Water
News Type
News
Date
Paragraphs

CISAC awarded honors certificates in international security studies to 14 undergraduates who completed theses on policy issues ranging from speeding up the detection of a bioterror attack to improving the World Bank's effectiveness at post-conflict resolution.

Among the 2006-2007 participants in CISAC's Interschool Honors Program in International Security Studies were award winners Brian Burton, who received a Firestone Medal for his thesis, "Counterinsurgency Principles and U.S. Military Effectiveness in Iraq," and Sherri Hansen, who received the William J. Perry Award for her thesis, "Explaining the Use of Child Soldiers." The Firestone Medal recognizes the top 10 percent of undergraduate theses at Stanford each year, and the Perry recognizes excellence in policy-relevant research in international security studies.

CISAC honors students "can make the world a more peaceful place in several ways," FSI senior fellow Stephen Stedman told students and guests at the honors ceremony. "They can graduate and find jobs of power and influence [and] they can identify real world problems and solve them."

This year's class, which included several double-majors, represented nine major fields of study: biology, history, human biology, international relations, mathematics, management science and engineering, physics, political science, Russia-Eurasian studies. Some students headed to business or policy positions, while others looked forward to advanced studies in law, medicine, biophysics, security studies, or other fields.

"I hope that this is the beginning, not the end, of your contributions to policy-relevant research," CISAC senior research scholar Paul Stockton, who co-directed the program with Stedman, told the students. He added, "In every potential career you have expressed a desire to pursue, from medicine to the financial sector and beyond, we need your perspectives and research contributions, to deal with emerging threats to global security."

Many students expressed interest in realizing that hope. Burton said his aspiration is to attain "a high-level cabinet or National Security Council position to cap a long career of public service in foreign policy."

Katherine Schlosser, a biology major who is headed to Case Western Reserve University for joint MD-master's in public health program, said she hopes to "keep conducting innovative research and to eventually rejoin the international security studies community in some capacity."

The 2007 honors recipients, their majors, thesis titles, advisers, and destinations, if known, are as follows:

Brian Burton, political science
"Counterinsurgency Principles and U.S. Military Effectiveness in Iraq"
Firestone Medal Winner

Adviser: David Holloway
Destination: Georgetown University, to pursue a master's degree in security studies

Martine Cicconi, political science
"Weighing the Costs of Aggression and Restraint: Explaining Variations in India's Response to Terrorism"
Adviser: Scott Sagan
Destination: Stanford University Law School

Will Frankenstein, mathematics
"Chinese Energy Security and International Security: A Case Study Analysis"
Adviser: Michael May
Destination: The Institute for Defense Analyses in Alexandria, Va., for a summer internship

Kunal Gullapalli, management science & engineering
"Understanding Water Rationality: A Game-Theoretic Analysis of Cooperation and Conflict Over Scarce Water"
Adviser: Peter Kitanidis
Destination: Investment Banking Division at Morgan Stanley in Los Angeles

Sherri Hansen, political science
"Explaining the Use of Child Soldiers"
William J. Perry Award Winner

Adviser: Jeremy Weinstein
Destination: Oxford University in England, to pursue master's degree in development studies

Andy Leifer, physics and political science
"International Scientific Engagement for Mitigating Emerging Nuclear Security Threats"
Adviser: Michael May
Destination: Harvard University, to pursue a PhD in biophysics

James Madsen, political science
"Filling the Gap: The Rise of Military Contractors in the Modern Military"
Adviser: Coit Blacker
Destination: World travel; then San Francisco to open a bar

Nico Martinez, political science
"Protracted Civil War and Failed Peace Negotiations in Colombia"
Adviser: Stephen Stedman
Destination: Washington, DC, to serve as a staff member for Senator Harry Reid

Seepan V. Parseghian, political science and Russian/Eurasian studies
"The Survival of Unrecognized States in the Hobbesian Jungle"
Advisor: James Fearon

Dave Ryan, international relations
"Security Guarantees in Non-Proliferation Negotiations"
Adviser: Scott Sagan
Destination: Stanford University, to serve as executive director of FACE AIDS

Katherine Schlosser, biology
"Gene Expression Profiling: A New Warning System for Bioterrorism"
Adviser: Dean Wilkening
Destination: Case Western Reserve University in Cleveland, to pursue a joint medical degree and master's in public health

Nigar Shaikh, human biology and political science
"No Longer Just the 'Spoils of War': Rape as an Instrument of Military Policy"
Adviser: Mariano-Florentino Cuellar

Christine Su, history and political science
"British Counterterrorism Legislation Since 2000: Parlimentary and Government Evaluations of Enhanced Security"
Adviser: Allen Weiner
Destination: Stanford University, to finish her undergraduate degree; Su completed the honors program as a junior.

Lauren Young, international relations
"Peacebuilding without Politics: The World Bank and Post Conflict Reconstruction"
Adviser: Stephen Stedman
Destination: Stanford University, to finish her undergraduate degree; Young completed the honors program as a junior.

All News button
1

This project involves political scientists, economists, and medical researchers to address the question of whether hunger, poverty, disease and agricultural resource constraints foster civil conflict and international terrorism. Economists have elucidated the links between agricultural stagnation, poverty, and food insecurity, and political scientists have empirically analyzed the role of poverty in facilitating civil conflict.

-

The siting and construction of high-level biocontainment facilities involves a complex review process with environmental impact documents, legally mandated reviews, and public involvement in decision making about associated risks. In some cases, serious public opposition and legal challenges may arise during the review and approval stages of a project. The recent proposed construction of NIH-NIAID regional and national biocontainment labs provided an opportunity for a real-time study of the review and approval processes associated with labs in many different locations. By analyzing environmental impact documents, mass media coverage, internet communications, and detailed timelines at the various labs, it was possible to identify common issues and features associated with labs in general, as well as specific concerns associated with those where public controversies and opposition arose. The study focused on both good and bad experiences at various recently proposed lab sites and compared them with other past case examples to identify 'lessons learned' that are relevant to both current and future biocontainment projects. Overall, the study documented the continuing importance of trust, transparency, and due process in public decision making and highlighted the importance of developing and implementing a comprehensive pro-active risk communication strategy at the earliest stages of project planning. The study also documented indications of public insecurity associated with biodefense research, which may translate into future problems for public health researchers.

Margaret Race is an ecologist working with NASA through the SETI Institute in Mountain View, Calif. She recently completed a study on public decision making and risk communication associated with the construction of BSL-3 and BSL-4 biocontainment labs nationwide. The study, which was begun during a fellowship at Stanford University and CISAC, reflects her longstanding interest in risk perceptions, legal and societal issues, public communication and education associated with controversial science and technological proposals. In her work with NASA, she focuses on planetary protection and the search for extraterrestrial life--which will someday involve construction of a BSL-4 biocontainment lab for handling and testing scientific samples returned from Mars and other solar system locaitons. During the past decade, she has been a lead member of an international team of researchers that helped NASA develop a protocol for the quarantine, handling, and testing of extraterrestrial samples from Mars. She has served on numerous National Resource Council studies analyzing risk communication and societal issues associated environmental protection on Earth and in space. Dr. Race received her BA degree in Biology and MS degree in Energy Management and Policy from the University of Pennsylvania, and her Ph.D. in Ecology/Zoology from the University of California at Berkeley. Her teaching and research work has included positions at Stanford University (Human Biology Program), UC Berkeley (Assistant Dean, College of Natural Resources), and Office of the President, University of California (Senior Science Policy Analyst and Director of Planning). She was also a Postdoctoral Fellow in Marine Policy and Ocean Management at Woods Hole Oceanographic Institution.

Reuben W. Hills Conference Room

Margaret Race Ecologist Speaker SETI Institute, Mountain View, Calif.
Seminars
Authors
Scott D. Sagan
Scott Sagan
News Type
Commentary
Date
Paragraphs

Given Tehran's defiant response to the European and American effort to constrain its nuclear program, it is time for bolder diplomacy out of Washington. U.S. President George W. Bush should take a page from the playbook of Ronald Reagan, who negotiated with an evil Soviet regime--competing in the war of ideas, but addressing the enemy's security concerns through arms-control agreements.

Iran's intransigence is both deeply unfortunate and perfectly predictable. It is unfortunate because Tehran's refusal to suspend its uranium-enrichment operations immediately--as demanded in July by the U.N. Security Council in a legally binding resolution--suggests that Iran is moving more quickly than expected toward a nuclear-weapons capability. Tehran has now turned the nuclear crisis into a test of the whole U.N. Security Council system. And Russia and China's current position, threatening to veto any biting sanctions against Iran, suggests that the Security Council may well fail this crucial test.

Tehran's response is predictable, however, because the offer on the table contains both inadequate economic carrots and barely credible threats of sanctions and military force. The carrots appeared impressive at first glance--in return for a suspension of enrichment we reportedly promised to provide light-water nuclear reactors and to help Iran with civil aviation and telecommunications technology. But we did not offer the one incentive that might possibly work, security guarantees that could reduce Iran's desire for nuclear weapons.

This omission is striking. The Iranian government can't talk openly about their security concerns because that would blow their cover story that the nuclear program is only for energy production. And Washington does not want to discuss such worries because it wants to keep open the possibility of removing the regime by force. "Security assurances are not on the table," U.S. Secretary of State Condoleezza Rice too cleverly argued this spring: "It is a little strange to talk about security guarantees ... I thought the Iranian position was that they weren't developing a nuclear bomb."

This is partly a crisis of our own making, as the Bush administration has practiced the reverse of Teddy Roosevelt's maxim--speaking loudly and carrying a small stick. Think about how Tehran reacted when Bush stated (in his second Inaugural Address), "The rulers of outlaw regimes can know that we still believe as Abraham Lincoln did: 'Those who deny freedoms to others deserve it not for themselves; and, under the rule of a just God, cannot long retain it." Or when Bush dramatically told reporters last April that "all options are on the table," in direct response to a question about whether he was considering a nuclear attack against Iran. Such statements only encourage Iran to develop a nuclear deterrent quickly, before the United States can carry out its perceived aggressive intent. Last month, Iran's National Security Council Secretary Ali Larijani pointedly complained about such rhetoric. "How can a side that wants to topple the regime also attempt to negotiate?"

Given the current vulnerability of U.S. forces in Iraq, the deteriorating situation in Afghanistan, and the lack of Israeli success against Hizbullah, Iranian officials seem confident that they face no immediate threat of a U.S. military assault. But they are clearly worried that Bush just might attack Iran right before he leaves office in January 2009, or that his successor might do so once U.S. forces withdraw from Iraq.

The best way to prevent a nuclear Iran is for Washington to offer the kind of security assurances that might reduce support in Tehran for building a nuclear arsenal. It will be hard to make such assurances credible, but a public U.S. promise to take forcible regime change off the table, and a U.N. Security Council commitment to protect the "political sovereignty" of Iran could help. Involving the Security Council could also pull China and Russia back into the nonproliferation coalition and enhance the U.N.'s legitimacy.

There is very little time left, which means negotiations should begin despite Iran's unfortunate opening position. Tehran's response reportedly indicated a willingness to negotiate all aspects of its nuclear program, so working out an agreement for Iran to limit itself to low-level uranium enrichment might still be possible. This would work only if Tehran accepts full IAEA inspections and a freeze on future centrifuge construction. Will they? The one thing that might cause Tehran to do so, and that would compensate for any loss of face, would be an assurance that the United States will not launch another preventive war, as it did in Iraq, to remove the Iranian regime. If in turn we get a nuclear-free Iran, that's a good deal for the West as well.

All News button
1
-

One of the fundamental challenges facing the United States Department of Homeland Security is the determination of what is critical in critical infrastructure systems such as water, Internet, power, energy, and transportation. Current practice is focused on single-point security audits of things like power plants, airport terminals, and refineries. But this approach does not identify the most vital components of any infrastructure which leads to an inadequate strategy and wasted funding. We show that single-point audits lead to the wrong conclusions and do not provide sufficient national security relative to the effort and money being spent. Instead, we propose an approach similar to social network analysis whereby a critical infrastructure is modeled as a network and then analyzed to identify the critical nodes and links. We present models and software to analyze such networks to obtain optimal resource allocation such that network risk is minimized. In the parlance of network science, our approach extends the theory of scale free networks to incorporate damage estimates for nodes and links. By exploiting the structure inherent in a network, we are able to allocate resources in the most optimal manner, which leads to a fundamentally different strategy than currently practiced.

Rudolph Darken is the Director of the Institute for Modeling, and Simulation (MOVES) and an Associate Professor of Computer Science at the Naval Postgraduate School in Monterey, California. He is the Chair of the MOVES Curriculum Committee and is also the Associate Director for Research for the Center for Homeland Defense and Security. His personal research has been primarily focused on human factors and training using virtual environments and computer gaming media with emphasis on navigation and wayfinding in large-scale virtual worlds. He is a Senior Editor of PRESENCE Journal, the MIT Press journal of teleoperators and virtual environments. He received his B.S. in Computer Science Engineering from the University of Illinois at Chicago in 1990 and his M.S. and D.Sc. degrees in Computer Science from The George Washington University in 1993 and 1995, respectively.

Ted Lewis is Professor of Computer Science and Academic Associate of the Homeland Security curriculum at the Naval Postgraduate School. He served as Sr. Vice President of Eastman Kodak Company, President and CEO of DaimlerChrysler Research, North America, Editor-in-Chief (twice) of IEEE Computer magazine and IEEE Software magazine, and has authored more than 100 papers and 30 books over the past 35 years on subjects ranging from software engineering, parallel processing, to hi-tech business. Currently, he teaches the Critical Infrastructure Protection course at NPS and does research in the application of network science to strategy and policy questions for the US Department of Homeland Security. Dr. Lewis' textbook, "Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation" will be published by John Wiley & Sons, in April 2006.

Reuben W. Hills Conference Room

Rudolph Darken Director, Institute for Modeling and Simulation; Associate Professor of Computer Science Speaker Naval Postgraduate School
Ted Lewis Professor of Computer Science; Academic Associate of the Homeland Security Curriculum Speaker Naval Postgraduate School
Seminars
Authors
Jonathan Farley
News Type
Commentary
Date
Paragraphs
Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition. This decision seems a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past? CISAC science fellow Jonathan Farley provides some mathematical insights.

You burst into the room. Sitting on a chair, blindfolded, his hands tied behind his back, is your prisoner. The room is dark, except for a lonely naked bulb hanging from the ceiling. He is sweating. He is afraid.

"Tell me where it is!" you scream. "Now!" You know there is little time left. Somewhere in your city, a time bomb is ticking. Whether it spits serin into the air, uranium into the water or atomic fire into the heavens, you do not know.

He does. But he is not talking. Involuntarily, you raise your hand as if to strike. What you are about to do violates the law and your conscience. And yet...

In peacetime, torture ranks next to murder as a primal sin. But during war, the debate begins over whether this evil can ever be justified to combat the seemingly greater evil of the enemy. Harvard law Professor Alan Dershowitz has said torture should be legalized.

In early October, the U.S. Senate voted 90-9 to ban it. Although Secretary of State Condoleezza Rice and President Bush have both recently asserted that "We do not torture," five U.S. Army Rangers were charged in November for punching and kicking detainees in Iraq, secret U.S. prisons have caused anxiety in Europe, and Vice President Dick Cheney has battled to win the CIA an exemption from the torture ban. As late as December, the U.S. House of Representatives stood poised to defeat the White House.

Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition.

The decision of an individual to support, or reject, torture seems at first to be a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past?

One cannot do experiments with societies, or predict the future, but, it turns out, one can attempt to address this issue using the cold, hard tools of mathematics and logic. This story begins in 1963.

The United States and the Soviet Union are on the perpetual brink of war, balanced like two sides of an equation. On the American side are "game theorists" like Thomas Schelling, recently awarded the Nobel Prize for his work on the strategy of conflict. On the Soviet side, there is the solitary mathematical psychologist Vladimir Lefebvre.

Just as mathematics could be used to describe logical reasoning, Lefebvre saw that mathematics could be used to describe ethical reasoning. If something was good -- for example, "church," "democracy," "prosperity," "kindness" -- it had value "1."

If something was evil -- "earthquake," "famine," "military defeat," "murder" -- it had value "0." But rarely were ethical situations so simple. For instance, "killing" is bad (0) but protecting one's country is good (1) -- so is war 1 or 0?

Lefebvre saw that, at the crudest level, there were essentially two types of ethical systems. Those that held that employing evil means to attain just ends was good, and those that saw that employing evil means to attain good ends was wrong.

There were also, crudely put, two types of relations between individuals: those entailing compromise (or cooperation) and those entailing confrontation.

Of course, evil people rarely see themselves as evil. So Lefebvre had to incorporate in his model of human nature the capacity of human beings to judge -- correctly or incorrectly -- the goodness or evil of their own acts, and to reflect upon their own judgments, and others'. "Reflexive Theory" was born.

It quickly became a paradigm within the Soviet defense establishment, with the publication of books such as "Mathematics and Armed Conflict." Nothing like it was known in the West.

With very simple assumptions -- for instance, that an individual who correctly sees his actions to be good when they are good, and evil if they are evil, is more highly regarded by society than an individual who incorrectly sees himself -- Lefebvre showed that in a society that accepted the compromise of good with evil, individuals would more often seek the path of confrontation with each other.

Lefebvre's insights were called upon by the State Department during negotiations with Mikhail Gorbachev in Reykjavik, Iceland. (And perhaps Lefebvre's model could be re-enlisted to help U.S. officials understand and negotiate with Arab and Muslim heads of state, who must also negotiate with their people.)

In support of Lefebvre's revolutionary new theory, a survey of Soviet émigrés and Americans was conducted in the 1970s. They were asked questions like, "Should a doctor conceal from a patient that he has cancer in order to diminish his suffering?" Overwhelmingly, the Americans would say no, and overwhelmingly, the Soviets yes. The Soviets accepted the compromise of good with evil; the Americans rejected it.

What does this mean? If Americans begin to accept the use of torture, American society might turn into a society of individuals in conflict.

Not uniformly, thanks to something called free will, but generally, with harmful consequences for society: Imagine two roads, with a stream of cars moving along each one. Each driver wants to reach his destination as quickly as possible; on occasion, drivers will impede each other.

On the first road, drivers rise in their own, and in other drivers', estimation if they yield. Drivers on the second road lose face when they yield. It is clear that traffic will move faster on the first road than on the second.

It can be argued that repressive states like Saudi Arabia, which bred most of the Sept. 11 hijackers, are on the second road. If the United States moved to accept torture, it could veer toward the second road, too -- the road of the Soviet Union.

And we know where that road ends. The Soviet Union no longer exists.

All News button
1
Paragraphs

You burst into the room. Sitting on a chair, blindfolded, his hands tied behind his back, is your prisoner. The room is dark, except for a lonely naked bulb hanging from the ceiling. He is sweating. He is afraid.

"Tell me where it is!" you scream. "Now!" You know there is little time left. Somewhere in your city, a time bomb is ticking. Whether it spits serin into the air, uranium into the water or atomic fire into the heavens, you do not know.

He does. But he is not talking. Involuntarily, you raise your hand as if to strike. What you are about to do violates the law and your conscience. And yet. ...

In peacetime, torture ranks next to murder as a primal sin. But during war, the debate begins over whether this evil can ever be justified to combat the seemingly greater evil of the enemy. Harvard law Professor Alan Dershowitz has said torture should be legalized.

In early October, the U.S. Senate voted 90-9 to ban it. Although Secretary of State Condoleezza Rice and President Bush have both recently asserted that "We do not torture," five U.S. Army Rangers were charged in November for punching and kicking detainees in Iraq, secret U.S. prisons have caused anxiety in Europe, and Vice President Dick Cheney has battled to win the CIA an exemption from the torture ban. As late as December, the U.S. House of Representatives stood poised to defeat the White House.

Few of us will ever be asked to torture. But, indirectly, all of us have to make a choice: to support, as citizens, those politicians who back torture, or those who seek its prohibition.

The decision of an individual to support, or reject, torture seems at first to be a purely moral question. But what would be the long-term consequences to society if we were to make this radical break with the past?

One cannot do experiments with societies, or predict the future, but, it turns out, one can attempt to address this issue using the cold, hard tools of mathematics and logic. This story begins in 1963.

The United States and the Soviet Union are on the perpetual brink of war, balanced like two sides of an equation. On the American side are "game theorists" like Thomas Schelling, recently awarded the Nobel Prize for his work on the strategy of conflict. On the Soviet side, there is the solitary mathematical psychologist Vladimir Lefebvre.

Just as mathematics could be used to describe logical reasoning, Lefebvre saw that mathematics could be used to describe ethical reasoning. If something was good -- for example, "church," "democracy," "prosperity," "kindness" -- it had value "1."

If something was evil -- "earthquake," "famine," "military defeat," "murder" -- it had value "0." But rarely were ethical situations so simple. For instance, "killing" is bad (0) but protecting one's country is good (1) -- so is war 1 or 0?

Lefebvre saw that, at the crudest level, there were essentially two types of ethical systems. Those that held that employing evil means to attain just ends was good, and those that saw that employing evil means to attain good ends was wrong.

There were also, crudely put, two types of relations between individuals: those entailing compromise (or cooperation) and those entailing confrontation.

Of course, evil people rarely see themselves as evil. So Lefebvre had to incorporate in his model of human nature the capacity of human beings to judge -- correctly or incorrectly -- the goodness or evil of their own acts, and to reflect upon their own judgments, and others'. "Reflexive Theory" was born.

It quickly became a paradigm within the Soviet defense establishment, with the publication of books such as "Mathematics and Armed Conflict." Nothing like it was known in the West.

With very simple assumptions -- for instance, that an individual who correctly sees his actions to be good when they are good, and evil if they are evil, is more highly regarded by society than an individual who incorrectly sees himself -- Lefebvre showed that in a society that accepted the compromise of good with evil, individuals would more often seek the path of confrontation with each other.

Lefebvre's insights were called upon by the State Department during negotiations with Mikhail Gorbachev in Reykjavik, Iceland. (And perhaps Lefebvre's model could be re-enlisted to help U.S. officials understand and negotiate with Arab and Muslim heads of state, who must also negotiate with their people.)

In support of Lefebvre's revolutionary new theory, a survey of Soviet émigrés and Americans was conducted in the 1970s. They were asked questions like, "Should a doctor conceal from a patient that he has cancer in order to diminish his suffering?" Overwhelmingly, the Americans would say no, and overwhelmingly, the Soviets yes. The Soviets accepted the compromise of good with evil; the Americans rejected it.

What does this mean? If Americans begin to accept the use of torture, American society might turn into a society of individuals in conflict.

Not uniformly, thanks to something called free will, but generally, with harmful consequences for society: Imagine two roads, with a stream of cars moving along each one. Each driver wants to reach his destination as quickly as possible; on occasion, drivers will impede each other.

On the first road, drivers rise in their own, and in other drivers', estimation if they yield. Drivers on the second road lose face when they yield. It is clear that traffic will move faster on the first road than on the second.

It can be argued that repressive states like Saudi Arabia, which bred most of the Sept. 11 hijackers, are on the second road. If the United States moved to accept torture, it could veer toward the second road, too -- the road of the Soviet Union.

And we know where that road ends. The Soviet Union no longer exists.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
San Francisco Chronicle
Authors
Jonathan Farley
Paragraphs

We investigate the impact on effective terrorism response of the viability degradation of biological weapons agents in the environment. We briefly review the scientific understanding and modeling of agent environmental viability degradation. In general, agent susceptibility to viability loss is greatest for vegetative bacteria, intermediate for viruses, and least for bacterial spores. Survival is greatest in soil and progressively decreases in the following environments: textiles, water, hard surfaces, and air. There is little detailed understanding of loss mechanisms. We analyze the time behavior and sensitivity of four mathematical models that are used to represent environmental viability degradation (the exponential, probability, and first- and second-order catastrophic decay models). The models behave similarly at short times (<30 min for our example case) but diverge to significantly different values at intermediate to long times. Hence, for a release event in which the majority of atmospheric exposure or deposition occurs over very short times, the current response models likely provide a good representation of the hazard. For longer time phenomena, including decontamina tion, the current model capabilities are likely insufficient. Finally, we implement each model in a simple numerical integration of anthrax dispersion, viability degradation, and dose response. Decay models spanning the current knowledge of airborne degradation result in vastly different predicted hazard areas. This confounds attempts to determine necessary medical and decontamination measures. Hence, the current level of understanding and representation of environmental viability degradation in response models is inadequate to inform appropriate emergency response measures.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Environmental Science and Technology
Authors
Amy L. Stuart
Dean Wilkening
Authors
Laura K. Donohue
News Type
Commentary
Date
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All News button
1
Paragraphs

In 1920, the Irish Republican Army reportedly considered a terrifying new weapon: typhoid-contaminated milk. Reading from an IRA memo he claimed had been captured in a recent raid, Sir Hamar Greenwood described to Parliament the ease with which "fresh and virulent cultures" could be obtained and introduced into milk served to British soldiers. Although the plot would only target the military, the memo expressed concern that the disease might spread to the general population.

Although the IRA never used this weapon, the incident illustrates that poisoning a nation's milk supply with biological agents hardly ranks as a new concept. Yet just two weeks ago, the National Academy of Sciences' journal suspended publication of an article analyzing the vulnerability of the U.S. milk supply to botulinum toxin, because the Department of Health and Human Services warned that information in the article provided a "road map for terrorists."

That approach may sound reasonable, but the effort to suppress scientific information reflects a dangerously outdated attitude. Today, information relating to microbiology is widely and instantly available, from the Internet to high school textbooks to doctoral theses. Our best defense against those who would use it as a weapon is to ensure that our own scientists have better information. That means encouraging publication.

The article in question, written by Stanford University professor Lawrence Wein and graduate student Yifan Liu, describes a theoretical terrorist who obtains a few grams of botulinum toxin on the black market and pours it into an unlocked milk tank. Transferred to giant dairy silos, the toxin contaminates a much larger supply. Because even a millionth of a gram may be enough to kill an adult, hundreds of thousands of people die. (Wein summarized the article in an op-ed he wrote for the New York Times.) The scenario is frightening, and it is meant to be -- the authors want the dairy industry and its federal regulators to take defensive action.

The national academy's suspension of the article reflects an increasing concern that publication of sensitive data can provide terrorists with a how-to manual, but it also brings to the fore an increasing anxiety in the scientific community that curbing the dissemination of research may impair our ability to counter biological threats. This dilemma reached national prominence in fall 2001, when 9/11 and the anthrax mailings drew attention to another controversial article. This one came from a team of Australian scientists.

Approximately every four years, Australia suffers a mouse infestation. In 1998, scientists in Canberra began examining the feasibility of using a highly contagious disease, mousepox, to alter the rodents' ability to reproduce. Their experiments yielded surprising results. Researchers working with mice naturally resistant to the disease found that combining a gene from the rodent's immune system (interleukin-4) with the pox virus and inserting the pathogen into the animals killed them -- all of them. Plus 60 percent of the mice not naturally resistant who had been vaccinated against mousepox.

In February 2001 the American SocietyforMicrobiologists' (ASM) Journal of Virology reported the findings. Alarm ensued. The mousepox virus is closely related to smallpox -- one of the most dangerous pathogens known to humans. And the rudimentary nature of the experiment demonstrated how even basic, inexpensive microbiology can yield devastating results.

When the anthrax attacks burst into the news seven months later, the mousepox case became a lightning rod for deep-seated fears about biological weapons. The Economist reported rumors about the White House pressuring American microbiology journals to restrict publication of similar pieces. Samuel Kaplan, chair of the ASM publications board, convened a meeting of the editors in chief of the ASM's nine primary journals and two review journals. Hoping to head off government censorship, the organization -- while affirming its earlier decision -- ordered its peer reviewers to take national security and the society's code of ethics into account.

Not only publications came under pressure, but research itself. In spring 2002 the newly formed Department of Homeland Security developed an information-security policy to prevent certain foreign nationals from gaining access to a range of experimental data. New federal regulations required that particular universities and laboratories submit to unannounced inspections, register their supplies and obtain security clearances. Legislation required that all genetic engineering experiments be cleared by the government.

On the mousepox front, however, important developments were transpiring. Because the Australian research had entered the public domain, scientists around the world began working on the problem. In November 2003, St. Louis University announced an effective medical defense against a pathogen similar to -- but even more deadly than -- the one created in Australia. This result would undoubtedly not have been achieved, or at least not as quickly, without the attention drawn by the ASM article.

The dissemination of nuclear technology presents an obvious comparison. The 1946 Atomic Energy Act classifies nuclear information "from birth." Strong arguments can be made in favor of such restrictions: The science involved in the construction of the bomb was complex and its application primarily limited to weapons. A short-term monopoly was possible. Secrecy bought the United States time to establish an international nonproliferation regime. And little public good would have been achieved by making the information widely available.

Biological information and the issues surrounding it are different. It is not possible to establish even a limited monopoly over microbiology. The field is too fundamental to the improvement of global public health, and too central to the development of important industries such as pharmaceuticals and plastics, to be isolated. Moreover, the list of diseases that pose a threat ranges from high-end bugs, like smallpox, to common viruses, such as influenza. Where does one draw the line for national security?

Experience suggests that the government errs on the side of caution. In 1951, the Invention Secrecy Act gave the government the authority to suppress any design it deemed detrimental to national defense. Certain areas of research-- atomic energy and cryptography -- consistently fell within its purview. But the state also placed secrecy orders on aspects of cold fusion, space technology, radar missile systems, citizens band radio voice scramblers, optical engineering and vacuum technology. Such caution, in the microbiology realm, may yield devastating results. It is not in the national interest to stunt research into biological threats.

In fact, the more likely menace comes from naturally occurring diseases. In 1918 a natural outbreak of the flu infected one-fifth of the world's population and 25 percent of the United States'. Within two years it killed more than 650,000 Americans, resulting in a 10-year drop in average lifespan. Despite constant research into emerging strains, the American Lung Association estimates that the flu and related complications kill 36,000 Americans each year. Another 5,000 die annually from food-borne pathogens -- an extraordinarily large number of which have no known cure. The science involved in responding to these diseases is incremental, meaning that small steps taken by individual laboratories around the world need to be shared for larger progress to be made.

The idea that scientific freedom strengthens national security is not new. In the early 1980s, a joint Panel on Scientific Communication and National Security concluded security by secrecywasuntenable. Its report called instead for security by accomplishment -- ensuring strength through advancing research. Ironically, one of the three major institutions participating was the National Academy of Sciences -- the body that suspended publication of the milk article earlier this month.

The government has a vested interest in creating a public conversation about ways in which our society is vulnerable to attack. Citizens are entitled to know when their milk, their water, their bridges, their hospitals lack security precautions. If discussion of these issues is censored, the state and private industry come under less pressure to alter behavior; indeed, powerful private interests may actively lobby against having to install expensive protections. And failure to act may be deadly.

Terrorists will obtain knowledge. Our best option is to blunt their efforts to exploit it. That means developing, producing and stockpiling effective vaccines. It means funding research into biosensors -- devices that detect the presence of toxic substances in the environment -- and creating more effective reporting requirements for early identification of disease outbreaks. And it means strengthening our public health system.

For better or worse, the cat is out of the bag -- something brought home to me last weekend when I visited the Tech Museum of Innovation in San Jose. One hands-on exhibit allowed children to transfer genetic material from one species to another. I watched a 4-year-old girl take a red test tube whose contents included a gene that makes certain jellyfish glow green. Using a pipette, she transferred the material to a blue test tube containing bacteria. She cooled the solution, then heated it, allowing the gene to enter the bacteria. Following instructions on a touch-screen computer, she transferred the contents to a petri dish, wrote her name on the bottom, and placed the dish in an incubator. The next day, she could log on to a Web site to view her experiment, and see her bacteria glowing a genetically modified green.

In other words, the pre-kindergartener (with a great deal of help from the museum) had conducted an experiment that echoed the Australian mousepox study. Obviously, this is not something the child could do in her basement. But just as obviously, the state of public knowledge is long past anyone's ability to censor it.

Allowing potentially harmful information to enter the public domain flies in the face of our traditional way of thinking about national security threats. But we have entered a new world. Keeping scientists from sharing information damages our ability to respond to terrorism and to natural disease, which is more likely and just as devastating. Our best hope to head off both threats may well be to stay one step ahead.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Washington Post
Authors
Laura K. Donohue
Subscribe to Water