Communicating in a Crisis: Biological Attack
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hidden Cargo: a Cautionary Tale About Agroterrorism and the Safety of Imported Produce
HIDDEN CARGO: A CAUTIONARY TALE ABOUT AGROTERRORISM AND THE SAFETY OF IMPORTED PRODUCE 1. INTRODUCTION The attacks on the World Trade Center and the Pentagon on Septem ber 11, 2001 ("9/11") demonstrated to the United States ("U.S.") Gov ernment the U.S. is vulnerable to a wide range of potential terrorist at tacks. l The anthrax attacks that occurred immediately following the 9/11 attacks further demonstrated the vulnerability of the U.S. to biological attacks. 2 The U.S. Government was forced to accept its citizens were vulnerable to attacks within its own borders and the concern of almost every branch of government turned its focus toward reducing this vulner ability.3 Of the potential attacks that could occur, we should be the most concerned with biological attacks on our food supply. These attacks are relatively easy to initiate and can cause serious political and economic devastation within the victim nation. 4 Generally, acts of deliberate contamination of food with biological agents in a terrorist act are defined as "bioterrorism."5 The World Health Organization ("WHO") uses the term "food terrorism" which it defines as "an act or threat of deliberate contamination of food for human con- I Rona Hirschberg, John La Montagne & Anthony Fauci, Biomedical Research - An Integral Component of National Security, NEW ENGLAND JOURNAL OF MEDICINE (May 20,2004), at 2119, available at http://contenLnejrn.org/cgi/reprint/350/2112ll9.pdf (dis cussing the vulnerability of the U.S. to biological, chemical, nuclear, and radiological terrorist attacks). 2 Id.; Anthony Fauci, Biodefence on the Research Agenda, NATURE, Feb. -
Biotechnology Research in an Age of Terrorism: Confronting the Dual Use Dilemma
Prepublication Copy BIOTECHNOLOGY RESEARCH IN AN AGE OF TERRORISM: CONFRONTING THE DUAL USE DILEMMA Committee on Research Standards and Practices to Prevent the Destructive Application of Biotechnology Development, Security, and Cooperation Policy and Global Affairs National Research Council OF THE NATIONAL ACADEMIES The National Academies Press Washington, D.C. www.nap.edu Prepublication Copy Uncorrected Proofs THE NATIONAL ACADEMIES 500 FIFTH STREET, N.W. Washington, D.C. 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the Committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Financial Support: The development of this report was supported by the Alfred P. Sloan Foundation and the Nuclear Threat Initiative. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the organizations or agencies that provided support for the project. International Standard Book Number 0-309-09087-3 Additional copies of this report are available from National Academies Press, 2101 Constitution Avenue, N.W., Lockbox 285, Washington, D.C. 20055; (800) 624-6242 or (202) 334-3313 (in the Washington metropolitan area); Internet, //www.nap.edu Printed in the United States of America Copyright 2003 by the National Academy of Sciences. All rights reserved. Prepublication Copy Uncorrected Proofs The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare. -
Amerithrax Investigative Summary
The United States Department of Justice AMERITHRAX INVESTIGATIVE SUMMARY Released Pursuant to the Freedom of Information Act Friday, February 19, 2010 TABLE OF CONTENTS I. THE ANTHRAX LETTER ATTACKS . .1 II. EXECUTIVE SUMMARY . 4 A. Overview of the Amerithrax Investigation . .4 B. The Elimination of Dr. Steven J. Hatfill as a Suspect . .6 C. Summary of the Investigation of Dr. Bruce E. Ivins . 6 D. Summary of Evidence from the Investigation Implicating Dr. Ivins . .8 III. THE AMERITHRAX INVESTIGATION . 11 A. Introduction . .11 B. The Investigation Prior to the Scientific Conclusions in 2007 . 12 1. Early investigation of the letters and envelopes . .12 2. Preliminary scientific testing of the Bacillus anthracis spore powder . .13 3. Early scientific findings and conclusions . .14 4. Continuing investigative efforts . 16 5. Assessing individual suspects . .17 6. Dr. Steven J. Hatfill . .19 7. Simultaneous investigative initiatives . .21 C. The Genetic Analysis . .23 IV. THE EVIDENCE AGAINST DR. BRUCE E. IVINS . 25 A. Introduction . .25 B. Background of Dr. Ivins . .25 C. Opportunity, Access and Ability . 26 1. The creation of RMR-1029 – Dr. Ivins’s flask . .26 2. RMR-1029 is the source of the murder weapon . 28 3. Dr. Ivins’s suspicious lab hours just before each mailing . .29 4. Others with access to RMR-1029 have been ruled out . .33 5. Dr. Ivins’s considerable skill and familiarity with the necessary equipment . 36 D. Motive . .38 1. Dr. Ivins’s life’s work appeared destined for failure, absent an unexpected event . .39 2. Dr. Ivins was being subjected to increasing public criticism for his work . -
Pandemic Disease, Biological Weapons, and War
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2014 Pandemic Disease, Biological Weapons, and War Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1296 http://ssrn.com/abstract=2350304 Laura K. Donohue, Pandemic Disease, Biological Weapons, and War in LAW AND WAR: (Sarat, Austin, Douglas, Lawrence, and Umphrey, Martha Merrill, eds., Stanford University Press, 2014) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Military, War, and Peace Commons, and the National Security Law Commons PANDEMIC DISEASE , BIOLOGICAL WEAPONS , AND WAR Laura K. Donohue * Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. 1 But prior to the recent trend, the threat largely centered on state use of such weapons. 2 What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. 3 Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons knowledge. The Defense Against Weapons of Mass Destruction Act gave the Pentagon lead agency responsibility. 4 Senator Lugar explained, “[B]iological weapons, materials, and know-how are now more available to terrorists and rogue nations than at any other time in our history.”5 The United States was not equipped to manage the crisis. -
Francisella Spp. Infections in Farmed and Wild Fish. ICES CM 2008/D:07
ICES CM 2008/D:07 Francisella spp. infections in farmed and wild fish Duncan J. Colquhoun1, Adam Zerihun2 and Jarle Mikalsen3 National Veterinary Institute, Section for Fish Health, Ullevaalsveien 68, 0454 Oslo, Norway 1 tel: +47 23 21 61 41; fax: +47 23 21 61 01; e-mail: [email protected] 2 tel: +47 23 21 61 08; fax: +47 23 21 61 01; e-mail: [email protected] 3 tel: +47 23 21 61 55; fax: +47 23 21 61 01; e-mail: [email protected] Abstract Bacteria within the genus Francisella are non-motile, Gram-negative, strictly aerobic, facultatively intracellular cocco-bacilli. While the genus includes pathogens of warm-blooded animals including humans, and potential bioterror agents, there is also increasing evidence of a number of as yet unrecognised environmental species. Due to their nutritionally fastidious nature, bacteria of the genus Francisella are generally difficult to culture, and growth is also commonly inhibited by the presence of other bacteria within sample material. For these reasons, Francisella-related fish disease may be under-diagnosed. Following the discovery in 2004/2005 that a granulomatous disease in farmed and wild Atlantic cod (Gadus morhua) is caused by a previously undescribed member of this genus (Francisella philomiragia subsp. noatunensis), similar diseases have been identified in fish in at least seven countries around the world. These infections affect both freshwater and marine fish species and involve bacteria more or less closely related to F. philomiragia subsp. philomiragia, an opportunistic human pathogen. Recent work relating to characterisation of the disease/s, classification of fish pathogenic Francisella spp. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
2001 Anthrax Letters
Chapter Five: 2001 Anthrax Letters Author’s Note: The analysis and comments regarding the communication efforts described in this case study are solely those of the authors; this analysis does not represent the official position of the FDA. This case was selected because it is one of the few major federal efforts to distribute medical countermeasures in response to an acute biological incident. These events occurred more than a decade ago and represent the early stages of US biosecurity preparedness and response; however, this incident serves as an excellent illustration of the types of communication challenges expected in these scenarios. Due in part to the extended time since these events and the limited accessibility of individual communications and messages, this case study does not provide a comprehensive assessment of all communication efforts. In contrast to the previous case studies in this casebook, the FDA’s role in the 2001 anthrax response was relatively small, and as such, this analysis focuses principally on the communication efforts of the CDC and state and local public health agencies. The 2001 anthrax attacks have been studied extensively, and the myriad of internal and external assessments led to numerous changes to response and communications policies and protocols. The authors intend to use this case study as a means of highlighting communication challenges strictly within the context of this incident, not to evaluate the success or merit of changes made as a result of these events. Abstract The dissemination of Bacillus anthracis via the US Postal Service (USPS) in 2001 represented a new public health threat, the first intentional exposure to anthrax in the United States. -
Maximum Containment: the Most Controversial Labs in the World
Maximum Containment: The Most Controversial Labs in the World By Alison K. Bruzek B.A. Biological Sciences Northwestern University, 2010 SUBMITTED TO THE PROGRAM IN COMPARATIVE MEDIA STUDIES/WRITING IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN SCIENCE WRITING AT THE MASSACHUSETTS INSTITUTE OF TECHNOLOGY MASSACHUSETTS IN'T-QUTE OF 7ECHNOLOqi September 2013 JUL 0 22013 @2013 Alison K. Bruzek. All rights reserved. Li__RARI ES The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature of Author: -----.. Program in Con rativeMedia Studies/Writing June 10, 2013 Certified by: Philip Hilts Director, Knight Science Journalism Fellowships Thesis Supervisor Accepted by: Seth Mnookin Assistant Professor of Science Writing Director, Graduate Program in Science Writing 1 2 Maximum Containment: The Most Controversial Labs in the World By Alison K. Bruzek Submitted to the Program in Comparative Media Studies/Writing on June 10, 2013 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Science Writing ABSTRACT In 2002, following the September 1 1 th attacks and the anthrax letters, the United States allocated money to build two maximum containment biology labs. Called Biosafety Level 4 (BSL-4) facilities, these labs were built to research new vaccines, diagnostics, and treatments for emerging infectious diseases, potential biological weapons, and to contribute to the nation's biodefense. These labs were not the first dramatic reaction to the threat of biowarfare and are in fact, one product of a long history of the country's contentious relationship with biological weapons. -
Pathogens As Weapons Gregory Koblentz the International Security Implications of Biological Warfare
Pathogens as Weapons Pathogens as Weapons Gregory Koblentz The International Security Implications of Biological Warfare Biological weapons have become one of the key security issues of the twenty-ªrst century.1 Three factors that ªrst emerged in the 1990s have contributed to this phenomenon. First, revelations regarding the size, scope, and sophistication of the Soviet and Iraqi biological warfare programs focused renewed attention on the prolifera- tion of these weapons.2 Second, the catastrophic terrorist attacks on September 11, 2001, and the anthrax letters sent to media outlets and Senate ofªces in the United States during the following month, demonstrated the desire of terror- ists to cause massive casualties and heightened concern over their ability to employ biological weapons.3 Third, signiªcant advances in the life sciences have increased concerns about how the biotechnology revolution could be ex- ploited to develop new or improved biological weapons.4 These trends suggest that there is a greater need than ever to answer several fundamental questions about biological warfare: What is the nature of the threat? What are the poten- tial strategic consequences of the proliferation of biological weapons? How ef- Gregory Koblentz is a doctoral candidate in Political Science at the Massachusetts Institute of Technology. I would like to thank Robert Art, Thomas Christensen, Linda Fu, Jeanne Guillemin, Kendall Hoyt, Milton Leitenberg, John Ellis van Courtland Moon, Julian Perry Robinson, Harvey Sapolsky, Mar- garet Sloane, Jonathan Tucker, and Stephen Van Evera for their support and discussion of previous drafts. I am also grateful for comments from the participants in seminars at the Massachusetts In- stitute of Technology’s Security Studies Program, Harvard University’s John M. -
1540 Committee Matrix of Slovakia
1540 COMMITTEE MATRIX OF SLOVAKIA The information in the matrices originates primarily from national reports and is complemented by official government information, including that made available to inter-governmental organizations. The matrices are prepared under the direction of the 1540 Committee. The 1540 Committee intends to use the matrices as a reference tool for facilitating technical assistance and to enable the Committee to continue to enhance its dialogue with States on their implementation of Security Council Resolution 1540. The matrices are not a tool for measuring compliance of States in their non-proliferation obligations but for facilitating the implementation of Security Council Resolutions 1540 (2004), 1673 (2006), 1810 (2008) and 1977 (2011). They do not reflect or prejudice any ongoing discussions outside of the Committee, in the Security Council or any of its organs, of a State's compliance with its non-proliferation or any other obligations. Information on voluntary commitments is for reporting purpose only and does not constitute in any way a legal obligation arising from resolution 1540 or its successive resolutions. OP 1 and related matters from OP 5, OP 6, OP 8 (a), (b), (c) and OP 10 State: SLOVAKIA Date of Report: 2 November 2004 Date of First Addendum: 14 December 2004 Date of Second Addendum: 14 December 2007 Date of Committee Approval: Remarks (information refers Legally binding instruments, to the page of the organizations, codes of YES if YES, relevant information (i.e. signing, accession, ratification, -
Mitchell & Kilner
THE NEWSLETTER VOLUME 9 OF THE CENTER NUMBER 3 FOR BIOETHICS AND SUMMER 2003 HUMAN DIGNITY Inside: Remaking Humans: The New Utopians Versus a Truly Human Future1 Remaking Humans: The New Utopians Versus a Truly Human C. Ben Mitchell, Ph.D., Senior FeIIow,The Center for Bioethics and Human Dignity 1 John F. Kilner, Ph.D., President,The Center for Bioethics and Human Dignity Future If the nineteenth century was the age of the mentally by making use of reason, science, The Genetics of Mice and Men: machine and the twentieth century the infor and technology. In addition, respect for the Can—and Should—We mation age, this century is, by most accounts, rights of the individual and a belief in the 2 the age of biotechnology. In this biotech cen power of human ingenuity are important ele Intervene? tury we may witness the invention of cures for ments of transhumanism. Transhumanists genetically linked diseases, including also repudiate belief in the existence of super Movie Review natural powers that guide us. These things 4 Alzheimer’s, cancer, and a host of maladies News from the Field that cause tremendous human suffering. We together represent the core of our philosophy. may see amazing developments in food pro The critical and rational approach which duction with genetically modified foods that transhumanists support is at the service of the 6 Book Review actually carry therapeutic drugs inside them. desire to improve humankind and humanity in all their facets.” Bioterrorism and high-tech weaponry may 7 Center Resources also be in our future. Some researchers are even suggesting that our future might include Again, the idea of improving society through the remaking of the human species. -
The Australia Group LIST of HUMAN and ANIMAL PATHOGENS and TOXINS for EXPORT CONTROL[1]
The Australia Group LIST OF HUMAN AND ANIMAL PATHOGENS AND TOXINS FOR EXPORT CONTROL[1] July 2017 Viruses 1. African horse sickness virus 2. African swine fever virus 3. Andes virus 4. Avian influenza virus[2] 5. Bluetongue virus 6. Chapare virus 7. Chikungunya virus 8. Choclo virus 9. Classical swine fever virus (Hog cholera virus) 10. Crimean-Congo hemorrhagic fever virus 11. Dobrava-Belgrade virus 12. Eastern equine encephalitis virus 13. Ebolavirus: all members of the Ebolavirus genus 14. Foot-and-mouth disease virus 15. Goatpox virus 16. Guanarito virus 17. Hantaan virus 18. Hendra virus (Equine morbillivirus) 19. Japanese encephalitis virus 20. Junin virus 21. Kyasanur Forest disease virus 22. Laguna Negra virus 23. Lassa virus 24. Louping ill virus 25. Lujo virus 26. Lumpy skin disease virus 27. Lymphocytic choriomeningitis virus 28. Machupo virus 29. Marburgvirus: all members of the Marburgvirus genus 30. Monkeypox virus 31. Murray Valley encephalitis virus 32. Newcastle disease virus 33. Nipah virus 34. Omsk hemorrhagic fever virus 35. Oropouche virus 36. Peste-des-petits-ruminants virus 37. Porcine Teschovirus 38. Powassan virus 39. Rabies virus and other members of the Lyssavirus genus 40. Reconstructed 1918 influenza virus 41. Rift Valley fever virus 42. Rinderpest virus 43. Rocio virus 44. Sabia virus 45. Seoul virus 46. Severe acute respiratory syndrome-related coronavirus (SARS-related coronavirus) 47. Sheeppox virus 48. Sin Nombre virus 49. St. Louis encephalitis virus 50. Suid herpesvirus 1 (Pseudorabies virus; Aujeszky's disease) 51. Swine vesicular disease virus 52. Tick-borne encephalitis virus (Far Eastern subtype) 53. Variola virus 54.