Red teaming the biological sciences for deliberate threats
This article describes the use of “red teaming” to analyze and forecast biological threats to U.S. national security. Red teaming is a method whereby participants adopt an adversarial perspective, and is used to stimulate critical and creative thinking without some of the flaws of other types of thr...
Authors: | ; |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2020
|
In: |
Terrorism and political violence
Year: 2020, Volume: 32, Issue: 6, Pages: 1225-1244 |
Online Access: |
Volltext (Resolving-System) Volltext (Verlag) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000naa a2200000 4500 | ||
---|---|---|---|
001 | 1831607360 | ||
003 | DE-627 | ||
005 | 20230120104700.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230120s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/09546553.2018.1457527 |2 doi | |
035 | |a (DE-627)1831607360 | ||
035 | |a (DE-599)KXP1831607360 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Zhang, Lisa |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Red teaming the biological sciences for deliberate threats |c Lisa Zhang and Gigi Kwik Gronvall |
264 | 1 | |c 2020 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Gesehen am 20.01.2023 | ||
500 | |a Published online: 30 May 2018 | ||
520 | |a This article describes the use of “red teaming” to analyze and forecast biological threats to U.S. national security. Red teaming is a method whereby participants adopt an adversarial perspective, and is used to stimulate critical and creative thinking without some of the flaws of other types of threat assessments, including mirror-imaging. Red team analysis is prevalent in the military, security, and commercial realms. There have been widespread calls from government and private organizations to analyze biological threats with a red teaming approach, in order to prioritize resources and to counter a wide array of biological agents. This paper includes a timeline of historical examples of both biological red team simulations and vulnerability probes, and discusses the challenges of conducting realistic, cost-effective modeling of biological agents. Finally, we propose additional analytical tools to the UK Ministry of Defense’s red team framework for the future development of structured, biological red team exercises, and discuss other existing future-oriented threat assessments in this realm. | ||
650 | 4 | |a Biosecurity | |
650 | 4 | |a red team | |
650 | 4 | |a Threat assessment | |
700 | 1 | |a Gronvall, Gigi |e VerfasserIn |0 (DE-588)1168754011 |0 (DE-627)1032528419 |0 (DE-576)511718306 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Terrorism and political violence |d London : Cass, 1989 |g 32(2020), 6, Seite 1225-1244 |h Online-Ressource |w (DE-627)349234795 |w (DE-600)2080322-9 |w (DE-576)113563507 |x 1556-1836 |7 nnns |
773 | 1 | 8 | |g volume:32 |g year:2020 |g number:6 |g pages:1225-1244 |
856 | 4 | 0 | |u https://doi.org/10.1080/09546553.2018.1457527 |x Resolving-System |3 Volltext |
856 | 4 | 0 | |u https://www.tandfonline.com/doi/full/10.1080/09546553.2018.1457527 |x Verlag |3 Volltext |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4250087271 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1831607360 | ||
LOK | |0 005 20230120104700 | ||
LOK | |0 008 230120||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krub | ||
ORI | |a SA-MARC-krimdoka001.raw |