Pandemic Disease, Biological Weapons, and War
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Biological Toxins As the Potential Tools for Bioterrorism
International Journal of Molecular Sciences Review Biological Toxins as the Potential Tools for Bioterrorism Edyta Janik 1, Michal Ceremuga 2, Joanna Saluk-Bijak 1 and Michal Bijak 1,* 1 Department of General Biochemistry, Faculty of Biology and Environmental Protection, University of Lodz, Pomorska 141/143, 90-236 Lodz, Poland; [email protected] (E.J.); [email protected] (J.S.-B.) 2 CBRN Reconnaissance and Decontamination Department, Military Institute of Chemistry and Radiometry, Antoniego Chrusciela “Montera” 105, 00-910 Warsaw, Poland; [email protected] * Correspondence: [email protected] or [email protected]; Tel.: +48-(0)426354336 Received: 3 February 2019; Accepted: 3 March 2019; Published: 8 March 2019 Abstract: Biological toxins are a heterogeneous group produced by living organisms. One dictionary defines them as “Chemicals produced by living organisms that have toxic properties for another organism”. Toxins are very attractive to terrorists for use in acts of bioterrorism. The first reason is that many biological toxins can be obtained very easily. Simple bacterial culturing systems and extraction equipment dedicated to plant toxins are cheap and easily available, and can even be constructed at home. Many toxins affect the nervous systems of mammals by interfering with the transmission of nerve impulses, which gives them their high potential in bioterrorist attacks. Others are responsible for blockage of main cellular metabolism, causing cellular death. Moreover, most toxins act very quickly and are lethal in low doses (LD50 < 25 mg/kg), which are very often lower than chemical warfare agents. For these reasons we decided to prepare this review paper which main aim is to present the high potential of biological toxins as factors of bioterrorism describing the general characteristics, mechanisms of action and treatment of most potent biological toxins. -
China's False Allegations of the Use of Biological Weapons by the United
W O R K I N G P A P E R # 7 8 China’s False Allegations of the Use of Biological Weapons by the United States during the Korean War By Milton Leitenberg, March 2016 THE COLD WAR INTERNATIONAL HISTORY PROJECT WORKING PAPER SERIES Christian F. Ostermann, Series Editor This paper is one of a series of Working Papers published by the Cold War International History Project of the Woodrow Wilson International Center for Scholars in Washington, D.C. Established in 1991 by a grant from the John D. and Catherine T. MacArthur Foundation, the Cold War International History Project (CWIHP) disseminates new information and perspectives on the history of the Cold War as it emerges from previously inaccessible sources on “the other side” of the post-World War II superpower rivalry. The project supports the full and prompt release of historical materials by governments on all sides of the Cold War, and seeks to accelerate the process of integrating new sources, materials and perspectives from the former “Communist bloc” with the historiography of the Cold War which has been written over the past few decades largely by Western scholars reliant on Western archival sources. It also seeks to transcend barriers of language, geography, and regional specialization to create new links among scholars interested in Cold War history. Among the activities undertaken by the project to promote this aim are a periodic BULLETIN to disseminate new findings, views, and activities pertaining to Cold War history; a fellowship program for young historians from the former Communist bloc to conduct archival research and study Cold War history in the United States; international scholarly meetings, conferences, and seminars; and publications. -
Chemical Warfare Agents
. Chemical Warfare Agents ........ Using Detector Tubes as a Means of Detecting Chemical Warfare Agents in HazMat Response by Victor Vendetti International Sales and Marketing Manager - Instruments For years, detector tubes have been a reliable and Crush ampoule inside tube effective tool in HazMat response. Used for Insert tube into pump detecting a wide array of contaminants such as aromatic hydrocarbons (benzene, toluene), Manual Versus Automatic Sample- oxidizing gases (nitrogen dioxide, chlorine), and Taking acid gases (hydrogen chloride), detector tubes have helped emergency responders quickly The most common and cost-effective means of assess hazardous conditions. taking detector tube samples is with a manual pump (squeezed by hand). Such pumps typically In the past, the compounds of concern to HazMat vary in cost between $150 and $300 each. responders primarily have been industrial However, because of the low detection range on compounds such as those listed above. However, CW agent detector tubes, often 30 or more pump the newest and most lethal concern to HazMat, strokes are required with a manual pump. This law enforcement and security forces is the threat can take a considerable amount of time and of chemical warfare attacks and the need to require significant repetition of pump-stroke respond to potential attacks. motions. Capable of mass destruction, chemical warfare agents are the number one concern in the industry today. Because chemical warfare agents are so deadly, they must be detected quickly and effectively in order to minimize the effects on those in the vicinity of an attack. Detector tubes offer a quick, reliable, and cost-effective means of detecting chemical warfare agents, helping HazMat professionals respond quickly to attacks. -
Rethinking U.S. Biosecurity Strategy for the Decade Ahead
RETHINKING U.S. BIOSECURITY STRATEGY FOR THE DECADE AHEAD Annotated Bibliography October 27-29, 2020 Center for Global Security Research LAWRENCE LIVERMORE NATIONAL LABORATORY Annotated Bibliography RETHINKING U.S. BIOSECURITY STRATEGY FOR THE DECADE AHEAD Center for Global Security Research Livermore, California, October 27-29, 2020 Prepared By: Lauren J. Borja, Marigny Kirschke-Schwartz, Ryan Swan Key Questions: What lessons should be drawn from the COVID 19 crisis for the future of U.S. biosecurity strategy? What bio-related threats, risks, and dangers must be accounted for in the decade ahead? How can the coherence of national and international responses be improved? Panel Topics: 1. The Challenge of Anticipating Emerging Threats 2. The Challenge of Responding to an Emergent Threat 3. Biological Warfare 2030 4. Public Health Risks 2030 5. Balancing Pandemic Preparedness and Biodefense 6. Balancing Oversight and Execution The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. 1 Panel 1: The Challenge of Anticipating Emerging Threats What methodologies and toolkits were used to characterize pandemic risk? Can they be improved? How? What preparations are appropriate for Black Swan events? Do we have adequate means to “connect the dots” between information source divided between public health and national security domains? Cameron, Elizabeth; Nuzzo, -
From Voodoo to Viruses: the Evolution of the Zombie in Twentieth Century Popular Culture
From Voodoo to Viruses: The Evolution of the Zombie in Twentieth Century Popular Culture By Margaret Twohy Adviser: Dr. Bernice Murphy A thesis submitted in partial fulfilment of the Degree of Master’s of Philosophy in Popular Literature Trinity College Dublin Dublin, Ireland October 2008 2 Abstract The purpose of this thesis is to explore the evolutionary path the zombie has followed in 20th Century popular culture. Additionally, this thesis will examine the defining characteristics of the zombie as they have changed through its history. Over the course of the last century and edging into the 21st Century, the zombie has grown in popularity in film, videogames, and more recently in novels. The zombie genre has become a self-inspiring force in pop culture media today. Films inspired a number of videogames, which in turn, supplied the film industry with a resurgence of inspirations and ideas. Combined, these media have brought the zombie to a position of greater prominence in popular literature. Additionally, within the growing zombie culture today there is an over-arcing viral theme associated with the zombie. In many films, games, and novels there is a viral cause for a zombie outbreak. Meanwhile, the growing popularity of zombies and its widening reach throughout popular culture makes the genre somewhat viral-like as well. Filmmakers, authors and game designers are all gathering ideas from one another causing the some amount of self- cannibalisation within the genre. 3 Table of Contents Introduction 4 Chapter One 7 Evolution of the Dead Chapter Two 21 Contaminants, Viruses, and Possessions—Oh my! Chapter Three 34 Dawn of the (Digital) Dead Chapter Four 45 Rise of the Literary Zombie Conclusion 58 Bibliography 61 4 Introduction There are perhaps few, if any fictional monsters that can rival the versatility of the humble zombie (or zombi)1. -
FY 2005 LDRD Report to Congress
United States Department of Energy Laboratory, Plant or Site Directed Research and Development Report Project List -- Fiscal Year 2005 ANL - Argonne National Lab Project ID Project Name FY Total P/ANL2003-336 Multidisciplinary Theory $298000 P/ANL2003-337 The Use of Synchrotron Radiation Sources for Homeland Security - Terahertz $241600 and X-Ray Radiation P/ANL2003-338 Modeling Near-Field Atmospheric Dispersion and the Potential Health and $218500 Economic Impacts from Terrorism Scenarios Involving "Dirty Bombs" or Similar Devices P/ANL2003-340 Core-Shell Nanocrystal Spring Magnets $60400 P/ANL2003-341 Simulation and Modeling of Reactivity in Nanoporous Materials $46700 P/ANL2004-002 Development of Germanium Double Sided Strip Detectors for Nuclear Imaging $112200 Applications P/ANL2004-009 Ultrafast Laser/X-Ray Interactions $67100 P/ANL2004-014 Development of Cross-Polarization Confocal Microscopy for Measurement of $86400 Subsurface Microstructure P/ANL2004-018 Fundamental and Applied Studies of Novel Intermetallic Thin Films for Lithium $130300 Ion Battery Anodes P/ANL2004-019 Multiphase CFD Analysis of Vascular Lesion Formation $118500 P/ANL2004-026 Science and Technology of a New TiAlO Alloy Oxide and Its Application to a $86600 New Generation of Integrated Circuit Gate Dielectric P/ANL2004-038 Time-Resolved Studies of Magnetization Dynamics in Nanostructured $105000 Materials P/ANL2004-041 Site-Specific Magnetism in Crystals $74800 P/ANL2004-044 Palladium/Semiconductor Nanohybrids as Hydrogen Sensors for Fuel Cell $126300 Applications -
The Rollback of South Africa's Chemical and Biological Warfare
The Rollback of South Africa’s Chemical and Biological Warfare Program Stephen Burgess and Helen Purkitt US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama THE ROLLBACK OF SOUTH AFRICA’S CHEMICAL AND BIOLOGICAL WARFARE PROGRAM by Dr. Stephen F. Burgess and Dr. Helen E. Purkitt USAF Counterproliferation Center Air War College Air University Maxwell Air Force Base, Alabama The Rollback of South Africa’s Chemical and Biological Warfare Program Dr. Stephen F. Burgess and Dr. Helen E. Purkitt April 2001 USAF Counterproliferation Center Air War College Air University Maxwell Air Force Base, Alabama 36112-6427 The internet address for the USAF Counterproliferation Center is: http://www.au.af.mil/au/awc/awcgate/awc-cps.htm . Contents Page Disclaimer.....................................................................................................i The Authors ............................................................................................... iii Acknowledgments .......................................................................................v Chronology ................................................................................................vii I. Introduction .............................................................................................1 II. The Origins of the Chemical and Biological Warfare Program.............3 III. Project Coast, 1981-1993....................................................................17 IV. Rollback of Project Coast, 1988-1994................................................39 -
Common Misconceptions About Biological Weapons
BRIEFER No. 12 ⼁December 7, 2020 August 16, 2018 Common Misconceptions About Biological Weapons By Chris Bakerlee, Steph Guerra, Christine Parthemore, Damien Soghoian, and Jacob Swett INTRODUCTION The COVID-19 pandemic serves as a loud wake-up call to the systemic and strategic effects of biological threats. If not rapidly detected and addressed, infectious diseases can in short order infect millions, kill hundreds of thousands or more, depress economies, and heighten tensions among nations. Institutions and systems established for response and resilience to such threats can be stretched to the point of failure, leaving affected societies even more vulnerable. This experience is driving both policy makers and the general public to pay more attention to the threats posed by the deliberate use of diseases as weapons. This discourse is bringing to light several unfortunate misconceptions about biological weapons. These include misperceptions that biological weapons programs would be irrational, that they would not serve as attractive weapons given the risks involved, and that the world has institutions and processes strong enough to effectively deter, uncover, and eliminate biological weapons programs. If such misconceptions persist, the international community will be left ill-prepared and vulnerable to this threat, with potentially-catastrophic consequences. This paper therefore seeks to highlight and address points of confusion regarding the character of biological weapons threats. 1 BRIEFER No. 12 | December 7, 2020 The Council on Strategic Risks BACKGROUND Around the middle of the 20th century, the world’s great powers began pursuing biological weapons programs with vigor. The United States, for example, formally initiated its bioweapons program during World War II in anticipation of the future use of bioweapons by its enemies who had such programs. -
The Malthusian Economy
The Malthusian Economy Economics 210a January 18, 2012 • Clark’s point of departure is the observation that the average person was no better off in 1800 than in 100,000 BC. – As Clark puts it on p.1. of his book, “Life expectancy was no higher in 1800 than for hunter-gatherers.” – Something changed after that of course. But this is for later in the course….. 2 • Clark’s point of departure is the observation that the average person was no better off in 1800 than in 100,000 BC. – How could he possibly know this? 3 Various forms of evidence, but first and foremost that on heights • There is little sign in modern populations of any genetically determined differences in potential stature, except for some rare groups such as the pygmies of Central Africa. • But nutrition does influence height. • In addition to the direct impact of nutrition on human development, episodes of ill health during growth phases can stop growth, and the body catches up only partially later on. And nutrition is an important determinant of childhood health. • As Clark puts it, “stature, a measure of both the quality of diet and of children’s exposure to disease, was [as high or] higher in the Stone Age than in 1800.” – This is a pretty striking observation. How are we to understand it? 4 The standard framework for doing so is the Malthusian model • Thomas Robert Malthus was born into a wealthy family in 1766, educated at Cambridge, and became a professor at Cambridge and eventually an Anglican parson. • His students referred to him as Pop Malthus (“Pop” for population). -
Download Global Catastrophic Risks 2020
Global Catastrophic Risks 2020 Global Catastrophic Risks 2020 INTRODUCTION GLOBAL CHALLENGES FOUNDATION (GCF) ANNUAL REPORT: GCF & THOUGHT LEADERS SHARING WHAT YOU NEED TO KNOW ON GLOBAL CATASTROPHIC RISKS 2020 The views expressed in this report are those of the authors. Their statements are not necessarily endorsed by the affiliated organisations or the Global Challenges Foundation. ANNUAL REPORT TEAM Ulrika Westin, editor-in-chief Waldemar Ingdahl, researcher Victoria Wariaro, coordinator Weber Shandwick, creative director and graphic design. CONTRIBUTORS Kennette Benedict Senior Advisor, Bulletin of Atomic Scientists Angela Kane Senior Fellow, Vienna Centre for Disarmament and Non-Proliferation; visiting Professor, Sciences Po Paris; former High Representative for Disarmament Affairs at the United Nations Joana Castro Pereira Postdoctoral Researcher at Portuguese Institute of International Relations, NOVA University of Lisbon Philip Osano Research Fellow, Natural Resources and Ecosystems, Stockholm Environment Institute David Heymann Head and Senior Fellow, Centre on Global Health Security, Chatham House, Professor of Infectious Disease Epidemiology, London School of Hygiene & Tropical Medicine Romana Kofler, United Nations Office for Outer Space Affairs Lindley Johnson, NASA Planetary Defense Officer and Program Executive of the Planetary Defense Coordination Office Gerhard Drolshagen, University of Oldenburg and the European Space Agency Stephen Sparks Professor, School of Earth Sciences, University of Bristol Ariel Conn Founder and -
The United States Cyber Command: International Restrictions Vs
NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY Volume 12 Article 1 Issue 3 Online Issue 10-1-2010 The nitU ed States Cyber Command: International Restrictions vs. Manifest Destiny Tod Leaven Christopher Dodge Follow this and additional works at: http://scholarship.law.unc.edu/ncjolt Part of the Law Commons Recommended Citation Tod Leaven & Christopher Dodge, The United States Cyber Command: International Restrictions vs. Manifest Destiny, 12 N.C. J.L. & Tech. 1 (2010). Available at: http://scholarship.law.unc.edu/ncjolt/vol12/iss3/1 This Article is brought to you for free and open access by Carolina Law Scholarship Repository. It has been accepted for inclusion in North Carolina Journal of Law & Technology by an authorized administrator of Carolina Law Scholarship Repository. For more information, please contact [email protected]. NORTH CAROLINA JOURNAL OF LAW & TECHNOLOGY 12 N.C. J.L. & TECH. ON. 1 (2010) THE UNITED STATES CYBER COMMAND: INTERNATIONAL RESTRICTIONS VS. MANIFEST DESTINY Tod Leaven* & Christopher Dodge** At this time, it is not in the best interest of the United States to adopt,join, or participate in any internationaltreaty resembling a cyberspace extension of the existing "conventional" international laws of warfare. With the activation of the United States Cyber Command, the United States has begun to take the necessary steps to ensure better internationalcyberspace compliance. The high technology and resource thresholds present in conventional warfare provide warning signs which allow nations to monitor each other for treaty compliance and provide time for measures, such as sanctions, to halt any non-compliant behavior. Cyber- warfare, on the other hand, exposes nations to virtually limitless sudden and immediate attacks, without providing these similar warnings.