Feeds

US braces for 'bio-Katrina'

Security appointee talks tough

The Power of One eBook: Top reasons to choose HP BladeSystem

President Obama has nominated a tough-talking bioterrorism expert to lead the primary research and development arm of the US Department of Homeland Security (DHS).

DHS Secretary Janet Napalitano announced Obama's choice of Dr. Tara O’Toole to be Under Secretary, Directorate for Science and Technology, calling O'Toole "an expert on environmental protection and biosecurity."

We don't know about the environmental protection part of that statement, but O'Toole has certainly made her opinions clear about bioterrorism.

In her most-recent position as founder, CEO, and director of the Center for Biosecurity at the University of Pittsburgh Medical Center, O'Toole described her organization as follows: "We try to think through the nature of big disasters, with a particular emphasis on bioterrorism attacks and epidemics."

In a March interview (audio) with Federal News Radio, O'Toole was asked what she would tell President Obama if she had the chance. Her reply: "There is a possibility, a real possibility, that there could be the equivalent of a bio-Katrina on his watch."

And that wouldn't be pleasant, she continued: "There are very few things that could actually rock the United States, destabilize the country, and a big bioterrorist attack...or an epidemic such as a pandemic flu episode would be on that list of horrible things that could happen."

When asked about her opinion of someone who had suggested that a bioterrorist attack couldn't be carried out by an independent group, she said: "I would guess that that individual has no background in biology. The Defense Science Board said in 2000 that there are no technical barriers to small groups, unsupported by a nation-state, making and dispensing a biological weapon."

The belief that bioterror could only be state-sponsored, O'Toole said, "reflects not just that individual's lack of understanding of bioscience, but it also reflects the lack of bioscience backgrounds among people doing national security and high-level policy - which is a problem."

Apparently Obama believes that it's time for someone with a bioscience background to direct high-level national-security policy on bioterrorism.

The Under Secretary for the DHS's Directorate for Science and Technology chosen by former president George W. Bush, by the way, was a retired US Navy Rear Admiral, Jay Cohen, whose background included Ocean and Marine Engineering and Naval Architecture.

Nothing personal, Admiral Cohen, but we welcome the new bio-babe. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.