recommended reading

Auditors Fault Pentagon Sorting of Biggest Bioweapon Threats

Khamidulin Sergey/

Auditors say the Defense Department is not following its own procedures for guarding against "potentially catastrophic" biological strikes.

Pentagon rules require the agency each year to revisit its list of top biological-weapon threats, with an eye to possibly reshuffling the order of agents deemed most dangerous to its military personnel and civilians, the congressional Government Accountability Office said in a report issued on Thursday.

"Yet, [the Defense Department] does not follow its established process for updating its biological threat priorities," auditors wrote in their assessment.

Failing to regularly weigh the relative risks posed by various weapon candidates, they said, makes it unclear whether the United States is pursuing medical treatments for "the most serious and likely biological threats." The Defense Department backed the report's findings, according to a letter from Andrew Weber, the Pentagon's assistant secretary for nuclear, chemical, and biological defense programs.

The Pentagon would review its biodefense directives "to ensure they align with current ... planning processes," Weber wrote last week.

GAO auditors described "progress" in related areas, including Defense Department coordination with other federal offices to prepare against biological threats.

The Health and Human Services and Defense departments "have developed interagency agreements and other tools that facilitate communication on the various stages of medical countermeasure development," auditors wrote.

In addition, the Pentagon has worked with the Homeland Security Department on measures "for identifying biological agents that pose domestic threats and risks," the report states.

The Defense Department maintains sole responsibility for preparing medical countermeasures for U.S. military personnel.

This article was published in Global Security Newswire, which is produced independently by National Journal Group under contract with the Nuclear Threat Initiative. NTI is a nonprofit, nonpartisan group working to reduce global threats from nuclear, biological, and chemical weapons.

(Image via Khamidulin Sergey/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.