Skip to main content

Analysis

  • Chapter
  • First Online:
  • 447 Accesses

Abstract

This chapter explores some of the failures of past assessments of bio-threats and risks, but the focus is more on the future. In particular, it provides a comprehensive summary of what other discipline and methodological perspectives may improve the assessments of emerging bio-threats and risks. The chapter also grapples with workforces challenges. In other words, are our current analysts fit for purpose to work on bio-threats and risks and how do we ensure they are?

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Note: In 2017, the ONA—following an Australian Government sponsored independent review of the Australian intelligence community was renamed the Office of National Intelligence (ONI).

References

  • Allison, G. (1971). Essence of Decision: Explaining the Cuban Missile Crisis. Boston: Little, Brown and Co.

    Google Scholar 

  • Betts, R. (1978). Analysis, War and Decision: Why Intelligence Failures Are Inevitable? World Politics, 31(1), 61–89.

    Article  Google Scholar 

  • Blue Ribbon Study Panel. (2015). Blue Ribbon Study Panel on Biodefense. A National Blueprint for Biodefense: Leadership and Major Reform Needed to Optimise Efforts. Washington, DC: Hudson Institute for Policy Studies.

    Google Scholar 

  • Carlson, R. (2003). The Pace and Proliferation of Biological Technologies. Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science, 1(3), 203–214. https://doi.org/10.1089/153871303769201851.

    Article  Google Scholar 

  • Center for Biosecurity of UPMC. (2011). US Government Judgments on the Threat of Biological Weapons: Official Assessments, 2004–2011 (pp. 1–26). Baltimore, MD: Center for Biosecurity of UPMC.

    Google Scholar 

  • Christley, R., et al. (2005). Infection in Social Networks: Using Network Analysis to Identify High Risk Individuals. American Journal of Epidemiology, 162(10), 1024–1031.

    Article  Google Scholar 

  • Clapper, J. (2016). Statement for the Record. Worldwide Threat Assessment of the US Intelligence Community. Armed Services Committee.

    Google Scholar 

  • Coulthart, S. (2016). Why Do Analysts Use Structured Analytic Techniques? An In-Depth Study of an American Intelligence Agency. Intelligence and National Security, 31(7), 933–948. https://doi.org/10.1080/02684527.2016.1140327.

    Article  Google Scholar 

  • Davies, S., & Youde, J. (Eds.). (2015). The Politics of Surveillance and Response to Disease Outbreaks. Surrey, UK: Ashgate Publishing Ltd.

    Google Scholar 

  • Flood, P. (2004). Report of the Inquiry into Australian Intelligence Agencies. Canberra: Australian Government Printing Office.

    Google Scholar 

  • George, R., & Bruce, J. (Eds.). (2014). Analyzing Intelligence National Security Practitioner’s Perspectives. Washington, DC: Georgetown University Press.

    Google Scholar 

  • Gill, P., & Phythian, M. (2012). Intelligence in an Insecure World. Cambridge: Polity Press.

    Google Scholar 

  • Grabo, C. (2004). Anticipating Surprise Analysis for Strategic Warning. Lanham, MD: University Press of America.

    Google Scholar 

  • Gryphon Scientific. (2016). Risk and Benefit Analysis of Gain of Function Research Final Report. Takoma Park, MD: Gryphon Scientific LLC.

    Google Scholar 

  • Heuer, R. (1999). Psychology of Intelligence Analysis. Washington, DC: Center for the Study of Intelligence.

    Google Scholar 

  • Heuer, R., & Pherson, R. (2010). Structured Analytical Techniques for Intelligence Analysis. Washington, DC: CQ Press.

    Google Scholar 

  • Hirschfeld, K. (2017). Failing States as Epidemiologic Risk Zones. Health Security, 15(3), 288–295.

    Article  Google Scholar 

  • Horton, R. (2017). Offline: Global Health Security—Smart Strategy or Naive Tactics. The Lancet, 389, 892.

    Article  Google Scholar 

  • Klovdahl, A. (1985). Social Networks and the Spread of Infectious Diseases: The AIDS Example. Social Science and Medicine, 21(11), 1203–1216.

    Article  Google Scholar 

  • Koblentz, G. (2009). Living Weapons. New York: Cornell University Press.

    Book  Google Scholar 

  • Lakoff, A. (2015). Real Time Bio politics: The Actuary and the Sentinel in Global Public Health. Economy and Society, 44(1), 40–59.

    Article  Google Scholar 

  • Leuprecht, C., et al. (2017). Hezbollah’s Global Tentacles: A Relational Approach to Convergence with Transnational Organised Crime. Terrorism and Political Violence, 29(5), 902–921.

    Article  Google Scholar 

  • Lowenthal, M. (2012). Intelligence from Secrets to Policy. Thousand Oaks, CA: CQ Press.

    Google Scholar 

  • Marrin, S. (2012). Improving Intelligence Analysis: Bridging the Gap Between Scholarship and Practice. Abingdon, UK: Routledge.

    Book  Google Scholar 

  • Millet, P., & Snyder-Beattie, A. (2017). Existential Risk and Cost Effective Biosecurity. Health Security, 15(4), 373–383.

    Article  Google Scholar 

  • NAS. (2016). Gain of Function Research. Summary of the Second Symposium. Washington, DC: National Academy of Sciences.

    Google Scholar 

  • NAS. (2017a). A Proposed Framework for Identifying Potential Biodefense Vulnerabilities Posed by Synthetic Biology Interim Report. Washington, DC: National Academy of Sciences.

    Google Scholar 

  • NAS. (2017b). Human Genome Editing. Science Ethics and Governance. Washington, DC: The National Academies Press.

    Google Scholar 

  • Nightingale, C., & Martin, P. (2004). Biosecurity, Bioterrorism and the Governance of Science. Research Policy, 36, 1635–1654.

    Google Scholar 

  • NRC. (2006). Globalization, Biosecurity and the Future of the Life Sciences. Washington, DC: Institute of Medicine and National Research Council.

    Google Scholar 

  • O’Leary, Z. (2007). The Essential Guide to Doing Your Research. London: Sage Publications.

    Google Scholar 

  • Ouagrham-Gormley, S. (2012). Barriers to Bioweapons: Intangible Obstacles to Proliferation. International Security, 36(4), 80–114. https://doi.org/10.1162/ISEC_a_00077.

    Article  Google Scholar 

  • Stattner, E., et al. (2011). Diffusion in Dynamic Social Networks: Application in Epidemiology. In A. Hameurlain, et al. (Eds.), Database and Expert Systems Applications (pp. 559–573). Heidelberg: Springer-Verlag GMBH.

    Google Scholar 

  • Tucker, J. (Ed.). (2012). Innovation, Dual Use and Security. Cambridge, MA: The MIT Press.

    Google Scholar 

  • Vogel, K. (2008). Biodefense. In A. Lakoff & S. Collier (Eds.), Biosecurity Interventions (pp. 227–255). New York: Columbia University Press.

    Google Scholar 

  • Vogel, K. (2013a). Intelligent Assessment: Putting Emerging Biotechnology Threats in Context. Bulletin of the Atomic Scientists, 35(1), 45–54.

    Article  Google Scholar 

  • Vogel, K. (2013b). Necessary Interventions. Expertise and Experiments in Bioweapons Intelligence Assessments. Science, Technology and Innovation Studies, 9(2), 61–88.

    Google Scholar 

  • Vogel, K. & Knight, C. (2014). Analytic Outreach for Intelligence: Insights from a Workshop on Emerging Biotechnology Threats. Intelligence and National Security, 1–18. https://doi.org/10.1080/02684527.2014.887633.

    Article  Google Scholar 

  • Walsh, P. F. (2011). Intelligence and Intelligence Analysis. Abingdon, UK: Routledge.

    Google Scholar 

  • Walsh, P. F. (2016). Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges. In K. Warby (Ed.), National Security, Surveillance and Terror (pp. 51–74). Cham, Switzerland: Springer International Publishing.

    Chapter  Google Scholar 

  • Zegart, A. (2007). Spying Blind. Princeton, NJ: Princeton University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Walsh, P.F. (2018). Analysis. In: Intelligence, Biosecurity and Bioterrorism. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-51700-5_5

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-51700-5_5

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-51699-2

  • Online ISBN: 978-1-137-51700-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics