Skip to main content

The effectiveness of the department of defense’s field manual 3-11 in detecting, deterring and degrading the breach of a combat base by a human-borne with bioagent (HBBA): perceptions of security personnel

Abstract

Background

The department of defense’s FM 3-11 is among the military’s field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent (HBBA) terrorist breach at an entry control point (ECP).

Method

This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach’s α > 0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0 %; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.

Results

The results revealed that while over 60.0 % of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other TTPs would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0 % suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.

Conclusion

If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86 (intelligence), might increase.

Background

The September 11, 2001 attack on the United States and the anthrax incidents that same year are generally agreed to have changed the global and U.S. response to terrorism; as a result, the “nation’s bioterrorism response capability has become an imminent priority for policymakers, researchers, public health officials, academia and the private sector” ([1], p.1). Previously, in 1984, a religious cult called “Bagwan Shree Rajneesh” was reported to have contaminated a salad bar in the U.S. with Salmonella in the first case of bioterrorism (BT). Other cases include the 1996 Shigella dysenteriae Type 2 contamination of muffins and donuts in Dallas, Texas, and the 1997 and 1998 anthrax hoaxes reported in Washington, DC, and Los Angeles, respectively [24].

Other bioterrorist events, as reported by Tucker [5], include the 1970 “Weather Underground” revolutionary group attack on federal buildings; the 1972 college ecoterrorist group, “R.I.S.E”, which employed eight microbial pathogens, including typhoid fever, diphtheria, dysentery and meningitis; the 1980 attack by the “Red Army Fraction” group, a Marxist revolutionary ideological group; the deliberate contamination of salad bars with Salmonella bacterium 1984 by a “Rajneeshee Cult”; a in 1991 ricin threat made by the “Minnesota Patriots Council” for personal revenge; and, in 1998, the arrest of Larry Wayne Harris when he talked about obtaining and deploying anthrax to achieve a “white supremacist goal”. Dudley [6] reported that between 1990 and 2000, a total of 1368 cases of tularemia, one of the recognized diseases caused by a bioagent Francisella tularensis (a biological agent), were reported in the U.S.

In March 2002 in Texas, the 12th cutaneous anthrax case was detected and linked to mail in a Texas laboratory. In 2003, a total of nine ricin biothreats were reported [7], while on February 3, 2004, the Dirksen Senate Office Building in Washington, DC, was reported to have discovered ricin in the office of Senator Bill Frist. In April, 2013, letters that tested positive for ricin were reportedly sent to Senator Roger Wicker [8], and similar letters were also reportedly sent to the President of the United States, Barack Obama, and the then-mayor of New York City, Michael Bloomberg [9].

Field manuals, FM 3-11

The U.S. military has compiled and published many sets of procedures as manuals for practically every operation and for those employed in the field. These manuals include, but are not limited to, the Joint Entry Control Point & Escalation of Force Procedures (JEEP) [10], the Joint Forward Operations Base (JFOB) [11], the Unit Antiterrorism Officer (UAO) Handbook [12] and the Field Manual (FM) 3-11 [13]. Of these manuals, the FM 3-11 series is the most specific to biological agent preparation and reactions; thus, it is a focus for critique in this study. This multi-service tactics, techniques and procedure (TTP) manual focus on chemical, biological, radiological and nuclear (CBRN) agents. There are approximately six different subclasses of this manual, numbered 3-11, 3-11.3; 3-11.4; 3-11.5; 3-11.86 and 3-11.9 [1318]. In summary, FM 3-11 covers the military’s strategies and policy on CBRN; FM 3-11.3, updated in 2009, addresses steps for avoiding CBRN agents; FM 3-11.4 addresses protective wear and measures and was updated in 2009. FM 3-11.5 details decontamination procedures, FM 3-11.86 emphasizes the roles of biological surveillance, and FM 3.11-9 provides a detailed reference for the biological and chemical agents employed for CB warfare [1318]. While these TTPs are very useful, they are not specific enough for easy application at the entry control point (ECP).

The U.S. military is one of the major resources the government employs for national security [19] and the global war on terrorism; consequently, service members (SMs) are exposed to the possibility of a bioagent attack. This exposure was anticipated during the invasion of Iraq in 1990 and 2003, when SMs were given mandatory antibiotics [20]. The exact number of military bases in foreign location is ever-changing because of the dynamics of the nation’s anti-terrorism strategy; however, the Department of Defense’s (DoD) 2010 report indicates that there were 662 facilities maintained by the U.S. military in 38 foreign countries, excluding those in Iraq and Afghanistan [21].

Totten [22] reported that returning U.S. military personnel, like international travelers, immigrants, or imported goods, are viewed even by intelligence agencies as sources for the introduction of contagious infectious diseases into the U.S. As multi-national forces engage in joint missions in regional and global attempts to address conflicts or humanitarian crises, questions are arising about the possible roles the military may play in disseminating diseases in the countries where they are deployed or in the acquisition of diseases from fellow soldiers from other nations during joint deployments [23, 24]. Aerssens’ 2011 study [23] reported the Belgian troops’ return from Congo with parasite infections.

Many studies have been conducted by the military in the U.S. and other countries to understand the role and impact of infectious disease dissemination among deployed personnel in terms of disease surveillance, [2527], but at present, no study has addressed the breach of an ECP with the intent to cause bioterrorism (BT) against U.S. military personnel that would impact their health and mission.

On September 16, 2014, United States President Barack Obama announced to the nation his strategy and actions to combat the Ebola outbreak in some countries in the West African countries of Liberia, Sierra Leone and Guinea, with a promise to deploy U.S. military service members [28]. Immediately, questions from members of press reflected fears about the possibilities of these military men and women becoming infected with the virus and becoming “vectors” of transmission back to the USA.

While at this time, there is no documented evidence of an HBBA terrorist attack against a U.S. military combat, numerous cases of possible “potential vulnerabilities” have been reported by Hylton [29], and more have been reported by Alakpa [30]. The lack of such an attack does not rule out the future use of such an insidiously deadly form of terrorism to threaten the U.S. security and its forces stationed abroad. Should a terrorist group attempt this route of attack, what measures are in place to check or prevent a breach of an FOB’s ECP?

The purpose of this study was to determine whether the current DoD FM 3-11 field manual series, which is specifically designed to prepare for and respond to a biological agent attack, would be effective for detecting, deterring and degrading a terrorist with a BA at a military base ECP.

Method

Respondents

The target populations selected for this pretest were U.S. military personnel (primarily) and other individuals in the security profession (secondarily) with combat experience. A total of 110 questionnaires were distributed, including single copies given to the 13 points of contact (POCs) for willing respondents at eight military installations: a National Guard post, three police stations in Sussex County, NJ, the Veteran’s Administration (VA) Security Post at Castle Point, NY, two military/veteran coordinators at NJ Universities, and the U.S. Customs and Borders Office in Newark, NJ.

Research design

This was a cross-sectional survey study with the administration of a validated, five-point Likert-scaled questionnaire with two constructs and Cronbach’s alpha reliabilities of 0.820 and 0.892 for Constructs 1 and 2, respectively [30]. The questionnaire was distributed to respondents in the selected organizations, and a single-blind approach was used to ensure that no direct contact occurred between the respondents and investigator. However, in some situations, there was direct contact between prospective respondents (those willing to participate) and the investigator, who later offered these respondents hard copies of the questionnaires, along with consent forms. Electronic copies were also sent to respondents who requested the questionnaire and consent forms in an electronic format.

Data collection

Data from the target population was collected with the validated survey tool. Only those questionnaires that were fully completed or had no more than four missing items and in which the respondents demonstrated knowledge or training on antiterrorism ECP TTPs were accepted for analysis.

Data analysis

Data collected were analyzed using the Statistical Product and Service Solution (SPSS) statistical software (Base Grad Pack shrink wrap version 21.0) for both descriptive and scale reliability—Cronbach’s alpha analysis.

Delimitations of study

This research study focused primarily on military combat settings. The respondents were primarily military or involved in national security and had personal knowledge of and/or training in antiterrorism (AT) measures and TTPs. It did not reveal or expose details about classified military TTPs, analyze or review specifics of the military TTPs that focus on reaction and recovery from terrorist attacks on combat bases, or reveal exact names of combat bases and their coordinates or the specifics of their activities. The study was limited to the periods witnessed by one of the investigators while on tour of duty in Afghanistan as a force protection vulnerability assessor for the U.S. Army Central Command.

Ethical statement/approval

The New Jersey City University IRB approved this research on 05/13/2014 as part of the corresponding author’s DSc dissertation. The respondents’ privacy was protected and no identifying personal information was collected.

Results

Only questionnaires that were at least 95.0 % complete and respondents who demonstrated personal knowledge of or training in any anti-terrorism (AT) tactics, techniques and procedures (TTP) were included in the analyses. The return rate from those who were willing to participate and signed the consent form was 75.0 %. After eliminating those who did not fit the required criteria, 26 questionnaires that could be subjected to analysis remained.

Limitations of results

During the dissemination of the survey tool (questionnaire) to the target population, many in the military or Custom and Border Control/Immigration Service agents showed reluctance to participate or permit their subordinates to participate. This reluctance ultimately affected the response rate, the number of respondents, and eventually the sample size of this pretest study.

This small sample size made it impossible for the researchers to make a broad generalization or inference from the findings of the study. However, it is important to emphasize that the results tend to show that the ECPs of combat FOBs are vulnerable to breach by a terrorist carrying biological agents. Additionally, these perceptions come from people who have generally been recently deployed and have ECP TTP experiences in a combat environment. Field experience is an important factor in these positions, as individuals who have not been deployed lack the necessary readiness. Over 92 % of the respondents in this study whose questionnaires were completed, returned and analyzed were combat veterans with a minimum of two tours of deployment and with ECP TTP personal experience.

Descriptive data of respondents

More than eighty percent (80.8 %) of respondents whose questionnaires were selected and analyzed were in the military; 15.4 % were retired military, and 3.8 % were from Homeland Security. In terms of military service branch, 80.0 % were in the U.S. Army, 12.0 % were in the U.S. Air Force, 4.0 % were in the U.S. Navy, and 4.0 % were U.S. Marines. Of this sample, 69.2 % were enlisted, 26.9 % were officers, and 3.8 % were civilians.

Combat experience of the respondents

More than ninety-two percent (92.3 %) of the respondents had been deployed to combat zones, with 75.0 % just returning from the Operation Enduring Freedom (OEF) campaign in Afghanistan; 16.7 % were in the Iraq war, and 8.3 % were involved in Operation New Dawn. All of the respondents claimed to have had personal knowledge of or training in anti-terrorism.

Respondents’ perceptions of the effectiveness of CBRN TTP

Slightly more than forty-six percent (46.1 %) of respondents strongly disagreed or disagreed with the notion that immunizing every resident of a combat post will assist in the detection of a terrorist with a BA at the ECP. Additionally, 53.8 % strongly disagreed or disagreed that immunization would prevent the breach of a combat ECP by a terrorist with a BA (Fig. 1).

Fig. 1
figure 1

The respondents’ perceptions regarding the effectiveness of immunization protocols against a BA breach at an ECP

Biosurveillance TTP as detailed in FM 3-11.86

Slightly more than eighty percent (80.7 %) of the respondents agreed or strongly agreed that biological intelligence would facilitate the effective identification of a terrorist with a bioagent at the ECP. More than seventy-six percent (76.9 %) agreed or strongly agreed that the deployment of biological agent collectors or detectors in the area of operation (AO) would prevent an ECP breach by a terrorist with a bioagent. Finally, 61.5 % agreed or strongly agreed that a biological warfare attack warning system would prevent the breach of an ECP by an HBBA terrorist (Fig. 2).

Fig. 2
figure 2

The respondents’ perceptions regarding the effectiveness of biointelligence protocols against a BA breach at an ECP

Protective equipment and the breaching of ECPs by an HBBA terrorist (FM 3-11.4)

The responses regarding how effective the current CBRN TTP (FM 3-11.4) would be in the detection, deterrence or mitigation of a successful breach of the ECP by an HBBA terrorist were analyzed. Approximately fifty-five percent (53.8 %) of the respondents strongly disagreed or disagreed with the notion that current individual protective equipment would prevent the breach of a combat ECP by a terrorist carrying a bioagent. Fifty-seven percent (57.6 %) strongly disagreed or disagreed with the statement that wearing protective gear would prevent the breach of a combat ECP by a terrorist carrying a bioagent (Fig. 3).

Fig. 3
figure 3

The respondent’s perceptions regarding the effectiveness of personal protective equipment protocols against a BA breach at an ECP

Respondents suggestion for the modification of current FOB ECP TTPs

In response to the item asking whether there is a need for any modification of current ECP TTPs to enhance security against a human terrorist with a BA at an ECP, 72.0 % of the respondents responded “yes”. Over 70.0 % of those who answered “yes” recommended the need for training and education on bioagents and bioterrorism for every personnel manning the ECP. Over 60.0 % recommended that in addition to training, effective equipment for bioagent detection should be provided for personnel at the ECP.

Responses regarding BA devices at ECPs

Fifty percent of the respondents strongly disagreed or disagreed with the statement that soldiers at the ECP had devices, such as the explosive trace detector spray kits employed for improvised explosive devices (IEDs) that could effectively detect traces of BAs on a person at the ECP. Similarly, 53.8 % either strongly disagreed or disagreed that every soldier at the ECP is adequately knowledgeable about how to look for BAs or what to look for.

Discussion

This preresult indicated that 61.5 % of the respondents, the majority of whom were combat veterans, think it is either possible or very possible for a terrorist carrying a biological agent to successfully breach a combat ECP undetected. The fact that the analysis indicated that over 60.0 % of the respondents either agreed or strongly agreed that biological intelligence, the deployment of biological collectors or detectors and biowarning signals would be effective in preventing the breach of a combat ECP by an HBBA terrorist tends to indicate limited knowledge. These policies or practices are more reactive in nature, as they are deployed in response to the detected presence of a released bioagent in line with the U.S. military and government; hence the 2002 National Strategy to Combat Weapons of Mass Destruction (CWMD) [31, 32]. The federal government has deployed biodetectors around certain areas on civil security bases under the “BioWatch” program, as documented in Chapa’s [33] article. Regarding the use of personal protective equipment (PPE) and immunization as currently practiced under the CBRN TTPs, over 50 % and 45 % of respondents, respectively, strongly disagreed or disagreed that these methods would effectively prevent an HBBA terrorist from breaching an ECP. Usually, PPEs are donned after intelligence has indicated a possible threat, generally in war theater and not necessarily at the ECP, while immunization is performed to prevent infections based on the threat of a specific agent that intelligence has identified.

It is striking to note that the respondents claimed that soldiers are not educated regarding searching for BAs at the ECP, nor are they equipped with the necessary devices to detect a BA on a person or a vehicle, such as the equipment employed for IED searches. While the authors acknowledge the limitations of this study, the perceptions of these respondents remain very authentic because they have firsthand combat ECP TTP experiences. During this study, many of the respondents suggested the need for authorities to educate soldiers about bioterrorism and HBBA terrorists and the need for changes in current ECP TTPs to include procedures that involve searching for BAs.

The authors also acknowledges the difficulties that might arise with the development of devices that will effectively detect all BAs; however, the current situation of a complete absence of any BA-deterrent search practices and the use of obsolete biowarfare TTPs, as enumerated in the current FM 3-11 series, is troubling. The successful importation of the Ebola virus into Nigeria and the U.S.A. by individuals who knew they had had contact with people infected with the Ebola hemorrhagic virus remains the most parallel case and the best practical example of a human-borne with bioagent (HBBA), a human mobile bioagent device. Those individuals knew that they were infected, yet lied to the officials at the ECP to enter their intended countries. Those events tend to confirm the feasibility and possibility of an intentional and deliberate transportation of an infectious agent in-borne by humans across borders to cause or spread disease in another country. Mr. Patrick Sawyer was actively incubating a deadly virus in an implanted IED, which is known as a surgically inserted improvised explosive device (SIIED) in military parlance; thus, he was a “human-time-bomb,” an HBBA who left his country undetected by a point of exit/entry (POE) security metal detector search, flew into Nigeria, and passed through metal detectors and other POE security searches that failed to detect or identify the virus he was carrying.

Similarly, Mr. Thomas Eric Duncan cared for a family/people who actively exhibited EVD symptoms and who later died. He lied to officials at the Liberian airport about his prior contact to board an airplane ultimately headed for the U.S., where as many as 100 individual were placed at risk of possible infection [34, 35]. The Liberian president was reportedly unhappy with Mr. Duncan’s behavior and stated his willingness to prosecute the index case when or if Mr. Duncan returns to Liberia [36].

There are no longer any illusions regarding the possibility and feasibility of humans becoming carriers of biological agents, and there are no illusions regarding the actions of Al Qaeda and other terrorist groups, who are actively seeking the means to acquire and transport BAs through the U.S./Mexico border with the intention of causing terror against the United States [37, 38]. Furthermore, the U.S. has numerous military bases on foreign lands, and military personnel can acquire microbial infections during deployment that can be transported to the homeland [2224]. We cannot wait for another 9-11 attack before accepting that this form of terrorism is feasible, as the enemy has proven to be always to be one step ahead. Now is the time for civil security/national security personnel and leaders to break this circle. It would be a mistake to confuse biowarfare with bioterrorism; the former requires sophisticated equipment that it is not very necessary in the latter, especially when there are willing volunteers seeking martyrdom.

Significance of study

A successful breach of a U.S. military combat post by a bioterrorist would not only have a devastating effect on morale, it would affect the military’s fighting strength and thus its missions. It would provide an additional route of BA dissemination to the U.S. mainland. The failure to detect a BA during its incubation period would result in a failure to treat infected soldiers (thus making them carriers of the BA), especially those returning home for rest and recuperation (R & R) and those redeploying home. This study was the first to investigate the possible vulnerability of combat FOBs to a breach at the ECP by an HBBA terrorist under current military measures.

Limitations of the study

This study employed a time-specific, cross-sectional design for the purpose of determining perceptions that are critical to ECP security at a combat post by those who are charged to ensure it. The restrictions placed on the target respondent organizations’ populations, the classification limitations placed on military TTPs, and possible effects on the participants’ responses to the questionnaire are other limitations.

Conclusion

If obtained from proper sources and communicated to the personnel at the ECP in an effective or timely manner, the effectiveness of certain TTPs outlined in the FM 3-11 - specifically FM 3-11.86, intelligence - might increase. The fact remains that while there are drills on soldiers’ reactions to a biological attack, there is no specific training for the ECP, such as how to search for biological agent in or on a person at the ECP. This explains how the retired air force colonel described by Hylton (29) was able to get a modified anthrax bacillus into the White House and how an Afghani worker was able to enter an FOB and serve food to soldiers despite having an infectious skin problem. At ECPs, therefore, the current FM 3-11 methods would be very ineffective for preventing an HBBA breach.

Abbreviations

HBBA:

Human-borne with bioagent

ECP:

Entry control point

BA:

Biological agent / bioagent

DoD:

Department of defense

BT:

Bioterrorism

CBRN:

Chemical, biological, radiological, nuclear

FOB:

Forward operating base

DIFAC:

Dinning facility

LN:

Local National

TTP:

Tactics, techniques, procedures

PBIED:

Person-borne improvised explosive device

VBIED:

Vehicle-borne improvised explosive device

AT:

Anti-terrorism

OEF:

Operation Enduring Freedom

FM:

Field manual

SIIED:

Surgically inserted improvised explosive device

References

  1. Knobler SL, Mahmoud AAF, Pray LA. Biological threats and terrorism: Assessing the science and response capabilities: Workshop Summary 2012. http://www.nap.edu/catalog/10290.html Accessed 25 May 2015.

  2. Galamas F. Profile bioterrorism: present and potential threats. Comp Strategy. 2011;30:70–93. doi:10.1080/0149533.2011.545689.

    Article  Google Scholar 

  3. Arizona Department of Health Services (ADHS). Bureau of emergency preparedness & response: History of biowarfare and bioterrorism 2005. http://azdhs.gov/phs/edc/edrp/es/bthistor2.htm. Accessed 7 June 2012.

  4. Phillips MB. Bioterrorism: A brief history. In focus on bioterrorism 2005. Northeast Florida Med. 2005;56:32–5. www.dcmsonline.org/jax-medicine/2005journals/bioterrorism/bioterrorism_history.pdf. Accessed 7 June 2012.

    Google Scholar 

  5. Tucker JB. Historical trends related to bioterrorism: an empirical analysis. Emerg Infect Dis. 1999;5:498–504.

    Article  PubMed  CAS  PubMed Central  Google Scholar 

  6. Dudley JP. Tularemia: A case study in medical surveillance and bioterrorism preparedness. J Med Chem Bio Radiol Defense. 2010;8:17. www.jmedcbr.org/issue_0801/Dudley/Dudley_09_10.pdf. Accessed 3 July 2012.

    Google Scholar 

  7. Dembek ZF, Pavlin MD, Kortepeter MG. Epidemiology of biowarfare and bioterrorism. In: Dembek ZF, editor. Textbook of military medicine: Medical aspects of biological warfare. Published by the Office of the Surgeon General, U.S. Army. Washington DC: A TMM Publications, Borden Institute, Walter Reed Army Medical Center; 2007. p. 39–68.

    Google Scholar 

  8. Bresnahan J, Gibson G. Letter sent to Roger Wicker tests positive for ricin. Politico. 2013. http://dyn.politico.com/printstory.cfm?uuid=57E009CF-BEEF-4CB5-8DDD-2D70A68D9. Accessed 16 April 2013.

  9. Maglio T. Walking dead, vampires diaries actress arrested in obama-bloomberg ricin case. WRAP. 2013. http://tv.yahoo.com/news/walking-dead-vampires-diaries-actres-actress-arrested-obama-bloomber. Accessed 16 April 2013.

  10. Jeep Handbook. Joint entry control point & escalation of force procedures (JEEP). GTA#90-01-018. For Official Use Only (FOUO), 2009.

  11. Joint Forward Operations Base (JFOB). Survivability and protective construction handbook. 5th ed. 2009. FOUO-For Official use only book.

    Google Scholar 

  12. Unit Antiterrorism Officer (UAO) Handbook. US army publication. For Official Use Only (FOUO). 2010.

    Google Scholar 

  13. Field Manual 3-11. Multiservice doctrine for chemical, biological, radiological, and nuclear operations, 2011. https://www.us.army.mil. Accessed 11 April 2012.

  14. Field Manual 3-11.3. Multiservice, tactics, techniques, & procedures for chemical, biological, radiological, and nuclear contamination avoidance 2009. http://armypubs.army.mil/ or http://www.armystudyguide.com or www.us.army.mil/fm3_11.3update 2009 TTP CBRN.pdf. Accessed 11 April 2012.

  15. Field Manual 3-11.4. Multiservice tactics, techniques and procedures for nuclear, biological and chemical (NBC) protection, 2009. https://www.us.army.mil. Accessed 11 April 2012.

  16. Field Manual 3-11.5. CRBN decontamination. multiservice tactics, techniques, and procedures for chemical, biological, radiological, and nuclear decontamination”, 2006. https://www.us.army.mil. Accessed 11 April 2012.

  17. Field Manual 3-11.86. Multiservice tactics, techniques, and procedures for biological surveillance, 2004. https://www.us.army.mil. Accessed 11 April 2012.

  18. Field Manual 3-11.9. Potential military chemical/biological agents and compounds. 2005. https://www.us.army.mil. Accessed 11 April 2012.

  19. Jordan AA, WJ T (J), Meese MJ, Nielsen SC. American national security. 6th ed. USA: The John Hopkins University Press; 2009.

    Google Scholar 

  20. Matsumoto G, Vaccine A. The covert government experiment that’s killing our soldiers and why GI’s are only the first victims. New York: The Perseus Books Group; 2004.

    Google Scholar 

  21. Department of Defense. DoD base structure report fiscal year 2010 baseline (a summary of DoD’s real property inventory), 2010. http://www.acq.osd.mil/ie/download/bsr/bsr2010baseline.pdf. Accessed on 6 Jun 2013.

  22. Totten RJ. Contagious disease, epidemics, national security, and U.S. immigration: Historical policy responses. 2012. http://ccis.ucsd.edu/wp-content/uploads/2009/08/Robbie-J-Totten_Epidemics-and-U-S-Immigration-Policy-2.pdf. Accessed 22 April 2013.

  23. Aerssens A, Vos DD, Pirnay J, Yansouni C, Clerinx J, Gompel AV, et al. Schistosomiasis in Belgian military personnel returning from the Democratic Republic of Congo. Mil Med. 2011;176:1341–6.

    Article  PubMed  Google Scholar 

  24. Chretien J, Blazes DL, Coldren RL, Lewis MD, Gaywee J, Kana K, et al. The importance of militaries from developing countries in global infectious disease surveillance. Bull World Health Orga. 2007;85:174–80. www.who.int/bulletin/volumes/85/3/06-037101.pdf. Accessed July 23 2013.

    Article  Google Scholar 

  25. Byerly CR. The U.S. military and the influenza pandemic of 1918-1919. Public Health Rep. 2010;3:82–91. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2862337/pdf/phr125s30082.pdf Accessed 20 August 2014.

    Google Scholar 

  26. Cosby MT, Pimentel G, Nevin RL, Fouad AS, Klena JD, Amir E, et al. Outbreak of H3N2 influenza at a US military base in Djibouti during the H1N1 pandemic of 2009. PLoS One. 2013;8:e82089. doi:10.1371/journal.pone.0082089.

    Article  PubMed  PubMed Central  Google Scholar 

  27. Mease LE, Baker KA. Monkey bites among US military members, Afghanistan, 2011. Emerg Infect Dis. 2012;18:1647–9.

    Article  PubMed  PubMed Central  Google Scholar 

  28. The White House. Remark by the president on the ebola outbreak. http://www.whitehouse.gov/the-press-office/2014/09/16/remarks-president-ebola-outbreak. Accessed 22 September 2014.

  29. Hylton WS. How ready are we for bioterrorism? The New York Times, October 26, 2011. (Reprint). http://www.nytimes.com/2011/10/30/magazine/how-ready-are-we-for-bioterrorism.html? Accessed 17 July 2012.

  30. Alakpa GEU. Perceptions of military personnel: Analysis of the department of defense’s counter bioterrorism measures at the tactical level for the enhancement of civil security leadership, management, and policy. NJ. USA: Doctor of science dissertation. New Jersey City University; 2015. p. 186.

    Google Scholar 

  31. National military strategy to combat weapons of mass destruction. 2006. http://www.defense.gov/pdf/nms-cwmd2006.pdf. Accessed 10 June 2013.

  32. White House. National strategy for biosurveillance 2012. http://www.whitehouse.gov/sites/default/files/National_Strategy_for_Biosurveillance_July_2012.pdf. Accessed 29 July 2013.

  33. Chapa L. The state of bioterrorism surveillance. Secur Manage, 2013; 37-42.

  34. Fernandez M, Onishi N. U. S. patient aided ebola victim in Liberia. The New York Time, October 01, 2014a. http://nytimes.com/2014/10/02/us/after-ebola-case-in-dallas-health-officials-seeks-those-who. Accessed 2 October 2014.

  35. Fernandez M, Onishi N. Scrutiny in Texas to detect whether ebola has spread. The New York Time, October 01, 2014b. http://nytimes.com/2014/10/02/us/after-ebola-case-in-dallas-health-officials-seeks-those-who. Accessed 2 October 2014.

  36. Wilson J, Shoichal CE, Yan H. Ebola patients leaving Liberia was “unpardonable,” its president says. October 02, 2014. http://cnn.com/2014/10/02/health/ebola-us/index.htm. Accessed 2 October 2014.

  37. Lynch DM. The cost of amnesty: They come to America II. 2013. Film. Distributed by TV36 OLLC.

  38. Middle East Media Research Institute (MEMRI). Jihadi chatter online, including on social media, about using ebola, poisons as weapon against the U.S. and the West”. Special Dispatch No 5854, of October 03, 2014. http://www.memri.org/report/en/print8171.htm. Accessed 23 October 2014.

Download references

Acknowledgement

Authors acknowledge the unquantifiable assistance of the various point of contacts at the military, security or institutions, in the dissemination of the questionnaire and consent forms to willing respondents. The Contributions of Mrs. Abieyuwa Alakpa, who went with the corresponding author to every possible institution selected for this study and that of James Smith, are here acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George Edafese Alakpa.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ contributions

AG, was the main researcher, involved in the design of the survey tool, appearing before the New Jersey City University’s IRB and conception of the study. He wrote the manuscripts, initiated contacts for dissemination of questionnaire and analysis of data collected. CJ, he was involved with the reading of the manuscripts, study, with mentoring the corresponding author and providing the support for both analysis and realization of the mission. All authors read and approved the final manuscript.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alakpa, G.E., Collins, J.W. The effectiveness of the department of defense’s field manual 3-11 in detecting, deterring and degrading the breach of a combat base by a human-borne with bioagent (HBBA): perceptions of security personnel. Military Med Res 2, 36 (2015). https://doi.org/10.1186/s40779-015-0065-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s40779-015-0065-y

Keywords