1. Structure of DNA and the landscape of DNA Deep Hacking (DDH)

2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack

3. Code injection and the E. Coli story as the carrier of malware DNA code

4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly

5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code

6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story

7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR)

8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack

9. The Drone technology, Transport strategy and risk evaluation

10. Drone delivery methods, how to communicate with the destination

11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results.

12. Translation and storage of the DNA contaminated code

13. Encryption technology and camouflaging contaminated DNA-code injection

14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files

15. Reverse Engineering technology

16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases

Appendix

Epilogue