Team:Freiburg Bioware/Safety

From 2010.igem.org

(Difference between revisions)
Line 1: Line 1:
-
{{:Team:Freiburg_Bioware/Head}}  
+
{{:Team:Freiburg_Bioware/Head}}
{{:Team:Freiburg_Bioware/jquery}}
{{:Team:Freiburg_Bioware/jquery}}
{{:Team:Freiburg_Bioware/menu_home}}
{{:Team:Freiburg_Bioware/menu_home}}
<html>
<html>
 +
<br>
<br>
-
 
+
</div>
-
<h1>Biosafety</h1>
+
<h1 style="text-align: justify;">Biosafety</h1>
-
<p>Definition: "biosafety measures aim to prevent the unintentional
+
<p style="text-align: justify;">Definition: "biosafety measures aim to
-
exposure to pathogens and toxins, or their accidental release"  
+
prevent the unintentional
-
<a href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a>
+
exposure to pathogens and toxins, or their accidental release" <a
 +
href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a>
</p>
</p>
-
 
+
<h2 style="text-align: justify;">Risk assessment for our
-
<h2>Risk assessment for our Adeno-associated virus based system</h2>
+
Adeno-associated virus based system</h2>
-
<p>
+
<p style="text-align: justify;">In Germany the "Central Commission for
-
In Germany the "Central Commission for Biological Security" (ZKBS) released three legally binding Risk
+
Biological Security" (ZKBS) released three legally binding Risk
-
Assessment satements for the Adeno-associated Virus  
+
Assessment satements for the Adeno-associated Virus <sup>26,</sup>
-
<a href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf"></a><sup>26,</sup>
+
<sup>27,</sup>
-
<a href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf"></a><sup>27,</sup>
+
<sup>28</sup>.
-
<a href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf"></a><sup>28</sup>.
+
Risk assessment in other countries may deviate from these decisions, so
-
Risk assessment in other countries may deviate from these decisions, so please inform yourself about the legal regulations on AAV
+
please inform yourself about the legal regulations on AAV
in your country before using the Virus Construction Kit.<br>
in your country before using the Virus Construction Kit.<br>
</p>
</p>
-
 
+
<div style="text-align: justify;">In Germany the Biological Safety
-
 
+
Level(BSL) classifications for AAVs are:
-
In Germany the Biological Safety Level(BSL) classifications for AAVs are:
+
</div>
-
<ul>
+
<ul style="text-align: justify;">
-
  <li>Adeno-associated Virus 2, 3 and 5 have to be handled
+
<li>Adeno-associated Virus 2, 3 and 5 have to be handled under BSL 1.</li>
-
  under BSL 1.</li>  
+
<li>Adeno-associated Viurs 1, 4, 5, 7, 8, 9, 10 and 11 have to be
-
  <li>Adeno-associated Viurs 1, 4, 5, 7, 8, 9, 10 and 11 have to be
+
handled under BSL 2.</li>
-
  handled under BSL 2.</li>          
+
</ul>
</ul>
-
 
+
<p style="text-align: justify;">This classification was developed based
-
<p>This classification was developed based on the fact that only  
+
on the fact that only serotypes 2, 3 and 5 are isolated from humans and
-
  serotypes 2, 3 and 5 are isolated from humans and that their harmlessness has  
+
that their harmlessness has been confirmed in clinical studies. This
-
  been confirmed in clinical studies. This general classification has to be rechecked when the virus contains gene  
+
general classification has to be rechecked when the virus contains gene
sequences with a transforming protential.
sequences with a transforming protential.
</p>
</p>
-
 
+
<p style="text-align: justify;"><b>Viral vectors systems</b> packaging
-
 
+
a vector plasmid that only contains the
-
<p><b>Viral vectors systems</b> packaging a vector plasmid that only contains the
+
viral Inverted Terminal Repeats (ITRs) and providing the genes for
viral Inverted Terminal Repeats (ITRs) and providing the genes for
-
Rep and Cap in trans (as it is the case for our system) are classified as <b>BSL 1</b> if the following conditions are fullfilled:  
+
Rep and Cap in trans (as it is the case for our system) are classified
-
<ul>
+
as <b>BSL 1</b> if the following conditions are fullfilled: </p>
-
  <li>The viral particles do not contain AAV derived sequences other than the ITRs</li>  
+
<ul style="text-align: justify;">
-
  <li>The viral particles do not contain Nucleotidesequences with a risk potential</li>  
+
<li>The viral particles do not contain AAV derived sequences other
 +
than the ITRs</li>
 +
<li>The viral particles do not contain Nucleotidesequences with a
 +
risk potential</li>
</ul>
</ul>
-
</p>
+
<p style="text-align: justify;">We also investigated the legal
-
 
+
regulations for AAV-2 Viral Vector
-
<p>We also investigated the legal regulations for AAV-2 Viral Vector
+
systems in the United States. The guidelines of the National Institutes
systems in the United States. The guidelines of the National Institutes
-
of Health (NIH) classify in the  
+
of Health (NIH) classify in the <a
-
<a href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix B</a><sup>32</sup> AAV-2  
+
href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix
-
Vector Systems as Risk Group 1 (RG1) agents that can be treated under BSL 1. In  
+
B</a><sup>32</sup> AAV-2 Vector Systems as Risk Group 1 (RG1) agents
-
detail the appendix states "... adeno- associated virus (AAV) types 1  
+
that can be treated under BSL 1. In detail the appendix states "...
-
through 4; and recombinant AAV constructs, in which the transgene does not  
+
adeno- associated virus (AAV) types 1 through 4; and recombinant AAV
-
encode either a potentially tumorigenic gene product or a toxin molecule and are  
+
constructs, in which the transgene does not encode either a potentially
-
produced in the absence of a helper virus."
+
tumorigenic gene product or a toxin molecule and are produced in the
 +
absence of a helper virus."
</p>
</p>
-
 
+
<div style="text-align: justify;">Other general observations with the
-
Other general observations with the Adeno-associated Virus 2 AAV-2)are:  
+
Adeno-associated Virus 2 AAV-2)are: </div>
-
<ul>
+
<ul style="text-align: justify;">
-
  <li>In clinical studies the viral vectors were not  
+
<li>In clinical studies the viral vectors were not dilivered to the
-
  dilivered to the gonades.  
+
gonades. </li>
-
  <li>Vector sequences were not detectable in the patients blood or
+
<li>Vector sequences were not detectable in the patients blood or
-
  urine at an examination 48 h after an infection with AAV-2
+
urine at an examination 48 h after an infection with AAV-2 <sup>29</sup>.
-
  <a href="http://www.ncbi.nlm.nih.gov/pubmed/10700178"></a><sup>29</sup>.
+
</li>
-
  <li>In absence of Rep proteins, the vector DNA stays extrachromosomal and is not frequently integrated.</li>
+
<li>In absence of Rep proteins, the vector DNA stays extrachromosomal
-
  </ul>
+
and is not frequently integrated.</li>
-
<p>        
+
</ul>
-
Concluding all these informations and regulations, the project that we have designed in this year  
+
<p style="text-align: justify;"> Concluding all these informations and
-
  is clearly classified as BLS 1.
+
regulations, the project that we have designed in this year is clearly
-
</p>       
+
classified as BLS 1.
-
       
+
-
<h2>General biosafety regulation in Germany</h2>
+
-
<p><img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" height="auto" width="150"></p>
+
-
 
+
-
 
+
-
<p>
+
</p>
</p>
-
<div style="TEXT-ALIGN: justify; MARGIN: 0px 5px; WIDTH: 700px; FLOAT: right; HEIGHT: auto"><span
+
<div style="text-align: justify;"> </div>
-
style="COLOR: darkgreen">
+
<h2 style="text-align: justify;">General biosafety regulation in Germany</h2>
-
<b>Which specific biosafety rules or guidelines do you have to consider in your country?</b></span>
+
<table
 +
style="text-align: left; width: 90%; margin-left: 0px; margin-right: 0px;"
 +
border="0" cellpadding="2" cellspacing="2">
 +
<tbody>
 +
<tr>
 +
<td style="vertical-align: top;">
 +
<p><img
 +
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
 +
height="auto" width="150"></p>
 +
</td>
 +
<td style="vertical-align: middle;"><span
 +
style="color: darkgreen;"><b>Which specific biosafety rules or
 +
guidelines do you have to consider in your country?</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<div style="text-align: justify;">
</div>
</div>
-
<p></p>
+
<div
-
 
+
style="margin: 0px 5px; width: 700px; float: right; height: auto; text-align: justify;"><span
-
<br>
+
style="color: darkgreen;"> </span></div>
-
 
+
<div style="text-align: justify;">
-
<p>
+
</div>
-
In Germany all work that includes recombinant DNA technologies is
+
<p style="text-align: justify;">In Germany all work that includes
 +
recombinant DNA technologies is
regulated by the <a href="http://bundesrecht.juris.de/gentg/index.html">Gesetz
regulated by the <a href="http://bundesrecht.juris.de/gentg/index.html">Gesetz
zur Regelung der Gentechnik</a>. This law regulates general
zur Regelung der Gentechnik</a>. This law regulates general
aspects in the life sciences and refers for more precise
aspects in the life sciences and refers for more precise
-
interpretations in §4 to the <a href="http://bundesrecht.juris.de/gentg/__4.html">Zentrale
+
interpretations in §4 to the <a
 +
href="http://bundesrecht.juris.de/gentg/__4.html">Zentrale
Kommission für die Biologische Sicherheit</a>. The ZKBS is a
Kommission für die Biologische Sicherheit</a>. The ZKBS is a
commission composed of 20 technical experts that releases yearly
commission composed of 20 technical experts that releases yearly
Line 97: Line 112:
three stratements affecting the work with Adeno-associated viral
three stratements affecting the work with Adeno-associated viral
systems
systems
-
<a href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf"><sup>26,</sup></a>
+
<a
-
<a href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf"><sup>27,</sup></a>
+
href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf"><sup>26,</sup></a>
-
<a href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf"><sup>28</sup></a>.
+
<a
 +
href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf"><sup>27,</sup></a>
 +
<a
 +
href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf"><sup>28</sup></a>.
These documents were used to assess the dangers that could arise from
These documents were used to assess the dangers that could arise from
our project to team members and the enviroment.
our project to team members and the enviroment.
</p>
</p>
-
 
+
<table
-
 
+
style="text-align: left; width: 90%; margin-left: 0px; margin-right: 0px;"
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
border="0" cellpadding="2" cellspacing="2">
-
height="auto"/>
+
<tbody>
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
<tr>
-
<span style="color:DarkGreen"><b>Is there a local biosafety group, committee, or review board at your institution? If yes, what does your local biosafety group think about your project?</b></span></div>
+
<td style="vertical-align: top; width: 209px;"><img
-
<p>
+
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
-
At the Albert-Ludwigs-University Freiburg for all concerns of security the <a href=http://www.sicherheit.uni-freiburg.de>Stabsstelle Sicherheit</a> is responsible and to contact if questions arise. Especially for questions of biological security Dr. Petra Markmeyer-Pieles is cognizant. We contacted her a first time befor the begin of our project in March when it was clear that the Adeno-associated Virus (AAV-2) was chosen as the topic of our project. At that time she proposed to do the cloning in the AAV-2 that is for sure to handle under biological security level 1 and to prepare everything for work under biological security level 2 to satisfy the precaution principle.
+
height="auto" width="150"></td>
-
The precaution principle was realized and all viral vectors that contained a modified capsid were handled under SII conditions until proven harmless.
+
<td style="vertical-align: middle; width: 778px;"><span
-
In August the planing of the project was completed, summarized in an <a href=https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf>Biosafety application<sup>30</sup></a> and handed to the department for biological security who approve the application in an <a href=https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg>official BSL1 confirmation<sup>31</sup></a>official BSL1 confirmation for our project.</p><br><br>
+
style="color: DarkGreen;"><b>Is there a local biosafety group,
-
 
+
committee, or review board at your institution? If yes, what does your
-
 
+
local biosafety group think about your project?</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<div
 +
style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"><span
 +
style="color: DarkGreen;"></span></div>
 +
<p style="text-align: justify;">At the Albert-Ludwigs-University
 +
Freiburg for all concerns of security the <a
 +
href="http://www.sicherheit.uni-freiburg.de">Stabsstelle Sicherheit</a>
 +
is responsible and to contact if questions arise. Especially for
 +
questions of biological security Dr. Petra Markmeyer-Pieles is
 +
cognizant. We contacted her a first time befor the begin of our project
 +
in March when it was clear that the Adeno-associated Virus (AAV-2) was
 +
chosen as the topic of our project. At that time she proposed to do the
 +
cloning in the AAV-2 that is for sure to handle under biological
 +
security level 1 and to prepare everything for work under biological
 +
security level 2 to satisfy the precaution principle.
 +
The precaution principle was realized and all viral vectors that
 +
contained a modified capsid were handled under SII conditions until
 +
proven harmless.
 +
In August the planing of the project was completed, summarized in an <a
 +
href="https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf">Biosafety
 +
application<sup>30</sup></a> and handed to the department for
 +
biological security who approve the application in an <a
 +
href="https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg">official
 +
BSL1 confirmation<sup>31</sup></a>official BSL1 confirmation for our
 +
project.</p>
 +
<p style="text-align: justify;"><br>
 +
</p>
<h2>Risk management</h2>
<h2>Risk management</h2>
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
-
height="auto"/>
+
cellspacing="2">
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
<tbody>
-
<span style="color:DarkGreen"><b>Would any of your project ideas raise safety issues in terms of: researcher safety, public safety, or environmental safety?</b></span></div>
+
<tr>
 +
<td style="vertical-align: top; text-align: justify;"><img
 +
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
 +
height="auto" width="150"></td>
 +
<td style="vertical-align: middle; text-align: justify;"><span
 +
style="color: DarkGreen;"><b>Would any of your project ideas raise
 +
safety issues in terms of: researcher safety, public safety, or
 +
environmental safety?</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<div
 +
style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;">
 +
<span style="color: DarkGreen;"></span></div>
 +
<p style="text-align: justify;">
 +
Our project was designed in a way that it avoids any serious safety
 +
issues as far as possible.
 +
When working with infectious particles a minimal risk for the
 +
researcher is allways present. This risk was minimized by restricting
 +
the transduced genes to fluorescent proteins and prodrug convertases
 +
that are already proven not to harm human cells in the absece of the
 +
corresponding prodrug. A potential danger for the public or the
 +
environment was minimized as much as possible by following strictly the
 +
rules of Good Laboratory Practice (GLP) and the abdication of using
 +
randomized insertions in the capsid and of replication potent viruses.
 +
Minimizing the risk for team members and the society was was allways
 +
one of the major concerns, especially because worries about
 +
undergraduate students manipulating a virus could arise.
 +
The security concept will be explained by quoting and explaining the
 +
six guiding principles for safe manipulation of Gene Manipulated
 +
Organisms (GMOs) as summarized in Kimman et al. ; 2008<a
 +
href="http://www.ncbi.nlm.nih.gov/pubmed/18625678"><sup>18</sup></a>.
 +
</p>
 +
<li style="text-align: justify;"><b>1) Hazard recognition and
 +
identification</b>
 +
Risk assessment has been done and all legal regulations were considered
 +
as described in the last paragraph.</li>
 +
<li style="text-align: justify;"><b>2) Biological containment</b>
 +
Biological containment means the usage of organisms with "reduced
 +
replicative capacity, inefectivity , transmissibility, and
 +
virulence"18.
 +
For our project only replicative deficient viruses were used,
 +
additional all modifications aimed to have a specific targeting of the
 +
resulting viral vectors for a specific cell type. This gain in
 +
specificity requires it to cut off the braod natural tropism resulting
 +
is an less infective virus copared to the wild type virus.</li>
 +
<li style="text-align: justify;"><b>3) Concentration and enclosure</b>
 +
All working steps for the preparation of viral vectors were carried out
 +
in a BSL II laboratory and within this laboratory work with the AAV was
 +
restricted to a separate Laminar flow cabinet type II. Cell culture and
 +
storage of the virus was also done in separate Freezers and incubators.
 +
All laboratories and epipment that contained viral vectors were
 +
specially marked, for example with a Biohazard warning signs.</li>
 +
<li style="text-align: justify;"><b>4) Exposure minimization</b>
 +
This aspect of the guiding principles can be sumarized under "operator
 +
protection"18. The Exposure minimization was achieved in our laboratory
 +
by wearing special labcoats for the SII laboratory and gloves that were
 +
desinfected and changed regualrely. During manipulation of viral
 +
vectors attention was payed to avoid droplets and especially aerosoles.
 +
A possible diversion of the viral vectors was avoided by cleaning all
 +
equipment when inserted or removed from the Laminar flow cabinet and
 +
after completion of the work task.</li>
 +
<li style="text-align: justify;"><b>5) Physical containment</b>
 +
The requirements for the physical containment were fullfilled by
 +
performing all manipulation on the AAV in an BSL II laboratory that
 +
guaranted a restriction of persons that entered the laboratory.</li>
 +
<li style="text-align: justify;"><b>6) Hazard minimization</b>
 +
For the AAV-2 there are no sugestive activitis because the possible
 +
danger that runs out of the AAV is comparably low, vaccination is not
 +
avilible and biomonitoring is not necessary.</li>
 +
<br>
 +
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
 +
cellspacing="2">
 +
<tbody>
 +
<tr>
 +
<td style="vertical-align: top;"><img
 +
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
 +
height="auto" width="150"></td>
 +
<td style="vertical-align: middle;"><span
 +
style="color: DarkGreen;"><b>Do any of the new BioBrick parts (or
 +
devices) that you made this year raise any safety issues? If yes, did
 +
you document these issues in the Registry? How did you manage to handle
 +
the safety issue? How could other teams learn from your experience?</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<br>
 +
<div
 +
style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;">
 +
<span style="color: DarkGreen;"></span></div>
<p>
<p>
-
Our project was designed in a way that it avoids any serious safety issues as far as possible.
+
</p>
-
When working with infectious particles a minimal risk for the researcher is allways present. This risk was minimized by restricting the transduced genes to fluorescent proteins and prodrug convertases that are already proven not to harm human cells in the absece of the corresponding prodrug. A potential danger for the public or the environment was minimized as much as possible by following strictly the rules of Good Laboratory Practice (GLP) and the abdication of using randomized insertions in the capsid and of replication potent viruses. Minimizing the risk for team members and the society was was allways one of the major concerns, especially because worries about undergraduate students manipulating a virus could arise.
+
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
-
The security concept will be explained by quoting and explaining the six guiding principles for safe manipulation of Gene Manipulated Organisms (GMOs) as summarized in Kimman et al. ; 2008<a href=http://www.ncbi.nlm.nih.gov/pubmed/18625678><sup>18</sup></a>.
+
cellspacing="2">
-
<li><b>1) Hazard recognition and identification</b>
+
<tbody>
-
Risk assessment has been done and all legal regulations were considered as described in the last paragraph.</li>
+
<tr>
-
<li><b>2) Biological containment</b>
+
<td style="vertical-align: top; text-align: justify;">Several
-
Biological containment means the usage of organisms with "reduced replicative capacity, inefectivity , transmissibility, and virulence"18.
+
composite parts that were assembled by our Team
-
For our project only replicative deficient viruses were used, additional all modifications aimed to have a specific targeting of the resulting viral vectors for a specific cell type. This gain in specificity requires it to cut off the braod natural tropism resulting is an less infective virus copared to the wild type virus.</li>
+
this year are alone capable of producing infectious viral particles
-
<li><b>3) Concentration and enclosure</b>
+
when transduced together with a vector plasmid and a helper plasmid
-
All working steps for the preparation of viral vectors were carried out in a BSL II laboratory and within this laboratory work with the AAV was restricted to a separate Laminar flow cabinet type II. Cell culture and storage of the virus was also done in separate Freezers and incubators. All laboratories and epipment that contained viral vectors were specially marked, for example with a Biohazard warning signs.</li>
+
into <a
-
<li><b>4) Exposure minimization</b>
+
href="https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf">AAV-293</a>
-
This aspect of the guiding principles can be sumarized under "operator protection"18. The Exposure minimization was achieved in our laboratory by wearing special labcoats for the SII laboratory and gloves that were desinfected and changed regualrely. During manipulation of viral vectors attention was payed to avoid droplets and especially aerosoles. A possible diversion of the viral vectors was avoided by cleaning all equipment when inserted or removed from the Laminar flow cabinet and after completion of the work task.</li>
+
cells. These special cells provide the adenoviral gene E1 stabily
-
<li><b>5) Physical containment</b>
+
integrated in trans.
-
The requirements for the physical containment were fullfilled by performing all manipulation on the AAV in an BSL II laboratory that guaranted a restriction of persons that entered the laboratory.</li>
+
These cells are not provided in the Virus Construction Kit nor
-
<li><b>6) Hazard minimization</b>
+
availible in the Parts Registry and have to purchased from other
-
For the AAV-2 there are no sugestive activitis because the possible danger that runs out of the AAV is comparably low, vaccination is not avilible and biomonitoring is not necessary.</li></p><br><br>
+
laboratories or a commercial supplyer.
-
 
+
For this
-
 
+
<p></p>
-
 
+
reason we estimate the risk of a accidental transformation of <a
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
href="https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf">AAV-293</a>
-
height="auto"/>
+
cells with all three plasmids for negligible.
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
Nevertheless we considered it useful to mark every BioBrick or
-
<span style="color:DarkGreen"><b>Do any of the new BioBrick parts (or devices) that you made this year raise any safety issues? If yes, did you document these issues in the Registry? How did you manage to handle the safety issue? How could other teams learn from your experience?</b></span></div>
+
Composite Part in the Registry that contributes to the production or is
 +
capable of producing viral vectors when transformed under the
 +
previously mentioned conditions.</td>
 +
<td style="vertical-align: top;">
 +
<p><img margin:="" 0px="" 5px=""
 +
src="https://static.igem.org/mediawiki/2010/1/1e/Freiburg10_Warning_SignI.png"
 +
alt="Warning sign for part descriptions" align="right" height="auto"
 +
width="300"></p>
 +
</td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<p></p>
<p>
<p>
-
<img align="right" width="300px" height="auto" margin: 0px 5px 0px 5px src="https://static.igem.org/mediawiki/2010/1/1e/Freiburg10_Warning_SignI.png" alt="Warning sign for part descriptions" />
+
</p>
-
Several composite parts that were assembled by our Team this year are alone capable of producing infectious viral particles when transduced together with a vector plasmid and a helper plasmid into <a href=https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf>AAV-293</a> cells. These special cells provide the adenoviral gene E1 stabily integrated in trans.
+
<br>
-
These cells are not provided in the Virus Construction Kit nor availible in the Parts Registry and have to purchased from other laboratories or a commercial supplyer.
+
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
-
For this reason we estimate the risk of a accidental transformation of <a href=https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf>AAV-293</a> cells with all three plasmids for negligible.
+
cellspacing="2">
-
Nevertheless we considered it useful to mark every BioBrick or Composite Part in the Registry that contributes to the production or is capable of producing viral vectors when transformed under the previously mentioned conditions.
+
<tbody>
-
</p><br><br>
+
<tr>
-
 
+
<td style="vertical-align: top;"><img
-
 
+
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
-
 
+
height="auto" width="150"></td>
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
<td style="vertical-align: middle;"><span
-
height="auto"/>
+
style="color: DarkGreen;"><b>Contribute to community discussions
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
on what needs to go into a code against the use of our science for
-
<span style="color:DarkGreen"><b>Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response)</b></span></div>
+
hostile purposes (see A Community Response)</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<br>
 +
<div
 +
style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;">
 +
<span style="color: DarkGreen;"></span></div>
<p>
<p>
 +
</p>
<li>Public Perception
<li>Public Perception
 +
</li>
<li>importance of maintaining public legitimacy and support</li>
<li>importance of maintaining public legitimacy and support</li>
<li>apllications should demonstrate clear social benefits</li>
<li>apllications should demonstrate clear social benefits</li>
<li>not overhyped - anxiety and unrealistic hopes</li>
<li>not overhyped - anxiety and unrealistic hopes</li>
-
 
+
<blockquote>psychological research into the concept of "identity-driven
-
<blockquote>psychological research into the concept of "identity-driven decision-making" (Torpman,2004)<a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452> <sup>19</sup></a></blockquote>
+
decision-making" (Torpman,2004)<a
-
 
+
href="http://www.ncbi.nlm.nih.gov/pubmed/16819452"> <sup>19</sup></a></blockquote>
-
<blockquote>Every grout has a set of norms: a code of conduct about what is acceptable beahviour (Jaques, 2004]<a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452> <sup>19</sup></a></blockquote>
+
<blockquote>Every grout has a set of norms: a code of conduct about
-
</p><br><br>
+
what is acceptable beahviour (Jaques, 2004]<a
-
 
+
href="http://www.ncbi.nlm.nih.gov/pubmed/16819452"> <sup>19</sup></a></blockquote>
-
 
+
<br>
-
 
+
<br>
-
 
+
<center>
-
 
+
<h2>Trade-off between potential misuse and promising medical progress</h2>
-
 
+
<br>
-
 
+
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
-
 
+
cellspacing="2">
-
 
+
<tbody>
-
 
+
<tr>
-
<center><h2>Trade-off between potential misuse and promising medical progress</h2></center>
+
<td style="vertical-align: top; text-align: left;"><img
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
-
height="auto"/>
+
height="auto" width="150"></td>
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
<td style="vertical-align: middle;"><span
-
<span style="color:DarkGreen"><b>Do you have any other ideas how to deal with safety issues that could be useful for future iGEM competitions? How could parts, devices and systems be made even safer through biosafety engineering?</b> </span></div>
+
style="color: DarkGreen;"><b>Do you have any other ideas how to
 +
deal with safety issues that could be useful for future iGEM
 +
competitions? How could parts, devices and systems be made even safer
 +
through biosafety engineering?</b></span></td>
 +
</tr>
 +
</tbody>
 +
</table>
 +
<br>
 +
</center>
 +
<div
 +
style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;">
 +
<span style="color: DarkGreen;"> </span></div>
<p>
<p>
-
In principle each research-project that bears any risks for engaged researchers, mankind or the environment should be treated under the precautionary principle as proposed <a href=http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf><sup>11</sup></a>: "treat synthetic microorganisms as dangerous until proven harmless".<br>
+
In principle each research-project that bears any risks for engaged
-
This would mean to work on such synthetic DNA containing Bio Bricks at least under Biological security levels two.<br>
+
researchers, mankind or the environment should be treated under the
-
Additional to this secure working environment the system itself can be optimized according to biosafety aspects, means to reduce it's viability outside the laboratory. This aim can be approached by reducing the systems ability to evolve, proliferate and interact with it's environment. A common method to achieve this goal is to engineer microorganisms in a way that they depend on nutrients that can't be found in the environment in sufficient amount.
+
precautionary principle as proposed <a
-
 
+
href="http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf"><sup>11</sup></a>:
-
</p><br><br>
+
"treat synthetic microorganisms as dangerous until proven harmless".<br>
-
 
+
This would mean to work on such synthetic DNA containing Bio Bricks at
-
 
+
least under Biological security levels two.<br>
-
<center><h1>Biosecurity</h1></center>
+
Additional to this secure working environment the system itself can be
-
Def: "measures focus on the prevention of theft, misuse , or intentional relese of pathogens and toxins" <a href=http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf><sup>1</sup></a><br>
+
optimized according to biosafety aspects, means to reduce it's
-
 
+
viability outside the laboratory. This aim can be approached by
-
 
+
reducing the systems ability to evolve, proliferate and interact with
-
<center><h2>The malignant use of biological agents in history</h2></center>
+
it's environment. A common method to achieve this goal is to engineer
-
<p>The misuse of biological agent as weapons in warfare is a fear spreading companion in the history of mankind, ranging from the well-poisoners in prehistoric times to bio-terrorists present days. The following brakt intends to give a short outline of the major events<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a>:
+
microorganisms in a way that they depend on nutrients that can't be
-
 
+
found in the environment in sufficient amount.
-
<li> First systhematic use of chemical weapons during the first world war</li>
+
</p>
-
<li> The 1918 flu pandemic lasted from March 1918 to June 1920 and killed approximately 50 Million people around the world. Rumors circulated that this pandemic is caused by the other combatant nation.</li>
+
<br>
-
<li> "Prohibion of the Use of Asphyxiating, Poisonous or other Gases and of Bacteriological Methods of Warfare" was signed on 19 June 1925<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a></li>
+
<br>
-
<li> Several combatant nations of the second world war established biological warfare programs. </li>
+
<center>
-
<li> The range of the Japanese biological warfare program lead several nations to expand their own biological warfare program.</li>
+
<h1>Biosecurity</h1>
-
<li> Limited military use<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a> and the advances in molecular biology (e.g. the first isolatin of a gene and the discovery of the restriction enzymes in 1969) lead to the "Convention on the Prohibion of the Development, Production and Stockpilling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction " (BTWC) on 10 April 1972.  
+
</center>
-
<blockquote>''"develop, produce, stockpile or otherwise acquire or retain: ... Microbial or other biological agents, or toxins whatever their origin or method of production, of types and in wantities that have no justification for prophylactic, protective or other peaceful purpose..." ''<sup>3</sup></blockquote></li>
+
Def: "measures focus on the prevention of theft, misuse , or
-
<li> Breach of the BTWC by the Soviet Union which continued their offensive biologicla warfare programm
+
intentional relese of pathogens and toxins" <a
-
<li> Stop of the biological warfare Program "Biopreparat" accompanies the Dissolution of the Svoviet Union in 1991</li>
+
href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a><br>
 +
<center>
 +
<h2>The malignant use of biological agents in history</h2>
 +
</center>
 +
<p>The misuse of biological agent as weapons in warfare is a fear
 +
spreading companion in the history of mankind, ranging from the
 +
well-poisoners in prehistoric times to bio-terrorists present days. The
 +
following brakt intends to give a short outline of the major events<a
 +
href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a>:
 +
</p>
 +
<li> First systhematic use of chemical weapons during the first world
 +
war</li>
 +
<li> The 1918 flu pandemic lasted from March 1918 to June 1920 and
 +
killed approximately 50 Million people around the world. Rumors
 +
circulated that this pandemic is caused by the other combatant nation.</li>
 +
<li> "Prohibion of the Use of Asphyxiating, Poisonous or other Gases
 +
and of Bacteriological Methods of Warfare" was signed on 19 June 1925<a
 +
href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a></li>
 +
<li> Several combatant nations of the second world war established
 +
biological warfare programs. </li>
 +
<li> The range of the Japanese biological warfare program lead several
 +
nations to expand their own biological warfare program.</li>
 +
<li> Limited military use<a
 +
href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a>
 +
and the advances in molecular biology (e.g. the first isolatin of a
 +
gene and the discovery of the restriction enzymes in 1969) lead to the
 +
"Convention on the Prohibion of the Development, Production and
 +
Stockpilling of Bacteriological (Biological) and Toxin Weapons and on
 +
Their Destruction " (BTWC) on 10 April 1972.
 +
<blockquote>''"develop, produce, stockpile or otherwise acquire or
 +
retain: ... Microbial or other biological agents, or toxins whatever
 +
their origin or method of production, of types and in wantities that
 +
have no justification for prophylactic, protective or other peaceful
 +
purpose..." ''<sup>3</sup></blockquote>
 +
</li>
 +
<li> Breach of the BTWC by the Soviet Union which continued their
 +
offensive biologicla warfare programm
 +
</li>
 +
<li> Stop of the biological warfare Program "Biopreparat" accompanies
 +
the Dissolution of the Svoviet Union in 1991</li>
<li> Antrax attacks in the USA in 2001</li>
<li> Antrax attacks in the USA in 2001</li>
-
 
+
After this short description of misused biological components there is
-
After this short description of misused biological components there is still the question what impact biological warfare will have in the future of mankind.
+
still the question what impact biological warfare will have in the
-
</p>
+
future of mankind.
-
 
+
<center>
-
<center><h2>Broad avilibility of knowledge</h2></center>
+
<h2>Broad avilibility of knowledge</h2>
-
n the life sciences information has allways been freely acessible for everybody who is interested in the results of a particular research project. The combination of this global availibility with the new possibilities of the internet broad for literature search and availibility of gene sequences made it easiere to collect informations for a possible misuse. <br>
+
</center>
-
For the overwhelming majority this open availibility is absolutely desirely but on the other hand there are also examples of research results that bear a very high risk to be misused. <br>
+
n the life sciences information has allways been freely acessible for
-
Following we present the three most controversial discussed publications that could also be read as a "How to create your own bioweapon".
+
everybody who is interested in the results of a particular research
-
 
+
project. The combination of this global availibility with the new
-
 
+
possibilities of the internet broad for literature search and
-
<h3>Mousepox Virus in Australien</h3><br>
+
availibility of gene sequences made it easiere to collect informations
-
The Australian research group around <a href=http://www.ncbi.nlm.nih.gov/pubmed/11152493> Jackson et al. ; 2001 <sup>16</sup></a>inserted the coding region of the IL-4 gne into the genome of mousepox. They hoped to create a virus that sterilizes mice and thus provides a means for pest control. Contrarely to their expectations they had created a superstrain that killed even naturally resistent mice and mice that had been vaccinated against normal mousepox. This discovery could potentially be used to make smallpox resistant to potential vaccines.
+
for a possible misuse. <br>
-
 
+
For the overwhelming majority this open availibility is absolutely
-
<h3>Synthesis of a Polio Virus</h3><br>
+
desirely but on the other hand there are also examples of research
-
At the State University of New York <a href=http://www.sciencemag.org/cgi/content/full/297/5583/1016> Cello et al. ; 2002 <sup>05</sup></li> synthesized a "living" polio virus from scratch. Especially the <a href=http://www.sciencemag.org/cgi/content/full/1072266/DC1>Supporting Online Material</a> caused worried remarks because it precisely describes how to assemble a virus from small oligo nucleotides. The authors jusifyed their project by declaring that they:
+
results that bear a very high risk to be misused. <br>
-
<blockquote>"made the virus to send a warning that terrorists might be able to make biological weapons without obtaining a natrual virus"<a href=http://www.ncbi.nlm.nih.gov/pubmed/19784453><sup>17</sup></a></blockquote>
+
Following we present the three most controversial discussed
-
 
+
publications that could also be read as a "How to create your own
-
<h3>Reconstitution of the Spanish Flu</h3><br>
+
bioweapon".
-
<img width="250px" class="right" src="https://static.igem.org/mediawiki/2010/9/96/Freiburg10_Spanishflu.jpg" alt="Influenza hospital for american soldiers" />
+
<h3>Mousepox Virus in Australien</h3>
-
At the Center for Disease Control and Prevention (CDC) the group around <a href=http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf>Tumpey et al. ; 2005<sup>24</sup></a> published that they had sequenced and recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50 million people. The publication of the sequence provoked several very different responses that can only be partially be quoted here.
+
<br>
-
 
+
The Australian research group around <a
-
The controversial noticed outrider of the Synthetic Biology Craig Venter seen in the new virus
+
href="http://www.ncbi.nlm.nih.gov/pubmed/11152493"> Jackson et al. ;
-
<blockquote>"the first true Juressic Parc scenario" <a href=http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233><sup>2</sup></a></li></blockquote>
+
2001 <sup>16</sup></a>inserted the coding region of the IL-4 gne into
-
 
+
the genome of mousepox. They hoped to create a virus that sterilizes
-
The Institute Professor at the MIT Philip A. Sharp supported the publication because he:
+
mice and thus provides a means for pest control. Contrarely to their
-
<blockquote>"belive[s] that allowing the publication of this information was the correct decision in terms of both national security and public health" <a href=http://www.sciencemag.org/cgi/content/short/310/5745/17><sup>12</sup></a></blockquote>
+
expectations they had created a superstrain that killed even naturally
-
 
+
resistent mice and mice that had been vaccinated against normal
-
Wheras <a href=http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf>v. Bubnoff; 2005<sup>25</sup></a> critisizes the CDS for it's careless regulations for the shipment of viruses and the willingness to propagate highly virulent viruses. This causes in his opinion the risk of possible accidents resulting in the release of the virus to the environment.
+
mousepox. This discovery could potentially be used to make smallpox
-
 
+
resistant to potential vaccines.
-
 
+
<h3>Synthesis of a Polio Virus</h3>
-
<center><h2>Broad avilibility of material</h2></center>
+
<br>
-
 
+
At the State University of New York <a
-
<center><h2>Szenarios of attack</h2></center>
+
href="http://www.sciencemag.org/cgi/content/full/297/5583/1016"> Cello
-
 
+
et al. ; 2002 <sup>05</sup> synthesized a "living" polio virus from
-
<center><h2>Conclusion</h2></center>
+
scratch. Especially the </a><a
-
 
+
href="http://www.sciencemag.org/cgi/content/full/1072266/DC1">Supporting
-
 
+
Online Material</a> caused worried remarks because it precisely
-
<img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150"  
+
describes how to assemble a virus from small oligo nucleotides. The
-
height="auto"/>
+
authors jusifyed their project by declaring that they:
-
<div style="float:right; width:700px; height:auto;  margin: 0px 5px 0px 5px; text-align:justify;">
+
<blockquote>"made the virus to send a warning that terrorists might be
-
<span style="color:DarkGreen"><b>Include something in your project description and presentations that demonstrates that you have thought about how others could misuse your work.</b> </span></div>
+
able to make biological weapons without obtaining a natrual virus"<a
-
<p>
+
href="http://www.ncbi.nlm.nih.gov/pubmed/19784453"><sup>17</sup></a></blockquote>
-
For sure there is allway the possibility that knowledge to produce transgene viral vectors could be used to produce bioweapons. Therefor it was important for us to use a system that does not bear the risk that someone could use it for evil purpose. In the case of the Adeno-associated virus the very limited packaging capacity is the major reason that excludes it from the list of agents that could realistically be used for the pruduction of bioweapons. Even a fully replication potent AAV will depend on the coninfection of a helpervirus and is therefore not suitable for a fast propagation in an population.
+
<h3>Reconstitution of the Spanish Flu</h3>
-
Additional to this point we concentrated our project on the retargeting of the virus - means to make the broad tropismn more narrow and to decrease the transduction efficiency in the most cases. This modification is usually mainly required for medical purposes. Also we did neither investigate possibilities to shield the vector from the immune system of potential host nor ways to bypass an existing immunity.  
+
<br>
-
</p><br><br>
+
<img style="width: 300px; height: 223px;" class="right"
-
 
+
src="https://static.igem.org/mediawiki/2010/9/96/Freiburg10_Spanishflu.jpg"
-
 
+
alt="Influenza hospital for american soldiers" align="left">
-
 
+
At the Center for Disease Control and Prevention (CDC) the group around
-
 
+
<a href="http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf">Tumpey
-
 
+
et al. ; 2005<sup>24</sup></a> published that they had sequenced and
-
 
+
recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50
-
<li>01 <a href=http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf>Synthetic Biology & Biosecurity - Awareness in Europe | Kelle ; 2007<sup>1</sup></a></li>
+
million people. The publication of the sequence provoked several very
-
 
+
different responses that can only be partially be quoted here.
-
<li>02 <a href=http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233>Synthetic Biology - Social and Ethical Challenges | Balmer et Martin ; 2008<sup>2</sup></a></li>
+
The controversial noticed outrider of the Synthetic Biology Craig
-
 
+
Venter seen in the new virus
-
<li>03) Synthetic Biology - Applying Engineering to Biology
+
<blockquote>"the first true Juressic Parc scenario" <a
-
<br> used
+
href="http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&amp;sID=4233"><sup>2</sup></a></blockquote>
-
 
+
The Institute Professor at the MIT Philip A. Sharp supported the
-
<li>04 <a href=http://www.informaworld.com/smpp/content~content=a713604665&db=all>The Impact of the Development of Modern Biology and Medicine on the Evolution of Offensive Biological Warfare Programs in the Twentieth Century | Dando ; 1999 <sup>04</sup></a></li>
+
publication because he:
-
 
+
<blockquote>"belive[s] that allowing the publication of this
-
<li>05 <a href=http://www.sciencemag.org/cgi/content/full/297/5583/1016>Chemical Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the Absence of Natural Template | Cello et al. ; 2002 <sup>05</sup></li>
+
information was the correct decision in terms of both national security
-
 
+
and public health" <a
-
<li>06 <a href=http://www.nytimes.com/2003/12/03/opinion/03iht-edstein_ed3_.html>Dangerous research : When science breeds nightmares | Steinbruner et Harris ; 2003 <sup>06</sup></a></li>
+
href="http://www.sciencemag.org/cgi/content/short/310/5745/17"><sup>12</sup></a></blockquote>
-
 
+
Wheras <a
-
<li>07 <a href=http://www.jcvi.org/cms/fileadmin/site/research/projects/synthetic-genomics-report/synthetic-genomics-report.pdf>Synthetic Genomics - Options for governance | Garfinkel et al. ; 2007 <sup>07</sup></a></li>
+
href="http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf">v.
-
 
+
Bubnoff; 2005<sup>25</sup></a> critisizes the CDS for it's careless
-
<li>08 <a href=http://www.nature.com/nrg/journal/v6/n7/abs/nrg1637.html>Synthetic biology | Benner et Sismour , 2005 <sup>08</sup></a></li>
+
regulations for the shipment of viruses and the willingness to
-
 
+
propagate highly virulent viruses. This causes in his opinion the risk
-
<li>09 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16954140>Synthetic biology—putting engineering into biology | Heinemann et Panke ; 2006 <sup>09</sup></a></li>
+
of possible accidents resulting in the release of the virus to the
-
 
+
environment.
-
<li>10 <a href=http://www.guardian.co.uk/world/2006/jun/14/terrorism.topstories3>Revealed: the lax laws that could allow assembly of deadly virus DNA | Randerson ; 2006 <sup>10</sup></a> </li>
+
<center>
-
 
+
<h2>Broad avilibility of material</h2>
-
<li>11 <a href=http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf>The Promise and Perils of Synthetic Biology | Tucker & Zilinskas ; 2006 <sup>11</sup></a></li>
+
</center>
-
 
+
<center>
-
<li>12 <a href=http://www.sciencemag.org/cgi/content/short/310/5745/17>1918 Flu and Responsible Science | Sharp ; 2005 <sup>12</sup></a></li>
+
<h2>Szenarios of attack</h2>
-
 
+
</center>
-
<li>13 <a href=http://www.fas.org/irp/cia/product/bw1103.pdf> The Darker Bioweapons Future | CIA ; 2003 <sup>13</sup></a></li>
+
<center>
-
 
+
<h2>Conclusion</h2>
-
<li>14) [[Media:Primer for Synthetic Biology - Mohr 2007.pdf]]
+
<br>
-
</li>
+
<table style="text-align: left; width: 90%;" border="0" cellpadding="2"
-
 
+
cellspacing="2">
-
<li>15) [[Media:Freiburg10_The bugs of war.pdf]]
+
<tbody>
-
</li>
+
<tr>
-
 
+
<td style="vertical-align: top;"><img
-
<li>16 <a href=http://www.ncbi.nlm.nih.gov/pubmed/11152493>Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. | Jackson et al. ; 2001 <sup>16</sup></a></li>
+
src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png"
-
 
+
height="auto" width="150"></td>
-
<li>17 <a href=http://www.ncbi.nlm.nih.gov/pubmed/19784453>Governance of dual-use research: an ethical dilemma. | Selgelid ; 2009 <sup>17</sup></a></li>
+
<td style="vertical-align: middle;"><span
-
 
+
style="color: DarkGreen;"><b>Include
-
<li>18 <a href=http://www.ncbi.nlm.nih.gov/pubmed/18625678>Evidence-based biosafety: a review of the principles and effectiveness of microbiological containment measures. | Kimman et al. 2008 <sup>18</sup></a> </li>
+
something in your project
-
 
+
description and presentations that demonstrates that you have thought
-
<li>19) <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452>A Hippocratic Oath for life scientists | Revill et Dando ; 2006 <sup>19</sup></a></li>
+
about how others could misuse your work.</b></span> </td>
-
 
+
</tr>
-
<li>20 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819443>Empowerment and restraint in scientific communication. New developments make it easier to share information, but more difficult to deal with dual-use biology. | Campbell ; 2006<sup>20</sup></a></li>
+
</tbody>
-
 
+
</table>
-
<li>21 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819441>When risk outweighs benefit | Aken ; 2006 <sup>21</sup></a></li>
+
<br>
-
 
+
</center>
-
<li>22 <a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408>Advances in life sciences and bioterrorism. Risks, perspectives and responsibilities.| Beck ; 2003 <sup>22</sup></a></li>
+
<p>For sure there is allway the possibility that knowledge to produce
-
 
+
transgene viral vectors could be used to produce bioweapons. Therefor
-
<li>23 <a href=http://www.ncbi.nlm.nih.gov/pubmed/12590130>PNAS policy on publication of sensitive material in the life sciences | Cozzarelli ; 2003 <sup>23</sup></a></li>
+
it was important for us to use a system that does not bear the risk
-
 
+
that someone could use it for evil purpose. In the case of the
-
<li>24 <a href=http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf>Characterization of the
+
Adeno-associated virus the very limited packaging capacity is the major
 +
reason that excludes it from the list of agents that could
 +
realistically be used for the pruduction of bioweapons. Even a fully
 +
replication potent AAV will depend on the coninfection of a helpervirus
 +
and is therefore not suitable for a fast propagation in an population.
 +
Additional to this point we concentrated our project on the retargeting
 +
of the virus - means to make the broad tropismn more narrow and to
 +
decrease the transduction efficiency in the most cases. This
 +
modification is usually mainly required for medical purposes. Also we
 +
did neither investigate possibilities to shield the vector from the
 +
immune system of potential host nor ways to bypass an existing
 +
immunity. </p>
 +
<br>
 +
<br>
 +
<li>01 <a
 +
href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf">Synthetic
 +
Biology &amp; Biosecurity - Awareness in Europe | Kelle ; 2007<sup>1</sup></a></li>
 +
<li>02 <a
 +
href="http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&amp;sID=4233">Synthetic
 +
Biology - Social and Ethical Challenges | Balmer et Martin ; 2008<sup>2</sup></a></li>
 +
<li>03) Synthetic Biology - Applying Engineering to Biology <br>
 +
used
 +
</li>
 +
<li>04 <a
 +
href="http://www.informaworld.com/smpp/content%7Econtent=a713604665&amp;db=all">The
 +
Impact of the Development of Modern Biology and Medicine on the
 +
Evolution of Offensive Biological Warfare Programs in the Twentieth
 +
Century | Dando ; 1999 <sup>04</sup></a></li>
 +
<li>05 <a
 +
href="http://www.sciencemag.org/cgi/content/full/297/5583/1016">Chemical
 +
Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the
 +
Absence of Natural Template | Cello et al. ; 2002 <sup>05</sup></a></li>
 +
<li><a href="http://www.sciencemag.org/cgi/content/full/297/5583/1016">06
 +
</a><a
 +
href="http://www.nytimes.com/2003/12/03/opinion/03iht-edstein_ed3_.html">Dangerous
 +
research : When science breeds nightmares | Steinbruner et Harris ;
 +
2003 <sup>06</sup></a></li>
 +
<li>07 <a
 +
href="http://www.jcvi.org/cms/fileadmin/site/research/projects/synthetic-genomics-report/synthetic-genomics-report.pdf">Synthetic
 +
Genomics - Options for governance | Garfinkel et al. ; 2007 <sup>07</sup></a></li>
 +
<li>08 <a
 +
href="http://www.nature.com/nrg/journal/v6/n7/abs/nrg1637.html">Synthetic
 +
biology | Benner et Sismour , 2005 <sup>08</sup></a></li>
 +
<li>09 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16954140">Synthetic
 +
biology—putting engineering into biology | Heinemann et Panke ; 2006 <sup>09</sup></a></li>
 +
<li>10 <a
 +
href="http://www.guardian.co.uk/world/2006/jun/14/terrorism.topstories3">Revealed:
 +
the lax laws that could allow assembly of deadly virus DNA | Randerson
 +
; 2006 <sup>10</sup></a> </li>
 +
<li>11 <a
 +
href="http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf">The
 +
Promise and Perils of Synthetic Biology | Tucker &amp; Zilinskas ; 2006
 +
<sup>11</sup></a></li>
 +
<li>12 <a
 +
href="http://www.sciencemag.org/cgi/content/short/310/5745/17">1918
 +
Flu and Responsible Science | Sharp ; 2005 <sup>12</sup></a></li>
 +
<li>13 <a href="http://www.fas.org/irp/cia/product/bw1103.pdf"> The
 +
Darker Bioweapons Future | CIA ; 2003 <sup>13</sup></a></li>
 +
<li>14) [[Media:Primer for Synthetic Biology - Mohr 2007.pdf]] </li>
 +
<li>15) [[Media:Freiburg10_The bugs of war.pdf]] </li>
 +
<li>16 <a href="http://www.ncbi.nlm.nih.gov/pubmed/11152493">Expression
 +
of mouse interleukin-4 by a recombinant ectromelia virus suppresses
 +
cytolytic lymphocyte responses and overcomes genetic resistance to
 +
mousepox. | Jackson et al. ; 2001 <sup>16</sup></a></li>
 +
<li>17 <a href="http://www.ncbi.nlm.nih.gov/pubmed/19784453">Governance
 +
of dual-use research: an ethical dilemma. | Selgelid ; 2009 <sup>17</sup></a></li>
 +
<li>18 <a href="http://www.ncbi.nlm.nih.gov/pubmed/18625678">Evidence-based
 +
biosafety: a review of the principles and effectiveness of
 +
microbiological containment measures. | Kimman et al. 2008 <sup>18</sup></a>
 +
</li>
 +
<li>19) <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819452">A
 +
Hippocratic Oath for life scientists | Revill et Dando ; 2006 <sup>19</sup></a></li>
 +
<li>20 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819443">Empowerment
 +
and restraint in scientific communication. New developments make it
 +
easier to share information, but more difficult to deal with dual-use
 +
biology. | Campbell ; 2006<sup>20</sup></a></li>
 +
<li>21 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819441">When risk
 +
outweighs benefit | Aken ; 2006 <sup>21</sup></a></li>
 +
<li>22 <a href="http://www.ncbi.nlm.nih.gov/pubmed/12789408">Advances
 +
in life sciences and bioterrorism. Risks, perspectives and
 +
responsibilities.| Beck ; 2003 <sup>22</sup></a></li>
 +
<li>23 <a href="http://www.ncbi.nlm.nih.gov/pubmed/12590130">PNAS
 +
policy on publication of sensitive material in the life sciences |
 +
Cozzarelli ; 2003 <sup>23</sup></a></li>
 +
<li>24 <a href="http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf">Characterization
 +
of the
Reconstructed 1918 Spanish
Reconstructed 1918 Spanish
Influenza Pandemic Virus | Tumpey et al. ; 2005<sup>24</sup></a> </li>
Influenza Pandemic Virus | Tumpey et al. ; 2005<sup>24</sup></a> </li>
-
 
+
<li>25 <a
-
<li>25 <a href=http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf>Deadly flu virus can be
+
href="http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf">Deadly
 +
flu virus can be
sent through the mail| v. Bubnoff; 2005<sup>25</sup></a></li>
sent through the mail| v. Bubnoff; 2005<sup>25</sup></a></li>
-
 
+
<li>26 <a
-
<li>26 <a href=https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf>Risk assessment of human Adeno-associated viruses| ZKBS; 2001<sup>26</sup></a></li>
+
href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf">Risk
-
 
+
assessment of human Adeno-associated viruses| ZKBS; 2001<sup>26</sup></a></li>
-
<li>27 <a href=https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf>Advises for AAV carrying cell cycle regulating genes| ZKBS; 2004 <sup>27</sup></a></li>
+
<li>27 <a
-
 
+
href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf">Advises
-
<li>28 <a href=https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf>Risk assessment of human Adeno-associated viruses and AAV derived vectors| ZKBS; 2005 <sup>28</sup></a> </li>
+
for AAV carrying cell cycle regulating genes| ZKBS; 2004 <sup>27</sup></a></li>
-
 
+
<li>28 <a
-
<li>29 <a href=http://www.ncbi.nlm.nih.gov/pubmed/10700178>Evidence for gene transfer and expression of factor IX in haemophilia B patients treated with an AAV vector.| Kai et al. ; 2000 <sup>29</sup></a>
+
href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf">Risk
 +
assessment of human Adeno-associated viruses and AAV derived vectors|
 +
ZKBS; 2005 <sup>28</sup></a> </li>
 +
<li>29 <a href="http://www.ncbi.nlm.nih.gov/pubmed/10700178">Evidence
 +
for gene transfer and expression of factor IX in haemophilia B patients
 +
treated with an AAV vector.| Kai et al. ; 2000 <sup>29</sup></a>
Bioverteilung in Klinischer Studie </li>
Bioverteilung in Klinischer Studie </li>
 +
<li>30 <a
 +
href="https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf">Biosafety
 +
application of the iGEM team Freiburg_Bioware 2010<sup>30</sup></a> (in
 +
German)</li>
 +
<li>31 <a
 +
href="https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg">Official
 +
classification as Biological Safety Level 1 by the local biosafety
 +
office<sup>31</sup></a></li>
 +
<li>32 <a
 +
href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix
 +
B | National Institute of Health <sup>32</sup></a></li>
 +
</html>
-
<li>30 <a href=https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf>Biosafety application of the iGEM team Freiburg_Bioware 2010<sup>30</sup></a> (in German)</li>
 
-
<li>31 <a href=https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg>Official classification as Biological Safety Level 1 by the local biosafety office<sup>31</sup></a></li>
 
-
<li>32 <a href=http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm>Appendix B | National Institute of Health <sup>32</sup></a></li>
+
{{:Team:Freiburg_Bioware/Footer}}
-
 
+
-
</html>
+

Revision as of 17:28, 26 October 2010


Biosafety

Definition: "biosafety measures aim to prevent the unintentional exposure to pathogens and toxins, or their accidental release" 1

Risk assessment for our Adeno-associated virus based system

In Germany the "Central Commission for Biological Security" (ZKBS) released three legally binding Risk Assessment satements for the Adeno-associated Virus 26, 27, 28. Risk assessment in other countries may deviate from these decisions, so please inform yourself about the legal regulations on AAV in your country before using the Virus Construction Kit.

In Germany the Biological Safety Level(BSL) classifications for AAVs are:
  • Adeno-associated Virus 2, 3 and 5 have to be handled under BSL 1.
  • Adeno-associated Viurs 1, 4, 5, 7, 8, 9, 10 and 11 have to be handled under BSL 2.

This classification was developed based on the fact that only serotypes 2, 3 and 5 are isolated from humans and that their harmlessness has been confirmed in clinical studies. This general classification has to be rechecked when the virus contains gene sequences with a transforming protential.

Viral vectors systems packaging a vector plasmid that only contains the viral Inverted Terminal Repeats (ITRs) and providing the genes for Rep and Cap in trans (as it is the case for our system) are classified as BSL 1 if the following conditions are fullfilled:

  • The viral particles do not contain AAV derived sequences other than the ITRs
  • The viral particles do not contain Nucleotidesequences with a risk potential

We also investigated the legal regulations for AAV-2 Viral Vector systems in the United States. The guidelines of the National Institutes of Health (NIH) classify in the Appendix B32 AAV-2 Vector Systems as Risk Group 1 (RG1) agents that can be treated under BSL 1. In detail the appendix states "... adeno- associated virus (AAV) types 1 through 4; and recombinant AAV constructs, in which the transgene does not encode either a potentially tumorigenic gene product or a toxin molecule and are produced in the absence of a helper virus."

Other general observations with the Adeno-associated Virus 2 AAV-2)are:
  • In clinical studies the viral vectors were not dilivered to the gonades.
  • Vector sequences were not detectable in the patients blood or urine at an examination 48 h after an infection with AAV-2 29.
  • In absence of Rep proteins, the vector DNA stays extrachromosomal and is not frequently integrated.

Concluding all these informations and regulations, the project that we have designed in this year is clearly classified as BLS 1.

General biosafety regulation in Germany

Which specific biosafety rules or guidelines do you have to consider in your country?

In Germany all work that includes recombinant DNA technologies is regulated by the Gesetz zur Regelung der Gentechnik. This law regulates general aspects in the life sciences and refers for more precise interpretations in §4 to the Zentrale Kommission für die Biologische Sicherheit. The ZKBS is a commission composed of 20 technical experts that releases yearly statements to actual issues of biosafety. So far the ZKBS released three stratements affecting the work with Adeno-associated viral systems 26, 27, 28. These documents were used to assess the dangers that could arise from our project to team members and the enviroment.

Is there a local biosafety group, committee, or review board at your institution? If yes, what does your local biosafety group think about your project?

At the Albert-Ludwigs-University Freiburg for all concerns of security the Stabsstelle Sicherheit is responsible and to contact if questions arise. Especially for questions of biological security Dr. Petra Markmeyer-Pieles is cognizant. We contacted her a first time befor the begin of our project in March when it was clear that the Adeno-associated Virus (AAV-2) was chosen as the topic of our project. At that time she proposed to do the cloning in the AAV-2 that is for sure to handle under biological security level 1 and to prepare everything for work under biological security level 2 to satisfy the precaution principle. The precaution principle was realized and all viral vectors that contained a modified capsid were handled under SII conditions until proven harmless. In August the planing of the project was completed, summarized in an Biosafety application30 and handed to the department for biological security who approve the application in an official BSL1 confirmation31official BSL1 confirmation for our project.


Risk management

Would any of your project ideas raise safety issues in terms of: researcher safety, public safety, or environmental safety?

Our project was designed in a way that it avoids any serious safety issues as far as possible. When working with infectious particles a minimal risk for the researcher is allways present. This risk was minimized by restricting the transduced genes to fluorescent proteins and prodrug convertases that are already proven not to harm human cells in the absece of the corresponding prodrug. A potential danger for the public or the environment was minimized as much as possible by following strictly the rules of Good Laboratory Practice (GLP) and the abdication of using randomized insertions in the capsid and of replication potent viruses. Minimizing the risk for team members and the society was was allways one of the major concerns, especially because worries about undergraduate students manipulating a virus could arise. The security concept will be explained by quoting and explaining the six guiding principles for safe manipulation of Gene Manipulated Organisms (GMOs) as summarized in Kimman et al. ; 200818.

  • 1) Hazard recognition and identification Risk assessment has been done and all legal regulations were considered as described in the last paragraph.
  • 2) Biological containment Biological containment means the usage of organisms with "reduced replicative capacity, inefectivity , transmissibility, and virulence"18. For our project only replicative deficient viruses were used, additional all modifications aimed to have a specific targeting of the resulting viral vectors for a specific cell type. This gain in specificity requires it to cut off the braod natural tropism resulting is an less infective virus copared to the wild type virus.
  • 3) Concentration and enclosure All working steps for the preparation of viral vectors were carried out in a BSL II laboratory and within this laboratory work with the AAV was restricted to a separate Laminar flow cabinet type II. Cell culture and storage of the virus was also done in separate Freezers and incubators. All laboratories and epipment that contained viral vectors were specially marked, for example with a Biohazard warning signs.
  • 4) Exposure minimization This aspect of the guiding principles can be sumarized under "operator protection"18. The Exposure minimization was achieved in our laboratory by wearing special labcoats for the SII laboratory and gloves that were desinfected and changed regualrely. During manipulation of viral vectors attention was payed to avoid droplets and especially aerosoles. A possible diversion of the viral vectors was avoided by cleaning all equipment when inserted or removed from the Laminar flow cabinet and after completion of the work task.
  • 5) Physical containment The requirements for the physical containment were fullfilled by performing all manipulation on the AAV in an BSL II laboratory that guaranted a restriction of persons that entered the laboratory.
  • 6) Hazard minimization For the AAV-2 there are no sugestive activitis because the possible danger that runs out of the AAV is comparably low, vaccination is not avilible and biomonitoring is not necessary.

  • Do any of the new BioBrick parts (or devices) that you made this year raise any safety issues? If yes, did you document these issues in the Registry? How did you manage to handle the safety issue? How could other teams learn from your experience?

    Several composite parts that were assembled by our Team this year are alone capable of producing infectious viral particles when transduced together with a vector plasmid and a helper plasmid into AAV-293 cells. These special cells provide the adenoviral gene E1 stabily integrated in trans. These cells are not provided in the Virus Construction Kit nor availible in the Parts Registry and have to purchased from other laboratories or a commercial supplyer. For this

    reason we estimate the risk of a accidental transformation of AAV-293 cells with all three plasmids for negligible. Nevertheless we considered it useful to mark every BioBrick or Composite Part in the Registry that contributes to the production or is capable of producing viral vectors when transformed under the previously mentioned conditions.

    Warning sign for part descriptions


    Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response)

  • Public Perception
  • importance of maintaining public legitimacy and support
  • apllications should demonstrate clear social benefits
  • not overhyped - anxiety and unrealistic hopes
  • psychological research into the concept of "identity-driven decision-making" (Torpman,2004) 19
    Every grout has a set of norms: a code of conduct about what is acceptable beahviour (Jaques, 2004] 19


    Trade-off between potential misuse and promising medical progress


    Do you have any other ideas how to deal with safety issues that could be useful for future iGEM competitions? How could parts, devices and systems be made even safer through biosafety engineering?

    In principle each research-project that bears any risks for engaged researchers, mankind or the environment should be treated under the precautionary principle as proposed 11: "treat synthetic microorganisms as dangerous until proven harmless".
    This would mean to work on such synthetic DNA containing Bio Bricks at least under Biological security levels two.
    Additional to this secure working environment the system itself can be optimized according to biosafety aspects, means to reduce it's viability outside the laboratory. This aim can be approached by reducing the systems ability to evolve, proliferate and interact with it's environment. A common method to achieve this goal is to engineer microorganisms in a way that they depend on nutrients that can't be found in the environment in sufficient amount.



    Biosecurity

    Def: "measures focus on the prevention of theft, misuse , or intentional relese of pathogens and toxins" 1

    The malignant use of biological agents in history

    The misuse of biological agent as weapons in warfare is a fear spreading companion in the history of mankind, ranging from the well-poisoners in prehistoric times to bio-terrorists present days. The following brakt intends to give a short outline of the major events22:

  • First systhematic use of chemical weapons during the first world war
  • The 1918 flu pandemic lasted from March 1918 to June 1920 and killed approximately 50 Million people around the world. Rumors circulated that this pandemic is caused by the other combatant nation.
  • "Prohibion of the Use of Asphyxiating, Poisonous or other Gases and of Bacteriological Methods of Warfare" was signed on 19 June 192522
  • Several combatant nations of the second world war established biological warfare programs.
  • The range of the Japanese biological warfare program lead several nations to expand their own biological warfare program.
  • Limited military use22 and the advances in molecular biology (e.g. the first isolatin of a gene and the discovery of the restriction enzymes in 1969) lead to the "Convention on the Prohibion of the Development, Production and Stockpilling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction " (BTWC) on 10 April 1972.
    ''"develop, produce, stockpile or otherwise acquire or retain: ... Microbial or other biological agents, or toxins whatever their origin or method of production, of types and in wantities that have no justification for prophylactic, protective or other peaceful purpose..." ''3
  • Breach of the BTWC by the Soviet Union which continued their offensive biologicla warfare programm
  • Stop of the biological warfare Program "Biopreparat" accompanies the Dissolution of the Svoviet Union in 1991
  • Antrax attacks in the USA in 2001
  • After this short description of misused biological components there is still the question what impact biological warfare will have in the future of mankind.

    Broad avilibility of knowledge

    n the life sciences information has allways been freely acessible for everybody who is interested in the results of a particular research project. The combination of this global availibility with the new possibilities of the internet broad for literature search and availibility of gene sequences made it easiere to collect informations for a possible misuse.
    For the overwhelming majority this open availibility is absolutely desirely but on the other hand there are also examples of research results that bear a very high risk to be misused.
    Following we present the three most controversial discussed publications that could also be read as a "How to create your own bioweapon".

    Mousepox Virus in Australien


    The Australian research group around Jackson et al. ; 2001 16inserted the coding region of the IL-4 gne into the genome of mousepox. They hoped to create a virus that sterilizes mice and thus provides a means for pest control. Contrarely to their expectations they had created a superstrain that killed even naturally resistent mice and mice that had been vaccinated against normal mousepox. This discovery could potentially be used to make smallpox resistant to potential vaccines.

    Synthesis of a Polio Virus


    At the State University of New York Cello et al. ; 2002 05 synthesized a "living" polio virus from scratch. Especially the Supporting Online Material caused worried remarks because it precisely describes how to assemble a virus from small oligo nucleotides. The authors jusifyed their project by declaring that they:
    "made the virus to send a warning that terrorists might be able to make biological weapons without obtaining a natrual virus"17

    Reconstitution of the Spanish Flu


    Influenza hospital for american soldiers At the Center for Disease Control and Prevention (CDC) the group around Tumpey et al. ; 200524 published that they had sequenced and recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50 million people. The publication of the sequence provoked several very different responses that can only be partially be quoted here. The controversial noticed outrider of the Synthetic Biology Craig Venter seen in the new virus
    "the first true Juressic Parc scenario" 2
    The Institute Professor at the MIT Philip A. Sharp supported the publication because he:
    "belive[s] that allowing the publication of this information was the correct decision in terms of both national security and public health" 12
    Wheras v. Bubnoff; 200525 critisizes the CDS for it's careless regulations for the shipment of viruses and the willingness to propagate highly virulent viruses. This causes in his opinion the risk of possible accidents resulting in the release of the virus to the environment.

    Broad avilibility of material

    Szenarios of attack

    Conclusion


    Include something in your project description and presentations that demonstrates that you have thought about how others could misuse your work.

    For sure there is allway the possibility that knowledge to produce transgene viral vectors could be used to produce bioweapons. Therefor it was important for us to use a system that does not bear the risk that someone could use it for evil purpose. In the case of the Adeno-associated virus the very limited packaging capacity is the major reason that excludes it from the list of agents that could realistically be used for the pruduction of bioweapons. Even a fully replication potent AAV will depend on the coninfection of a helpervirus and is therefore not suitable for a fast propagation in an population. Additional to this point we concentrated our project on the retargeting of the virus - means to make the broad tropismn more narrow and to decrease the transduction efficiency in the most cases. This modification is usually mainly required for medical purposes. Also we did neither investigate possibilities to shield the vector from the immune system of potential host nor ways to bypass an existing immunity.



  • 01 Synthetic Biology & Biosecurity - Awareness in Europe | Kelle ; 20071
  • 02 Synthetic Biology - Social and Ethical Challenges | Balmer et Martin ; 20082
  • 03) Synthetic Biology - Applying Engineering to Biology
    used
  • 04 The Impact of the Development of Modern Biology and Medicine on the Evolution of Offensive Biological Warfare Programs in the Twentieth Century | Dando ; 1999 04
  • 05 Chemical Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the Absence of Natural Template | Cello et al. ; 2002 05
  • 06 Dangerous research : When science breeds nightmares | Steinbruner et Harris ; 2003 06
  • 07 Synthetic Genomics - Options for governance | Garfinkel et al. ; 2007 07
  • 08 Synthetic biology | Benner et Sismour , 2005 08
  • 09 Synthetic biology—putting engineering into biology | Heinemann et Panke ; 2006 09
  • 10 Revealed: the lax laws that could allow assembly of deadly virus DNA | Randerson ; 2006 10
  • 11 The Promise and Perils of Synthetic Biology | Tucker & Zilinskas ; 2006 11
  • 12 1918 Flu and Responsible Science | Sharp ; 2005 12
  • 13 The Darker Bioweapons Future | CIA ; 2003 13
  • 14) [[Media:Primer for Synthetic Biology - Mohr 2007.pdf]]
  • 15) [[Media:Freiburg10_The bugs of war.pdf]]
  • 16 Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. | Jackson et al. ; 2001 16
  • 17 Governance of dual-use research: an ethical dilemma. | Selgelid ; 2009 17
  • 18 Evidence-based biosafety: a review of the principles and effectiveness of microbiological containment measures. | Kimman et al. 2008 18
  • 19) A Hippocratic Oath for life scientists | Revill et Dando ; 2006 19
  • 20 Empowerment and restraint in scientific communication. New developments make it easier to share information, but more difficult to deal with dual-use biology. | Campbell ; 200620
  • 21 When risk outweighs benefit | Aken ; 2006 21
  • 22 Advances in life sciences and bioterrorism. Risks, perspectives and responsibilities.| Beck ; 2003 22
  • 23 PNAS policy on publication of sensitive material in the life sciences | Cozzarelli ; 2003 23
  • 24 Characterization of the Reconstructed 1918 Spanish Influenza Pandemic Virus | Tumpey et al. ; 200524
  • 25 Deadly flu virus can be sent through the mail| v. Bubnoff; 200525
  • 26 Risk assessment of human Adeno-associated viruses| ZKBS; 200126
  • 27 Advises for AAV carrying cell cycle regulating genes| ZKBS; 2004 27
  • 28 Risk assessment of human Adeno-associated viruses and AAV derived vectors| ZKBS; 2005 28
  • 29 Evidence for gene transfer and expression of factor IX in haemophilia B patients treated with an AAV vector.| Kai et al. ; 2000 29 Bioverteilung in Klinischer Studie
  • 30 Biosafety application of the iGEM team Freiburg_Bioware 201030 (in German)
  • 31 Official classification as Biological Safety Level 1 by the local biosafety office31
  • 32 Appendix B | National Institute of Health 32