Publications
Biomedical Defense Principles to Counter DNA Deep HackingJan 2023 |
307-331
DOI:
10.1016/B978-0-323-99914-4.00020-5

How to reverse engineer DNA and quantum bio-attacks

Termanini, Rocky
Product Used
NGS
Abstract
It is a universal rule in engineering that creativity implies copying ideas from the outside world, from friends, enemies, and of course from competitors. Once the idea is captured, it will be dismantled-reverse engineered, and reassembled from scratch with the new configuration. Reverse Engineering (RE) is highly controversial and became an integral part of manufacturing. Reverse Engineering is simply breakdown, Copy and Rebuild Engineering. Cryonics, for example, is a chilling example of (RE) and worth learning its merit. Companies use (RE) to learn more about their competitor's products and to build their own from stolen design secrets. Microsoft and Apple (hardware and Software) feudal competition is the classic tug-of-war that will join Sparta and Troy in the history books. The four steps of Reverse Engineering are discussed in detail with a heavy emphasis on quantum bio attacks. One of the highlight sections of the chapter is how to simulate a DNA bio-attack with two approaches: the first one the attack on the DNA system, and the second one is the DNA databases. One focal area in the book is how Bio-Hacking Organizations prepare their systematic plan to target DNA installations. The last part of the chapter is dedicated to quantum computing hardware, software, and programming techniques. Finally, the most important part of the chapter is the topic of Quantum Internet of Medica devices. Mediating devices have emerged to link quantum computers and classical computers.
Product Used
NGS

Related Publications