Tag Archives: terrorism

The Dual Use Dilemma: Biological Research and Security in an Age of Terrorism

The great achievements of molecular biology and genetics over the last 50 years have produced advances in agriculture and industrial processes and have revolutionized the practice of medicine. The very technologies that fueled these benefits to society, however, pose a potential risk as well—the possibility that these technologies could also be used to create the next generation of biological weapons. Biotechnology represents a “dual use” dilemma in which the same technologies can be used legitimately for human betterment and misused for bioterrorism.

The Institute of Medicine and the National Research Council have produced a number of reports on the subject of bioterrorism and dual use issues in life science research. All are free to download.

Biotechnology Research in an Age of Terrorism

Download Free PDF

Biotechnology Research in an Age of Terrorism
164 pages | Paperback | Price: $31.50
In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them…[more]
Challenges and Opportunities for Education About Dual Use Issues in the Life Sciences

Download Free PDF

Challenges and Opportunities for Education About Dual Use Issues in the Life Sciences
146 pages | Paperback | Price: $22.50The Challenges and Opportunities for Education About Dual Use Issues in the Life Sciences workshop was held to engage the life sciences community on the particular security issues related to research with dual use potential. More than 60 participants from… [more]
A Survey of Attitudes and Actions on Dual Use Research in the Life Sciences

Download Free PDF

A Survey of Attitudes and Actions on Dual Use Research in the Life Sciences: A Collaborative Effort of the National Research Council and the American Association for the Advancement of Science
188 pages | Paperback | Price: $78.30 The same technologies that fuel scientific advances also pose potential risks–that the knowledge, tools, and techniques gained through legitimate biotechnology research could be misused to create biological weapons or for bioterrorism. This is often called… [more]
Globalization, Biosecurity, and the Future of the Life Sciences

Download Free PDF

Globalization, Biosecurity, and the Future of the Life Sciences
318 pages | Paperback | Price: $50.40
Biomedical advances have made it possible to identify and manipulate features of living organisms in useful ways&#8212leading to improvements in public health, agriculture, and other areas. The globalization of scientific and technical expertise also means that… [more]

 

Biological Threats and Terrorism

Download Free PDF

Biological Threats and Terrorism: Assessing the Science and Response Capabilities: Workshop Summary
336 pages | Paperback | Price: $37.80 In the wake of September 11th and recent anthrax events, our nation?s bioterrorism response capability has become an imminent priority for policymakers, researchers, public health officials, academia, and the private sector. In a three-day workshop, convened by.. .[more]

The Anthrax Threat Ten Years after the Letter Attacks

Ten years ago, five Americans were killed and 17 were sickened in the worst biological attack in U.S. history when letters containing the bacterium Bacillus anthracis (B. anthracis, or more simply, anthrax) were sent through the mail. From October 4 to November 20, 2001, an additional 31 people tested positive for exposure to B. anthracis spores and approximately 32,000 individuals initiated a preventive antibiotic regime.

The National Research Council and the Institute of Medicine recently examined the threat of anthrax. Review of the Scientific Approaches Used During the FBI’s Investigation of the 2001 Anthrax Letters focuses on the investigation of the 2001 attacks. This book evaluates the scientific foundation for the specific techniques used by the FBI to determine whether these techniques met appropriate standards for scientific reliability and for use in forensic validation, and whether the FBI reached appropriate scientific conclusions from its use of these techniques.

Prepositioning Antibiotics for Anthrax addresses proactive efforts to provide treatment in the event of an aerosol B. anthracis or other bacterial agent event. Rapid access to antibiotics is critical for preventing and treating illness and death due to this kind of bioterrorism attack. Yet the logistics of effectively delivering antibiotics to prevent anthrax infection pose a tremendous challenge because such an attack could potentially expose a large number of people who would require antibiotics within a relatively brief time window. For example, if aerosolized anthrax were released over a large, densely populated area, hundreds of thousands of people could need antibiotics to prevent deadly inhalational anthrax. This book evaluates new dispensing strategies to provide antibiotics to all exposed and potentially exposed individuals.

Both of these books are available to read or download online at no charge.

Review of the Scientific Approaches Used During the FBI's Investigation of the 2001 Anthrax Letters
Review of the Scientific Approaches Used During the FBI’s Investigation of the 2001 Anthrax Letters

Less than a month after the September 11, 2001 attacks, letters containing spores of anthrax bacteria (Bacillus anthracis, or B. anthracis) were sent through the U.S. mail. Between October 4 and November 20, 2001, 22 individuals developed anthrax; 5 of the…
Details

Prepositioning Antibiotics for Anthrax
Prepositioning Antibiotics for Anthrax

If terrorists released Bacillus anthracis over a large city, hundreds of thousands of people could be at risk of the deadly disease anthrax – caused by the B anthracis spores – unless they had rapid access to antibiotic medical countermeasures (MCM). Although…
Details

Biometric Recognition: Status and Prospects for Security Technology

Recently biometrics has been in the news as a key to identifying the body of Osama bin Laden after the raid in Pakistan. Heightening security concerns around the world are leading to an expanded use of automated recognition technologies for individuals based on their behavioral and biological characteristics. Biometric systems are used increasingly to recognize individuals and regulate access to physical spaces, information, services, and other rights or benefits.

Because biometric systems use sensed traits to recognize individuals, privacy, legal, and sociological factors are involved in all applications. Biometrics in this sense sits at the intersection of biological, behavioral, social, legal, statistical, mathematical, and computer sciences as well as sensor physics and philosophy. It is no wonder that this complex set of technologies called biometrics has fascinated the government and the public for decades.

Biometric Recognition: Challenges and Opportunities provides a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development This book addresses issues of effectiveness, design, and uncertainty surrounding broader implementation of this technology.

Who Goes There? Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. This book offers a comprehensive set of guidelines to ensure that an individual’s privacy is not unnecessarily compromised, whether by commercial or government organizations.

These books and others from the Computer Science and Telecommunications Board can add perspective and contribute to discussion.

Biometric Recognition
Biometric Recognition: Challenges and Opportunities 

Biometric recognition–the automated recognition of individuals based on their behavioral and biological characteristic–is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and…
Details

Who Goes There?
Who Goes There?: Authentication Through the Lens of Privacy 

Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more…
Details

Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems
Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems 

Biometricsthe use of physiological and behavioral characteristics for identification purposeshas been promoted as a way to enhance security and identification efficiency. There are questions, however, about, among other issues, the effectiveness of biometric…
Details

Engaging Privacy and Information Technology in a Digital Age
Engaging Privacy and Information Technology in a Digital Age 

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and…
Details

Protecting Individual Privacy in the Struggle Against Terrorists
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment 

All U.S. agencies with counterterrorism programs that collect or “mine” personal data — such as phone records or Web sites visited — should be required to evaluate the programs’ effectiveness, lawfulness, and impacts on privacy. A framework is…
Details

Getting Personal: Balancing Privacy and Security in the Fight Against Terrorism

Recent debate over full-body scanners at airport security checkpoints once again highlights the issues we face in balancing security with privacy. We are observed at work, in stores, and on the street by security systems. By our own choice, we use online resources to bank, shop, contact friends and family, and apply for loans. In countless other ways we may unknowingly reveal personal information. Technological advances in biometric recognition, data mining, e-commerce and behavioral surveillance all raise questions about exactly how personal our personal information is.

Protecting Individual Privacy in the Struggle Against Terrorists examines existing privacy laws to assess how privacy can be protected in current and future programs. Law-abiding citizens leave extensive digital tracks, and so do criminals and terrorists. Gathering and analyzing electronic, behavioral, biological, and other information can play major roles in the prevention, detection, and mitigation of terrorist attacks, just as they do against other criminal threats. This book provides a framework for making decisions about deploying and evaluating information-based programs on the basis of their effectiveness and associated risks to personal privacy.

Released this year, Biometric Recognition: Challenges and Opportunities deals with unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. These books and other titles from the Computer Science and Telecommunications Board can inform and guide discussion of this important issue.

Protecting Individual Privacy in the Struggle Against Terrorists Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment

All U.S. agencies with counterterrorism programs that collect or “mine” personal data — such as phone records or Web sites visited — should be required to evaluate the programs’ effectiveness, lawfulness, and impacts on privacy. A framework is…
Details

Biometric Recognition Biometric Recognition: Challenges and Opportunities

Biometric recognition–the automated recognition of individuals based on their behavioral and biological characteristic–is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and…
Details

Toward a Safer and More Secure Cyberspace Toward a Safer and More Secure Cyberspace

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit…
Details

Engaging Privacy and Information Technology in a Digital Age Engaging Privacy and Information Technology in a Digital Age

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and…
Details