<node id="689352">
  <nid>689352</nid>
  <type>news</type>
  <uid>
    <user id="27271"><![CDATA[27271]]></user>
  </uid>
  <created>1775066273</created>
  <changed>1775072371</changed>
  <title><![CDATA[Georgia Tech Researchers Develop First Genetic Passcode Lock to Protect Valuable DNA]]></title>
  <body><![CDATA[<p>In recent years, the Centers for Disease Control and Prevention, the Department of Homeland Security, and other authorities have flagged a record number of unauthorized shipments of biological materials. At the same time, global intelligence communities have identified numerous attempts to smuggle sensitive biological samples in efforts of industrial theft or espionage.&nbsp;</p><p>“A small vial of genetically engineered cells can contain multiple millions of dollars’ worth of intellectual property and require several years of work to develop,” said Corey Wilson, a professor in Georgia Tech’s School of Chemical and Biomolecular Engineering (<a href="https://chbe.gatech.edu">ChBE</a>). “Accordingly, the protection of high-value engineered cell lines has become critically important to the biotechnology industry.”</p><p><a href="https://wilson.chbe.gatech.edu/">Wilson</a> and his research team have published their findings in <em>Science Advances</em> demonstrating the effectiveness of their new biological security technology, known as GeneLock™, in protecting high-value engineered cell lines.</p><p>GeneLock is a cybersecurity-inspired technology that protects valuable genetic material directly at the DNA level. To demonstrate its strength, Wilson’s team conducted what they describe as a first-of-its-kind biohackathon, detailed in the <a href="https://www.science.org/doi/10.1126/sciadv.aeb8556">new paper</a>, to simulate unauthorized access.&nbsp;</p><p>“GeneLock greatly improves our ability to protect high-value engineered cell lines by expanding security from the lab environment to the genetic level,” Wilson said.</p><p><strong>Economic Impact</strong></p><p>What are the stakes? Estimates place the global market for high-value genetic materials at more than $1.5 trillion, projected to reach $8 trillion by 2035. The use of these materials ranges from advanced medicines and proprietary research enzymes to specialty chemicals and sustainable materials.</p><p>Currently, the protection of high-value cell lines depends on physical safeguards such as restricted lab access and secure facilities, Wilson explained.</p><p>“The key weakness of physical security measures is once circumvented, there are typically no measures in place to protect valuable cells from theft, abuse, or unauthorized use,” Wilson said.&nbsp;</p><p>“Once a sample leaves the building, the DNA it carries typically remains fully functional. This is akin to placing an unlocked cellphone in a desk drawer. Anyone who gains access to the drawer can view sensitive content on the phone­­­­­­­—or in this case will have full access to the valuable cell line.”</p><p><strong>Genetic Passcode Protection</strong></p><p>The GeneLock biological security technology developed by Wilson and his team places a passcode on engineered cells, akin to those used on ATM machines and protected cellphones.</p><p>Instead of leaving a valuable gene in readable form, the team scrambles the DNA sequence of interest. The scrambled genetic asset remains in a nonfunctional state unless the living cell where it resides receives the correct sequence of chemical inputs. Those inputs act as a molecular passcode.</p><p>“Only the right combination, delivered in the right order, rearranges the DNA into a working form,” Wilson said.</p><p><strong>Biohackathon Security Test</strong></p><p>To evaluate the technology, the researchers organized a blue team and a red team in what they describe as an ethical biohackathon. The blue team designed the encrypted DNA sequence, while the red team was challenged to discover the correct chemical passcode through experimentation in a gray box exercise, meaning the red team had partial knowledge of the system but did not have access to the internal designs.&nbsp;</p><p>“This approach for testing security strength is commonly used in cybersecurity,” Wilson explained.&nbsp;</p><p>The blue team engineered the system inside <em>Escherichia coli</em>, or <em>E. coli</em>, a bacterium widely used in biotechnology. The protected asset was a fluorescent protein gene selected as a measurable stand-in for commercially valuable targets. When the correct chemical sequence was applied, the fluorescence turned on. Without the correct passcode, the gene remained scrambled and the cells could not fluoresce green.&nbsp;</p><p>“In practice, most DNA sequences produce valuable proteins or chemicals that are essentially invisible to the human eye, requiring specialized devices or experiments to observe,” Wilson said. “If the biohackathon were conducted with a standard commercially valuable target, the penetration testing would have taken more than 10 times longer to complete, years instead of months.”</p><p>The biohackathon results showed a dramatic reduction in risk. GeneLock reduced the probability of unlocking the genetic asset by random search to about 1 in 85,000 (a 0.001% chance), assuming the unauthorized user had access to the required chemical inputs.</p><p>Without access to those inputs, “the likelihood of success by chance becomes effectively negligible,” said Dowan Kim (Georgia Tech PhD 2024), co-lead author of the study.</p><p><strong>Commercial Uses and What’s Next&nbsp;</strong></p><p>Although the researchers used a non-commercial fluorescent protein as a test case, the implications extend much further. Many biotechnology companies rely on proprietary engineered strains. New England Biolabs, for example, produces more than 265 non-disclosed enzymes in E. coli, each representing a high-value cell line.&nbsp;</p><p>Protein-based drugs are also manufactured in living cells, and proprietary metabolic pathways are used to produce specialty chemicals, bioplastics, and high-value ingredients.&nbsp;</p><p>“In each case, the genetic blueprint inside the cell represents intellectual property that can be protected by our technology,” said Ishita Kumar, a PhD candidate in ChBE and co-lead author of the study.</p><p>While the team’s current focus is on protecting intellectual property in the form of high-value cells, future iterations aim to strengthen biological security more broadly.&nbsp;</p><p>“We are currently developing protection measures to mitigate unauthorized use or release of sensitive cell lines that can be potentially hazardous to human health or the environment,” Wilson said.</p><p>“As it stands, GeneLock represents an important shift in biological security, enabling, for the first time, protection of valuable cells at the genetic level, even after physical security measures have been bypassed,” he added.&nbsp;</p><p>The work is already moving toward commercialization. The team filed a provisional patent application with the U.S. Patent and Trademark Office in February 2026 and is forming a company to deploy the technology.</p><p><strong>CITATION:</strong></p><p>Dowan Kim, Ishita Kumar, Mohamed Hassan, Luisa F. Barraza-Vergara, Christopher A. Voigt, and Corey J. Wilson, “<a href="https://www.science.org/doi/10.1126/sciadv.aeb8556">Protecting cells at the genetic level and simulating unauthorized access via a biohackathon</a>,” Science Advances, 2026.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[New System Strengthens Security for the Biotech Industry]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2026-04-01T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Research published in Science Advances demonstrated the effectiveness of this technology in protecting high-value engineered cell lines.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>GeneLock is a cybersecurity-inspired technology that protects valuable genetic material directly at the DNA level. To demonstrate its strength, the rearches conducted what they describe as a first-of-its-kind biohackathon to simulate unauthorized access.&nbsp;</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="679818">
            <nid>679818</nid>
            <type>image</type>
            <title><![CDATA[Wilsonresearchteam.jpg]]></title>
            <body><![CDATA[<p><em>Research team members Ishita Kumar,&nbsp;Corey Wilson,&nbsp;and Luisa F. Barraza-Vergara</em></p>]]></body>
                          <field_image>
                <item>
                  <fid>264022</fid>
                  <filename><![CDATA[Wilsonresearchteam.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2026/04/01/Wilsonresearchteam.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/04/01/Wilsonresearchteam.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Research team members Ishita Kumar, Corey Wilson, and Luisa F. Barraza-Vergara]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="679819">
            <nid>679819</nid>
            <type>image</type>
            <title><![CDATA[biohackathon.jpg]]></title>
            <body><![CDATA[<p><em>To evaluate the GeneLock technology, the researchers organized a blue team and a red team into a biohackathon.</em></p>]]></body>
                          <field_image>
                <item>
                  <fid>264023</fid>
                  <filename><![CDATA[biohackathon.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2026/04/01/biohackathon.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2026/04/01/biohackathon.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[To evaluate the GeneLock technology, the researchers organized a blue team and a red team into a biohackathon.]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[braddixon@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Brad Dixon, <a href="mailto:braddixon@gatech.edu">braddixon@gatech.edu</a></p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1240</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Biotechnology, Health, Bioengineering, Genetics]]>
      </item>
          <item>
        <![CDATA[Engineering]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>138</tid>
        <value><![CDATA[Biotechnology, Health, Bioengineering, Genetics]]></value>
      </item>
          <item>
        <tid>145</tid>
        <value><![CDATA[Engineering]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="39441"><![CDATA[Bioengineering and Bioscience]]></term>
          <term tid="193658"><![CDATA[Commercialization]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1240</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[School of Chemical and Biomolecular Engineering]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>187915</tid>
        <value><![CDATA[go-researchnews]]></value>
      </item>
          <item>
        <tid>175579</tid>
        <value><![CDATA[biotech industry]]></value>
      </item>
          <item>
        <tid>3031</tid>
        <value><![CDATA[genetic]]></value>
      </item>
          <item>
        <tid>1041</tid>
        <value><![CDATA[dna]]></value>
      </item>
          <item>
        <tid>175113</tid>
        <value><![CDATA[biosecurity]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
