| Literature DB >> 12396931 |
Jay C Butler1, Mitchell L Cohen, Cindy R Friedman, Robert M Scripp, Craig G Watz.
Abstract
The biological attacks with powders containing Bacillus anthracis sent through the mail during September and October 2001 led to unprecedented public health and law enforcement investigations, which involved thousands of investigators from federal, state, and local agencies. Following recognition of the first cases of anthrax in Florida in early October 2001, investigators from the Centers for Disease Control and Prevention (CDC) and the Federal Bureau of Investigation (FBI) were mobilized to assist investigators from state and local public health and law enforcement agencies. Although public health and criminal investigations have been conducted in concert in the past, the response to the anthrax attacks required close collaboration because of the immediate and ongoing threat to public safety. We describe the collaborations between CDC and FBI during the investigation of the 2001 anthrax attacks and highlight the challenges and successes of public health and law enforcement collaborations in general.Entities:
Mesh:
Year: 2002 PMID: 12396931 PMCID: PMC2730308 DOI: 10.3201/eid0810.020400
Source DB: PubMed Journal: Emerg Infect Dis ISSN: 1080-6040 Impact factor: 6.883
Figure 1Flow chart of response to overt bioterrorism.
Figure 2Flow chart of response to covert bioterrorism.
Differences in public health and law enforcement investigations
| Characteristics | Public health | Law enforcement |
|---|---|---|
| Method of event recognition | Event detected through public health surveillance or calls from clinicians | Event announced by attacker or is evident |
| Challenges to event recognition | Few clinical syndromes that are clearly the result of bioterrorist attack; difficulty distinguishing between disease of natural origin and bioterrorism attack | Large number of hoaxes and noncredible threats not associated with an actual bioterrorist attack; delay in notification of possible event by public health; “copycat” threats or attacks ( |
| Initial data collection | Hypothesis generation, “shoe-leather epidemiology” | Questioning of witnesses and suspects, follow-up of tips and intelligence information |
| Confirmatory data collection and analysis | Controlled epidemiologic studies | Collection and organization of evidence |
| Data validation | Presentation for scientific peer review | Indictment, arrest, and conviction |
| Goal of investigation | Effective disease prevention and control measures | Prevention and deterrence of future attacks |