Sunday, October 23, 2016

Gene Editing and Seed Stealing

Four hundred years ago, John Rolfe used tobacco seeds pilfered from the West Indies to develop Virginia’s first profitable export, undermining the tobacco trade of Spain’s Caribbean colonies. More than 200 years later, another Briton, Henry Wickham, took seeds for a rubber-bearing tree from Brazil to Asia – via that great colonialist institution, London’s Royal Botanic Gardens – thereby setting the stage for the eventual demise of the Amazonian rubber boom.

At a time of unregulated plant exports, all it took was a suitcase full of seeds to damage livelihoods and even entire economies. Thanks to advances in genetics, it may soon take even less.

To be sure, over the last few decades, great strides have been made in regulating the deliberate movement of the genetic material of animals, plants, and other living things across borders. The 1992 United Nations Convention on Biological Diversity, in particular, has helped to safeguard the rights of providers of genetic resources – such as (ideally) the farmers and indigenous people who have protected and nurtured valuable genes – by enshrining national sovereignty over biodiversity.

While some people surely manage to evade regulations, laboriously developed legal systems ensure that it is far from easy. The majority of international exchanges of seeds, plants, animals, microbes, and other biological goods are accompanied by the requisite permits, including a material transfer agreement.

But what if one did not have to send any material at all? What if all it took to usurp the desired seeds was a simple email? What if, with only gene sequences, scientists could “animate” the appropriate genetic material? Such Internet-facilitated exchanges of biodiversity would clearly be much harder to regulate. And, with gene sequencing becoming faster and cheaper than ever, and gene-editing technology advancing rapidly, such exchanges may be possible sooner than you think.

In fact, genes, even entire organisms, can already move virtually – squishy and biological at each end, but nothing more than a series of ones and zeros while en route. The tiny virus that causes influenza is a leading-edge example of technical developments.

Today, when a new strain of influenza appears in Asia, scientists collect a throat swab, isolate the virus, and run the strain’s genetic sequence. If they then post that strain’s sequence on the Internet, American and European laboratories may be able to synthesize the new virus from the downloaded data faster and more easily than if they wait for a courier to deliver a physical sample. The virus can spread faster electronically than it does in nature. (...)

Managing access to large genomic databases thus becomes critically important to prevent a virtual version of the theft carried out by Rolfe and Wickham. And, indeed, in an unguarded e-mail released under the US Freedom of Information Act, one of the US Department of Agriculture’s top maize scientists, Edward Buckler, called such management “the big issue of our time” for plant breeding.

If agricultural biotechnology corporations like Monsanto and DuPont Pioneer – not to mention other firms that work with genetic resources, including pharmaceutical companies and synthetic biology startups – have free access to such databases, the providers of the desired genes are very likely to lose out. These are, after all, wholly capitalist enterprises, with little financial incentive to look out for the little guy.

In this case, that “little guy” could be African sorghum growers, traditional medicinal practitioners, forest peoples, or other traditional communities – people who have created and nurtured biodiversity, but never had the hubris or greed to claim the genes as proprietary, patented inventions. All it would take is for someone to sequence their creations, and share the data in open databases.

Yet open access is the mode du jour in sharing research data. The US government’s GenBank, for example, doesn’t even have an agreement banning misappropriation. This must change. After all, such no-strings-attached databases do not just facilitate sharing; they enable stealing.

by Chee Yoke Ling and Edward Hammond, Project Syndicate | Read more:
Image: Christopher Furlong/Getty