15
Technology in Society 26 (2004) 287–301 www.elsevier.com/locate/techsoc Law and science drive technology in the war against bioterrorism Victoria Sutton Center for Biodefense, Law, and Public Policy, Texas Tech University, 1802 Hartford, Lubbock, TX 79409, USA Abstract The US approach to defense against bioterrorism is necessarily constrained by existing legal frameworks. Biodefense research also responds to the development of new laws designed to address bioterrorism threats, but for the most part, technology is not driving the development of new law. While the biotechnology revolution has resulted in a wide range of biodefense applications, these can be used only within existing constitutional restraints and statutory frameworks. These rules, including safety precautions, privacy concerns, and com- pensatory systems, will continue to shape technologies to fit within those constraints. Several examples demonstrate that technology cannot be used in ways that threaten the legal foun- dations of our society. Thus technology is now being challenged to come up with more rule- sensitive approaches. In other areas, such as research priorities, progress toward an effective biodefense would be better served by prioritizing research according to scientifically based organizing principles. In order to reach the next level of effectiveness in biodefense, we must understand the complex interrelations of biotechnology and law. # 2004 Published by Elsevier Ltd. Keywords: Biotechnology; Biodefense; Bioterrorism: law; Public policy; Technology; Research 1. Introduction Since the first volume of Technology and Society was published 25 years ago, a revolution in biotechnology has begun, as well as a war against bioterrorism. We find ourselves in a very different world for this anniversary volume. As President George W. Bush, in an address to the nation on 6 June 2002, pointed out, ‘‘In the Tel.: +1-806-742-3990x264. E-mail address: [email protected] (V. Sutton). 0160-791X/$ - see front matter # 2004 Published by Elsevier Ltd. doi:10.1016/j.techsoc.2004.01.023

Law and science drive technology in the war against bioterrorism

Embed Size (px)

Citation preview

Page 1: Law and science drive technology in the war against bioterrorism

� Tel.: +1-806-742-3990

E-mail address: vickie.

0160-791X/$ - see front m

doi:10.1016/j.techsoc.200

x264.

[email protected] (V. Sutton).

atter # 2004 Published by Elsevier Ltd.

4.01.023

Technology in Society 26 (2004) 287–301

www.elsevier.com/locate/techsoc

Law and science drive technology in the waragainst bioterrorism

Victoria Sutton �

Center for Biodefense, Law, and Public Policy, Texas Tech University, 1802 Hartford,

Lubbock, TX 79409, USA

Abstract

The US approach to defense against bioterrorism is necessarily constrained by existinglegal frameworks. Biodefense research also responds to the development of new lawsdesigned to address bioterrorism threats, but for the most part, technology is not driving thedevelopment of new law. While the biotechnology revolution has resulted in a wide range ofbiodefense applications, these can be used only within existing constitutional restraints andstatutory frameworks. These rules, including safety precautions, privacy concerns, and com-pensatory systems, will continue to shape technologies to fit within those constraints. Severalexamples demonstrate that technology cannot be used in ways that threaten the legal foun-dations of our society. Thus technology is now being challenged to come up with more rule-sensitive approaches. In other areas, such as research priorities, progress toward an effectivebiodefense would be better served by prioritizing research according to scientifically basedorganizing principles. In order to reach the next level of effectiveness in biodefense, we mustunderstand the complex interrelations of biotechnology and law.# 2004 Published by Elsevier Ltd.

Keywords: Biotechnology; Biodefense; Bioterrorism: law; Public policy; Technology; Research

1. Introduction

Since the first volume of Technology and Society was published 25 years ago, a

revolution in biotechnology has begun, as well as a war against bioterrorism. We

find ourselves in a very different world for this anniversary volume. As President

George W. Bush, in an address to the nation on 6 June 2002, pointed out, ‘‘In the

Page 2: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301288

war against terrorism, America’s vast science and technology base provides us witha key advantage’’ [1]—and biotechnology stands at the forefront of this advantage.The last quarter-century has witnessed an explosion in biotechnology and the

biological sciences, just as the previous half-century was characterized by rapidadvances in physics. If one had to choose a single measure of the benefits of bio-logical science discoveries, it might be the increased lifespan of humans, from anaverage of 63–75 years in the developed world, and from 41–63 years in less-developed countries [2]. Benefits from the biotechnology revolution include mono-clonal antibodies technology, DNA engineering, and bioinformatics. But just as thephysics revolution in the first half of the 20th-century lost its innocence withknowledge that enabled it to produce a devastating atomic bomb, so too the bio-technology revolution has brought a loss of innocence with the dark knowledgethat it brings to the development and production of biological weapons.The willingness to use biological weapons may have its roots in antiquity, but

the new tools of biotechnology have given rise to the potential ability to create akiller of much or all of the human species.In the US, the willingness to turn to biological weapons was dramatized in 1984

when some members of a religious cult, followers of Bhagwan Shree Rajneesh, putsalmonella into local restaurant salad bars in an attempt to disable oppositionvoters in an upcoming election. More ominously, the highly publicized arrest ofLarry Wayne Harris, a self-styled microbiologist, led to the awareness that vials ofplague were easily obtainable and could be shipped anywhere in the world.Although Harris ordered the plague with the intent of developing a vaccinebecause he believed the US would be attacked by rats that Iraq had infected withfleas, his association with the hate groups Identity and Aryan Nation led many tofear the worst.1 In Fall 2001, anthrax attacks highlighted the nation’s failure ofpreparation and its apparent powerlessness to defend against a biological killer.The fear was no longer ‘‘if’’, but ‘‘when’’. Today, bioterrorism has brought the bat-tle not only to military frontlines but deep into the homeland, and the need toincrease our vigilance against terrorism challenges the freedoms of US citizens inevery walk of life.This article examines the role of law in shaping and driving biotechnology as it

responds to bioterrorism. This response is developed within a legal framework thatbalances priorities defined by our society through the constitution, legislatures,administrative agencies, and the courts. Examples demonstrate that technologycannot be used in ways that threaten our constitutional or other legal foundations,and that technology is being challenged to develop approaches that are more rule-sensitive. In related issues, such as research priorities, progress toward an effectivebiodefense would be better served by establishing priorities according to scientifi-cally based organizing principles.

1 The Larry Wayne Harris incident led Congress to pass the Anti-Terrorism and Death Penalty Act of

1996, provisions of which closed some of the loopholes in the criminal provisions of the Biological

Weapons Act of 1989.

Page 3: Law and science drive technology in the war against bioterrorism

289V. Sutton / Technology in Society 26 (2004) 287–301

2. Types of biological agents

Many bioweapons utilize the element of toxicity, either because the weapon is atoxin itself (e.g., fungal bioweapons and other plant and animal toxins), or becauseit produces a toxin in the body (e.g., bacterial, viral, and rickettsial). Bioregulatorshave a unique biochemical function: they are lethal when overdosed. A briefdescription of these kinds of pathogens and examples of some of the commonmechanisms within that type illustrate a research approach based on biotechnologyrather than on regulation or policy.

. Fungal agents are slower growing than bacterial agents which are often alsopresent [3]. Salmonella is one example of a bacterial bioweapon.

. Viral agents are the simplest form of microorganism, and consist of a nucleo-capsid protein coat containing either deoxyribonucleic acid (DNA) or ribo-nucleic acid (RNA). Category A viruses include smallpox; category B includesVenezuelan equine encephalitis (VEE); category C includes viral hemorrhagicfevers (VHF) [4, Chapter 3].

. Bacterial agents are the simplest organisms found in most environments, and canduplicate to match the population of the earth in only 11 hours. Through muta-tions, the bacteria adapt rapidly, and soon become resistant to antibiotics. Thestructure of the bacteria cell includes a cell wall for rigidity, an inner plasmamembrane that provides cell permeability, and cytoplasm. Floating within thecytoplasm is the DNA, which is loosely contained in one area of the cell.

. Bioregulators, or sensing and signaling biochemicals in the endocrine system,respond to external and internal stimuli to maintain stable body functions(homeostasis) [5: p. 712]. Disruption of these regulators can result in over-stimulation of the nervous system, often resulting in death.

. Rickettsial agents have cytoplasm on both sides of the cell wall, thus exploitingthe intracytoplasmic environment as its deadly mechanism.

. Toxins are poisonous by-products of living organisms. They are stable, andproduce severe illness or death when ingested, inhaled, or introduced into thebody through other pathways [4: Chapter 4]. Enterotoxins act on enteric cells ofthe intestine, and endotoxins are generally released from dead or dying Gram-negative bacteria, which stimulate inflammatory responses. Exotoxins are synthe-sized and released, usually by Gram-positive bacteria [5: pp. 1078–83]. Toxinsand venoms can be produced from marine animals or a number of plants andanimals.

3. Regulating potential routes of infection

The devices that deliver bioweapons are as varied as the biological agents them-selves, including (a) aerosols for inhalation, (b) food or water for consumption, or(c) in injection by insect bite. Using the legal system to regulate these routes ofinfection creates responses that are largely driven by existing legal frameworks andjurisdictions.

Page 4: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301290

Food is regulated for safety and trade through federal laws governing interstatecommerce. The growing of food is regulated by the US Department of Agriculture(USDA) in the preharvest stage, and the US Environmental Protection Agency(EPA) in the application of pesticides. The stages of food processing through mar-keting are regulated by both the USDA and the FDA in the areas of safety andpurity. Water is regulated by the Safe Drinking Water Act for consumers and theClean Water Act, which regulates surface waters and treatment of wastewater.These aspects of human health fall within the federal jurisdiction since the consti-tution gives Congress the power to regulate interstate commerce.As for regulation of vectors and hosts—driven primarily by who is affected by

insects—a patchwork exists. Mosquitoes are regulated by local governmentsbecause they are thought to pose local concerns for public health, while agricul-tural pests are regulated by state or federal authorities because of their effect onstate economies or interstate commerce. Vectors, such as mammals, are usuallyregulated by state or federal governments if the animals are domesticated for agri-cultural production. Mammals that are wild, such as deer or rabbits, are regulatedby location—usually state or local governments, but federal if the animals are loca-ted in a national park or federal land reserves.However, other more innovative, consumer-oriented routes of infection are also

possible. The anthrax attacks illustrate distributing a bioweapon through envelopesbeing used by consumers, through the US mail system, and by inhaling spores.Each of these examples falls outside of our existing legal framework. Drugs, cos-metics, colognes, soaps, and dozens of other products with which almost everyonehas daily contact, can be possible delivery vehicles for a bioweapon. The use of theair circulation system in a building, although smaller in scale, has the potential tocause tremendous damage, as demonstrated in the Hart Senate Office Buildinganthrax release.New technologies in the area of consumer products will develop within a frame-

work of consumer protection that is driven by market pressure—limited only bythe Federal Trade Commission’s regulation of consumer fraud. Opportunities forthe development of creative technologies to address psychological, physical, andeconomic threats are greater in these less-regulated areas.

4. Bioweapons research priorities

Research on bioweapons takes place within categories A–C that have beendefined by the Centers for Disease Control (CDC). These categories represent aranking system for known disease agents on the basis of the virulence [6] of thepathogen, category A being the most dreaded. Each group contains a variety oftypes of microorganisms, with few common characteristics or patterns of infection.Yet, regulations based on the level of virulence make the legal structure the orga-nizing principle. I suggest that grouping these agents as types with similar char-acteristics and patterns of infection offers an approach that would be more usefulto the development of technological biodefenses, while the A, B, and C system bestorganizes a hierarchy of legal constraints for regulation. That is, identification of

Page 5: Law and science drive technology in the war against bioterrorism

291V. Sutton / Technology in Society 26 (2004) 287–301

groups—fungal, viral, bacterial, bioregulators, rickettsial, and toxins—defines theuniverse of potential bioweapons against which technologies can be developedbecause of common group characteristics to be defended against. For example,category A pathogens are smallpox, anthrax, tularemia, plague, Ebola, Marburg,Lassa virus, Junin viruses and botulinum toxin, which represent a mix of viral,bacterial, rickettsial, and toxin agents, all requiring widely differing approaches tobiodefense technology. Yet they are easily regulated according to a hierarchy ofrestrictedness because the category’s organizing principle is virulence or risk tosociety.This paper suggests that prior to 11 September 2001, society had selected regu-

lation as a higher value than efficient development of technologies for biodefense. Ialso suggest that as society’s concerns about bioterrorism have increased, priorityshould now be given to efficient development of technologies as the underlyingorganizing principle for our approach to biological agents, rather than legal con-straints to control their use and possession.Research priorities are defined and set forth by the research arm of the US Food

and Drug Administration (FDA). In 1999 the FDA began a biodefense effortwithin the Center for Biologics Evaluation and Research. Research contributing tobiodefense included ‘‘design of new vaccines, pathogenesis and mechanism of repli-cation of biological warfare agents; new methods and standards to expedite thereview of new vaccines and immunoglobulins; and stem cell protection and chemo-kein/cytokine and angiogenic agent defense mechanisms [7]. The research focusedon category A pathogens as a priority. The FDA Commissioner stated that thefocus of countermeasures against bioterrorism should be on monoclonal antibodiestechnology because it is considered an already-mastered technology in the scientificcommunity and is the most promising of all the biodefense technologies. However,the commissioner also stated that there is, as yet, ‘‘no product in advanced clinicaldevelopment’’ [8] for applications related to antibodies. Currently, an investiga-tional new drug (IND) application is being filed with the FDA to begin Phase Isafety trials in humans for a human monoclonal antibody for protection againstanthrax [9], another category A pathogen.Other research has demonstrated that it is possible to insert a gene that is sus-

ceptible to erythromycin, thus knocking out the resistant gene and creating a rick-ettsia that is resistant to antibiotics [10]. In an attempt to create a virus that makesmice sterile, it was discovered that adding a gene from the mouse immune systemto a mousepox virus proved to be highly lethal, even in mice that had been vacci-nated against mousepox [11]. The focus on category A pathogens has left almosttotally unaddressed the potential threat of engineered organisms.

5. Legal perspectives on the economic and psychological impacts of

bioweapons

State public health systems usually address the mental and physical health needsof the population, and the federal government generally takes more of a support-ing role. Yet, in the area of interstate commerce (a federal jurisdiction), few events

Page 6: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301292

have been more devastating than the fear of flying evoked by the 9/11 attacks andthe subsequent impacts on the airline industry. Congress was faced with supportingthe airlines through a financial bailout2 to help them survive the loss of ticketrevenue, despite being encouraged by President Bush to resume travel.3 Inaddition, when the US mail became a vehicle for terrorist attacks, the effects on theUS Postal Service (USPS) were no less dramatic, and ripples from those earlieranthrax attacks continue to dampen mail volume and income [12]. Yet, no existinglegal framework utilizes federal laws to address psychological outcomes from suchsituations. One solution that addresses this need is the Public Health Security andBioterrorism Preparedness and Response Act of 2002 [13: Sec. 104], which man-dates a federally driven effort to develop a communication plan that will help torespond to such fears and concerns.From a legal perspective, physical damage—in contrast to purely economic

damage—is more likely to have an apparent causal connection with a terroristaction, thus meeting a legal causation standard. For example, in the AgriculturalBioterrorism Protection Act, limited access to agents is required for those identifiedas having the ‘‘potential to pose a severe threat to animal or plant health, or toanimal or plant products’’ [14: Sec. 211(a)(1)]. Physical damage, measured by econ-omic dollars losses due to the loss of farm animals, equipment, or entire operationsas a result of agroterrorism, is a crime punishable by fines up to the death penaltyfor causing loss of human life [13: Sec. 336]. Economic damage must be coupledwith physical damage. Therefore, a market fluctuation caused by contract fraudwould not include the kind of physical damage required by the Act to fall withinthe definition of agroterrorism.Economic damage has clear effects on interstate commerce, and the federal

government already has provisions in place to reimburse farmers who sustainlosses as a result of quarantines implemented in a natural outbreak or because of abioterrorism event. Economic damage to airlines fell clearly within the area ofinterstate commerce. The US Supreme Court upheld the interpretation of theCommerce Clause when applied to true economic effects, and continues to holdthis standard, striking down part of the Violence Against Women Act in UnitedStates vs. Morrison and the reach of a gun control law that did not have an sub-stantial economic effect on interstate commerce in United States vs. Lopez [15].These newest threats are pushing technology to develop countermeasures, and

the laws passed to address the threats are having a direct bearing on the technolo-gies being developed. For example, the threat of agroterrorism and related crimesrequires technologies that have a security and monitoring component to identify

2 In September 2001, President Bush signed a bill to provide $15 billion in revenue for the airlines,

which included $5 billion in direct assistance and $10 billion in loan guarantees.3 27 September 2001: President Bush speaking to travelers and employees at Chicago O’Hare Airport:

‘‘And one of the great goals of this nation’s war is to restore public confidence in the airline industry, is

to tell the traveling public ‘get onboard, do your business around the country, fly and enjoy America’s

great destination spots, go down to Disney World in Florida, take your families and enjoy life the way

we want it to be enjoyed.’’’

Page 7: Law and science drive technology in the war against bioterrorism

293V. Sutton / Technology in Society 26 (2004) 287–301

intruders. The threat to airline economic viability and to public safety has spawnedscreening and identification technologies, but these must be constrained by the‘‘unreasonable’’ search and seizure protections in the Fourth Amendment. The newface recognition scanning technologies that are under consideration for airports arebeing challenged as an unconstitutional search and seizure; nevertheless, the legalprinciple endorsing the ability to obtain evidence in ‘‘plain view’’ will likely allowthis technological application to fit within our constitutional protections.

6. Legal frameworks for medical approaches to biodefense

Medical approaches draw upon developed biotechnologies, including mono-clonal antibodies, cell culture technology, genetic engineering, biosensor tech-nology, antisense technology [16], DNA chip technology, tissue engineering,bioinformatics, and bioprocessing.4 The medical approach includes individual choi-ces in accepting medical treatment, as well as a construct for encouraging compa-nies to develop medical advances that address biodefense needs.Individual health care rests largely within the jurisdiction of states, so physicians

and health care givers who administer these services are regulated by the states, asis the information given to individuals, including obtaining a patient’s informedconsent in the case of vaccinations and other treatments.A legal framework already exists in the area of drug, vaccine, and medical device

regulation through the Food, Drug and Cosmetic Act, first passed in 1906 inresponse to contaminated children’s vaccine. These areas have a substantial impacton interstate commerce, and in regulating them Congress has preempted any stateor local laws that conflict with federal regulations. In 2002, Congress acted toaccelerate the drug and device approval process in order to provide fast-trackapproval authority for biodefense countermeasures in the Public Health SecurityAct. This fast-track authority [17: Sec. 122] opened the way for rapid advancementof countermeasures that not challenge existing legal authorities, but use law toencourage the development of responsive technologies. Congressional approval forthe development of animal models for ‘‘Phase Three’’ efficacy testing has been dri-ven by constraints in the drug approval regulatory process [17: Sec. 105]. The newapprovals will build an area of increased scientific development in the design ofappropriate animal models for drugs and devices and will change the rate at whichthese technologies are approved and can grow.These two areas of jurisdiction divide advances in biodefense between existing

federal regulation of products, and state regulation of the use and administrationof these products to individuals. Technologies that treat individuals must scale thefederal wall to approval, and then work within the legal constraints of 50 statesand four territories.

4 Antisense technology involves the development of a single-stranded nucleic acid that is complemen-

tary to a gene and to the messenger RNA transcribed from the gene. The antisense molecule blocks the

expression of a gene by interfering with protein production, a function of the gene. See [16: 625].

Page 8: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301294

7. Legal issues deterring private-sector development of biodefense

technologies

7.1. Intellectual property

Efforts to encourage companies to produce products and services for biodefenseraise concerns about an existing legal framework that discourages investment. Forexample, intellectual property issues in existing patent law are a disincentive tolong-term investment. Senate Bill 666 has proposed various mechanisms to addressthis problem in the existing legal framework.Other intellectual property issues occur in the area of security amid concerns

that patented biotechnology for biodefense might in fact aid terrorists. The Inven-tion Secrecy Act of 1951 is a statute originally enacted to prevent the disseminationof scientific information about the creation of the atomic bomb. The same pro-visions of that statute should be reviewed and considered in light of today’s needto manage scientific information that might be equally helpful to bioterrorists [18].

7.2. Indemnification

Beyond intellectual property and ownership issues, companies are also concernedabout the need for indemnification against liability in the use of biodefense pro-ducts that might be used in an emergency situation, perhaps even before they arethoroughly tested.

7.3. Defense contracting

Traditional defense contracting has been based on fixed price or negotiatedcontracting, and this long-term R&D process requires that profit margins be vastlylarger than for traditional defense contracts, which involve standardized widgets.In contrast, pharmaceutical companies are engaged in more development activitiesand require a process development type of approach. Thus their profit marginmust be 20–22% rather than the 5–6% typical in defense contracts. Further, con-tracts for defense items typically require that there be no private market for devel-opment; pharmaceutical companies, on the other hand, must have such anincentive before entering into a line of products. The term of the contract must belong enough for investment recovery, and must be part of the shifting culture ofdefense contracting, now that the scope of defense has reached the pharmaceuticalsector [19].

7.4. Encouraging faster development of technologies

While Senate Bill 666 addresses the issues noted above, it has been stalled incommittee since its introduction in March 2003. It seems obvious that enabling theprivate sector to respond with more research and development of technologies tocounter bioterrorism will shape the direction and rate of progress.A report from the Defense Science Board reveals that the United States has only

some protection against 13 of the top 50 pathogens that could be weaponized. The

Page 9: Law and science drive technology in the war against bioterrorism

295V. Sutton / Technology in Society 26 (2004) 287–301

report further concludes that ‘‘a program of longer-term investment in new R&Dinitiatives to address major gaps in drug and vaccine coverage is crucial but it willtake 10–15 years to bring such investments to fruition’’ [20], leaving the populationvulnerable for at least another decade. Rapid advancement, not only in the privatesector but also in the public sector, must be encouraged, and advancement isdirectly affected by regulation and the legal framework placed upon it.

7.4.1. Genetic advancesAdvances in the more efficient development of vaccines and treatment have been

made because of (a) the mapping and sequencing of the bacteria genome, parti-cularly where genetic properties change little from generation to generation, whichcan also be determined [21]; and (b) microbicidal compound identification (identi-fying agents that can effectively kill microbes) can be achieved through screeningcombinations of peptide libraries for compounds with potential microbicidalactivity. This technique involves inserting genes with a retrovirus transfer whichcodes for a scaffold protein into which random peptide sequences are presented.Challenging those cells with a disease produces surviving cells which are increasedby growing more in the next 48–72 h, which are then re-challenged with the samedisease. After five rounds of challenges, the surviving cells can be examined todetermine the mechanisms that resist the disease challenge [22].

7.4.2. Monoclonal antibody treatmentOne of the most successful biotechnologies has been the perfection of the mono-

clonal antibody treatment, which is used to treat disease cells by targeting an outermembrane protein. The vacuoles of cells (pockets within cells) encapsulate the bac-teria. The monoclonal antibody prevents the disease organism from using its cellmembrane protein to escape from the vacuole. Vacuole-bound organisms aredamaged and the monoclonal antibody clings to the disease surface protein andinhibits the escape of the organism from the phagosomes or the organelles whichdispose of waste in the cells.

7.5. Security and legal restrictions on technological development

These advances were developed in academia and applied in the biodefense arena.However, recent regulatory controls on researchers and institutions who possessagents used as bioweapons have brought more restrictions and threaten to drivemany academic institutions out of this area of research. For example, citing theneed for continued openness in research, the Massachusetts Institute of Tech-nology (MIT) rejected research funding that would have required approval of allforeign nationals who would be working on funded projects [23].The select agent rules, which regulate the possession of a list of agents con-

sidered to have potential for weaponization, were first implemented in 1996 inresponse to Larry Wayne Harris who, as noted earlier, ordered anthrax agents.The select agent rules regulate agents based upon a ‘‘select agent’’ list—with no dif-ference in the quantity, handling, or training of the researcher who possesses anyof these. Different levels of precaution are recommended for each agent, but these

Page 10: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301296

standards are not incorporated into the select agent regulatory scheme which

includes both civil and criminal penalties for non-compliance. Recent amendments

to the select agent rule have helped shaped biodefense research, given that some

universities will chose not to pursue this research because of the more stringent

regulatory requirements.5 Further, because the select agent rules make no distinc-

tions among agents, universities that comply can use a range of agents, regardless

of the university’s specialty or expertise with any or all of the agents.The USA Patriot Act and the Public Health Security Act of 2002 amended the

select agent rules to make them more stringent and restrictive. This included

requiring the registration of all agents and laboratories, and identification and

background checks for all researchers and technicians who might have access to

the select agents. Storage areas must also be secured with locks and security plans

developed and implemented.Another approach to security has been the implementation of import–export

regulations for listed items, including a number of biological agents. Countries on

the list require the shipper to obtain permission to ship material to those countries.

The Export Administration Regulations (EAR) must be consulted for each ship-

ment, since the list can change.Interstate commerce for shipping has been regulated for etiological agents, and

requires compliance with domestic shipping regulations. Specific labeling and

markings on packages is required or civil or criminal penalties may be the conse-

quence.Private-sector developers may find it possible to apply work or research from

academic research institutions to the development of biodefense products without

falling within the scope of the new select agent rules. For example, topical treat-

ments, which require FDA approval, might utilize a neutralizer found in a labora-

tory that uses select agents, whereas the private company itself can only utilize

available neutralizers if it does not possess a select agent. Recent FDA approval of

a liquid decontamination lotion for the military, which removes or neutralizes T-2

fungal toxin, called reactive skin decontamination lotion (RSDL), is one such pro-

duct [24]. Ultimately, this will lead to more research taking place outside of acade-

mia and in the government non-profit or private sector.The recent approval of the use of animals during the final phase of testing the

efficacy of a drug makes ultimate FDA approval a more likely reality. Since testing

of a drug or vaccine to prevent or cure smallpox would not be possible on humans,

the use of animals has been helping for more quickly achieving final approval. In

the case of the topical treatment RSDL, Phase 3 trials using animal efficacy data

were utilized [25].

5 The Massachusetts Institute of Technology announced earlier in 2003 that they would no longer

engage in research involving select agents because of the new regulations.

Page 11: Law and science drive technology in the war against bioterrorism

297V. Sutton / Technology in Society 26 (2004) 287–301

8. Technical approaches that do not conflict with regulating frameworks

8.1. Surveillance data versus diagnostic data

Technological approaches that are non-medical may not have public health fea-tures, and therefore, can be regulated through existing federal legal frameworks.An example of a technology that failed because it fell outside the legal frameworkand ultimately ended under public pressure, was a national symptom surveillancesystem. Begun by the Department of Defense, it was a system of combined surveil-lance data first introduced into the military as a test, and then into several majormetropolitan areas. The data were intended to save time by identifying both inten-tional biological attacks and natural outbreaks of disease in the population.Because it was developed by the Department of Defense, and had no civilian inter-face experience, it was viewed as potentially invasive and a violation of privacy.Further, state public health systems maintained jurisdiction in these areas, and thesystem was seen as a major intrusion on states’ sovereign power in the area ofpublic health. The project was abruptly ended, although it had demonstrated somesuccess in the military test program [26].Individual symptomatic monitoring systems, hundreds of which are being

developed throughout the US, have not met with the same resistance since theywill be regulated by state governments with federal protections guaranteed throughthe Health Insurance Portability and Accountability Act of 1996 (HIPPA). Whilethe same type of information would be collected in the smaller individual, state, orregional systems, there seems to be less concern than was exhibited with the federalproject.The use of biosensing technology to monitor ambient air for the presence of bio-

logical agents could eliminate challenges to privacy rights among individuals in thecollection of health information through data collection systems, which has beenvery controversial. Biosensing would be permissible in public places, and voluntarywithin the privacy of one’s home or car, in order to avoid Fourth Amendmentsearch and seizure violations for collecting information without ‘‘probable cause’’,or failing ‘‘expectations of privacy’’ as required by the Fourth Amendment protec-tions against ‘‘unreasonable’’ search and seizure.Given public pressure to end the Department of Defense surveillance program

because of privacy concerns, the legal issues will drive technology to develop theseand other alternative approaches that comport with our sense of security yetremain within the constraints of constitutional protections of privacy againstunreasonable searches.

8.2. Identification technology

Identification technology makes use of diagnostic devices that identify an infec-tion. Diagnostic devices, assays, and identification technologies are regulated asmedical devices through the FDA, which will provide common standards for theapproval and functioning of diagnostic devices that identify potential biologicalthreats.

Page 12: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301298

Recent advances in biotechnology have meant more efficient development of

such diagnostic devices:

. Genome mapping of bacterial species allows efficient development of specific diag-nostics.

. Molecular beacon probes that fluoresce when they encounter target DNA sequen-ces of different species of rickettsia R. typhi and R. felis, and distinguish themfrom other rickettsia in the flea vector. The first molecular beacons to be usedfor imaging RNA are under development at the Georgia Institute of Technologyand Emory University, and will enable the rapid detection of viruses [27]through RNA, rather than DNA analysis. Serodiagnosis performed withenzyme-linked assays for serodiagnosis (ELISA) of rocky mountain spottedfever, indirect fluorescence assay testing (IFA), and conventional indirect fluores-cence test for serodiagnosis of rocky mountain spotted fever [28] have all beenrecently developed to detect these rickettsial bioweapons.

. Forensics. The National Academies have identified microbial forensics as a newarea of expertise to be developed by federal agencies. The Institute for GenomicResearch has included in their research priorities work in microbial forensicsbecause there are few forensic methods with which to attribute an intentionalbioterrorism event [29]. The research thus far has determined that there are4 million base pairs in the genome of anthrax, and 50% of those are gene dupli-cation, not lineage related. They have also determined that there is a trendtoward genome reduction, which makes the genome smaller and thus more diffi-cult to map. Other factors include lateral gene transfers of genetic materialacross species in the prokaryote which blurs species lines, and these must berecognized before attempting to identify species. Also, that the genome can varyas much as 30% within the same species, making species distinctions lessmeaningful.

. Plasmid isolates, which are used to distinguish between samples where genomedistinctions have not been seen before. For example, using plasmid isolate com-parisons, previously indistinguishable anthrax can be distinguished between notonly the Ames strain and others, but distinctions within the Ames strain itself[29].

These advances in microbial forensics and detection devices have become prio-

rities because they are important for addressing unsolved attacks. The technology

is driven by a need to identify unique qualities of the anthrax used post-9/11, and

thereafter the perpetrator.

8.3. Detection technology

Even prior to 11 September, the use of biosensors has been a priority for the

Department of Defense for surveillance and detection of biological and chemical

weapons. Advances in biosensors include, for example, the use of gold ‘‘nano-

plugs’’, which are 1.4 nm, or 1.4 billionths of a meter in diameter, and attach to a

Page 13: Law and science drive technology in the war against bioterrorism

299V. Sutton / Technology in Society 26 (2004) 287–301

specific enzyme to provide a pathway for electrons. This allows the measurement ofthe current, which can indicate the number of biological molecules involved in anenzymatic reaction [30]. While military usage is an obvious application, the dom-estic use of the biosensors to test ambient air began in March 2003 using existingEPA monitors. Such use falls within the legal framework of air monitoring to com-ply with the Clean Air Act. Because it fits within the jurisdiction of environmentalprotection in the framework of federal statutes and regulations, this approach wasuncontroversial, and met with no resistance when it was announced.In January 2003, the White House announced that many of the 3000 air quality

monitors located throughout the United States would be retrofitted with biosensingdevices and filters that would detect smallpox, anthrax, or other biological agentsin the air [31]. The use of biological monitors is also being developed. The use of‘‘sentinel plants’’ is being investigated by Penn State and DARPA, to developplants that will fluoresce when exposed to biological agents [32].The application of technology within existing legal frameworks, such as these

monitoring devices, helps to further shape an effective biosensing system.

8.4. Filtering technology

Filtering technologies are the basis for respirators used by individuals. Newemergency escape masks are being produced that carry international certificationto European Conformance Standard CE-0158 for protection against both biologi-cal and chemical threats, including anthrax and smallpox. Companies are beingurged to purchase these masks as part of their emergency kit for use by theiremployees in the event of an attack [33].The American National Standards Institute (ANSI) has begun to develop a

national standard for respirators because the current standards do not address con-ditions arising from bioweapon attacks. The ASC Z88 Committee formed a Z88.14subcommittee to begin this work [34].

9. Conclusion

The US approach to biodefense is being driven (and constrained) largely byexisting legal frameworks, although partly through the development of new laws.While the biotechnology revolution has brought about a wide range of applicationsin biodefense, they are being applied within existing systems of law. Research prio-rities, on the other hand, should be based not only on levels of virulence, but also,more basically, on scientifically relevant categories of organisms and researchissues. The National Academies concluded that research should be funded that willhelp produce ‘‘future leaders who think across the traditional academic bound-aries’’ [35]. This research must include the complexities of developing technologiesfor biodefense that fit not only into scientifically useful categories for research butalso into our legal framework of safety precautions, privacy concerns, and com-pensatory systems.

Page 14: Law and science drive technology in the war against bioterrorism

V. Sutton / Technology in Society 26 (2004) 287–301300

References

[1] Available from: http://www.whitehouse.gov/news/releases/2002/06/20020606-8.html (site visited 7

October 2003).

[2] Table 24: Trends in life expectancy at birth, 1950–2000. World Population Prospects, Rev. 2000.

[3] Brillman JC, Quenzer RW. Infectious disease in emergency medicine, 2nd ed. 1998.

[4] Field Manual, Treatment of biological warfare agent casualties, chapter 3, 3–1. Departments of the

Army, Navy and Air Force and Commandant, Marine Corps. A FM 8-284/NAVMED P-5042/

AFMAN (I) 44-156/MCRP 4-11.1C (17 July 2000).

[5] Casarett LJ, editor. Casarett & Doull’s toxicology: the basic science of poisons. 6th ed. 2001.

[6] American Public Health Association. Control of communicable diseases manual, 17th ed. 2000

‘‘Virulence’’ is defined as ‘‘The degree of pathogenicity of an infectious agent, indicated by case-

fatality rates and/or the ability of the agent to invade and damage tissues of the host.’’

[7] Zoon KC. Vaccines, pharmaceutical products, and bioterrorism: challenges for the US food and

drug administration. Emerging Infectious Diseases 1999;July–August:534–6.

[8] McClellan MB. Remarks of the commissioner of food and drugs. Food and Drug Law Journal

2003;191:56.

[9] Monoclonal antibody drug effective against anthrax. Bioterrorism Week 14 April 2003.

[10] Wood D. Genetic manipulation in rickettsia. Presentation to the American Society for Rick-

ettsiology, 18th Meeting, Flintstone, MD, 27 September 2003.

[11] Jackson RJ, et al. Journal of Virology 2001;February.

[12] Duffy R. One on one: an interview with Keith Strange; vice president of supply management for the

United States Postal Service. Journal of Supply Chain Management January 2003;1:39 ‘‘We saw the

deepest mail-volume drop in the last year since the Great Depression. And our transportation net-

work was severely impacted by 9/11, in terms of the airlines’ security restrictions. Furthermore, the

anthrax incidents directly affected our operations. So, it’s certainly been a unique mixture of chal-

lenges this year.’’

[13] Public Health Security and Bioterrorism Preparedness and Response Act of 2002. HR 3448, US

Congress 2nd Session x104, June 12, 2002.[14] Agricultural Bioterrorism Protection Act of 2002. x211(a) (1), 2002.[15] United States v. Lopez, 514 US 549 (1995); United States v. Morrison, 529 US 598 (2000).

[16] Kreuzer H, Massey A. Recombinant DNA and biotechnology, a guide for teachers, 2nd ed. AMC,

American Society for Microbiology; 2001.

[17] HR 3448, US Congress 2nd Session, 2002.

[18] Parrett Jr JW. Note: a proactive solution to the inherent dangers of biotechnology: using the Inven-

tion Secrecy Act to restrict disclosure of threatening biotechnology patents. William and Mary

Environmental Law and Policy Review 2001;145:167.

[19] Rapoport FM. Bioterrorism: threats and responses for the drug, medical device and biologics

industries. Presentation to Food and Drug Law Institute Conference, Washington, DC, 29

September 2003.

[20] Report of the Defense Science Board, 2000.

[21] Eremeeva ME, et al. A genome-based comparison of fourteen strains of rickettsia akari. Presen-

tation to the American Society for Rickettsiology, 18th Meeting, Flintstone, MD, 27 September

2003.

[22] Koo K, et al. Development of combinatorial peptide based ibraries (adapteins) with rickettsicidal

activity: preliminary results. Presentation to the American Society for Rickettsiology, 18th Meeting,

Flintstone, MD, September 28–October 1, 2003.

[23] Weisman R. Openness in a time of terror: MIT’s President makes a case against restricting access

to research and global collaboration in a Post-September 11 World. The Boston Globe, October 6,

2003, Sec. F1. ‘‘In one publicized case last year, MIT turned away a $400,000 contract from the

National Security Agency to study computer architecture because the agency sought to approve any

foreign nationals working on the project.’’

Page 15: Law and science drive technology in the war against bioterrorism

301V. Sutton / Technology in Society 26 (2004) 287–301

[24] FDA clears skin lotion for military to protect against chemical burns. Bioterrorism Week 21 April

2003.

[25] New drug and biological drug products; evidence needed to demonstrate efficacy of new drugs for

use against lethal or permanently disabling toxic substances when efficacy studies in humans ethi-

cally cannot be conducted. Fed. Reg. 53960, 5 October 1999; statutory mandate to finalize rule, HR

3448 US Congress 2nd session, 12 June 2002.

[26] Spying by any name. Editorial The San Francisco Chronicle 26 May 2003:A-16. ‘‘The Defense

Department’s ‘Total Information Awareness’ program has been rechristened ‘Terrorism Infor-

mation Awareness’ to offset the impression that the brainchild of former Administrator John Poin-

dexter would compile electronic dossiers on all Americans. . . Civil libertarians are concerned, with

good reason, about whether this can be done without intruding on the privacy and other rights of

all of us whose everyday lives will be under surveillance. That is why Congress blocked further

spending on the system pending a further report from the Pentagon (submitted 20 May) on safe-

guards for innocent citizens.’’ [Note: Poindexter resigned in August 2003, over another contro-

versial program for predicting terrorist attacks.]

[27] Improved molecular beacons show promise for cancer detection, rapid viral diagnosis. Bioterrorism

Week 14 April 2003.

[28] Trivedi LS. Comparison of an indirect fluorescence antibody test and enzyme linked immunosor-

bent assays for serodiagnosis of rocky mountain spotted fever. Presentation to American Society

for Rickettsiology 18th Meeting, Flintstone, MD, 27 September 2003.

[29] Fraser CM. Comparative bacterial genomics. Keynote speaker, The Institute for Genomic

Research, American Society for Rickettsiology 18th Meeting, Flintstone, MD, 27 September 2003.

[30] Science 31 March 2003.

[31] Washington Post 22 January 2003.

[32] Researchers developing ‘sentinel plants’ to warn of bioterrorism. Bioterrorism Week 24 March 2003.

[33] New emergency escape mask helps everyone protect themselves. Bioterrorism Week 14 April 2003.

[34] Organization announces new subcommittee for counter terrorism respirators. Bioterrorism Week 14

April 2003.

[35] National Research Council. Making the nation safer: the role of science and technology in countering

terrorism, 2002:365.

Victoria Sutton is Director of the Center for Biodefense, Law, and Public Policy and Professor of Law

at Texas Tech University School of Law. She holds Bachelor of Science degrees in Zoology and Animal

Science, cum laude, from North Carolina State University; a Master’s degree in Public Administration

from Old Dominion University; a Ph.D. in Environmental Sciences from The University of Texas at

Dallas; and a Law degree (JD) from American University, magna cum laude. She served as Assistant

Director in the Bush Administration from 1989 to 1993, in the Office of Science and Technology Policy

in the White House Science Office, and in the US Environmental Protection Agency. Dr. Sutton is a

member of the District of Columbia Bar and US Federal Circuit Bar. She is the author of two books

and numerous articles. Her awards include the 2003 Texas Tech University Book Award for Law and

Science: Cases and Materials, and most recently, Law and Bioterrorism (2003).