Cyber is number one and read this: Most of the public discussion regarding cyber threats has focused on the confidentiality and availability of information […] we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e. accuracy and reliability) instead of deleting it or disrupting …
Thousands of people will have their personal files held hostage this year, by software that uses virtually unbreakable encryption. http://www.technologyreview.com/news/534516/holding-data-hostage-the-perfect-internet-crime/
Read National and Transnational Security Implications of Big Data in the Life Sciences by AAAS/FBI/UNICRI, 2014 http://www.aaas.org/report/national-and-transnational-security-implications-big-data-life-sciences
Royal Society, London UK 19th-21st November 2014 Conference on Bio-Chem S&T and Security: Royal Society 19-21st November 2014
‘Google invites geneticists to upload DNA data to cloud’ http://www.sfgate.com/technology/article/Google-invites-geneticists-to-upload-DNA-data-to-5325793.php and the PR http://www.fiercebiotech.com/press-releases/dnanexus-secures-15-million-series-c-financing-accelerate-commercialization The company DNAnexus (www.dnanexus.com) “DNAnexus is powering the genomics revolution with an enterprise-level solution that combines cloud computing with advanced bioinformatics. The DNAnexus team is made up of experts in software, computational biology, and genetics who are on a mission …
Officials having repartee !… “Late last year, CSCC made a move into English-language websites, with the small team of analysts and microbloggers expanding their fight on Facebook, YouTube, Twitter, and elsewhere, under the banner of the US State Department. @ThinkAgain_DOS is just one of their tools in this digital-outreach turf war. (CSCC has used the …
From: A. Smith, D. Greenbaum, S. M. Douglas, M. Long, and M. Gerstein, “Network security and data integrity in academia: an assessment and a proposal for large-scale archiving.,” Genome Biol., vol. 6, no. 9, p. 119, Jan. 2005. Concept: vigilance, good policy and planning, and attention to detail in a three-pronged strategy of prevention, detection, and …
December 2012 –DTRA announces the 1M Algorithm Challenge to characterize a clinical sample from DNA sequencing data. http://www.prweb.com/releases/dtra/algorithm/prweb10233480.htm The challenge was managed by the online platform Innocentive: https://www.innocentive.com/ar/challenge/9933138 Innocentive is actually interesting to look at: (CIA through IN-Q-Tel) crowdsources scientific problems to solvers (http://www.foxbusiness.com/news/2012/11/29/how-in-q-tel-helps-cia-scout-for-innovative-technology-model-for-other-agencies/) Although very enthusiastic at first, I did not participate in the …
GenoTHREAT is now open source (find it on Source Forge). The press release: BLACKSBURG, Va., March 21, 2011 – A software package designed to minimize the potential risks of synthetic biology for the nation’s defense and security is now available to the gene synthesis industry and synthetic biology community in an open-source format. Virginia Tech …