Agricultural Bioterrorism

Total Page:16

File Type:pdf, Size:1020Kb

Agricultural Bioterrorism From the pages of Recent titles Agricultural Bioterrorism: A Federal Strategy to Meet the Threat Agricultural in the McNair MCNAIR PAPER 65 Bioterrorism: Paper series: A Federal Strategy to Meet the Threat 64 The United States ignores the The Strategic Implications of a Nuclear-Armed Iran Agricultural potential for agricultural bioter- Kori N. Schake and rorism at its peril. The relative Judith S. Yaphe Bioterrorism: ease of a catastrophic bio- weapons attack against the 63 A Federal Strategy American food and agriculture All Possible Wars? infrastructure, and the devastat- Toward a Consensus View of the Future Security to Meet the Threat ing economic and social conse- Environment, 2001–2025 quences of such an act, demand Sam J. Tangredi that the Nation pursue an aggres- sive, focused, coordinated, and 62 stand-alone national strategy to The Revenge of the Melians: Asymmetric combat agricultural bioterrorism. Threats and the Next QDR The strategy should build on Kenneth F. McKenzie, Jr. counterterrorism initiatives already underway; leverage exist- 61 ing Federal, state, and local pro- Illuminating HENRY S. PARKER grams and capabilities; and Tomorrow’s War Martin C. Libicki involve key customers, stake- PARKER holders, and partners. The U.S. 60 Department of Agriculture The Revolution in should lead the development of Military Affairs: this strategy. Allied Perspectives Robbin F. Laird and Holger H. Mey Institute for National Strategic Studies National Defense University About the Author NATIONAL DEFENSE UNIVERSITY President: Vice Admiral Paul G. Gaffney II, USN Henry S. Parker is National Program Leader for Aquaculture at the Vice President: Ambassador Robin Lynn Raphel Agricultural Research Service in the U.S. Department of Agriculture and has INSTITUTE FOR NATIONAL STRATEGIC STUDIES served in several other positions related to aquaculture and marine science. Director: Stephen J. Flanagan Dr. Parker is a former associate professor at the University of Massachusetts, Dartmouth, and instructor at the University of Rhode Island, where he earned PUBLICATION DIRECTORATE a master’s degree in marine affairs and a doctorate in biological oceanography. Director and Editor, Joint Force Quarterly: Robert A. Silano He retired from the Naval Reserve with the rank of captain. Dr. Parker researched General Editor, NDU Press: William R. Bode and wrote this paper while attending the Industrial College of the Armed Forces, Supervisory Editor, NDU Press: George C. Maerz where he was a distinguished graduate. He is the author of Exploring the Oceans National Defense University Press (Englewood Cliffs, NJ: Prentice-Hall, 1985). ATTN: NDU–NSS–PD IIII 300 Fifth Avenue (Bldg. 62) Fort Lesley J. McNair Washington, D.C. 20319–5066 Telephone: (202) 685–4210 Facsimile: (202) 685–4806 About INSS Publications Print Publications For general information on publications and other programs of the Institute for National Strategic Studies, consult the National Defense University Web site at http://www.ndu.edu. To request a complimentary copy of available NDU Press titles, contact [email protected] via e-mail or leave a voice message at (202) 685–4210. Most NDU Press titles can be purchased from the U.S. Government Printing Office; call (202) 512–1800 or order on-line at The National Defense University (NDU) is a joint professional military education institution http://www.access.gpo.gov. operating under the direction of the Chairman of the Joint Chiefs of Staff. Its purpose is to prepare military and civilian leaders for service at the highest levels of national defense Electronic Publications and security. The principal operating elements of NDU are the Industrial College of the Numerous titles published by NDU Press are available on-line at Armed Forces, National War College, Joint Forces Staff College, Information Resources http://www.ndu.edu/ndu/inss/press/ndup2.html. Management College, Institute for National Strategic Studies, and Center for Hemispheric Defense Studies. Joint Force Quarterly (JFQ) The Institute for National Strategic Studies (INSS) conducts strategic studies for the The journal publishes articles, reviews, professional notes, and other features Secretary of Defense, Chairman of the Joint Chiefs of Staff, and unified commanders in by military officers, defense analysts, and scholars on the integrated employ- chief; supports national strategic components of NDU academic programs; and provides ment of land, sea, air, space, and special operations forces. JFQ focuses on outreach to other governmental agencies and the broader national security community. joint doctrine, coalition warfare, contingency planning, combat operations con- The Publication Directorate of INSS publishes books, monographs, reports, and ducted by unified commands, and joint force development. For current and occasional papers on national security strategy, defense policy, and national military back numbers of the journal, visit the JFQ home page maintained on the Joint strategy through National Defense University Press that reflect the output of university Doctrine Web site at http://www.dtic.mil/doctrine/jel/jfq_pubs/index.htm. research and academic programs. In addition, it produces Joint Force Quarterly, a professional military journal published for the Chairman of the Joint Chiefs of Staff. Agricultural Bioterrorism: A Federal Strategy to Meet the Threat Henry S. Parker McNair Paper 65 INSTITUTE FOR NATIONAL STRATEGIC STUDIES NATIONAL DEFENSE UNIVERSITY WASHINGTON, D.C. 2002 The opinions, conclusions, and recommendations expressed or implied within are those of the contributors and do not necessarily reflect the views of the Department of Defense or any other department or agency of the Federal Government. This publication is cleared for public release; distribution unlimited. Portions of this work may be quoted or reprinted without further permission, with credit to the Institute for National Strategic Studies. A courtesy copy of any reviews and tearsheets would be appreciated. Second printing with revisions, June 2003 First printing, March 2002 For sale by the U.S. Government Printing Office. To order, contact Superintendent of Documents, Mail Stop: SSOP, Washington, D.C. 20402–9328 (ISSN 1071–7552) Contents Foreword ................................ v Acknowledgments ........................ vii Introduction ............................. ix Chapter One Bioterrorism, Biowarfare, and National Security ...................... 1 Chapter Two An Emerging Threat to Food Security ........ 11 Chapter Three Countering the Threat ..................... 25 Chapter Four Recommendations and Conclusion ......... 47 Appendix A Framework for National Coordination for Security, Critical Infrastructure, and Counterterrorism ..................... 55 Appendix B High-Priority Research Needs .............. 57 iii iv CONTENTS Appendix C Federal Agencies with Counterterrorism Responsibilities ........... 59 Appendix D Key Federal Programs and Capabilities to Combat Bioterrorism ................... 63 Appendix E Selected Agricultural and Environmental Organizations .............. 65 Appendix F Acronyms ................................ 69 Endnotes ................................ 71 References ............................... 79 Foreword he astonishing specter of September 11, 2001, jarred America and, indeed, all free nations, into accepting the previously unthink- T able—the world’s only remaining superpower is vulnerable to cat- astrophic attack and asymmetric warfare, even within its own borders. In a few short hours Americans came to realize that, for a fanatical, resource- ful, and patient enemy, there are neither ethical bounds nor societal mores to delineate the nature of the target, the weapon of choice, or the scale of the violence. To put it another way, for these enemies there are no rules of engagement and there is no honor. Since September 11, our national sense of vulnerability has steadily risen. We have been in a near-constant state of high alert because of credible threats to our Nation’s nuclear installations, power plants, transportation nodes, and other critical national infrastructures. We know that at least nine countries support offensive terrorism programs, and that Al Qaeda—Osama bin Laden’s international terrorist organiza- tion—has been committed to developing and deploying weapons of mass destruction against U.S. targets. And the possibility that the recent an- thrax attacks were perpetrated by a domestic terrorist with access to a Federal Government, academic, or private laboratory that possessed an- thrax for legitimate scientific reasons has brought fear to the doorsteps of virtually every home, business, and public institution in the country. We are now also facing up to a less publicized, but potentially devastating threat—terrorism directed against the Nation’s food and agricultural infrastructure. As this paper elucidates, American farms, food, and agriculture systems are exceedingly vulnerable to deliberate disruption by hostile interests intent on undermining confidence in food supplies or wreaking havoc on the agricultural sector of the American economy, which accounts for one-sixth of our gross domestic product. v vi FOREWORD Because of its breadth, diversity, and unparalleled success, U.S. agriculture is an inviting target for terrorists. Not only are food supplies vital for feeding our own population and others around the world, and important for the Nation’s economic health, but American agriculture is a vivid example of the capabilities of modern
Recommended publications
  • The Microscopic Threat to the United States: Biological Weapons, Biological Terrorism, and Their Multifaceted Implications for U.S
    “THE MICROSCOPIC THREAT TO THE UNITED STATES: BIOLOGICAL WEAPONS, BIOLOGICAL TERRORISM, AND THEIR MULTIFACETED IMPLICATIONS FOR U.S. SECURITY” by Angelina Camacho A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts in Global Security Studies Baltimore, Maryland May, 2014 © 2014 Angelina Camacho All Rights Reserved ABSTRACT From 1943 to 1969 the United States had a thriving biological weapons program to develop new ways of targeting its adversaries. With the 1972 creation of the Biological Weapons Convention, the United States relinquished its program and sought to prevent other countries from possessing these lethal weapons. While previously the United States mainly worked with other states and the international community to minimize the threat from biological weapons, the 2001 anthrax attacks changed this landscape by adding a domestic dimension. This thesis explores three major aspects of the biological threat to the United States: domestic lone wolf actors, possible future state threats, and the failing aspects of the Biological Weapons Convention. An analysis of each aspect of the biological threat is performed to identify the role they each may play in future U.S. security decisions. Among the multitude of threats that can arise from biological terrorism and weapons, these particular threats are the most likely to shape future U.S. decision making, both domestically and at the international level. Through an analysis of a specific aspect of the biological threat towards the United States, each chapter illustrates the biological threat to the United States is real, menacing, and must be addressed for the future of U.S.
    [Show full text]
  • Equine Biosecurity and Biocontainment Practices on U.S
    Veterinary Services Centers for Epidemiology and Animal Health November 2006 _________________________________________________________________________________________________________________________ Equine Biosecurity and Biocontainment Practices on U.S. Equine Operations With the globalization of animal industries, biosecurity General Practices and biocontainment practices play a vital role in the health of domestic animals. Biosecurity practices include General biosecurity measures taken on equine measures that reduce the risk of disease introduction on operations include isolation protocols, infection-control an operation. Biocontainment practices include precautions for visitors, and use of separate or measures that reduce the spread of disease on an disinfected equipment. Other general management operation and from one operation to another. practices address contact with other animals, potential Vaccination, another important aid in infection control, contamination of feed and water, insect control, and will be addressed in a separate information sheet. manure management. Equine diseases are spread in a variety of ways, including direct contact between equids and contact with Separation for isolation or infection control feces, insect or animal vectors, aerosol particles, and contaminated needles. Often overlooked but equally Overall, 65.1 percent of operations separated important modes of disease transmission include contact animals for isolation or infection control. For this study, with contaminated equipment, tack, transport
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Deterrence Theory in the Cyber-Century Lessons from a State-Of-The-Art Literature Review
    Working Paper Research Division EU/Europe Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Annegret Bendiek, Tobias Metzger Deterrence theory in the cyber-century Lessons from a state-of-the-art literature review SWP Working Papers are online publications of SWP’s research divisions which have not been formally reviewed by the Institute. Ludwigkirchplatz 3−4 10719 Berlin Phone +49 30 880 07-0 Fax +49 30 880 07-100 www.swp-berlin.org Working Paper RD EU/Europe, 2015/ 02, May 2015 [email protected] SWP Berlin Table of Contents List of Figures 1 List of Abbreviations 2 Introduction 3 In theory – Deterrence theory and cyberspace 4 Deterrence-by-retaliation and deterrence-by-denial 6 In practice – Suitability of cyber: lessons and implications 7 Key challenges: Credibility and capability to display and use force 7 How to deter? Deterrence-by-denial and deterrence-by- retaliation 9 Determining the type of defence 9 Adding offence to the equation 10 When and whom to deter? Immediate vs. general deterrence and the challenge of attribution 10 What to deter? Narrow vs. broad deterrence 12 For whom? Central vs. extended deterrence 13 Conclusion and outlook 14 Annex 16 Glossary 16 List of References 17 List of Figures Figure 1: Limits to retaliation in cyberspace .................. 9 Figure 2: A possible model of escalation ....................... 11 Figure 3: EEAS figure on a possible inter-ministry division of labour ................................................................. 15 Figure 4: Risk assessment
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Pharmaceutical Patents Exemption Right As A
    AGAINST THE PLAGUE: EXEMPTION OF PHARMACEUTICAL PATENT RIGHTS AS A BIOSECURITY STRATEGY Taiwo A. Oriola* I. INTRODUCTION Acts of terrorism involve threats to use or use of weapons of mass destruction to kill, maim, or destroy property by individuals, groups, or states1 mainly on political grounds, and for maximum political effects.2 Terror attacks are characterized by stealth, indiscriminate violence, and destruction meant to heighten people’s fears and concerns for their lives and property.3 As terrorism has increased, so have the number of counterterrorism strategies by governments around the world.4 However, terrorism is as old as mankind.5 * Cardiff Law School, and the ESRC Centre for Business Relationships, Accountability, Sustainability, & Society, University of Cardiff, United Kingdom. 1. An early example of a state-sponsored terrorist was the Roman emperor Nero, who ruled by fear, slaughtered many members of the nobility, and has been blamed for the burning of Rome. CINDY C. COMBS & MARTIN SLANN, ENCYCLOPEDIA OF TERRORISM 201 (2002). Dysfunctional or anarchistic individuals or groups acting alone or in concert can perpetrate terrorist attacks. See Jonathan Glover, State Terrorism, in VIOLENCE, TERRORISM, AND JUSTICE 256, 257-60 (Raymond G. Frey & Christopher W. Morris eds., 1991) (contrasting historical state and independent terrorists, highlighting essential features of state-sponsored terrorism, and explaining why states commit acts of terrorism). 2. Political motivation has been described as “a necessary component to a definition of terrorism.” COMBS & SLANN, supra note 1, at 211. For examples of statutory definitions of terrorism, see Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, Pub.
    [Show full text]
  • Pathogens As Weapons Gregory Koblentz the International Security Implications of Biological Warfare
    Pathogens as Weapons Pathogens as Weapons Gregory Koblentz The International Security Implications of Biological Warfare Biological weapons have become one of the key security issues of the twenty-ªrst century.1 Three factors that ªrst emerged in the 1990s have contributed to this phenomenon. First, revelations regarding the size, scope, and sophistication of the Soviet and Iraqi biological warfare programs focused renewed attention on the prolifera- tion of these weapons.2 Second, the catastrophic terrorist attacks on September 11, 2001, and the anthrax letters sent to media outlets and Senate ofªces in the United States during the following month, demonstrated the desire of terror- ists to cause massive casualties and heightened concern over their ability to employ biological weapons.3 Third, signiªcant advances in the life sciences have increased concerns about how the biotechnology revolution could be ex- ploited to develop new or improved biological weapons.4 These trends suggest that there is a greater need than ever to answer several fundamental questions about biological warfare: What is the nature of the threat? What are the poten- tial strategic consequences of the proliferation of biological weapons? How ef- Gregory Koblentz is a doctoral candidate in Political Science at the Massachusetts Institute of Technology. I would like to thank Robert Art, Thomas Christensen, Linda Fu, Jeanne Guillemin, Kendall Hoyt, Milton Leitenberg, John Ellis van Courtland Moon, Julian Perry Robinson, Harvey Sapolsky, Mar- garet Sloane, Jonathan Tucker, and Stephen Van Evera for their support and discussion of previous drafts. I am also grateful for comments from the participants in seminars at the Massachusetts In- stitute of Technology’s Security Studies Program, Harvard University’s John M.
    [Show full text]
  • Mitchell & Kilner
    THE NEWSLETTER VOLUME 9 OF THE CENTER NUMBER 3 FOR BIOETHICS AND SUMMER 2003 HUMAN DIGNITY Inside: Remaking Humans: The New Utopians Versus a Truly Human Future1 Remaking Humans: The New Utopians Versus a Truly Human C. Ben Mitchell, Ph.D., Senior FeIIow,The Center for Bioethics and Human Dignity 1 John F. Kilner, Ph.D., President,The Center for Bioethics and Human Dignity Future If the nineteenth century was the age of the mentally by making use of reason, science, The Genetics of Mice and Men: machine and the twentieth century the infor and technology. In addition, respect for the Can—and Should—We mation age, this century is, by most accounts, rights of the individual and a belief in the 2 the age of biotechnology. In this biotech cen power of human ingenuity are important ele Intervene? tury we may witness the invention of cures for ments of transhumanism. Transhumanists genetically linked diseases, including also repudiate belief in the existence of super Movie Review natural powers that guide us. These things 4 Alzheimer’s, cancer, and a host of maladies News from the Field that cause tremendous human suffering. We together represent the core of our philosophy. may see amazing developments in food pro The critical and rational approach which duction with genetically modified foods that transhumanists support is at the service of the 6 Book Review actually carry therapeutic drugs inside them. desire to improve humankind and humanity in all their facets.” Bioterrorism and high-tech weaponry may 7 Center Resources also be in our future. Some researchers are even suggesting that our future might include Again, the idea of improving society through the remaking of the human species.
    [Show full text]
  • It Came from Outer Space: the Virus, Cultural Anxiety, and Speculative
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2002 It came from outer space: the virus, cultural anxiety, and speculative fiction Anne-Marie Thomas Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the English Language and Literature Commons Recommended Citation Thomas, Anne-Marie, "It came from outer space: the virus, cultural anxiety, and speculative fiction" (2002). LSU Doctoral Dissertations. 4085. https://digitalcommons.lsu.edu/gradschool_dissertations/4085 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. IT CAME FROM OUTER SPACE: THE VIRUS, CULTURAL ANXIETY, AND SPECULATIVE FICTION A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of English by Anne-Marie Thomas B.A., Texas A&M-Commerce, 1994 M.A., University of Arkansas, 1997 August 2002 TABLE OF CONTENTS Abstract . iii Chapter One The Replication of the Virus: From Biomedical Sciences to Popular Culture . 1 Two “You Dropped A Bomb on Me, Baby”: The Virus in Action . 29 Three Extreme Possibilities . 83 Four To Devour and Transform: Viral Metaphors in Science Fiction by Women . 113 Five The Body Electr(on)ic Catches Cold: Viruses and Computers . 148 Six Coda: Viral Futures .
    [Show full text]
  • Medical Management of Biological Casualties Handbook
    USAMRIID’s MEDICAL MANAGEMENT OF BIOLOGICAL CASUALTIES HANDBOOK Sixth Edition April 2005 U.S. ARMY MEDICAL RESEARCH INSTITUTE OF INFECTIOUS DISEASES FORT DETRICK FREDERICK, MARYLAND Emergency Response Numbers National Response Center: 1-800-424-8802 or (for chem/bio hazards & terrorist events) 1-202-267-2675 National Domestic Preparedness Office: 1-202-324-9025 (for civilian use) Domestic Preparedness Chem/Bio Helpline: 1-410-436-4484 or (Edgewood Ops Center – for military use) DSN 584-4484 USAMRIID’s Emergency Response Line: 1-888-872-7443 CDC'S Emergency Response Line: 1-770-488-7100 Handbook Download Site An Adobe Acrobat Reader (pdf file) version of this handbook can be downloaded from the internet at the following url: http://www.usamriid.army.mil USAMRIID’s MEDICAL MANAGEMENT OF BIOLOGICAL CASUALTIES HANDBOOK Sixth Edition April 2005 Lead Editor Lt Col Jon B. Woods, MC, USAF Contributing Editors CAPT Robert G. Darling, MC, USN LTC Zygmunt F. Dembek, MS, USAR Lt Col Bridget K. Carr, MSC, USAF COL Ted J. Cieslak, MC, USA LCDR James V. Lawler, MC, USN MAJ Anthony C. Littrell, MC, USA LTC Mark G. Kortepeter, MC, USA LTC Nelson W. Rebert, MS, USA LTC Scott A. Stanek, MC, USA COL James W. Martin, MC, USA Comments and suggestions are appreciated and should be addressed to: Operational Medicine Department Attn: MCMR-UIM-O U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) Fort Detrick, Maryland 21702-5011 PREFACE TO THE SIXTH EDITION The Medical Management of Biological Casualties Handbook, which has become affectionately known as the "Blue Book," has been enormously successful - far beyond our expectations.
    [Show full text]
  • Concepts of Biocontainment & Biosafety Training
    Concepts of Biocontainment & Biosafety Training UNIVERSITY OF NORTH CAROLINA - CHARLOTTE/ APRIL 30, 2014 CLIENT NAME / DATE Regulatory Guidance . OSHA Bloodborne Pathogen Standard . NIH Recombinant Guidelines – Apply to all institutions receiving NIH funding – Covers rDNA work, but also includes risk group listing . Biosafety in Microbiological and Biomedical Laboratories (BMBL) . Select Agent and Toxin regulations . Dangerous goods shipping regulations . North Carolina Dept. of Environment and Natural Resources CLIENT NAME / DATE US Guidance for Laboratories . BMBL Outlines: – Standard Microbiological Practices – Special Microbiological Practices – Safety Equipment – Facilities . Includes – Agent summary statements – BSC design and use – Toxin handling http://www.cdc.gov/biosafety/publications/bmbl5/index.htm CLIENT NAME / DATE Layers of Protection CLIENT NAME / DATE Definitions . Biohazard – A biological agent capable of self- replication that can cause disease in humans, animals, or plants – Generally, a microorganism, or toxins and allergens derived from those organisms . Biocontainment Class III cabinets at the U.S. Biological Warfare Laboratories, Camp Detrick, Maryland (Photo, 1940s) – the physical containment of pathogenic organisms or agents to prevent accidental infection of workers or release into the surrounding community . CLIENT NAME / DATE Biosafety . Fundamental objective: – Containment of potentially harmful biological agents . Risk assessment: – Helps to assign the biosafety level that reduces to an absolute minimum the worker’s exposure to agents, their risk of an LAI (lab associated infection), and potential impact on the community and the environment CLIENT NAME / DATE Biosafety Levels (BSLs) . Combinations of lab practices and techniques, safety equipment, and laboratory facilities . Appropriate level determined by risk assessment . Specifically appropriate for: – Organism in use – Operations performed in the laboratory – Known or suspected routes of infection CLIENT NAME / DATE Determining BSLs .
    [Show full text]