625
Views
1
CrossRef citations to date
0
Altmetric
SPECIAL SECTION: CHEMICAL AND BIOLOGICAL WARFARE

CRISPR and new genetic-engineering techniques: emerging challenges to strategic stability and nonproliferation

Pages 389-408 | Published online: 15 Sep 2021
 

ABSTRACT

This article explores the potential for new biotechnologically enabled weapons to compete with nuclear weapons in the context of strategic stability, assesses how such new technologies may affect assumptions in traditional strategic-stability models when applied to such scenarios, and how changing capabilities and adversaries may shape approaches to nonproliferation, verification, and monitoring. Among the most recent additions to the genome-editing arsenal is CRISPR (clustered regularly interspaced short palindromic repeats), a bacteria-derived system that is among the simplest genome-editing tools. The CRISPR-Cas9 system—and emerging variants of the system—enables unprecedented control and ease when editing the genome. With parallels to remote “command and control” of the genome, this aspect makes the technology different from earlier gene-editing methods. This article furthers the scholarly work on the biosecurity implications of CRISPR, gene editing, and broader issues of biotechnology by addressing these emerging life-science technologies in the context of nuclear strategic stability and implications for balance of power, nonproliferation, and international security.

Notes

1 National Research Council, Biotechnology Research in an Age of Terrorism (Washington, DC: National Academies Press, 2004); Institute of Medicine and National Research Council, Globalization, Biosecurity, and the Future of the Life Sciences (Washington, DC: National Academies Press, 2006).

2 The Guardian, “Bill Gates Warns Tens of Millions Could Be Killed by Bio-terrorism,” February 18, 2017, <www.theguardian.com/technology/2017/feb/18/bill-gates-warns-tens-of-millions-could-be-killed-by-bio-terrorism>.

3 For example, “Letter to the President,” President’s Council of Advisors on Science and Technology, Executive Office of the President, November 2016, <https://obamawhitehouse.archives.gov/sites/default/files/microsites/ostp/PCAST/pcast_biodefense_letter_report_final.pdf>.

4 “New Scientific and Technological Developments Relevant to the Convention: Some Examples,” BWC Preparatory Committee, Eighth Review Conference of the States Parties to the Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, BWC/CONF.VIII/PC/WP.18, August 5, 2016.

5 R.G. Reeves, et al., “Agricultural Research, or a New Bioweapon System?” Science, Vol. 362, No. 6410 (2018), pp. 35–37; Malcolm Dando, “Find the Time to Discuss New Bioweapons,” Nature, 535 (July 2016), p. 9. <www.nature.com/news/find-the-time-to-discuss-new-bioweapons-1.20206>.

6 James R. Clapper, “Worldwide Threat Assessment of the US Intelligence Community,” Statement for the Record to the Senate Armed Services Committee, February 9, 2016, <www.dni.gov/files/documents/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf>.

7 For example, see Luke Kemp et al., “80 Questions for UK BIOLOGICAL SECURITY,” PLoS ONE, Vol. 16, No. 1 (2021), e0241190, <https://doi.org/10.1371/journal.pone.0241190>; Kathleen M. Vogel and Sonia Ben Ouagrham-Gormley, “Anticipating Emerging Biotechnology Threats: A Case Study of CRISPR,” Politics and the Life Sciences, Vol. 37, No. 2 (2018), pp. 203–19; Gigi Gronvall, “The Security Implications of Synthetic Biology,” Survival, Vol. 60, No. 4 (2018), pp. 165–80; Kenneth A. Oye et al., “Regulating Gene Drives,” Science, Vol. 345, No. 6197 (2014), pp. 626–28; Gregory D. Koblentz, “Pathogens as Weapons: The International Security Implications of Biological Warfare,” International Security, Vol. 29, No. 1 (2003/04), pp. 84–122; Caitríona McLeish and Ralf Trapp, “The Life Sciences Revolution and the BWC,” Nonproliferation Review, Vol. 18, No. 3 (2011), pp. 527–43; Roger Roffey and Chandré Gould, “Preventing the Misuse of the Life Sciences,” Nonproliferation Review, Vol. 18, No. 3 (2011), pp. 557–69.

8 Justin K. Rennstich, The Making of a Digital World: The Evolution of Technological Change and How It Shaped Our World (New York: Palgrave MacMillan, 2008); John Arquilla and David Ronfeldt, In Athena’s Camp: Preparing for Conflict in the Information Age (Santa Monica, CA: RAND, 1997) <www.rand.org/pubs/monograph_reports/MR880.html>.

9 Audrey Kurth Cronin, Power to the People: How Open Technological Innovation is Arming Tomorrow’s Terrorists (Oxford: Oxford University Press, 2019); “NATO 2020: Assured Security; Dynamic Engagement,” May 2010, <www.nato.int/strategic-concept/expertsreport.pdf>; Theodore J. Gordon, Elizabeth Florescu, Jerome C. Glenn, and Yair Sharan, eds., Identification of Potential Terrorists and Adversary Planning Emerging (Amsterdam: IOS Press, 2017).

10 Lawrence Rubin, Philip M. Breedlove, and James A. “Sandy” Winnefeld, “Technology, Strategy, and the Future of Policy,” Orbis, Vol. 64, No. 4 (2020), pp. 615–21.

11 Margaret E. Kosal and J. Wes Stayton, “Metamaterials—Threat to the Global Status Quo?” in Margaret E. Kosal, ed., Development, Use, and Proliferation of Disruptive and Game-Changing Technologies in Modern Warfare (New York: Springer, 2019), pp. 135–54.

12 Greg Allen and Taniel Chan, “Artificial Intelligence and National Security,” Harvard Belfer Center, July 2017, <www.belfercenter.org/sites/default/files/files/publication/AI%20NatSec%20-%20final.pdf>; Zachary S. Davis, “Artificial Intelligence on the Battlefield,” Center for Global Security Research, Lawrence Livermore National Laboratory, March 2019; Erica Briscoe and James Fairbanks, “Artificial Scientific Intelligence and Its Impact on National Security and Foreign Policy,” Orbis, Vol. 64, No. 4 (2020), pp. 544–54; Margaret E. Kosal, “AI and Global Security Environment,” Security Index, Vol. 7, No. 12 (2020), <https://pircenter.org/en/articles/2221-7390754/print/1>.

13 Jonathan D. Moreno, Mind Wars: Brain Research and National Defense (New York: Dana Press, 2006); Malcolm Dando, Neuroscience and the Future of Chemical–Biological Weapons (Basingstoke, UK: Palgrave Macmillan, 2015); Joseph DeFranco, Diane DiEuliis, and James Giordano, “Redefining Neuroweapons: Emerging Capabilities in Neuroscience and Neurotechnology,” PRISM, Vol. 8, No. 3 (2019), pp. 48–63; James Giordano and Rachel Wurzman, “Neurotechnologies as Weapons in National Intelligence and Defense—an Overview,” Synesis, Vol. 2, No. 1 (2011), pp. T55–71; Diane DiEuliis and James Giordano, “Why Gene Editors Like CRISPR/Cas May Be a Game-Changer for Neuroweapons,” Health Security, Vol. 15, No. 3 (2017), pp. 296–302; Margaret E. Kosal and Jonathan Y. Huang, “Security Implications and Governance of Cognitive Neuroscience,” Politics and the Life Sciences, Vol. 34, No. 1 (2015), pp. 93–108.

14 Connor M. McNulty, Neyla Arnas, and Thomas A. Campbell, “Toward the Printed World: Additive Manufacturing and Implications for National Security,” Defense Horizons, No. 73 (2012), pp. 1–16; Trevor Johnston, Troy D. Smith, and J. Luke Irwin, Additive Manufacturing in 2040: Powerful Enabler, Disruptive Threat (Santa Monica, CA: RAND, 2018); Thomas A. Campbell and Olga S. Ivanova, “Additive Manufacturing as a Disruptive Technology: Implications of Three-Dimensional Printing,” Technology & Innovation, Vol. 15, No. 1 (2013), pp. 67–79; Marco Fey, 3D Printing and International Security: Risks and Challenges of an Emerging Technology (Frankfurt: Peace Research Institute Frankfurt, 2017); Tristan A. Volpe, “Dual-Use Distinguishability: How 3D-Printing Shapes the Security Dilemma for Nuclear Programs,” Journal of Strategic Studies, Vol. 42, No. 6 (2019), pp. 814–40.

15 Margaret E. Kosal, “The Threats from Nanotechnology,” Bulletin of the Atomic Scientists, Vol. 75, No. 6 (2019), pp. 290–94; K. Eric Drexler, “The Road to Advanced Nanotechnologies,” presentation at the National Academy of Sciences Sackler Colloquia on Nanomaterials in Biology and Medicine: Promises and Perils, Washington, DC, April 10–11, 2007, <www.nasonline.org/programs/nas-colloquia/completed_colloquia/nanomaterials-in-biology-and-medicine-promises-and-perils.html>.

16 Dmitri Trenin, “Strategic Stability in the Changing World,” Carnegie Endowment for International Peace, March 2019, <https://carnegieendowment.org/files/3-15_Trenin_StrategicStability.pdf>; James M. Acton, “Reclaiming Strategic Stability,” in Elbridge A. Colby and Michael S. Gerson, eds., Strategic Stability: Contending Interpretations (Carlisle, PA: Army War College Strategic Studies Institute, 2013), pp. 117–46; Adam Stulberg and Lawrence Rubin, eds., End of Strategic Stability? Nuclear Weapons and Regional Rivalries (Washington, DC: Georgetown University Press: 2018); Pavel Podvig, “The Myth of Strategic Stability,” Bulletin of Atomic Scientists, October 31, 2012, <https://thebulletin.org/2012/10/the-myth-of-strategic-stability>; Rebecca Hersman, Reja Younis, Bryce Farabaugh, Andrew Reddie, and Bethany Goldblum, “Risk Factors of Situational Awareness Technology and Strategic Stability,” On the Radar, April 2020, <https://ontheradar.csis.org/analysis/risk-factors-of-situational-awareness-technology-and-strategic-stability/>.

17 Colby and Gerson, Strategic Stability.

18 Acton, “Reclaiming Strategic Stability.”

19 Chuck Rosenberg, “The Oath,” podcast interview, July 8, 2020, ∼55:30–57:00, <https://podtail.com/en/podcast/the-oath-with-chuck-rosenberg/jim-miller-hawkeye/>.

20 Naazneen H. Barma, Brent Durbin, Eric Lorber, and Rachel E. Whitlark, “‘Imagine a World in Which’: Using Scenarios in Political Science,” International Studies Perspectives, Vol. 17, No. 2 (2016), pp. 117–35.

21 Susan Peterson, “Epidemic Disease and National Security,” Security Studies, Vol. 12, No. 2 (2002), pp. 43–81; Stefan Elbe, “HIV/AIDS and the Changing Landscape of War in Africa,” International Security, Vol. 27, No. 2 (2002), pp. 159–77; Colin McInnes and Kelley Lee, “Health, Security and Foreign Policy,” Review of International Studies, Vol. 32 (2006), pp. 5–23; Kenneth Letendre, Corey L. Fincher, and Randy Thornhill, “Does Infectious Disease Cause Global Variation in the Frequency of Intrastate Armed Conflict and Civil War?” Biological Reviews, Vol. 85, No. 3 (2010), pp. 669–83.

22 David L. Heymann et al. “Global Health Security: The Wider Lessons from the West African Ebola Virus Disease Epidemic,” The Lancet, Vol. 385, No. 9980 (2015), pp. 1805–06; Conway Waddington, “Ebola Outbreak in Guinea: A Different Type of Regional Stability Threat,” Africa Conflict Monthly Monitor, No. 5 (2014), pp. 47–51; Semeeh Akinwale Omoleke, Ibrahim Mohammed, and Yauba Saidu, “Ebola Viral Disease in West Africa: A Threat to Global Health, Economy and Political Stability,” Journal of Public Health Africa, Vol. 7, No. 1 (2016), pp. 27–40.

23 Sarathi Kalra et al., “The Emergence of Ebola as a Global Health Security Threat: From ‘Lessons Learned’ to Coordinated Multilateral Containment Efforts,” Journal of Global Infectious Disease, Vol. 6, No. 4 (2014), pp. 164–77.

24 Jodie L Guest, Carlos del Rio, and Travis Sanchez, “The Three Steps Needed to End the COVID-19 Pandemic: Bold Public Health Leadership, Rapid Innovations, and Courageous Political Will,” JMIR Public Health Surveillance, Vol. 6, No. 2 (2020), e19043.

25 Jonathan B. Tucker, “A Farewell to Germs: The U.S. Renunciation of Biological and Toxin Warfare, 1969–70,” International Security, Vol. 27, No. 1 (2002), pp. 107–48.

26 Jonathan B. Tucker and Erin R. Mahan, “President Nixon’s Decision to Renounce the U.S. Offensive Biological Weapons Program,” NDU Center for the Study of Weapons of Mass Destruction Case Study 1, October 2009, p. 4, <https://ndupress.ndu.edu/Portals/68/Documents/casestudies/CSWMD_CaseStudy-1.pdf>.

27 Dieter S. Lutz, “A Counterforce/Countervalue Scenario—or How Much Destructive Capability Is Enough?” Journal of Peace Research, Vol. 20, No. 1 (1983), pp. 17–26.

28 Austin Long, “A Cyber SIOP? Operational Considerations for Strategic Offensive Cyber Planning,” Journal of Cybersecurity, Vol. 3, No. 1 (2017), pp. 19–28; Max Smeets, “The Strategic Promise of Offensive Cyber Operations,” Strategic Studies Quarterly, Vol. 12, No. 3 (2018), pp. 90–113.

29 George H. Quester, “Mismatched Deterrents: Preventing the Use of Nuclear, Biological, and Chemical Weapons,” International Studies Perspectives, Vol. 1, No. 2 (2000), pp. 165–76; Peter R. Lavoy, Scott D. Sagan, and James J. Wirtz, eds., Planning the Unthinkable: How New Powers Will Use Nuclear, Biological, and Chemical Weapons (Ithaca, NY: Cornell University Press, 2000).

30 US Department of Defense, “Nuclear Posture Review,” February 2018, p. 38, <https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF>.

31 Scott D. Sagan, “The Commitment Trap: Why the United States Should Not Use Nuclear Threats to Deter Biological and Chemical Weapons Attacks,” International Security, Vol. 24, No. 4 (2000), pp. 85–115.

32 R.J. Jackson et al., “Expression of Mouse Interleukin-4 by a Recombinant Ectromelia Virus Suppresses Cytolytic Lymphocyte Responses and Overcomes Genetic Resistance to Mousepox,” Journal of Virology, Vol. 75 (2001), pp. 1205–10.

33 N. Chen et al., “Poxvirus Interleukin-4 Expression Overcomes Inherent Resistance and Vaccine-Induced Immunity: Pathogenesis, Prophylaxis, and Antiviral Therapy,” Virology, Vol. 409, No. 2 (2011), pp. 328–37.

34 Debora MacKenzie, “US Develops Lethal New Viruses,” New Scientist, October 29, 2003, <www.newscientist.com/article/dn4318-us-develops-lethal-new-viruses/>.

35 Fiona M. Guerra et al., “The Basic Reproduction Number (R0) of Measles: A Systematic Review,” The Lancet, Vol. 17, No. 12 (2017), e420–28.

36 Paul E. Fine, “Herd Immunity: History, Theory, Practice,” Epidemiology Review, Vol. 15 (1993), pp. 265–302.

37 Fiona M. Guerra et al., “The Basic Reproduction Number (R0) of Measles: A Systematic Review,” The Lancet, Vol. 17, No. 12 (2017), e420–28.

38 J. Wallinga, D. Lévy-Bruhl, N.J. Gay, and C.H. Wachmann, “Estimation of Measles Reproduction Ratios and Prospects for Elimination of Measles by Vaccination in Some Western European Countries,” Epidemiology and Infection, Vol. 127 (2001), pp. 281–95.

39 F. Ann Ran et al., “In Vivo Genome Editing Using Staphylococcus aureus Cas9,” Nature, Vol. 520 (April 2015), pp. 186–91; Y. Tan et al., “Rationally Engineered Staphylococcus aureus Cas9 nucleases with High Genome-Wide Specificity,” Proceedings of the National Academy of Sciences, Vol. 116, No. 42 (2019), pp. 20969–76.

40 Bernd Zetsche et al. “Cpf1 Is a Single RNA-Guided Endonuclease of a Class 2 CRISPR-Cas System,” Cell, Vol. 163, No. 3 (2015), pp. 759–71; Ines Fonfara et al., “The CRISPR-Associated DNA-Cleaving Enzyme Cpf1 Also Processes Precursor CRISPR RNA,” Nature, Vol. 532 (April 2016), pp. 517–21.

41 Kaihang Wang, Daniel de la Torre, Wesley E. Robertson, and Jason W. Chin, “Programmed Chromosome Fission and Fusion Enable Precise Large-Scale Genome Rearrangement and Assembly,” Science, Vol. 365, No. 6456 (2019), pp. 922–26.

42 M. Porteus, “Mammalian Gene Targeting with Designed Zinc Finger Nucleases,” Molecular Therapy, Vol. 13 (2006), pp. 438–46.

43 Jorge Mansilla-Soto et al., “Cell and Gene Therapy for the Beta-Thalassemias: Advances and Prospects,” Human Gene Therapy, Vol. 27, No. 4 (2016), pp. 295–04; Yi Jo, H. Kim, and S. Ramakrishna, “Recent Developments and Clinical Studies Utilizing Engineered Zinc Finger Nuclease Technology,” Cellular and Molecular Life Sciences, Vol. 72, No. 20 (2015), pp. 3819–30.

44 For an excellent overview of the CRISPR-Cas9 system by two of the technique’s discoverers, see Jennifer A. Doudna and Emmanuelle Charpentier, “The New Frontier of Genome Engineering with CRISPR-Cas9,” Science, Vol. 346, No. 6213 (2014), pp. 1077–88.

45 Aaron McKenna et al., “Whole Organism Lineage Tracing by Combinatorial and Cumulative Genome Editing,” Science, Vol. 353, No. 6298 (2016), aaf7907-11.

46 K. Yoshimi, T. Kaneko, B. Voigt, and T. Mashimo, “Allele-Specific Genome Editing and Correction of Disease-Associated Phenotypes in Rats Using the CRISPR-Cas Platform,” Nature Communications, Vol. 5, No. 4240 (2014), pp. 1–9.

47 T. Y. Heo et al., “CRISPR/Cas9 Nuclease-Mediated Gene Knock-in in Bovine-Induced Pluripotent Cells,” Stem Cells and Development, Vol. 24 (2015), pp. 393–402.

48 H. Han et al., “One-Step Generation of Myostatin Gene Knockout Sheep via the CRISPR/Cas9 System,” Frontiers of Agricultural Science and Engineering, No. 1 (2014), pp. 2–15.

49 Q. Kang et al. “Improving Pig Genetic Resistance and Muscle Production through Molecular Biology,” paper presented at 10th World Congress on Genetics Applied to Livestock Production, Vancouver, BC, Canada, August 17-22, 2014, <https://asas.org/docs/default-source/wcgalp-proceedings-oral/362_paper_10607_manuscript_1526_0.pdf?sfvrsn=2>.

50 Zhongzhen Liu et al., “Efficient Genome Editing of Genes Involved in Neural Crest Development Using the CRISPR/Cas9 System in Xenopus Embryos,” Cell & Bioscience, Vol. 6, No. 22 (2016), <https://doi.org/10.1186/s13578-016-0088-4>.

51 Puping Liang et al. “CRISPR/Cas9-Mediated Gene Editing in Human Tripronuclear Zygotes,” Protein & Cell, Vol 6, No. 5 (2015), pp. 363–72.

52 David Cyranoski and Sara Reardon, “Embryo Editing Sparks Epic Debate,” Nature, No. 520 (2015), pp. 593–95.

53 Dennis Normile, “Shock Greets Claim of CRISPR-Edited Babies,” Science, Vol. 362, No. 6418 (2018), pp. 978–79.

54 Sonia Ben Ouagraham-Gormley, “From CRISPR Babies to Super Soldiers: Challenges and Security Threats Posed by CRISPR,” Nonproliferation Review, Vol. 27, Nos. 4–6 (forthcoming); “He Jiankui: China Condemns ‘Baby Gene Editing’ Scientist,” BBC News, January 21, 2019, <www.bbc.com/news/world-asia-46943593>.

55 Haoyi Wang and Hui Yang, “Gene-Edited Babies: What Went Wrong and What Could Go Wrong,” PLOS Biology, April 30, 2019, <https://journals.plos.org/plosbiology/article?id=10.1371/journal.pbio.3000224>.

56 Henriette O’Geen, Abigail S. Yu, and David J. Segal, “How Specific Is CRISPR/Cas9 Really?” Current Opinion in Chemical Biology, Vol. 29 (2015), pp. 72–78; S.Q. Tsai et al., “GUIDE-seq Enables Genome-Wide Profiling of Off-Target Cleavage by CRISPR-Cas Nucleases,” Nature Biotechnology, Vol. 33 (2015), pp. 187–97; J.E. Chapman, D. Gillum, and S. Kiani, “Approaches to Reduce CRISPR Off-Target Effects for Safer Genome Editing,” Applied Biosafety, Vol. 22, No. 1 (2017), pp. 7–13.

57 Miou Zhou et al., “CCR5 Is a Suppressor for Cortical Plasticity and Hippocampal Learning and Memory,” eLife, Vol. 20, No. 5 (2016), e20985; Mary T. Joy et al., “CCR5 Is a Therapeutic Target for Recovery after Stroke and Traumatic Brain Injury,” Cell, 176, No. 5 (2019), pp. 1143­–57.

58 Antonio Regalado, “China’s CRISPR Twins Might Have Had Their Brains Inadvertently Enhanced,” MIT Technology Review, February 21, 2019, <www.technologyreview.com/s/612997/the-crispr-twins-had-their-brains-altered/>.

59 David Cyranoski, “China Set to Introduce Gene-Editing Regulation Following CRISPR-Baby Furor,” Nature, May 20, 2019, <www.nature.com/articles/d41586-019-01580-1>.

60 “The Federal Select Agent Program is jointly comprised of the Centers for Disease Control and Prevention/Division of Select Agents and Toxins and the Animal and Plant Health Inspection Service/Agriculture Select Agent Services. The Federal Select Agent Program oversees the possession, use and transfer of biological select agents and toxins, which have the potential to pose a severe threat to public, animal or plant health or to animal or plant products.” Centers for Disease Control and Prevention, “Federal Select Agent Program,” n.d., <www.selectagents.gov/>.

61 David Cyranoski, “Russian Biologist Plans More CRISPR-Edited Babies,” Nature, June 10, 2019, <www.nature.com/articles/d41586-019-01770-x>.

62 Stefano Costanzi and Gregory D. Koblentz, “Controlling Novichoks after Salisbury: Revising the Chemical Weapons Convention Schedules,” Nonproliferation Review, Vol. 26, Nos. 5–6 (2019), pp. 599–612; David V. Gioe, Michael S. Goodman, and David S. Frey, “Unforgiven: Russian Intelligence Vengeance as Political Theater and Strategic Messaging,” Intelligence and National Security, Vol 34, No. 4 (2019), pp. 561–75.

63 Bellingcat, “Russia’s Clandestine Chemical Weapons Programme and the GRU’s Unit 29155,” October 23, 2020, <www.bellingcat.com/news/uk-and-europe/2020/10/23/russias-clandestine-chemical-weapons-programme-and-the-grus-unit-21955/>.

64 Shaun Walker, “UK and Bulgaria Investigate 2015 Poisoning of Bulgarian Arms Dealer,” The Guardian, February, 11, 2019, <www.theguardian.com/world/2019/feb/11/uk-bulgaria-investigate-2015-poisoning-emilian-gebrev>; Radio Free Europe Radio Liberty, “Bulgaria Suspends Probe into Poisoning Linked to Russians,” September 1, 2020, <www.rferl.org/a/bulgaria-suspends-probe-into-poisoning-linked-to-russians/30814492.html>.

65 Anne L. Clunan, “Russia and the Liberal World Order,” Ethics & International Affairs, Vol. 323, No. 1 (2018), pp. 45–59.

66 Susan Martin, “The Role of Biological Weapons in International Politics: The Real Military Revolution,” Journal of Strategic Studies, Vol. 25, No. 1 (2002), pp. 63–98.

67 United States Department of Defense, Nuclear Posture Review Report, 2010, viii, <https://dod.defense.gov/Portals/1/features/defenseReviews/NPR/2010_Nuclear_Posture_Review_Report.pdf>.

68 Ibid.

69 United States Department of Defense, Nuclear Posture Review Executive Summary, 2018, <https://media.defense.gov/2018/Feb/02/2001872877/-1/-1/1/EXECUTIVE-SUMMARY.PDF>.

70 Margaret E. Kosal, “WMD Strategy Gap: Capacities, Capabilities, and Collaboration,” PRISM, Vol. 7, No. 3 (2018), pp. 50–67.

71 Amy E. Smithson, “Tall Order: Crafting a Meaningful Verification Protocol for the Biological Weapons Convention,” Politics and the Life Sciences, Vol. 18, No. 1 (1999), pp. 79–85; Jez Littlewood, The Biological Weapons Convention: A Failed Revolution (Aldershot, UK: Ashgate, 2005); Jez Littlewood, “The Biological Weapons Convention,” in Guy Faure, ed., Unfinished Business: Why International Negotiations Fail (Athens, GA: University of Georgia Press, 2012), pp. 107–29; Nicholas A. Sims, “Toward the BWC Review Conference: Diplomacy Still in the Doldrums,” Disarmament Diplomacy, No. 82 (2006), <www.acronym.org.uk/old/dd/dd82/82ns.htm>; Filippa Lentzos, “Hard to Prove,” Nonproliferation Review, Vol. 18, No. 3 (2011), pp. 571–82.

72 For example, see Kathleen Vogel, Phantom Menace or Looming Danger? A New Framework for Assessing Bioweapons Threats (Baltimore, MD: JHU Press, 2013), for analysis of socio-technical factors.

73 Motoko Araki and Tetsuya Ishii, “International Regulatory Landscape and Integration of Corrective Genome Editing into in Vitro Fertilization,” Reproductive Biology and Endocrinology, Vol. 12, No. 108 (2014), <www.rbej.com/content/12/1/108>; Andrea Boggio, Jessica Almqvist, and Cesare P.R. Romano, eds., Human Germline Genome Modification and the Right to Science: A Comparative Study of National Laws and Policies (Cambridge, UK: Cambridge University Press, 2019).

74 EU Directive 2001/20/EC “provides that no gene therapy trials may be carried out which result in modifications to the subject’s germ line genetic identity.” See “Regulation (EU) No 536/2014 of the European Parliament and of the Council of 16 April 2014 on Clinical Trials on Medicinal Products for Human Use, and Repealing Directive 2001/20/EC,” Official Journal of the European Union, <https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-1/reg_2014_536/reg_2014_536_en.pdf>.

75 NIH–RAC, “NIH Guidelines for Research Involving Recombinant or Synthetic Nucleic Acid Molecules” (NIH Guidelines), April 2016, <http://osp.od.nih.gov/office-biotechnology-activities/biosafety/nih-guidelines>; Terence R. Flotte, “Therapeutic Germ Line Alteration: Has CRISPR/Cas9 Technology Forced the Question?” Human Gene Therapy, Vol. 26, No. 5 (2015), pp. 245­–46.

76 Peter Emanuel and Diane DiEuliis, “Want to Grow the Economy? Try Fermenting it Instead,” personal communication.

77 Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism (New York: Vintage Books, 2008), <https://lccn.loc.gov/2009373884>.

78 Margaret E. Kosal, Nanotechnology for Chemical and Biological Defense (New York: Springer Academic, 2009).

79 John Hart and Ralph Trapp, “Science, Technology, and the Biological Weapons Convention,” Arms Control Today, Vol. 42, No. 8 (2012), pp. 15–21; Roffey and Gould, “Preventing the Misuse of the Life Sciences”; Jean Pascal Zanders and Amy Smithson, “Creating a More Robust BWC Regime: A Time for Action,” Nonproliferation Review, Vol. 18, No. 3 (2011), pp. 583–90.

80 Marc Ostfield, “Pathogen Security: The Illusion of Security in Foreign Policy and Biodefense,” International Journal of Risk Assessment and Management, Vol. 12, No. 204 (2009), pp. 204–21.

81 The politics, institutional aspects, and technical challenges of attribution are another area of inquiry more than deserving of attention, especially in the context of emerging technologies.

82 Kavita M. Berger, “Future Opportunities for Bioengagement in the MENA Region,” AAAS, October 2013, <https://apps.dtic.mil/sti/pdfs/ADA590905.pdf>; Michelle Rozo, “Placing Global Biosecurity Engagement Programs under the Umbrella of Global Health Security,” FAS Issue Brief, May 2014, <https://fas.org/wp-content/uploads/2014/05/bio-engagement-final-may-2014.pdf>; Adam Williams and Rodney Wilson “‘Defense by Other Means’: Future Evolution(s) of Cooperative Threat Reduction,” Nonproliferation Review, Vol. 25, Nos. 5–6 (2018), pp. 501–22.

83 Nino Kharaishvili, Toni-Marie L. Hudson, Jaya K. Kannan, Vera Ettenger, and Seema Mirje, “Global Health Security Risk Assessment in the Biological Threat Reduction Program,” Health Security, Vol. 18, No. 3 (2020), pp. 177–85; Kenneth Yeh et al. “Achieving Health Security and Threat Reduction through Sharing Sequence Data,” Tropical Medicine and Infectious Disease, Vol. 4, No. 2 (2019), p. 78, <https://doi.org/10.3390/tropicalmed4020078>; Rich Pilch, “Engaging China on Bioweapons and Beyond,” James Martin Center for Nonproliferation Studies, May 28, 2020, <www.nonproliferation.org/engaging-china-on-bioweapons-and-beyond/>.

84 Alexander Kelle, “Health Governance and the Biological Weapons Prohibition Regime,” Global Governance, Vol. 13, No. 2 (2007), pp. 217–35; Tine Hanrieder and Christian Kreuder-Sonnen, “WHO Decides on the Exception? Securitization and Emergency Governance in Global Health,” Security Dialogue, Vol. 45, No. 4 (2014), pp. 331–48; Sandra J. Maclean, “Microbes, Mad Cows and Militaries: Exploring the Links between Health and Security,” Security Dialogue, Vol. 39, No. 5 (2008), pp. 475–94; William Aldis, “Health Security as a Public Health Concept: A Critical Analysis,” Health Policy and Planning, Vol. 23, No. 6 (2008), pp. 3369–75; Jiyong Jin and Joe Thomas Karackattu, “Infectious Diseases and Securitization: WHO’s Dilemma,” Biosecurity and Bioterrorism, Vol. 9, No. 2 (2011), pp. 181–87; D. L. DeLaet, “Whose Interests Is the Securitization of Health Serving?” in Simon Rushton and Jeremy Youde, eds., Routledge Handbook of Global Security (London: Routledge, 2014), pp. 339–48; S. Rushton, “Global Health Security: Security for Whom? Security from What?” Political Studies, Vol. 59, No. 4 (2011), pp. 779–96.

85 For this paper, “dual-use” and the “dual-use conundrum” refer to the fact that almost all the equipment and materials needed to develop dangerous or offensive agents, particularly biological and chemical agents, have legitimate uses in a wide range of scientific research and industrial activity, including defensive military uses. Within this context, “dual-use” does not refer to the demarcation between civilian and military uses. The evolving meanings and implications of the term for export control and nonproliferation warrant more investigation.

86 Harry S. Truman, “Inaugural Address,” January 20, 1949, American Presidency Project, <www.presidency.ucsb.edu/ws/?pid=13282>.

87 Ola Dahlman, Frode Ringdal, Jenifer Mackby, and Svein Mykkeltveit, “The Inside Story of the Group of Scientific Experts and Its Key Role in Developing the CTBT Verification Regime,” Nonproliferation Review, Vol. 27. Published ahead of print, June 3, 2020, <https://www.tandfonline.com/doi/full/10.1080/10736700.2020.1764717>.

88 John Lewis Gaddis, Philip H. Gordon, Ernest R. May, and Jonathan Rosenberg, eds., Cold War Statesmen Confront the Bomb: Nuclear Diplomacy since 1945 (Oxford: Oxford University Press: 1999); Siegfried S. Hecker, ed., Doomed to Cooperate: How American and Russian Scientists Joined Forces to Avert Some of the Greatest Post-Cold War Nuclear Dangers (Los Alamos, NM: Bathtub Row Press: 2016).

89 Richard Lugar, “Cooperative Threat Reduction and Nuclear Security,” Georgetown Journal of International Affairs, Vol. 10 (2009), pp. 183–89; Congressional Research Service, “The Evolution of Cooperative Threat Reduction: Issues for Congress,” November 2015, R43143.

90 This framework was initially presented by the author in remarks titled “On the Role of Science Diplomacy in the 21st Century,” prepared for the 2nd Annual Neuriter Roundtable on Science Diplomacy, Washington, DC, December 18, 2013.

91 “Amerithrax” is the name given by the US Federal Bureau of Investigation to the series of bioterrorism incidents in September 2001 that employed envelopes containing Bacillus anthracis, the causative agent of anthrax, mailed through the US Postal Service.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 231.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.