1.Tucker, Jonathan B., “A farewell to germs: The U.S. renunciation of biological and toxin warfare, 1969–70,” International Security, 2002, 27 (1): 107–148.
2.Wheelis, Mark, “A short history of biological warfare and weapons,” in The Implementation of Legally Binding Measures to Strengthen the Biological and Toxin Weapons Convention. Chevrier, M. I., Chomiczewski, K., Dando, M. R., Garrigue, H., Granaztoi, G., and Pearson, G. S., eds. (Amsterdam: ISO Press, 2003), pp. 15–31.
3.Wheelis, Mark, “Chemical and biological terrorism: Lessons from history,” in International Seminar on Nuclear War and Planetary Emergencies, 31st Session: The Cultural Planetary Emergency. Ragaini, R., ed. (Singapore: World Scientific Publishing, 2004), pp. 110–113.
4.Shoham, Dany and Jacobsen, Stuart M., “Technical intelligence in retrospect: The 2001 anthrax letters powder,” International Journal of Intelligence and Counterintelligence 2007, 20 (1): 79–105.
5.Etc Group, “Extreme genetic engineering: An introduction to synthetic biology,” 2007.
6.Tucker, Jonathan B. and Zilinskas, Raymond A., “The promise and perils of synthetic biology,” The New Atlantis: A Journal of Technology & Society, 2006: 25–45.
7.Preston, Richard, The Cobra Event (New York: Random House, 1997).
8.Committee on Research Standards and Practices to Prevent the Destructive Application of Biology, Biotechnology Research in an Age of Terrorism (Washington, DC: National Research Council of the National Academies, 2004).
9.Office of Transnational Issues, “The darker bioweapons future” (Langley, VA: Central Intelligence Agency, 2003).
10.Tucker, Jonathan B., “Preventing the misuse of biology: Lessons from the oversight of smallpox virus research,” International Security, 2006, 31 (2): 116–150.
11.Wheelis, Mark, “Biotechnology and biochemical weapons,” Nonproliferation Review, 2002, 9 (1): 48–53.
12.Wheelis, Mark, “Will the new biology lead to new weapons,” Arms Control Today 2004, 34 (6): 6–13.
13.Nixdorff, Kathryn, Davison, Neil, Millett, Piers, and Whitby, Simon, “Technology and biological weapons: Future threats,” in Science and Technology Report (College Park, MD: Center for International Security, Studies School of Public Affairs, University of Maryland, 2003).
14.Graham, Bob, Talent, Jim, Allison, Graham, Cleveland, Robin, Rademajer, Steve, Roemer, Tim, Sherman, Wendy, Sokolski, Henry, and Verma, Rich, World at Risk: The Report of the Commission on the Prevention of WMD Proliferation and Terrorism (New York: Vintage Books, 2008).
15.Cordesman, Anthony H., “When to cry wolf, what to cry, and how to cry it,” in Bioterrorism: Confronting a Complex Threat, Wenger, A. and Wollenmann, R., eds. (Boulder: Lynne Rienner, 2007), pp. 155–178.
16.Dando, Malcolm, , “The impact of scientific and technological change,” pp. 77–89.
17.Guillemin, Jeanne, , “The legacy of secret state programs,” pp. 13–37.
18.Leitenberg, Milton, , “Evolution of the current threat,” pp. 39–76.
19.Garfinkel, Michele, Endy, Drew, Epstein, Gerald, and Friedman, Robert, Synthetic Genomics: Options for Governance (New York: Alfred P. Sloan Foundation, 2007), p. 66.
20.Bügl, Hans, Danner, John P., Molinari, Robert J., Mulligan, John T., Park, Han-Oh, Reichert, Bas, Roth, David A., Wagner, Ralf, Budowle, Bruce, Scripp, Robert M., Smith, Jennifer A.L., Steele, Scott J., Church, George, and Endy, Drew, “DNA synthesis and biological security,” Nature Biotechnology 2007, 25 (6): 627–629.
21.Tucker, Jonathan B. and Zilinskas, Raymond A., “The promise and perils of synthetic biology,” The New Atlantis: A Journal of Technology & Society, 2006: 25–45.
22.Tetlock, Philip E., Expert Political Judgment (Princeton: Princeton University Press, 2005).
23.Taleb, Nassim Nicholas, The Black Swan: The Impact of the Highly Improbable (New York: Random House, 2007).
24.Synthetic biology and biosecurity expert interviews, 2007. Mohr, Scott and Mukunda, Gautam, eds. .
26.Keasling, Jay, Overview of the center. NSF Site Visit, Berkeley, CA: SynBERC, , 2009.
32.Mohr, and Mukunda, , Interviews.
33.Elowitz, Michael B. and Leibler, Stanislas, “A synthetic oscillatory network of transcriptional regulators,” Nature 2000, 403: 335–338.
34.Gardner, Timothy S., Cantor, Charles R., and Collins, James J., “Construction of a genetic toggle switch in escherichia coli,” : 339–342.
35.Knight, Thomas, “Idempotent vector design for standard assembly of biobricks,” in MIT Synthetic Biology Working Group (Cambridge, MA: Massachusetts Institute of Technology, 2003).
36.Wellhausen, Rachel and Mukunda, Gautam, “Aspects of the political economy of development and synthetic biology,” Systems and Synthetic Biology, 2009, 3 (1–4): 115–123.
37.Synthetic Biology: Scope, Applications and Implications (London: The Royal Academy of Engineering, 2009).
38.Casagrande, Rocco, “Homeland security 2015,” in Homeland Security 2015 (Washington, DC: Department of Homeland Security, 2006). .
39.Preston, Richard, The Demon in the Freezer (New York: Random House, 2002).
40.Mohr, and Mukunda, , Interviews.
41.Preston, Richard, The Hot Zone (New York: Random House, 1994).
42.Casagrande, , “Homeland security 2015.”
43.Clinehens, Neal A., Aum Shinrikyo and Weapons of Mass Destruction (Maxwell Air Force Base, AL: Air Command and Staff College, 2000).
44.Sopko, John and Edelman, Alan, “Global proliferation of weapons of mass destruction: A case study on the Aum Shinrikyo,” Global Proliferation of Weapons of Mass Destruction; (Washington, DC: United States Senate, , 1996), pp. 47–102.
46.Tumpey, Terrence M., Basler, Christopher F., Aguilar, Patricia V., Zeng, Hui, Solórzano, Alicia, Swayne, David E., Cox, Nancy J., Katz, Jacqueline M., Taubenberger, Jeffrey K., Palese, Peter, and García-Sastre, Adolfo, “Characterization of the reconstructed 1918 Spanish influenza pandemic virus,” Science 2005, 310: 77–80.
47.Carlson, Robert, “The pace and proliferation of biological technologies,” Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science 2003, 1 (3).
48.Garfinkel, et al., p. 66.
49.Casagrande, , “Homeland security 2015.”
50.Mohr, and Mukunda, , Interviews.
52.Cello, Jeronimo, Paul, Aniko V. and Wimmer, Eckard, “Chemical synthesis of poliovirus cDNA: Generation of infectious virus in the absence of natural template,” Science 2002, 297: 1016–1018.
53.Mohr, and Mukunda, , Interviews.
55.Mukunda, Gautam and Mohr, Scott, “DNA synthesis, synthetic biology, and biosecurity,” in The proceedings of Synthetic Biology 3.0 (, 2007).
56.Mohr, and Mukunda, , Interviews.
57.Casagrande, , “Homeland security 2015.”
59.Mohr, and Mukunda, , Interviews.
61.Nowak, Rachel, “Killer virus: An engineered mouse virus leaves us one step away from the ultimate bioweapon,” New Scientist Online News (, 2001).
62.Orendt, Wendy, “A most dangerous game,” Natural History: FindArticles.com (2004).
65.Berdoy, M., Webster, J. P., and Macdonald, D. W., “Fatal attraction in rats infected with toxoplasma gondii,” Proceedings: Biological Sciences 2000, 267 (1452): 1591–1594.
66.Tucker, Jonathan B., “A farewell to germs: The U.S. renunciation of biological and toxin warfare, 1969–70,” International Security, 2002, 27 (1): 107–148.
67.Jervis, Robert, Perception and Misperception in International Politics (Princeton, NJ: Princeton University Press, 1976).
68.Leitenberg, Milton, Leonard, James, and Spertzel, Richard, “Biodefense crossing the line,” Politics and the Life Sciences 2003, 22 (2): 2–3.
69.Dimasi, Joseph A., Hansen, Ronald W. and Grabowski, Henry G., “The price of innovation: New estimates of drug development costs,” Journal of Health Economics 2003, 22 (2): 151–185.
70.Mohr, and Mukunda, , Interviews.
73.Jennings, G.T. and Bachmann, M.F., “Designing recombinant vaccines with viral properties: A rational approach to more effective vaccines,” Current Molecular Medicine 2007, 7: 143–155.
74.Mohr, and Mukunda, , Interviews.
77.Mattey, M. and Spencer, J., “Bacteriophage therapy: Cooked goose or phoenix rising?” Current Opinion in Biotechnology 2008, 19: 608–612.
78.Rochat, T., Bermudez-Humaran, L.G., Gratadoux, J.J., Fourage, C., Hoebler, C., Corthier, G. and Langella, P., “Anti-inflammatory effects of lactobacillus casei bl23 producing or not a maganese-dependent catalase on dss-induced colitis in mice,” Microbial Cell Factories 2007, 6 (22).
79.Mohr, and Mukunda, , Interviews.
81.Vogel, Kathleen, “Bioweapons proliferation: Where science studies and public policy collide,” Social Studies of Science 2006, 36 (5): 659–690.
82.Vogel, Kathleen, “Biodefense: Considering the sociotechnical dimension,” in Biosecurity interventions: Global Health and Security in Question, Lakoff, A. and Collier, S. J., eds. (New York: Columbia University Press, 2008), pp. 227–256.
83.Landes, David S., The Wealth and Poverty of Nations: Why Some Are So Rich and Some So Poor (New York: W.W. Norton & Company, 1998), pp. 278–279.
84.Vogel, Kathleen, “Bioweapons proliferation: Where science studies and public policy collide,” Social Studies of Science 2006, 36 (5): 659–690.
85.Mohr, and Mukunda, , Interviews.
87.Mohr, and Mukunda, , Interviews.
89.Christensen, Clayton M. and Raynor, Michael E., The Innovator's Solution: Creating and Sustaining Successful Growth (Boston: Harvard Business School Press, 2003).
90.Mohr, and Mukunda, , Interviews.
92.Mohr, and Mukunda, , Interviews.
94.Personal observations by the authors.
96.Bear, Greg, Quantico (New York: Vanguard Press, 2007).
97.Clancy, Tom, Rainbow Six (New York: Penguin Group, 1998).
98.Stern, Jessica, “Dreaded risks and the control of biological weapons,” International Security, 2002/03, 27 (3): 89–123.
101.Gilfillan, Lynne, Smith, Bradley T., Inglesby, Thomas V., Kodukula, Krishna, Schuler, Ari, Lister, Mark, and O'Toole, Tara, “Taking the measure of countermeasures: Leaders' views on the nation's capacity to develop biodefense countermeasures,” Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science 2004, 2 (4): 1–8.
102.Vogel, Kathleen, “Biodefense: Considering the sociotechnical dimension,” in Biosecurity Interventions: Global Health and Security in Question, Lakoff, A. and Collier, S. J., eds. (New York: Columbia University Press, 2008), pp. 227–256.
103.Koblentz, Gregory, “Pathogens as weapons: The international security implications of biological warfare,” International Security, 2003/04, 28 (3): 84–122.
104.Cordesman, Anthony H., “Biological warfare and the Buffy paradigm,” in CSIS Homeland Defense: Asymmetric Warfare and Terrorism (Washington, DC: Center for Strategic and International Studies, 2001).
105.Lavoy, Peter R., “Knowledge gaps and threat assessments,” in Bioterrorism: Confronting a Complex Threat, Wenger, Andreas and Wollenmann, Reto, eds. (Boulder, CO: Lynne Rienner, 2007), pp. 93–118.
106.Chevrier, Marie Isabelle, “Why do conclusions from experts vary?” pp. 119–151.
107.Mohr, and Mukunda, , Interviews.
108.Graham, et al.
109.Dando, Malcolm, “Biologists napping while work militarized,” Nature, , 2009, 460 (7258): 950–951.
110.Mohr, and Mukunda, , Interviews.
112.Mohr, and Mukunda, , Interviews.
113.Fraser, Claire M. and Dando, Malcolm R., “Genomics and future biological weapons: The need for preventive action by the biomedical community,” Nature Genetics 2001, 29: 253–256.
114.Rappert, Brian, Chevrier, Marie, and Dando, Malcolm, “In-depth implementation of the BTWC: Education and outreach,” in Bradford BTWC Review (Department of Peace Studies, University of Bradford, Bradford, UK, 2006).
115.Guillemin, Jeanne, “Can scientific codes of conduct deter bioweapons?” Audit of the Conventional Wisdom 2007, : 1–4.
116.Mozdzanowska, Aleksandra, 2005. Personal communication. Mukunda, Gautam, Ed. .
117.Bügl, Hans, Danner, John P., Molinari, Robert J., Mulligan, John T., Park, Han-Oh, Reichert, Bas, Roth, David A., Wagner, Ralf, Budowle, Bruce, Scripp, Robert M., Smith, Jennifer A.L., Steele, Scott J., Church, George, and Endy, Drew, “DNA synthesis and biological security,” Nature Biotechnology 2007, 25 (6): 627–629.
119.Garfinkel, et al., p. 66.
120.Mohr, and Mukunda, , Interviews.
121.Koblentz, Gregory, “Pathogens as weapons: The international security implications of biological warfare,” International Security, 2003/04, 28 (3): 84–122.
122.Bernstein, Peter L., Against the Gods: The Remarkable Story of Risk (New York: John Wiley & Sons, 1996).
123.Bernstein, Peter L., Capital Ideas: The Improbable Origins of Modern Wall Street (New York: The Free Press, 1992), p. 340.
125.McCray, Lawrence, Oye, Kenneth A., and Petersen, Arthur, “Planned adaptation in risk regulation: A review of US environmental, health, and safety regulation,” Technology Forecasting and Social Change 2009, 76.