GLOBAL NETWORKS AND THE DARK WEB AS A PLATFORM FOR THE DISSEMINATION OF BIOTERRORIST CAPACITY: FROM CYBERCRIME TO BIORISK AND NATIONAL SECURITY
Keywords:
Cyberbiosecurity; Dark Web; global networks; biorisk; bioterrorist capability; dual-use; genetic data; data breach; ransomware; national security.Abstract
The digitalization of biology—genomic databases, automated laboratory
workflows, cloud services, and AI-enabled bioinformatics—reshapes biological security by making
it directly dependent on cyber resilience. This study examines how global digital networks and Dark
Web infrastructures can accelerate the dissemination of “bioterrorist capability” in a broad sense:
not only through potential access to hazardous materials, but through an enabling ecosystem for
dual-use knowledge, grey/illicit markets for health products, misuse of sensitive biomedical data,
and cybercriminal services that can translate into real-world biorisk. The research applies a
qualitative design combining a review of cyberbiosecurity and dual-use governance frameworks
(WHO, 2022; United States Government, 2024), analysis of publicly available institutional reports
on health-sector cyber threats and organised crime (ENISA, 2023; Europol, 2025a; Europol,
2025b), and a case study of a regulator-documented genetic data breach (ICO, 2025).
Findings highlight three converging risk pathways: (1) anonymous ecosystems can amplify
distribution channels for counterfeit or unregulated health products (Europol, 2025a); (2) genetic
and health data breaches show how biologically meaningful information becomes a tradable asset
enabling extortion, fraud, and erosion of trust (ICO, 2025); and (3) ransomware and related
incidents in healthcare can disrupt critical services and endanger patient safety, thereby manifesting
as biorisk without a biological agent (ENISA, 2023). The discussion frames these dynamics as
hybrid threats, where state and non-state actors combine cyber means, criminal networks, and
information influence below the threshold of formal warfare (NATO, n.d.; Council of the European
Union, n.d.; Europol, 2025b). The study concludes that national security should treat
cyberbiosecurity as an integrated resilience function—strengthening data protection, securing
supply chains and health/lab systems, implementing early warning, and governing dual-use in line
with non-proliferation obligations (United Nations, 2004
References
1. Council of the European Union. (n.d.). Hybrid threats (policy page).
2. ENISA. (2023). ENISA Threat Landscape: Health Sector (report).
3. Europol. (2025a). The threat of pharmaceutical crime in the EU and beyond (report).
4. Europol. (2025b). EU Serious and Organised Crime Threat Assessment 2025: The
changing DNA of serious and organised crime (EU-SOCTA 2025) (report).
5. Information Commissioner’s Office (ICO). (2025). 23andMe – Penalty notice (regulatory
document).
6. NATO. (n.d.). Countering hybrid threats (topic page).
7. United Nations. (2004). Security Council Resolution 1540 (2004) (S/RES/1540).
8. United Nations Office for Disarmament Affairs (UNODA). (n.d.). UN Security Council
Resolution 1540 (overview page).
9. United States Government. (2024). United States Government Policy for Oversight of
Dual Use Research of Concern and Pathogens with Enhanced Pandemic Potential (policy
document).
10. World Health Organization (WHO). (2022). Global guidance framework for the
responsible use of the life sciences: Mitigating biorisks and governing dual-use research
(framework).
Published
Issue
Section
License
Copyright (c) 2026 New knowledge Journal of science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.