Professional Documents
Culture Documents
Bioterrorism and
Advanced Sensors [Sincavage
& Carter]
“History has shown us repeatedly, in terms of both human suffering
and economic loss, that the costs of preparedness through vigilance
are far lower than those needed to respond to unanticipated public
health crises.” ~ RL Berkelman, RT Bryan, MT Osterholm, JW
LeDuc, JM Hughes
During the Korean War, the United States was accused of using
bioweapons, but it was proven to the World Peace Council; the
allegations were Chinese government propaganda. Accusations
followed in 1962 by the Cuban government. It was believed the
United States used bioweapons against poultry and tobacco
industries in Cuba. Cuba could not prove the allegations. In 1969
President Nixon abolished all U.S. offensive biological weapon
capabilities but retained the BTA defensive program. (watchdog
-USAMRIID)
Dark Winter
On June 22nd and 23rd, 2001, the Johns Hopkins Center for civil
biodefense strategies collaborated with other institutional
institutions in a bioterrorism exercise, Dark Winter. The event
simulated pandemic smallpox, focusing on the challenge’s
policymakers would face if confronted with a bioterrorist attack.
Dark winter was intended to bring awareness to the threat posed
by biological weapons among senior national security experts (Tara
O’Toole, April 2002). Dark winner simulated attacks involving
smallpox on shopping malls in three different states resulting in
3000 people becoming infected (Foley, 2017). The exercise resulted
in:
What were the lessons learned from Dark Winter? Why was a similar
simulation running again in the U.S.? Remember after September 11,
2001, eyes turned to the United States and the use of biodefense.
Shortly after 9/11, the United States encountered an anthrax attack
against government officials (described supra). Since the tragic
historical event, the FBI create a specialized branch to focus on
chemical, biological radiological, nuclear, and explosives. (Figure
10.1) Later in 2006, it became the Weapons of Mass Destruction
Directorate (WMDD). The branch links intelligence scientific and
operational components to detect and disrupt the acquisition of
WMDD against America.
Between 2014 in 2016, the lessons of dark winter were not applied,
and the nation faced the Ebola crisis. When the outbreak began
in West Africa, the world watched as it spread quickly through
West African countries. 10,000 people were infected with the Ebola
virus, and more than half of that number died. It became a United
States national security top priority, sending troops to assist with
the $400 million humanitarian effort. When the virus reached The
U.S. borders, it was not met with any sort of barrier requirements.
The personal protective equipment could not protect against the
pathogen, causing patients to be isolated. Quick reaction by the
government and the medical community The United States suffered
only 11 cases, which resulted in two deaths and nine survivors.
Following the Ebola crisis, the House of Representative’s
subcommittees examined pandemic /biological terrorist attack
preparedness. U.S. presidential Directive (PPD)-39 outlined the
responsibilities of five federal agencies regarding WMD exercises
(Foley, 2017). The directive had assigned specific tasks to each of the
five agencies. It did not provide a plan for a coordinated response to
a biological attack
Also, PDD-39 was at the federal funding level and did not account
for the states (Foley, 2017). From 2004 leading up to the Ebola crisis,
PATHOGENS
There are several types of BTA (pathogens) used for biological
weapons. Biological agents can be divided into several related
groups (See Table 10.1). These include bacteria and rickettsia,
viruses, and toxins. Bacterial and viral agents cause disease and
can multiply and spread beyond the initial attack.[5] Toxins are
poisonous substances produced by living things, some of which are
extremely lethal. Toxins are not contagious. Some of the bacteria
that cause disease include anthrax, plague, cholera, diphtheria,
tuberculosis, typhoid fever, typhus, Legionnaire’s disease, Lyme
disease, and strep infections. Other bacteria produce toxins that
are chemical poisons, such as botulinum. More bacteria exist in a
handful of soils or in a person’s mouth than all the people who have
ever lived on earth. When someone sneezes, over a million bacteria
can be disseminated. Over 90% of all feces is made up of bacteria.
More bacterial cells than human cells exist in your body. From
300,000 to 1,000,000 different types of bacteria exist on Earth. The
majority of common bacteria is not pathogenic nor parasitic. Some
have mutated and learned to invade other cells and cause disease.
1 to 50 1 to 10 >2
Tularemia Aerosol No Moderate
organisms days weeks
Aerosol,
10 14 to 26
Q Fever sabotage ( Rare Weeks Very low
organisms days
food supply)
Bacterial Agents
• Abdominal pain
• Acute inflammation of the intestinal tract
• Nausea
• Loss of appetite
• Vomiting
• Fever
• Abdominal pain
• Vomiting of blood
• Severe diarrhea
Toxins are unlike chemical agents in that they vary widely in their
mechanism of action. ( Table 10.4) Length of time from exposure to
onset of symptoms also varies significantly. In battlefield scenarios,
preparations can be made for treatments and preventive measures.
However, in a terrorist threat, preparation is not as easy, because it
is unknown when or where the terrorist will strike, or which agent
would be used. (Burke, 2017)
Time to Hours
Minutes Hours (1-6)
symptoms (12-48)
Convulsions,
Progressive
Nervous Muscle Headache, muscle aches
paralysis
twitching
Slow heart
Cardiovascular Normal rate Normal or rapid rate
rate
Difficult Normal
Non-productive cough;
breathing, then
Respiratory severe cases: chest pain,
airway progressive
difficult breathing
constriction paralysis
Increased
Decreased Nausea, vomiting,
Gastrointestinal motility, pain,
motility diarrhea
diarrhea
Droopy Red eyes, conjunctival
Ocular Small pupils
eyelids injection
Profuse Normal but
Slight increased
Salivary watering difficult
quantities of saliva
saliva swallowing
BACTERIA
Germany;
Allies; WWI;
(4)
High fatality
Japan;
Yersinia pestis Inhalation, rate,
US, USSR, Japan China;
(plague) animal vectors secondary
WWII.
transmission
Infectivity,
USSR; Ingestion,
Francisella difficult
German inhalation,
tularensis US, USSR, Japan diagnosis,
troops; contact, animal
(tularemia) antibiotic
WWII (5) vectors
resistance
Infectivity,
USSR; stability,
Coxiella
German Inhalation, secondary
burnetti (Q US, USSR
troops; animal vectors infection from
fever)
WWII (5) animal
vectors
Germany;
Brucella Allies; WWI; Inhalation,
Aerosol
species US (4) ingestion,
dispersion
(brucellosis) contact
Japan;
China and
Burkholderia Manchuria; Infectivity,
Germany, Japan, Inhalation,
mallei WWII; high
US, USSR contact
(glanders) USSR; morbidity
Afghanistan;
1982-4 (5)
VIRUSES
TOXINS
Mycotoxins
USSR; Laos; Contact,
(including
USSR; Iraq inhalation, Incapacitation
aflatoxin, T-2
1975-81 ingestion
toxins)
USSR; Iraq,
Clostridium Extreme
USSR, Germany, Aum
botulinum inhalation, toxicity;
Japan, Shinrikyo;
toxin ingestion aerosol
1990-95
(botulism) dispersion
Aum Shinrikyo
Soviet
inhalation,
assassin;
US, UK, USSR, ingestion, Widespread
Ricin Georgi
Iraq, Al Qaeda availability
Markov;
intramuscular
1978
Staphylococcal
inhalation,
enterotoxin B US incapacitation
ingestion
(SEB)
In italics.
(2) Accidental Attempted
Are in plain text. Successful Bold
releases use shown
attacks in
Transmission
(3) Common Transmission Shown in
mode posing Threat in bold
natural mode italics & Red
greatest
(4) Against Human
Rather than
livestock targets
It can take from days to weeks before the U.S. government can
coordinate an effective interagency response to bioterror events
through the unsecured BioWatch portal. BioWatch program
reported between 2003 to 2011 having 56 false alarms. Thus, putting
the credibility of the BioWatch program in question. The U.S. started
development on a Generation-3 system
DNA collection can occur for medical reasons. DNA data can live
on the physical computer systems of the lab, a medical professional
or their gloves, treatment center/hospital, health care company,
university, and in some cases, a state. It was confirmed in 2017 by
news reports that Asian based firms have obtained U.S. DNA data
and plan to collect additional Americans DNA through commercial
and medical means (Javers, 2017). Since that report, several
healthcare companies, facilities, and organizations have suffered
data breaches. [11]
There are risks and benefits to dual use DNA collection. The
primary concerns are the amount of data being collected; who
collects and filters /categorizes the data; who owns the data; where
Nanowire
In 2005, research was completed on the concept of using
nanowires, as ultrasensitive electronic sensors to detect biological
and chemical agents (Fernando Patolsky, 2005). Dr. Charles Lieber
and Professor Fernando Patolsky discuss the creation of a sensor
that’s configured with nanowire with the natural oxide coding. The
aforementioned receptor construction is more efficient than the
current modification of glass or a Silicon oxide to create the sensor
(Fernando Patolsky, 2005). When a virus particle binds to an
antibody receptor on a nanowire device, the conductance of that
device will change from the baseline value. When the virus unbinds
again, the conductance will return to the baseline value (Fernando
Patolsky, 2005). When the nanowire encounters influenza the
nanowire reflects accurate characteristics that are consistent with
influenza viruses. The sensor is able to produce optical and
electrical data it receives from the nanowire as the virus diffuses
near the nanowire device (Fernando Patolsky, 2005). The Harvard
team was able to determine the difference in distance of spacing
the nanowires over different size areas when the sensor could
encounter and detect two other viruses. Dr. Charles Lieber and
Professor Fernando Patolsky concluded that nanowire sensors
The federal government has clamped down on the sale and use
of biological agents in research facilities. A program has been
developed to control the “Transfer or Receipt of Select agents.”
(Burke, 2017)The Anti-Terrorism and Effective Death Penalty Act
of 1996 requires regulation of shipment and receipt of certain
microorganisms and toxins. Regulations are detailed in Appendix E
of (Burke, 2017) This reference also give over 20 pages of resources,
websites, agency contacts, notifications to gain more information or
report an incident. (Burke, 2017)
References
The federal government has clamped down on the sale and use
of biological agents in research facilities. A program has been
developed to control the “Transfer or Receipt of Select agents.”
(Burke, 2017)The Anti-Terrorism and Effective Death Penalty Act
of 1996 requires regulation of shipment and receipt of certain
microorganisms and toxins. Regulations are detailed in Appendix E
of (Burke, 2017) This reference also give over 20 pages of resources,
websites, agency contacts, notifications to gain more information or
report an incident. (Burke, 2017)
References
CDC Category A
These organisms pose a risk to national security because they can
be easily disseminated or transmitted from person to person. They
result in high mortality rates and have the potential for major public
health impact and might cause public and social disruption. They
require special action for public health preparedness.
CDC Category B
These are moderately easy to disseminate and result in moderate
morbidity rates and low mortality rates. They require specific
enhancements of CDC’s diagnostic capability and enhanced disease
surveillance.
CDC Category C
These agents include emerging pathogens that could be
engineered for mass dissemination in the future because of
availability, ease of production and dissemination, potential for high
morbidity
and mortality rates, and major health impact.
Type
[3] The James Bond movie Goldfinger had toxins released from crop
dusters on Fort Knox troops.
[9] Think movie Minority Report where Tom Cruise replaces his
eye to bypass biometric security controls and as he passes optical
readers at a mall, the stores pitch him for their goods based on the
wrong profile.
[10] Recognize that the government and LEO all have access to
this data. LEO does use DNA data responsibly to solve outstanding
felony cases. However, it is up for grabs whether we believe that the
government is so attentive and responsible with our private data.
[11] There is little definitive proof that the breaches were related to
the DNA data thefts.