Week 1 HW: Principles and Practices

1.Idea : I aim to develop a selective bio-engineered (maybe?) microbial or enzymatic substance capable of removing fossil-bearing matrix materials such as carbonates, clays, and iron oxides without damaging fossilized biological tissues including enamel, dentine, bone, and ganoine. cover image cover image

2.1 - Biosafety - Prevention of Damage to Fossil Material

Because fossils are finite and often irreplaceable scientific objects, it is essential to minimize the risk of unintended chemical or structural alteration. The technology should be validated on modern analogues, synthetic replicas, or non-diagnostic material before being applied to rare or type specimens.

Policy goal: Establish standardized testing and validation protocols prior to use on scientifically or culturally significant fossils.

2.2 - Prioritizing Conservation Over Exploitation

The use of this technology should be strictly oriented toward scientific research, conservation, and education. It should not be applied in ways that encourage destructive commercial practices, such as the preparation of fossils for the illegal or private fossil trade.

To protect fossils as shared scientific and cultural heritage, access to this technology should be limited to recognized and accountable institutions, including museums, universities, and certified research laboratories.

Policy goal: Restrict the deployment and use of the technology to accredited institutions with clear conservation mandates, ensuring that its application supports knowledge generation and public benefit rather than private exploitation.

Governance Actions for Ethical Deployment

Governance Action 1: Mandatory Documentation and Provenance Tracking

Purpose
Currently, fossil preparation methods and interventions are often poorly documented, making it difficult to assess whether specimens were ethically prepared or altered. I propose requiring mandatory documentation and provenance tracking for any fossil processed using bio-engineered preparation systems.

Design
Researchers and technicians would be required to log preparation protocols, biological agents used, and treatment outcomes in a standardized digital record associated with each specimen. Museums, repositories, and academic journals would require this documentation for accession, publication, or exhibition. This system would be implemented by institutions and reinforced through publication standards and collection management policies.

Assumptions
This action assumes that transparency deters misuse and that institutions and researchers are willing to adopt additional documentation practices. It also assumes that standardized records can be maintained over long timescales and across institutions.

Risks of Failure and “Success”
The system could fail if documentation becomes a box-checking exercise rather than a meaningful safeguard. If highly successful, detailed records could inadvertently reveal sensitive information about fossil locations or preparation techniques, which could be exploited by illegal collectors or commercial actors.


Governance Action 2: Technical Safeguards Through Built-in Biological Constraints

Purpose
Most fossil preparation tools rely on user restraint rather than intrinsic safeguards. I propose embedding technical and biological constraints directly into the design of microbial or enzymatic systems to limit misuse and environmental release.

Design
This would include the use of cell-free enzymatic systems, engineered metabolic dependencies, or programmed degradation after a defined period. Developers and academic researchers would be responsible for implementing these safeguards at the design stage, while funding agencies and biosafety committees would require them as a condition of support and approval.

Assumptions
This approach assumes that technical constraints are harder to bypass than policy rules and that developers can reliably predict how systems behave outside controlled environments. It also assumes that such constraints will not significantly reduce the effectiveness of the technology.

Risks of Failure and “Success”
Technical safeguards may fail if users modify or reverse-engineer the system, or if biological behavior differs from laboratory expectations. If successful, these safeguards could create a false sense of security, leading to reduced ethical vigilance or oversight under the assumption that the technology is inherently safe.


Governance Action 3: Education and Ethical Training Requirements

Purpose
There is currently limited formal training linking biosafety, ethics, and fossil conservation. I propose integrating mandatory ethics and biosafety training for anyone authorized to use bio-engineered fossil preparation technologies.

Design
Training modules would be developed and delivered by academic institutions and professional societies, with certification required for access to the technology. Museums, universities, and laboratories would be responsible for enforcing compliance, while funding agencies could incentivize participation through grant requirements.

Assumptions
This action assumes that education meaningfully influences behavior and that users are receptive to ethical guidance. It also assumes that standardized training can address diverse cultural, legal, and institutional contexts.

Risks of Failure and “Success”
Training may fail if it is treated as a formal requirement rather than an ethical commitment. If successful, it could unintentionally create gatekeeping structures that exclude skilled practitioners without institutional affiliation or access to formal certification pathways.

Does the option:Option 1Option 2Option 3
Enhance Biosecurity123
• By preventing incidents123
• By helping respond213
Foster Lab Safety123
• By preventing incident123
• By helping respond213
Protect the environment123
• By preventing incidents123
• By helping respond213
Other considerations
• Minimizing costs and burdens to stakeholders213
• Feasibility?123
• Not impede research213
• Promote constructive applications213

5. Prioritized Governance Approach and Rationale

Drawing on the comparative scoring of the remaining governance options, I would prioritize a combined approach centered on institutional access controls together with mandatory documentation, provenance tracking, and ethical training, rather than relying on any single mechanism alone.

Restricting access to recognized institutions such as museums, universities, and certified laboratories is the most effective way to prevent misuse at an early stage. This approach performs strongly in enhancing biosecurity, laboratory safety, and environmental protection by limiting the deployment of the technology to settings with existing oversight, conservation mandates, and accountability structures. By acting upstream, access controls reduce the likelihood of harmful or exploitative applications before they occur.

At the same time, access restrictions alone are insufficient. Documentation requirements and provenance tracking significantly strengthen transparency and responsibility throughout the lifecycle of fossil preparation. These measures improve the ability to detect misuse, respond to incidents, and ensure that scientific interventions are traceable and reproducible. Ethical training further supports responsible use by reinforcing norms of conservation, biosafety, and respect for cultural heritage, without substantially impeding legitimate research.

In contrast, approaches that rely primarily on indirect safeguards or user behavior, such as voluntary compliance or technical constraints alone, are less robust. While these measures can play a supporting role, they do not provide adequate protection when dealing with irreplaceable scientific and cultural materials.

Trade-offs, Assumptions, and Uncertainties

The main trade-off in prioritizing access controls and documentation is the balance between risk reduction and inclusivity. Restrictive access may disadvantage smaller or under-resourced institutions, particularly in regions with significant fossil heritage but limited infrastructure. This approach assumes that institutional accreditation correlates with ethical practice and that documentation requirements will be meaningfully enforced rather than treated as administrative formalities.

There is also uncertainty regarding international implementation, as legal frameworks, enforcement capacity, and cultural norms differ across countries. Additionally, increased transparency introduces risks related to data governance, such as the unintended exposure of sensitive locality or preparation information if records are not carefully managed.

Intended Audience

This recommendation is primarily directed toward academic institutions, museums, and research funding agencies, including university leadership and national science foundations. These actors are well positioned to implement access controls, enforce documentation standards, and align funding incentives with ethical fossil conservation. Coordinated action at the institutional and funding levels offers a practical pathway to balancing innovation in biological engineering with long-term stewardship of paleontological heritage.

Questions from professor Jacobson:

1. Polymerase error rate and genome size

DNA polymerase has an error rate of about 1 error per 10⁶ bases when proofreading is included :contentReference[oaicite:0]{index=0}.
The human genome is approximately 3.2 × 10⁹ base pairs, which would result in thousands of replication errors if this were the only control mechanism. Biology resolves this discrepancy through polymerase proofreading (3′→5′ exonuclease activity) and post-replication mismatch repair systems (e.g. MutS/MutL), reducing the effective mutation rate to around 10⁻⁹–10⁻¹⁰ per base per cell division.


2. Number of DNA codes for a human protein and why most don’t work

Because the genetic code is degenerate, an average human protein (~1036 bp, ~345 amino acids) can theoretically be encoded by an astronomically large number of different DNA sequences (on the order of ~3³⁴⁵ possible codon combinations) :contentReference[oaicite:1]{index=1}.
In practice, most of these sequences do not function properly due to codon usage bias, mRNA secondary structure formation, extreme GC content, and the accidental introduction of regulatory or cleavage signals, all of which can strongly impair transcription, translation efficiency, or correct protein folding.

Questions from Dr. LeProust:

1. Most commonly used method for oligo synthesis

The most commonly used method for oligonucleotide synthesis today is chemical phosphoramidite DNA synthesis. This is a stepwise, solid-phase chemical process using protected nucleotides, typically with acid- or light-based deprotection cycles, and is the standard approach used by commercial DNA synthesis machines :contentReference[oaicite:0]{index=0}.


2. Why it is difficult to make oligos longer than ~200 nt by direct synthesis

Direct chemical oligo synthesis is limited to ~200 nucleotides because errors accumulate at each base-addition step. Each synthesis cycle has a small but non-zero failure rate (incomplete coupling, deletions, or substitutions). As oligo length increases, the probability of producing a completely correct sequence drops exponentially, resulting in very low yields of full-length, error-free molecules :contentReference[oaicite:1]{index=1}.


3. Why a 2000 bp gene cannot be made by direct oligo synthesis

A 2000 bp gene cannot be made by direct oligo synthesis because the cumulative error rate of chemical synthesis becomes overwhelming at that length, making the probability of obtaining a correct full-length sequence effectively zero. Instead, long genes are produced by assembling many shorter oligos (typically ≤200 nt) using enzymatic methods such as polymerase extension and Gibson assembly, which incorporate biological error correction :contentReference[oaicite:2]{index=2}.

Questions from George Church:

Ai prompt used : Please answer this question (Question 1) using markdown! in english, and cite me your sources so i myself can try and fact check your answer

Essential amino acids and the “Lysine Contingency”

The 10 essential amino acids in all animals are:

  • Histidine
  • Isoleucine
  • Leucine
  • Lysine
  • Methionine
  • Phenylalanine
  • Threonine
  • Tryptophan
  • Valine
  • Arginine (essential in all animals; conditionally essential in adult humans)

Animals cannot synthesize these amino acids de novo and must obtain them from their diet or from symbiotic organisms.


Implications for the “Lysine Contingency”

The fact that lysine is universally essential supports the idea of a strong evolutionary contingency: once early life lost (or never evolved) a robust lysine biosynthesis pathway in the animal lineage, all subsequent animal evolution became permanently dependent on external lysine sources. This locked-in dependency constrains metabolic evolution and shows that core features of biology are not necessarily optimal, but rather historically frozen choices.

In this view, the “Lysine Contingency” illustrates how early biochemical decisions can shape—and limit—entire branches of life indefinitely.