2024-02-11: Symbolic algebra and typing

2023-08-01: Population waves

2023-05-18: Math of telephone billing mystery

2023-05-05: Franklin and DNA More information…

2023-04-25: On angle and dimension

2023-02-20: On Leonardo da Vinci and Gravity

2022-04-29: Fabricating Evidence to catch Carmen Sandiego

2022-03-04: Probabilistic law of the excluded middle

2020-05-04: Archimedes and the sphere

2019-05-16: Glow worms return

2019-04-11: Original memetic sin

2019-01-31: The theory of weight

2018-11-06: Origins of telephone network theory

2018-10-24: Modern thought

2018-09-10: Feeding a controversy

2018-06-11: Glow worm distribution

2018-04-23: Outlawing risk

2017-08-22: A rebuttal on the beauty in applying math

2017-04-22: Free googles book library

2016-11-02: In search of Theodore von Karman

2016-09-25: Amath Timeline

2016-02-24: Math errors and risk reporting

2016-02-20: Apple VS FBI

2016-02-19: More Zika may be better than less

2016-02-17: Dependent Non-Commuting Random Variable Systems

2016-01-14: Life at the multifurcation

2015-09-28: AI ain't that smart

2015-06-24: Mathematical Epidemiology citation tree

2015-03-31: Too much STEM is bad

2015-03-24: Dawn of the CRISPR age

2015-02-12: A Comment on How Biased Dispersal can Preclude Competitive Exclusion

2015-02-09: Hamilton's selfish-herd paradox

2015-02-08: Risks and values of microparasite research

2014-11-10: Vaccine mandates and bioethics

2014-10-18: Ebola, travel, president

2014-10-17: Ebola comments

2014-10-12: Ebola numbers

2014-09-23: More stochastic than?

2014-08-17: Feynman's missing method for third-orders?

2014-07-31: CIA spies even on congress

2014-07-16: Rehm on vaccines

2014-06-21: Kurtosis, 4th order diffusion, and wave speed

2014-06-20: Random dispersal speeds invasions

2014-05-06: Preservation of information asymetry in Academia

2014-04-16: Dual numbers are really just calculus infinitessimals

2014-04-14: More on fairer markets

2014-03-18: It's a mad mad mad mad prisoner's dilemma

2014-03-05: Integration techniques: Fourier--Laplace Commutation

2014-02-25: Fiber-bundles for root-polishing in two dimensions

2014-02-17: Is life a simulation or a dream?

2014-01-30: PSU should be infosocialist

2014-01-12: The dark house of math

2014-01-11: Inconsistencies hinder pylab adoption

2013-12-24: Cuvier and the birth of extinction

2013-12-17: Risk Resonance

2013-12-15: The cult of the Levy flight

2013-12-09: 2013 Flu Shots at PSU

2013-12-02: Amazon sucker-punches 60 minutes

2013-11-26: Zombies are REAL, Dr. Tyson!

2013-11-22: Crying wolf over synthetic biology?

2013-11-21: Tilting Drake's Equation

2013-11-18: Why \(1^{\infty} eq 1\)

2013-11-15: Adobe leaks of PSU data + NSA success accounting

2013-11-14: 60 Minutes misreport on Benghazi

2013-11-11: Making fairer trading markets

2013-11-10: L'Hopital's Rule for Multidimensional Systems

2013-11-09: Using infinitessimals in vector calculus

2013-11-08: Functional Calculus

2013-11-03: Elementary mathematical theory of the health poverty trap

2013-11-02: Proof of the circle area formula using elementary methods

Risks and values of microparasite research

This week, CIDD had a discussion of the "gain-of-function" experiments that have been recently controversial in virology. I couldn't attend, but it's an interesting topic, so I've curated a useful (though not exhaustive) bibliography touching on history, and two stories where the issue has arisen -- influenza evolution and botullinum discoveries. Scroll down to investigate.

The whole argument here feels like it's in denial of the modern realities of biotechnology. To illustrate, allow me to draw a parallel with cybersecurity.
In the early days of home computers, the idea of a computer virus and digital life, with depictions like Tron (1982) and Wonderwork's "Hide and Seek" (1984), was fantastic. But, over 3 decades, that silicon ecology some of us dreamed of has failed to appear. Instead of being ingredients in the emergence of a new life as rich as our own, computer and their networks have become heavily engineered and highly constrained systems. Perhaps there is little practical difference between the dream and the reality, since the complexity of our networks now escapes our collective grokking. But what is important is that these are systems that we have built in our own images of order and regularity -- they are not organic or spontaneously magical -- we create them and they are the digital appendages with with we attempt to bend the world to our wills.

And as an outside observer might guess, we have adapted war to new forms suitable for application to these silicon systems. Our computer systems designed for communication, accounting, and regulation are targets for attack with malware in various forms. There are laws against the creation and dissemination of this malware, but they do little good -- thieves and extortionists pollute the internet with it. Malicious software is easy to make, the lack of diversity in our systems creates larger opportunities out of small chinks in our security practices, and the perforation of national borders by communications networks makes the risk of reprisal very small.

So, our computers face attack that we can not avoid. Our best option then is bolster our defences by seeking out and closing the security holes that malware exploits. And so, many programmers have entered into security and cyber-defense roles where they comb the code gardens, seeking out and patching the security holes that malware exploits. Even in our heavily engineered computer systems, this is a daunting game of wack-a-mole that seems like it will go on for years.

Now, why am I talking about computer security in a public log on biosecurity and "gain-of-function" experiments in virology? Because there is a systematic parallel between the cybersecurity problems and the biosecurity problems. Each of us humans lives in an organic shell. Our genomes and affiliated proteins are our operating systems, while viruses and parasites are one form of malware that attacks use from the outside world. But in this case, the our and our parasites codes are evolved under natural selection, not engineered. Evolved systems are both robust, and buggy -- they quickly evolve adequate defenses against the common insults we face, but they have great difficulty evolving and maintaining resistance again rarer threats -- there's just not enough selection to stamp out all of the deleterious noise in the code. So it seems in all likelihood that we are very buggy pieces of bioware, with scads of security holes just waiting to be exploited by germs.

If we have so many holes in our defenses, why aren't these holes being exploited? Well, right now, most of the germs doing the exploiting are also naturally evolved organisms -- they can evolve up a strong fitness gradient relatively easily, but making the big programming changes to exploit a novel hole is (fortunately) an exceedingly rare event. With an engineered germ, the story would be very different. Then we must ask ourselves why germs aren't being engineered. First, it's hard -- much harder than coding cyber-malware. The DNA re-encoding, protein interactions, and testing procedures are all expensive, in terms of time, money, and expertise. Second, there's no clear and easy pay-off for the effort, and individual or state scales. But given the rapid rate of advancement of technology and the general economic instability, both of these hurdles may go away. And if that happens, we'll be playing the biosecurity game the same way we're playing the cybersecurity game, only from a much weaker starting point.

It seems that if we really want to take biosecurity seriously, we need to start looking for ways to patch our own security bugs. This raises the all-too uncomfortable and taboo specter of genetic engineering and humans. This does not have to be the scary eugenics of the early 20th century, but I don't think it's something we can stick our heads in the sand over much longer.

References on gain-of-function and dual-use technology

Novel Botellinum toxin discovery

Enabling human-to-human H5N1 Influenza transmission