Skip to main content
. 2020 Oct 6;8:571672. doi: 10.3389/fbioe.2020.571672

Table 2.

A summary of the crime types that emerged.

Study method Study design (speculative, experimental, “currently occurring in the wild”) Authors, year Exploit (13 total) Domain (bio-related, cyber-related, drug-related) Crime type Estimated timescale
Penetration testing Experimental Ayday et al. (2013) 1 Privacy breaches of genomic data within a clinical setting Cybercrime Bio-discrimination Current*
2-7 Experimental Backes et al. (2016) 2 Privacy breaches through the identification and matching of Epigenetic data in both a clinical setting and for the biomedical research community Cybercrime Bio-discrimination
2-7 Experimental Ney et al. (2017) 3 Sequencing physical DNA malware that compromises the computer that processes it Biocrime Bio-malware
2-7 Experimental Faezi et al. (2019) 4 Confidentiality breach and oligonucleotide sequence theft through an acoustic side channel attack Cybercrime “Cyber-biocrime”
2-7 Experimental Franzosa et al. (2015) 5 Privacy breach of human microbiome data within a research setting Cybercrime Bio-discrimination
2-7 Experimental Ney et al. (2018) 6 Tampering with DNA sequencing machines to modify sequencing results (enabling “Targeted mis-genotyping”) Biocrime “Cyber-biocrime”
1-8 Expert workshop Speculative Fears and ter Meulen (2018) 7 Exploitation of genome editing technology such as CRISPR to engineer the human microbiome, immune system or to make illegal changes to the inherited genome. Biocrime Illegal gene editing and “neuro-hacking” Long-term
2-8 Speculative Kirkpatrick et al. (2018) Exploitation of genome editing technology such as CRISPR to engineer the human microbiome, immune system or to make illegal changes to the inherited genome. Biocrime Biohacking, illegal gene editing and “neuro-hacking” Not discussed
1-8 Horizon scanning and delphi Speculative Hauptman and Sharan (2013) 8 Exploitation of synthetic biology technologies. For example, the DNA of human individuals is misused for extortion Cybercrime “Genetic blackmail” 2016–2025
1-8 Horizon scanning and delphi and scenario building Speculative Wintle et al. (2017) Exploitation of synthetic biology technologies to engineer microorganisms for illegal purposes (e.g., engineer bacteria to cause infection). Biocrime “Cyber-biocrime,” DIY drugs, biohacking, illegal gene editing and “Genetic blackmail” 5–10 years
1-8 Scenario building Speculative Bress (2017) 9 Illegal use and manufacturing of drugs using emerging technology Drug-related DIY drug manufacturing and biohacking 2030
1-8 Author speculation Speculative Dieuliis and Giordano (2017) 10 Exploitation of the microbiome to gain indirect control of the brain. Biocrime “Neuro-hacking” Not discussed
2-8 Ali et al. (2016) 11 Hacking cyberinfrastructure (e.g., supply chain) of Digital Microfluidic Biochips (DMFB) to compromise assay outcomes, leak sensitive information, or damage the DMFB making it unusable. Cybercrime “Cyber-biocrime” <5 years *
Literature review Speculative Peccoud et al. (2018) 12 Hacking cyberinfrastructure of integrated biotechnology workflows (e.g., biomanufacturing processes) to compromise operations and/or produce nefarious products. Cybercrime “Cyber-biocrime” Current*
2-7 Speculative Qu (2019) 13 Exploitation of genomic information through data breaches to engage in blackmail and/or privacy breaches. Cybercrime Bio-discrimination

Content analysis of the extracted data (Supplementary Table 1) from the 15 reviewed studies (Figure 1) is summarized and ordered according to study design, with experimental study designs at the top. Studies are labeled by study design to signify articles that are either speculative, experimental, or “currently occurring in the wild.” Articles with experimental designs demonstrate feasibility of the method used to commit the exploit whilst speculative articles discussed a potential exploit without a proof of concept. Articles that discussed reports of actual misuse in the real-world are “currently occurring in the wild,” Thirteen exploits were extracted from the 15 reviewed studies and divided into 3 domains: bio-related, cyber-related, and drug-related crime. The total 13 exploits were also grouped to generate the overarching crime types (emerging crime opportunities facilitated by the biotechnologies) (Figure 5). Where available, the estimated timescale predicted by the authors or participants of a study is provided.

*

= timescale not explicitly stated by the authors of the paper but implied (by demonstrating a proof-of-concept through penetration testing, for example) and therefore interpreted/estimated by the researcher.