Skip to main content

Biological weapons and the genome manipulation


Kimmo Huosionmaa

One of the most horrific biological weapons would be the person, who delivers the organism but staying wealthy self. In those cases, some kind of retrovirus could be used to connect some kind of infectious genome in the human DNA. And that organism can transform the blood or some other things extreme poisonous. One of the most interesting ideas is to modify the immune system of a human to make the killing viruses.

And in that case, the idea is to modify the human genomes in that way, that those viruses would not cause symptoms in the person, who is immune to those organisms. But the most interesting thing is to modify the blood cells like the creation of the viruses begin after death, and that would cause very bad destruction if the field of the enemy.  That kind of things might deny killing or torturing the imprisoned soldiers. Because if the killing organism would be released in the area, would that cause death for many men.

Modifying the genomes of the military personnel would be a very attractive thing. By using retroviruses would be possible to make the military men, who are resistant for the nerve gases and many diseases, like filoviruses and harmful bacteria. This opens the new lines to use biological weapons, what might be camouflaged as the natural epidemics, or even the famine, what seems like a natural. The horrifying vision to cause the famine by using biological weapons would happen by creating the virus, what destroys bacteria layer in the stomach, what denies the infected person to take nutrients from the food, and even if they would get enough food, they would die in hunger.

Those modifications might be visible and cause discussion about the ethics of the military personnel, but when we are going a little bit farther we must realize, that if we would have very advanced biotechnology in use, we might whip off those genetic modifications after the operation by using genome therapy. And if we would have high-tech laboratories in use, we might modify the genomes as the way we want. And this makes possible to change identities of the personnel, that even themselves is impossible to prove, that they have been in some military action.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that