National Academies Press: OpenBook

Seeking Security: Pathogens, Open Access, and Genome Databases (2004)

Chapter: Appendix C: Participants

« Previous: Appendix B: Agenda
Suggested Citation:"Appendix C: Participants." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

Appendix C
Participants

PARTICIPANTS IN THE OCTOBER 1, 2003, WORKSHOP OF THE NATIONAL RESEARCH COUNCIL

COMMITTEE ON GENOMICS DATABASES FOR BIOTERRORISM THREAT AGENTS


Corrie Brown, University of Georgia

Tom Cebula, Food and Drug Administration

Mary Clutter, National Science Foundation

Joe DeRisi, University of California, San Francisco

Janet Dorigan, Central Intelligence Agency

Gerald Epstein, Defense Threat Reduction Agency

Stan Falkow, Stanford University

David Franz, Southern Research Institute

Claire Fraser, The Institute for Genomic Research

Art Friedlander, U.S. Army Medical Research Institute of Infectious Diseases

Elizabeth George, Department of Homeland Security

Maria Giovanni. National Institutes of Health

Michael Gottlieb, National Institutes of Health

Robert Heckert, U.S. Department of Agriculture

Maryanna Henkart, National Science Foundation

John Houghton, Department of Energy

Barbara Jasny, Science

Norm Kahn, Central Intelligence Agency

Paul Keim, Northern Arizona University

Suggested Citation:"Appendix C: Participants." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

James Kvach, Defense Intelligence Agency

Jim LeDuc, Centers for Disease Control and Prevention

Rachel Levinson, Office of Science and Technology Policy

David Lipman, National Institutes of Health

Vahid Majidi, Department of Justice

Bob May, Royal Society (UK)

Michael Morgan, Wellcome Trust

Tara O’Toole, Johns Hopkins University

George Poste, Arizona State University

Rino Rappuoli, Chiron

David Relman, Stanford University

Caird Rexroad, U.S. Department of Agriculture

Janet Shoemaker, American Society for Microbiology

Terence Taylor, International Institute for Strategic Studies

Ron Walters, Central Intelligence Agency

Marion Warwick, National Science Foundation

Mark Wilson, Federal Bureau of Investigation

Suggested Citation:"Appendix C: Participants." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 73
Suggested Citation:"Appendix C: Participants." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 74
Seeking Security: Pathogens, Open Access, and Genome Databases Get This Book
×
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Within the last 30 years, the genomes of thousands of organisms, from viruses, to bacteria, to humans, have been sequenced or partially sequenced and deposited in databases freely accessible to scientists around the world. This information is accelerating scientists' ability to fight disease and make other medical advances, but policymakers must consider the possibility that the information could also be used for destructive purposes in acts of bioterrorism or war. Based in part on views from working biological scientists, the report concludes that current policies that allow scientists and the public unrestricted access to genome data on microbial pathogens should not be changed. Because access improves our ability to fight both bioterrorism and naturally occurring infectious diseases, security against bioterrorism is better served by policies that facilitate, not limit, the free flow of this information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!