About the author |
|
xix | |
Acknowledgments |
|
xxi | |
Prologue |
|
xxv | |
|
Chapter 1 Discovery of the book of life--DNA |
|
|
1 | (10) |
|
|
1 | (1) |
|
|
2 | (1) |
|
DNA, the Columbus discovery |
|
|
3 | (1) |
|
|
4 | (2) |
|
DNA as an organic data castle |
|
|
6 | (2) |
|
Music is also one of the DNA's talents |
|
|
8 | (1) |
|
|
8 | (1) |
|
How was DNA first discovered and who discovered it? Read on to find out |
|
|
9 | (1) |
|
Glossary (courtesy of MERIT CyberSecurity--archive) |
|
|
10 | (5) |
|
|
15 | (1) |
|
Chapter 2 The amazing human DNA system explained |
|
|
16 | (1) |
|
"Magical DNA" found in King Tut study |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
The central dogma of genetics |
|
|
19 | (1) |
|
|
20 | (2) |
|
Properties of the genetic code |
|
|
22 | (1) |
|
Another blessing of DNA, biological profiling |
|
|
23 | (1) |
|
The holy grail of DNA: gene editing |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (3) |
|
Social and ethical issues in DNA fingerprinting |
|
|
28 | (1) |
|
DNA's other dark side, the hacking nightmare |
|
|
28 | (1) |
|
DNA is a warm place for music |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (6) |
|
Glossary (MERIT CyberSecurity engineering archives) |
|
|
30 | (6) |
|
|
36 | (3) |
|
Chapter 3 The miraculous anatomy of the digital immunity ecosystem |
|
|
39 | (40) |
|
|
39 | (3) |
|
What is the Smart Vaccine? |
|
|
42 | (1) |
|
Smart cities are like the human body |
|
|
42 | (3) |
|
|
45 | (1) |
|
CEWPS is the intelligent smart shield of the smart city |
|
|
45 | (1) |
|
The 3D nanoattack scenario |
|
|
46 | (1) |
|
Anatomy of CEWPS and its intelligent components |
|
|
47 | (1) |
|
Anatomical composition of CEWPS (the digital immunity ecosystem) |
|
|
48 | (9) |
|
CEWPS component 1 The Central Coordination Center |
|
|
48 | (1) |
|
CEWPS component 2 The knowledge acquisition component |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
The six stages of a cybercrime episode |
|
|
51 | (1) |
|
Cybercrime raw data distillation process |
|
|
52 | (2) |
|
CEWPS component 3 The reasoning engine |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
We can forecast weather; why cannot we predict crime? |
|
|
55 | (1) |
|
Anatomy of the causality reasoning engine |
|
|
55 | (2) |
|
CEWPS component 4 Reverse engineering center |
|
|
57 | (1) |
|
CEWPS component 5 Smart city critical infrastructure |
|
|
57 | (1) |
|
The critical infrastructures in smart cities |
|
|
57 | (2) |
|
|
57 | (2) |
|
What is a critical infrastructure? |
|
|
59 | (6) |
|
CEWPS component 6 The Smart Vaccine center |
|
|
62 | (1) |
|
CEWPS component 7 The vaccine knowledge base |
|
|
63 | (1) |
|
CEWPS component 8 The virus knowledge base |
|
|
63 | (1) |
|
CEWPS component 9 CEWPS smart Nanogrid |
|
|
64 | (1) |
|
|
65 | (4) |
|
Connectivity of critical systems to a city's smart Nanogrid |
|
|
65 | (1) |
|
Anatomy of the autonomic adapter |
|
|
66 | (1) |
|
A smart city is an idealistic hype |
|
|
66 | (2) |
|
Sample system performance screens on the city dashboard |
|
|
68 | (1) |
|
|
69 | (8) |
|
Appendix 3A Glossary (extracted from MERIT cybersecurity library) |
|
|
69 | (8) |
|
|
77 | (2) |
|
Chapter 4 Hacking DNA genes-- the real nightmare |
|
|
79 | (18) |
|
A glimpse of the bright future |
|
|
79 | (1) |
|
Stuxnet is the devil's key to hell |
|
|
80 | (2) |
|
The DNA stuxnet (DNAXNET) |
|
|
82 | (2) |
|
Criminals could alter their DNA to evade justice with new genetic editing tools |
|
|
84 | (3) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (2) |
|
MyHeritage website leakage |
|
|
87 | (1) |
|
|
88 | (1) |
|
Appendix 4.A The complete story of Stuxnet |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (3) |
|
Appendix 4.B Glossary (extracted from MERIT CyberSecurity archives) |
|
|
93 | (2) |
|
|
95 | (2) |
|
Chapter 5 The digital universe with DNA--the magic of CRISPR |
|
|
97 | (42) |
|
|
97 | (1) |
|
What is our digital universe? |
|
|
98 | (1) |
|
How big is our digital universe? |
|
|
99 | (2) |
|
Why is the digital universe growing so fast? |
|
|
101 | (1) |
|
Data storage capacity is becoming asymptotic |
|
|
102 | (1) |
|
Dubai is the magical smart city with its Achilles' heel |
|
|
103 | (2) |
|
Dubai embracing DNA storage |
|
|
105 | (1) |
|
The hyper data center of the world |
|
|
106 | (1) |
|
Five types of data centers |
|
|
107 | (1) |
|
The top 10 hyperscale data centers |
|
|
108 | (1) |
|
How did DNA digital storage start? |
|
|
109 | (2) |
|
From DNA genetic code to DNA binary code |
|
|
111 | (1) |
|
Total size of the human genes in bytes |
|
|
111 | (1) |
|
Why ASCII was so important to DNA coding--A glimpse of history |
|
|
112 | (5) |
|
The Huffman compression rule |
|
|
117 | (1) |
|
Example: the gopher message |
|
|
117 | (1) |
|
Summary of the data storage in DNA |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (2) |
|
Anatomy of CRISPR--the smart cleaver |
|
|
122 | (2) |
|
|
122 | (2) |
|
Artificial intelligence--centric text editing |
|
|
124 | (2) |
|
|
126 | (1) |
|
CRISPR is the Holy Grail of data deluge |
|
|
126 | (1) |
|
|
127 | (9) |
|
Appendix 5.A Glossary of data center terms (MERIT CyberSecurity engineering) |
|
|
127 | (5) |
|
Appendix 5.B Glossary for big data (prepared by MERIT CyberSecurity Engineering) |
|
|
132 | (2) |
|
Appendix 5.C Glossary of CRISPR (MERIT Cybersecurity knowledge base) |
|
|
134 | (2) |
|
Appendix 5.D A list of features standard in current word processing programs |
|
|
136 | (1) |
|
|
136 | (3) |
|
Chapter 6 Getting DNA storage on board: starting with data encoding |
|
|
139 | (34) |
|
Some mathematical ideas that we all need to know |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
Other existing encoding methods |
|
|
142 | (4) |
|
|
142 | (1) |
|
The Huffman encoding method |
|
|
142 | (2) |
|
The Goldman encoding method |
|
|
144 | (1) |
|
|
145 | (1) |
|
The tunable (balanced) redundancy method |
|
|
146 | (1) |
|
Selecting the best encoding method |
|
|
146 | (1) |
|
DNA storage with random access |
|
|
146 | (1) |
|
|
146 | (4) |
|
|
148 | (1) |
|
|
148 | (1) |
|
What is sequencing depth (number of sequence times) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Comparison of reliability versus density |
|
|
150 | (3) |
|
Test result 1 Percent of file recovery as a function of strand density |
|
|
151 | (1) |
|
Test result 2 Density as a function of strand length in bits |
|
|
151 | (1) |
|
Test result 3 Desired reliability as a function of time span and number of copies needed to achieve the desired reliability |
|
|
152 | (1) |
|
|
153 | (1) |
|
Silicon is getting scarce |
|
|
154 | (1) |
|
|
154 | (1) |
|
Artificial gene synthesis |
|
|
155 | (1) |
|
Amazon's flying warehouses |
|
|
156 | (1) |
|
|
156 | (1) |
|
DNA computing--the tables turned |
|
|
156 | (1) |
|
DNA is the new supercomputer |
|
|
157 | (1) |
|
Appendix 6A Glossary of DNA encoding (from merit CyberSecurity library) |
|
|
158 | (13) |
|
|
171 | (2) |
|
Chapter 7 Synthesizing DNA-encoded data |
|
|
173 | (52) |
|
One trillionth of a gram! |
|
|
173 | (1) |
|
|
173 | (1) |
|
DNA Fountain software strategy |
|
|
174 | (3) |
|
Fountain software architecture |
|
|
177 | (1) |
|
A reliable and efficient DNA storage architecture |
|
|
178 | (2) |
|
DNA computing is around the corner |
|
|
180 | (1) |
|
|
180 | (1) |
|
Dr. Jian-Jun Shu discovery |
|
|
181 | (1) |
|
The BLAST algorithm software |
|
|
182 | (1) |
|
BLAST software architecture |
|
|
182 | (1) |
|
One word on FASTA software system |
|
|
183 | (1) |
|
|
183 | (2) |
|
Nondeterministic universal turing machine |
|
|
185 | (1) |
|
Video and audio media features |
|
|
185 | (1) |
|
|
186 | (1) |
|
Binary to DNA code, revisited |
|
|
187 | (6) |
|
Anatomy of text and binary |
|
|
187 | (1) |
|
|
188 | (2) |
|
The QC entanglement process |
|
|
190 | (1) |
|
|
190 | (1) |
|
Quantum computer versus DNA computer |
|
|
191 | (1) |
|
Coding malware into a strand of DNA |
|
|
192 | (1) |
|
Mechanics of the buffer overflow |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
The creative mind of the hacker |
|
|
194 | (1) |
|
The next generation of DNA hacking |
|
|
195 | (1) |
|
|
195 | (1) |
|
Who is the DNA cyber hacker? |
|
|
196 | (1) |
|
Type 1 Artificial intelligence--powered malware |
|
|
197 | (1) |
|
DeepLocker--The smart software |
|
|
197 | (1) |
|
Type 2 Nanopowered malware |
|
|
198 | (1) |
|
|
198 | (1) |
|
DNA hacking with nanorobots |
|
|
199 | (1) |
|
How could DNA attack a computer? |
|
|
199 | (1) |
|
|
200 | (24) |
|
Appendix 7.A Bioinformatics |
|
|
200 | (1) |
|
Appendix 7.B IBM's DeepLocker--the Al-powered malware |
|
|
201 | (1) |
|
Appendix 7.C FASTQ software |
|
|
202 | (1) |
|
Appendix 7.D The Bachand DNA story |
|
|
202 | (2) |
|
Appendix 7.E Deep neural network |
|
|
204 | (2) |
|
Appendix 7.F Sherlock detective software |
|
|
206 | (1) |
|
Appendix 7.G Glossary (deep neural networks) |
|
|
206 | (13) |
|
Appendix 7.H Glossary (DNA terms) |
|
|
219 | (5) |
|
|
224 | (1) |
|
Chapter 8 Sequencing DNA-encoded data |
|
|
225 | (36) |
|
The grandiose design of our digital universe in the 21st century |
|
|
225 | (1) |
|
|
226 | (1) |
|
The bright sun of DNA is coming up |
|
|
227 | (1) |
|
How to retrieve your Illumina Solexa sequencing data |
|
|
228 | (3) |
|
|
229 | (1) |
|
|
229 | (2) |
|
What is the Illumina method of DNA sequencing? |
|
|
231 | (1) |
|
Illumina DNA sequencing operations? |
|
|
231 | (2) |
|
The disruptive industry of digital DNA sequencing |
|
|
233 | (1) |
|
From cell atlas project to DNA storage libraries |
|
|
233 | (1) |
|
Blockchained cannabis DNA |
|
|
234 | (1) |
|
The hidden second code in our DNA |
|
|
235 | (1) |
|
Get on the A-train for blockchain |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Blockchain's competitionethereum |
|
|
238 | (1) |
|
Disadvantages of blockchain |
|
|
238 | (2) |
|
Malware is hovering over DNA code |
|
|
240 | (1) |
|
Case 1 Blockchained malware inside DNA |
|
|
241 | (1) |
|
Case 2 biohacking--malware hidden in DNA |
|
|
242 | (1) |
|
Case 3 DNA malware trafficking |
|
|
243 | (2) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (14) |
|
Appendix 8.A The cannabis dilemma |
|
|
245 | (1) |
|
Appendix 8.B Dr. Church's Regenesis book |
|
|
246 | (1) |
|
Appendix 8.C The miracle of making protein |
|
|
247 | (1) |
|
Appendix 8.D Unit conversion table |
|
|
247 | (2) |
|
Appendix 8.E Glossary for blockchain (From MERIT CyberSecurity knowledge base) |
|
|
249 | (10) |
|
|
259 | (2) |
|
Chapter 9 Decoding back to binary |
|
|
261 | (34) |
|
|
261 | (1) |
|
|
261 | (3) |
|
|
264 | (1) |
|
The central dogma of genetics |
|
|
265 | (2) |
|
Key players in DNA synthesis/sequencing and storage |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
University of Illinois, Urbana-Champaign |
|
|
267 | (1) |
|
Swiss Federal Institute of Technology (ETH), Zurich |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Defense Advanced Research Projects Agency |
|
|
269 | (1) |
|
Intelligence Advanced Research Projects Activity |
|
|
269 | (1) |
|
National Institutes of Health |
|
|
270 | (1) |
|
National Science Foundation |
|
|
270 | (1) |
|
|
270 | (1) |
|
European Bioinformatics Institute |
|
|
270 | (1) |
|
Decoding DNA sequence back into binary |
|
|
270 | (3) |
|
Copying DNA sequences with polymerase chain reaction |
|
|
273 | (3) |
|
Molecular information storage (MIST) story |
|
|
275 | (1) |
|
Just so you know, your DNA can be a wallet for bitcoin data |
|
|
276 | (1) |
|
BioEdit software, sequence editing |
|
|
276 | (1) |
|
The next-generation sequencing technology |
|
|
277 | (1) |
|
|
278 | (2) |
|
|
280 | (3) |
|
The Two-way malware of binary data and DNA |
|
|
280 | (1) |
|
Method 1 Binary malware, inject into DNA |
|
|
280 | (2) |
|
Method 2 Infected DNA, converted to binary |
|
|
282 | (1) |
|
|
283 | (1) |
|
A rainstorm of grasshoppers; now we have a rainstorm of blockchain |
|
|
283 | (1) |
|
|
284 | (10) |
|
|
284 | (1) |
|
Appendix 9.B Glossary for DNA sequencing (from MERIT Cyber Library) |
|
|
284 | (10) |
|
|
294 | (1) |
|
Chapter 10 Fusing DNA with digital immunity ecosystem |
|
|
295 | (28) |
|
How did human immunity come about? |
|
|
295 | (1) |
|
Plague at the Siege of Caffa, 1346 |
|
|
295 | (1) |
|
The plague of Athens, 430 BC |
|
|
296 | (1) |
|
DNA digital storage meets the Digital Immunity Ecosystem |
|
|
297 | (1) |
|
Anatomy of Digital Immunity Ecosystem and its intelligent components |
|
|
298 | (1) |
|
Anatomical composition of Digital Immunity Ecosystem |
|
|
299 | (1) |
|
Component 1 The central coordination center |
|
|
299 | (1) |
|
Component 2 The knowledge acquisition component |
|
|
300 | (1) |
|
Component 3 Reverse engineering center |
|
|
301 | (1) |
|
Component 4 The causality reasoning and predictor |
|
|
302 | (1) |
|
Component 5 Smart city critical infrastructures |
|
|
303 | (2) |
|
Component 6 The smart vaccine center |
|
|
305 | (1) |
|
Component 7 The vaccine knowledge base |
|
|
306 | (1) |
|
Component 8 The virus knowledge base |
|
|
307 | (1) |
|
Component 9 CEWPS smart nanogrid |
|
|
308 | (1) |
|
|
308 | (3) |
|
|
309 | (1) |
|
How did encryption get into DNA? |
|
|
310 | (1) |
|
Cryptology evolution of time |
|
|
311 | (1) |
|
The miracle of cryptology in DNA |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
Malware going after DNA storage |
|
|
313 | (1) |
|
|
313 | (1) |
|
DNA computing applications |
|
|
314 | (1) |
|
|
314 | (1) |
|
Case study: demographic and data storage growth of Dubai |
|
|
315 | (1) |
|
Dubai digital data forecast |
|
|
315 | (2) |
|
|
317 | (5) |
|
Appendix 10.A Cryptography: one-time pad |
|
|
317 | (1) |
|
Appendix 10.B DNA cryptography with data encryption standards |
|
|
318 | (1) |
|
Appendix 10.C DNA cryptography with advanced encryption standard |
|
|
319 | (1) |
|
Appendix 10.D Advanced encryption standard algorithm |
|
|
320 | (1) |
|
Appendix 10.E DNA encoding |
|
|
320 | (1) |
|
Appendix 10.F Cryptology glossary (From MERIT CyberSecurity library) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Chapter 11 DNA storage heading for smart city |
|
|
323 | (20) |
|
|
323 | (1) |
|
Why do we need molecular information storage? |
|
|
324 | (1) |
|
Smart city needs smart data |
|
|
325 | (2) |
|
The smart city will switch from hardware to bioware |
|
|
327 | (2) |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
332 | (9) |
|
Appendix 11.A Glossary Smart Cities (MERIT Knowledge Library) |
|
|
332 | (9) |
|
|
341 | (2) |
|
Chapter 12 DNA Data and Social Crime |
|
|
343 | (20) |
|
|
343 | (1) |
|
Poverty as a pervasive social crime |
|
|
344 | (2) |
|
Key information stored in DNA data storage |
|
|
346 | (2) |
|
DNA can interpret the behavior of a mass killer |
|
|
348 | (1) |
|
Can we reverse engineer DNA and predict a crime? |
|
|
348 | (1) |
|
Smart cities and eradication of cybercrime |
|
|
349 | (1) |
|
|
350 | (3) |
|
Some interesting numbers about DNA data storage |
|
|
353 | (1) |
|
Some interesting numbers about datacenter power consumption |
|
|
353 | (1) |
|
Justification for using DNA storage |
|
|
353 | (1) |
|
|
354 | (8) |
|
Appendix 12.A Poverty State of the Health |
|
|
354 | (1) |
|
Appendix 12.B Glossary for Social/Hate Crime |
|
|
354 | (4) |
|
Appendix 12.C Glossary (Courtesy MERIT CyberSecurity Library) |
|
|
358 | (4) |
|
|
362 | (1) |
|
Chapter 13 DNA data and cybercrime and cyberterrorism |
|
|
363 | (28) |
|
|
363 | (1) |
|
DNA is our binary Holy Grail of data storage |
|
|
364 | (1) |
|
Behavior of the cybercriminal |
|
|
365 | (1) |
|
|
365 | (1) |
|
Anatomy of cyberterrorism |
|
|
366 | (1) |
|
Cybercrime runs on steroids; antivirus technology runs on diesel |
|
|
366 | (2) |
|
Where did the word cyber come from? |
|
|
366 | (2) |
|
Cybercrime data repositories |
|
|
368 | (1) |
|
The storage supply is killing the storage demand |
|
|
369 | (1) |
|
DNA is the holy grail of digital storage |
|
|
370 | (1) |
|
|
371 | (3) |
|
|
374 | (3) |
|
DNA is the holy grail of smart city |
|
|
377 | (2) |
|
|
379 | (3) |
|
Appendix 13.A The human cell atlas |
|
|
379 | (2) |
|
Appendix 13.B DNA computing explained |
|
|
381 | (1) |
|
|
381 | (1) |
|
Biochemistry-based information technology |
|
|
382 | (7) |
|
Real case of chemical DNA computer |
|
|
383 | (1) |
|
Appendix 13.C Glossary for smart city {MERIT cybersecurity engineering) |
|
|
383 | (6) |
|
|
389 | (2) |
|
Chapter 14 DNA is a time storage machine for 10,000 years |
|
|
391 | (22) |
|
A special genre of time machine |
|
|
391 | (1) |
|
DNA time clock can predict when we will die |
|
|
392 | (1) |
|
The link between biological clock and mortality |
|
|
393 | (1) |
|
|
393 | (1) |
|
Time travel is within reach |
|
|
394 | (3) |
|
The amazing storage phenomenon |
|
|
397 | (1) |
|
Storage evolution over time |
|
|
397 | (1) |
|
DNA storage random access retrieval |
|
|
397 | (2) |
|
|
399 | (11) |
|
Appendix 14.A Svalbard Global Data Vault |
|
|
399 | (2) |
|
Appendix 14.B Glossary (Courtesy http://www.genesinlife.org/glossary) |
|
|
401 | (9) |
|
|
410 | (3) |
|
Chapter 15 DNA and religion |
|
|
413 | (32) |
|
DNA and religion galaxies are intersecting |
|
|
414 | (1) |
|
We all ride our personal boat |
|
|
414 | (1) |
|
|
414 | (1) |
|
Peace between science and religion--injecting "scriptural" DNA into the body |
|
|
415 | (1) |
|
|
415 | (1) |
|
DNA and bacteria are allies |
|
|
416 | (1) |
|
The magic of CRISPR, the futuristic phenomenon |
|
|
417 | (1) |
|
Stepping into God's domain |
|
|
418 | (1) |
|
What is more important--DNA or religion? |
|
|
419 | (2) |
|
|
419 | (1) |
|
|
419 | (1) |
|
Dr. Crick and Churchill arguments |
|
|
420 | (1) |
|
Religious communilies are not happy |
|
|
420 | (1) |
|
Personal and medical data used as DNA fingerprint |
|
|
421 | (1) |
|
DNA is human future diary, cannot be fooled |
|
|
421 | (1) |
|
|
422 | (1) |
|
Now religion speaks about DNA |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
423 | (1) |
|
The last words of Einstein |
|
|
424 | (1) |
|
|
424 | (6) |
|
Appendix 15.A The God Gene how faith is hardwired into our genes (extracted from wikipedia) |
|
|
424 | (2) |
|
Appendix 15.B Some laws and principles in evolutionary biology (from library of MERIT CyberSecurity) |
|
|
426 | (2) |
|
Appendix 15.C Holy Quran refers to DNA |
|
|
428 | (1) |
|
|
428 | (1) |
|
Holy Quran reference to DNA |
|
|
429 | (1) |
|
Appendix 15.D The information capacity of DNA |
|
|
430 | (1) |
|
Advantages of knowing DNA |
|
|
430 | (14) |
|
Appendix 15.E Glossary for research ethics (from library of MERIT CyberSecurity) |
|
|
430 | (14) |
|
|
444 | (1) |
Index |
|
445 | |