{"title":"BioIntel: Leveraging Information to Prevent Biological Weapons Attacks","authors":"Jeff Mustin","doi":"10.1515/2154-3186.1020","DOIUrl":null,"url":null,"abstract":"Identifying and assessing biological weapons (“BW”) programs has been a fatal flaw in the United States defense posture since the Cold War. From the time when the Berlin Wall was torn down and the technology used to build BW proliferated worldwide, the BW threat has become more immediate, however the ability to identify hostile BW programs and assess their capabilities has received little attention. This paper seeks to identify ways to leverage information that might prevent a BW attack on the United States. It begins by looking at historical trends in the failure to assess, continues with a brief analysis of the intelligence collection cycle, and then looks to tailor the cycle to meet this unique threat.","PeriodicalId":378562,"journal":{"name":"Journal of Biosecurity, Biosafety and Biodefense Law","volume":"333 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Biosecurity, Biosafety and Biodefense Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/2154-3186.1020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Identifying and assessing biological weapons (“BW”) programs has been a fatal flaw in the United States defense posture since the Cold War. From the time when the Berlin Wall was torn down and the technology used to build BW proliferated worldwide, the BW threat has become more immediate, however the ability to identify hostile BW programs and assess their capabilities has received little attention. This paper seeks to identify ways to leverage information that might prevent a BW attack on the United States. It begins by looking at historical trends in the failure to assess, continues with a brief analysis of the intelligence collection cycle, and then looks to tailor the cycle to meet this unique threat.