File #2424: "2018_Book_IntelligenceBiosecurityAndBiot.pdf"

2018_Book_IntelligenceBiosecurityAndBiot.pdf

Text

1|Acknowledgements|6
1|Contents|8
1|About the Author|10
1|1 Introduction|11
2|The Audience|14
2|The Book’s Points of Difference|14
2|Book Scope and Limitations|15
2|Why Intelligence?|16
2|Defining Terminology|17
3|Intelligence|17
3|Biosecurity|20
3|Bioterrorism|23
3|Bio-crime|24
3|Bio-risk|24
3|Bio-threat|25
2|The Structure of the Book|26
2|The Book’s Four Objectives|26
2|References|28
1|2 The Biosecurity Threat Environment|31
2|Defining ‘The Biosecurity Threat Environment’|32
2|Past Biosecurity Threat Environment (1945–2001)|35
2|Present Biosecurity Threat Environment (2001–Present)|41
2|Emerging Biosecurity Threats (2018–2023)|45
3|Stolen Biological Agents|47
3|Dual Use Research and Synthetic Biology|51
2|Conclusion|60
2|References|62
1|3 Intelligence Tasking and Coordination|68
2|Biosecurity and Intelligence|68
2|Biosecurity Intelligence Tasking Priorities|70
3|Coordination|81
2|Risk and Threat Assessment|83
3|Defining Bio-risk|84
3|Defining Bio-threat|88
2|Conclusion|92
2|References|95
1|4 Collection|97
2|Traditional Collection Methods|100
3|Signals Intelligence (SIGINT)|100
2|Human Intelligence (HUMINT)|106
2|Geospatial Intelligence (GEOINT)|111
2|Open Source, Scientific, Medical and Research Collection Platforms|113
3|Open Source Intelligence|113
3|Scientific, Medical and Research Collection|117
3|The Scientific Community|118
3|Epidemiology|120
3|Forensics|121
2|Collection Challenges|122
2|References|125
1|5 Analysis|128
2|Intelligence Analysts in the Bio-Threat and Risk Sectors|130
2|Analytical Methods and Techniques|135
3|Interpretivist vs Empirical Methodologies|137
4|Interpretivist Methodologies|137
4|Empirical|143
2|Fit for Purpose|148
2|Conclusion|150
2|References|150
1|6 Intelligence Governance|154
2|Intelligence Governance|155
3|Why Intelligence Governance?|158
3|Intelligence Governance: Bio-Threats and Risks|159
4|Leadership|163
4|Operationalising a National Health Security Strategy|165
2|ICT|172
2|HR|176
2|Research|179
2|Conclusion|182
2|References|182
1|7 Intelligence and Stakeholders|185
2|Prevention|187
3|Improving Bio-Surveillance Capability|187
3|Improving National, Regional and Global Health Security Capacity|194
3|WHO IHR|195
3|Biological Weapons Convention (BWC)|196
3|The Proliferation Security Initiative and the Australia Group|198
3|Global Health Security Agenda (GHSA)|198
3|Stakeholders and Their Own Biosafety Procedures|200
2|Disruption|205
3|Criminology|206
3|Counter Terrorism|210
3|Cyber|215
2|Treatment|219
3|First Responders|220
3|Science and Technology|223
3|Security|224
2|Conclusion|227
2|References|228
1|8 Oversight and Accountability|236
2|Legislation|237
3|Specific Biosafety, Biosecurity Legislation|238
3|Legislative Challenges|240
3|Other Intelligence Related Legislation|242
3|Meeting the Challenges|250
2|Regulation Oversight and Accountability|251
3|Regulation|251
3|Meeting the Challenges|256
3|Oversight and Accountability|259
2|Conclusion|263
2|References|264
1|9 Conclusion|267
2|Future Outlook (2023 and Beyond)|273
1|References|274
1|Index|298