linkedin post 2014-03-04 08:14:54

Uncategorized
BIOPHISHING, BIOSPOOFING AND BIO-ID THEFT. "The biological equivalent of this is mining someone's DNA or other biometric data in a furtive manner in order to analyse or manipulate it. We are all constantly shedding skin cells. We leave our saliva on every cup, fork or cigarette. DNA will be used for identification and authentication, meaning that access to DNA databases will enable identity-related crimes."" " http://lnkd.in/dkjx-Yi View in LinkedIn
Read More

linkedin post 2014-03-01 13:27:46

Uncategorized
TRANSPOSONS AS ANCIENT SPAM, injected into host genomes millennia ago and still persisting: "transposons have gone hand in hand with life ever since there has been DNA to hitchhike on, and there is certainly no delete button for this particular brand of spam. For better or worse, it's here to stay. Now if we could just do something about all these junk mails..."" " http://www.thenakedscientists.com/HTML/articles/article/jamilcolumn1.htm/ View in LinkedIn
Read More

linkedin post 2014-03-04 08:12:37

Uncategorized
DNA TAGS FOR COPPER CABLE THIEVES. "The organized theft of copper from homes and building sites has become a global problem in recent years, but German telecommunications giant Deutsche Telekom has struck back by marking their copper wires with so-called 'artificial DNA' to track down thieves."" " http://www.kare11.com/video/2402091050001/1/Anti-Theft-DNA-Used-to-Tackle-Copper-Cable-Theft View in LinkedIn
Read More

linkedin post 2014-03-01 13:26:38

Uncategorized
FUTURE DNA MALWARE: "future hacking crimes could take a decidedly sinister twist; not hacking to breach systems but brains, bodies and behaviors ... It's not science fiction to hack insulin pumps or to use jamming signals to stop hackers from lethal pacemaker attacks ... In the future, a weaponized virus will aim to infect you, your brain and body biology, and not just your computer or mobile device."" " http://lnkd.in/dMb5UB6 View in LinkedIn
Read More

linkedin post 2014-03-04 08:11:25

Uncategorized
DNA TAGS shot by a gun are used by police to mark rioters. "Selectamark (what a name) also makes DNA grease, gel and spray to tag personal belongings or other items. It could conceivably be used to tag money in a bank heist, for instance--instead of a lot of ink exploding in a bag, the would-be robbers would get DNA all over themselves. If it lands on clothing, it won't do the authorities any good, but if the pellets land on skin, their DNA mark will stay there for up to two weeks, according to the company." http://lnkd.in/dbwktT2 View in LinkedIn
Read More

linkedin post 2014-03-04 08:09:30

Uncategorized
DNA TAGS shot by a gun are used by police to mark rioters. "Selectamark (what a name) also makes DNA grease, gel and spray to tag personal belongings or other items. It could conceivably be used to tag money in a bank heist, for instance--instead of a lot of ink exploding in a bag, the would-be robbers would get DNA all over themselves. If it lands on clothing, it won't do the authorities any good, but if the pellets land on skin, their DNA mark will stay there for up to two weeks, according to the company."" " http://lnkd.in/dbwktT2 View in LinkedIn
Read More

linkedin post 2014-03-03 07:54:36

Uncategorized
MCDONALDS INSTALLS DNA SECURITY SYSTEM. "The Intruder Spray solution was introduced in 2008 and "contains a UV tracer and a unique DNA code, linking them irrefutably to the crime scene," according to SelectaDNA's website. To date, SelectaDNA has installed 13 Intruder Spray security systems in McDonald's across Australia. "Police are able to find SelectaDNA by using a UV Torch. The spray glows bright blue under UV light. By DNA Analysis, an offender can be linked to the premise."" " http://lnkd.in/dTU6wcD View in LinkedIn
Read More

linkedin post 2014-03-03 07:52:15

Uncategorized
DNA MISTING. "SelectaDNA, a British company, sells theft prevention systems that, when activated, mist coded DNA messages that persist on to skin and clothing, helping to link suspects to a crime scene. Deployed in public spaces, similar systems would tag everything that passes through the area, allowing effective tracing, even over long time-periods."" " http://lnkd.in/dkjx-Yi View in LinkedIn
Read More

linkedin post 2014-03-03 07:49:21

Uncategorized
"SPEAR PHISHING AND STUXNET EQUIVALENTS. The software virus Stuxnet was designed for a single purpose: to undermine the control systems at the Natanz nuclear-enrichment plant, thereby slowing Iran's nuclear programme. The infection was designed to disrupt equipment operations while displaying to plant operators that all was well. Just as hackers, governments and spies have crafted specific cyber tools to focus on a particular target, so biological equivalents can be developed."" " http://lnkd.in/dkjx-Yi MARIN View in LinkedIn
Read More