4,904
Views
9
CrossRef citations to date
0
Altmetric
Article

Improving ‘Five Eyes’ Health Security Intelligence capabilities: leadership and governance challenges

Bibliography

  • Aldis, W. “Health Security as A Public Health Concept: A Critical Analysis.” Health Policy and Planning 23, no. 6 (2008): 369–375. doi:10.1093/heapol/czn030.
  • Alibek, K. Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World- Told from the inside by the Man Who Ran It. New York: Random House, 1999.
  • Arnason, G. “Synthetic Biology between Self-Regulation and Public Discourse: Ethical Issues and the Many Roles of the Ethicist.” Cambridge Quarterly of Healthcare Ethics 26, no. 2 (2017): 246–256. doi:10.1017/S0963180116000840.
  • Ausbiotech. 2018. Australia’s Biotechnology Organisation (Website). https://www.ausbiotech.org/biotechnology-industry/fast-facts.
  • Balmer, B. B., and B. Warfare. Expert Advice and Science Policy, 1930-65. Basingstoke, UK: Palgrave Macmillan, 2001.
  • Battelle. Battelle/Bio State Bioscience, Jobs, Investments and Innovation. Columbus, OH: Battelle, 2014.
  • Bernard, K. “Health and National Security: A Contemporary Collision of Cultures.” Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science 11, no. 2 (2013): 157–162. doi:10.1089/bsp.2013.8522.
  • Blue Ribbon Study Panel. Blue Ribbon Study Panel on Biodefense. A National Blueprint for Biodefense: Leadership and Major Reform Needed to Optimise Efforts. Washington, D.C: Hudson Institute for Policy Studies, 2015.
  • Blue Ribbon Study Panel. Biodefense Indicators One Year Later. Events Outpacing Federal Efforts to Defend the Nation. Arlington, VA.: Potomac Institute for Policy Studies, 2016.
  • Brady, D., and L. Sun. 2014. “FDA Found More than Smallpox Vials in Storage Room.” Washington Post, July 16. https://www.washingtonpost.com/national/health-science/fda-found-more-than-smallpox-vials-in-storage-room/2014/07/16/850d4b12-0d22-11e4-8341-b8072b1e7348_story.html?utm_term=.978241b9d1f8.
  • Broad, W., and S. Shane. 2011. “Scientist’s Analysis Disputes FBI Closing of Anthrax Case.” The New York Times, October 9. https://www.nytimes.com/2011/10/10/science/10anthrax.html?_r=1&hp.
  • Carlson, R. “The Pace and Proliferation of Biological Technologies.” Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science 1, no. 3 (2004): 203–214. doi:10.1089/153871303769201851.
  • CDC. Report on the Potential Exposure to Anthrax. Atlanta, GA: CDC, 2014.
  • CDC. 90 Day Internal Review of the Division of Select Agents and Toxins. Atlanta, GA: CDC, 2015.
  • Chen, H. Bioterrorism and Knowledge Mapping Dark Web Exploring and Data Mining the Dark Side of the Web. New York, N.Y.: Springer, 2011.
  • Chertoff, M. “A Public Policy Perspective of the Dark Web.” Journal of Cyber Policy 2, no. 1 (2017): 26–38. doi:10.1080/23738871.2017.1298643.
  • Christopher, G. W., T. J. Cieslak, and E. M. Eitzen Jr. “Biological Warfare: A Historical Perspective.” Journal of the American Medical Association 278, no. 5 (1997): 412–417. doi:10.1001/jama.1997.03550050074036.
  • Chyba, C. “Biotechnology and the Challenge to Arms Control.” Arms Control Today 36 (2016): 11–17.
  • Clapper, J. Statement for the Record. Worldwide Threat Assessment of the US Intelligence Community. Armed Services Committee, 2016. Washington,DC.
  • Elbe, S. “Pandemic Security.” In The Routledge Handbook of New Security Studies, edited by J. Peter Burgess, 163–173. Abingdon, UK: Routledge, 2010.
  • Elbe, S. “Pandemic Security.” In The Routledge Handbook of New Security Studies, edited by J. Peter Burgess, 163–173. Abingdon, UK: Routledge, 2010.
  • Geissler, E., and J. E. van Courtland Moon, eds. Biological and Toxin Weapons: Research, Development and Use from the Middle Ages to 1945. New York: Oxford University Press, 1999.
  • Gentry, J., and J. Gordon. Strategic Warning Intelligence. Washington DC: Georgetown University Press, 2019.
  • Gerstein, D. Bioterror in the 21st Century: Emerging Threats in a New Global Environment. New York: Naval Institute Press, 2010.
  • Harrison, M., P. F. Walsh, S. Lysons-Smith, D. Truong, C. Horan, and R. Jabbour. “Tradecraft to Standards– Moving Criminal Intelligence Practice to a Profession through the Development of Criminal Intelligence Training and Development Continuum.” Policing (2018): 1–13.
  • Heymann, D. et al. Global Health Security: The Wider Lessons from the West WHO.” “Ebola Virus Disease in West Africa - the First Nine Months of the Epidemic and Forward Projections. The New England Journal of Medicine 371 (2015): 1481–1495.
  • Heymann, D., L. Chen, K. Takemi, D. P. Fidler, J. W. Tappero, M. J. Thomas, T. A. Kenyon. “Global Health Security: the Wider Lessons from the West African Ebola Virus Disease Epidemic.” The Lancet, no. 9980 (2015): 1884–1901. doi:10.1016/S0140-6736(15)60858-3
  • HMG. UK Biological Security Strategy. London: HMG, 2018.
  • The Human Security Centre. The Human Security Centre: Human Security Report. Oxford, UK: Oxford University Press, 2005.
  • Koblentz, G. Living Weapons. New York: Cornell University Press, 2009.
  • Koblentz, G., and B. Mazanec. “Viral Warfare: The Security Implications of Cyber and Biological Weapons.” Comparative Strategy 32, no. 5 (2013): 418–434. doi:10.1080/01495933.2013.821845.
  • Kolata, G., S. Wee, P. Belluck. 2018. “Chinese Scientist Claims to Use Crispr to Make First Edited Babies.” The New York Times, November 26. https://www.nytimes.com/2018/11/26/health/gene-editing-babies-china.html.
  • Lizotte, S. 2019. “Research Halted at USAMRID over Biosecurity Issues.” Global Biodefense, August 5. https://globalbiodefense.com/2019/08/05/research-halted-at-usamriid-over-biosafety-issues/CDC, Report on the Potential Exposure to Anthrax.
  • Marston, B., E. Kainne Dokubo, A. van Steelandt, L. Martel, D. Williams, S. Hersey, A. Jambai, S. Keita, T. G. Nyenswah, J. Redd. “Ebola Response Impact on Public Health Programs, West Africa 2014-2017” Emerging Infectious Diseases Journal 28, no. Supplement (2017): 25–31.
  • Murch, R., W. So, W. Buchholz, S. Raman, J. Peccoud. “Emerging New Discipline to Help Safeguard the Bioeconomy.” Frontiers in Bioengineering and Biotechnology 6, no. 39 (2018): 1–6. doi:10.3389/fbioe.2018.00039.
  • National Academy of Sciences. Human Genome Editing. Science Ethics and Governance. Washington, D.C: National Academies Press, 2017.
  • Petro, J., and S. Carus. “Biological Threat Characterisation Research: A Critical Component of National Biodefense, Biosecurity, and Bioterrorism.” Biodefense Strategy, Practice and Science 3 (2005): 295–308.
  • Revill, J. 2017. “Could Gene Editing Tools Such as CRISPR Be Used as a Biological Weapon.” The Conversation, August 31. https://theconversation.com/could-gene-editing-tools-such-as-crispr-be-used-as-a-biological-weapon-82187?utm_source=twitter&utm_medium=twitterbutton.
  • Soucheray, S. 2019. “With New Cases, Katwa Remains Epicenter of Ebola Outbreak.” CIDRAP News, February 18. http://www.cidrap.umn.edu/news-perspective/2019/02/new-cases-katwa-remains-epicenter-ebola-outbreak
  • Suk, J., A. Zmorzynska, I. Hunger, W. Biederbick, J. Sasse, H. Maidhof, and J. Semenza. “Dual Use Research and Technological Diffusion. Reconsidering the Bioterrorism Threat Spectrum.” PLOS Pathogens 7, no. 1 (2011): 1–3. doi:10.1371/journal.ppat.1001253.
  • Tucker, J., Ed. Innovation, Dual Use and Security. Cambridge, MA: The MIT Press, 2012.
  • Vogel, K. “Biodefense.” In Biosecurity Interventions, edited by A. Lakoff and S. Collier, 227–255. New York: Columbia University, 2008.
  • Vogel, K. “Intelligent Assessment: Putting Emerging Biotechnology Threats in Context.” Bulletin of the Atomic Scientists 35, no. 1 (2013): 45–54.
  • Vogel, K. “Necessary Interventions. Expertise and Experiments in Bioweapons Intelligence Assessments.” Science, Technology and Innovation Studies 9, no. 2 (2013): 61–88.
  • Vogel, K. Phantom Menace or Looming Danger? Baltimore, MD: The Johns Hopkins University Press, 2013.
  • Walsh, P. F. Intelligence and Intelligence Analysis. Abingdon, UK: Routledge, 2011.
  • Walsh, P. F. “Managing Intelligence and Responding to Emerging Threats: The Case of Biosecurity.” In The Handbook of Security, edited by M. Gill, 837–857. Basingstoke: Palgrave Macmillan, 2014.
  • Walsh, P. F. “Building Better Intelligence Frameworks Through Effective Governance.” International Journal of Intelligence and Counterintelligence 28, no. 1 (2015): 123–142. doi:10.1080/08850607.2014.924816.
  • Walsh, P. F. “Managing Emerging Health Security Threats since 9/11: The Role of Intelligence.” International Journal of Intelligence and Counterintelligence 29, no. 2 (2016): 341–367. doi:10.1080/08850607.2016.1121048.
  • Walsh, P. F. “Teaching Intelligence in the Twenty-first Century: Towards an Evidence-based Approach for Curriculum Design.” Intelligence and National Security 32, no. 7 (2017): 1005–1021.
  • Walsh, P. F. Intelligence Biosecurity and Bioterrorism. London: Palgrave Macmillan, 2018.
  • Walsh, P. F. 2019. “Transforming the Australian Intelligence Community: Mapping Change, Impact and Governance Challenges.” Paper given at the 60th International Studies Association Conference, August 27. Toronto, Canada.
  • Walsh, P. F., and S. Miller. “Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden.” Intelligence and National Security 31, no. 3 (2016): 345–368. doi:10.1080/02684527.2014.998436.
  • Walsh, P. F., and J. Ratcliffe. “Strategic Criminal Intelligence Education: A Collaborative Approach.” IALEIA Journal 16 (2005): 152–166.
  • White House. National Biodefense Strategy. Washington DC: White House, 2018.
  • WHO. “Ebola Virus Disease in West Africa - the First Nine Months of the Epidemic and Forward Projections.” The New England Journal of Medicine 371 (2015): 1481–1495.
  • Willingham, D. “A Fresh Threat: Will CAS9 Lead to CRISPR Bioweapons?” Journal of Biosecurity, Biosafety, and Biodefense Law 9, no. 1 (2018). doi:10.1515/jbbbl-2018-0010.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.