107th Congress
2nd Session COMMITTEE PRINT S. Prt.
107-61
_______________________________________________________________________
TECHNOLOGY ASSESSMENT
IN THE WAR ON TERRORISM
AND HOMELAND SECURITY:
THE ROLE OF OTA
__________
R E P O R T
PREPARED AT THE REQUEST OF
HON. ERNEST F. HOLLINGS, Chairman
FOR THE
COMMITTEE ON COMMERCE,
SCIENCE, AND TRANSPORTATION
UNITED STATES SENATE
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13
APRIL 2002
Printed for the use of the Committee on Commerce, Science,
and Transportation
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON : 2002
____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512-1800
Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001
COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION
ERNEST F. HOLLINGS, South Carolina, Chairman
DANIEL K. INOUYE, Hawaii JOHN McCAIN, Arizona
JOHN D. ROCKEFELLER IV, West TED STEVENS, Alaska
Virginia CONRAD BURNS, Montana
JOHN F. KERRY, Massachusetts TRENT LOTT, Mississippi
JOHN B. BREAUX, Louisiana KAY BAILEY HUTCHISON, Texas
BYRON L. DORGAN, North Dakota OLYMPIA J. SNOWE, Maine
RON WYDEN, Oregon SAM BROWNBACK, Kansas
MAX CLELAND, Georgia GORDON SMITH, Oregon
BARBARA BOXER, California PETER G. FITZGERALD, Illinois
JOHN EDWARDS, North Carolina JOHN ENSIGN, Nevada
JEAN CARNAHAN, Missouri GEORGE ALLEN, Virginia
BILL NELSON, Florida
Kevin D. Kayes, Democratic Staff Director
Moses Boyd, Democratic Chief Counsel
Jeanne Bumpus, Republican Staff Director and General Counsel
C O N T E N T S
__________
Page
Letter of Transmittal............................................ v
Letter of Submittal.............................................. vii
Preface.......................................................... 1
Executive Summary................................................ 2
Findings..................................................... 2
Conclusion................................................... 2
Recommendation............................................... 2
Rationale.................................................... 3
Terrorist Technology Threats............................. 3
Precluding or Deterring Terrorist Acts................... 3
Detecting Terrorist Acts When They Occur................. 4
Coping with the Consequences of Terrorist Acts........... 4
Technological Choice..................................... 5
Technology Assessment.................................... 6
OTA's Structure and Pattern of Operations................ 7
OTA: 1993-1995........................................... 8
Current Situation........................................ 8
Technology Assessment in the War on Terrorism and Homeland
Security: The Role of OTA.................................. 10
Terrorist Technology Threats............................. 10
Precluding or Deterring Terrorist Acts................... 12
Detecting Terrorist Acts When They Occur................. 15
Coping with the Consequences of Terrorist Attacks........ 17
Technological Choice..................................... 20
Technology Assessment.................................... 23
OTA's Unique Role and History............................ 24
OTA's Structure and Pattern of Operations................ 26
OTA's Credibility, Objectivity, and Relevance............ 28
The Relative Roles of OTA, CRS, and GAO.................. 29
OTA After Gibbons: 1993-1995............................. 30
Findings................................................. 32
Conclusion................................................... 33
Recommendations.............................................. 34
Notes........................................................ 36
LETTER OF TRANSMITTAL
----------
U.S. Senate,
Committee on Commerce, Science, and Transportation,
Washington, DC, April 11, 2002.
Dear Colleague: Technology is crucial to our conduct of the
War on Terrorism and to the success of our homeland security
programs. The Committee on Commerce, Science, and
Transportation is deeply engaged in evaluating policies and
programs involving the role of technology in enhancing homeland
security in the areas of communications, airlines and airports,
seaports, railroads, trucking, transportation of hazardous
materials, manufacturing facilities, and science and technology
in general. In conducting these evaluations, the Committee is
concerned not only with the effectiveness and costs of the
technologies, but also with their impact on U.S. industries and
consumers, and the privacy rights of individual citizens.
To aid the Committee in its consideration of these matters,
I have requested that a study conducted by Mr. Ellis R. Mottur,
as a Public Policy Scholar at the Woodrow Wilson International
Center for Scholars, be made available to the Committee. Mr.
Mottur earlier served as the first Assistant Director of the
Congressional Office of Technology Assessment and more recently
as Acting Assistant Secretary of Commerce and Deputy Assistant
Secretary for Transportation and Technology Industries.
This document contains the report prepared by Mr. Mottur,
entitled: "Technology Assessment in the War on Terrorism and
Homeland Security: The Role of OTA." Although the report has
not been considered or endorsed by the Committee or any of its
members, I believe it will be of interest to the Congress and
many persons in the scientific, technical, academic, and
professional communities, as well as the general public. To
insure its general availability, I have directed that this
document be published as a Committee print.
Sincerely,
Ernest F. Hollings,
Chairman.
LETTER OF SUBMITTAL
----------
Woodrow Wilson International Center for
Scholars,
Washington, D.C., March 22, 2002.
Hon. Ernest F. Hollings, Chairman,
Committee on Commerce, Science, and Transportation,
U.S. Senate, Washington, D.C.
Dear Mr. Chairman: Thank you very much for your kind letter
expressing interest in my study at the Woodrow Wilson Center.
In response to your request, I am pleased to provide the
Commerce Committee with my report entitled: "Technology
Assessment in the War on Terrorism and Homeland Security: The
Role of OTA."
The report focuses on the utilization of technologies in
achieving homeland security, demonstrates the need for
technology assessment to evaluate those technologies, traces
the history of OTA, and concludes with a recommended course of
action. I hope the report proves useful to the Committee.
With best personal wishes.
Sincerely,
Ellis R. Mottur,
Public Policy Scholar.
Enclosure
PREFACE
----------
In the months since September 11, it has become abundantly
clear that America's unparalleled superiority in technology is
critical to achieving success in the War on Terrorism and
ensuring homeland security. Accordingly, the choices the United
States makes with respect to the implementation of particular
technologies will continue to be of paramount importance to the
course of that struggle for years to come.
Those choices are exceedingly complex, involving
assessments of effectiveness, costs, benefits, and impacts on
the economy, environment, society, and human values, as well as
comparisons with alternative technologies. Technology
assessment is the methodology for making such choices.
As one of the founders of the congressional Office of
Technology Assessment (OTA), and its first Assistant Director,
I was well acquainted with that methodology and its application
within the congressional context. Accordingly, in order to
contribute to the national response to this unprecedented
challenge, I joined the Woodrow Wilson Center as a Public
Policy Scholar to conduct a study on technologies in the War on
Terrorism and homeland security, with a focus on the potential
role of OTA. The initial result is this report, which I hope
proves useful in helping empower Congress to fulfill its
legislative, appropriation, and oversight responsibilities in
this overarching conflict.
I want to take this opportunity to express my gratitude to
the Woodrow Wilson International Center for Scholars and
especially to Michael Van Dusen, Samuel F. Wells, Jr., Kent H.
Hughes, and Robert S. Litwak for making this project possible,
to all of the Scholars at the Center for their stimulating
intellectual discussions, to my intern, Jonathan Radke, for his
valuable assistance, and above all to Lee H. Hamilton whose
far-sighted, inspired leadership of the Center makes it as
great a pleasure as it is a privilege to be a part of it.
Of course, the statements, views, and recommendations
expressed in this report are solely the responsibility of the
author and are not in any way intended to reflect those of the
Woodrow Wilson Center, its management, staff, or other
scholars.
EXECUTIVE SUMMARY
----------
FINDINGS
Technology is critical to U.S. success in the War on
Terrorism and ensuring homeland security.
A wide variety of sophisticated technologies may be
involved in those efforts.
Choosing among possible technologies and patterns of
implementation is a complex process, oftentimes
involving unintended consequences.
Technology Assessment is the methodology for making
such choices.
The leading exemplar of technology assessment was
the congressional Office of Technology Assessment
(OTA), founded in 1972.
For almost a quarter of a century, OTA provided
Congress with valuable analyses of policy options on
important issues involving technology.
During that period OTA achieved a world-wide
reputation for excellence, as a non-partisan,
objective, and credible conductor of technology
assessments.
When OTA's funding was discontinued in 1995, there
was no dissatisfaction with its performance; indeed OTA
received accolades for its excellent work.
Elimination of its funding was a cost-cutting
measure at a time of fiscal stringency and a symbol for
Executive Branch agencies to emulate.
Congress now needs its own source of non-partisan,
objective technology assessment in order to fulfill its
legislative, appropriation, and oversight
responsibilities in the War on Terrorism and ensuring
homeland security.
While OTA's funding was discontinued, its enabling
statute remains in effect, including its authorization
of "such sums as may be necessary."
CONCLUSION
To fulfill its constitutional responsibilities in pursuing
the War on Terrorism and ensuring homeland security, Congress
urgently needs to reactivate OTA.
RECOMMENDATION
In the first supplemental appropriation bill considered in
this session, Congress should include $1 million for OTA to
canvass and consult with congressional committees, and plan a
series of technology assessments designed to meet the priority
needs of those committees with respect to the War on Terrorism
and homeland
security.
RATIONALE
In the War on Terrorism, America's principal advantage is
its unparalleled technological superiority--measured not only
in highly sophisticated hardware and software--but also in the
competence and character of its citizens in controlling that
technology. This is true not only in dealing with the war, but
just as importantly, in ensuring homeland security.
Terrorist Technology Threats
Each terrorist threat or act can be characterized by the
specific technology utilized, by its means of delivery, and by
its intended target. The diversity of technologies involved is
enormous. There are 36 deadly biological agents, including 13
viruses, 7 bacteria, 3 micro-organisms with traits common to
both bacteria and viruses, 1 fungus, and 12 biological toxins.
Cyber-terrorists can hack into information systems, deny
service to others by overwhelming sites with bogus requests,
and spread computer viruses or worms. Chemical agents encompass
nerve gases, cyanides, phosgene, and vesicants. Explosives run
the gamut from nuclear fission, fusion, or dirty nuclear bombs
through plastic explosives, nitrogen-based varieties, to pipe
bombs, or simple hand grenades.
Similarly there are a great variety of means whereby
terrorists can deliver their agents of destruction or
disruption, including mail, modems, missiles, aircraft, ships,
trains, trucks, autos, on foot, or by remote detonation. And
their targets are equally varied, including: transportation and
telecommunications systems; air, water and food supplies;
energy sources and distribution channels; financial and
computer networks; factories; key buildings; population groups;
and prominent individuals.
But surpassing the extensive array of technologies,
transmissions, and targets available to terrorists is the wide
range of countervailing technologies we can deploy to deal with
their threats or attacks. These fall into 3 categories, those
aimed at: (1) precluding or deterring the terrorist act; (2)
detecting it when it occurs; and (3) coping with its
consequences.
Precluding or Deterring Terrorist Acts
The overarching campaign in this category consists of the
current and projected military actions, along with the
coordinated diplomatic, intelligence, public safety, and
financial efforts to thwart terrorism wherever it lurks. On the
homeland security front, there are a wide variety of
technological systems under consideration. A number of these
involve the enhanced coordination of more sophisticated,
computerized information systems to track and apprehend
terrorists before the deed is done. Most of the other
technological systems directed at preventing terrorist acts are
aimed at either or both of 2 goals: (a) to maintain boundaries
which only authorized individuals can traverse; and (b) to
ascertain whether the identities of specific individuals or
entities meet the authorization criteria. The role of
technology in maintaining boundaries lies essentially in
electronic barriers, surveillance sensors, video cameras,
alarms, and communications systems.
Identification technologies to confirm authorization to
traverse boundaries include those aimed at screening things and
those designed to verify persons' identities. Since
conventional x-ray screening of baggage is not very effective
for moderately sophisticated explosive devices, a number of
more advanced systems are being investigated, such as pulsed
fast-neutron transmission spectroscopy. An example of a
technology for screening things that may be carried by persons
is a holographic imaging system that can see objects hidden
under clothing. A host of new technologies are being studied
for verifying individuals' identities, including sophisticated
biometric identification techniques, such as facial pattern
recognition and iris or retina scanning systems.
Detecting Terrorist Acts When They Occur
If the terrorist act involves an explosion or shooting,
witnesses are immediately aware that something terrible has
transpired; but if the act involves cyber-terrorism or chemical
or biological agents, there may be a considerable time lag
before the act is discovered. If cyber-terrorists disrupt major
electric power or communications systems, the act would be
readily recognized; but when cyber-terrorists introduce
computer worms or viruses into information systems, crucial
time may elapse before the deed is discovered. Detection of
chemical or biological agents is even more challenging. An
example of a detection technology under development is a
portable isotopic neutron spectroscopy chemical assay system
that can identify nerve gases or explosives. Detection of
biological agents is most difficult since the effect on the
exposed individuals may not become apparent for a considerable
period--by which time it may be too late to counteract the
agent. An example of a technology being considered for
detecting 8 different biohazards (including anthrax spores) is
Polymerase Chain Reaction of PCR which uses specific enzymes to
amplify tiny quantities of DNA to match them with DNA samples
of the biological agent.
Coping with the Consequences of Terrorist Acts
After a terrorist act has been detected, it is imperative
that its nature and extent be rapidly comprehended so that
appropriate countermeasures can be undertaken. But it is
sometimes difficult quickly to ascertain the character of
chemical agents utilized in an attack; and biological weapons
are especially troublesome in confounding rapid comprehension
of what has transpired, as was evidenced in last fall's anthrax
attacks. To facilitate more rapid comprehension, there's a need
for a greatly improved communications network. This is
underscored by the fact that the Centers for Disease Control
(CDC) were not aware of May 2001 Canadian studies that
confirmed the threat of spreading anthrax through the mail,
even though 6 other U.S. agencies were cognizant of the
studies. CDC did not learn of the studies until early November
when the anthrax outbreak was almost over. Examples of
technologies for coping with chemical attacks are the Antidote-
Treatment-Nerve-Gas-Agent Auto-injector, a pen-like device to
administer both types of anti-nerve-gas antidotes, and Sandia
National Laboratory's development of a nontoxic, non-corrosive
foam to neutralize chemical agents. Examples with respect to
biological agents include an advanced, hand-held nucleic acid-
analyzer to identify biological agents in the field within a
matter of minutes and the use of irradiation of mail to destroy
bacteria or spores. The administration's budget includes $6
billion for combating bioterrorism, including a substantial
amount for research and development of such technologies.
Technological Choice
Choosing among the vast array of technological options for
homeland security is a complex process. Sometimes there are
inadequate data; other times the underlying science is not
fully understood. But even when the scientific basis and data
are available, there remains the so-called `Law of Unintended
Consequences,' which refers to the fact that many technologies
engender ancillary, unexpected consequences that are difficult
to foresee and sometimes detrimental in their impacts.
The most obvious example from the past is the use of the
internal combustion engine for vehicles. While this innovation
served as one of the prime movers of 20th century economic
expansion, its long-term effects on the environment have been
deleterious because of air pollution and the possibility of
global warming. Another example is the use of
chlorofluorocarbons for refrigeration and air conditioning.
Along with the very beneficial effects of this innovation has
come the diminution of the ozone layer, which serves to block
the sun's rays and prevent skin cancer.
The point of these past examples is not that we should have
refrained from utilizing the internal combustion engine for
vehicles or Freon for cooling, both of which have bestowed
substantial benefits on our standard of living. But if we had
anticipated their ancillary, adverse consequences earlier, we
might have been able to structure their implementation in such
a way as to mitigate those unintended consequences and to
design research and development programs aimed at alternative
or supplemental means of achieving the same ends.
Technologies considered for homeland security have already
exhibited some unintended consequences. The irradiation of mail
damages computer chips, film, food, pharmaceuticals, contact
lens, etc. Moreover, the process appears to have caused illness
in some mail handlers because the irradiation heats the plastic
warp used to protect the mail, thereby releasing noxious fumes.
A potential problem arises with retinal scanning for
identification purposes because of possible adverse health
effects from the infrared light used to scan the retina and the
threat of infection because of contact with the equipment. With
respect to on-flight security, it appears that Tasers, a kind
of stun gun, might interfere with the plane's operational
instruments. A broader case of unintended consequences involves
the impact on personal privacy from the more intrusive use of
surveillance cameras and the integration of data bases
containing background information on individuals. Similarly the
wider use of antibiotics, like Cipro, could trigger greater
resistance as bacteria adapt to them. The planned computerized,
surveillance system of foreign students has also engendered
considerable opposition from the colleges and universities that
fear the loss of their tuition--another unintended consequence.
The lesson from all this is that technologies often have
unintended, ancillary consequences which--to the extent
feasible--should be anticipated and taken into account in
selecting among alternative technological solutions and
structuring their implementation. The point is not that any
particular technology is inherently good or bad, but rather
that its relative benefits and detriments depend partially on
its ancillary consequences, as well as on the uses to which it
is put and the way in which it is implemented.
Technology Assessment
The analysis, comparison, and selection of technologies is
a complex process, involving the following components:
determining the technical capabilities of the
technology;
evaluating its effectiveness in achieving its
primary objectives;
ascertaining its costs;
delineating the benefits it confers;
anticipating its ancillary consequences, both
positive and negative;
discerning its probable impact on the economy,
environment, society, and individual values;
comparing the technology with alternatives in terms
of all the foregoing factors; and
delineating the advantages and disadvantages--the
pros
and cons--for the various policy options confronting
decision
makers.
Technology assessment is the methodology for conducting
such analyses. Incorporating elements of operations research,
systems analysis, cost-benefit studies, game theory, linear
programming, simulation studies, and alternative-futures
scenarios--along with pragmatic public policy considerations--
technology assessment emerged as a distinct field of academic
research in the mid-1960s. After 5 years of extensive hearings
before the House Science and Astronautics Committee, and
subsequent consideration by the Senate Rules Committee, the
Technology Assessment Act of 1972 was signed into law on
October 13, 1972, thereby establishing OTA as only the third
support agency of Congress in the history of the Republic. (The
Congressional Budget Office (CBO) was not created until 1974.)
During the legislative consideration of creating OTA, a
great deal of attention was focused on why Congress needed a
new agency, rather than relying on CRS and GAO. It was the
overwhelming judgment of the academic, scientific, technical,
and public policy communities that neither CRS nor GAO was
capable of carrying out the technology assessments required by
Congress, a view in which the Director of CRS, the Librarian of
Congress, and the Comptroller General all concurred.
OTA went through its formative stages, guided by its
Founding Director, former Congressman Emilio Q. Daddario. OTA
later achieved maturity under the leadership of Director John
Gibbons, who served about 15 years from 1979 to 1993. He built
the credibility of the Office within Congress and throughout
the nation's academic, scientific, technical, and professional
communities. Indeed, OTA was recognized worldwide as the top
institution of its kind, with many countries creating their own
comparable organizations, modeled on OTA, including Austria,
Denmark, the European Union, France, Germany, Great Britain,
the Netherlands, and Sweden. While OTA products had a pervasive
impact on congressional activities during the Gibbons Era, and
the Office received many accolades and awards, its impact was
best summed up by an article in the Federal Times, which
stated: "[I]n a town where unimpeachable sources are oh-so-
hard to come by, OTA has managed to secure a position near the
top of the list." \1\
OTA's Structure and Pattern of Operations
OTA consists of a congressional Technology Assessment Board
(TAB), a Director and his staff, and an Advisory Council. TAB
consists of 6 Senators and 6 House members, evenly split
between the 2 parties. The 10 public members of the Advisory
Council are appointed by TAB and are joined on the Council by 2
ex officio members, the Comptroller General and the Director of
CRS. TAB appoints the Director, who then appoints the office
staff. The TAB Chairmanship rotates between Senate and House in
different congresses. Traditionally the Chairman comes from the
majority party in his House and the Vice Chairman from the
opposite party in the other House. Assessments are undertaken
at the request of congressional committees, not in response to
individual members as is the case with CRS and GAO.
For each assessment undertaken, OTA convenes an advisory
panel made up of experts, stakeholders, and citizens relevant
to the particular assessment. These advisory panels play a key
role in the design of the assessment, in the analysis of the
data that has been assembled, and in reviewing the final
report, which is also examined by a number of other outside
reviewers who bring special expertise and points of view to the
assessment. Over time OTA came to draw upon a pool of about
1,000 panelists and outside reviewers.
The overall assessment process embodies a series of checks
and balances that confer credibility, objectivity, and
relevance on the final report. Some of the most important
checks and balances are the:
even balance between House and Senate and the 2
parties on TAB;
tradition of the Chair and Vice Chair from opposite
parties;
need for TAB approval to initiate assessments and
release
reports;
Advisory Council's salutary influence on OTA's
standards of excellence;
advisory panel's role in design, analysis, and
review of assessment;
role of stakeholders and additional outside
reviewers;
preparation of Review Memorandum which describes
reactions of panelists and reviewers to each portion of
report and shows how final version takes account of
those comments; and
the pattern of continuing, informal communication
between OTA and committee staff before, during, and as
follow-up to the assessment.
With this understanding of the OTA process, it becomes
clear why neither CRS nor GAO could effectively carry it out.
Neither one operates under the close control of a congressional
board; neither one responds only to requests from committees;
and neither one has the statutory authority or institutional
capability to integrate the expertise and views of 1,000
outside advisers into assessments.
Examples of some OTA reports particularly relevant to the
War on Terrorism and homeland security include:
The Border War on Drugs
Electronic Surveillance in a Digital Age
High Level Radioactive Waste Site Characterization
Impacts of Antibiotic-Resistant Bacteria
New Developments in Biotechnology
Scientific Validity of Polygraph Testing
Taggants in Explosives
Technology Transfer to China
Technology and Counter Terrorism
Transportation of Hazardous Materials
Virtual Reality and Technologies for Combat
Simulation
Technologies Underlying Weapons of Mass Destruction
OTA: 1993-1995
After about 15 years of outstanding service, Gibbons
resigned as OTA Director in early 1993 to join the new
administration. He was succeeded by Dr. Roger C. Herdman who
had been serving as Assistant OTA Director with responsibility
for Health and Life Sciences.
In 1995, however, there was a sea change in control of
Congress. The new leadership was intent on eliminating a number
of cabinet departments and on reducing the costs of government,
including within the Legislative Branch. The likeliest target
for reduction within Congress was one of the support agencies,
CBO, CRS, GAO, and OTA. Of these, OTA was the smallest and most
vulnerable. Accordingly, in order to save money, the House
Appropriations Committee recommended elimination of all funding
for OTA. This was strenuously opposed by many members--
including all TAB members in the House--but the leadership
prevailed. In the Senate the committee proposed a small amount
for OTA, but only enough to enable it to close down its
operations in an orderly manner. Again there was a strong
effort to provide adequate funding, led by all Senators who
have served on TAB. But again the majority voted it down and
OTA ceased operations at the end of FY 1995.
Current Situation
As noted in the Findings, while OTA's funding was
discontinued, its enabling statute remains in effect, including
its authorization of "such sums as may be necessary."
Moreover, since the Senate is a continuing body and the act
does not limit the tenure of its members, the Senators who were
Board members in 1995--Senators Grassley, Hatch, Hollings, and
Kennedy--are still Board members. Since the House is not a
continuing body, it could be argued that the current House
members who were on TAB in 1995--Representatives Dingell,
Houghton, McDermott, and Oxley--would not still be members. But
in any case, the act stipulates that: "Vacancies in the
membership of the Board shall not affect the power of the
remaining members to execute the functions of the Board." In
short, OTA has an ongoing authorization for appropriations, and
TAB is empowered to submit a recommendation to the
Appropriations Committees for such an appropriation.
To underscore the urgent necessity for reactivating OTA,
one example of OTA's potential impact on the War on Terrorism
and homeland security should suffice. The anthrax attacks last
fall engendered considerable confusion and consternation among
public health authorities, public safety officials, and policy
makers throughout federal, state, and local government. There
was great uncertainty on many matters, including the number of
spores necessary to trigger inhalation anthrax in humans; but
it was widely believed that 8,000-10,000 spores would be needed
to cause inhalation or pulmonary anthrax. If OTA had been
operational at the time, it could have brought a highly
relevant 1993 OTA report to the attention of the public health
authorities. The report entitled Technologies Underlying
Weapons of Mass Destruction stated: "1,000 spores or less can
produce fatal pulmonary anthrax in some members of an exposed
population." \2\ If this information had been readily
available, it's conceivable that it even could have saved a
life or--at the very least--afforded much better guidance to
the public health authorities in designing their response to
the crisis.
It is clear that Congress urgently needs to reactivate OTA,
and that to do so, all that is required is inclusion of $1
million in the next supplemental appropriation. Considering
that this $1 million would reactivate an Office that could aid
Congress in evaluating the $38 billion the President has
recently requested for homeland security, the $1 million amount
does not seem unreasonable.
* * * * *
TECHNOLOGY ASSESSMENT IN THE WAR ON TERRORISM AND HOMELAND SECURITY:
THE ROLE OF OTA
In the War on Terrorism, America's principal advantage is
its unparalleled technological superiority--measured not only
in highly sophisticated hardware and software--but also in the
competence and character of its citizens in controlling that
technology. The military action in Afghanistan was a striking
demonstration of those assets.
Eight thousand mile bombing runs from the continental
United States, tactical aircraft sorties from carriers in the
Persian Gulf or Arabian Sea, targeting by satellites and
Predator drone planes, real-time information displays, GPS-
guided smart bombs--along with night vision and special forces
providing laser guidance on the ground--enabled precision
bombing that could penetrate cave entrances horizontally and
explode underground with greater devastation than hundreds of
dumb bombs in World War II or Vietnam.
In short, the awesome enhancement of our military
capabilities through technology is apparent to all who tune in
to CNN. But perhaps not as overtly obvious, yet promising to be
as powerful and pervasive is the potential impact of technology
on homeland security. This potential impact flows both from the
technology utilized by the terrorists and from the technology
we need to employ to deal with their threats.
Terrorist Technology Threats
Each terrorist threat or act can be characterized by the
specific technology utilized, by its means of delivery, and by
its intended target. Thus the catastrophe of September 11
utilized jet fuel as an explosive, delivered by means of fully-
fueled, Boeing-757 and -767 aircraft, and directed at the World
Trade Center towers. The subsequent anthrax events utilized
highly refined, aerosolizable anthrax powder, delivered through
envelopes in the mail, and aimed at Senate and media personnel.
The ongoing bombings in Israel utilize plastic explosives,
delivered by suicidal individuals on foot or in vehicles, and
targeted at groups of innocent bystanders.
These current examples illustrate the diversity of
technologies, means of delivery, and targets that terrorists
may employ. The full range of possibilities is extremely wide.
Thus biological agents could include--besides anthrax--small
pox, plague, viral encephalitis, yellow fever, and Marburg
virus. Examples of other agents that could be introduced
through the food supply are botulism, salmonella, E. coli, and
cholera. In fact, "the Centers for Disease Control and
Prevention lists 36 classes of . . . potential weapons . . .
[including] 13 viruses, 7 bacteria, 3 rickettsiae (micro-
organisms that have traits common to both bacteria and
viruses), 1 fungus and 12 biological toxins." \3\
Cyber-terrorists utilize the internet, software, and their
extensive computer skills to hack into purportedly inaccessible
information systems, to deny service to others by overwhelming
sites with bogus requests, and to spread deleterious computer
viruses or worms. In contrast with weapons of mass destruction,
"cyber threats are considered weapons of mass disruption . . .
Computer security experts . . . have begun seeing evidence of
increasingly potent attacks by hackers . . . denial of service
attacks [are] becoming more common and more disruptive . . .
Attackers have also employed `worms' . . . aimed at routers,
which direct traffic throughout the internet . . . No computer
on the internet is immune from denial of service attacks." \4\
Chemical agents encompass: nerve agents like sarin, tabun,
soman, and VX gas; cyanides; phosgene; and vesicants such as
sulfur mustard gas. Explosives run the gamut from nuclear
fission or fusion bombs to dirty nuclear bombs (which disperse
radioactive materials without a chain reaction) to highly
energetic plastic explosives to nitrogen-based (nitramine)
varieties like nitroglycerine to pipe bombs or simple hand
grenades. Arson can be committed merely with a container of
gasoline and some matches. And of course, determined terrorists
can rely on simple weapons like automatic rifles, hand guns
or--as we saw on September 11--even small box cutters.
While not as diverse as the wide range of technologies
terrorists may employ, there are a number of means through
which they can deliver their agents of destruction or
disruption, including: mail; computer modems; missiles;
aircraft (from crop dusters to Boeing 767s); ships (from huge
tankers to small harbor craft); trains; trucks; automobiles;
bicycles; on foot; by a hand hurling a grenade; or by remote
detonation, which itself can be accomplished by a variety of
methods.
For example, in the "early 1970s, IRA [bombs in the UK
consisted of] . . . nails wrapped around a lump of plastic
explosive and detonated simply by lighting a fuse. . . .
[Their] time bombs . . . were . . . dynamite and commercial
detonators . . . attached to ordinary battery-powered alarm
clocks." Later on to avert danger to their agents, they began
detonating remotely "by using the radio controls for model
aircraft. The British Ministry of Defense (MoD) thwarted this
means of attack through electronic countermeasures and jamming
techniques." The IRA then developed a "network of
sophisticated electronic switches [to] bypass the . . .
countermeasures . . . [T]he MoD scientists . . . [then devised]
a new system of electronic scanners able to detect radio
emissions . . . before the bomber can actually transmit the
detonation signal." But the IRA subsequently developed "a
photo-flash `slave' unit that can be triggered from a distance
of up to 800 meters by a flash of light." \5\ So the various
technologies for detonating and thwarting detonation continue
to contend with each other.
The targets terrorists may attack are equally varied,
ranging from: telecommunication systems; computer networks;
water systems; \6\ food supplies; energy sources and
distribution systems (nuclear or coal power plants,
hydroelectric dams, natural gas pipelines, oil refineries,
etc.); transportation systems (roads, rail, subways, bridges,
tunnels, seaports); financial institutions and networks;
factories; key buildings; and concentrated populations or even
prominent individuals.
The vulnerability of the nation's electric power system,
for example, was underscored at a recent conference of industry
executives, at which it was revealed that: "The computers that
control the electric power system around the nation have been
probed from the Middle East, and terrorists may have inspected
the physical equipment . . . Government experts identified
nuclear power plants as perhaps the most attractive targets,
but said dams, gas pipelines and oil refineries were not far
behind." \7\
Surpassing the extensive array of technologies,
transmissions, and targets available to terrorists is the wide
range of countervailing technologies we can deploy to deal with
their threats or attacks. These countervailing technologies
fall into three categories, those aimed at: (1) precluding or
deterring the terrorist act; (2) detecting it when it occurs;
and (3) coping with its consequences. It is instructive to
examine illustrative examples of technologies in each of these
categories.
Precluding or Deterring Terrorist Acts
The best example in this category, of course, is the
current effort to root out and extirpate the Al Qaeda network,
cells of which are reputed to be festering in about 60
countries throughout the world. Accomplishing this goal would
surely go a long way toward precluding many terrorist attacks.
But as President Bush reiterated in his January 2002 State of
the Union speech, the War on Terrorism extends far beyond the
Al Qaeda network or the former Taliban government, as is
evidenced by the recent incursion of American special forces
into the Philippines and planned deployments into Yemen and the
Republic of Georgia. Furthermore, underscoring his oft-stated
warning that nations that harbor terrorists are equally
culpable, he specifically cited Iran, Iraq, and North Korea as
"seeking weapons of mass destruction," castigating them as
constituting "an axis of evil." \8\ Proceeding in parallel
with the military actions in Afghanistan and the Philippines
and the President's public exhortations, are the coordinated
diplomatic, intelligence, public safety, and financial efforts
to thwart terrorism wherever it lurks. Undoubtedly this
concerted campaign has already impeded previously plotted
terrorist events.
But as President Bush also noted in his State of the Union
address: "Thousands of dangerous killers . . . are now spread
throughout the world like ticking time bombs, set to go off
without warning." \9\ To intercept and prevent any of their
attempted terrorist acts from implementation, homeland security
measures may encompass a wide variety of technological systems.
Many of these technologies involve "the use of powerful
computers . . . [which] can spot linkages among [innumerable]
individual pieces of information . . . Germany pioneered the
use of computers in this field . . . Two apparently unrelated
individuals could be shown to be extremely likely to belong to
the same terrorist group by showing an overlap in the
information about them which was too complete to be
coincidental . . . The FBI has now refined and expanded upon
the capacities pioneered by the German police . . . [by
developing a computer system] designed to draw investigative
inferences from the organized examination of all the data that
the Justice Department and its component agencies are
collecting." \10\
Most of the other technological systems directed at
preventing terrorist acts are aimed at one or both of two
goals: (a) to maintain some kind of boundaries which only
authorized individuals or entities can traverse; and (b) to
ascertain whether the identities of specific individuals or
entities meet the authorization criteria.
The boundaries can be as wide as the U.S. seacoasts and
northern and southern border or as narrow as the walls of a
particular facility, building, or secure room within a
building. They can be the perimeters of nuclear, electrical, or
telecommunications facilities or the confines of a particular
airfield, airplane, seaport, ship, train station, train,
bridge, or tunnel. They can be secured through appropriate
configurations of powerful walls, fences, doors, electronic
barriers, surveillance sensors, video cameras, communication
systems, alarms, guards, and guard dogs. Current examples range
from the projected increase of customs agents and immigration
officials to be stationed at the Mexican and Canadian borders
and various airports and seaports to the National Guard troops
at nuclear power facilities to the reinforced cockpit doors on
aircraft.
With respect to border crossings, a number of technologies
are being explored. The Director of Homeland Security, Governor
Tom Ridge said: "experimental high-tech `fast lanes' for
frequent travelers, and inspecting cargo trucks and
electronically sealing them at locations away from the border
would . . . move the border into the 21st century . . .
[although] scanners to read the 5 million `laser'
identification cards issued to people who frequently cross the
border [still need to be installed] . . . The new laser IDs
include biometric features, such as fingerprints . . . The
other new technology under discussion includes more mobile x-
ray units, which resemble a drive-through car wash. A vehicle
crossing the border would drive through the apparatus and an
inspector could, for instance, detect false compartments used
to smuggle people or check sealed cargo." \11\
The role of technology in maintaining boundaries lies
essentially in electronic barriers, surveillance sensors, video
cameras, communication systems, and alarms. Some examples will
serve to illustrate the range of technologies involved. Thus
alarm systems are generally based on hard-wire lines,
microwave, radio frequency, or cellular transmission
technologies.\12\ When available, fiber optics may replace
copper hard-wire lines, since fiber optics provides longer
distance transmission and freedom from electromagnetic or radio
frequency interference.\13\ Because of the heightened emphasis
on anti-terrorism activities since September 11th, many efforts
are underway to develop more sophisticated surveillance
systems. A good example is the software that has been developed
by NetTalon Security Systems, Inc. of Fredericksburg, Virginia.
This software enables real-time, simultaneous transmission to
and from an aircraft and the ground for a host of video, sound,
and sensor information (e.g., motion or vapor detection,
changes in pressure or temperature, etc). As a result, the
ground station could instantaneously trigger response
mechanisms like aiming a Taser stun gun or releasing pepper
spray at a precise target.\14\
Identification technologies to confirm authorization to
traverse boundaries fall into two classes: those aimed at
screening things and those designed to verify persons'
identities. In both cases there are a multitude of technologies
entering into practice, under consideration, or still in
research and development. Illustrative of these is the wide
range of devices under consideration for baggage screening at
airports. Conventional x-ray screening of baggage is not very
effective at locating moderately sophisticated explosive
devices.\15\ Other technologies that have been studied for this
purpose include: thermal neutron activation (TNA); automated
neutron-source accelerator; elastic neutron scattering; pulsed
fast-neutron transmission spectroscopy (PFNTS); photon
activation; nuclear resonant absorption (NRA); fast-neutron
associated particle (FNAP); dual energy x-ray systems;
backscatter x-ray; coherent x-ray scattering; and dual energy
x-ray computed tomography (CT).\16\
Numerous other technologies are being developed for
screening things that may be carried by persons. For example,
the Pacific Northwest National Laboratory (pNNL) in Washington
State has developed a hand-held "device that uses ultrasonic
waves to see inside of sealed containers, a holographic imaging
system that can see objects hidden under clothing, and a
polymer that detects nerve agents." \17\ The Federal Aviation
Agency (FAA) is "developing . . . electromagnetic devices for
screening bottles and other containers . . . [for] detecting
liquid explosives." Other devices, known as trace detectors,
have been manufactured for "detect[ing] the residue or vapor
from explosives on the exterior of carry-on bags and on
electronic items, such as computers or radios," or even on
shoes. Other trace detectors under development screen items
handled by persons to detect residue or vapor from explosives
on the persons' hands. Also in development are walk-through
screening portals that can: "detect particles and vapor from
explosives on passengers' clothing or in the air surrounding
their bodies." \18\
There is also a wide array of technologies being considered
for verifying individuals' identities and authorization to
traverse boundaries. Some of these are as simple as the use of
wireless devices with software developed by Aether Systems,
Inc. of Maryland whereby airport security personnel can
instantaneously check electronic records to identify
passengers, airport employees, and vehicles.\19\ Others include
the more extensive use of photo IDs and smart cards (with
embedded computer chips), encryption for electronic
communications, and increasingly sophisticated biometric
identification techniques. One biometric system utilizes
passive and active imaging technologies, which "can see
through clothes and produce an image of the human body
underneath . . . In passive screening, the natural radiation
emitted by the human body is detected and analyzed . . . Active
imaging entails irradiating the body with x-rays or millimeter
waves and analyzing the radiation scattered from the body . . .
[M]etallic weapons or explosive materials . . . will appear
different from [the body]." \20\
Generally, biometrics refers to a set of technologies that
utilize human characteristics or behavioral traits to identify
particular individuals. These include: fingerprinting, finger
patterns, palm prints, hand geometry, hand topography, hand and
wrist vein patterns, facial pattern recognition, voice
recognition, signature or handwriting analysis, key stroke
dynamics, and iris or retina scanning. An example that employs
facial pattern recognition is the FaceIT technology
manufactured by a New Jersey company, Visionics. This system
generates ID codes "based on 80 unique aspects of
[individuals] facial structures, like the width of the nose and
the location of the temples. FaceIT can instantly compare an
image of any individual's face with a database of the faces of
suspected terrorists." \21\ Iris scanning systems are based on
the fact that not only are everyone's irises--even those of
identical twins--different, but also that each individual's two
irises are different from each other. Software has been
developed that enables scanning and database comparison of
irises to take place within a few seconds.\22\
Detecting Terrorist Acts When They Occur
When efforts to prevent or deter terrorism fail and a
terrorist act occurs, it is not always immediately obvious what
has happened. If the terrorist act involves an explosion or
shooting, witnesses are immediately aware that something
terrible has transpired; but if the act involves cyber-
terrorism or biological or chemical agents, there may be a
considerable time lag before the act is discovered. Our
increasingly interdependent, technologically complex society is
highly vulnerable to the disruptive effects of cyber-terrorism.
If such acts were to penetrate and disrupt the FAA flight
control system, or power grids, or major communication systems,
they would undoubtedly be readily recognized. It also would be
obvious if the method of disruption consisted of, "flooding
[an information] system with false requests for service [so
that it was] impossible to respond to legitimate requests"--as
happened with Yahoo in the year 2000.\23\ But if the hackers or
cyber-terrorists cleverly introduce computer worms or viruses
into information systems--as is occurring with increasing
frequency \24\--prompt detection of the act poses a constant
challenge to the ingenuity of our software designers and the
vigilance of our system operators.
Detecting the introduction of chemical or biological agents
is perhaps even more challenging. One of the most widely
reported acts of chemical terrorism occurred on March 20, 1995,
when "the nerve gas sarin was released in commuter trains on
three different Tokyo subway lines by a terrorist cult group.
Sarin was concealed in lunch boxes and soft-drink containers
and . . . released as terrorists punctured the containers with
umbrellas before leaving the trains. Over 5,500 were injured,"
11 of whom died. Since there was no detection capability within
the train system and since sarin is colorless and odorless,
detection occurred only after sick patients flooded the area
hospitals.\25\
To provide rapid detection for such events in the future,
U.S. scientists from Argonne, Sandia, and Lawrence Livermore
national laboratories "have been developing and experimenting
with chemical sensors in two downtown [Washington] Metro
stations . . . [They have] studied how air moves through the
subway and how trains, heat and humidity affect air flow . . .
how chemicals spread . . . [and how they] can be released
through air exhaust systems into the streets above . . . They
can detect the presence of a harmful chemical, such as sarin
gas, [but] cannot yet detect biological agents, such as
anthrax." \26\ Other detection technologies under development
at the national laboratories include: "a cyanide microsensor,
[a] portable isotopic neutron spectroscopy chemical assay
system that can identify nerve agents, compressed gases, or
explosives inside artillery shells or bombs [and] . . . a
`laboratory on a chip' that can identify . . . all . . . known
chemical warfare agents in under 30 seconds." \27\
Detection of biological agents is generally more difficult
because the effect of the biological agent on the exposed
individuals frequently does not become obvious until quite some
time has elapsed; and oftentimes it is then too late to
counteract the harmful agent. So it's imperative that effective
detection technologies are developed and made widely available
throughout the U.S. public health system.
Biological agents can be delivered through the air, the
water, the food supply, or--as we recently witnessed--through
the mail system. Since detecting biological agents in the mail
poses extremely daunting problems, high security targets--like
the Congress and key government agencies--are beginning to
irradiate all such mail in an effort to kill any biological
organisms that may be present.
The U.S. Postal Service recently announced its exploration
of an even more sophisticated technology that could "detect
eight biohazards, including anthrax spores." Termed PCR (for
polymerase chain reaction)--although sometimes referred to as
`molecular photo-
copying'--the technology would take air samples every half-hour
from mail passing through high-speed postal sorters and test
the samples for the specific signatures of particular bacteria
like anthrax. "PCR is a general term for a process that uses
specific enzymes to amplify tiny quantities of DNA and make a
DNA match." \28\
With respect to food, the current system for detecting
contaminants is similar to searching for a needle in a
haystack. The paucity of resources that have been devoted to
this effort is thinly spread among the Departments of
Agriculture, Commerce, and Defense, the Food and Drug
Administration, and the Environmental Protection Agency.
Inspections are infrequent and some items--e.g., fish that goes
from the boat directly to a wholesaler or retailer--are not
inspected at all. Moreover, "the Centers for Disease Control
and Prevention catches [sic] only a small percentage of food-
borne outbreaks because state reporting is voluntary and
inconsistent." In 1984 when "members of a religious commune
in Oregon contaminated 10 salad bars with salmonella
[sickening] 151 people . . . it took a year to link the
outbreak to the commune." \29\
With respect to biological agents in general, "because the
time lag between exposure to a pathogen and the onset of
symptoms may be days or weeks, effective response to a covert
terrorist action will be critically dependent upon (a) the
ability of individual clinicians, perhaps widely scattered
around a large metropolitan area, to identify and accurately
diagnose an uncommon disease and (b) a surveillance system for
collecting reports of such cases that is actively monitored to
catch disease outbreaks as they arise." \30\
One such surveillance system is the Pittsburgh "Real Time
Outbreak and Disease Surveillance System [which] tracks
patients by zip code, looking for spikes that often signal an
upcoming wave of illness. For example, a jump in fever and
respiratory illness in one neighborhood could tip off medical
detectives that an anthrax outbreak has occurred." \31\
Unfortunately, the nation's public health system is
woefully unprepared to deal effectively with bioterrorism.
"Vast numbers of the nation's private doctors are uninformed
about how to recognize, treat and report casualties of a
biological attack." \32\ "Half of all U.S. states [lack] even
a single `disease detective' to investigate outbreaks . . . Ten
percent of the nation's 120 largest city and county health
departments [do] not have e-mail." \33\ While "some
serological, immunological, and nucleic acid assays are
available for identifying . . . biological agents, . . .
[since] laboratories do not perform these assays regularly . .
. it therefore seems unlikely that many labs will be
immediately prepared to conduct the specific analytical test
needed . . . even when the attending physician is astute enough
to ask for the appropriate test." \34\ To begin to remedy
these deficiencies in the nation's public health system, the
President's recent budget calls for an increase in overall
funding for combating bioterrorism to $5.9 billion, including
"$1.2 billion to improve the ability of state and local health
systems to respond to bioterrorism attacks." \35\
Coping with the Consequences of Terrorist Attacks
After a terrorist act has been detected, it is imperative
that its nature and extent be rapidly comprehended so that
appropriate countermeasures can be undertaken. Even with a
simple explosive or shooting attack, one has to determine the
number of fatalities and the nature and extent of the injuries.
In the case of arson, one has to know the extent and nature of
the fire to know where to deploy the firefighters and what type
of extinguishers to employ. It is sometimes difficult quickly
to ascertain the character of chemical agents utilized in an
attack. But when dealing with a `dirty' radiological device or
a nuclear bomb, the process of comprehension becomes even more
complex. While acts of cyber-terrorism can usually be traced to
their sources, the challenge comes in doing so fast enough to
minimize the damage they have caused. And biological weapons
are especially troublesome in confounding rapid comprehension
of what has transpired.
The recent anthrax attack illustrates the nation's lack of
necessary knowledge and effective organization to deal with
biological terrorism. First, there was widespread confusion
within the public health system as to the nature of the anthrax
involved and, indeed, the amount of anthrax needed to cause
inhalation anthrax in humans. Moreover, while the mails were
used to transmit the anthrax spores to Senator Daschle's office
in October 2001, as of this writing in March 2002, there is
still no resolution as to how anthrax was transmitted to the
women who died in New York and Connecticut. Equally baffling is
the case of the postal inspector who spent 45 days in a
Baltimore hospital after inspecting a mail-sorting machine at
the Brentwood facility in which the Daschle letter was
processed. Although he evinced most of the symptoms of
inhalation anthrax, there was no evidence of anthrax bacteria
in his blood.\36\
Clearly there are three paramount preconditions that must
be met in order to promote the more rapid comprehension of the
nature and extent of terrorist acts: Firstly, we need much more
research and development, especially regarding all aspects of
bioterrorism. Secondly, we need much more extensive and
effective educational programs for the front-line responders to
terrorism (police, firefighters, emergency rescue teams, hazmat
squads, etc.), as well as the medical and scientific public
health officials who must analyze the situation and prescribe
treatment. And thirdly, we need a vastly expanded and enhanced
communication network integrating the intelligence community
with state and local government officials, front-line
responders, police and other public safety officers, and public
health diagnosticians and practitioners.
The need for a greatly improved communication network is
underscored by the fact that the Centers for Disease Control
(CDC) were not aware of significant Canadian studies conducted
in May 2001, "which showed . . . that a real anthrax threat
letter was a far more dangerous weapon than anyone had believed
. . . [Although] bioterrorism and civil defense experts in a
half-dozen [U.S.] agencies had the information . . . CDC
epidemiologists . . . didn't learn of the Canadian studies
until early November. By then, the anthrax outbreak was almost
over." \37\
Depending on the determination of the nature and extent of
the terrorist act, there are a number of ways we can attempt to
cope with its consequences. When cyber-terrorism has occurred,
it is up to the experience, ingenuity, and software available
to the cyber-security experts to structure the best approach to
blocking further damage and restoring the system under attack
to its normal functioning. When the terrorist employs small
arms fire or simple explosives, the treatment for non-fatal
victims is straightforward, requiring the standard medical
technologies for dealing with accident injuries. In addition,
newly developed technologies can ameliorate the situation. For
example, there is the jackhammer developed at Brookhaven
National Laboratory "for rescue teams working in collapsed,
unstable buildings. The jackhammer . . . creates fewer shocks
and vibrations than a conventional device, reducing the risk of
further collapse . . . [And Sandia National Laboratory is
developing] the robot family, a group of intelligent, mobile
machines that can swarm over a site . . . looking for victims .
. . The robots . . . have demonstrated independent `swarm
intelligence' in carrying out their tasks." \38\
In cases when the terrorist has perpetrated arson,
technology can be of great assistance in enhancing the
effectiveness of the response. For example, the NetTalon system
cited earlier with regard to internal aircraft surveillance
could also be utilized in fighting fires. That system would
enable the firefighters speeding to the scene to have real time
pictures on their laptop screens of precisely where in the
building the fire was located, its intensity, speed of
spreading, associated vapors, and whether it required water or
specialized foams.\39\
A rudimentary response to a chemical gas attack, of course,
is to don a gas mask before the gas takes effect. "Although
sarin [nerve] gas can seep through the skin, breathing it in
delivers a lethal dose about 400 times faster--so the mask
could give you enough time to escape from a noxious cloud."
However, the mask has to be in good working order, and the fit
has to be airtight for it to function effectively.\40\ A good
example of a technology for responding to chemical attack, is
the Antidote-Treatment-Nerve-Gas-Agent Auto-injector developed
by Meridian Medical Technologies, Inc. of Columbia, Maryland.
This pen-like device enables soldiers to self-administer
precise doses of both types of required anti-nerve-gas
antidotes (atropine and praladoxime chloride).\41\ Another
excellent example is Sandia National Laboratory's "development
of a nontoxic, noncorrosive foam that neutralizes both chemical
agents and biologic species such as anthrax . . . The foam . .
. was used extensively to clean up anthrax-contaminated areas
on Capitol Hill." \42\
With respect to biological agents, Lawrence Livermore
National Laboratory has developed a prototype of an advanced,
hand-held nucleic-acid-analyzer, only slightly larger than a
scientific calculator, that would enable emergency workers to
identify biowarfare agents in the field in a matter of
minutes.\43\ For use after a dangerous substance has been
detected, the same national laboratory has developed a gel "to
kill biological agents and neutralize chemicals without harming
people." \44\ Another approach, still in the research phase,
is the attempt to find an antitoxin that would neutralize the
toxins produced by the anthrax bacteria. A group at Harvard
Medical School led by Dr. R. John Collier has developed two
methods of neutralizing the anthrax toxins: one by combining
with the toxin molecules and inactivating them; the other by
adhering to the toxin molecules and blocking them from entering
the host cells. Both methods have been tested on rats who have
survived with no symptoms. Still another approach, in an early
research stage, "involves a new type of antibiotic against
anthrax bacteria . . . discovered by Dr. Lucy Shapiro of
Stanford University and Dr. Stephen J. Benkovic of Penn State.
In early laboratory tests, this antibiotic worked not only
against anthrax bacteria, but also against brucellosis and
tularemia, both of which are "potential germ warfare
weapons." \45\
An entirely different approach for counteracting biological
agents is irradiation. But, of course, this cannot be used on
infected individuals, but only on things that are carrying the
bacteria or the spores that will produce the bacteria.
Following the delivery of anthrax-laden letters to Capitol Hill
in October, all mail for the White House and Congress and much
of the mail for federal agencies is irradiated. All mail for
Washington, D.C. is first machine sorted for zip codes. All
mail with government-zip-code destinations is then sorted by
hand. Mail for the White House, Congress, and much of the mail
for other federal government entities is then "wrapped in
plastic, packed in boxes, and taken by tractor-trailer to
irradiation centers in Bridgeport, New Jersey or Lima, Ohio."
At those centers the boxes of mail move on a conveyor belt past
a `gun' that subjects them to a high dose of ionizing
radiation. Afterwards they are trucked back to Maryland where
"they are opened and allowed to breathe for up to 48 hours to
dispel gases created by irradiation." They are then ready for
final sorting and delivery.\46\
Regardless of which technology is used to respond to the
effects of the terrorist act, critical to the success of any
countermeasures are the resources, training, and organization
that are brought to bear on the situation. For example, in
dealing with a chemical attack: "the removal of solid or
liquid chemical agent from exposed individuals is the first
step in preventing severe injury or death . . . Very few
[hazmat] teams are staffed, equipped, or trained for mass
decontamination . . . [F]ew hospitals have formal
decontamination facilities; even fewer have dedicated outdoor
facilities or an easy way of expanding their decontamination
operations in an event involving mass casualties." \47\ The
administration's budget submission for FY 2003 makes a start
toward remedying these deficiencies. The $38 billion for
Homeland Security includes nearly $6 billion for combating
bioterrorism, encompassing a range of programs: research and
development for vaccines, diagnostic tests, decontamination
methods, and related technologies; expansion of the National
Pharmaceutical Stockpile; development of rapid response
networks; and training and technical assistance to states and
local governments to strengthen their public health
systems.\48\
Technological Choice
It is clear from the preceding discussion that the menu of
technological options available for homeland security is vast.
However, choosing among alternative strategies and technologies
is not a simple, straightforward matter; on the contrary, it is
highly complex and fraught with difficulties. Sometimes there
are inadequate data on which to base a sound decision; other
times the underlying science on which the technology is founded
is not fully known--as was the case with understanding the
transmission of inhalation anthrax from anthrax spores.
Even when the scientific basis and data are available,
however, a significant difficulty remains: the so-called `Law
of Unintended Consequences.' This refers to the historical fact
that many technologies have engendered ancillary, unexpected
consequences that are frequently difficult to foresee and
sometimes somewhat detrimental in their impacts. In order to
gain some perspective on this issue, it is useful to examine
some examples from the past and some apparent instances that
have already emerged in the application of technology to the
War on Terrorism.
The most obvious example from the past is the use of the
internal combustion engine to power automobiles and other
vehicles. There is no question that this innovation served as
one of the prime movers of 20th century economic expansion.
Moreover, it not only facilitated much more rapid
transportation of people and goods, but also its initial impact
on the environment was salutary; for it led to the elimination
of foul-smelling horse manure from roads and city streets. Yet
we now know that its long-term effect on the environment has
been deleterious because of its substantial contribution to air
pollution and the possibility of global warming. Furthermore,
the use of motorized vehicles has had the unfortunate ancillary
consequence of tens of thousands of traffic fatalities and
injuries in the United States annually.
Another past example of the `Law of Unintended
Consequences' was the use of chlorofluorocarbons for
refrigeration and air conditioning. This was an immensely
important innovation that facilitated the comfortable use of
many otherwise unsuitable facilities in the heat of summer and
the longer-term distribution and preservation of food products,
thereby transforming the role of homemakers who no longer had
to shop for food each day. In referring to Freon, a trade name
for these chemicals, the 1973 edition of the Encyclopaedia
Britannica stated: "The importance of the Freons lies in the
fact that they are so stable that they are entirely harmless."
\49\ As we now know, however, it is the very stability of these
chemicals that enables them to rise up above the atmosphere and
serve to deplete the ozone layer, thereby interfering with its
blocking of sun rays that can cause skin cancer.
The point of these past examples is not that we should have
refrained from utilizing the internal combustion engine or
making use of refrigeration and air conditioning; both
innovations have bestowed substantial benefits on our standard
of living. But if we had anticipated their ancillary, adverse
consequences earlier, we might have been able to structure
their implementation in such a way as to mitigate those
unintended consequences and to design research and development
programs aimed at alternative or supplemental means of
achieving the same ends.
As noted above, some apparent instances of the `Law of
Unintended Consequences' have already emerged in the
application of technology to the War on Terrorism. Most notable
among them is the use of irradiation to sanitize mail from
anthrax spores and other pernicious contaminants. This
"process tends to destroy computer chips and to damage . . .
delicate items including food, [photos], pharmaceuticals,
clothing, contact lens--and even the paper mail itself." \50\
Also the fact that the process entails wrapping the mail in
plastic prior to irradiation has apparently caused varying
forms of distress among some mail handlers. This may be due to
the interaction of the electrons [in the irradiation] and the
plastic wrap, thereby producing ozone and carbon monoxide.\51\
In any case, the mail room in the U.S. Department of Commerce
had to be temporarily shut down because a number of the mail
room employees complained of nausea and respiratory
distress.\52\ Similarly "seventy-three employees of the U.S.
Senate have reported health problems including headaches, eye
irritation and skin rash after handling irradiated mail, and
the government has issued a cautionary advisory to 180,000
federal workers in the District.\53\ In addition, "87 . . .
workers at the Gaithersburg [Maryland mail] facility . . . are
experiencing nosebleeds, runny noses, runny eyes, extreme
headaches, nausea." \54\
Again these unanticipated consequences do not imply that
sensitive mail should not be irradiated. Indeed, as a result of
such concerns, "engineers lowered radiation dosages by about
40% after concluding that that was sufficient to kill anthrax
spores and other biological contaminants." \55\ Also mail is
now being "removed from the boxes and plastic and allowed to
air . . . for as long as 48 hours before re-entering the usual
mail delivery system." \56\ The point is that the earlier one
can anticipate the ancillary consequences, the better one can
implement the technology in a manner designed to obviate or
mitigate its adverse effects.
An example of a potential problem with an identification
technology occurs in the field of biometrics. "Retinal scan .
. . is perhaps the most secure biometric option. Users,
however, fear health effects from the infrared light used to
read the retina, as well as possible infections from contact
with the equipment . . . [Moreover,] a person's retinal
patterns change after he or she experiences a heart attack.
Unions have fought the installation of retinal scan equipment
on the theory that the scan could be used by companies to spot
sick employees and terminate them." \57\ Iris scans may not be
as reliable as retina scans, in terms of false acceptance or
false rejection rates, but since they do not involve physical
contact, they may prove more desirable in some instances.\58\
This example illustrates the importance of including
examination of ancillary consequences in consideration of
alternative technologies.
Technologies for coping with terrorists who are onboard an
aircraft in flight also pose a number of problems that need to
be assessed, according to a draft report of the National
Institute of Justice, a research resource of the Justice
Department. The draft report stated that: "Tasers--a type of
stun gun . . . could interfere with the plane's operational
instruments . . . `In the preliminary tests . . . an electrical
discharge less-than-lethal device fired at cockpit instruments
adversely affected a number of systems . . . [Furthermore,] in
the confined space of a cockpit, crew members are likely to be
incapacitated' . . . by other non-lethal weapons such as pepper
spray or tear gas . . . [The draft report also raised serious
questions on a number of other technologies, including,] . . .
the Laser Dazzler, a light that temporarily blinds an attacker,
. . . anesthetics or calmative chemicals that could
incapacitate all passengers when released into the air, a
`slippery foam' on the cabin floors that could make an attacker
slip, and some kinds of ear-piercing acoustic weapon." \59\
A broader problem of unintended consequences that permeates
a number of the technologies that may be used in the War on
Terrorism is their impact on the privacy of individuals. This
impact can be readily perceived in the proliferation of video
cameras and human scanning equipment for purposes of security.
As indicated earlier, one biometric system utilizes imaging
technologies that can penetrate clothing and produce an image
of the body beneath them.\60\ The increasing use of closed
circuit TV (CCTV) for security surveillance portends a
pervasive impact on personal privacy. The proliferation of CCTV
in the UK over the past decade may be a prognosticator of what
lies ahead for the United States. In the early 1990s, after
terrorist bombs exploded in the `City of London,' the
government installed a network of CCTV cameras around that area
and over the decade encouraged local governments to do the same
in their areas. "By 1998, 440 city centers were wired [with
CCTV] . . . There are now [estimated to be] 2.5 million
surveillance cameras in Britain." \61\ "In Britain in the
late 1990s it is unlikely that any urban dweller, in their
[sic] role as shopper, worker, commuter, resident or school
pupil can avoid being . . . monitored by camera surveillance
systems." \62\
A further instance of the potential invasion of privacy
arises from the intended expansion and integration of data
bases containing background information on individuals for use
in security at airports, seaports, border crossings, etc. The
more extensive and integrated such data bases are, the more
susceptible they become to misuse of the information. A third
example of the potential infringement of privacy comes from the
pervasive expansion of the internet, with its manifold
possibilities for mischief. As these technologies continue
their diffusion, it is essential that every effort
be made to ensure as much protection of individual privacy as
possible.
Another potentially adverse consequence from anti-terrorist
technology is the much wider use of microwave and other forms
of radiation to which persons may be exposed. While there is no
conclusive evidence at this time as to such adverse impact, it
is important that such technologies be designed, perfected, and
operated so as to minimize the possibility of any such effects.
The more widespread use of specific antibiotics, such as Cipro,
also poses potential unintended consequences. This is evidenced
by a recent study which "found that a powerful strain of
salmonella developed a resistance to the antibiotic Cipro in
less than two years." \63\
A different kind of unintended consequence has emerged from
the current effort to establish a comprehensive computer
network to track foreign students in the U.S. "Officials
concede they do not know . . . where [or whether] the 547,000
people holding student visas are attending school . . .
[H]igher education institutions . . . raised a raft of
objections [to the planned system] . . . The issue is
particularly pressing for community and technical colleges,
which rely heavily on foreign students because they pay higher
tuition . . . [C]olleges have also objected to a plan . . .
that would prevent foreign students from receiving diplomas
until they confirm that they have either returned home or have
extended their visas." \64\ It is clear that this planned
computerized, surveillance system of foreign students would
pose major unintended consequences for the academic
institutions involved.
Perhaps the ultimate, tragic example of the `Law of
Unintended Consequences' is the fact that without the Internet,
cell phones, and modern telecommunications systems, the Al
Queda network could never have evolved into the pervasive,
pernicious web of evil it has become. So in that warped sense,
the terrible tragedy of September 11 was--at least in some
small part--an unintended consequence of the proliferation of
those technologies.
The lesson from all this is that technologies often have
unintended, ancillary effects which--to the extent feasible--
should be anticipated and taken into account in selecting among
alternative technological solutions and structuring their
implementation. The point is not that any particular technology
is inherently good or bad, but rather that its relative
benefits and detriments depend partially on its ancillary
consequences, as well as on the uses to which it is put and the
way in which it is implemented.
Technology Assessment
The analysis, comparison, and selection of technologies to
be implemented is a complex, difficult process. Discerning
unintended consequences is not the only hurdle that must be
overcome. The process involves the following components:
determining the technical capabilities of the
technology;
evaluating its effectiveness in achieving its
primary objectives;
ascertaining its costs;
delineating the benefits it confers;
anticipating its ancillary consequences and
estimating their positive and negative effects;
discerning its probable impact on the economy,
environment, society, and individual values;
comparing the technology with alternatives in terms
of all the foregoing factors; and
delineating the advantages and disadvantages--the
pros
and cons--for the various policy options confronting
decision
makers.
Technology assessment is the methodology for conducting
such analyses. Focused on the future, "it is the
institutionalization of a methodology for previewing potential
effects of technological developments so that the information
generated may increase our ability to forestall the detrimental
effects and encourage the beneficial effects of our
inventions." \65\ Incorporating elements of operations
research, systems analysis, cost-benefit studies, game theory,
linear programming, simulation studies, and alternative-futures
scenarios--along with pragmatic public policy considerations--
technology assessment emerged as a distinct field of academic
research in the mid-1960s.
Prompted by information on this field from the academic and
scientific communities, along with congressional concern with
comprehending the technological aspects of public policy
issues, Representative Emilio Q. Daddario began a public
dialogue in March 1967, when he "introduced a bill proposing
the creation of a `Technology Assessment Board' . . . to
provide Congress with an `early warning signal' of the
potential good and bad consequences of technological
programs." As Chairman of the Subcommittee on Science,
Research, and Development of the Committee on Science and
Astronautics, Congressman Daddario followed up by launching
several years of seminars, studies, and hearings with
substantial input from reports by the Legislative Reference
Service [now the Congressional Research Service] and by each of
the National Academies of Science, Engineering, and Public
Administration.\66\
Based on these extensive deliberations, a revised bill was
introduced in the House in 1971, and followed by a companion
bill in the Senate. With further amendments, the bill passed
the House in February 1972; and, with some additional
revisions, the bill to create an Office of Technology
Assessment passed the Senate in September 1972. After
consideration by a conference committee and final passage in
both Houses, the Technology Assessment Act of 1972 was signed
into law by President Nixon on October 13, 1972,\67\ thereby
establishing OTA as only the third support agency of the
Congress in the history of the Republic. (The first, the
Legislative Reference Service, which later became the
Congressional Research Service, was created in 1914; the
second, the General Accounting Office (GAO) came in 1921; and
the fourth, the Congressional Budget Office (CBO), was not
created until 1974.)
OTA's Unique Role and History
Under the enabling statute, OTA consists of a Technology
Assessment Board (TAB) and a Director. TAB consists of 6
Senators and 6 House members, evenly split between the two
parties (to ensure non-partisanship), along with the Director
as an ex officio non-voting member. The Senate members are
appointed by the President pro-tempore of the Senate; the House
members by the Speaker of the House; and the Director is
appointed by the Board. The Director appoints the office staff.
In addition, there is a Technology Assessment Advisory Council
(TAAC), whose 10 public members are appointed by the Board and
which includes 2 ex officio members, the Comptroller General
and the Director of the Congressional Research Service.\68\
During the 5 years of extensive consideration before this
measure was enacted into law, a great deal of attention was
focused on the question of why a new Office of Technology
Assessment (OTA) was needed, rather than relying on the
existing congressional support agencies of the General
Accounting Office (GAO) and the Congressional Research Service
(CRS). The overwhelming judgment of the academic, scientific,
technical, and public policy communities was that neither GAO
nor CRS was capable of doing the job of technology assessment
required by the Congress. Indeed, "both the Comptroller
General and the Director of the Congressional Research Service
(and also the Librarian of Congress) support[ed] the
establishment of an OTA." \69\
In the first appropriations hearings on OTA, Representative
John Davis, the ranking House Democrat on the newly created
Technology Assessment Board (TAB) stated: "[OTA] would perform
a function far greater than could be performed by [CRS] . . .
inasmuch as much of the information that would be desirable to
have on the part of the committees of both the House and of the
Senate would . . . require the generating of information rather
than simply the retrieval of information." And the ranking
House Republican on TAB, Representative Charles Mosher said:
"GAO . . . investigations have been after the fact. The type
of investigation they do is in retrospect . . . OTA . . .
investigations are before the fact. They are . . . an early
warning system for the Congress and I think that is a very
important distinction . . . [Also] assessments . . . are
assigned to OTA . . . by a request from congressional
committees . . . The [Congressional] Research Service is
responsive to any request of a Congressman and, therefore, gets
a plethora of every variety, some very unimportant." \70\ The
issue of whether OTA's functions could be adequately performed
by either CRS or GAO was re-examined in 1976 by the Commission
on the Operation of the Senate, which published the conclusion
that: "The functions OTA can perform represent important needs
of the Senate, needs that cannot be met through the committee
structure or by other support agencies." \71\
In any case, this point of view had prevailed when, a
little over a year after enactment of its enabling statute, OTA
received its first appropriation in November 1973, appointed
its first staff in December, and commenced operations in early
1974, with then former Congressman Daddario as its first
Director. Recognizing the challenge of creating a new
institution within Congress, he gradually built his in-house
staff, developed an extensive network of consultants and
advisory panelists, and focused on establishing good working
relationships with the various congressional committees. He
structured OTA's initial assessments into seven program areas:
energy, food, health, materials, national R&D policies and
priorities, technology and international trade, and
transportation.
After guiding OTA through its formative first four years,
he resigned in 1977, and was succeeded in 1978 by the former
governor of Delaware, Russell Peterson. Unlike Daddario,
Peterson did not manage to develop good relationships with the
TAB Members who had appointed him. "Several members of the
board felt that . . . [his] priorities . . . strayed too far
from what Congress considered to be the most important
legislative concerns . . . One [TAB Member] complained that
Peterson was trying to create a `sort of Brookings Institution
in the Congress' . . . another accused the OTA of a `disturbing
pattern of ignoring congressional oversight and service'."
\72\ In any event, Peterson resigned in 1979 after serving only
one year as Director.
OTA achieved maturity with its next Director, Dr. John
Gibbons who served close to 15 years, from 1979 to 1993. He
developed very good relationships with TAB Members and
congressional committees and, through astute management of OTA,
built the Office's credibility within the Congress and
throughout the nation's academic, scientific, technical, and
professional communities. Indeed, OTA "gradually became
recognized worldwide as the top institution of its kind . . .
Austria, Denmark, the European Community, France, Germany,
Great Britain, the Netherlands, and Sweden have copied or
adapted the OTA style. Similar organizations are being
discussed or formed in Hungary, Japan, Mexico, the People's
Republic of China, Russia, Switzerland, and Taiwan." \73\
From 1974 through 1995, "OTA published nearly 750 full
assessments, background papers, technical memoranda, case
studies, and workshop proceedings. The quality of those
products is attested to by the facts that from 1992 to 1994,
twelve assessments won the National Association for Government
Communicators' prestigious Blue Pencil Award . . . [and during]
the same 3 years, 12 additional reports were named among the 60
Notable Government Documents selected annually by the American
Library Association's Government Documents Roundtable--
representing the best Federal, State, and local government
documents from around the world . . . OTA's reports were often
bestsellers at the Government Printing Office and the National
Technical Information Service . . . [For example,] GPO sold
48,000 OTA reports in [one year] alone." \74\
The authoritative credibility achieved by OTA over the
years is perhaps best articulated in a 1988 article entitled
"Influential Office Guides Congress into Space Age," in which
the author asserts: "Without OTA's nod, leading scientific
theories stand little chance of winning status as conventional
wisdom on Capitol Hill . . . The Office is credited with having
matured into the scientific heavyweight whose assessments can
mean life or death for technical problems in the appropriations
process . . . At least one thing is clear: in a town where
unimpeachable sources are oh-so-hard to come by, OTA has
managed to secure a position near the top of the list." \75\
OTA's Structure and Pattern of Operations
OTA achieved this status as a consequence of the prescience
embodied in its enabling statute and the implementing pattern
of operations that subsequently evolved. Although the bill that
originally passed the House called for the majority party to
hold a majority of seats on TAB, the Senate bill stipulated a
board evenly divided between the two parties, and the Senate
version was accepted in conference.\76\ This assurance of TAB's
non-partisanship--highly unusual at a time when both Houses of
Congress had been controlled by the Democrats for a
generation--was absolutely essential for enabling OTA to
realize both the reality and public perception of objectivity
and credibility.
Along with a governing board, evenly split between House
and Senate and between Democrats and Republicans, the Act
called for the creation of an advisory council, including:
"ten members from the public . . . eminent in one or more
fields of the physical, biological, or social sciences or
engineering or experienced in the administration of
technological activities, or . . . qualified on the basis of
contributions made to educational or public activities." \77\
Thus the Act provided TAB and the Director with the perspective
of an eminent group of outside advisers. Since the assessments
to be undertaken by OTA, however, spanned a multitude of
scientific and technical disciplines and specialities, OTA also
built a network of advisory panels and consultants who were
versed in the specific issues involved in particular assessment
projects. Over the years as the OTA in-house staff grew to
number nearly 150, this outside network of advisers grew to
about 1,000 individuals throughout the nation.
The professional staff consisted of about half scientists
and engineers and about half social scientists, lawyers, and
health care professionals. From 1979 on, the OTA staff was
organized in three divisions, each headed by an Assistant
Director of OTA. These were the divisions of: (a) Energy,
Materials, and International Security; (b) Science,
Information, and Natural Resources; and (c) Health and Life
Sciences. Each division in turn was organized in three
programs, headed by a Program Director. The programs in
division (a) were: Energy and Materials; Industry, Technology,
and Employment; and International Security and Commerce. The
programs in division (b) were: Communications and Information
Technologies; Oceans and Environment; and Science, Education,
and Transportation. And the programs in division (c) were:
Biological Applications; Food and Renewable Resources; and
Health.
Each program in turn usually had several projects underway
at any one time, each of which was headed by a project
director. Some relevant examples of specific OTA assessments
include:
The Border War on Drugs
Electronic Surveillance in a Digital Age
High Level Radioactive Waste Site Characterization
Impacts of Antibiotic-Resistant Bacteria
New Developments in Biotechnology
Scientific Validity of Polygraph Testing
Taggants in Explosives
Technology Transfer to China
Technology and Counter Terrorism
Transportation of Hazardous Materials
Virtual Reality and Technologies for Combat
Simulation
Technologies Underlying Weapons of Mass Destruction
As noted above, in addition to the in-house staff and the
congressional board and advisory council, OTA made extensive
use of a national network of about 1,000 advisory panelists and
consultants who addressed specific assessment projects. Thus
for each full-fledged assessment an advisory panel of about 12-
20 individuals was appointed which included scientific and
technical experts in the particular subject under
consideration, as well as participants from industry, labor,
academia, the professions, state and local government, and the
public at large. And before an assessment report was finalized,
it was critiqued by a wider array of experts and stakeholders
throughout the nation.\78\
"The steps in the assessment process may be summarized as
follows: (1) OTA staff engage in informal communication with
congressional committee staff. (2) This leads to formal
committee request letters to OTA, a proposal from the staff to
TAB, and TAB approval to initiate an assessment. (3) An
advisory panel is appointed which critiques the staff's
preliminary assessment design at the panel's first meeting. (4)
Months later, at the second panel meeting, OTA discusses its
analysis of the data it has obtained and the way it is likely
to be handled in the assessment report. (5) Some months later
OTA presents a draft of its final report to the advisory panel
and subsequently to additional outside reviewers. (6) About
eighteen months after the start of the project, OTA presents a
final report to TAB for approval to release it to the
requesting committees and the public at large. (7) OTA then
presents its results to the requesting committees, in the form
of briefings and testimony at hearings, as well as in a written
document, and disseminates its findings to appropriate
Executive Branch agencies, other interested parties, and the
general public." \79\
OTA's Credibility, Objectivity, and Relevance
While this process may appear lengthy and laborious, it
embodies an elaborate panoply of checks and balances that
confer credibility, objectivity, and relevance on the final
assessment report. These checks and balances are inherent in
OTA's statute and pattern of operations. Some of the most
important ones are:
the even balance between House and Senate and the
two parties on TAB;
the tradition of choosing the Vice Chair from the
opposite party to the Chair;
the need for TAB approval both to initiate an
assessment and subsequently to release the final
report;
the Technology Assessment Advisory Council's
salutary influence on OTA's standards of excellence;
each advisory panel's role in the design of the
assessment, the analysis of the data, and the content
of the final report;
the role of the stakeholders and additional expert
consultants in reviewing the draft report;
the presentation of a Review Memorandum from the
Project Director to the OTA Director, which "describes
the reactions of the panel and outside reviewers to
each portion of the report and shows how the final
version takes account of those comments;" \80\ and
the pattern of continuing, informal communication
between OTA and committee staff before, during, and as
follow-up to the assessment.
The relevance of OTA's assessments is ensured by the close
control the congressional board exercises over the initiation
and final approval of OTA products, as well as by the
continuing communication between OTA and congressional
committee staff. While OTA reports have received widespread
acclaim throughout the academic, scientific, technical, and
professional communities, their primary purpose is not to edify
scholars, but rather to serve congressional needs for the
analysis of policy options involving technology. Because of the
continuing oversight of TAB and interaction with congressional
committees, adherence to this purpose is preserved.
OTA's objectivity is ensured through a number of the checks
and balances, the most fundamental one of which is that the
Board is evenly split between the two parties and has
traditionally included a range of conservatives, moderates, and
liberals among its members. Moreover, the pattern of choosing
the Chair and Vice Chair of TAB from opposite parties adds to
OTA's non-partisanship, and hence its objectivity. This
characteristic is further enhanced by the roles played by the
advisory council, the specialized advisory panels, and the many
outside reviewers involved in each assessment. They comprise
not only a very wide range of technical experts, but
stakeholders as well--representatives of industry, labor,
public interest groups, and the public at large.
This diversity of expertise and points of view ensures that
the OTA staff is aware of virtually all relevant issues and
interests involved in the particular assessment. The fact that
the final Review Memorandum has to show specifically how each
concern has been taken into account accords a high degree of
objectivity to the final OTA report. Attesting to that
objectivity is the fact that in debates on congressional
proposals, OTA reports were oftentimes cited by both the
proponents and opponents of the particular proposal. OTA's
credibility consequently comes from the entire assessment
process and the enviable reputation OTA achieved during the
Gibbons directorship.
The Relative Roles of OTA, CRS, and GAO
Having this understanding of the OTA process, it becomes
clear that Congress made the right decision in establishing OTA
in 1972, rather than attempting to rely on CRS and GAO for
providing the necessary analysis of policy options involving
complex technological issues. Congress needs technology
assessment that is timely, targeted to the specific legislative
priorities of congressional committees, and presented in a
format that clarifies the consequences--both pro and con--of
the various policy options related to the technologies under
consideration.
Neither CRS nor GAO has the capability to design and
conduct such assessments. Both CRS and GAO must respond to the
requests of individual members of Congress; whereas OTA
responds only to requests from congressional committees.
Accordingly, OTA assessments are inherently oriented toward the
priority needs of congressional committees, thereby rendering
them relevant to the committees' legislative agendas. This
legislative relevance is further ensured by the requirement for
TAB approvals both to initiate assessments and release final
reports, as well as its continuing oversight of OTA activities
throughout the process. While CRS research and GAO
investigations certainly provide valuable information to
individual members of the Senate and the House, they cannot
possibly attain the same degree of conformance to committees'
legislative requirements.
Furthermore, as former Representative Davis noted, CRS
essentially retrieves existent information, while OTA generates
new information. And as former Representative Mosher stated:
GAO does retrospective investigations; whereas OTA assessments
are future oriented and serve as "an early warning system for
the Congress . . . a very important distinction." \81\
Finally, neither CRS nor GAO has the statutory authority or
institutional capability to make as extensive use of outside
advisers drawn from all segments of the scientific, technical,
professional, and public interest communities as OTA has. As
indicated earlier, these advisers have played an integral,
essential role in ensuring that OTA reports take account of
virtually all relevant expertise and points of view. Without
that involvement, OTA's products could not have been able to
achieve so high a level of objectivity and credibility as they
did. Neither CRS nor GAO is equipped to make that kind of use
of 1,000 consultants.
When one considers that OTA is controlled by a
congressional board--similar to a joint committee--and has
maintained continuing communication with congressional
committees, along with the pattern whereby the office has drawn
upon its pool of about 1,000 outside advisers, the essence of
OTA's unique role becomes clear. In effect, OTA has served as a
critical translation link between the widespread technical
knowledge of the academic, scientific, and professional experts
and the policy-oriented queries and concerns of congressional
committees. OTA effects this translation in a thorough, in-
depth fashion that focuses on future-oriented policy options
for Congress. In brief, OTA is the interface between Congress
and the nation's science and technology community. For all of
the reasons that have been cited, neither CRS nor GAO can
fulfill that function.
OTA After Gibbons: 1993-1995
After 15 years of high achievement as OTA Director, Gibbons
resigned in early 1993 to join the new administration as
Science and Technology Adviser to the President and Director of
the White House Office of Science and Technology Policy. He was
succeeded by Dr. Roger C. Herdman who had been serving as an
OTA assistant director, with responsibility for the Health and
Life Sciences Division. In his new role, Dr. Herdman carried on
in the tradition of excellence established by his predecessor.
However, in 1995 there was a sea change in control of
Congress. The new leadership was intent on eliminating a number
of cabinet departments--Energy, Education, and Commerce--and
also on reducing the costs of government, including within the
Legislative Branch. The likeliest target for reduction within
the Congress was one of the support agencies, CBO, CRS, GAO,
and OTA. Of these, OTA was the smallest and most vulnerable.
Accordingly, in order to save money--the FY 1995
appropriation for OTA had been $22 million--the House
Appropriations Committee on June 15, 1995 recommended
elimination of funding for OTA. On June 22 following a failed
effort by Representative Vic Fazio (D-CA) to restore OTA
funding, the House passed the FY 1996 Legislative Branch
Appropriations bill with no funding for OTA. The House also
eliminated the Joint Committee on Printing, reduced the Joint
Economic Committee budget by 25 percent, cut House committee
budgets overall by a total of $40 million, and the GAO budget
by $57 million. So the elimination of OTA's appropriation
occurred within a context of extreme cost-cutting measures
across the board. \82\
On July 18 the Senate Appropriations Committee reported out
its bill, including $3.6 million for OTA--but solely for the
purpose of closing down the office. Senator Ernest F. Hollings,
who had served on the OTA board for 23 years, had led an
unsuccessful fight in committee to restore full funding. Again
on the Senate floor on July 20, he offered an amendment to the
committee bill to provide OTA with $15 million. Although his
amendment was supported by then Minority Leader Daschle,
Appropriations Committee ranking Democrat, Senator Byrd, as
well as all other senators who had served on the OTA Board--
Senators Grassley, Hatch, Kennedy, and Stevens--it still went
down to defeat.
"While lauding the past successes of the Office of
Technology Assessment (OTA), [opponents of the amendment]
stated that Senators . . . should support efforts to conserve
taxpayers' funds and streamline the bureaucracy surrounding
Congress." \83\ Senator Hollings retorted: "What you're doing
is eliminating the most economical approach to this
technological need." \84\ Senator Kennedy said: "The Office
of Technology Assessment . . . continues to serve an
indispensable role . . . it should not be abolished." Senator
Grassley noted: "OTA is our source of objective counsel when
it comes to science and technology and its interaction with
public policy decision making . . . [I]f we do not have an
unbiased source of information, then we have to rely on
organizations with a stake in keeping alive programs that
benefit their interests." Senator Hatch added: "OTA . . . is
the one arm of Congress that does give us . . . unbiased,
scientific and technical expertise that we could not otherwise
get where most everybody has confidence in what they do." And
Senator Stevens stated: "[W]e are about ready to do away with
the one entity in the Congress that tries to . . . deliver to
Members of Congress credible, timely reports on the development
of technology. I believe . . . that we are changing the course
of history in this Congress, but this is not one of the
hallmarks of that change. This entity (OTA) ought to be out in
the forefront of that change, and it will not be unless it is
properly funded and maintained." \85\
In the conference committee, Representative Fazio made
another unsuccessful attempt to restore funding for OTA. In
that debate Representative Ray Thornton (D-AK) made a
rhetorical connection between the elimination of OTA's funds
and the inclusion in the bill of funds to renovate the
congressional Botanic Garden. He said: "The arguments that
there are alternatives to OTA apply equally to [the Botanic
Garden, which] could be privatized. There are florists all over
the country. If we're going to cancel the garden of the mind--
OTA--then we can't afford to keep a [Botanic] garden." \86\
The House adopted the conference report on September 6, and
the Senate followed suit on September 22, with a proponent of
the bill stating: "This bill sets the standard. If we in
Congress can cut our own budget, every federal agency should be
able to do the same." The President vetoed the bill on October
3, because Congress submitted it to him prior to passing
appropriations measures for various Executive Branch
departments and agencies. After re-introducing the identical
bill, the House passed it again on October 31, and the Senate
on November 2. This time the bill was sent to the President,
coupled with the appropriation for the Treasury Department and
the White House, and he signed it into law on November 17.\87\
OTA had already ceased regular operations on September 29, the
last work day of FY 1995. A skeleton staff was retained for a
few months at the start of FY 1996, in order to archive OTA's
records, arrange for internet access to its reports at various
university sites, close out its personnel and financial
commitments, dispose of its computers, furniture, and other
equipment, and prepare its Annual Report to Congress for FY
1995. \88\
* * * * *
Findings
The findings that emerge from the foregoing discussion are
as follows:
Technology is critical to U.S. success in the War on
Terrorism and ensuring homeland security.
A wide variety of sophisticated technologies may be
involved in those efforts.
Choosing among possible technologies and patterns of
implementation is a complex process, oftentimes
involving unintended consequences.
Technology assessment is the methodology for making
such choices.
The leading exemplar of technology assessment was
the congressional Office of Technology Assessment
(OTA).
For almost a quarter of a century, OTA provided
Congress with valuable analyses of policy options on
important issues involving technology.
During that period OTA achieved a world-wide
reputation for excellence, as a non-partisan,
objective, and credible conductor of technology
assessments.
There was no dissatisfaction with its performance;
indeed OTA received accolades for its excellent work
while its funding was being eliminated.
Elimination of its funding was a cost-cutting
measure at a time of fiscal stringency and a symbol for
Executive Branch agencies to emulate.
Congress now needs its own source of non-partisan,
objective technology assessment in order to fulfill its
legislative, appropriation, and oversight
responsibilities in the War on Terrorism and ensuring
homeland security.
CONCLUSION
Fortunately, in 1995 when OTA's funding was discontinued,
its enabling statute remained in effect; no action was taken to
rescind it. So the law establishing OTA is still on the books.
OTA still technically exists. For practical purposes, what does
this mean?
To determine its import, it's necessary to examine the
provisions of the enabling statute, the Technology Assessment
Act of 1972. Section 3(b) of the act states that OTA "shall
consist of a Technology Assessment Board . . . and a
Director." Discontinuing OTA's funding vacated the positions
of the director and the staff, but the Board still technically
exists. Moreover, since the Senate is a continuing body and the
act does not limit the tenure of its members, the Senators who
were Board members in 1995--Senators Grassley, Hatch, Hollings,
and Kennedy--are still Board members. Since the House is not a
continuing body, it could be argued that the current House
members who were on TAB in 1995--Representatives Dingell,
Houghton, McDermott, and Oxley--would not still be members.
However, the facts that TAB is an independent board, rather
than a congressional joint committee and that the OTA statute
does not impose any time limit on board appointments provide a
basis for arguing that they still are members of TAB. In any
case, section 4(b) of the act stipulates that: "Vacancies in
the membership of the Board shall not affect the power of the
remaining members to execute the functions of the Board." In
addition, the appropriations section of the act, section 12(a)
states that: "To enable the Office to carry out its powers and
duties, there is hereby authorized to be appropriated to the
Office [following its first 2 fiscal years of existence] . . .
"thereafter such sums as may be necessary." \89\
In short, OTA has an ongoing authorization to receive
appropriations, and the Technology Assessment Board (TAB) is
empowered to submit a recommendation to the Appropriations
Committee for such an appropriation. Given these facts and the
finding that Congress needs its own source of technology
assessment to fulfill its role in the War on Terrorism and
ensuring homeland security, it is the conclusion of this author
that OTA should be reactivated.
But to underscore the urgent necessity for reactivating
OTA, it is instructive to consider one final example of OTA's
potential impact on the War on Terrorism and homeland security.
As is well known, the anthrax attacks last fall engendered
considerable confusion and consternation among public health
authorities, public safety officials, and policy makers
throughout federal, state, and local government. There was
great uncertainty as to the source and extent of the attacks,
the potency and persistence of the anthrax spores, the manner
of transmission, and--not least--the number of spores necessary
to trigger inhalation anthrax in human beings. In the course of
reacting to the attacks, it was widely reported that it was
believed that 8,000-10,000 spores would have to be inhaled for
a person to contract inhalation or pulmonary anthrax. This
belief undoubtedly played a role in shaping the public health
response to the attacks.
It's unfortunate that OTA was not operational at that time.
If it had been, OTA staff could have ensured that a 1993 OTA
report was promptly brought to the attention of the public
health authorities. The report entitled Technologies Underlying
Weapons of Mass Destruction contained the following finding:
"1,000 spores or less can produce fatal pulmonary anthrax in
some members of an exposed population." \90\ If this
information had been readily available, it's conceivable that
it even could have saved a life or--at the very least--afforded
much better guidance to the public health authorities in
designing their response to the crisis.
* * * * *
RECOMMENDATIONS
The War on Terrorism and the striving for homeland security
are urgent national necessities. However, the reactivation of
OTA is equally urgent, if Congress is to be empowered to
partner with the President in pursuit of those objectives--in
its role as a co-equal branch of government.
The sooner Congress can reactivate OTA, the sooner it can
effectively deal with those issues. Once OTA receives an
appropriation, it still will take some months to build its
staff and network of outside advisers, and to work with the
congressional committees to delineate an assessment agenda that
meets their priority needs. At this time of national challenge,
waiting until the start of the next fiscal year, October 1,
2002, is too long a period to remain without this resource.
Accordingly, an appropriation for OTA should be included in the
next supplemental appropriations bill to come before the
Congress.
A key question then becomes: How much should be provided
for OTA in this bill? In the current situation of fiscal
stringency, one should allocate only enough to reactivate the
office effectively. This in turn hinges on what the office
would be doing for the balance of this fiscal year.
After a few essential staff members have been appointed,
their primary function would be to canvass and consult with
congressional committees in both the House and Senate in order
to ascertain their priority needs for technology assessments
with respect to the War on Terrorism and homeland security. The
task would then be to plan a series of assessments designed to
meet those priority needs. Concurrently with these activities,
the office would be identifying potential outside advisers on
whom OTA could rely, and under the guidance of the Technology
Assessment Board, preparing a detailed budget submission for
the following fiscal year that would provide OTA with the
resources to proceed with a number of high priority
assessments.
It is believed that a supplemental appropriation of $1
million would be sufficient for OTA to carry out these initial
activities effectively. Considering that this $1 million would
reactivate an Office that could aid Congress in evaluating the
$38 billion the President has recently requested for homeland
security, the $1 million amount does not seem unreasonable.
Recommendation: In the first supplemental appropriation
bill considered in this session, Congress should include $1
million for OTA to canvass and consult with congressional
committees, and plan a series of technology assessments
designed to meet the priority needs of those committees with
respect to the War on Terrorism and homeland security.
* * * * *
NOTES
1. Sean Ford, "Small Influential Office Guides Congress
Into Space Age," Federal Times, 13 June 1988, 18.
2. U.S. Congress, Office of Technology Assessment,
Technologies Underlying Weapons of Mass Destruction, December
1993, 78.
3. William J. Broad, Stephen Engelberg, and James Glanz,
"A Nation Challenged: The Threats; Assessing Risks, Chemical,
Biological, Even Nuclear," New York Times, 1 Nov. 2001, AI.
4. John Schwartz, "A Nation Challenged: The Computer
Networks; Cyberspace Seen as Potential Battleground," New York
Times, 23 Nov. 2001, B5.
5. Bruce Hoffman, Inside Terrorism (New York: Columbia
University Press, 1998) 180-181.
6. It should be noted that water systems are vulnerable not
only to chemical or biological contamination, but also to
cyber-terrorism: ". . . essentially every component of the
water supply system is highly automated. This includes
electronic control of water pumping and storing, water
treatment operations, and water transmission . . . [G]reat
damage could be done if the control of these systems were lost
for a period of time due to cyber attack." U.S. Congress,
House Committee on Science. "Safety of Our Nation's Water,"
testimony by Richard G. Luthy, Professor of Civil and
Environmental Engineering, Stanford University and Chair, Water
Science and Technology Board, National Research Council, 107th
Cong., 1st sess., 14 Nov. 2001.
7. Matthew L. Wald, "Electric Power System Is Called
`Vulnerable,' and Vigilance Is Sought," New York Times, 28
Feb. 2002, A11.
8. President George W. Bush, "State of the Union," U.S.
Capitol, Washington, D.C., 29 Jan. 2002.
9. Ibid.
10. Phillip B. Heymann, Terrorism and America: A Common
Sense Strategy for a Democratic Society (Cambridge: The MIT
Press, 1998) 134-136.
11. Mary Jordan, "Ridge Calls Security at Border
`Outdated'," Washington Post, 6 March 2002, A11.
12. Robert Montgomery, "A Look at Cellular's Alarming
Technology," Mastering Security (Dubuque: Kendall/Hunt, 1996)
12.
13. Robert De Lia, "Seeing Into the World of Fiber Optics
for Security," Mastering Security (Dubuque: Kendall/Hunt,
1996) 17.
14. Donald R. Jones, Jr., Executive Vice President,
NetTalon Security Systems, Inc., Personal Interview, 6 Dec.
2001.
15. U.S. Congress, House Committee on Science. "Aviation
Security: Technology's Role in Addressing Vulnerabilities,"
testimony by Keith O. Fultz, Assistant Comptroller General,
Resources, Community, and Economic Development Division,
General Accounting Office, 19 Sept. 1996, 7-12.
16. National Research Council, Detection of Explosives for
Commercial Aviation Security, Executive Summary (Washington,
D.C.: National Academy Press, 1993),
7-12.
17. Jim Dawson, "National Labs Focus on Tools Against
Terrorism in Wake of Airliner and Anthrax Attacks," Physics
Today, Jan. 2002, 19-22.
18. U.S. Congress, House Committee on Science. "Aviation
Security," 8-9.
19. Cynthia L. Webb, "A Handy Security Solution: Aether
Software Gets Tryout on Handhelds at Boston Airport,"
Washington Post, 16 Jan. 2002, E5.
20. National Research Council, Airline Passenger Security
Screening: New Technologies and Implementation Issues,
Executive Summary (Washington, D.C.: National Academy Press,
1996) 3.
21. Jeffrey Rosen, "A Watchful State," New York Times, 7
Oct. 2001, 6-38.
22. Donald R. Richards, "ID Technology Faces the Future,"
Mastering Security (Dubuque: Kendall/Hunt, 1996) 78.
23. U.S. Congress, House Committee on Science, "Cyber
Security: Beyond the Maginot Line," testimony by Wm. A. Wulf,
President, National Academy of Engineering and AT&T Professor
of Engineering and Applied Science, University of Virginia,
107th Cong., 1st sess., 10 Oct. 2001.
24. Robert O'Harrow Jr., "Key U.S. Computer Systems Called
Vulnerable to Attack; Defense, FAA Among Agencies Lacking
Security, Experts Say," Washington Post, 27 Sept. 2001, A6.
25. Sada Yoshi Ohbu, et al., "Sarin Poisoning on Tokyo
Subway," Southern Medical Journal, 3 June 1997, 1.
26. Lyndsey Layton, "Drill Tests Response to Attack In
Metro; Exercise Gauges Chemical Threats," Washington Post, 5
Dec. 2001, B8.
27. Dawson, "National Labs Focus," 19-20.
28. Ellen Nakashima, "USPS Sees New Way to Spot
Biohazards," Washington Post, 9 Mar. 2002, A13.
29. Marian Burros, "Eating Well; A Vulnerable Food Supply,
A Call for More Safety," New York Times, 31 Oct. 2001, Fl.
30. National Research Council, Improving Civilian Medical
Response to Chemical or Biological Terrorist Incidents,
Executive Summary (Washington, D.C.: National Academy Press,
1998) 3.
31. Ceci Connolly, "Bush Promotes Plans To Fight
Bioterrorism," Washington Post, 6 Feb. 2002, A3+.
32. Avram Goldstein, "Anti-Terror Campaign Turns to
Doctors; Physicians Scramble to Learn About Bio-Weapons; Some
Urge Mandated Training," Washington Post, 14 Oct. 2001, A12.
33. Joby Warrick and Steve Fainaru, "Bioterrorism
Preparations Lacking at Lowest Levels; Despite Warnings and
Funds, Local Defenses Come Up Short," Washington Post, 22 Oct.
2001, A7.
34. National Research Council, Chemical and Biological
Terrorism: Research and Development to Improve Civilian Medical
Response, Executive Summary (Washington, D.C.: National Academy
Press, 1999) 5-6.
35. Eric Pianin and Bill Miller, "Security Permeates
Budget: Many Agencies Would Share $37.7 Billion in New Funds,"
Washington Post, 5 Feb. 2002, A7.
36. Sheryl Gay Stolberg, "A Nation Challenged: The
Disease; Ill Postal Worker Has Symptoms That Stop Short of
Anthrax," New York Times, 11 Jan. 2002, A11.
37. David Brown, "Agency With Most Need Didn't Get Anthrax
Data," Washington Post, 11 Feb. 2002, A3.
38. Dawson, "National Labs Focus," 21.
39. Jones, Personal Interview.
40. George Musser, "Better Killing Through Chemistry:
Buying Chemical Weapons Material Through the Mail is Quick and
Easy," Scientific American, Dec. 2001, 20-21.
41. Terence Chea, "Firm's Anti-Nerve Gas Device
Approved," Washington Post, 30 Jan. 2002, E5.
42. Dawson, "National Labs Focus," 20.
43. Ibid. 21.
44. John Mesenbrink, "Fighting the War on Bioterrorism,"
Security Magazine, 4 Jan. 2002, 3.
45. Gina Kolata, "Treatments; On Many Fronts, Experts Plan
for the Unthinkable: Biowarfare," New York Times, 23 Oct.
2001, F4.
46. Steve Twomey, "A Recipe for Safe Mail," Washington
Post, 30 Jan. 2002, Al+.
47. National Research Council, Chemical and Biological
Terrorism, 8.
48. Pianin, "Security Permeates Budget."
49. "Freon," Encyclopaedia Britannica, vol. 9, 1973 ed.,
924.
50. John Schwartz, "The Irradiation of Mail Can Also Zap
the Contents," New York Times, 11 Feb. 2002, C2.
51. Twomey, "A Recipe For Safe Mail."
52. Andrew DeMillo and Allan Lengel, "Fumes From Mail
Sicken 11 at Commerce," Washington Post, 11 Jan. 2002, B9.
53. Spencer S. Hsu, "73 Senate Workers Report Illness,"
Washington Post, 7 Feb. 2002, B1+.
54. Spencer S. Hsu, "Workers Handling Government Mail
Report Illness," Washington Post, 9 Feb. 2002, A6.
55. Hsu, "73 Senate Workers Report Illness."
56. Schwartz, "The Irradiation of Mail."
57. Sherry L. Harowitz, "More Than Meets the Eye,"
Mastering Security (Dubuque: Kendal1/Hunt, 1996) 73.
58. Richards, "ID Technology Faces the Future," 79.
59. Sara Kehaulani Goo, "Nonlethal Weapons Pose Own Risks
in Air, Report Says," Washington Post, 6 March 2002, A11.
60. National Research Council, Airline Passenger Security
Screening, 3.
61. Rosen, "A Watchful State."
62. Clive Norris and Gary Armstrong, The Maximum
Surveillance Society: The Rise of the CCTV (New York: Berg,
1999) 42.
63. AP, "Resistance Builds to Cipro, Study Says," New
York Times, 7 Feb. 2002, A18.
64. Kate Zernike and Christopher Drew, "Efforts to Track
Foreign Students Are Said to Lag," New York Times, 28 Jan.
2002, Al +.
65. U.S. Congress, Senate, Office of Technology Assessment
for the Congress, Hearing Before the Subcommittee on Computer
Services of the Committee on Rules and Administration, 92nd
Cong., 2nd Sess., 2 March 1972, 72.
66. Vary T. Coates, Technology and Public Policy: The
Process of Technology Assessment in the Federal Government
(Washington, D.C., Program of Policy Studies in Science and
Technology, The George Washington University) July 1972, I:14-
36.
67. U.S. Congress, House, Office of Technology Assessment:
Background and Status, Report to the Committee on Science and
Astronautics, 93rd Cong., 1st Sess., Aug. 1973, 14-17.
68. "Technology Assessment Act of 1972," Public Law 92-
484 (2 U.S.C 471-481).
69. U.S. Congress, Senate, Technology Assessment for the
Congress, Staff Study of the Subcommittee on Computer Services
of the Committee on Rules and Administration, 92nd Cong., 2nd
Sess., 1 Nov. 1972, 41.
70. U.S. Congress, Senate, Office of Technology Assessment,
Excerpt of Hearings Before a Subcommittee of the Committee on
Appropriations, Fiscal Years 1973 and 1974, 93rd Cong., 1st
Sess., 9 May & 20 June 1973, 11-14.
71. U.S. Congress, Senate, Congressional Support Agencies,
Prepared for the Commission on the Operation of the Senate,
94th Cong., 2nd Sess., 55.
72. David Dickson, The New Politics of Science (Chicago:
University of Chicago Press, 1998) 242.
73. U.S. Congress, Office of Technology Assessment, Annual
Report to Congress, Fiscal Year 1995, 6.
74. Ibid. 7-8.
75. Ford, "Small Influential Office Guides Congress Into
Space Age," 18.
76. Congressional Research Service, Library of Congress,
Office of Technology Assessment: Background and Status, Aug.
1973, 13-17.
77. "Technology Assessment Act," sec. 7(a).
78. U.S. Congress, Office of Technology Assessment, What
OTA Is--What QTA Does--How OTA Works, 1989, 8.
79. Mottur, Alfred E., Institutional Innovation in the
Congress: The Office of Technology Assessment (OTA),
"Sentinels of the Republic Scholar" Honors Thesis, Williams
College, Williamstown, MA, 1989, 37.
80. Ibid. 108.
81. U.S. Congress, Senate, Office of Technology Assessment,
Excerpt of Hearings, 1973, 11-14.
82. CQ Almanac, "Congress Cuts Legislative Funds," 1995,
11-61.
83. U.S. Congress, Senate Democratic Policy Committee,
Senate Voting Record, No. 316, "Legislative Branch
Appropriations, 1996, OTA," July 20, 1995.
84. CQ Almanac, 11-64
85. U.S. Congress, Office of Technology Assessment, Annual
Report, 36-38.
86. CQ Almanac, 11--64-65.
87. Ibid. 11-65.
88. U.S. Congress, Office of Technology Assessment, Annual
Report, 40.
89. "Technology Assessment Act," sec. 3(b), sec. 4(b),
and sec. 12(a).
90. Office of Technology Assessment, Technologies
Underlying Weapons of Mass Destruction, 78.