 enhancement, and to eliminate
Digital circuitry and phenomenon of genetically inherited diseases
Moore’s law 316 A thought from the launch pad 333
And then, quantum computing CRISPR anatomy 334
prevailed 317 CRISPR the silent guillotine
How can bio-hacking penetrate apparatus 335
quantum computing 317 Bio-hackers are getting ready to use
Bio-hacking strategic plan of attack 319 biological weapons 336
Bio-hacking organizations attack Drones have become part of the
targets 319 bio-weaponry 337
Anatomy of the quantum computer 321 Let’s not forget Dr. Zhang contribution
Quantum hardware 321 in CRISPR 338
Software and tutorials from quantum CRISPR best invention in the world 338
computer hardware providers 322 Peace between science and religion-
Quantum software and quantum injecting “scriptural” DNA into the
programming 322 body 339
Finally, quantum internet (QI), the The Adrien Locatelli Saga 339
favorite for bio-hacking 323 Stepping into the domain of god 340
Goals of bio-hacking organizations for CRISPR’s religion enigma 340
quantum computing and quantum Playing hard ball CRISPR 340
internet 324 Bio-academia, intelligence
The other surprise, quantum internet enhancement, better education 341
of things 324 The blessing of bacteria 341
Bio-hacking organizations are going What is more important DNA or
after the Quantum Internet of religion (extracted from the
Medical Things (QIoMT) 325 telegraph 3-3-2019) 341
xiv Contents

Bio-hacking affinity for CRISPR 342 Françoise Baylis 347


Some atheistic arrogance 342 Weighing CRISPR on the scale 347
The Dr. Francis Collins defense, Concluding thoughts 349
director of the national institutes of Religion fighting religion 349
health 342 Appendices 350
He Jiankui gene-editing scandal 343 Appendix-A: Glossary of CRISPR 350
Religious communities are not Appendix-B: Watch: meet one of the
happy 344 world’s most groundbreaking
Dr. Crick and Churchill arguments 344 scientists. He is 34 350
Nobel scientist happy to “play god” Recommended sources 350
with DNA 345
Now religion speaks about DNA 345
Epilog 353
Conflict between science and religion
Index 355
on evolution 345
Meet Dr. Josiah Zayner, the
Where does CRISPR fit between Pasteur of biohacking. 363
creation and evolution 346
About the Author

Dr. Rocky Termanini, CEO of MERIT CyberSecurity Group, is a subject matter expert in IT security, Restorative
Technologies, Artificial Intelligence, Bio-Informatics, Nanotechnology, Quantum Computing, Deep Learning, DNA
digital Computing and Storage, and finally, Drone-assisted DNA Bio-hacking with CRISPR. He is a member of the San
Francisco Electronic Cyber Crime Task Force. Veteran of 50 years of cross-industry experience at national and interna-
tional levels. We’re in the middle of disruptive technologies which have giving us wonderful products like the iPhone,
iWatch, iPad, all the way to the nanochip. He is the designer of the “Cognitive Early-Warning Predictive System” and “The
Smart Vaccine,” which replicates the human immune system to protect the critical infrastructures against future cyber wars.
Dr. Termanini has taught Information Systems courses at Connecticut State University, Quinnipiac University, University
of Bahrain, University College of Bahrain, Abu Dhabi University, The UAE Academyand has lectured at Zayed University
in Dubai.

xv
This page intentionally left blank
Acknowledgment

DNA is the digital code of life. It encodes how we are built and how nature operates, and science is learning more and more
about this uniquely digital language. It is a magic word and is galvanized with so many mysteries. Biohacking is another
eye-opening highly specialized field; although biohacking is in its infancy, it is the new paradigm that will create a new
generation of Zayners, as shown in Netflix fast-paced thriller “Biohackers.”
I have talked and listened to many people on the subject of biohacking and absorbed a lot of new ideas and learned
about the dark corners of this technology, which are just as exciting as the new discoveries of the black hole. By the way,
Stephen Hawking could have been a great biohacker if he had been alive.
In addition, I salute the following people and wanted to acknowledge their admiration and enthusiasm on the subject of
DNA hacking!
Ms. Lina Termanini, Director, Global Methods, Ernst & Young, San Francisco, CA
Dr. Neyla Hinedi, Aspiring Research Scientist, Pittsburgh, Pennsylvania
Ms. Nadia Termanini Hinedi, Attorney at Law, Pittsburgh, Pennsylvania
Dr. Sami Termanini, MD, General Medicine, Dublin, Ireland
Dr. Zafer Termanini, MD, Orthopedic Surgeon, Florida, USA
Ms. Mia Williams, Business Consultant, Florida, USA
Ms. Garcia Ana Claudia, Senior Acquisitions Editor, Polymer Science and Nanotechnology, Elsevier Publishing, Brazil
Radwan Termanini, Senior Economist, Doha, Qatar
Samir Termanini, Attorney at Law, Computer Science Expert, New Jersey, USA
Dr. Eesa Bastaki, President of the University of Dubai, Dubai, UAE
Dr. Hussain Al-Ahmad, Dean of the College of Engineering at the University of Dubai, UAE
Dr. Wathiq Masoor, Professor Chair of Electrical Engineering, University of Dubai, UAE
Dr. Bushra AlBlooshi, Director, Research and Innovation, Dubai Electronic Security Center, UAE
Meshal Bin Hussain, CIO, Ministry of Finance, UAE
Dr. Adel Al Alawi, Professor of MIS, University of Bahrain, Bahrain
Dr. Hoda Alkhzaimi, Director, Center for Cyber Security, Professor at NYU Abu Dhabi, UAE
Dr. Sameera Almulla, Board Member of the Emirates Science Club, Abu Dhabi, UAE
Ms. Alison Ryan, PA-C, Diablo Valley Oncology and Hematology, California Cancer and Research Institute, Pleasant
Hill, CA
Dr. Siripong Malasri, Dean of Engineering, Christian Brothers University, Memphis, Tenn.
Ms. Amna Almadhoob, Senior Security and Researcher, AMX Middle East, Bahrain
Chanda Banwat, MD, Internal Medicine, John Muir Medical Group, Walnut Creek, CA
Judson Brandeis, MD, Comprehensive Care for Sexual Medicine, San Ramon, CA
Dr. Suzee Eurie Lee, MD, University of California, San Francisco, CA
Dr. Robert Robles, MD, Diablo Valley Oncology and Hematology, San Ramon, CA
Dr. Navjeet Boparai, MD, Integrated Pain Management, Walnut Creek, CA
Ms. Akila Kesavan, Partner, Ernst & Young, San Francisco, California
Dr. Yigal Arens, Director, USC/Information Science Institute, Los Angeles, CA
Dr. Kristina Nyzell, CEO, Disruptive Play Consulting, Sweden
John and Danielle Cosgrove, Cosgrove Computer Systems, El Segundo, CA
Also, I would like to thank the rest of my visionary and creative friends for their gracious assistance and support.
Dr. Rocky Termanini
Walnut Creek, CA 94595

xvii
This page intentionally left blank
Chapter 1

The miraculous architecture of the gene


pyramid
There is enough storage capacity in the DNA of a single lily seed or a single salamander sperm to store the Encyclopedia
Britannica 60 times over. Some species of the unjustly called “primitive” amoebas have as much information in their DNA as
1000 Encyclopedia Britannica.
Richard Dawkins.
The results suggest a helical structure [of DNA] (which must be very closely packed) containing probably 2, 3, or 4 coaxial
nucleic acid chains per helical unit and having the phosphate groups near the outside.
Dr. Rosalind Franklin
Double Helix Discoverer.
DNA is like Midas’s gold, everyone who touches it goes mad.
Dr. Maurice Wilkins.
Blind individuals who have tried these artificial retinas have been amazed that they can see colors and outlines of images. It is
only a matter of time before we have artificial retinas that can rival human sight.
Dr. Michio Kaku.

My name is DNA
For life to exist, an information system is needed to produce and regulate life functions. This information system must also
be able to accurately copy itself for the next generation. DNA (deoxyribonucleic acid) is the information system for life.

Initial thoughts
Imagine a world where you could go outside and take a leaf from a tree and put it through your personal DNA sequencer
and get data like music, videos, or computer programs from it. Well, this is all possible now. It was not done on a large
scale because it is quite expensive to create DNA strands, but it is possible.
Here’s an interesting anecdote that will catch you eye: A French high schooler has allegedly bioengineered DNA based
on verses from the Bible and Quran and injected it into his own leg. Adrien Locatelli, 16, from Grenoble, France, posted a
short paper to the Open Science Framework preprint server in which he claimed to produce strands of DNA that corre-
sponded to verses from the Bible and the Quran. According to Locatelli, he then injected the DNA containing the Bible
verses into his left thigh, and the DNA with the Quranic verses into his right thigh. “I did this experiment only for the
symbol of peace between religions and science,” Locatelli told me in an email. “It’s just symbolic.” The proteins created by
Locatelli are basically just short strands of DNA, which is made of nucleotides that can only be combined in specific ways.

Anatomy of DNA
Deoxy-ribo-nucleic acid is a large molecule in the shape of a double helix. That’s a bit like a ladder that’s been twisted
many times. Many people believe that American biologist James Watson and English physicist Francis Crick discovered
DNA in the 1950s. In reality, DNA was first identified in the late 1860s by Swiss chemist Friedrich Miescher. Then, in the
decades following Miescher’s discovery, other scientistsdnotably, Phoebus Levene and Erwin Chargaffdconducted a
series of research efforts that revealed additional details about the DNA molecule, including its primary chemical

Biomedical Defense Principles to Counter DNA Deep Hacking. https://doi.org/10.1016/B978-0-323-99914-4.00012-6


Copyright © 2023 Elsevier Inc. All rights reserved. 1
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of Forbidden flight
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: Forbidden flight

Author: Chester Cohen

Release date: March 11, 2024 [eBook #73146]

Language: English

Original publication: New York, NY: Columbia Publications, Inc, 1941

Credits: Greg Weeks, Mary Meehan and the Online Distributed


Proofreading Team at http://www.pgdp.net

*** START OF THE PROJECT GUTENBERG EBOOK FORBIDDEN


FLIGHT ***
FORBIDDEN FLIGHT

By Chester B. Conant

A Future Fiction Brief

[Transcriber's Note: This etext was produced from


Future combined with Science Fiction October 1941.
Extensive research did not uncover any evidence that
the U.S. copyright on this publication was renewed.]
But for the internal sounds of the ship hurtling through space the
silence was complete. It was not long since they had left Earth on
their perilously romantic expedition. In the enforced inactivity aboard
ship, the half-dozen members of the crew were reliving the events of
the past few months, particularly that final meeting of the Junior
Rocketeers, an organization of younger space pilots, most of them
still in their twenties. The society had been organized late in the 21st
Century by the Board of Interuniversal Transportation, Youth
Commission, to interest the space-conscious youth of the World in
"the furthering of scientific expeditions to planets yet unexplored to
extend the knowledge of man." Into this organization had poured
young men and women from all walks of life interested in making
their hobby of rocketing important as an aid to scientific
advancement.
Its success was attested by the fact that the Tellurian Army of
Maintenance consistently recruited officers from its membership to
be trained as assistant commanders of its extraplanetary forces.

"I am here, Friends, to plead the cause of sanity," Dr. Henry Neist
began. Hurt eyes stared at the speaker with disappointment and
astonishment. The doctor paused. For a moment, he had the feeling
that they hadn't heard, so stunning was the silence. The members of
the Junior Rocketeers were thinking, trying to understand, since Dr.
Neist was their last hope of official sanction. This same Dr. Neist had
been their greatest supporter before and during their many previous
expeditions, had helped them, lending his time and patience, even
when all others had forsaken them. He had stood as a bulwark for
them against the sneering disapproval of the World, the only
member of the Board of Interuniversal Transportation who had aided
them, fighting with them and for them to the last.
Now he was standing there on the platform with the others—against
them. Small wonder it was difficult for them to follow his words, to
comprehend his meaning. He fully realized their disappointment and
it was only painfully that he continued.
"In the past I have worked with you side by side against a world of
doubters and scoffers." He was reading their thoughts. "But I cannot
support you in this endeavor. I wish I could...." Dr. Neist paused
resignedly. "I'm not thinking of myself, Friends, believe me. The
thought of exile to the barren Anos does not frighten me as it hasn't
in the past. Twelve of your associates have disappeared—perished
—in flights of exploration to Uranus. Yes, surely perished, for if they
were alive we should most certainly have heard from them. We are
no longer living in the experimental era of the 21st Century. Space
travel is an accomplished fact. We have almost completely
conquered space. But for a few unexplored, outlying planets, we
should have complete knowledge of what was once a great,
mysterious universe.
"With such knowledge, Friends, with interuniversal communications
perfected, can you still believe that twelve young people could
become so lost in space that it were impossible for them to phone
us? Think! They had two complete auxiliary sets of uniphones with
which they could contact any planet in our universe. The sets were in
perfect condition, had been checked and rechecked. Could there
have been an accident so inconceivable as to have ruined their
phones and left their ship damaged beyond repair? The Staluminum
hulls must have been crushed—destroyed—before their instruments
could even be touched.
"The two previous expeditions to Uranus have failed horribly, as
never before in this century of enlightenment and research. The
second expedition should never have been allowed, yet you ask for
a third. It's sheer suicide, Friends—sheer suicide. Don't you see
that?... I cannot give you my sanction." The last with a definite
finality, almost fatalistic in tone. The lines in Dr. Neist's face
deepened; he looked like a tired old man as he sank into his seat.
He felt their disappointment keenly; perhaps as much as they did
themselves.
But the Junior Rocketeers did not realize this at the time. Neist's
decision meant the abandonment of an expedition of months of
planning, during which they had hardly slept, working night and day
to bring their venture to a successful conclusion.
Disconsolately, they trouped out of the hall, hardly speaking. One
boy, Reggie Bowan, much younger than his fellows, who had joined
the organization hardly a month previously, wiped tears from his
eyes as he walked. He expressed the feelings of his dry-eyed but as
fully affected seniors.
That night they met in their spacious quarters which were at once
laboratory, hangar and factory, wherein they had planned and built
the ships which had carried their members to glory on the many
expeditions since the inception of their organization only a quarter-
century before.
"Are all the entrances being carefully watched?" asked Jason Day.
"You haven't forgotten the East Office? The Doctor usually enters
from there. We can't trust anyone now."
"The East Office also, Friend Jason—Rita's guarding it." Jason Day
was local president of the society. Without turning his long dark face,
he assented, "Good. We must work fast, now, and with all possible
caution. The Quest has been checked a hundred times; almost
everything is ready. I assume you've all had your quota for the
evening meal. Dinner is the last meal you'll get on Earth. We'll
breakfast on the ship."
Little more than an hour later, the great roar of the Starterocket tubes
announced the beginning of the outlawed excursion. Having
succeeded in catapulting their burden into space, the incipient
rockets now settled down, smouldering, to rest. A thick, black smoke
hid them from view.
"Starterockets cleared, Friend Jason," announced young Bowan. No
tears now. The lad's face was beaming with a mixture of happiness
and perspiration as he awaited further instructions. Jason threw the
switch that started the ship's rocket engines almost before the boy's
words were finished.
Blanche Holm, the pretty co-pilot, bustled about getting things in
readiness for the long, forbidden journey. Humming happily, she set
gears and levers in preparation for her turn at the controls. Rita
Balter, the only other girl aboard ship, was unpacking and re-packing
tools and gear while others were similarly occupied in the after-
compartments of the Quest.

In his observatory, where he had paced the floor ceaselessly all


night, Dr. Neist watched with deep emotion as the Rocketeers sped
into the infinite. Painted along the ship's side in ragged blue he had
read: URANUS OR BUST. He smiled sadly at their youthful
exuberance. The young fools.... He knew they'd do it. Those old
fossils on the Board must have been mad to think they were going to
give up the idea after these exhaustive weeks of careful planning. He
wished they had. Jason Day was his favorite protege: brilliant,
ambitious—they were all a lot of fine kids. He shrugged his
shoulders wearily....

A gleaming bronze bullet sped smoothly through space, seeming to


nose into the very stars. Inside the bullet Jason was getting ready to
take his turn at the controls. He found Blanche weary yet cheerful,
looking forward to a rest in the sleeping quarters.
"Look at the indicator, Blanche!" he cried. The needle was quivering
madly. "We're nearing it!"
"I know," she replied. "I've been watching it all night. It's been
motionless until now. We must just have entered the range of its
magnetic field."
"I'll take over," Jason said, excitedly. "You'd better get some sleep."
"I can't sleep now. Let me have a stimulette, will you? I've used all
mine."
"Sure ... here." He handed her a capsule. "Blanche—?"
"Yes?"
"I'm thinking it wasn't far from here—"
"Yes, Jay, I know. We'll find out soon enough."
"Perhaps too soon. Blanche, you know how I feel about you."
"Of course."
"Maybe we should have married before we left."
"Why so pessimistic, darling? This isn't like you."
"I don't know." He forced a laugh. "Maybe it's the atmosphere."
It was at that moment, peering through the obsoglass in front of him,
that he saw it.
"Blanche! Look at that!"
In front of them and a few short miles above them stretched a high
fuzzy blanket of haze. Beyond it the torn and twisted remains of the
ships of the two previous expeditions, a gruesome chaos of almost
unrecognizable wreckage. All this could be seen but dimly through
the yellow film.
A moment more and they would pierce the blanket. A feeling of
impending doom seized them. Horror-stricken, they huddled
together, the instruments and dials now forgotten. The indicator
which warned them of their approach had long since burst into
fragments, the magnetic pull on the great needle too much even for
the duraglass shield to withstand.
The Quest pierced the yellow haze. There was a terrific explosion.
Great forces, like unseen hands, tore at the ship, rending the strong
Staluminum hull to fragments as though it were an eggshell. When
the last fragments had come to rest there was nothing to be seen of
the former occupants but a few crimson splotches here and there,
scattered about the wreckage.
Only one huge Staluminum plate which had been thrown clear of the
ship at the beginning of the explosion remained recognizable. Still
legible on one side of the bronze-hued plate were two words:—OR
BUST.
*** END OF THE PROJECT GUTENBERG EBOOK FORBIDDEN
FLIGHT ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation

You might also like