Skip to main content

Collection

  • Chapter
  • First Online:
Book cover Intelligence, Biosecurity and Bioterrorism

Abstract

This chapter discusses how traditional intelligence collection platforms (sigint and humint) have been applied to understand bio-threat and risks. The strengths and weaknesses of each platform is discussed, however the chapter argues other scientific sources of intelligence (forensics and epidemiology) are likely to be more useful in gaining greater understanding of potential emerging bio-threats and risks. The chapter also argues for a more systematic approach to collection against bio-threats and risks—one that considers what is required at strategic, operational and tactical levels.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • 9/11 Commission. (2004). The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States. Washington, DC: 9/11 Commission.

    Google Scholar 

  • Bean, H. (2007). The DNI’s Open Source Center: An Organizational Communication Perspective. International Journal of Intelligence and Counterintelligence, 20(2), 240–257.

    Article  Google Scholar 

  • Bombardt, J. (2000). Contagious Disease Dynamics for Biological Warfare and Bioterrorism Casualty Assessments. Alexandria, VA: U.S. Department of Defense.

    Google Scholar 

  • Chertoff, M. (2017). A Public Policy Perspective of the Dark Web. Journal of Cyber Policy, 2(1), 26–38. https://doi.org/10.1080/23738871.2017.1298643.

    Article  Google Scholar 

  • Crumpton, H. (2012). The Art of Intelligence: Lessons from a Life in the CIA’s Clandestine Service. New York: Penguin Publishing Group.

    Google Scholar 

  • DOJ. (2010). The United States Department of Justice. Amerithrax Investigative Summary. Washington, DC.

    Google Scholar 

  • GAO. (2017). Bio Forensics DHS Needs to Conduct a Formal Capability Gap Analysis to Better Identify and Address Gaps. Washington, DC: GAO.

    Google Scholar 

  • Gill, P., & Phythian, M. (2012). Intelligence in an Insecure World. Cambridge: Polity Press.

    Google Scholar 

  • Gordis, L. (2009). Epidemiology (4th ed.). Philadelphia, PA: Saunders Elsevier.

    Google Scholar 

  • Hayden, M. (2016). Playing to the Edge. New York: Penguin Press.

    Google Scholar 

  • Hulnick, A. (2002). The Downside of Open Source Intelligence. International Journal of Intelligence and Counterintelligence, 15(4), 565–579.

    Article  Google Scholar 

  • Inglis, T., et al. (2011). Forensic Investigation of Biological Weapons Use. In J. Gall & J. Payne-James (Eds.), Current Practices in Forensic Medicine (pp. 17–42). Chichester, UK: Wiley.

    Chapter  Google Scholar 

  • Johnson, L. (2017). National Security Intelligence. Cambridge, MA: Polity Press.

    Google Scholar 

  • Johnson, L., & Wirtz, J. (Eds.). (2015). Intelligence: The Secret World of Spies. New York: Oxford University Press.

    Google Scholar 

  • Johnson, L., et al. (2014). An INS Special Forum: Implications of the Snowden Leaks. Intelligence and National Security, 29(6), 793–810.

    Article  Google Scholar 

  • Kim, J., et al. (2015). Advances in Anthrax Detection: Overview of Bioprobes and Biosensors. Applied Biochemistry and Biotechnology, 176(4), 957–977.

    Article  Google Scholar 

  • Koblentz, G., & Tucker, J. (2010). Tracing an Attack: The Promise and Pitfalls of Microbial Forensics. Survival, 52(1), 159–186. https://doi.org/10.1080/00396331003612521.

    Article  Google Scholar 

  • Lee, M. (2017, January 5). Julian Assange’s Claim That There Was No Russian Involvement in Wikileaks Emails. The Washington Post. From https://www.washingtonpost.com/news/fact-checker/wp/2017/01/05/julian-assanges-claim-that-there-was-no-russian-involvement-in-wikileaks-emails/?utm_term=.bee14c837aef. Accessed March 15, 2017.

  • Lowenthal, M. (2012). Intelligence from Secrets to Policy. Thousand Oaks, CA: CQ Press.

    Google Scholar 

  • McGurry, J. (2017). Volleyball Games Appear to Take Place at North Korean Nuclear Test Site. The Guardian. From https://www.theguardian.com/world/2017/apr/20/north-korea-volleyball-nuclear-test-site-punggye-ri. Accessed March 15, 2017.

  • Mercado, S. (2014). Open Source Intelligence. In L. Johnson & J. Wirtz (Eds.), Intelligence: The Secret World of Spies (4th ed., pp. 120–129). New York: Oxford University Press.

    Google Scholar 

  • Murch, R. (2003). Microbial Forensics: Building a National Capacity to Investigate Bioterrorism. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 1(2), 1–5.

    Article  Google Scholar 

  • Office of Inspectors General DOD, CIA, NSA, ODNI, & DOJ. (2009). Report on the President’s Surveillance Program Volume 1. Washington, DC.

    Google Scholar 

  • Omand, D., et al. (2012). Introducing Social Media (SOCMINT) Intelligence. Intelligence and National Security, 27(6), 801–823.

    Article  Google Scholar 

  • Oppel, R., et al. (2010, January 4). Attacker in Afghanistan Was a Double Agent. The New York Times. From http://www.nytimes.com/2010/01/05/world/asia/05cia.html. Accessed March 15, 2017.

  • Redmond, P. (2015). The Challenges of Counterintelligence. In L. Johnson & J. Wirtz (Eds.), Intelligence the Secret World of Spies (4 ed., pp. 305–316). New York: Oxford University Press.

    Google Scholar 

  • Risen, J., & Lichtblau, E. (2005). Bush Lets US Spy on Callers Without Courts. The New York Times. From http://www.nytimes.com/2005/12/16/politics/bush-lets-us-spy-on-callers-without-courts.html. Accessed March 15, 2018.

  • Rovner, J. (2013). Intelligence in the Twitter Age. International Journal of Intelligence and Counterintelligence, 26(2), 260–271.

    Article  Google Scholar 

  • Shea, D. (2006). The National Biodefense Analysis and Countermeasure Center: Issues for Congress CRS Report (Vol. RL32891). Washington, DC: Congressional Research Service, The Library of Congress.

    Google Scholar 

  • Sims, J., & Gerber, B. (2009). Vaults Mirrors and Masks Rediscovering US Counterintelligence. Washington, DC: Georgetown University Press.

    Google Scholar 

  • Tucker, J., & Koblentz, G. (2009). The Four Faces of Microbial Forensics. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 7(4), 389–397. https://doi.org/10.1089/bsp.2009.0043.

    Article  Google Scholar 

  • Van Cleave, M. (2007). Counter Intelligence and National Security. Washington, DC: National Defense University.

    Google Scholar 

  • Vogel, K. (2013). Phantom Menace or Looming Danger?. Baltimore, MD: The Johns Hopkins University Press.

    Google Scholar 

  • Walsh, P. F. (2011). Intelligence and Intelligence Analysis. Abingdon, UK: Routledge.

    Google Scholar 

  • Walsh, P. F., & Miller, S. (2016). Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security, 31(3), 345–368.

    Article  Google Scholar 

  • Walsh, P. F. (2017). Drone Paramilitary Operations Against Suspected Global Terrorists: US and Australian Perspectives. Intelligence and National Security, 32(4), 429–433.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick F. Walsh .

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Walsh, P.F. (2018). Collection. In: Intelligence, Biosecurity and Bioterrorism. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-51700-5_4

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-51700-5_4

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-51699-2

  • Online ISBN: 978-1-137-51700-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics