NPR10.3: a Complementary Approach to Bioterrorism Prevention

Total Page:16

File Type:pdf, Size:1020Kb

NPR10.3: a Complementary Approach to Bioterrorism Prevention A Complementary Approach to Bioterrorism Prevention MICHAEL MAIR AND JULIE SAMIA MAIR Michael Mair, MPH, is a senior research assistant at the Center for Civilian Biodefense Strategies, Johns Hopkins Bloomberg School of Public Health. Julie Samia Mair, JD, MPH, is an assistant scientist in the Department of Health Policy and Management at Johns Hopkins Bloomberg School of Public Health and a core faculty member of the Center for Law and the Public’s Health at Johns Hopkins and Georgetown Universities.1 ioterrorism is a particularly horrific crime, and of committing the crime, reduce the anticipated rewards the premeditation and deliberation required to expected from the crime’s commission, and remove the Bmount a successful attack make bioterrorists a excuses that justify the crime. special breed of criminal. As such, criminology theory While the rational choice perspective is usually can help to inform and shape bioterrorism prevention applied to very specific crimes (for example, bus driver efforts. Successful crime prevention strategies include robberies in a particular city, automobile thefts in a cer- those that view criminals as opportunists who search for tain parking lot, violence in a specific prison setting), the and exploit opportunities to commit crime. One “oppor- general theory that a criminal engages in a cost-benefit tunity theory,” the rational choice perspective, argues that analysis prior to committing a crime can be applied more a criminally motivated person engages in a cost-benefit broadly. 3 Terrorists associated with the September 11th analysis before committing a particular crime.2 This cost- attacks, for example, engaged in significant planning.4 benefit analysis is driven by four key considerations: They allegedly considered alternative targets and meth- 1. Perceived effort ods of attack and weighed such factors as the feasibility 2. Perceived risk of completing the attacks and the potential harm that they 3. Anticipated rewards could cause.5 4. Excuses or rationalizations. The idea that terrorists are rational actors is not If—upon consideration of these four rational choice new to national security policy. Indeed, the Bush categories—the benefits appear to outweigh the costs, the administration’s National Strategy for Homeland Secu- theory argues that the potential offender will be more likely rity recognizes that “[t]errorists are opportunistic,”— to commit the crime. The theory also suggests that by deliberately choosing targets based on perceived vulner- 6 manipulating this cost-benefit analysis, interventions can abilities. This article recommends viewing potential be designed to prevent a crime’s commission—specifically, bioterrorists as rational actors and analyzing their interventions that increase the perceived effort and risk decisionmaking processes in order to foster a deeper The Nonproliferation Review/Fall-Winter 2003 1 MICHAEL MAIR & JULIE SAMIA MAIR understanding of current bioterrorism prevention measures, not require large-scale agent production, would not be identify gaps in current measures, and identify new and constrained by long-term storage requirements, and would complementary measures. pursue low-tech (i.e., non-military) delivery systems.13 However, there is also tremendous concern that state BIOTERRORISTS AS RATIONAL ACTORS actors could supply biological weapons to non-state actors either conspiratorially or unwittingly through theft.14 For the foreseeable future, biological weapons represent one of the greatest threats to U.S. national security.7 How- COUNTERPROLIFERATION—REDUCING ever, no terrorist group or state potentially hostile to the United States is known to possess the weapons systems OPPORTUNITIES necessary to mount a significant, military-style biological Every step along a given proliferation pathway provides attack directly against the United States.8 Even if a group opportunities to prevent proliferation, although it is not or state actor had the capability, an overt attack is necessary to intervene at every step. Instead, the objec- unlikely given the overwhelming response such an attack tive is to determine where along the pathway a combina- would elicit. It is far more plausible that a biological tion of “opportunity-reducing”15 counterproliferation attack against the United States will be carried out through measures can be reasonably applied with the greatest like- bioterrorism—defined here as “a covert biological weap- lihood of affecting the potential bioterrorists’ cost-benefit ons attack by a state or non-state actor” for which attri- analysis such that producing or acquiring biological bution and retribution are extremely difficult.9 Thus, as weapons is no longer attractive. No single step must be defined, bioterrorism refers to a particular method of con- completely blocked for the strategy to be effective. For ducting a biological attack, and not to the type of attacker example, it is not necessary to attempt to block access to or the goals of the attack as do some other definitions.10 all potential biological weapon agents if the information, Acquiring or producing a biological weapon is a com- equipment, or materials necessary to turn those agents plex undertaking that requires a rational, deliberate, and into weapons cannot be acquired. The combination of systematic approach.11 For example, as shown in Figure measures should seek to: 1, the Office of Technology Assessment (OTA) developed 1. Make it more difficult to produce biological a proliferation pathway for state actors seeking a military weapons (increase perceived effort) biological weapons capability.12 According to this assess- 2. Make it more likely that potential bioterrorists will be ment, proliferation has five major phases, each with mul- discovered (increase perceived risk) tiple elements: 3. Make it less likely that the desired results will be • Research and development achieved (reduce anticipated rewards) • Agent production 4. Make it more difficult for potential bioterrorists to • Munitions design, testing, and building justify their actions (remove excuses). • Delivery system acquisition Every counterproliferation measure implemented • Operational capability acquisition. raises the hurdle that must be cleared in order to produce The specific proliferation pathway undertaken biological weapons. And every time the hurdle is raised, depends, in part, on the type of bioterrorist: state actor, there are fewer potential bioterrorists who can clear the terrorist organization, lone actor, or some combination hurdle—thus reducing the bioterrorism threat. thereof. Proliferation by state actors raises special concerns because they are more likely than non-state actors to have Analysis of Current Counterproliferation access to the resources—knowledge base, technical skills, Measures financial assets, infrastructure—necessary to engage in the One way to understand current counterproliferation mea- production of both biological agents and the weapons sures is to plot them on a proliferation pathway to deter- systems to deliver them. While there would be certain mine where and how they intervene to inhibit proliferation. similarities, the proliferation pathway that non-state actors Each measure can then be analyzed to determine how it might pursue would depend on the non-state actor’s goals most affects the four rational choice categories that drive and likely more limited abilities and resources. For the potential bioterrorist’s cost-benefit analysis. While example, in comparison to state actors pursuing a military some measures may significantly affect only one category, biological weapons capability, non-state actors likely would 2 The Nonproliferation Review/Fall-Winter 2003 A COMPLEMENTARY APPROACH TO BIOTERRORISM PREVENTION FIGURE 1 OTA BIOLOGICAL WEAPONS PROLIFERATION PATHWAY I. Conduct Research & Development II. Produce Agent Obtain Test Develop Mass Induce Store microbial seed suitability and produce spore Micro- agent stock for for pilot-test and formation encapsulate under standard or weapon production harvest or freeze- agent refriger- novel agent purposes process agent dry ation Manipulate genetic characteristics (optional) III. Design, Test, and Build Munitions Area delivery: sprayer system Field-test Mass Fill OR produce munitions Point delivery: Stockpile cluster bomb or filled warhead munitions IV. Acquire Delivery System Integrate Adapt aircraft, munitions with artillery, missiles, etc. delivery system as necessary OR Establish logistical support network V. Acquire Operational Capability Acquire individual and collective BW defenses, Integrate including vaccines weapon systems into Develop strategic military forces and tactical BW battle plans Train troops to use OPERATIONAL BW munitions and CAPACITY operate in BW environment Source: U.S. Congress, Office of Technology Assessment, Technologies Underlying Weapons of Mass Destruction, OTA-BP-ISC-115 (Washington, DC: U.S. Government Priting Office, December 1993) p. 83. The Nonproliferation Review/Fall-Winter 2003 3 MICHAEL MAIR & JULIE SAMIA MAIR others may affect several of the categories simultaneously. on foreign students increases the perceived risk of devel- Therefore, the categories are more effectively conceptu- oping a bio-weapons R&D program by making it more alized as areas of influence that may overlap. likely that students who attempt to exploit loopholes in In this analysis, it is the perspective of the potential the U.S. foreign student visa system in order to acquire bioterrorist that is important,
Recommended publications
  • Hidden Cargo: a Cautionary Tale About Agroterrorism and the Safety of Imported Produce
    HIDDEN CARGO: A CAUTIONARY TALE ABOUT AGROTERRORISM AND THE SAFETY OF IMPORTED PRODUCE 1. INTRODUCTION The attacks on the World Trade Center and the Pentagon on Septem­ ber 11, 2001 ("9/11") demonstrated to the United States ("U.S.") Gov­ ernment the U.S. is vulnerable to a wide range of potential terrorist at­ tacks. l The anthrax attacks that occurred immediately following the 9/11 attacks further demonstrated the vulnerability of the U.S. to biological attacks. 2 The U.S. Government was forced to accept its citizens were vulnerable to attacks within its own borders and the concern of almost every branch of government turned its focus toward reducing this vulner­ ability.3 Of the potential attacks that could occur, we should be the most concerned with biological attacks on our food supply. These attacks are relatively easy to initiate and can cause serious political and economic devastation within the victim nation. 4 Generally, acts of deliberate contamination of food with biological agents in a terrorist act are defined as "bioterrorism."5 The World Health Organization ("WHO") uses the term "food terrorism" which it defines as "an act or threat of deliberate contamination of food for human con- I Rona Hirschberg, John La Montagne & Anthony Fauci, Biomedical Research - An Integral Component of National Security, NEW ENGLAND JOURNAL OF MEDICINE (May 20,2004), at 2119, available at http://contenLnejrn.org/cgi/reprint/350/2112ll9.pdf (dis­ cussing the vulnerability of the U.S. to biological, chemical, nuclear, and radiological terrorist attacks). 2 Id.; Anthony Fauci, Biodefence on the Research Agenda, NATURE, Feb.
    [Show full text]
  • Maximum Containment: the Most Controversial Labs in the World
    Maximum Containment: The Most Controversial Labs in the World By Alison K. Bruzek B.A. Biological Sciences Northwestern University, 2010 SUBMITTED TO THE PROGRAM IN COMPARATIVE MEDIA STUDIES/WRITING IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN SCIENCE WRITING AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY MASSACHUSETTS IN'T-QUTE OF 7ECHNOLOqi September 2013 JUL 0 22013 @2013 Alison K. Bruzek. All rights reserved. Li__RARI ES The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: -----.. Program in Con rativeMedia Studies/Writing June 10, 2013 Certified by: Philip Hilts Director, Knight Science Journalism Fellowships Thesis Supervisor Accepted by: Seth Mnookin Assistant Professor of Science Writing Director, Graduate Program in Science Writing 1 2 Maximum Containment: The Most Controversial Labs in the World By Alison K. Bruzek Submitted to the Program in Comparative Media Studies/Writing on June 10, 2013 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Science Writing ABSTRACT In 2002, following the September 1 1 th attacks and the anthrax letters, the United States allocated money to build two maximum containment biology labs. Called Biosafety Level 4 (BSL-4) facilities, these labs were built to research new vaccines, diagnostics, and treatments for emerging infectious diseases, potential biological weapons, and to contribute to the nation's biodefense. These labs were not the first dramatic reaction to the threat of biowarfare and are in fact, one product of a long history of the country's contentious relationship with biological weapons.
    [Show full text]
  • The Future of Sea Mines in the Indo-Pacific
    Issue 18, 2020 BREACHING THE SURFACE: THE FUTURE OF SEA MINES IN THE INDO-PACIFIC Alia Huberman, The Australian National Internships Program Issue 18, 2020 EXECUTIVE SUMMARY This report argues that several dynamics of the coming few decades in the Indo-Pacific will see naval mines used once again in the region. It suggests they will form the basis of anti-access strategies for some Indo-Pacific states in a way that will be deeply transformative for the region’s strategic balance and for which Australia is thoroughly unprepared. It seeks to draw attention to the often- underappreciated nature of sea mines as a uniquely powerful strategic tool, offering the user an unparalleled asymmetric ability to engage high-value enemy targets while posing a minimal-risk, low- expense, and continuous threat. In the increasingly contested strategic environment of the contemporary Indo-Pacific - a region in which the threats to free navigation and the maritime economy are existential ones - there is considerable appetite for anti-access and sea denial weapons as defensive, offensive, and coercive tools. Naval strategists must,, prepare for the resurgence of mine warfare in the Indo-Pacific, and for the grand-scale and rapid timeline in which it can transform an operational environment. This report first seeks to collate and outline those characteristics of sea mines and of their interaction with an operational environment that make them attractive for use. It then discusses the states most likely to employ mine warfare and the different scenarios in which they might do so, presenting five individual contingencies: China, Taiwan, North Korea, non-state actors, and Southeast Asian states.
    [Show full text]
  • 2019 Biodefense Public Report Implementation of the National Biodefense Strategy PREFACE
    2019 Biodefense Public Report Implementation of the National Biodefense Strategy PREFACE The National Biodefense Strategy (NBS or the Strategy) was released on September 18, 2018 and guides the U.S. government’s efforts to reduce the risk of, prepare for, respond to, and recover from biological incidents, whether naturally occurring, deliberate, or accidental in origin. National Security Presidential Memorandum-14 (NSPM-14) directs implementation of the Strategy, including the development of this Biodefense Public Report. This report does not primarily address activities related to the coronavirus disease 2019 (COVID-19) pandemic because the data collection period concluded well before the HHS Secretary’s declaration of a public health emergency regarding the COVID-19 pandemic. Therefore, the content of this report is diverse and highlights some of the efforts across the U.S. government to address all biological threats. Development of this report followed the timeline laid out in NSPM-14. Work began among federal departments and agencies to collect biodefense data in late 2018, the first year to capture biodefense programs and activities across the federal government, and continued through the first half of 2019. This report describes a sampling of specific achievements and programs undertaken by federal agencies that reduce the risk of biological threats to the American people. In addition to the specific programs captured here, many other activities continue to be implemented across the federal government to protect the United States from a wide range of biological threats. Some of the efforts that have been described within this report, and many activities that have not been reported here, support the ongoing COVID-19 response.
    [Show full text]
  • Bioterrorism & Biodefense
    Hugh-Jones et al. J Bioterr Biodef 2011, S3 Bioterrorism & Biodefense http://dx.doi.org/10.4172/2157-2526.S3-001 Review Article Open Access The 2001 Attack Anthrax: Key Observations Martin E Hugh-Jones1*, Barbara Hatch Rosenberg2 and Stuart Jacobsen3 1Professor Emeritus, Louisiana State University; Anthrax Moderator, ProMED-mail, USA 2Sloan-Kettering Institute for Cancer Research and State Univ. of NY-Purchase (retired); Scientists Working Group on CBW, Center for Arms Control and Non-Proliferation, USA 3Technical Consultant Silicon Materials, Dallas, TX,USA Abstract Unresolved scientificquestions, remaining ten years after the anthrax attacks, three years after the FBI accused a dead man of perpetrating the 2001 anthrax attacks singlehandedly, and more than a year since they closed the case without further investigation, indictment or trial, are perpetuating serious concerns that the FBI may have accused the wrong person of carrying out the anthrax attacks. The FBI has not produced concrete evidence on key questions: • Where and how were the anthrax spores in the attack letters prepared? There is no material evidence of where the attack anthrax was made, and no direct evidence that any specific individual made the anthrax, or mailed it. On the basis of a number` of assumptions, the FBI has not scrutinized the most likely laboratories. • How and why did the spore powders acquire the high levels of silicon and tin found in them? The FBI has repeatedly insisted that the powders in the letters contained no additives, but they also claim that they have not been able to reproduce the high silicon content in the powders, and there has been little public mention of the extraordinary presence of tin.
    [Show full text]
  • Chlorine: the Achilles Heel?
    Chlorine: the Achilles Heel? John McNabb Cohasset Water Commissioner Cohasset, Massachusetts Water Security Congress Washington DC, April 8-10, 2008 1 Cohasset Water Dept. • I have been an elected Water Commissioner in Cohasset, Mass. Since 1997. Just reelected to 5th term. • We serve about 7,000 residents, 2,500 accounts, 400 hydrants, 750 valves, 2 tanks, 1 wellfield, 2 reservoirs. Lily Pond Water Treatment Plant uses conventional filtration, fluoridation, and chlorination. • I am not an “expert” on water infrastructure security; this is more an essay than a formal analysis. • From 1999-Jan. 2009 I worked for Clean Water Action. • Now I work in IT security, where responsible disclosure of potential threats, not ‘security by obscurity” is the preferred method. 2 Cohasset – security measures • Vulnerability assessment as required • Fences & gates • Locks • Alarms, especially on storage tanks • Motion detectors • Video surveillance • Isolate SCADA from the internet • We think we’ve done everything that is reasonably necessary. 3 Water system interdependencies • But, the protection of our water system depends also on may factors outside of our control • The treatment chemicals we use is a critical factor. 4 Chlorine - Positives • Chlorination of drinking water is one of the top 5 engineering accomplishments of the modern age. • Chlorination of the US drinking water supply wiped out typhoid and cholera, and reduced the overall mortality rate in the US. 5 Chlorine - Negatives • Chlorine is very toxic, used as weapon in WWI. • Disinfection Byproducts (DPBs) • Occupational exposure on the job • Chlorine explosions on site at the plant • Terrorist use of chlorine as an explosive • Vector of attack? 6 Chlorine Explosions & Accidents • The Chlorine Institute estimates a chlorine tanker terrorist attack could release a toxic cloud up to 15 miles.
    [Show full text]
  • “Defending the Homeland from Bioterrorism: Are We Prepared?”
    2223 West Loop South Umair A. Shah, M.D., M.P.H. Houston, Texas 77027 Executive Director Tel: (713) 439-6000 Fax: (713) 439-6080 “Defending the Homeland from Bioterrorism: Are We Prepared?” Testimony of Umair A. Shah, MD, MPH Executive Director, Harris County Public Health, TX Past-President, National Association of County and City Health Officials Before the House Homeland Security Committee Subcommittee on Emergency Preparedness, Response, & Recovery October 17, 2019 I would like to thank Chairman Thompson, Ranking Member Rogers, Subcommittee Chairman Payne, Ranking Member King, and members of the committee for the opportunity to testify today on behalf of local health departments and public health emergency responders across the country. My name is Dr. Umair Shah, and I am the Executive Director for Harris County Public Health (HCPH) and the Local Health Authority for Harris County, Texas. Harris County is the third most populous county in the United States with 4.7 million people and is home to the nation’s 4th largest city, Houston. I am a Past President and former Board Member of NACCHO, the National Association of County and City Health Officials. NACCHO is the voice of the nearly 3,000 local health departments (LHDs) across the country. I am also a Past President and current Board Member of TACCHO, the Texas Association of City and County Health Officials, which represents approximately 45 LHDs across Texas. As background, Harris County is the most culturally diverse and one of the fastest growing metropolitan areas in the U.S. and home to the world’s largest medical complex, the Texas Medical Center, one of the nation’s busiest ports, the Port of Houston, and two of the nation’s busiest international airports.
    [Show full text]
  • 1 Hearing of the Subcommittee on Emergency Preparedness
    Hearing of the Subcommittee on Emergency Preparedness, Response and Recovery, Committee on Homeland Security, U.S. House of Representatives “Defending the Homeland from Bioterrorism: Are We Prepared?” October 17, 2019 Statement for the Record Asha M. George, DrPH Executive Director, Bipartisan Commission on Biodefense Chairman Payne, Ranking Member King, and Members of the Subcommittee: Thank you for your invitation to provide the perspective of the Bipartisan Commission on Biodefense. On behalf of our Commission – and as a former Subcommittee Staff Director and senior professional staff for this Committee – I am glad to have the opportunity today to discuss our findings and recommendations with respect to biological terrorism and national defense against biological threats. Our Commission assembled in 2014 to examine the biological threat to the United States and to develop recommendations to address gaps in national biodefense. Former Senator Joe Lieberman and former Secretary of Homeland Security and Governor Tom Ridge co- chair the Commission, and are joined by former Senate Majority Leader Tom Daschle, former Representative Jim Greenwood, former Homeland Security Advisor Ken Wainstein, and former Homeland Security and Counter Terrorism Advisor Lisa Monaco. Our commissioners possess many years of experience with national and homeland security. In October 2015, the Commission released its first report, A National Blueprint for Biodefense: Major Reform Needed to Optimize Efforts. Shortly thereafter, we presented our findings and recommendations to this Committee. We made 33 recommendations with 87 associated short-, medium-, and long-term programmatic, legislative, and policy action items. If implemented, these would improve federal efforts across the spectrum of biodefense activities – prevention, deterrence, preparedness, detection and surveillance, response, attribution, recovery, and mitigation.
    [Show full text]
  • Laboratory Research Is Conducted at One of Four Biosafety Levels (BSL)
    Biological Safety Training Programs as a Component of Personnel Reliability Workshop Report Prepared by AAAS Center for Science, Technology and Security Policy Kavita Marfatia Berger, Ph.D. Kathryn A. Luke, Ph.D. AAAS Program on Scientific Freedom, Responsibility and Law Mark S. Frankel, Ph.D. Jennifer L. Sta.Ana Acknowledgements About AAAS This workshop was funded by the The American Association for the Bureau of International Security and Advancement of Science (AAAS) is the Nonproliferation at the U.S. Department world’s largest general scientific society of State. We would like to thank the and publisher of the journal, Science speakers and participants of the (www.sciencemag.org). AAAS was workshop who not only provided founded in 1848, and serves 262 valuable discussion but also contributed affiliated societies and academies of to the workshop report. We want to science, reaching 10 million individuals. especially thank Susan Piguet from the Science has the largest paid circulation Frontline Foundation, who was of any peer-reviewed general science invaluable during the organization of the journal in the world, with an estimated workshop, and Gigi Kwik Gronvall, total readership of 1 million. The non- Ph.D. (Center for Biosecurity of profit AAAS (www.aaas.org) is open to UPMC), Paul Meechan, Ph.D. (Merck all and fulfills its mission to “advance and Co., Inc.), and Julie Fischer, Ph.D. science and serve society” through (Stimson Center) who all provided initiatives in science policy; international valuable comments on the draft report. programs; science education; and more. AAAS would also like to acknowledge For the latest research news, log onto Mary Kate Mohlman, Vivian Cheng, EurekAlert!, www.eurekalert.org, the Meghan Cunningham, Stephanie Heath, premier science-news web site, a service Cristina Kapustij, Janet Kim and Idalia of AAAS.
    [Show full text]
  • Historical Background of the US Biowarfare Program
    Historical Background of the US Biowarfare Program In light of the current FBI/Patriot Act investigations against Critical Art Ensemble (CAE), it is worthwhile to point out two moments from the history of the US government’s involvement in biowarfare. The first concerns the specific issue of access to knowledge, education, and resources in the life sciences. The second concerns the general backdrop of US biodefense ideology. All of this information has been confirmed by several sources, and has been in the public domain for some time (see the references below). Needless to say, this is not meant to be a comprehensive “history” of biowarfare. Instead, it is a perspective on biowarfare from the vantage point of US involvement. What is evident is that the US government’s involvement in biowarfare raises far more substantial questions than the investigation of dissenting artists. - Eugene Thacker ([email protected]) 1. US Biological Warfare Program Simulant Field Tests, 1949-68 Although the particulars of the investigation against CAE have not been made clear, the charges made against them surround particular strains of bacteria which Steve Kurtz was culturing: Serratia marcescens and Bacillus globigii. As has been noted, both bacteria are non-lethal, commonly found in wind-blown dust or the soil, and are often used for educational purposes in biology labs across the US. They have also been used by the US biological warfare program. A short chronology follows: 1942: The War Research Service is created to oversee the creation of a US biological warfare program, partially in response to intelligence concerning possible biowarfare programs in Germany and Japan.
    [Show full text]
  • Bioweapons Monitor 2011 the Bioweapons Prevention Project
    BWPP BioWeapons Monitor 2011 The BioWeapons Prevention Project The BioWeapons Prevention Project (BWPP) is a global network of civil society actors dedicated to the permanent elimination of biological weapons and of the possibility of their re-emergence. It was launched in 2003 by a group of non-governmental organizations concerned at the failure of governments to fortify the norm against the weaponization of disease. BWPP monitors govern- mental and other activities relevant to the treaties that codify that norm. www.bwpp.org BioWeapons Monitor 2011 BWPP Copyright and credits © BioWeapons Prevention Project, 2011 Editor First published in November 2011 Iris Hunger ([email protected]) All rights reserved. No part of this publication may Copy-editor, design and layout be reproduced, stored in a retrieval system, or Rick Jones ([email protected]) transmitted, in any form or by any means, without Printer the prior permission in writing of the BioWeapons Druckpunkt Druckerei & Repro GmbH, Berlin 2 Prevention Project, or as expressly permitted by law, or under terms agreed with the appropriate repro- Images graphics rights organisation. Enquiries concerning Shutterstock Images and iStockphoto reproduction outside the scope of the above should be sent to Iris Hunger at [email protected]. ISBN: 978-3-00-036561-4 BioWeapons Prevention Project Contents About the BioWeapons Monitor ............................................................................................................................................. 4 Introduction
    [Show full text]
  • Strengthening the Biological and Toxin Weapons Convention (BTWC) Publication Year: 2003 BTWC Briefing Papers: 2Nd Series: No
    Maximizing the Security and Oversight of Pathogenic Microorganisms and Toxins Item Type Briefing Paper Authors Pearson, Graham S. Citation Pearson, G.S. (2003). Maximizing the Security and Oversight of Pathogenic Microorganisms and Toxins. Bradford, Bradford Disarmament Research Centre, Department of Peace Studies, University of Bradford. BTWC Briefing Papers: 2nd Series, No. 6. Rights © 2003 University of Bradford. This work is licensed under a Creative Commons Attribution-Non-Commercial-Share Alike License (http://creativecommons.org/licenses/by-nc-nd/2.0/uk). Download date 02/10/2021 22:06:26 Link to Item http://hdl.handle.net/10454/787 The University of Bradford Institutional Repository This work is made available online in accordance with publisher policies. Please refer to the repository record for this item and our Policy Document available from the repository home page for further information. Author(s): Pearson, G.S. Title: Maximizing the Security and Improving Oversight of Pathogenic Oversight of Pathogenic Microorganisms and Toxins Project: Bradford Project on Strengthening the Biological and Toxin Weapons Convention (BTWC) Publication year: 2003 BTWC Briefing Papers: 2nd Series: No. 5 Series Editor(s): Pearson, G.S. and Dando, M.R. Publisher: University of Bradford (http://www.brad.ac.uk) Publisher’s repository: http://bradscholars.ac.uk:8080/dspace Copyright statement: © 2003 University of Bradford. This work is licensed under a Creative Commons Licence (http://creativecommons.org/licenses/by-nc- nd/2.0/uk/). Strengthening the Biological Weapons Convention Briefing Paper No 5 (Second Series) Maximizing the Security and Improving Oversight of Pathogenic Microorganisms and Toxins July 2003 Series Editors Graham S Pearson and Malcolm R Dando Department of Peace Studies, University of Bradford 1 Strengthening the Biological Weapons Convention Briefing Paper No 5 (Second Series) Maximizing the Security and Improving Oversight of Pathogenic Microorganisms and Toxins Graham S.
    [Show full text]