Feeds

It's not too late to join the bioterror gold rush

Follow the money

SANS - Survey on application security programs

If you follow press releases from universities and the private sector, much of the boom is built upon the simple pursuit of grants - free money. It is a biotech gold rush in the war on terror.

The promoters of the boom, like Kendall at Texas Tech, brush aside criticisms that it is an overreaction in the war on terror or a bald-faced money grab. "[The] consensus of 16 intelligence agencies is that there is a high level of threat from an attack," he told the Ft Worth newspaper.

One rebuttal is that the "16 national intelligence agencies" have not had an especially good track record in threat assessment from the war on terror.

Another conclusion drawn from the anti-terror gold rush is that the pure expansion in number of labs handling agents of interest to bioterrorists will (1), expose more lab workers to their potential for serious infection, and: (2) increase the profile and number of repositories from which the agents can be diverted by insiders. The additional risk of a boffin within the biodefense academy going to the dark side cannot be estimated with any certainty, although it is not a zero chance.

One aspect of the biodefense boom not often discussed is that some of the investments are simply poor ones or the bankrolling of junky science.

For one example, George Mason University's federally funded National Center of Biodefense, one equipped with a high-containment Biosafety Level 4 lab, cracked up in 2006-2007.

Founded by Ken Alibek, the world famous defector from the old Soviet Union's biowarfare program, Alibek resigned in late 2006, after internal acrimony over teaching responsibilities and research.

Although little has come from George Mason's research in biodefense, the school did appear to turn into a diploma mill of sorts, one for biodefense, awarding 13 PhDs on the subject. It also became a recycler for two high profile scientists formerly embroiled in a conflict-of-interest scandal at the National Institutes of Health and Food and Drug Adminstration, now fallen to minor biodefense research.

Since the biodefense boom is seen to be where the money is, following resuscitation of orphan drugs, formerly thrown out after testing in peer-reviewed studies, becomes interesting.

One such case recent is that of IM862, a dipetide compound of two amino acids, which was briefly a cause for excitement around the turn of the century because it was thought to have anti-cancer potential. IM862 inhibited the formation of new blood vessels from pre-existing ones, known as angiogenesis, a necessity for growth of tumors. Many were interested in its potential for treating things like ovarian cancer.

A company called Cytran banked on the compound and clinical trials were started. The scientific literature subsequently shows IM862 was ineffective as an anti-cancer agent, doing nothing in tests against renal cell carcinoma and even hastening progression of disease in one study of its use in Kaposi's Sarcoma afflicted AIDS patients. Cytran had spent 11 years and $50m on IM862, declaring bankruptcy almost immediately upon result of the bad news. Its intellectual property was sold off in a fire sale held for creditors.

However, in the defense establishment it sometimes appears convenient to throw out negative results in search of slim reeds for biodefense.

Im862 has been reborn as glufanide disodium (or oglufanide disodium), potential bioterror defender. The Defense Threat Reduction Agency (DTRA), as part of the free money-dispensing machinery in the boom, awarded an Australian firm, Implicit Biosciences, $18.2m to look into the drug as a cure-all, specifically against the microbe which causes melioidosis, a disease similar to glanders. The eyebrow-raiser is the sudden morphing of a compound found ineffective against cancer in peer-reviewed clinical studies to one funded, in the seeming absence of good scientific rationale, for use as a bioterror silver bullet. The testing of IM862 is to be carried out jointly in Seattle with animals infected with various biowarfare agents.

So you think Aunt Minnie's special hangover remedy might have potential against bioterror? Uncle Sam wants to hear from you. ®

George Smith is a senior fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological, and nuclear terror hysteria, often by way of the contents of neighbourhood hardware stores.

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.