Journal:Next steps for access to safe, secure DNA synthesis

From LIMSWiki
Revision as of 18:36, 12 August 2019 by Shawndouglas (talk | contribs) (Saving and adding more.)
Jump to navigationJump to search
Full article title Next steps for access to safe, secure DNA synthesis
Journal Frontiers in Bioengineering and Biotechnology
Author(s) Diggans, James; Leproust, Emily
Author affiliation(s) Twist Bioscience Corporation
Primary contact Email: jdiggans at twistbioscience dot com
Editors Morse, Stephen Allen
Year published 2019
Volume and issue 7
Page(s) 86
DOI 10.3389/fbioe.2019.00086
ISSN 2296-4185
Distribution license Creative Commons Attribution 4.0 International
Website https://www.frontiersin.org/articles/10.3389/fbioe.2019.00086/full
Download https://www.frontiersin.org/articles/10.3389/fbioe.2019.00086/pdf (PDF)

Abstract

The DNA synthesis industry has, since the invention of gene-length synthesis, worked proactively to ensure synthesis is carried out securely and safely. Informed by guidance from the U.S. government, several of these companies have collaborated over the last decade to produce a set of best practices for customer and sequence screening prior to manufacture. Taken together, these practices ensure that synthetic DNA is used to advance research that is designed and intended for public benefit. With increasing scale in the industry and expanding capability in the synthetic biology toolset, it is worth revisiting current practices to evaluate additional measures to ensure the continued safety and wide availability of DNA synthesis. Here we encourage specific steps, in part derived from successes in the cybersecurity community, that can ensure synthesis screening systems stay well ahead of emerging challenges, to continue to enable responsible research advances. Gene synthesis companies, science and technology funders, policymakers, and the scientific community as a whole have a shared duty to continue to minimize risk and maximize the safety and security of DNA synthesis to further power world-changing developments in advanced biological manufacturing, agriculture, drug development, healthcare, and energy.

Keywords: biosecurity, synthetic biology, DNA, cyberbiosecurity, policy

Introduction

In 2010, the United States Department of Health and Human Services (HHS) published the Screening Framework Guidance for Providers of Synthetic Double-Stranded DNA.[1] The Guidance provided a set of recommended practices to companies synthesizing double-stranded DNA to encourage such companies to screen both their customers and requested sequences. Several of the largest DNA synthesis companies came together to form the International Gene Synthesis Consortium (IGSC), a trade industry organization intended to promote the beneficial application of gene synthesis technology while safeguarding biosecurity.

The IGSC published the Harmonized Screening Protocol[2] to provide additional tactical detail around the implementation of guidance-compliant customer and sequence screening. The IGSC guidance specifies that synthetic gene sequence orders will be screened against the IGSC's Regulated Pathogen Database (RPD), a dataset of sequences and organisms subject to regulatory control or licensing that is assembled and maintained by the IGSC. The guidance further specifies that IGSC companies will only supply genes from regulated pathogens to “bona fide government laboratories, universities, non-profit research institutions, or industrial laboratories demonstrably engaged in legitimate research.” Since its initial publication, the Harmonized Screening Protocol has been updated only once[3] to (among other minor edits) add language affirming that IGSC member companies agree not to synthesize any sequence with “best match” to Variola, the virus that causes smallpox, as the disease was declared eradicated by the WHO in 1980. Additionally, the IGSC has also developed an extensive onboarding process for potential new members to assist companies and institutions as they build new screening systems.

In the years since the publication of the guidance, both the DNA synthesis industry and the larger synthetic biology community have rapidly advanced in terms of capability and scale. These advances create new opportunities to revolutionize many industries, from healthcare to industrial chemicals and even digital data storage. With new capabilities come new challenges to the recommendations originally spelled out in the guidance. As the trajectory of technological advancement will inevitably continue to steepen, here we visit potential options for next steps to advance and continue to secure the manufacture of synthetic DNA and prevent the risk of misuse.

Twist Bioscience (a member company and officer of the IGSC) has witnessed first-hand how challenging some of the guidance recommendations can become at increasing scale. Those difficulties must be surmounted while maintaining customer and sequence screening accuracy and still achieving the tight delivery timelines demanded by fierce competition within the global DNA synthesis industry.

As scale drives down cost per base pair, the relatively fixed cost of screening plays a more direct role in overall price. These costs are driven by both customer and sequence screening; commercially-available customer screening solutions still require a great deal of manual review of false positive findings. These false positives create a floor on the possible reduction in labor cost of new customer onboarding. Current sequence screening algorithms are computationally expensive and, given the high false positive rate, the results of sequence screening can be complicated to interpret. These generally require a PhD in bioinformatics both for implementation as well as day-to-day interpretation of hits. This makes scaling interpretation, in the absence of high-quality sequence annotation, an expensive proposition.

Evolving technologies have blurred the lines between the gene- and oligo-length synthesis products originally addressed in the guidance. These include ever-simpler methods for the assembly of pools of oligo-length DNA into gene-length DNA and the use of truly massive oligo pools for data storage. The data storage use case, in particular, will drive a substantial global increase in the number of unique oligo sequences under manufacture, making it ever easier to acquire the oligo-length sequences necessary to assemble genes that would otherwise be subject to regulatory control.

Evolving industry best practices

We believe continued forward-thinking improvements in the biosecurity safety net provided by DNA synthesis order screening will require participation from all interested parties: synthesis companies themselves, policy makers, science and technology funders (both public and private), and the broader synthetic biology community.

Gene-length sequence screening performance

The guidance found in the Harmonized Screening Protocol and the work done by IGSC have together accomplished a great deal in harmonizing the screening practices of the largest synthesis companies. The current IGSC onboarding protocol for new members even includes a set of test sequences to ensure that prospective member institutions have built their custom sequence screening systems with a solid level of accuracy. It is challenging, however, to determine when a custom-built screening system is “good enough,” especially given that the details of each screening implementation remain private to the implementing company. In addition, the recommendations in the guidance do not specify particular performance metrics in terms of overall sensitivity and specificity, or in terms of the degree to which sequence alteration or the source of annotation should impact screening results.

This is no fault of the guidance; it is extremely difficult to express in the abstract a set of performance characteristics for a system intended to screen the universe of all possible sequences. The cybersecurity and defense communities, facing similar challenges of performance estimation for complex systems, have turned to "red teaming"—the practice of looking at a situation from the perspective of disinterested or antagonistic parties—as a way of answering whether a given system is sufficient to accomplish a protective goal.[4] The best way to estimate whether a skilled adversary can bypass a system is to ask skilled individuals to attempt to do just that. Previous recommendations[5] have explicitly called for IGSC companies to regularly test procedures or submit to third-party audits; we believe regular red teaming by a sophisticated third party is an effective means to address these concerns. Twist has recently engaged in an extensive red teaming of our sequence screening system (publication in review) and shared the results with other IGSC members to help further improve our respective systems. We strongly recommend that synthesis companies engage in periodic red teaming as a means of assessing evolving risk of vulnerabilities in screening systems.

Red teaming has additional secondary value: sequences shown to bypass a screening system then serve as effective regression tests during follow-on software development once vulnerabilities have been patched. Regression testing is a software testing paradigm[6] designed to ensure that future changes to software systems do not create new ways for previously discovered vulnerabilities to be exploited. Building and scaling a modern sequence screening system is a complex undertaking and requires using distributed computing and third-party annotation resources, both of which increase the risk of regressions during software development and maintenance. Consistent regression testing, along with a suite of edge-case test sequences, can help manage this risk.

Acknowledgements

Author contributions

All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.

Funding

This work was funded by Twist Bioscience Corporation.

Conflict of interest statement

JD and EL are employed by Twist Bioscience. Twist Bioscience is a board member of the International Gene Synthesis Consortium (IGSC). The views expressed here are not necessarily those of the IGSC.

References

  1. U.S. Department of Health & Human Services (4 May 2015). "Screening Framework Guidance for Providers of Synthetic Double-Stranded DNA". https://www.phe.gov/Preparedness/legal/guidance/syndna/Pages/default.aspx. 
  2. International Gene Synthesis Consortium (2009). "Harmonized Screening Protocol" (PDF). https://portal.sgidna.com/files/IGSC%20Harmonized%20Screening%20Protocol.pdf. 
  3. International Gene Synthesis Consortium (19 November 2017). "Harmonized Screening Protocol v2.0" (PDF). https://genesynthesisconsortium.org/wp-content/uploads/IGSCHarmonizedProtocol11-21-17.pdf. 
  4. Zhang, L.; Gronvall, G.K. (2018). "Red Teaming the Biological Sciences for Deliberate Threats". Terrorism and Political Violence: 1–20. doi:10.1080/09546553.2018.1457527. 
  5. Koblentz, G.D. (2017). "The De Novo Synthesis of Horsepox Virus: Implications for Biosecurity and Recommendations for Preventing the Reemergence of Smallpox". Health Security 15 (6): 620–28. doi:10.1089/hs.2017.0061. PMID 28836863. 
  6. Yoo, S.; Harman, M. (2013). "Regression testing minimization, selection and prioritization: A survey". Journal of Software: Testing, Verification and Reliability 22 (2): 67–120. doi:10.1002/stvr.430. 

Notes

This presentation is faithful to the original, with only a few minor changes to presentation, grammar, and punctuation. In some cases important information was missing from the references, and that information was added. The original article listed references alphabetically; this version, by design, lists them in order of appearance.