Skip directly to site content Skip directly to page options Skip directly to A-Z link Skip directly to A-Z link Skip directly to A-Z link
Volume 10, Number 8—August 2004
Letter

Detecting Bioterror Attack

On This Page
Figures
Article Metrics
1
citations of this article
EID Journal Metrics on Scopus

Cite This Article

To the Editor: In a recent article (1), Kaplan et al. addressed the problems in detecting a bioterror attack from blood-donor screening. The main point of this comment is the “early approximation” used by Kaplan et al. to derive the probability of detecting an attack. The simplification used by Kaplan et al. leads to a probability that does not account for the size of the exposed population and can lead to incorrect results and misinterpretations.

Consider a single bioterror attack that infects a proportion p of an exposed population of size N at time τ = 0, such that the initial number of infected is formula image. The quantity of interest is the probability formula image of finding at least one positive blood donation and detecting the attack within time τ. For attacks conducted with contagious agents that could lead to an epidemic, Kaplan et al. used the early approximation solution of the classic epidemic models (2) to describe the progression of the number of infected persons. Consequently, the resulting probability of

Figure

Thumbnail of Probability of attack detection delay for a contagious agent. Dashed line represents the early approximation [[INLINEGRAPHIC('03-1044-M12')]], solid lines the full solution (where the quoted numbers represent the fraction p of the population initially infected), and the symbol “nc” stands for noncontagious agent ([[INLINEGRAPHIC('03-1044-M13')]]). The parameters are as follows: blood donation rate k = 0.05 per person per year, screening mean window period ω = 3 days, mean duration o

Figure. Probability of attack detection delay for a contagious agent. Dashed line represents the early approximation formula image, solid lines the full solution (where the...

attack detection [noted formula image] is dependent only upon the initial size of the release formula image, the basic reproductive number formula image (the mean number of secondary cases per initial index case), and other variables (the blood screening window ω, the mean number k of blood donations per person and per unit of time, and the mean duration of infectiousness 1/r) (see Appendix). Early approximation can lead to unreliable results because it is valid only at earlier stages of the epidemics and in the limit where the proportion p of initially infected is much smaller than the intrinsic steady proportion formula image of the epidemics (Appendix). Relaxing this approximation and using the full solution for the progression of the number of infected persons leads to the probability formula image that takes into account the size of the exposed population (Appendix). The latter is important because, in contrast to formula image that leads to the same conclusion, formula image indicates that the probabilities of detecting an attack within two exposed populations of different sizes, but with the same numbers of initially infected, are not identical. As illustrated in the Figure, when the other variables are fixed, formula image decreases as the proportion p of initially infected increases because the epidemic size decreases as p approaches the thresholdformula image. These subtleties of a simple epidemic model are even less reliable when using the blood screening to detect a bioterror attack with agents that cause diseases of very short incubation period.

Nonetheless, detecting a bioterror attack is very similar to detecting the response of pathogen-specific immunoglobulin M antibodies (as an indicator of recent contact of hosts with pathogens) within a population of hosts by using serologic surveys. Therefore, the reasoning developed for a bioterror attack can be extended and applied to detect and time the invasion or early circulation of certain pathogens within a population. In that perspective, it might be useful to develop an analysis that includes more details of the epidemic progression within this framework.

Top

Dominique Bicout*Comments to Author 
Author affiliation: *Ecole National Veterinaire Lyon, Marcy-l'Etoile, France

Top

References

  1. Kaplan  EH, Patton  CA, FitzGerald  WP, Wein  LM. Detecting bioterror attacks by screening blood donors: a best-case analysis. Emerg Infect Dis. 2003;9:90914.PubMedGoogle Scholar
  2. Anderson  RM, May  RM. Infectious diseases of humans: dynamics and control. New York: Oxford University Press;1991.

Top

Figure

Top

Cite This Article

DOI: 10.3201/eid1008.031044

Related Links

Top

In Reply: As stated and argued throughout our article (1), we conducted a best-case analysis under assumptions that favored blood-donor screening to detect bioterror attacks; if such an analysis fails to justify donor screening, no analysis will. Bicout is concerned about our assumption of exponential infection growth after attack, however, this assumption was one of several we made deliberately as part of our best-case scenario (1).

Bicout’s calculations actually reinforce rather than refute our analysis. By relaxing our assumption of exponential infection growth and using the well-known logistic solution to the basic epidemic model (equation 1 in Bicout’s letter), Bicout shows that more time is required to detect a bioterror attack than when exponential infection growth is assumed (Figure accompanying Bicout’s letter). The number of persons infected over time under the logistic model will be fewer than the number of persons infected if exponential growth is assumed; therefore, screening blood donors to detect a bioterror attack is even less attractive than using our best-case assumptions. The take-home message from our article was and is: It makes little sense to screen blood donors to detect a bioterror attack.

Author affiliations: *Yale School of Management, New Haven, CT, USA; †Stanford University, Stanford, CA, USA

References

  1. Kaplan  EH, Patton  CA, FitzGerald  WP, Wein  LM. Detecting bioterror attacks by screening blood donors: a best-case analysis. Emerg Infect Dis. 2003;9:90914.PubMedGoogle Scholar

Table of Contents – Volume 10, Number 8—August 2004

EID Search Options
presentation_01 Advanced Article Search – Search articles by author and/or keyword.
presentation_01 Articles by Country Search – Search articles by the topic country.
presentation_01 Article Type Search – Search articles by article type and issue.

Top

Comments

Please use the form below to submit correspondence to the authors or contact them at the following address:

Edward H. Kaplan, Yale School of Management, 135 Prospect Street, New Haven, CT 06511-3729, USA; fax: 203-432-9995

Send To

10000 character(s) remaining.

Top

Page created: June 14, 2011
Page updated: June 14, 2011
Page reviewed: June 14, 2011
The conclusions, findings, and opinions expressed by authors contributing to this journal do not necessarily reflect the official position of the U.S. Department of Health and Human Services, the Public Health Service, the Centers for Disease Control and Prevention, or the authors' affiliated institutions. Use of trade names is for identification only and does not imply endorsement by any of the groups named above.
file_external