On the trail of rogue genetically modified pathogens

Mar 18, 2008

Bacteria can be used to engineer genetic modifications, thereby providing scientists with a tool to combat many challenges in areas from food production to drug discovery. However, this sophisticated technology can also be used maliciously, raising the threat of engineered pathogens. New research published in the online open access journal Genome Biology shows that computational tools could become a vital resource for detecting rogue genetically engineered bacteria in environmental samples.

Jonathan Allen, Shea Gardner and Tom Slezak of the Lawrence Livermore National Laboratory in California, US, designed new computational tools that identify a set of DNA markers that can distinguish between artificial vector sequences and natural DNA sequences. Natural plasmids and artificial vector sequences have much in common, but these new tools show the potential to achieve high sensitivity and specificity, even when detecting previously unsequenced vectors in microarray-based bioassays.

A new computational genomics tool was developed to compare all available sequenced artificial vectors with available natural sequences, including plasmids and chromosomes, from bacteria and viruses. The tool clusters the artificial vector sequences into different subgroups based on shared sequence; these shared sequences were then compared with the natural plasmid and chromosomal sequence information so as to find regions that are unique to the artificial vectors. Nearly all the artificial vector sequences had one or more unique regions. Short stretches of these unique regions are termed ‘candidate DNA signatures’ and can be used as probes for detecting an artificial vector sequence in the presence of natural sequences using a microarray. Further tests showed that subgroups of candidate DNA signatures are far more likely to match unseen artificial than natural sequences.

The authors say that the next step is to see whether a bioassay design using DNA signatures on microarrays can spot genetically modified DNA in a sample containing a mixture of natural and modified bacteria. The scientific community will need to cooperate with computational experts to sequence and track available vector sequences if DNA signatures are to be used successfully to support detection and deterrence against malicious genetic engineering applications. Scientists would be able to maintain an expanding database of DNA signatures to track all sequenced vectors.

“As with any attempt to counter malicious use of technology, detecting genetic engineering in microbes will be an immense challenge that requires many different tools and continual effort,” says Allen.

Source: BioMed Central

Explore further: Genetic basis of color diversity in coral reefs discovered

add to favorites email to friend print save as pdf

Related Stories

Supercomputing the evolution of a model flower

Jan 27, 2015

Scientists using supercomputers found genes sensitive to cold and drought in a plant help it survive climate change. These findings increase basic understanding of plant adaptation and can be applied to improve ...

Damaged DNA amplified

Jan 15, 2015

For the first time, researchers have succeeded in amplifying genes altered by activities such as smoking—with changes that can lead to lung cancer. As the amplified genes retain the altered information, ...

Designer viruses could be the new antibiotics

Oct 15, 2014

Bacterial infections remain a major threat to human and animal health. Worse still, the catalogue of useful antibiotics is shrinking as pathogens build up resistance to these drugs. There are few promising ...

Recommended for you

A rare glimpse at the elusive saharan cheetah

8 hours ago

Research by scientists and conservationists from the Wildlife Conservation Society, the Zoological Society of London, and other groups published today in PLOS ONE shows that critically endangered Saharan cheeta ...

In a role reversal, RNAs proofread themselves

9 hours ago

Building a protein is a lot like a game of telephone: information is passed along from one messenger to another, creating the potential for errors every step of the way. There are separate, specialized enzymatic ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.