On the trail of rogue genetically modified pathogens

March 18, 2008

Bacteria can be used to engineer genetic modifications, thereby providing scientists with a tool to combat many challenges in areas from food production to drug discovery. However, this sophisticated technology can also be used maliciously, raising the threat of engineered pathogens. New research published in the online open access journal Genome Biology shows that computational tools could become a vital resource for detecting rogue genetically engineered bacteria in environmental samples.

Jonathan Allen, Shea Gardner and Tom Slezak of the Lawrence Livermore National Laboratory in California, US, designed new computational tools that identify a set of DNA markers that can distinguish between artificial vector sequences and natural DNA sequences. Natural plasmids and artificial vector sequences have much in common, but these new tools show the potential to achieve high sensitivity and specificity, even when detecting previously unsequenced vectors in microarray-based bioassays.

A new computational genomics tool was developed to compare all available sequenced artificial vectors with available natural sequences, including plasmids and chromosomes, from bacteria and viruses. The tool clusters the artificial vector sequences into different subgroups based on shared sequence; these shared sequences were then compared with the natural plasmid and chromosomal sequence information so as to find regions that are unique to the artificial vectors. Nearly all the artificial vector sequences had one or more unique regions. Short stretches of these unique regions are termed ‘candidate DNA signatures’ and can be used as probes for detecting an artificial vector sequence in the presence of natural sequences using a microarray. Further tests showed that subgroups of candidate DNA signatures are far more likely to match unseen artificial than natural sequences.

The authors say that the next step is to see whether a bioassay design using DNA signatures on microarrays can spot genetically modified DNA in a sample containing a mixture of natural and modified bacteria. The scientific community will need to cooperate with computational experts to sequence and track available vector sequences if DNA signatures are to be used successfully to support detection and deterrence against malicious genetic engineering applications. Scientists would be able to maintain an expanding database of DNA signatures to track all sequenced vectors.

“As with any attempt to counter malicious use of technology, detecting genetic engineering in microbes will be an immense challenge that requires many different tools and continual effort,” says Allen.

Source: BioMed Central

Explore further: First comprehensive analysis of the woolly mammoth genome completed

Related Stories

World's first digitally-encoded synthetic polymers

June 5, 2015

Researchers have for the first time succeeded in recording a binary code on a synthetic polymer. Inspired by the capacity of DNA to retain an enormous amount of genetic information, a team from the Institut Charles Sadron ...

Programmable DNA scissors found for bacterial immune system

June 28, 2012

(Phys.org) -- Genetic engineers and genomics researchers should welcome the news from the Lawrence Berkeley National Laboratory (Berkeley Lab) where an international team of scientists has discovered a new and possibly more ...

Recommended for you

New blow for 'supersymmetry' physics theory

July 27, 2015

In a new blow for the futuristic "supersymmetry" theory of the universe's basic anatomy, experts reported fresh evidence Monday of subatomic activity consistent with the mainstream Standard Model of particle physics.

A cataclysmic event of a certain age

July 27, 2015

At the end of the Pleistocene period, approximately 12,800 years ago—give or take a few centuries—a cosmic impact triggered an abrupt cooling episode that earth scientists refer to as the Younger Dryas.

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.