Skip to main content
Nature Communications logoLink to Nature Communications
. 2020 Dec 8;11:6294. doi: 10.1038/s41467-020-19149-2

The biosecurity benefits of genetic engineering attribution

Gregory Lewis 1,2,, Jacob L Jordan 3, David A Relman 4,5, Gregory D Koblentz 6, Jade Leung 1, Allan Dafoe 1, Cassidy Nelson 1, Gerald L Epstein 7, Rebecca Katz 8, Michael Montague 9, Ethan C Alley 2,10,11, Claire Marie Filone 12, Stephen Luby 4, George M Church 2,11, Piers Millett 1,13, Kevin M Esvelt 2,10, Elizabeth E Cameron 3, Thomas V Inglesby 9
PMCID: PMC7722838  PMID: 33293537

Abstract

Biology can be misused, and the risk of this causing widespread harm increases in step with the rapid march of technological progress. A key security challenge involves attribution: determining, in the wake of a human-caused biological event, who was responsible. Recent scientific developments have demonstrated a capability for detecting whether an organism involved in such an event has been genetically modified and, if modified, to infer from its genetic sequence its likely lab of origin. We believe this technique could be developed into powerful forensic tools to aid the attribution of outbreaks caused by genetically engineered pathogens, and thus protect against the potential misuse of synthetic biology.

Subject terms: Synthetic biology, Policy


A key security challenge with biosecurity threats is determining the responsible actor. In this Perspective, the authors review recent developments in using genetic sequence to assign a lab-of-origin and the potential protection it provides against misuse of synthetic biology.

Introduction

Biotechnology is in an era of rapid and accelerating progress. Qualitative breakthroughs such as CRISPR and artificial gene drives unlock new capabilities, and quantitative trends show biotechnology as an area of increasing investment, decreasing costs, and expanding access.

However, alongside the benefits of this advancing technology for science, medicine, agriculture, and industry, there are concerns over its potential for accidental or deliberate misuse. Laboratory accidents have caused outbreaks before. The 2007 Foot and Mouth disease outbreak in the UK was attributed to a leaking pipe at Institute of Animal Health at Pirbright1. The last known cases of smallpox and SARS were both caused by laboratory exposures, and involved secondary transmission from infected researchers to individuals outside of the laboratory2. The 1977 influenza pandemic was caused by a strain closely related to those isolated in the 1950s, suggesting an anthropogenic origin3.

Both state and non-state actors have attempted to develop biological weapons in the last century. Although 183 states are party to the Biological Weapons Convention, which categorically bans the development and production of biological weapons, multiple states have been alleged to have violated the treaty. Non-state actors have also sought to use biological weapons4,5: notable among these are Al-Qaeda’s unsuccessful attempts to develop biological weapons6; Aum Shinrikyo’s ineffectual bioterrorist attacks7; and the Rajneeshee cult’s use of Salmonella to cause 751 cases of food poisoning in Oregon in 1984.

Technological progress magnifies these dangers: falling barriers to entry increases the risk that reckless or malicious actors will access biotechnology. Emerging capabilities may worsen the potential impact if this risk is realised. The 2011 ‘gain of function’ influenza experiments raised concern that adapting a highly virulent avian influenza strain to be transmissible between mammals posed an unacceptable risk since a laboratory escape could lead to a pandemic8. The increasing ease and accuracy of genetic engineering both widens the possibilities and lowers the barriers to entry to research that could be misused to produce pathogens more dangerous than naturally arising strains9.

The attribution gap

Addressing these biological threats is an urgent and formidable challenge. One element of this challenge is attribution: being able to determine, in the wake of a human-caused biological event, who was responsible. Attribution has three main security benefits. First, knowledge of who was responsible can inform response efforts by shedding light on motives and capabilities, and so mitigate the event’s consequences. Second, it can identify the responsible parties for appropriate civil, criminal, or diplomatic penalty. Third, successful attribution followed by meaningful actions to hold perpetrators accountable can deter those inclined to reckless or malicious practice in the first place.

Information for attribution can be roughly divided into three categories. The first category includes non-technical indicators that provide contextual clues to intent, such as the victims, the location of the event, and epidemiological features. For example, if an incident occurs in the midst of an ongoing conflict, suspicion falls on the belligerents, while if it occurs near laboratories working on the causative agent, there is a greater chance of it being attributed to an accidental release.

Another category informing attribution is intelligence. This ranges from human sources, such as informers or whistleblowers; to intercepted communications; to surveillance data. All can potentially identify those responsible for the release of a biological agent.

The final category is technical forensics: the properties and characteristics of the agent that caused a given outbreak may provide clues as to who made it and/or who was responsible for releasing it.

The nascent field of microbial forensics helped the FBI identify a suspected lab of origin for the anthrax used in the 2001 attack and a suspected perpetrator responsible for the attack10. Nonetheless, further improvement of these forensic capabilities are a recognised need11. Two capabilities would be important: first, to establish whether the causative organism was genetically engineered; and second, if it was engineered, to identify the actor who engineered it.

To detect engineering, tools are being developed which can interrogate the genome of the causative organism for indicators of genetic engineering. The IARPA Finding Engineering-Linked Indicators project, FELIX, seeks to develop new experimental and computational tools for this purpose12. Under the auspices of the UN Secretary-General’s mechanism for investigating alleged biological attacks, there are separate efforts to develop an international trusted laboratory network that would provide forensic support to such investigations. As performance across laboratories in detecting genetic modifications is currently variable, the network may be strengthened through additional tools and access to existing technologies13.

Identification of the engineer poses a further challenge, since determining that an organism has been genetically engineered, and what that engineering involved, does not establish who the engineer was. A given set of edits could conceivably be performed by a multitude of different actors: from individuals working out of a community lab, to university research groups, to industrial laboratories, to a state-run bioweapons facility.

Towards genetic engineering attribution

Fortunately, the very diversity of design approaches and technical options that are now available to achieve a given result (e.g. which genes or genetic features to use, their origin, and how to incorporate these genes or features into the genome) offers a means to approach the attribution problem. Which option a genetic engineer chooses will be influenced by a variety of factors, including their training, prior experience, habits, and available resources. In aggregate, these choices compose a ‘methodological signature’, and thus a way of tracing these design choices back to the likely designer.

That machine learning could be used to detect and interpret these signatures was demonstrated in late 201814, although with a limited accuracy of 48%. Most recently, Alley and colleagues deployed deep learning techniques to predict lab-of-origin for plasmids submitted to the Addgene database - the largest repository of its kind, with 70,000 submissions from labs in 37 countries. Their approach offers an accuracy of 70% when distinguishing between over 1000 labs15.

They also pioneered further capabilities: uncertainty estimation, tracking ‘genealogies’ of genetic engineering groups, and inferring the nation in which the originating laboratory is located. Each of these has security promise: uncertainty estimation enhances robustness and can aid the integration of technical indicators with other available information for making an overall attribution decision; tracking lineages may identify other groups who knowingly or otherwise assisted the actor responsible; and the nation of the originating laboratory may provide a useful investigative clue in the absence of finer-grained information.

The security potential of genetic engineering attribution

These rapid developments have potential as techniques, alongside publications and patents, to help understand patterns of influence and performance within the synthetic biology community, and also a means to identify and protect intellectual property. Our interest is in the biosecurity promise of using these advances to develop forensic tools which can aid attribution of genetically engineered agents and organisms.

The central benefit would be an increase in the actual and perceived accuracy of attribution decisions. This increases the likelihood of the right people being implicated in any misuse of genetic engineering in case of either an accident or an attack. The converse—avoiding mistaken attribution—is also key, given the potentially catastrophic consequences of one state mistakenly believing it is a victim of a biological attack.

An indirect effect of this improved accuracy is deterrence of misuse in the first place. Some actors may be incentivized to be reckless if they believe they are unlikely to be held accountable for any accidents arising from their actions. Malicious actors may be attracted to biological weapons as a means of clandestine violence. Better attribution tools deter both by increasing the risk of discovery.

Three additional features of genetic engineering forensics make it particularly attractive as a biodefense technology. First, unlike other instances where the interests of science and security conflict, the development of genetic engineering forensic tools does not impede scientific enquiry. If anything, it offers co-benefits for the overwhelming majority of well-intentioned and responsible genetic engineers: further means of receiving due credit and recognition, and further safeguards of their intellectual property.

Second, biodefense activity can paradoxically worsen security, by what is known as a security dilemma16. A given state’s biodefense activity, even if wholly defensive in intent, may nonetheless provoke concern in other states that this activity could both harbour and be co-opted for offensive purposes. Mutual suspicion can drive an arms race. Compared to other aspects of biodefense, genetic engineering forensics has more limited prospects for offensive use, and so state investment in this aspect of biodefense poses a lower risk of triggering suspicions and insecurity in its peers.

Third, the efficacy of genetic engineering attribution is coupled to biotechnological progress, so the trends that make misuse more concerning also enhance this approach to help address them. The rapidly growing corpus of genetically engineered sequence information provides more data that can be fed into these forensic tools; the increasing diversity of biotechnological methods also increases the diversity of ‘methodological signatures’ among practitioners.

Challenges and next steps

The security benefits of genetic engineering attribution, even in the ideal case, would have limits. Attribution techniques are not techniques to detect whether engineering occurred in the first place: determining attribution is a process that would follow detection of engineering, and is not a substitute for it. Great caution should apply to using genetic engineering attribution as an improvised means of genetic engineering detection. Inability to attribute does not rule out genetic engineering: a sequence may show clear signs of engineering even if the engineer cannot be identified. There are also risks of false positives: improper use of genetic engineering attribution could ‘attribute’ non-existent engineering, such as identifying the ‘engineer’ of a wild-type pathogen genome.

Genetic engineering attribution is also not applicable to releases of non-engineered agents or organisms, for which other forensics methods remain necessary. Technical forensics may help identify the designer of the genetically engineered organism, but this may not be the actor who misuses it (although identifying the source of genetic engineering which is subsequently misused could be important information, for example in a case of suspected state-sponsored bioterrorism).

The deterrence value of attribution, and thus of better forensic tools to inform it, is sensitive to political context. Forensic identification offers little deterrence to actors intending to claim rather than conceal responsibility, nor to those who plan to evade the consequences of being held responsible by disinformation campaigns or other political means (although genetic engineering forensics may prove a harder target for disinformation if its techniques become public and well-characterised).

Realistic circumstances, rather than ideal ones, imply further limitations. 70% accuracy is far from a smoking gun, and although this may improve further, the performance ceiling is not known. Genetic engineering forensics should be seen as an important forensic tool in the attribution toolkit, instead of a standalone silver bullet.

A key uncertainty is that genetic engineering forensics has so far been developed on—and tested against—data from genetic engineers operating ‘in the clear’: those who publish their sequences to public repositories and make no attempt to conceal authorship. In the case of an attack rather than accident, sophisticated adversaries may also attempt to find ways of obfuscating or misdirecting attribution indicators—genetic engineering forensics included. For example, an attacker could attempt to adopt the ‘methodological signature’ associated with other practitioners in an attempt to deflect attribution or at least confuse the analysis.

Such attempts could leave their own trace, and forecasting how any potential contest between forensics and counter-forensics would play out is difficult; one side or the other may have an intrinsic advantage. Yet even in the worst case where an adversary is justifiably confident that they can evade genetic engineering forensics, doing so imposes a further cost, a further design constraint, and a residual risk of discovery. Each is a disincentive.

Genetic engineering forensics is at an early stage; there is a long way to go from published proof of principle studies to a robust forensic capability. These next steps include: First, starting a dialogue with the forensics and biodefense communities for what capabilities would be useful, and how technical forensic innovations can be brought into practice. Second, corralling further sources of data to improve accuracy and assess how performance scales. Third, leveraging ongoing improvements in machine learning and the creativity of practitioners to further improve the state of the art.

As biotechnology continues to pose a security challenge, it promises new tools to address the same. We believe it is the responsibility of the scientific and policy communities to identify opportunities to create these tools, like genetic engineering attribution, which reduce the risk of misuse. By engaging in this enterprise pro-actively, we can continue to realize the benefits of rapidly improving biotechnology while safeguarding biological security.

Acknowledgements

We thank Richard Danzig and Jason Matheny for feedback and discussion. G.J.L., J.L.J, and E.E.C. were supported by the Open Philanthropy Project. E.C.A. was supported by the Centre for Effective Altruism and the Open Philanthropy Project. D.A.R. is supported by the Thomas C. and Joan M. Merigan Endowment at Stanford University. The views expressed in this paper are not an official policy or position of the National Defense University, the Department of Defense, or the U.S. Government.

Author contributions

G.J.L. wrote and prepared the paper. J.L.J., E.E.C., D.A.R., G.D.K, J.J, A.D. C.N., G.L.E., R.K., M.M., E.C.A, C.M.F, S.L., and K.M.E. provided edits. All authors have contributed to conceptualisation and review.

Competing interests

G.L, E.C.A., G.M.C., P.M., K.M.E., and T.V.L. are involved in a genetic engineering attribution challenge hosted by drivendata (https://www.drivendata.org/competitions/63/genetic-engineering-attribution/). A full list of G.M.C.’s tech transfer, advisory roles, and funding sources can be found on the lab’s website http://arep.med.harvard.edu/gmc/tech.html. All other authors declare no competing interests.

Footnotes

Peer review information Nature Communications thanks Cedric Invernizzi, Kenneth Oye and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Pennington TH. Biosecurity 101: Pirbright’s lessons in laboratory security. BioSocieties. 2007;2:449–453. doi: 10.1017/S174585520700587X. [DOI] [Google Scholar]
  • 2.Heyman DL, Aylward RB, Wolff C. Dangerous pathogens in the laboratory: from smallpox to today’s SARS setbacks and tomorrow’s polio-free world. Lancet. 2004;363:1566–1568. doi: 10.1016/S0140-6736(04)16234-X. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Rozo M, Gronvall GK. The reemergent 1977 H1N1 strain and the gain-of-function debate. mBio. 2015;6:e01013–e01015. doi: 10.1128/mBio.01013-15. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Carus, W. S. Bioterrorism and Biocrimes: The Illicit Use of Biological Agents Since 1990 (Fredonia Books, Amsterdam 2002).
  • 5.Meulenbelt SE, Nieuwenhuizen MS. Non-State actors’ pursuit of CBRN weapons: From motivation to potential humanitarian Consequences. Int. Rev. Red. Cross. 2015;97:831–858. doi: 10.1017/S1816383116000011. [DOI] [Google Scholar]
  • 6.Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. Report to the President of the United States. http://govinfo.library.unt.edu/wmd/report/wmd_report.pdf (2020).
  • 7.Danzig, R. et al. Aum Shinrikyo: Insights into how Terrorists Develop Biological and Chemical Weapons. (Center for a New American Security, 2011) https://s3.amazonaws.com/files.cnas.org/documents/CNAS_AumShinrikyo_SecondEdition_English.pdf?mtime=20160906080510 (2020).
  • 8.Lipsitch M, Inglesby TV. Moratorium on research intended to create novel pandemic pathogens. mBio. 2014;5:e02366–14. doi: 10.1128/mBio.02366-14. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.National Academies of Sciences, Engineering, and Medicine. Biodefense in the Age of Synthetic Biology (The National Academies Press, Washington, D.C. 2018). [PubMed]
  • 10.Koblentz GD, Tucker JB. Tracing an attack: the promise and pitfalls of microbial forensics. Survival. 2010;52:159–186. doi: 10.1080/00396331003612521. [DOI] [Google Scholar]
  • 11.Blue Ribbon Study Panel on Biodefense. A National Blueprint for Biodefense: Leadership and Major Reform Needed to Optimize Efforts, pp. 23–24 (Hudson Institute, 2011).
  • 12.IARPA. Finding Engineering-Linked Indicators (FELIX). https://www.iarpa.gov/index.php/research-programs/felix (2020).
  • 13.Spiez Laboratory. UNSGM Designated Laboratories Workshop Report: Spiez, Switzerland, 9-11 September 2018. (Spiez Laboratory, 2018). https://www.labor-spiez.ch/pdf/en/rue/UNSGM_Designates_Laboratories_4th_workshop_Report.pdf (2020).
  • 14.Nielsen AAK, Voigt CK. Deep learning to predict the lab-of-origin of engineered DNA. Nat. Commun. 2018;9:3135. doi: 10.1038/s41467-018-05378-z. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 15.Alley, E. C. et al. A machine learning toolkit for genetic engineering attribution to facilitate biosecurity. Nat. Commun. 10.1038/s41467-020-19612-0 (2020). [DOI] [PMC free article] [PubMed]
  • 16.Jervis R. Cooperation under the security dilemma. World Politics. 1978;30:167–214. doi: 10.2307/2009958. [DOI] [Google Scholar]

Articles from Nature Communications are provided here courtesy of Nature Publishing Group

RESOURCES