Professional Documents
Culture Documents
Full download Biomedical Defense Principles to Counter DNA Deep Hacking Rocky Termanini file pdf all chapter on 2024
Full download Biomedical Defense Principles to Counter DNA Deep Hacking Rocky Termanini file pdf all chapter on 2024
https://ebookmass.com/product/hands-on-ethical-hacking-and-
network-defense-third-edition-michael-t-simpson/
https://ebookmass.com/product/ebook-pdf-principles-of-biomedical-
ethics-8th-edition/
https://ebookmass.com/product/principles-of-biomedical-sciences-
and-industry-markus-hinder/
https://ebookmass.com/product/network-defense-and-
countermeasures-principles-and-practices-4th-edition-william-
easttom/
Hands-On Ethical Hacking and Network Defense (MindTap
Course List) [Team-IRA] [True PDF] 4th Edition Rob
Wilson
https://ebookmass.com/product/hands-on-ethical-hacking-and-
network-defense-mindtap-course-list-team-ira-true-pdf-4th-
edition-rob-wilson/
https://ebookmass.com/product/two-cowboy-promises-returning-to-
rocky-ridge-book-2-april-murdock/
https://ebookmass.com/product/three-times-charmed-returning-to-
rocky-ridge-book-3-april-murdock/
https://ebookmass.com/product/one-last-chance-returning-to-rocky-
ridge-book-1-april-murdock/
https://ebookmass.com/product/principles-and-labs-for-deep-
learning-5th-edition-shih-chia-huang/
Biomedical Defense Principles to Counter DNA
Deep Hacking
This page intentionally left blank
Biomedical Defense Principles
to Counter DNA Deep
Hacking
Rocky Termanini
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
ISBN: 978-0-323-99914-4
vii
viii Contents
Launching the attack 195 How did the bio-hackers simulate the
DNAxnet delivery on board the attack? 226
nano-drone 196 Environmental data 226
Then, what happened after the hack 196 Hacking background and technical
Removing CODIS records is slippery experience 226
slope 196 Results of the bio-hacking simulation
The digital immunity ecosystem (DIE) model 226
and The Smart Vaccine 198 The dashboard screen 227
Appendix 199 The activity screen 227
Appendix A 199 The graphics screens 228
Appendix B 201 The launch of the DNAxnet Trojan
References 203 daemon 228
Post attack impact and tracking the
10. Drone delivery methods CODIS sabotage 229
and how to communicate Biohack risk computation 230
with the destination Further bio-hacking success
formulas 231
History of drones 205 Criticality is determined by number of
Nanotechnology, the sunrise is so components 231
bright 207 What is criticality? 232
Bio-hacking services adopted drone What is severity? 232
nanotechnology 207 Human critical survivability 232
Give law enforcement a hand 208 Appendices 234
Quantum computers, quantum Appendix-A the complete story of
supremacy 208 stuxnet 234
Quantum computing, the fertile ground Recommended sources 237
for bio-hackers 209
Nano quantum computing 211
Delivery methods 211 12. Storage and execution
Weaponized Nano Bio-Hacking of DNA contaminated
(WNBH) 212 code
Quantum droning and delivery 213
Quantum Network 213 We’re still on crutches 239
Everything is connected 214 Even concert walls cry 240
Appendices 215 Solar winds crater 240
Appendix-A: god and time 215 The central dogma 240
Appendix-B: Shor’s algorithm in the Stepping into God’s domain,
quantum computing 216 CRISPR gene editing 241
Appendix-C: Glossary of quantum Anatomy of CRISPR, the two-edge
computing: National Academies of sword 241
Sciences, Engineering, and Medicine. This is how CRISPR works 241
2019 216 A snap of CRISP history 242
Recommended sources 219 CRISPR the tool to hack the human
genome 243
11. The DNAxnet Bio warfare Injecting bio-malware with
CRISPR 243
and evaluation of its
The three contamination attack
impact scenarios 244
What is DNA bio-hacking-as- Scenarios of DNA genes contamination
a-service? 221 and distribution 244
Stuxnet is the devil’s key to hell 221 Appendices 246
The bio DNAxnet, the fruit from Appendix-A: Glossary Of DNA And
hell 224 Protein (Courtesy of the National
The attack scenario 224 Center for Biotechnology
Design of the bio DNAxnet Information); MERIT CyberSecurity
nano-chip 224 is a member of the National Institute
Bio DNAxnet missile uses UNIX 225 of Health 246
xii Contents
15. How to reverse engineer DNA Now the quantum cloud, capital of the
and quantum bio-attacks quantum Internet of Medical Things
(IoM) 325
Reverse engineering, tool of Design of quantum bio-hack applications
survival 307 for Internet of Medical Things
Anatomy of a DNA bio-hacking 308 (IoMT) 326
Anatomy of our DNA 309 Design of the quantum Internet of
What is cryonics, death-2-life reverse Medical Devices (IoMD), the medical
engineering 310 yellow pages 326
Bio-hackers love DNA treasures 311 Testing the quantum killer application
How to reverse engineer a DNA bio- with simulation 327
attack 311 The architecture of a bio-med data
Bio-hackers will simulate the future center model 329
of the attack 312 Appendix 330
Portfolio of bio-hacking attacks 312 Appendix-A: software companies
The Turin reverse-engineering process that have Software Development Kits
that saved the war 312 (SDKs) for quantum computing 330
Cracking the Enigma 312 Appendix-B: companies giving access
Reverse engineering is breakdown, to quantum computers 331
copy and rebuild engineering 313 Appendix-C: technical comparison
Reverse engineering strategy in DNA between classical software and
bio-hacking 314 quantum software 331
The four steps of reverse Recommended sources 331
engineering 314
Reverse engineeringdreformulationd 16. CRISPR controversy with religion
find from known protein the proper
and ethics advocates to control
DNA 315
Reverse-engineering implementation in
evolution and embryology
quantum bio-attacks 316 enhancement, and to eliminate
Digital circuitry and phenomenon of genetically inherited diseases
Moore’s law 316 A thought from the launch pad 333
And then, quantum computing CRISPR anatomy 334
prevailed 317 CRISPR the silent guillotine
How can bio-hacking penetrate apparatus 335
quantum computing 317 Bio-hackers are getting ready to use
Bio-hacking strategic plan of attack 319 biological weapons 336
Bio-hacking organizations attack Drones have become part of the
targets 319 bio-weaponry 337
Anatomy of the quantum computer 321 Let’s not forget Dr. Zhang contribution
Quantum hardware 321 in CRISPR 338
Software and tutorials from quantum CRISPR best invention in the world 338
computer hardware providers 322 Peace between science and religion-
Quantum software and quantum injecting “scriptural” DNA into the
programming 322 body 339
Finally, quantum internet (QI), the The Adrien Locatelli Saga 339
favorite for bio-hacking 323 Stepping into the domain of god 340
Goals of bio-hacking organizations for CRISPR’s religion enigma 340
quantum computing and quantum Playing hard ball CRISPR 340
internet 324 Bio-academia, intelligence
The other surprise, quantum internet enhancement, better education 341
of things 324 The blessing of bacteria 341
Bio-hacking organizations are going What is more important DNA or
after the Quantum Internet of religion (extracted from the
Medical Things (QIoMT) 325 telegraph 3-3-2019) 341
xiv Contents
Dr. Rocky Termanini, CEO of MERIT CyberSecurity Group, is a subject matter expert in IT security, Restorative
Technologies, Artificial Intelligence, Bio-Informatics, Nanotechnology, Quantum Computing, Deep Learning, DNA
digital Computing and Storage, and finally, Drone-assisted DNA Bio-hacking with CRISPR. He is a member of the San
Francisco Electronic Cyber Crime Task Force. Veteran of 50 years of cross-industry experience at national and interna-
tional levels. We’re in the middle of disruptive technologies which have giving us wonderful products like the iPhone,
iWatch, iPad, all the way to the nanochip. He is the designer of the “Cognitive Early-Warning Predictive System” and “The
Smart Vaccine,” which replicates the human immune system to protect the critical infrastructures against future cyber wars.
Dr. Termanini has taught Information Systems courses at Connecticut State University, Quinnipiac University, University
of Bahrain, University College of Bahrain, Abu Dhabi University, The UAE Academyand has lectured at Zayed University
in Dubai.
xv
This page intentionally left blank
Acknowledgment
DNA is the digital code of life. It encodes how we are built and how nature operates, and science is learning more and more
about this uniquely digital language. It is a magic word and is galvanized with so many mysteries. Biohacking is another
eye-opening highly specialized field; although biohacking is in its infancy, it is the new paradigm that will create a new
generation of Zayners, as shown in Netflix fast-paced thriller “Biohackers.”
I have talked and listened to many people on the subject of biohacking and absorbed a lot of new ideas and learned
about the dark corners of this technology, which are just as exciting as the new discoveries of the black hole. By the way,
Stephen Hawking could have been a great biohacker if he had been alive.
In addition, I salute the following people and wanted to acknowledge their admiration and enthusiasm on the subject of
DNA hacking!
Ms. Lina Termanini, Director, Global Methods, Ernst & Young, San Francisco, CA
Dr. Neyla Hinedi, Aspiring Research Scientist, Pittsburgh, Pennsylvania
Ms. Nadia Termanini Hinedi, Attorney at Law, Pittsburgh, Pennsylvania
Dr. Sami Termanini, MD, General Medicine, Dublin, Ireland
Dr. Zafer Termanini, MD, Orthopedic Surgeon, Florida, USA
Ms. Mia Williams, Business Consultant, Florida, USA
Ms. Garcia Ana Claudia, Senior Acquisitions Editor, Polymer Science and Nanotechnology, Elsevier Publishing, Brazil
Radwan Termanini, Senior Economist, Doha, Qatar
Samir Termanini, Attorney at Law, Computer Science Expert, New Jersey, USA
Dr. Eesa Bastaki, President of the University of Dubai, Dubai, UAE
Dr. Hussain Al-Ahmad, Dean of the College of Engineering at the University of Dubai, UAE
Dr. Wathiq Masoor, Professor Chair of Electrical Engineering, University of Dubai, UAE
Dr. Bushra AlBlooshi, Director, Research and Innovation, Dubai Electronic Security Center, UAE
Meshal Bin Hussain, CIO, Ministry of Finance, UAE
Dr. Adel Al Alawi, Professor of MIS, University of Bahrain, Bahrain
Dr. Hoda Alkhzaimi, Director, Center for Cyber Security, Professor at NYU Abu Dhabi, UAE
Dr. Sameera Almulla, Board Member of the Emirates Science Club, Abu Dhabi, UAE
Ms. Alison Ryan, PA-C, Diablo Valley Oncology and Hematology, California Cancer and Research Institute, Pleasant
Hill, CA
Dr. Siripong Malasri, Dean of Engineering, Christian Brothers University, Memphis, Tenn.
Ms. Amna Almadhoob, Senior Security and Researcher, AMX Middle East, Bahrain
Chanda Banwat, MD, Internal Medicine, John Muir Medical Group, Walnut Creek, CA
Judson Brandeis, MD, Comprehensive Care for Sexual Medicine, San Ramon, CA
Dr. Suzee Eurie Lee, MD, University of California, San Francisco, CA
Dr. Robert Robles, MD, Diablo Valley Oncology and Hematology, San Ramon, CA
Dr. Navjeet Boparai, MD, Integrated Pain Management, Walnut Creek, CA
Ms. Akila Kesavan, Partner, Ernst & Young, San Francisco, California
Dr. Yigal Arens, Director, USC/Information Science Institute, Los Angeles, CA
Dr. Kristina Nyzell, CEO, Disruptive Play Consulting, Sweden
John and Danielle Cosgrove, Cosgrove Computer Systems, El Segundo, CA
Also, I would like to thank the rest of my visionary and creative friends for their gracious assistance and support.
Dr. Rocky Termanini
Walnut Creek, CA 94595
xvii
This page intentionally left blank
Chapter 1
My name is DNA
For life to exist, an information system is needed to produce and regulate life functions. This information system must also
be able to accurately copy itself for the next generation. DNA (deoxyribonucleic acid) is the information system for life.
Initial thoughts
Imagine a world where you could go outside and take a leaf from a tree and put it through your personal DNA sequencer
and get data like music, videos, or computer programs from it. Well, this is all possible now. It was not done on a large
scale because it is quite expensive to create DNA strands, but it is possible.
Here’s an interesting anecdote that will catch you eye: A French high schooler has allegedly bioengineered DNA based
on verses from the Bible and Quran and injected it into his own leg. Adrien Locatelli, 16, from Grenoble, France, posted a
short paper to the Open Science Framework preprint server in which he claimed to produce strands of DNA that corre-
sponded to verses from the Bible and the Quran. According to Locatelli, he then injected the DNA containing the Bible
verses into his left thigh, and the DNA with the Quranic verses into his right thigh. “I did this experiment only for the
symbol of peace between religions and science,” Locatelli told me in an email. “It’s just symbolic.” The proteins created by
Locatelli are basically just short strands of DNA, which is made of nucleotides that can only be combined in specific ways.
Anatomy of DNA
Deoxy-ribo-nucleic acid is a large molecule in the shape of a double helix. That’s a bit like a ladder that’s been twisted
many times. Many people believe that American biologist James Watson and English physicist Francis Crick discovered
DNA in the 1950s. In reality, DNA was first identified in the late 1860s by Swiss chemist Friedrich Miescher. Then, in the
decades following Miescher’s discovery, other scientistsdnotably, Phoebus Levene and Erwin Chargaffdconducted a
series of research efforts that revealed additional details about the DNA molecule, including its primary chemical
Language: English
By Chester B. Conant
"I am here, Friends, to plead the cause of sanity," Dr. Henry Neist
began. Hurt eyes stared at the speaker with disappointment and
astonishment. The doctor paused. For a moment, he had the feeling
that they hadn't heard, so stunning was the silence. The members of
the Junior Rocketeers were thinking, trying to understand, since Dr.
Neist was their last hope of official sanction. This same Dr. Neist had
been their greatest supporter before and during their many previous
expeditions, had helped them, lending his time and patience, even
when all others had forsaken them. He had stood as a bulwark for
them against the sneering disapproval of the World, the only
member of the Board of Interuniversal Transportation who had aided
them, fighting with them and for them to the last.
Now he was standing there on the platform with the others—against
them. Small wonder it was difficult for them to follow his words, to
comprehend his meaning. He fully realized their disappointment and
it was only painfully that he continued.
"In the past I have worked with you side by side against a world of
doubters and scoffers." He was reading their thoughts. "But I cannot
support you in this endeavor. I wish I could...." Dr. Neist paused
resignedly. "I'm not thinking of myself, Friends, believe me. The
thought of exile to the barren Anos does not frighten me as it hasn't
in the past. Twelve of your associates have disappeared—perished
—in flights of exploration to Uranus. Yes, surely perished, for if they
were alive we should most certainly have heard from them. We are
no longer living in the experimental era of the 21st Century. Space
travel is an accomplished fact. We have almost completely
conquered space. But for a few unexplored, outlying planets, we
should have complete knowledge of what was once a great,
mysterious universe.
"With such knowledge, Friends, with interuniversal communications
perfected, can you still believe that twelve young people could
become so lost in space that it were impossible for them to phone
us? Think! They had two complete auxiliary sets of uniphones with
which they could contact any planet in our universe. The sets were in
perfect condition, had been checked and rechecked. Could there
have been an accident so inconceivable as to have ruined their
phones and left their ship damaged beyond repair? The Staluminum
hulls must have been crushed—destroyed—before their instruments
could even be touched.
"The two previous expeditions to Uranus have failed horribly, as
never before in this century of enlightenment and research. The
second expedition should never have been allowed, yet you ask for
a third. It's sheer suicide, Friends—sheer suicide. Don't you see
that?... I cannot give you my sanction." The last with a definite
finality, almost fatalistic in tone. The lines in Dr. Neist's face
deepened; he looked like a tired old man as he sank into his seat.
He felt their disappointment keenly; perhaps as much as they did
themselves.
But the Junior Rocketeers did not realize this at the time. Neist's
decision meant the abandonment of an expedition of months of
planning, during which they had hardly slept, working night and day
to bring their venture to a successful conclusion.
Disconsolately, they trouped out of the hall, hardly speaking. One
boy, Reggie Bowan, much younger than his fellows, who had joined
the organization hardly a month previously, wiped tears from his
eyes as he walked. He expressed the feelings of his dry-eyed but as
fully affected seniors.
That night they met in their spacious quarters which were at once
laboratory, hangar and factory, wherein they had planned and built
the ships which had carried their members to glory on the many
expeditions since the inception of their organization only a quarter-
century before.
"Are all the entrances being carefully watched?" asked Jason Day.
"You haven't forgotten the East Office? The Doctor usually enters
from there. We can't trust anyone now."
"The East Office also, Friend Jason—Rita's guarding it." Jason Day
was local president of the society. Without turning his long dark face,
he assented, "Good. We must work fast, now, and with all possible
caution. The Quest has been checked a hundred times; almost
everything is ready. I assume you've all had your quota for the
evening meal. Dinner is the last meal you'll get on Earth. We'll
breakfast on the ship."
Little more than an hour later, the great roar of the Starterocket tubes
announced the beginning of the outlawed excursion. Having
succeeded in catapulting their burden into space, the incipient
rockets now settled down, smouldering, to rest. A thick, black smoke
hid them from view.
"Starterockets cleared, Friend Jason," announced young Bowan. No
tears now. The lad's face was beaming with a mixture of happiness
and perspiration as he awaited further instructions. Jason threw the
switch that started the ship's rocket engines almost before the boy's
words were finished.
Blanche Holm, the pretty co-pilot, bustled about getting things in
readiness for the long, forbidden journey. Humming happily, she set
gears and levers in preparation for her turn at the controls. Rita
Balter, the only other girl aboard ship, was unpacking and re-packing
tools and gear while others were similarly occupied in the after-
compartments of the Quest.
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.