{"id":68336,"date":"2021-11-04T12:30:00","date_gmt":"2021-11-04T01:30:00","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=68336"},"modified":"2021-11-04T11:20:14","modified_gmt":"2021-11-04T00:20:14","slug":"developing-an-australian-cyberbiosecurity-mindset","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/","title":{"rendered":"Developing an Australian cyberbiosecurity mindset"},"content":{"rendered":"
<\/figure>\n

How easy is it for a motivated actor to access your DNA, and why should you even care? These questions have long led to a Pandora\u2019s box few are willing to open; Covid-19 has changed that. Even if you\u2019ve never given your DNA away, your third cousins may have compromised your privacy if they\u2019ve decided to trace their genomic origins on Ancestry.com. Now that might be okay for most people today, but it could be a problem if the DNA of Australian special forces personnel were compromised via targeted attacks<\/a> on third cousin data stored by Ancestry.com or 23andMe. Welcome to the world of cyberbiosecurity.<\/p>\n

Security issues arising from the ongoing convergence between the life sciences and the information sciences have become much more topical since the advent of Covid-19. Yet, even prior to the pandemic, the US Bipartisan Commission into Biodefense was investigating the issue. A 2019 hearing of the commission, titled \u2018Cyberbio convergence: characterising the multiplicative threat<\/a>\u2019, raised issues such as the vulnerability of pathogen and biomanufacturing systems, biological risk mitigation, and the vulnerability of intellectual property in the national and global bioeconomy.<\/p>\n

These are issues that arise from the moment of cyberbio convergence we are living through. Advances in the life sciences have made biological systems easier to engineer at ever increasing speeds and ever decreasing costs. It is exactly this type of convergent acceleration that enabled 20 years of research into mRNA to be translated into a global Covid-19 vaccine rollout in less than 12 months.<\/p>\n

There are massive health and bioeconomic benefits to be derived from this convergent moment. But as with all technological breakthroughs, there will also be risks. The challenge of the post-Covid world is to maximise the upsides of advances in biotechnology while minimising the downsides. That is why a cyberbiosecurity mindset is so important.<\/p>\n

The reason that 2020 is so significant from a biotechnology point of view is because it marked the first time in the information age when the relationship between life and its digital mirror became inverted. Up until 2020, we had typically harvested information from the living environment by one or more mechanical means\u2014a satellite, drone, medical protocol or DNA sequencer. This was a one-way process, harvesting information from the living environment and storing it in a digital twin. In 2020 we went backwards: we digitally designed vaccines and pushed them back into the living environment. Now that it\u2019s been done once, it will be done again, and the US government\u2019s recently announced Apollo program funding<\/a> for biodefence is specifically designed to accelerate these biodesign timelines.<\/p>\n

This is why Australia needs a cyberbiosecurity mindset, because we are now living in an age where information moves between living and cyber systems in a two-way flow. That two-way flow brings net benefits. It empowers us to respond to emerging infectious diseases among humans, animals and crops. It empowers an emerging circular economy based on carbon waste reuse. And it empowers the biomanufacturing of advanced materials such as experimental spider silk aviation composites<\/a>. These are all opportunities where Australia would have a massive comparative advantage if we were to support our bioeconomy to properly pivot and move up the value chain.<\/p>\n

Yet, this two-way information flow also brings new risks, and one of those risks is how it can empower new types of grey-zone warfare. Cyberattacks on vaccine manufacturing supply chains, hospitals and digital stores of genomic data are just some of the less exotic cyberbio threats out there. The more exotic ones include engineered pathogens that mimic the symptoms of common diseases, or identifying individuals with autoimmune disorders and provoking fatal immune systems events, known as cytokine storms. These types of grey-zone tactics all fall within what one might call the Havana syndrome<\/a> playbook. Detection will be difficult, attribution will be difficult, and mitigation will be costly. Technological adaptation and acceleration will be the norm.<\/p>\n

I explored the underpinning trends of grey-zone ambiguity and cyberbiosecurity<\/a> earlier in the year from an academic standpoint. It\u2019s now time for the policy\u2013practitioner interface of defence, security, intelligence and diplomacy to catch up. Australia risks sleepwalking into a world where we are the technology takers of cyberbio systems that are compromised by vulnerabilities we can\u2019t imagine are possible. Policymakers need to fund a deep dive on these issues with technicians and scientists, especially as Australia moves towards funding a host of critical biomanufacturing facilities that will support pandemic preparedness, carbon waste reuse and a next-generation bioeconomy.<\/p>\n

While the advance of technology creates benefits that we can all enjoy, it also creates emergent security issues that cannot be known in advance. If we want to enjoy the economic, health and security benefits of a burgeoning bioeconomy, then we need to do the hard work on anticipating and mitigating the risks. Perhaps more importantly, we need to do this work in a world of techno-strategic dynamism that is fuelling an acceleration of technological change and adaptation.<\/p>\n","protected":false},"excerpt":{"rendered":"

How easy is it for a motivated actor to access your DNA, and why should you even care? These questions have long led to a Pandora\u2019s box few are willing to open; Covid-19 has changed …<\/p>\n","protected":false},"author":1226,"featured_media":68338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2320,898,391,2138],"class_list":["post-68336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-biodefence","tag-biosecurity","tag-cyber","tag-cybersecurity"],"acf":[],"yoast_head":"\nDeveloping an Australian cyberbiosecurity mindset | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Developing an Australian cyberbiosecurity mindset | The Strategist\" \/>\n<meta property=\"og:description\" content=\"How easy is it for a motivated actor to access your DNA, and why should you even care? These questions have long led to a Pandora\u2019s box few are willing to open; Covid-19 has changed ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-04T01:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-04T00:20:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thom Dixon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thom Dixon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg\",\"width\":1000,\"height\":750,\"caption\":\"DNA binary\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/\",\"name\":\"Developing an Australian cyberbiosecurity mindset | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#primaryimage\"},\"datePublished\":\"2021-11-04T01:30:00+00:00\",\"dateModified\":\"2021-11-04T00:20:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/ab8cc1f998b2c1b64715557bf62a53fd\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Developing an Australian cyberbiosecurity mindset\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/ab8cc1f998b2c1b64715557bf62a53fd\",\"name\":\"Thom Dixon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5fae8511607824dc64d3e6910dbe7f44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5fae8511607824dc64d3e6910dbe7f44?s=96&d=mm&r=g\",\"caption\":\"Thom Dixon\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/thom-dixon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Developing an Australian cyberbiosecurity mindset | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/","og_locale":"en_US","og_type":"article","og_title":"Developing an Australian cyberbiosecurity mindset | The Strategist","og_description":"How easy is it for a motivated actor to access your DNA, and why should you even care? These questions have long led to a Pandora\u2019s box few are willing to open; Covid-19 has changed ...","og_url":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2021-11-04T01:30:00+00:00","article_modified_time":"2021-11-04T00:20:14+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg","type":"image\/jpeg"}],"author":"Thom Dixon","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Thom Dixon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2021\/11\/GettyImages-155360625-e1635984137245.jpg","width":1000,"height":750,"caption":"DNA binary"},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/","url":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/","name":"Developing an Australian cyberbiosecurity mindset | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#primaryimage"},"datePublished":"2021-11-04T01:30:00+00:00","dateModified":"2021-11-04T00:20:14+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/ab8cc1f998b2c1b64715557bf62a53fd"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/developing-an-australian-cyberbiosecurity-mindset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Developing an Australian cyberbiosecurity mindset"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/ab8cc1f998b2c1b64715557bf62a53fd","name":"Thom Dixon","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5fae8511607824dc64d3e6910dbe7f44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5fae8511607824dc64d3e6910dbe7f44?s=96&d=mm&r=g","caption":"Thom Dixon"},"url":"https:\/\/www.aspistrategist.ru\/author\/thom-dixon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/68336"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/1226"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=68336"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/68336\/revisions"}],"predecessor-version":[{"id":68339,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/68336\/revisions\/68339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/68338"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=68336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=68336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=68336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}