DOC PREVIEW
UW CSEP 590 - Biological Weapons A Counterterrorism Perspective

This preview shows page 1-2-3-4-5-6 out of 17 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 17 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Biological Weapons A Counterterrorism PerspectiveThe public is exposed to a lot of information about potential biological attacksBiosecurity is a multifaceted problem that requires integrating many disparate componentsWe would like to know even more!The human and economic impact of endemic pathogens can be amplifiedA stratified view of bioterrorist threatsLooking for solutions: there are significant benefits to early detection of a biological attackExamples for preventing, detecting, and responding to WMD eventsExamples for preventing, detecting, and responding to WMD eventsExamples for preventing, detecting, and responding to WMD eventsExamples for preventing, detecting, and responding to WMD eventsDeveloping new operational capabilities took several years and integration across multiple disciplinesEarly detection combined with models of dispersion are valuableWhat community norms can be established, promoted or enforced?There are critical shortfalls in the nation’s infrastructure for dealing with bio-terrorismAn example of rapid response 2003 Exotic Newcastle Disease Virus outbreakDisclaimerBiological WeaponsA Counterterrorism PerspectiveUniversity of CaliforniaLawrence Livermore National LaboratoryJ. Patrick Fitch, Ph.D.Program LeaderChemical & Biological National SecurityOctober 19, 2005UCRL-PRES-151152 Version 051019For additional information contact J.P. Fitch at [email protected] work was performed under the auspices of the U.S. Department of Energy by the University of California, Lawrence Livermore National Laboratory under Contract No. W-7405-Eng-48.Lawrence Livermore National Laboratory 2The public is exposed to a lot of information about potential biological attacksInitiation of BioWatch at the State of the Union on January 28, 2003: “…deploying the nation's first early warning network of sensors to detect biological attack”What are the key issues around BW and BW defense?What are distractions?What are the key issues around BW and BW defense?What are distractions?Lawrence Livermore National Laboratory 3Biosecurity is a multifaceted problem that requires integrating many disparate componentsLink all of these components into a coherent architectureLink all of these components into a coherent architectureVaccines• Development• Efficacy• DeploymentPathogen biology• Infectivity• Signatures• ManipulationData• Collections• All source• Directed discoveryValidation• Signatures• Assays• Processes• Chain-of-custodyThreats• Weaponized• GM• Individual• State sponsoredEpidemiology• Early detection• PrivacyInterpretation• Feasibility• IntentBackgrounds• Natural• ManufacturingSurveillance• Sensitivity• Specificity• ResponseThreatAssessmentsS&TKnowledge ManagementBiosecurity ComponentsAnticipate Prepare Prevent Detect Response AttributeLawrence Livermore National Laboratory 4We would like to know even more!BW attacks sound scary Genetically modified threat Bio Terror & Bio Error“Mother Nature” as terrorist Re-emergent diseases InfluenzaDiscovery of 5 virulence-associated signaturesNorthern Arizona University studenttesting prairie dog colonyLawrence Livermore National Laboratory 5DifficultyEndemicCleverUseModified• Genetic mods• WeaponizedImpactThe human and economic impact of endemic pathogens can be amplifiedThe systems-level challenge is to counter numerous potential threatsThe systems-level challenge is to counter numerous potential threatsLawrence Livermore National Laboratory 6A stratified view of bioterrorist threatsLevel II (1000 – 10,000)Level I (1 – 1000)Level III (>10,000)• Scale?To PreventTo ProtectTo Treat & / or Isolate • Detect?ContagiousNon-ContagiousAerosolFood supplyWater supplyCarrierTreatable (Plague)Non-Treatable (Ebola)Treatable (Anthrax)Non-Treatable (EEV)• Agent?Lawrence Livermore National Laboratory 7Looking for solutions: there are significant benefits to early detection of a biological attackTreatments and quarantines must be administered early13 to 4Plague32 to 5Influenza1 to 25 to 7Pulmonary Anthrax3 to 412 to 14SmallpoxIntervention window (days)Incubation period (days)DiseaseA combination of complementary strategies are needed for early detectionA combination of complementary strategies are needed for early detectionLawrence Livermore National Laboratory 8ContagiousExposedExamples for preventing, detecting, and responding to WMD eventsTimePrevent Environmental detection Response and restorationLawrence Livermore National Laboratory 9ContagiousExposedExamples for preventing, detecting, and responding to WMD eventsSignaturesBackgroundsForensics andattributionPrevent Environmental detection Response and restorationLawrence Livermore National Laboratory 10ContagiousExposedExamples for preventing, detecting, and responding to WMD eventsSignaturesBackgroundsForensics andattributionDetect to prophylaxDetect to warnPrevent Environmental detection Response and restorationLawrence Livermore National Laboratory 11ContagiousExposedExamples for preventing, detecting, and responding to WMD eventsSignaturesBackgroundsForensics andattributionDetect to prophylaxDetect to warnEpidemiology to treatConsequencemanagementTriage DxNew strategies?EmergingThreatPrevent Environmental detection Response and restorationLawrence Livermore National Laboratory 12Developing new operational capabilities took several years and integration across multiple disciplines⎭⎬⎫⎩⎨⎧⎭⎬⎫⎩⎨⎧UIInnttNTCepheidSmithsGACAAAAGCGACAAAGGTTTTGTTCTTGGTCAATCCTCTCCTTTGCACGCCGTGGGACCATAGCTACAGATCACTTTACCTGCG.TGGGTGAACGCCGTGTGCGGμTechGenomicsValidated assaysEnablinginstrumentationLawrence Livermore National Laboratory 13Early detection combined with models of dispersion are valuable Bio attacks may not be visible Want to act before symptoms present Identify affected area / people / livestock Prophylax, treat and clean-up BUT timelines are not short enough!>15- and >150-μg/m3contoursStaten Island Fire(Feb. 21, 2003)Lawrence Livermore National Laboratory 14What community norms can be established, promoted or enforced? Biological Weapons Convention is intent-based US offensive BW program terminated in 1969- ‘Frozen’ perspective on BW- Recent investments in biodefense Are BW the “poor man’s” nuke?- Role of deterrence?- What value does attribution provide?- When would a nation turn to BW?- When would a terrorist group?- Latency? Contrast to other areas- OPCW,


View Full Document

UW CSEP 590 - Biological Weapons A Counterterrorism Perspective

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Biological Weapons A Counterterrorism Perspective
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Biological Weapons A Counterterrorism Perspective and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Biological Weapons A Counterterrorism Perspective 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?