recommended reading

This Stem-Cell Cloning Breakthrough Is Going to Revive the Same Old Debate

Spectral-Design/Shutterstock.com

Researchers in Oregon claim to have solved the tricky problem of cloning human stem cells, but you're more likely to see a duplicate of a years-old ethics debate than you are a duplicate human. 

The breakthrough is one that's been long sought after by biologists: creating perfectly matched human tissues through the process of cell cloning. In the past, researchers have had success with cloning animals through a technique known as somatic-cell nuclear transfer (SCNT), where the nucleus of an unfertilized egg is replaced with the DNA of a donor cell. (That's how Dolly the sheep was born.) The egg can then be turned into an embryo, with DNA that matches the original donor exactly. Later, stem cells from that developing embryo could be harvested and, in theory, be cultured to become almost any type of human cell there is. That would open a huge array of new medical treatments, from curing diabetes to fixing spinal cord injuries to providing rejection-proof organ transplants.

In the last decade or so, doctors had mostly turned away from SCNT as a means of producing "patient-specific" embryonic stem cells. They did so for a variety of reasons, but the biggest was that it didn't really work on humans. Researchers in South Korea claimed to have done just that in 2004, but their finding turned out to be a fake. Other attempts created imperfect results or were too expensive or inefficient. As a result, scientists have focused on other methods of attempting to create patient-specific stem cells. The focus now is on "reprogramming" adult cells so they become stem cells again, which has had limited success. (The new cells are called pluripotent cells, or iPS cells.) As one surprised researcher put it, "the most surprising thing [about this paper] is that somebody is still doing human [SCNT] in the era of iPS cells."

Read more at The Atlantic Wire

(Image via Spectral-Design/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.