The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
The National Defense University recently hosted a major symposium to address the challenges to U.S. national security and international stability posed by the spread of weapons of mass destruction: nuclear, chemical, and biological weapons, and missiles as a means of delivery. The need to examine such issues is clear. Perhaps no problem facing civilian and military decision makers today is as urgent and important as the effort to control the proliferation of such weapons. Put simply, WMD proliferation represents one of the most complex and fundamental threats to security today. Attended by many of the premier experts in the field, the NDU Symposium explored a broad spectrum of issues ranging from the incentives and disincentives for proliferation to non- and counterproliferation policies and programs. The panelists discussed such critical issues as how effectively present controls to prevent proliferation are working and how to protect against proliferation when it occurs. Most impressively, the participants ventured to identify alternative perspectives and approaches that may contribute to meeting the common challenges. All this unfolds in the pages that follow. It is a search for wisdom, for, as Cicero said twenty centuries ago, "Weapons are of little use on the field of battle if there is no wise counsel at home." Ervin J. Rokke Lieutenant General, USAF President, National Defense University
The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.
Beyond conventional warfare considerations, the United States now faces an acute challenge in nuclear, biological, and chemical (NBC) weapons proliferation-a principal asymmetric warfare capability. These weapons pose a diverse array of risks to U.S. and allied armed forces, civilians, and to the U.S. homeland itself. In the hands of irresponsible or aggressive states, NBC weapons undermine regional stability and threaten U.S. and allied interests. For defense planners, these weapons present significant, and difficult, strategic and operational challenges. Nor is the emerging threat limited solely to state actors: in the future, some subnational entities, perhaps with state sponsorship, could become capable of delivering NBC weapons globally. Contents: The NBC Threat: Perspectives on Intentions and Capabilities Counterproliferation Policy: Current and Emerging Issues Operations in NBC Environments: Perspectives on the Warfight Counterproliferation Acquisition Responding to the Biological Warfare Challenge Medical Dimensions of Counterproliferation Deterring NBC Use Preemption in Peacetime, Crisis, and War Counterproliferation Past and Future: Key Considerations Endnotes
This publication gives a history of biological warfare (BW) from the prehistoric period through the present, with a section on the future of BW. The publication relies on works by historians who used primary sources dealing with BW. In-depth definitions of biological agents, biological weapons, and biological warfare (BW) are included, as well as an appendix of further reading on the subject. Related items: Arms & Weapons publications can be found here: https://bookstore.gpo.gov/catalog/arms-weapons Hazardous Materials (HAZMAT & CBRNE) publications can be found here: https://bookstore.gpo.gov/catalog/hazardous-materials-hazmat-cbrne
Documents a study whose goals were to develop an understanding of commanders' information requirements for cultural and other "soft" factors in order to improve the effectiveness of combined arms operations, and to develop practical ways for commanders to integrate information and influence operations activities into combined arms planning/assessment in order to increase the usefulness to ground commanders of such operations.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.