EMERGING TECHNOLOGIES: Recommendations for Counter-

1,36
MB Terrorism

451
stron

3817
ID Institute for Security Technology Studies, Dartmouth College

2001
rok

CONTENTS

FOREWARD1

MISSION STATEMENT3

FINDINGS6

Biological Emerging Threats Assessment: Response Recommendations

David Franz, PhD, and Charles Lucey, MD, JD, MPH

POLICY

Introduction13

Joseph Rosen, MD

1.) Terrorism, The Future, U.S. Foreign Policy.16

Raphael Perl

2.) National Commission on Terrorism Report: Background and Issues for Congress33

Raphael Perl

3.) The United States Response to Terrorism- Is it Time to Employ the Drug Czar Model39

Raphael Perl and Charles Lucey, MD, JD, MPH

4.) Terrorism: U.S. Response to Bombings to Kenya and Tanzania: A New Policy Direction?.46

5.) Terrorist Attack on USS Cole: Background and Issues for Congress52

Raphael Perl and Ronald O Rourke

PLANS

Introduction.58

Joseph Rosen, MD

6.) Challenges in Coordinating the Response to Bioterrorism61

Michael Ascher, MD, FACP

7.) Summary of Five State Emergency Response Plans64

Charles Lucey, MD, JD, MPH

8.) Examining the Military and Law Enforcement Terrrorism Counteraction Model: A Template for

Medical Response to Biological Terrorism?.69

William Bograkos and Daniel Kaszeta

9.) Bio-Medical Aspects of Bio-Terrorism and a Call to Action.80

Paul Roth, MD, Brian Hjelle, MD and John Gaffney, BBA, CEM, TEMT-P

10.) Federal Response Plan, Terrorism Incident Annex86

EMERGING TECHNOLOGIES - THREATS: TERRORISTS TOOLS AND WEAPONS

Introduction103

Joseph Rosen, MD

11.) Possible Terrorist Use of Modern Biotechnology Techniques.106

Raymond Zilinskas, PhD

12.) Application of Gene Therapy Strategies to Offensive and Defensive Biowarfare122

Chris Lowrey, MD

13.) The New Battlefield in our City Streets: The Epidemiology of Biological Terrorism in the US and

Some Thoughts on the Way Ahead.127

David Franz, PhD, DVM

14.) An Assessment of Biological Weapons Threat to the United States132

Milton Leitenberg

15.) Averting the Hostile Exploitation of Biotechnology156

Matthew Meselson

16.) Chemical and Biological Weapon Terrorism: Assessing the challenges from sub-state

proliferations.164

Jean Pascal Zanders, PhD

17.) The Infrastructure Web: A System for Distributed Monitoring and Management191

George Cybenko, PhD and Guofei Jiang

18.) Mobile Code: Emerging Cyberthreats and Protection Techniques203

Jian Zhao, PhD

19.) Digital Medical Information and Relevant Security Issues.210

Bill Reinsch

RESPONSES: COUNTERTERRORIST TOOLS

Introduction.222

Joseph Rosen, MD

Prevention:

20.) Global Strategy to Prevent Biological Terrorism.225

Hon. Michael Moodie, Dr. Andrew Schmookler and Richard Hutchinson, PhD

21.) Deterring CBRN Terrorism: Developing a Conceptual Framework.233

Michael Powers

Treatments:

22.) Biological Terrorism Variables and Emergency Response Concepts248

Richard Hutchinson, PhD

23.) MEDNET: A Medical Simulation Network Grand Challenge.258

Michael Myjak, MS and Joseph Rosen, MD

24.) Cybercare266

Joseph Rosen, MD

25.) National Institute for Urban Search and Rescue Requirements Committee270

Bobby Hartway

26.) Cybercare Robots.279

Neil J. Fisher NREMT

27.) Information Technology and Medical Response to Bioterrorism287

Jon Bowersox, MD, PhD

28.) Clinical Practice Guideline - Review of Telemedicine294

G. Ayorkow Mills-Tettey

29.) Persistence of Native and Non-indigenous Microorganisms in Winter Conditions299

Mike Reynolds, PhD

CONCLUSION.301

APPENDICES

30.) Terms and Definition304

31.) Recommended Reading321

32.) Website Description324

33.) Summary of white papers.329

34.) PowerPoint Presentations Advances in Biotechnology: Promise and Peril.353

George Poste

Future Strategic Issues/Future Warfare.360

Dennis Bushnell

35.) Scenarios

2000 Pneumonic Plague-Hanover, New Hampshire.365

August -December 2000-Uganda s Ebola Outbreak368

2005- Hanover Virus.387

2025-Combined Bio and Cyberthreat.412

36.) Participant Listing.418

37.) July and September Conference Agendas422

38.) Summary of July Conference.424

39.) Description of Institute for Security Technology Studies..438