Details

Essentials of Biological Security


Essentials of Biological Security

A Global Perspective
1. Aufl.

von: Lijun Shang, Weiwen Zhang, Malcolm Dando

101,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 23.02.2024
ISBN/EAN: 9781394189038
Sprache: englisch
Anzahl Seiten: 320

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Essentials of Biological Security</b> <p> <b>A guide to minimizing the threat of misusing benignly intended and dual-use biological research </b> <p>In <i>Essentials of Biological Security: A Global Perspective</i>, a team of distinguished researchers delivers a fundamental resource designed to raise awareness and understanding of biological security as it pertains to the malign manipulation of benignly intended scientific research. <p>Written by experts who have spent decades involved in biological security issues, the book is systematically organized to make it accessible to a wide range of life scientists likely to encounter dangerous opportunities for the deliberate misuse of their research. Readers will also find: <ul><li>A thorough introduction to biological security and the chemical and biological weapons (CBW) threat spectrum </li><li>Comprehensive explorations of the history of biological weapons from antiquity to modern day </li><li>Practical discussions of dual-use technologies and how to minimize their risk </li><li>Expert analyses of the Biological and Toxin Weapons Convention and other relevant international agreements and organizations </li></ul> <p>Perfect for professionals working in life sciences, medicine, global health, biosafety, and biosecurity, <i>Essentials of Biological Security: A Global Perspective </i>will also benefit anyone with an interest in and being responsible for biological security.
<p>Endorsement xv</p> <p>List of Figures xvii</p> <p>List of Tables xviii</p> <p>List of Contributors xix</p> <p>Foreword xxi</p> <p>Acknowledgements xxv</p> <p>Acronyms xxvii</p> <p><b>1 Biological Security After the Pandemic 1<br /> </b><i>Lijun Shang, Weiwen Zhang, and Malcolm Dando</i></p> <p>1.1 The Objective of the Book 2</p> <p>1.2 The Structure of the Book 7</p> <p>1.3 Overview of the Chapters 7</p> <p>Author Biography 8</p> <p>References 9</p> <p><b>2 Falling Between the Cracks and by the Sides: Can Disarmament Treaties Respond to Scientific and Technological Developments? 11<br /> </b><i>Jean Pascal Zanders</i></p> <p>2.1 Introduction 12</p> <p>2.2 Concepts of Disease and Toxicants in Relationship to CBW 13</p> <p>2.2.1 The Impact of Germ Theory on the ‘Poison’ Concept 14</p> <p>2.2.2 The Impact of Chemistry on the ‘Poison’ Concept 15</p> <p>2.3 Capturing Evolving Concepts of Disease and Toxicants in Restraining Warfare 16</p> <p>2.4 Further Development of the Control of Toxic Weapons 17</p> <p>2.4.1 Confirming the Semantic Bifurcation 18</p> <p>2.4.2 Of Humanitarian Foundations and a Dual-Use Quandary 20</p> <p>2.5 Implications of Evolving Concepts and S&T Developments for Disarmament Law 21</p> <p>2.5.1 Institutional Interests 22</p> <p>2.5.2 Semantic Shifts as Indicators of Scientific and Technological Advancements 22</p> <p>2.5.3 The Future Dimension of Disarmament 23</p> <p>2.6 Conclusions: Responding to S&T Developments 25</p> <p>Author Biography 28</p> <p>References 28</p> <p><b>3 A Multifaceted Threat 31<br /> </b><i>Gemma Bowsher</i></p> <p>3.1 Introduction 32</p> <p>3.2 Assessing the Utility and Scope of Biological Weapons at Various Scales 33</p> <p>3.3 Diverse Objectives of Bioweapon Use: Past and Present 34</p> <p>3.4 Evolving Biotechnologies 36</p> <p>3.5 Changing Biothreat Landscapes 37</p> <p>3.5.1 Cyber-Dependency 38</p> <p>3.5.2 Disinformation 38</p> <p>3.6 Conclusion 39</p> <p>Author Biography 40</p> <p>References 40</p> <p><b>4 Biological Weapons from the Ancient World to 1945 43<br /> </b><i>Brett Edwards</i></p> <p>4.1 Introduction 44</p> <p>4.2 Map of the Literature 45</p> <p>4.3 Historical Review 46</p> <p>4.3.1 Pre-history (72,000–500 BCE) 46</p> <p>4.3.2 Ancient History (500 BCE–1000 AD) 47</p> <p>4.3.3 Medieval and Early Modern (1000–1750 AD) 48</p> <p>4.3.4 Late Modern (1750–1915 AD) 49</p> <p>4.3.5 World War I (1914–1918 AD) 49</p> <p>4.3.6 Inter-War Years (1918–1939 AD) 50</p> <p>4.3.7 World War II 51</p> <p>4.4 Conclusions 52</p> <p>Author Biography 53</p> <p>References 53</p> <p><b>5 Biological Weapons from 1946 to 2000 57<br /> </b><i>Brian Balmer</i></p> <p>5.1 Introduction 57</p> <p>5.2 Overview of State BW Programmes 58</p> <p>5.3 Offensive Aspects of BW Programmes 61</p> <p>5.3.1 Human Exposure and Experimentation 62</p> <p>5.4 Non-state Actors 63</p> <p>5.5 Drivers and Inhibitors of State BW Programmes 65</p> <p>5.6 Conclusions 66</p> <p>Author Biography 67</p> <p>References 67</p> <p><b>6 The Problem of Dual Use in the Twenty-first Century 69<br /> </b><i>Kathryn Nixdorff</i></p> <p>6.1 Relationship of the Advances in Science and Technology to the BTWC 70</p> <p>6.2 Evolution of the Dual-Use Dilemma 71</p> <p>6.2.1 Example 1. The Mousepox Experiment (2001) 73</p> <p>6.2.2 Example 2. Synthesis of the Poliovirus Genome and Recovery of Infectious Virus (2002) 74</p> <p>6.2.3 Example 3. Reconstruction of the ‘Spanish Flu’ Influenza Virus of 1918 (2005) 74</p> <p>6.2.4 Example 4. Alteration of the Host Range and Increase in the Transmissibility of the H5N1 Avian Influenza Virus (2012) 75</p> <p>6.3 DURC Criteria with Examples in Each Case of Published Research Reports of Work That Has DURC Character 75</p> <p>6.4 Problems in Dealing with Dual Use: Debates About What Should Be Done 78</p> <p>Author Biography 80</p> <p>References 80</p> <p><b>7 Key Cutting-Edge Biotechnologies Today 83<br /> </b><i>Xinyu Song and Weiwen Zhang</i></p> <p>7.1 Introduction 84</p> <p>7.2 Development and Application of Synthetic Biology 84</p> <p>7.2.1 Landmark Achievement in Synthetic Biology 84</p> <p>7.2.2 Opportunities for Medical Application 85</p> <p>7.2.3 Benefits to Agricultural Development 85</p> <p>7.2.4 Changing the Future of Foods 86</p> <p>7.2.5 Creation of Sustainable Energy 86</p> <p>7.2.6 Approaches for New Materials 87</p> <p>7.3 Development and Application of Genome Editing 88</p> <p>7.3.1 Landmark Progress in Genome Editing 88</p> <p>7.3.2 Potential in Curing Diseases 88</p> <p>7.3.3 Supporting Sustainable Agriculture 89</p> <p>7.4 Main Biosafety and Biosecurity Concerns Associated with Key Cutting-Edge Biotechnologies 90</p> <p>7.4.1 The Increasing Accessibility of Biotechnology Tools and Techniques Exacerbates Safety and Security Risks 90</p> <p>7.4.2 Emerging/Re-emerging Infectious Diseases Aggravate the Misuse and Abuse Risk of Cutting-Edge Biotechnologies 90</p> <p>7.4.3 Integration and Innovation in the Field of Cutting-Edge Technologies Aggravate Safety and Security Risk 91</p> <p>7.5 Conclusions 91</p> <p>Author Biography 92</p> <p>References 92</p> <p><b>8 Convergence of Science and Technology 95<br /> </b><i>Ralf Trapp</i></p> <p>8.1 Introduction 96</p> <p>8.2 Convergence of Science and Technology in the Life Sciences 96</p> <p>8.3 Convergence and Arms Control and Security 98</p> <p>8.4 Technologies of Particular Relevance for Possible Misuse of Biology for Nefarious Purposes 100</p> <p>8.5 Mitigation of the Evolving Misuse Potential Resulting from Convergence 103</p> <p>Author Biography 105</p> <p>References 106</p> <p><b>9 Role of the Life Science Community in Strengthening the Web of Prevention for Biosafety and Biosecurity 107<br /> </b><i>Tatyana Novossiolova</i></p> <p>9.1 Introduction 108</p> <p>9.2 Integrating Biosafety with Biosecurity: The Web of Prevention as a Model Concept 109</p> <p>9.3 Addressing the Threat of Deliberate Biological Events and Life Science Misuse 110</p> <p>9.3.1 Multi-layered Framework for Response to Deliberate Biological Events 111</p> <p>9.3.2 An Integrated Approach for Biological Risk Management in Life Science Research and Innovation 114</p> <p>9.3.3 Biosecurity Risk Communication and Public Engagement 115</p> <p>9.4 Implications for the Governance of Biotechnology in the Twenty-first Century 117</p> <p>Author Biography 118</p> <p>References 118</p> <p><b>10 The 1925 Geneva Protocol and the BTWC 121<br /> </b><i>Jez Littlewood</i></p> <p>10.1 Introduction 122</p> <p>10.2 The Origins and Evolution of the 1925 Geneva Protocol and the BTWC 123</p> <p>10.3 The Review Conferences of the BTWC and Their Outcomes: 1980–2022 125</p> <p>10.4 Biological Disarmament as It Is: Strengths and Weakness of the BTWC and the Geneva Protocol in the Twenty-first Century 127</p> <p>10.5 The BTWC Beyond 50 and the Geneva Protocol Beyond 100: Can They Prevent Biological Warfare? 128</p> <p>10.6 Conclusion 130</p> <p>Author Biography 130</p> <p>References 130</p> <p><b>11 Constraining the Weaponisation of Pathogens and Toxic Chemicals Through International Human Rights Law and International Humanitarian Law 133<br /> </b><i>Michael Crowley</i></p> <p>11.1 Introduction 134</p> <p>11.2 International Humanitarian Law 135</p> <p>11.2.1 Introduction 135</p> <p>11.2.2 Over-arching IHL Obligations Constraining Weaponisation of Toxic Chemicals and Pathogens 135</p> <p>11.2.2.1 The Prohibition of Deliberate Attacks on Civilians, the Prohibition of Indiscriminate Weapons and of Attacks That Do Not Discriminate Between Civilians and Military Objectives 136</p> <p>11.2.2.2 The Prohibition of the Employment of Means and Methods of Warfare of a Nature to Cause Superfluous Injury or Unnecessary Suffering (SIRUS) 136</p> <p>11.2.2.3 The Protection of Persons Considered Hors de Combat 137</p> <p>11.2.2.4 Requirement to Respect and Ensure Respect of International Humanitarian Law 137</p> <p>11.2.2.5 Prohibition of Methods or Means of Warfare Intended to Cause Widespread, Long-term and Severe Damage to the Natural Environment; Prohibition on the Deliberate Destruction of the Natural Environment as a Form of Weapon 137</p> <p>11.2.2.6 Obligations to Review ‘New’ Weapons Under International Humanitarian Law 138</p> <p>11.3 International Human Rights Law 138</p> <p>11.3.1 Introduction 138</p> <p>11.3.2 Protection of the Right to Life and Restrictions on the Use of Force 139</p> <p>11.3.2.1 Application to Riot Control Agents (RCAs) 140</p> <p>11.3.2.2 Application to CNS-Acting Chemical Agent Weapons 140</p> <p>11.3.3 Prohibition Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment 141</p> <p>11.3.3.1 Application to Psychoactive (CNS)-Acting Chemical Agents 141</p> <p>11.3.3.2 Application to Riot Control Agents 142</p> <p>11.3.4 Obligations to Review and Monitor the Use of ‘Less Lethal’ Weapons 142</p> <p>11.4 Conclusions 142</p> <p>Author Biography 144</p> <p>References 144</p> <p><b>12 The Role of International Organisations in Biosecurity and the Prevention of Biological Warfare 147<br /> </b><i>Louison Mazeaud, James Revill, Jaroslav Krasny, and Vivienne Zhang</i></p> <p>12.1 Introduction 148</p> <p>12.2 The Role of IOs in Fostering the Norm Against Biological Weapons 149</p> <p>12.3 IOs in the Genesis of the Biological and Toxin Weapons Convention 150</p> <p>12.3.1 Conference of the Eighteen-Nation Committee on Disarmament 150</p> <p>12.3.2 The UN Secretary-General’s CBW Report 150</p> <p>12.3.3 The WHO Report on Health Aspects of CBW 151</p> <p>12.4 IOs and the Evolution of Biosecurity Governance 151</p> <p>12.4.1 UNSC Resolution 1540 151</p> <p>12.4.2 UN Secretary General’s Mechanism (Authoritative and Objective Assessment) 152</p> <p>12.4.3 Tending the BWC: The Implementation Support Unit (ISU) and the Work of Unoda 153</p> <p>12.4.4 WHO, Biosecurity and the Governance of Dual-Use Research 153</p> <p>12.4.5 Combatting Biological Crimes: United Nations Interregional Crime and Justice Research Institute (UNICRI) 153</p> <p>12.4.6 Unidir 154</p> <p>12.5 The Strengths of IOs in Biosecurity and Prevention of Biological Warfare 155</p> <p>12.6 The Limits of IOs in Biosecurity and Prevention of Biological Warfare 155</p> <p>12.7 Conclusions 156</p> <p>Author Biography 156</p> <p>References 157</p> <p><b>13 Laboratory Biorisk Management as a Key Tool for Scientists to Understand Future Biological Threats and Strengthen the Biological Weapons Convention 161</b><br /> <i>Mayra Ameneiros</i></p> <p>13.1 History, Context and Current International Guidance 162</p> <p>13.2 Biosafety and Biosecurity Awareness 165</p> <p>13.3 The Role of Scientists: Tailored Biorisk Management Practices 167</p> <p>13.4 Case Scenarios: Practical Examples 168</p> <p>13.5 An Ongoing Cycle to Strengthen the Biological Weapons Convention 170</p> <p>Author Biography 170</p> <p>References 170</p> <p><b>14 Examples of Biorisk Management National Regulatory Frameworks 173<br /> </b><i>Dana Perkins and Lela Bakanidze</i></p> <p>14.1 Introduction 174</p> <p>14.2 Laboratory Biosafety and Biosecurity in the US 175</p> <p>14.3 Import–Export and Transportation of Infectious Substances in the US 179</p> <p>14.4 Genetic Engineering and Dual-Use Oversight in the US 180</p> <p>14.5 The Culture of Biosafety, Biosecurity and Responsible Conduct in the US 181</p> <p>14.6 The Biorisk Management National Regulatory Framework of Georgia 182</p> <p>14.7 Conclusion 185</p> <p>Author Biography 186</p> <p>References 186</p> <p><b>15 Lessons from ePPP Research and the COVID-19 Pandemic 189<br /> </b><i>Nariyoshi Shinomiya</i></p> <p>15.1 Advances in Life Science and Technology and the Emergence of ‘So-Called GOF Studies’ to Create ePPPs 190</p> <p>15.2 Controversy Surrounding GOF Studies on H5N1 Highly Pathogenic Avian Influenza Virus 192</p> <p>15.3 COVID-19 and GOF Studies on SARS-like Viruses 195</p> <p>15.4 Ongoing Discussions at the NSABB and Governance by HHS 196</p> <p>15.5 Future Governance of GOF Research and Prospects 198</p> <p>Author Biography 199</p> <p>References 199</p> <p><b>16 The Hague Ethical Guidelines and the Tianjin Biosecurity Guidelines 201<br /> </b><i>Yang Xue</i></p> <p>16.1 Relations Between the Hague Ethical Guidelines and the Tianjin Biosecurity Guidelines 202</p> <p>16.1.1 Commonality in International Soft Law 202</p> <p>16.1.2 Commonality in Global Public Goods 203</p> <p>16.1.3 Effective Multilateralism 203</p> <p>16.2 BTWC Advances the Formulation of the Tianjin Biosecurity Guidelines for Responsible Scientific Research 204</p> <p>16.2.1 Institutional Basis of BTWC for Responsible Scientific Research 204</p> <p>16.2.2 BTWC Advances the Development of the Code of Conduct for Responsible Scientific Research 205</p> <p>16.3 Constitution of the Tianjin Biosecurity Guidelines: Ideas, Principles, Elements and Path Formation 207</p> <p>16.3.1 Ideas 207</p> <p>16.3.2 Principles 208</p> <p>16.3.3 Path Formation 209</p> <p>16.4 Future Discussion 210</p> <p>Author Biography 211</p> <p>References 211</p> <p><b>17 Engaging Scientists in Biorisk Management 213<br /> </b><i>Yuhan Bao and Alonso Flores</i></p> <p>17.1 Introduction: Scientists Engagement and Biorisk Management 214</p> <p>17.2 Engaging Scientists in Biorisk Management at International Level: Case from IWG Assessment Framework 215</p> <p>17.2.1 Building the Culture of Responsibility: The Key Elements and Approaches of Engaging Scientist in Biorisk Management 215</p> <p>17.2.2 Improving the Culture of Responsibility: Engaging Scientist in the Assessment of Biorisk Management Systems 218</p> <p>17.3 Engaging Scientists in Biorisk Management in National Institutional Oversight: Case from the Netherlands 219</p> <p>17.4 Engaging Scientists in Biorisk Management in Community: Case from iGEM 220</p> <p>17.4.1 Engaging Scientists Through iGEM Safety Rules Checklist and Safety Screening System 221</p> <p>17.4.2 Engaging Scientists Through iGEM Human Practices Programme 222</p> <p>17.5 Conclusion: How to Engage Scientists in Management of Biorisk and Other Emerging Fields 223</p> <p>Author Biography 223</p> <p>References 224</p> <p><b>18 The Role of Ethics in Dealing with Dual Use 225<br /> </b><i>Leifan Wang</i></p> <p>18.1 The Dual-Use Concept and Concerns 226</p> <p>18.2 Ethics as an Instrument on Dual-Use Governance 227</p> <p>18.2.1 Ethics Promote Responsible Practices on Dual Use 227</p> <p>18.2.2 Limitation of Ethics in Dealing with Dual Use 229</p> <p>18.3 Existing and Complementary Ethical Guidelines on Dual Use 230</p> <p>18.4 Recent Dual-Use Scenarios 231</p> <p>18.4.1 Synthetic Biology 231</p> <p>18.4.2 Gene Editing 232</p> <p>18.4.3 Neuroscience 232</p> <p>18.4.4 Digital Biological Data 233</p> <p>18.5 Ethical Education for Future Dual Use 233</p> <p>Author Biography 234</p> <p>References 234</p> <p><b>19 Where Is the Governance of Dual-Use Science Going? 237<br /> </b><i>Nancy Connell and Gigi Gronvall</i></p> <p>19.1 Background: Genetic Technologies and Their Applications 238</p> <p>19.2 Dual-Use Science: Evolving Story of a Dualistic Term 239</p> <p>19.3 Begin with the Experts: Models of Self-regulation 240</p> <p>19.3.1 From Asilomar to Napa 240</p> <p>19.3.2 Tools for Self-regulation: Risk and Benefit Analyses: Useful Frameworks 241</p> <p>19.3.3 A Patchwork of Layered Oversight, from Global to Local 241</p> <p>19.3.4 Self-regulation: The Basis of Scientific Enterprise 243</p> <p>19.3.5 Oversight Along the Life Cycle of Research: Universities Are Sites of Layered Governance 243</p> <p>19.3.6 Toward an International Model: International Collaboration in Science and Technology (ICST) 244</p> <p>19.3.7 International Standards for Biosafety and Biosecurity 245</p> <p>19.4 Alternative Governance Structures 245</p> <p>19.4.1 Hybrid Governance Models 245</p> <p>19.4.2 Network-Based Governance 246</p> <p>19.4.3 Transnational Governance 246</p> <p>19.5 Conclusion 247</p> <p>Author Biography 247</p> <p>References 248</p> <p><b>20 Towards an International Biosecurity Education Network (IBSEN) 251<br /> </b><i>Kathryn Millett and Lijun Shang</i></p> <p>20.1 Introduction 252</p> <p>20.2 The Need for Biosecurity Education, Awareness-Raising and a Culture of Responsibility in the Life Sciences 252</p> <p>20.3 Past Efforts in Educating Life Scientists and Establishing a Culture of Responsibility 253</p> <p>20.4 Challenges Faced by Biosecurity Education and Awareness-Raising 258</p> <p>20.5 Comparable Approaches Implemented in Analogous Frameworks in the Nuclear and Chemistry Fields 259</p> <p>20.5.1 IAEA Nuclear Security Culture and the International Nuclear Security Education Network (INSEN) 260</p> <p>20.5.2 Chemical Weapons Convention and the Advisory Board on Education and Outreach (ABEO) 262</p> <p>20.5.3 Key Lessons from the INSEN and ABEO for an International Biosecurity Educational Network (IBSEN) 264</p> <p>20.5.3.1 Comprehensive Understanding Learned from Related Initiatives 264</p> <p>20.5.3.2 A Biosecurity Education Network Must Be Underpinned by Firm and Sustained Commitment from States and the Future Network’s Host Body (Such as the Biological and Toxin Weapons Convention) 264</p> <p>20.5.3.3 Sustained Financial Support Observed and Maintained 264</p> <p>20.5.3.4 Strategic Vision and Clear Pathways Are Required for Communication and Collaboration Between a Network and Treaty Bodies/States 265</p> <p>20.5.3.5 Diversity of Memberships and Engagement with a Wide Range of Stakeholders 265</p> <p>20.6 Conclusion 266</p> <p>Author Biography 267</p> <p>References 268</p> <p>Appendix A: The Tianjin Biosecurity Guidelines for Codes of Conduct for Scientists 269</p> <p>Index 273</p>
<p><b>Lijun Shang, PhD, </b>is Professor of Biomedical Sciences in the School of Human Sciences at London Metropolitan University, UK. He is the founding Director of the Biological Security Research Centre. His research focuses primarily on ion channels in the fields of health and disease. <p><b>Weiwen Zhang, PhD, </b>is Baiyang Chair Professor of Microbiology and Biochemical Engineering at Tianjin University of China, China. His recent research is focused on synthetic biology and governance of dual-use issues, and he currently serves as Chief Scientist of the National Key Research and Development Program of Synthetic Biology in China. <p><b>Malcolm Dando, PhD, </b>is a Fellow of the UK Royal Society of Biology. He is Emeritus Professor at the University of Bradford, UK and is the author of <i>Neuroscience and the Problem of Dual Use: Neuroethics in New Brain Projects.</i>
<p> <b>A guide to minimizing the threat of misusing benignly intended and dual-use biological research </b> <p>In <i>Essentials of Biological Security: A Global Perspective</i>, a team of distinguished researchers delivers a fundamental resource designed to raise awareness and understanding of biological security as it pertains to the malign manipulation of benignly intended scientific research. <p>Written by experts who have spent decades involved in biological security issues, the book is systematically organized to make it accessible to a wide range of life scientists likely to encounter dangerous opportunities for the deliberate misuse of their research. Readers will also find: <ul><li>A thorough introduction to biological security and the chemical and biological weapons (CBW) threat spectrum </li><li>Comprehensive explorations of the history of biological weapons from antiquity to modern day </li><li>Practical discussions of dual-use technologies and how to minimize their risk </li><li>Expert analyses of the Biological and Toxin Weapons Convention and other relevant international agreements and organizations </li></ul> <p>Perfect for professionals working in life sciences, medicine, global health, biosafety, and biosecurity, <i>Essentials of Biological Security: A Global Perspective </i>will also benefit anyone with an interest in and being responsible for biological security.

Diese Produkte könnten Sie auch interessieren:

Zukunftstechnologie Tissue Engineering
Zukunftstechnologie Tissue Engineering
von: Will W. Minuth, Raimund Strehl, Karl Schumacher
PDF ebook
114,99 €
Biologische Bodensanierung
Biologische Bodensanierung
von: Kassem Alef
PDF ebook
40,99 €
Zukunftstechnologie Tissue Engineering
Zukunftstechnologie Tissue Engineering
von: Will W. Minuth, Raimund Strehl, Karl Schumacher
EPUB ebook
114,99 €