Terrorists Ebook

Urban Survival Guide

Discover How You Can Easily Have A Survival Plan Staying Right Where You Currently Live That's Better Than Having. A Fully Stocked Rural Retreat That You Can't Get To! Finally Revealed: Urban Survival Secrets For Surviving Terrorist Attacks, Natural Disasters And Pandemics! In The Real World, Most People Don't Have A Fully Stocked Retreat They Can Escape To. Even If You've Planned Ahead And You Do, There's No Guarantee That You'll Leave In Time Or That You'll Be Able To Make It There. Your First Plan Must Be To Survive In Place. Read more...

Urban Survival Guide Summary

Rating:

4.6 stars out of 11 votes

Contents: Ebook
Author: David Morris
Official Website: urbansurvivalplayingcards.com
Price: $47.00

Access Now

My Urban Survival Guide Review

Highly Recommended

Recently several visitors of websites have asked me about this book, which is being promoted quite widely across the Internet. So I ordered a copy myself to figure out what all the publicity was about.

All the modules inside this ebook are very detailed and explanatory, there is nothing as comprehensive as this guide.

Sarin and VX terrorism in Japan

The nerve gas sarin, used by terrorists from a religious organization, injured over 500 people (seven fatalities) in Matsumoto in June 1994, and over 5000 people (11 fatalities) in Tokyo in March 1995. In slight and moderate cases, rhinorrhea, dim vision with prominent miosis, headache, or ocular pain occurred. In severe cases, coma, foamy bronchial secretion, respiratory weakness, fasciculation, convulsion, tachycardia, and hypertension were recognized. Atropine and or pralidoxime improved consciousness and respiration. Pralidoxime produced rapid recovery in serum and red cell cholinesterase. In surviving patients, extubation could be conducted on the first or second day. Complete recovery was obtained when patients received advanced life support before cardiac arrest developed. The same terrorist group also used VX in three serial incidents between 1994 and 1995 three people were injured, of whom one died. Dermal exposure or intramuscular injections were suspected.

Viral Terrorists

Researchers in the early 1970s found a form of the Rous sarcoma virus that had lost its power to cause cancer. Comparing this virus with the normal one, they found that the cancer-causing form had one large gene at the end of its tiny genome that the harmless type lacked. Somehow, the scientists reasoned, that gene must produce cancer when the virus inserted it into a cell's genome. They called the gene src, for sarcoma. Other scientists identified different cancer-causing genes in other viruses. Robert Huebner and George Todaro of the National Cancer Institute, part of NIH, gave all these genes the name oncogenes, after a Greek word meaning cancer. Huebner and Todaro proposed that when tumor viruses infected cells, the viruses slipped oncogenes into the cells' genomes much as a terrorist might smuggle in a bomb to blow up a building or a plane.

Defining The Microbial Forensics Program

Ous weapons because bioweapons can be grown from a single organism or cell thus creation of large quantities can be accomplished readily and at low cost, starting with minimal amounts of starting material. Thus, even the smallest amounts of pathogens can be used to perpetrate a major terrorist event or biocrime. Furthermore, it can be difficult if not impossible to determine whether very small amounts of such materials have been removed surreptitiously from a facility that is authorized to possess pathogens. Most importantly, a biological weapon can be easy to conceal and, depending on the target, easy to disseminate. We must accept that it is impossible to guarantee that the government can deter or prevent all bioterrorist or criminal acts. Therefore, a proactive approach must be taken. In addition to the physical security measures being enacted, science can be effective as a deterrent and for identifying perpetrators. One major scientific approach to improve investigative...

Microbial Forensic Tools

As stated above, forensic investigations use all types of physical evidence to attempt to obtain information on the organism, the persons involved, the places involved, the processes used to develop or disperse the weapon, the instrumentation used, and or the time of the criminal act. Other materials and methodologies may assist in an investigation of a bioterrorism event, and at times may be more informative than DNA-based tests. Traditional physical evidence collected at a crime scene will also be evaluated. In addition, a recent report by the American Academy of Microbiology34 described a number of non-DNA-based approaches to consider for the microbial forensic panoply of assays. These include

Engineering Novel Viruses Before and After Recombinant DNA

Typically, recombinant DNA manipulations of viruses begin with viral nucleic acid (RNA or DNA) that is then cloned and amplified in bacteria using plasmid vectors or in vitro using PCR. Once the genome sequence of a virus is known, however, it becomes possible to create this sequence artificially using overlapping synthetic oligonucleotides and gene synthesis techniques that have been available for many years. An example of this, which received a great deal of attention from the media and the scientific community, was recently published for an attenuated form of poliovirus.53 While the poliovirus case came as no surprise to virologists and molecular biologists, it did bring several issues to the forefront. If an infectious virus can be created by synthetic methods, can it ever really be eradicated In light of potential bioterrorist or biowarfare agents, should there be a restriction on making the genome sequence available in public databases Should research on these agents be banned,...

Signature sequence identificationpathogen identification

The concept has been successfully reduced to practice for 16S rDNA signature sequence-based identification of environmental Bordetella strains (von Wintzingerode et al, 2002 Hartmer et al, 2003) and of Mycobacteria (Lefmann et al., 2004) with 24 isolates unequivocally identified in the study. These experiments serve as a general model for microbial or viral genotypic fingerprints that can be utilized to differentiate between samples and extract corresponding best-matching reference sequences from reference databases. The advantage MALDI-TOF MS offers in this respect is the speed of analysis, the degree of automation and the opportunity for standardization. All of these are important attributes required to cope with new threats from infectious microorganisms, such as agents of bioterrorism, emerging pathogens and their resistance to antibiotic treatment, and also to allow high-level quality control of pharmaceutical products.

Bacterial Pathogens Of Concern

Many different bacterial pathogens can and have been employed in biocrimes. It is difficult to predict which pathogens will be used in the future, although availability, ease of handling, ease of weaponization, and potential impact (death or terror) are factors that might narrow the options.3 Traditionally bioterrorism defense priorities and pathogen-target lists have been greatly influenced by bacterial agents that were part of state-sponsored'' bioweapons programs. Thus, Bacillus anthracis (anthrax), Yersinia pestis (plague), Francisella tularensis (tularemia), Burkholderia sp. (glanders and melioidosis), and Brucella sp. (brucellosis) are often cited as possible bioterrorism agents. The 2001 anthrax letter attacks demonstrated that this is a very relevant list of potential biocrime agents. However, other commonly available pathogens must also be considered. In the U.S., two notable biocrimes used the food-borne pathogens Shigella and Salmonella. The very common occurrence of these...

Detection and quantification of nonhuman species

Real-time quantitative PCR is also a rapid and highly sensitive methodological tool for detection, identification and individualization of microbial agents that could be used in bioterrorist acts. For instance, real-time PCR assays are routinely used to detect the presence of DNA from Bacillus anthracis in environmental samples by using both unique plasmid-borne and chromosomal genes (Jones et al., 2005). Other highly sensitive real-time PCR assays for the detection of potential bioterrorism agents such as Yersinia Pestis, Francisella tularensis, Brucella spp. and Burkholderia spp. have also been developed (see a review of the assays for biodefence used at the USA Armed Forces Institute of Pathology in Jones et al., 2005).

Turning a Theory Upside Down

In 1976, Stehelin and others in Bishop and Varmus's laboratory found a gene similar to src in normal chicken cells. To their amazement, further analysis showed that this src-like gene had the form of a cell gene, not a virus gene. They also found that the gene was active in the cells, even though the cells were not cancerous. In other words, src, or a gene almost identical to it, apparently was, or had been, a normal chicken gene. Before tumor viruses became terrorists, the researchers concluded, the viruses had been thieves, taking a potential killer gene from the cells themselves. Bishop and Varmus called the normal form of

Forensic Case Examples

To better plan for forensic investigation strategies of an event, capitalizing on past experiences can shed light on current practices and the direction of future research. Two illustrative examples, neither of them bioterrorism acts, are the Sverdlovsk anthrax incident and the case of a dentist with AIDS who may have infected patients with HIV Both required epidemiological investigation and molecular biology to resolve.

Keim P. Microbial Forensics A Scientific Assessment. A Report From American Academy Of Microbiology. Washington Dc 2002

Bioterrorism From threat to reality. Ann Rev Microbiol 2002 56 167-185. 10. Carus SW. Bioterrorism and Biocrimes The Illicit Use of Biological Agents Since 1900. The Netherlands Fredonia Books 2000. 15. National Research Council. Making the Nation Safer. The Role of Science and Technology in Countering Terrorism. Washington, DC The National Academy Press 2002. 17. National Research Council. Countering Agricultural Bioterrorism. Washington, DC The National Academy Press 2002. 25. Arnon SS, Schechter R, Inglesby TV, Henderson DA, Bartlett JG, Ascher MS, Eitzen E, Fine AD, Hayer J, Layton M, Lillibridge S, Osterholm MT, O'Toole T, Parker G, Perl TM, Russell PK, Swerdlow DL, Tonat K. Botulinum toxin as a biological weapon. In Henderson DA, Inglesby TV, O'Toole T (eds). Bioterrorism-Guidelines for Medical and Public Health Management. Chicago American Medical Association Press 2002 141-165. 34. Budowle B, Schutzer SE, Einseln A, Kelley LC, Walsh AC, Smith JAL, Marrone BL,...

Aging and Conformational Diseases Failures of Law Enforcement Leading to Lawlessness

Nonetheless, many remarkable parallels, sometimes ethically questionable, but didactically appealing, do exist between the proteins in the cell, and humans in the society (see Table 1). These parallels were initially expressed by the adequate, albeit incomplete, social term chaper-one , suggesting only a rather passive defence mechanism against toxic protein aggregations in the cell. They can inspire scientists and politicians alike, in their commons search for solutions to crime may it be molecular crime, as in the case of aggregate-induced neurodegeneration and aging, or social crime, as in the case of mobs burning foreign embassies, or terrorists waging war on the democracies of the world.

Posttraumatic stress disorder

This syndrome is a delayed response following exposure to a stressful experience of an exceptionally threatening nature which is quite outside the range of everyday experience and which is likely to cause distress to almost everyone. There is a perceived danger of death or severe physical trauma but the injuries actually sustained may be quite trivial. The experiences that evoke the response include natural disaster, road traffic accidents, military or terrorist activity, and being the victim of torture or rape. The disorder has been estimated to occur in up to one third of patients involved in road traffic accidents.36,37

Conducting Interviews

Other differences between telephone and personal interviews are, surprisingly, modest55. In a biological terrorism event, cooperation in a telephone interview may be complicated by fear, as respondents tend to be more suspicious of the interviewer or the legitimacy of the study when face-to-face contact is lacking.

Evaluation Of The Etiologic Agent

Microbes are dynamic organisms, and are therefore constantly changing in response to natural selection pressures in their environment. It is often possible to determine the laboratory or geographic origin and character of microbes by use of strain typing, molecular biology tools, and antibiotic resistance patterns. For example, there are seven major serotypes of foot-and-mouth disease virus, and these have definite geographic distributions throughout the world. Ribotyping of Yersinia pestis was useful in ruling out a terrorist attack by Kashmir separatists in the pneumonic plague epidemic in Surat in 1994. Similarly, when parties to the war in Northern Bosnia accused each other of

Evaluation Of Scientific Literature

Terrorist or biological warfare attacks often do not take place in isolation. Successful attacks usually follow successful research and field trials. Any technology has a parenthood and genealogy attached to it. 61 Similar research may be conducted in different facilities by students or teachers of the perpetrators. There are exceptions, however, such as the New Zealand farmers who infected pet rabbits with rabbit calicivirus (which had been smuggled into the country

Equipment Or Potential Means Of Delivery

However, many biological crimes and terrorist attacks have been conducted with a much smaller footprint than that of a state-sponsored biological weapons program. The Rajneesh attack on a salad bar, which sickened more than 600 people,16 and the Shigella contamination of muffins17 required only a small clinical incubator. The New Zealand rabbit calicivirus epidemic that began with a bloodstained handkerchief, and started an epidemic that killed millions of wild rabbits required only a kitchen blender and one infected liver. Lack of conventional production capabilities should not rule out a possible intentional event.

Resistance to Chloramphenicol

Chromosomal mutants usually have altered ribosomes that no longer bind the antibiotic. Not surprisingly such mutations often cause slower or less accurate protein synthesis and the cells grow poorly. In contrast, plasmid-borne resistance to these antibiotics usually involves chemical attack on the antibiotic itself by specific enzymes encoded by the plasmid.

Multidisciplinary Approach To Biological Signatures

Achieving a sound scientific basis for correlating manufacturing processes to measurable intrinsic signatures will require a unique, multidisciplinary effort, ranging from information collection and analysis to experimental microbiology, analytical chemistry, physics, and state-of-the-art instrumental materials characterization. The Intelligence Community is a source of information about BW manufacturing processes associated with foreign programs. In addition, much of the information that is available to terrorists comes from a variety of unclassified sources such as underground cookbooks, Internet recipes, open

Future Challenges

Maintaining Vigilance Against Bioterrorism potent biological weapons. Experts in the field of bioterrorism list four diseases anthrax, botulism, plague, and smallpox as the greatest threats. While it is hoped that a biological weapons attack will never occur again, it is crucial to be prepared for the possibility. Prompt recognition of such an event, followed by rapid and appropriate isolation and treatment procedures, can help to minimize the consequences. The CDC, in cooperation with the Association for Professionals in Infection Control and Epidemiology (APIC), has prepared a bioterrorism readiness plan to be used as a template by health care facilities. Many of the recommendations are based on the Standard Precautions already employed by hospitals to prevent the spread of infectious agents (see Perspective 20.1). Some of the most relevant characteristics of the diseases that are the most likely candidates for biological weapons include Anthrax. This was the agent used in the...

Bioaerosols and Disease Donald E Gardner PhD

Anthrax is a major military threat facing the armed forces and a biological agent that could be used in a terrorist attack. It has been estimated by the Department of Defense that more than ten countries may possess or are suspected of having anthrax as a biological warfare agent. The Department of Defense has plans to vaccinate more than 2.4 million military members against this organism by the year 2005.

Advanced Concepts

Biological safety is an important concern for clinical microbiology. Because various collection, transport, and extraction systems inactivate organisms at different times, the technologist should follow recommendations of the Centers for Disease Control and Prevention (CDC) that call for universal precautions, treating all specimens as if they were infectious throughout the extraction process. Updated guidelines are available from the CDC for the handling of suspected bioterrorism material for example, the anthrax spores discovered in the United States Postal System in 2001. Organisms such as smallpox must be handled only in approved (level 4 containment) laboratories. Molecular testing has eased the requirements for preserving the viability of organisms for laboratory culture. This should improve safety levels as methods are devised that replace growing cultures.

Discussion And Future Directions

As analyses by these techniques continue and signature libraries of correlations between those analyses and growth and processing conditions grow, it will be necessary to develop an information system which combines disparate types of data to determine unique signatures. For example, the system would link weapons manufacturing information and associations with foreign or domestic terrorist groups, weaponization signatures as described in this chapter, DNA sequences, component materials analyses, and metabolic signatures. The information system must provide a transparent and flexible query structure for comparison of new unknown samples with existing data, available for any type of data from SEM images to Raman spectra. Algorithms capable of combining several signatures or pieces of data from individual techniques and generating a distinguishing signature for a growth process will need to be developed.

Storage of Affinity Columns

Affinity columns will last virtually indefinitely, provided they are protected from drying, microbial contamination, proteolysis, chemical attack and accumulation of extraneous insoluble material. These requirements are not difficult to meet. Columns should be stored in a neutral or slightly acidic

Considerations And Concerns Raised By Analysis Of Other Infections

Some of the principles discussed above are highlighted by a recent report on SARS. This coronavirus disease also evoked concern of a possible terrorist origin at the onset. A report in the Morbidity and Mortality Weekly Report (MMWR)14 on the Prevalence of IgG Antibody to SARS-Associated Coronavirus in Animal Traders discussed the need to validate and interpret tests in the appropriate populations the IgG test, discusses its inability to date the time of the infection, and the possibility of reactivity to a near neighbor that might be unknown. In a Promed bulletin, Dr. Berger looked at the data from a different angle and reported This week's study in MMWR indicates that animal contact may indeed promote infection however, the most striking finding seems to have eluded the authors 1.2 percent to 2.9 percent of individuals in a healthy control group of adults were also found to be seropositive The population of Guangdong Province is 86.42 million (2001), of whom 61.14 million are adults...

Health Insurance Options

In the spring of 2003, a Kaiser Health Poll reported that more than twice as many people were concerned about healthcare costs than were worried about not being able to pay their rent or mortgage, losing money in the stock market, being a victim of a terrorist attack, or losing their job. Approximately 36 percent of Americans worried that the amount they paid for healthcare services or health insurance coverage would increase.

Grid Activities In Asia And Japan

Other international grid projects in the area of drug discovery include the UD Patriot Grid projects, which are a family of grids to identify new drugs for diseases that are known to have potential for bioterrorism. The purpose is to create defensive capabilities to accelerate the drug discovery process by using the VHTS techniques

Summary and conclusions

Infections with dengue viruses continue to present a major and escalating global public health problem. Vector control programmes are expensive, largely unsuccessful or of only short-term benefit, and thus vaccine development continues to be the most effective strategy for tackling this problem. The complex pathogenesis of dengue infections and the apparent involvement of the immune response in severe disease has raised questions over the safety and efficacy of every vaccine design strategy developed so far. However, when industrialised nations have been faced with theoretical threats of the same magnitude as dengue much less risk-averse policies have been adopted. Following the terrorist attack on September 11th 2001 in New York, many countries became fearful of a terrorist attack using smallpox. Consequently large stocks of vaccine were ordered and administration policies developed, even though the vaccine had not gone through the normal regulatory pathway and the incidence of...

Special treatment needs of sexual violence

Many colleagues in the field of refugee mental health have sought to break the 'conspiracy of silence related to sexual violence'. (15 While this issue has been well documented in refugee communities, it was not until the Bosnian conflict that rape was finally accepted by the international community not as a criminal act but as a crime against humanity. This recognition of sexual violence as the most common type of torture of women, as well as a major terrorist instrument of war, has contributed to the protection and psychiatric care of sexually abused refugee survivors. While the political will now exists to condemn rape, and to protect refugees from it, the cultural stigma and corresponding social punishments of women considered 'tainted' by sexual violence, sometimes including their murder by relatives, continues to make the psychiatric care of these survivors extremely difficult. In most cultures, rape remains a secret issue caused by the refugee's extreme resistence to reveal any...

Validation Of Laboratory Tests

When previously validated test procedures are modified, revalidation of the procedures is necessary (particularly for material modifications). Use of a tentatively validated, newly developed assay should be acceptable provided it was developed to investigate a biocrime or bioterrorism event which may be necessary in an urgent manner or where a rapid analysis is needed. If such test results will be presented during courtroom testimony, test validation should be completed beforehand, or a panel of experts should be convened to confirm the validity of the procedure and determine the limitations of the results.

Traumatic Brain Injury TBI

Unexpected crises have set the rhythm of our days after the fall of the Berlin Wall, the dismemberment of the Soviet Union and the dissolution of the Warsaw Pact. In a world that still needs to find a clear path to be open toward the future and to think about the new and the possible, as recently stated by philosopher Bodei (2006), we have unfortunately witnessed the events of September 11, 2001 in New York, March 11, 2004 in Madrid, July 19, 2005 in London and a series of armed conflicts, from Kosovo to Sudan, from East Timor to Afghanistan, Iraq, and the Middle East. All these changes in the world political climate have brought an increase in the incidence of traumatic brain injury (TBI) and spinal cord injury (SCI) both in soldiers and in civilians from war zones and terrorist attacks. TBI has proven unusually common in the current conflicts in Iraq and Afghanistan, in which new body armor saves soldiers from injuries that would have killed them in the past but cannot keep their...

Admissibility Standards for Scientific Evidence

In the United States and abroad, much attention has been focused on scientific solutions to the new forensic problems posed by the prospect of biological weapons attacks. The threat of war and of terrorist activity at home and abroad has created a new consciousness of our vulnerability and sparked discussion of how best to respond. Deliberate release of a biological agent directed against the U.S. military or civilian population or such critical infrastructures as animal and plant agriculture and the food supply system would be either an act of war, if launched by a nation state, or a criminal act, if perpetrated by an individual or group of terrorists. The U.S. would respond by political, diplomatic, military, and legal means. For these to be most effective, it is essential to be able to investigate the event, correctly identify those responsible, and prove this in a court of law. Readers will be familiar with the concept of forensic examination of firearms and of bullets recovered...

Efforts to Improve the Diagnosis and Treatment of Posttraumatic Stress Disorder

Posttraumatic stress disorder (PTSD) became part of our lexicon in the aftermath of the Vietnam War, but the symptoms and associated functional impairment it represents have been known for centuries. Perhaps Cain was the first to suffer the torment of this disorder, and Homer certainly depicts its symptoms in his account of Achilles in The Iliad. More recently, the medical literature has featured hundreds of accounts from the American Civil War, both World Wars, and other national and international conflicts. Authors identify myriad physical and psychological symptoms that escape efforts to ascribe them to specific environmental factors, but are linked to the stress of war. PTSD is also well documented in many victims of terrorism, genocide and personal assaults such as rape. An estimated 10,000 Croatian Homeland War veterans (15 prevalence) have PTSD, with an alarmingly high suicide rate. The current conflict in Iraq, involving snipers and suicide bombings, as will seek the help of...

Viral Forensics the Schmidt Case

Though not a panacea, phylogenetic analyses will prove useful in a range of forensic investigations. As with other molecular forensic approaches they can be particularly effective in demonstrating the innocence of accused individuals. They can be also be useful in tracing sources for any transfer of infectious materials whether viral, bacterial, or protozoan, involving accidental contamination or intentional infection in personal crimes or acts of terrorism. However, these applications are potentially limited by rates of sequence change, which must be sufficiently fast to provide a record of phylogenetic relatedness, but slow enough to preserve sufficient phylogenetic signal, prior to its being overwritten with multiple substitutions at individual sites. Application of phylogenetic analyses can also be complicated by the propensity of some viruses to recombine.

Rabbit Fever Tularemia

Lymfonodes Rabbit

Tularemia is widespread among wild animals in the United States, involving species as diverse as rabbits, muskrats, and bobcats. Many human cases are acquired when people are skinning animals that appear to be free of disease. The causative organism enters through unnoticed scratches or by penetration of a mucous membrane. The disease can also be acquired from the bites of flies and ticks and by inhalation of the causative organism. It is potentially a disease transmitted by bioterrorism.

Bacteria that Form a Resting Stage

Cyst Forming Azospirillum

Bacillus and Clostridium species are common Gram-positive rod-shaped bacteria that form endospores the position of the spore in the cell can be used as an aid in identification (figure 11.16). Clostridium species, which are obligate anaerobes, were discussed earlier. Bacillus species may be either obligate aerobes or facultative anaerobes, and many have notable characteristics. A suspension of endospores of B. stearothermophilus, a ther-mophilic species, is used as a biological indicator in quality control procedures to ensure that an autoclave is working properly. Bacillus anthracis causes the disease anthrax, which can be acquired from contacting its endospores in soil or in animal hides or wool. Unfortunately, the spores can also be used as an agent in bioterrorism. Once inhaled, the spores germinate and cause disease. Likewise, spores that enter through breaks in the

Laccase Based Defense Against Biological and Chemical Warfare Agents

The 2001 anthrax letter cases in the USA, and the 1995 sarin attack in Tokyo illustrate the threat that biological and chemical weapons pose when used by terrorists. They also emphasize how important it is for security, emergency, and medical agencies to be adequately equipped to decontaminate large, open areas such as subways, airports, and other public facilities when attacked by biological or chemical warfare agents. Traditionally used decontamination systems are not suited for such tasks, as they generally involve chlorine-based chemistry, and their corrosiveness can cause bodily harm as well as material damage, particularly on sensitive or electronic equipments. Development of new, milder, and more universally applicable decontamination systems is highly desirable. Industrial oxido-reductases (such as laccases) hold promise because of their ability to oxidize a wide range of harmful substances, including biological warfare agents and nerve agents like VX and anthrax spores. A...

An Overview Of Microbial Diagnostics

Subsequent to the 2001 anthrax attacks, increased distinctions have been drawn between detection diagnostics, which attempt to indicate the presence of specific pathogens at a broad level (family, genus, or species), and forensic diagnostics that resolve individual strains or isolates. Our discussion will focus on detection and forensic diagnostics from the viewpoint of detecting and analyzing bioterrorism incidents. While these techniques have obvious additional applications in clinical health, agriculture, and food safety, we will not address these areas in detail. It is useful to examine the impact of economics on the use of microbial diagnostics. Detection diagnostics are employed to provide wide-area protection against the possibility of a pathogen release, in the case of bioterrorism, or to monitor the spread of a natural pathogen (e.g., West Nile virus). Depending on the circumstances of the surveillance and the probability of encountering the pathogen, species-level...

Use of optical maps for microbial identification and infectious disease diagnosis

The presence and replication of a pathogen in a certain host may or may not cause disease, depending on the host defense system as well as the antigenic capacity of the microbe. This antigenic capacity is largely determined by genes that code for cell-surface epitopes and secreted toxins. Because these genes are under such strong selective pressure, a wide range of genetic variants has emerged over the years. The ability to rapidly detect and discern these variants, combined with a detailed knowledge of toxicity and host-survival implications will have a lasting affect on both the medical and anti-bioterrorism communities. Clinicians can currently isolate and culture a wide range of infectious microbes from patients. However, if this practice is coupled with rapid tests to identify highly and or uniquely pathogenic sub-strains, then appropriate treatment regimes can be prescribed earlier, reducing the risk of sepsis and widespread infection. The optical mapping system can serve as an...

Cavtat June 1316 2005

In June, 2005, in the town of Cavtat on the Adriatic coast of Croatia, we brought together many of the leading researchers in the use of VR therapy in psychological disorders. The purpose of this NATO-sponsored Advanced Research Workshop (ARW) was to give these groundbreaking researchers an opportunity to share their experiences and expertise, to achieve consensus on the best methods for incorporating VR in the treatment of veterans of war and terrorism, and to foster multinational collaborative studies in this regard. To achieve this, invited experts shared the most salient findings of recent research with which they have been involved. We then divided all workshop participants into working groups to focus on four key elements of the challenges faced in utilizing VR and other new technologies in the treatment of PTSD

The World of the Microorganism

Microorganisms are a key component of biological warfare along with chemicals that disrupt homeostasis. The anthrax attack that followed the 9 11 terrorist attacks clearly illustrated how a dusting of anthrax in an envelope can be lethal to people in an office building. Anthrax is a disease caused by the microorganism Bacillus anthracis, a bacterium that forms endospores and infiltrates Fortunately, incidents of biological attacks using microorganisms have been infrequent. However, there are thousands of microorganisms all around us that can be just as deadly and debilitating as the microorganisms used in warfare throughout history.

Antibacterial Spectrum and Resistance

With the exception of the first generation, the quinolones are active against a variety of pathogens associated with respiratory tract infections, such as Chlamydia pneumoniae, Mycoplasma pneumoniae, Legionella pneu-mophila, and Mycobacterialspp., although these drugs are not FDA-approved for the latter. Recently, ciprofloxacin has gained popular attention in providing coverage for Bacillus anthracis, a major bioterrorism agent.

Investigation of Suspicious Disease Outbreaks

Most of the terrorism experienced globally has involved highly localized attacks with explosives or toxic chemicals that produce mass casualties at the time of the event or soon after. Such incidents are obvious, and the extent of the damage can be readily and immediately perceived. This chapter is dedicated to investigation of covert attacks with biological weapons, in which signs and symptoms of clinical illness are usually delayed so that the scope of the problem grows over hours and days. Without physical evidence of an attack or a credible announcement, the deliberate nature of the incident may not be suspected or discovered for some time, if ever. Given the heightened national state of alert currently, almost all outbreaks of disease, regardless of size, should be evaluated considering the possibility of bioterrorism or agroterrorism. In many cases, a rapid, well conducted etiologic and epidemiologic investigation paired with an analysis of the distribution and number of...

Chapter References

Simon, R.I. and Bloom, R.A. (1987). After the terrorist incident psychotherapeutic treatment of former hostages. American Journal of Psychiatry, 41, 194-200. 72. Shalev, A.Y. (1992). Post traumatic stress disorder among injured survivors of terrorist attack predictive value of early intrusion and avoidance symptoms. Journal of Nervous and Mental Disease, 180, 505-9. 73. Abenheim, L., Dab, W., and Salmis, L.R. (1992). Study of civilian victims of terrorist attacks. Journal of Clinical Epidemiology, 45, 103-9. 74. Desivilya, H.S., Gal, R., and Ayalon, O. (1996). Extent of victimisation, traumatic stress symptoms and adjustment of terrorist assault survivors a long term follow up. Journal of Traumatic Stress, 9, 881-9.

Novel Approaches To The Diagnosis And Treatment Of Posttraumatic Stress Disorder

Meetings supported by the NATO STS Programme are in security-related priority areas of Defence Against Terrorism or Countering Other Threats to Security. The types of meeting supported are generally Advanced Study Institutes and Advanced Research Workshops . The NATO STS Series collects together the results of these meetings. The meetings are co-organized by scientists from NATO countries and scientists from NATO's Partner or Mediterranean Dialogue countries. The observations and recommendations made at the meetings, as well as the contents of the volumes in the Series, reflect those of participants and contributors only they should not necessarily be regarded as reflecting NATO views or policy.

Concerns Regarding DNA Technologies

Advent of any new technology should bring scrutiny over the safety and efficacy of the procedures. When recombinant DNA technologies first allowed the cloning of genes over two decades ago, controversies swirled about their use and possible abuse. Even the scientists who developed the technologies were concerned about potential dangers in gene cloning. In response, the National Institutes of Health (NIH) formed the Recombinant DNA Advisory Committee (RAC) to develop a set of guidelines for conducting research that involved recombinant DNA techniques and gene cloning. Today, we are enjoying the fruits of many of those technologies, as evidenced by the list of commercially available products in table 9.2. Despite the fact that the technologies can be used to produce life-saving products, however, there can never be a guarantee that the same techniques will not be used for malicious purposes. Today, the idea that superbugs'' are being created for the purpose of bioterrorism is a...

Case Study Of Bacillus Anthracis

Microbial Forensics

In this section, we will present some quantitative considerations related to microbial forensics. We will use published research on Bacillus anthracis to illustrate several important issues. We do so because the anthrax terrorist attacks of October 2001 have received considerable attention and, thus, offer concrete data for discussion. However, we will gloss over certain complications of this particular example in order to emphasize more general issues that would probably apply to similar cases in the future.

Epidemiologic Investigation for Public Health Biodefense and Forensic Microbiology

Bioterrorism Preparedness and Response Program, National Center for Infectious Diseases, Centers for Disease Control and Prevention, Atlanta, Georgia Microorganisms are very efficient at infecting humans, using a number of different strategies and mechanisms. The deliberate dissemination of a biological agent by many of these same mechanisms presents the latest challenge to public health. The deliberate dissemination will often be obvious however, identifying the covert dissemination of a biological may present challenges. Nonetheless, a thorough investigation integrating epidemiologic data and molecular typing will help to differentiate between a naturally occurring disease outbreak and one resulting from an act of terrorism.

Preliminary Attempts To Find A Geneprotein Relationship

As early as 1936, it became apparent to the Mendelian geneticists that future experiments of the sort successful in elucidating the basic features of Mendelian genetics were unlikely to yield productive evidence about how genes act, Instead, it would be necessary to find biological objects more suitable for chemical analysis. They were aware, moreover, that contemporary knowledge of nucleic acid and protein chemistry was completely inadequate for a fundamental chemical attack on even the most suitable biological systems. Fortunately, however, the limitations in chemistry did not deter them from Iteming how to do genetic experiments with chemically simple molds, bacteria, and viruses. As we shall see, the necessary chemical farts became available almost as soon as the geneticists were ready to use them.

Botulinum Neurotoxin And Botulism

Naturally occurring botulism can result from ingestion of preformed toxin (food botulism) or from toxin produced in situ due to wound infection (wound botulism) or colonization of the gastrointestinal tract (infant or intestinal botulism). Botulism can also occur in exposed laboratory workers or from an overdose of therapeutic neurotoxin. In addition, the botulinum neurotoxins are classified by the Centers for Disease Control (CDC) as one of the six highest-risk threat agents for bioterrorism, due to their extreme potency and lethality, ease of production and transport, and victims' need for prolonged intensive care.7 Intoxication can occur via oral ingestion of toxin or inhalation of aerosolized toxin.11,12 While only four of the neurotoxin serotypes cause natural human disease, aerosolized neurotoxin serotypes C, D, and G produce botulism in primates by the inhalation route,11 and would most likely also affect humans. Thus it is likely that any one of the seven neurotoxin serotypes

The Threat

Terrorism can be defined as an attack or threat of an attack on the innocent to create fear, intimidate, inflict harm, and or affect economic well-being. These acts have often been politically motivated, but may not always be so. To create terror, perpetrators of bioterrorism use pathogens or toxins as weapons. A number of bacteria, viruses, and fungi pose serious health risks to humans, animals, and plants, and the use of them as bioweapons can have serious consequences on human health, economic development, social stability, and political activities of nations worldwide. Moreover, technology has developed to such a point that there is a greater potential and increased likelihood that biological weapons will be accessible to individuals or small groups of individuals instead of just state organized institutions. Sophisticated high technology, such as that used for nuclear weapon development, is not needed to produce large quantities of weaponizable pathogens, and large quantities of...

Education

One of the best ways to combat a bioterrorism event (or any disease outbreak) is by having an involved and educated public. Surveillance by those who recognize a disease (particularly a rarely occurring one) can help reduce the effects of the disease. Furthermore, proper understanding of and response to an event can reduce public fear, minimize economic impact, and halt the paralyzing effect that some terrorists attempt to inflict. However, the public may not be educated sufficiently to serve in this capacity. The following example of the state-of-understanding of a potential health risk and bioterrorism act demonstrates the need for better education tools and strategies. While not a direct action of a microbial forensics program, the above described state of affairs of the public's understanding points to a need for better education. Smallpox has been presented substantially in the news, yet the public knows little about it. Increased preparedness and planning will enable early...

Intrinsic Structure

Like graphite, CNT tend to aggregate to maximize contact between graphitic layers, and this is particularly the case for SWCNT. The resultant bundling contributes to the insolubility of CNT. CNT are seen as strongly resistant to chemical attack they will burn in air at temperatures 500 C

Swgmgf

Since the first two components that the national microbial forensic laboratory will rely upon are addressed in other chapters, the focus here will be on the SWGMGF. The newly formed SWGMGF is hosted by the FBI and has a membership drawn from a wide range of federal agencies, as well as academia. Input from the private sector will be sought on a routine basis. As mentioned above, the SWGMGF is modeled after the successful practices in the human DNA forensic arena (i.e., SWGDAM)30 which utilizes peer consensus to identify and define the criteria on various topics, address technical issues, and set performance guidelines. The Scientific Working Group's success is based on bringing together experienced individuals and organizations (that routinely do not have the opportunity to share and exchange ideas) to foster high-quality, integrated interactions so that challenges related to bioterrorism and biocrimes can be rapidly and effectively addressed. The goals of the SWGMGF are to provide...

Antioxidant Defence

However, ever since the production of an oxygen-rich atmosphere early in biological evolution, living organisms have of necessity developed protective systems to combat the powerful damaging effects of oxidation. Peroxides (hydrogen peroxide, alkyl hydroperoxides and peroxynitrite) and oxygen- and nitrogen-centred radicals derived there from (ROS or NOS, respectively) have the potential to chemically damage carbohydrates, proteins, lipids and nucleic acids. Being a kind of unavoidable hazard in aerobic life, ROS and NOS are further misused to build up the armamentarium of the steady battle between pathogenic micro-organisms and their victims. In this context, the formation of the superoxide radical is often complicated by generation of NO and lipid hydroperoxides by NO synthases and lipoxygenases, respectively. Inevitably, this scenario affords efficient systems of self-protection and defence against the chemical attack from outside. The required efficiency is best achieved by...

Setting Standards

Most experts now think that the chances of a dangerous genetically modified microorganism escaping a laboratory on its own are small. Especially after the al-Qaeda attacks of September 2001, however, fear has grown that terrorists might create and release such deadly microbes deliberately. Defectors from Soviet biological warfare laboratories reported in the 1990s that the laboratories had conducted genetic engineering experiments on disease-causing bacteria, for instance. Two experiments in the early 2000s were innocent in themselves, but they showed how easy creating a deadly microorganism could be. In the first experiment, described in February 2001, Australian scientists genetically altered the virus that causes mousepox, a disease similar to the often fatal human disease smallpox, and thereby accidentally made a virus that could kill mice vaccinated against the standard form of mousepox. Secondly, scientists at the State University of New York at Stony Brook reported in July 2002...

Types of Botulism

While successful use of neurotoxin as a bioterror agent has not occurred, it is likely only a matter of time until botulism is intentionally caused by release of toxin by terrorists. The toxin's potency and lethality make it an ideal bioweapon, and has resulted in its classification by the CDC as a category A biothreat agent, the highest level. Botulinum toxin has already been released unsuccessfully by the Japanese cult Aum Shinryko.7 Both Iraq and the former Soviet Union produced botulinum neurotoxin (BoNT) for use as weapons23,24 and at least three additional countries (Iran, North Korea, and Syria) have developed or are believed to be developing BoNT as an instrument of mass destruction. Iraq produced 19,000 L of concentrated BoNT, of which 10,000 L were weaponized in missile warheads or bombs.23,25

Discussion

The applications enabled by this new sequencing technology and its usefulness to the drug discovery and development process are only beginning to be discovered. Once the technology is widely available and its power is known, additional applications will be developed. The ability to sequence de novo opens up a wide array of possibilities for new discovery and creative approaches to important and unaddressed problems in many areas of research and development. In the public health arena, 454 sequencing can be applied to the worldwide tracking and monitoring of the spread of specific strains of pathogenic microorganisms. In bio-defense, one can envision the rapid identification of the strain of an isolated suspected bioterrorism agent, or the identification of pathogens by sequencing complex mixtures. Sequencing the complete or partial genomes of large populations of individuals will impact our understanding of the genetic basis of human diseases. In cancer biology, rapid and inexpensive...

Aviation security

As mentioned previously, law enforcement agencies represented the initial impetus for NRL flow immunosensor efforts. Aviation security programs at the Federal Aviation Administration (FAA) supported early development of the TNT sensor for pre-flight screening of cargo holds, baggage compartments and passenger cabins of airplanes. In the early field tests, the NRL prototype could detect TNT (or DNT) particles present on the airplane when a MRI Spincon was able to collect the explosives into water at levels above 5 ng ml. These values were independently confirmed using GC ECD analysis. Further assay development was pursued for the other explosive molecules of importance in terrorist activities, including RDX and PETN, the primary components of plastic explosives. Reliable assays were demonstrated for all the compounds of interest (Whelan et al., 1993 Judd et al., 1995 Bart et al., 1996). True.implementation of the technology, however, has been problematic due to regulatory constraints,...

Anthracis Analysis

Following the bioterrorism attacks in the U.S. in October 2001, in which multiple samples of Bacillus anthracis spores were sent through the mail to a variety of targets, TIGR was asked to sequence and analyze the strain of anthrax bacterium used in these attacks. The goals of the analysis were threefold (1) to determine whether the anthrax had been genetically engineered in any way, (2) to discover any and all differences between the attack strain and known strains, and (3) to create a unique genetic signature that could be used to characterize the attack strain. Shortly after the attacks occurred, VNTR analysis showed that the strain used in the attacks was Ames, a strain originally isolated from a cow in Texas in 1981. This strain had been sent to the U.S. Army biodefense laboratory in Ft. Detrick, Maryland at that time, and subsequently distributed to multiple labs around the world engaged in anthrax research. Using all known anthrax VNTR markers, the samples were...

Bioinformatics

As much as the World Trade Center appears to have been the most demanding identification initiative to date, the circumstances of the incident could have substantially increased the complexity of DNA-based identifications. The data processing contingencies would have been very different if the collapse of the World Trade Center towers had trapped the normal weekday occupancy of 50 000 instead of 2749, or had included families (Leclair et al., 2007). High body fragmentation high remains dispersal incidents involving 100 000 or 1 000 000 casualties as a result of natural, accidental or terrorist activity are within the realm of possibilities. Bioinformatic tools that can handle this sample load have been developed, however it is unclear whether the STR loci currently in use in forensics would provide sufficient discrimination power to support large-scale kinship analysis and parentage trio searching algorithms. These scenarios can be simulated and conclusions drawn as to the genetic...

Final Remarks

And study of the pathogenesis and epidemiology of infectious diseases. The availability of complete genome sequences of large numbers of pathogenic microorganisms will provide a better understanding of their evolutionary genetics, virulence, and host interactions. Microbial and host gene expression profiles have been used to develop tools that allow faster and more precise diagnosis and individually tailored treatment regimens and outcome prediction. In the future, there will be a need for more rapid diagnosis, increased standardization of testing, and greater adaptability to cope with new threats from infectious microorganisms, such as agents of bioterrorism and emerging pathogens. The combination of the new tools that are now being developed in research laboratories and improved communication between physicians and clinical microbiologists should lead to intense changes in the way that clinical microbiologists work.

Definitions

Biocrime or bioterrorism is the threat or use of microorganisms, toxins, pests, prions, or their associated ancillary products to commit acts of crime or terror. Preliminary validation is the acquisition of limited test data to enable an evaluation of a method used to assess materials derived from a biocrime or bioterrorism event.

Validation

Preliminary Validation Is the Acquisition of Limited Test Data to Enable an Evaluation of a Method Used to Provide Investigative Support to Investigate a Biocrime or Bioterrorism Event. If the Results Are to Be Used for Other Than Investigative Support, Then a Panel of Peer Experts, External to the Laboratory, Should Be Convened to Assess the Utility of the Method and to Define the Limits of Interpretation and Conclusions Drawn

Vrmc

Chemical Signals Lizards

VR has proven an effective method of exposure for those suffering from PTSD, whether it is due to a MVA, natural disaster, terrorism, or war-related trauma. Often in PTSD treatment it is not practical or advisable to re-expose the patient to the trauma in a real-world setting. VR, however, can effectively place the patient back into that scenario so that the necessary processing of memories can occur, allowing the individual to move through the trauma and on to recovery.

History

International lists of livestock diseases that pose the greatest threats are maintained by the International Organization of Epizootics (OIE).14 There are about 15 diseases on the OIE List A and a much larger number in List B. Blue-tongue, Newcastle disease, and vesicular stomatitis, which are on List A, occur naturally in the U.S. Terrorists and criminals have easier access to these and other animal pathogens, because they occur naturally. Some animal diseases are caused by zoonotic pathogens (i.e., causing disease in animals and humans). These include Rift Valley Fever (Bunyaviridae), Glanders (Burkholderia mallei), and Q fever (Coxiella burnetii). Pathogens that reside in a broad range of host species can be more difficult to eradicate and enable access from a variety of reservoirs. The most significant plant pathogen threats for U.S. agriculture are fungi19 such as soybean rust (Phakospora pachyrhizi)20,21 and wheat stem rust (Puc-cinia graminis).22 Wheat stem rust can be an...

Background

Terrorist events, natural and man-made disasters, and intra- and international conflicts over the past 10-15 years have led to increased attention to the prevalence and adverse health consequences of posttraumatic stress disorder (PTSD). PTSD has an estimated 2-5 point prevalence and 8-12 lifetime prevalence in the general population, with higher rates in primary care settings, and even more so in combat veterans 1-9 . It is especially common after terrorism and natural disasters for example, 60 of those who sought care after terrorist sarin release still met PTSD criteria 6 months later 10 , as did 41 of victims of a terrorist bombing in a Paris subway 11 . Likewise, 43 of earthquake survivors in Turkey were diagnosed with PTSD 12 . With 24-hour television news coverage, such events impact an entire society after the terrorist attacks in the U.S. on September 11, 2001, one in six adults nationwide had persistent distress 2 months later, and this was associated with poorer function at...

Safety issues

The Centers for Disease Control Laboratory Response Network to Bioterrorism (LRN) recommends that samples to be analyzed for biological threat agents be processed within a certified Class II biological safety cabinet (BSC). Most diagnostic procedures deal with hydrated samples such as tissues and bodily fluids, and many biological samples from the environment are also hydrated, e.g., air collector fluids, water washings, etc. By the nature of such samples, procedures and protective equipment are usually adequate to handle most diagnostic samples safely within the aforementioned Class II BSC at biosafety level (BSL)-2 biocontainment levels.11 However, certain forms of biological threat agents present unique problems with respect to their safe handling while protecting the forensic evidence. For example, powders can easily disperse in the air currents within a Class II biological safety cabinet, and in those cases where preserving forensic evidence is important, introducing liquid...

Official Download Link Urban Survival Guide

The best part is you do not have to wait for Urban Survival Guide to come in the mail, or drive to a store to get it. You can download it to your computer right now for only $47.00.

Download Now