Feeds

US WMD report: Dirty bombs, chem weapons are bunk

But the bioterrorists will strike by 2013! Aiee!

3 Big data security analytics techniques

Indeed, the Commissioners seem to be aware that they don't really have much here. The US intelligence community certainly seems to have told them that there isn't much to worry about on the bioweapon-terror front. But they see it as being a threat on a par with nukes nonetheless.

The cases of the Rajneeshees, Aum Shinrikyo, and al Qaeda underscore not only the dangerous potential of bioterrorism but also the technical difficulties that terrorist groups seeking such weapons are likely to encounter. Aum’s failure to carry out a mass-casualty attack, despite its access to scientific expertise and ample financial resources, suggests that one should not oversimplify or exaggerate the threat of bioterrorism. Developing a biological weapon that can inflict mass casualties is an intricate undertaking, both technically and operationally complex ... the United States should be less concerned that terrorists will become biologists and far more concerned that biologists will become terrorists.

We accept the validity of intelligence estimates about the current rudimentary nature of terrorist capabilities in the area of biological weapons but ... the terrorists are trying to upgrade their capabilities and could do so by recruiting skilled scientists. In this respect the biological threat is greater than the nuclear; the acquisition of deadly pathogens, and their weaponization and dissemination in aerosol form, would entail fewer technical hurdles than the theft or production of weapons-grade uranium or plutonium and its assembly into an improvised nuclear device. The difficulty of quantifying the bioterrorism threat to the United States does not make that threat any less real or compelling.

The Commissioners also suggest that rapidly advancing genetic and biotech capability could in some way lead to much, much deadlier bioweapons than anything seen so far, though they don't say precisely how.

As DNA synthesis technology continues to advance at a rapid pace, it will soon become feasible to synthesize nearly any virus whose DNA sequence has been decoded — such as the smallpox virus, which was eradicated from nature in 1977 — as well as artificial microbes that do not exist in nature. This growing ability to engineer life at the molecular level carries with it the risk of facilitating the development of new and more deadly biological weapons. The only way to rule out the harmful use of advances in biotechnology would be to stifle their beneficial applications as well — and that is not a realistic option. Instead, the dual-use dilemma associated with the revolution in biology must be managed on an ongoing basis ... the risk that biological weapons pose to humanity must not be minimized or ignored.

At one point the two senators seem to hint that biotechnology will have to start operating under the same almost paralysing security and safety regime that the nuclear industry does.

The nuclear age began with a mushroom cloud—and, from that moment on, all those who worked in the nuclear industry in any capacity, military or civilian, understood they must work and live under a clear and undeniable security mandate. But the life sciences community has never experienced a comparable iconic event ... It is essential that the members of the life sciences community — in universities, medical and veterinary schools, nongovernmental research institutes, trade associations, and biotechnology and pharmaceutical companies — foster a bottom-up effort to sensitize researchers to biosecurity issues and concerns...

Even so, if the Ivins and Aum Shinrikyo cases are any guide, the threat of a bioweapon attack within the next five years probably needn't cause too much lost sleep.

But what about the big one, the undeniable danger - nukes? What should be happening there?

Well, it seems that the US must make more use of "soft power" and diplomatic efforts, seeking to stop countries from pursuing nuclear weapons programmes or civil nuclear power programmes which are dual-purposed as weapons production. In particular, nations should generally not be allowed to enrich their own nuclear fuel or reprocess spent fuel - the necessary equipment can also be used to produce weapons-grade material.

Combat fraud and increase customer satisfaction

More from The Register

next story
EU: Let's cost financial traders $400m a day, because EVIL BANKERS. Right?
Wait 'til this one hits your pension fund where it hurts
Systems meltdown plunges US immigration courts into pen-and-paper stone age
Massive outage could last four weeks, sources claim
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.