HACKING DNA SYNTHESIZERS… WITH SOUND

Mr. P.J. spotted this one, and it's in the "whopper doozie" category, and you can file it right up there with the various mind manipulation technologies I've blogged and written about, including such things like "electro-encephalographic dictionaries" and "voice of God" technologies. In a way, I suppose, we could all predict this one coming, for if one can read another individual's thoughts remotely via ultra-sensitive signals equipment and compile "dictionaries of brain waves", then inevitably someone, somewhere, will figure out a way to steal DNA sequences remotely by hacking into networks...

Well, as I said, Mr. P.J. spotted this one, and while most of it is so technical it's totally beyond me, I did manage to catch a few nuggets from the abstract of this paper, and the implications are both profound and chilling:

Here's the paper:

Oligo-Snoop: A Non-Invasive Side Channel AttackAgainst DNA Synthesis Machines

The abstract, in spite of the technicality of the paper, gives the story:

Abstract—Synthetic biology is developing into a promising science and engineering field. One of the enabling technologies for this field is the DNA synthesizer. It allows researchers to custom-build sequences of oligonucleotides (short DNA strands)using the nucleo bases: Adenine (A), Guanine (G), Cytosine (C),and Thymine (T). Incorporating these sequences into organisms can result in improved disease resistance and lifespan for plants,animals, and humans. Hence, many laboratories spend large amounts of capital researching and developing unique sequences of oligonucleotides. However, these DNA synthesizers are fully automated systems with cyber-domain processes and physical domain components. Hence, they may be prone to security breaches like any other computing system. In our work, we present a novel acoustic side-channel attack methodology which can be used on DNA synthesizers to breach their confidentiality and steal valuable oligonucleotide sequences. Our proposed attack methodology achieves an average accuracy of 88.07% in predicting each base and is able to reconstruct short sequences with 100% accuracy by making less than 21 guesses out of 415 possibilities. We evaluate our attack against the effects of the microphone’s distance from the DNA synthesizer and show that our attack methodology can achieve over 80% accuracy when the microphone is placed as far as 0.7 meters from the DNA synthesizer despite the presence of common room noise. In addition, we reconstruct DNA sequences to show how effectively an attacker with biomedical-domain knowledge would be able to derive the intended functionality of the sequence using the proposed attack methodology. To the best of our knowledge, this is the first methodology that highlights the possibility of such an attack on systems used to synthesize DNA molecules. (Emphasis added)

Ponder that one for a moment: a method has apparently been developed to hack into the sequencing of a genome by listening to the noise it makes while in operation.  As one might imagine, this launched me on a bit of high octane speculation, and here it is.

In the 1970s, Soviet Russia embarked on a series of highly classified research projects into what we would call the "paranormal" and one of the results of that research is the now relatively well-known Kirlian photography which was developed to photograph the so-called "aura" or "light body" of living organisms. Perhaps you've seen those photographs of a leaf which has had a portion of it cut away by scissors. Under Kirlian photography, some sort of electromagnetic field or residue of the original leaf remains, and shows up. Extending this idea, Soviet researchers did a great deal of investigation of bio-physics, and came to the conclusion that there were species-specific electromagnetic "templates" for that species, unique to it. They even discovered that diseases versus healthy cells gave off different electromagnetic signatures, and that one could manipulate health or disease by immersing cultures in those signals.

So here comes the high octane speculation: what if it becomes possible to read an individual's electromagnetic signature, i.e., that signature given off by his or her DNA? If that were possible, then it would be possible to reconstruct or "hack" it by electromagnetic means. This may sound like a wild and woolly idea, but the reason I mention it here publicly is because some time ago, this question came up in one of our members' vidchats, and the individual who raised the issue outlined a process of reasoning such as I have outlined above.

And if it is possible to accurately reassemble a genome sequence merely by listening to a sequencer, I suspect it's also possible to interfere with that sequencer remotely through eletcromagnetic means. Either way, it seems to me that the implication is that we may just have taken a small step on the technology tree toward hacking an individual's DNA directly, and remotely.

In fact, technology is moving so fast that I wouldn't be a bit surprised that someone somewhere has already done a preliminary study.

See you on the flip side...

28 thoughts on “HACKING DNA SYNTHESIZERS… WITH SOUND”

  1. Maybe now we know what they tune into, download, and transmit as in “Beam me up Scotty”.

  2. PaulfromMinneapolis

    Hi folks, I use weighted and unweighted tuning forks on the body and in the human biofield up to about six feet from the body, respectively.

    Intention is the key for having sound as cause for change. I suppose that for negative change, an unprincipled party would use Consent as a Simulacrum for Intention.

    For positive change, I simply ask, “are you willing to let “X,” [where “X” is a placeholder for disease, chaos, entropy and so forth] go? As soon as they say “yes,” the tone changes to clear.

    If one is concerned about the effects of the technology presented in this blog post, I would resolve ALL contracts where Consent is Explicit or Implicit.

    1. Thanks for the insights! To go further into the woo-woo for a moment, various good-guy types (out in the aethers) will not ‘intervene’ until someone gives Consent for change, healing, etc. So, an unseen Someone may be just ‘hanging-out’ until an opportunity presents itself. Sometimes, it pays to ask… (Bad-guy types have no such scruples concerning interference.)

  3. Robert Barricklow

    Signpost up ahead: Next stop,
    The AI Synthetic Twilight Zone Shameless Listening Post.
    Be prepared to meet your dark shadow self.

  4. Get your tin-foil hats and body armor everyone.

    I already submitted my dna to “ancestry.com” so I am already in their database. I guess the concern would be that they can mess around with my dna remotely.

    1. anakephalaiosis

      Probably, there is data correlation between bio software and verbal output.

      Best way to sabotage the robot is to perform unpredictable like Pinocchio.

      Carpe diem.

  5. If they can do this, what other signatures can they read? Energetic patterns of the grid – if they are made with crystalline structure which is an analog of DNA then this could easily be extrapolated. And even compared with ancient ‘languages”

  6. Thanks to the authors published by the Advanced Integrated Cyber-Physical Systems (AICPS) Lab, we now now that data “stealing” or hacking forms part of scientific best practices.

  7. Hhmm… So, that’s one of the features for the “healing machines” found in the movie Elysium. It didn’t just 3D print tissues. The “healing bed” first scanned the DNA signature of each person, found the defects in its DNA sequence to reverse aging and health conditions, then hijacked the DNA code to stimulate rapid tissue growth to eliminate the defects and reset the sequence to prevent cancerous effects. To make these machines one had to develop the technologies to listen, tune and rebroadcast coercive signals back toward the targeted system and cell cluster and manipulate the DNA code itself. This requires a full library of DNA from millions of people collected over time through blood and tissue samples to determine how environment and DNA interact. I wonder if the secret to these synthetic processes at any distance is employing longitudinal waves. I also wonder if there is a covert objective behind the requirements of many occupations and jobs for collecting tissue samples of employees (of which soldiers represent since the USA is also a corporation.) And, yes, DARPA would definitely be interested in its weaponization potential.

  8. Combine this technology with DARPA and collecting Russian (or anyone else’s) DNA samples and viola you have covert warfare with plausible deniability. You could test it on Embassy personnel and blame it on whoever you desired.
    What could possibly go wrong…

  9. anakephalaiosis

    Center of attention is greater than life. Center will only hold by logic. Radiating individuals are angelic. They shine. Glorious leaders affect the whole mesocosm, through vibration in the blood, because kin knows kin, and kin follows kin. That is Cyning, by the music in the blood.

    In Scandinavian tongue there is no explanation for the word “king”. So the word must originate outside Scandinavia. The Old English “Cyning” is explainable as source. “Kin+ing” means idea of kin. The suffix “-ing” indicates abstraction – literally a “thought seed”.

    When creating a permanent truce-negotiation between clans – i.e. a sacrosanct area of assembly – an impartial caretaker must be elected. Intermarriage between clans produces such impartial individuals, that are blood related to all the clans. A Cyn-ing.

    Such impartial individuals are most prone to uphold the peace, because they have uncles and aunts in every clan, and therefore they are less prone to behead anyone by mistake. All clans are thus bound by blood, united tribally, in the caretaker of assembly.

    The caretaker position does follow normal hereditary usage. Nevertheless, hereditary wits are no certainty, and a son of a Cyning must be approved by assembly, before taking a position of authority. That is the original idea of crowning a king. Wits are attested by the ability to solve the Druidic Runes.

    The assembly is held within a sacrosanct area – circumscribed by a rope – a tripwire. Anyone, who slays a man inside the sanctuary, has forfeited his life. The caretaker holds the executioner’s axe. That is the general origin of “clearing spaces” whatsoever…

    The rope, that circumscribes the sacrosanct area, is the rope that binds the wolf’s-head in the myth of Tir and Fenrir, explaining that particular Runic symbol, that creates the clearing space of tribal assembly.

    Cyning is a mundane and elected caretaker of a sacrosanct area. His bloodline is only “holy”, because he happens to be blood related to ALL the clans, and NOT because of some magic ritual of anointment. Magic ritual is just Hollywood lies.

    By explaining the mundane Cyning logically, the Runes expose deified kingship as papal hoax, in Babylon magic mind control. Year 1776 is a fork in the road. Americans will reject the deified king. Yet, they will NOT reject the mundane Cyning – by logic of the Druidic Rune genome. That is the point.

  10. If that blows you away—- for 48USD you get this gadget as an accessory to a 100 dollar frequency generator:

    https://www.spooky2-mall.com/product/spooky2-remote-v2-0/

    Connected to a frequency generator with 40,000 frequencies that can be selected and piped in by a notebook computer, this gadget will copy DNA from any human, plant or animal and send its frequency to the individual that produced the DNA. This is the new model. The old one was clunky and noisy (and most likely very easily hacked).

    The device contains a small scalar (sic) antenna that broadcasts the DNA sequence along with up to 20 frequencies to anywhere on earth.

    Does it work?? You bet. Don’t let Windows 10 upgrade and destroy the program while it is killing off bacteria, etc. or your detox program will not run and you will be temporarily sick from the products generated by the destruction of the critters.

    Can it be hacked?? Of course!

    1. Out of curiosity, do any of the Gizar commuity have any experience with this or anything similar for treating illnesses? Royal Rife and his research has always been of particular interest to me.

      1. Connedincalifornia

        I’ve been hobbling around with plantar fasciitis for 5 months. I was treated 3 times with a photonic device invented by Maurice Bales. I am pain free. Presumably the fascia repaired itself. I bought the device. My niece came over with pain from lower back down one leg. She said sciatica-I don’t know about that. I treated her once. She left my house pain free. https://www.balesphotonics.com/about-us/

        1. Thanks for the insights and link – much appreciated. Glad to hear you’re both on the mend.

        2. how easy to operate is it connectedincali? apparently the purchaser needs health care professional credentials?

      2. I have a Spooky2 frequency generator and associated bits. I have had it for about 5 years. I find it highly effective. There is an active community and online forum where one can share and ask for ideas. It is fairly technical, so be prepared to learn as you go.

        Regarding the article, I find it more interesting that sound patterns from a device in use can be used to derive characteristics of the information being created (in this case the DNA).

        What other links can be found between “secondary patterns” and “primary information”? And how might one “tune in” to the surface between?

      3. I have a Spooky2 rig also and, as Cara says, there is a lively online community. I’ve had mine for only a couple of years. I’ve only used it for prophylactic purposes so far, not having been unwell since I invested in it. Perhaps it works?! Unfortunately, it’s still a bit more like lab equipment than consumer electronics and my little brain finds it quite challenging to learn and operate, but worth the effort. The new Spooky2 Scalar device is particularly fascinating ad exciting. It’s all explained on YouTube.

  11. What the abstract in the article is proposing is really no different than deducing a phone number from hearing the dial tones of a phone. Or, extracting a conversation from the micro-movements of a nearby window pane. Standard physical techniques, just applied to a new ‘victim’.

    On “read[ing] an individual’s electromagnetic signature, i.e., that signature given off by his or her DNA,” that is probably impossible (at a distance) because of DNA’s coiled-up nature. You could read some kind of ‘bulk’ signature, much like electrical probes read bulk areas of the brain. If you got a cell into a laboratory and ‘unwound’ it, sure.

    The more interesting approach would be using radionics machines. These are not electromagnetic-based, relying more on psychic or empathic abilities – in spite of having dials and whatnot. I could see a trained radionics user being able to home-in on differences in DNA…

Comments are closed.