Bioterrorism Preparedness and Response in Poland: Prevention, Surveillance, and Mitigation Planning

Krzysztof Goniewicz, Beata Osiak, Witold Pawłowski, Robert Czerski, Frederick M. Burkle, Dorota Lasota, Mariusz Goniewicz

Research output: Contribution to journalArticlepeer-review


Objectives:Biological weapons are one of the oldest weapons of mass destruction used by man. Their use has not only determined the outcome of battles, but also influenced the fate of entire civilizations. Although the use of biological weapons agents in a terrorist attack is currently unlikely, all services responsible for the surveillance and removal of epidemiological threats must have clear guidelines and emergency response plans.Methods:In the face of the numerous threats appearing in the world, it has become necessary to put the main emphasis on modernizing, securing, and maintaining structures in the field of medicine which are prepared for unforeseen crises and situations related to the use of biological agents.Results:This article presents Poland's current preparation to take action in the event of a bioterrorist threat. The study presents both the military aspect and procedures for dealing with contamination.Conclusions:In Poland, as in other European Union countries fighting terrorism, preparations should be made to defend against biological attacks, improve the flow of information on the European security system, strengthen research centers, train staff, create observation units and vaccination centers, as well as prepare hospitals for the hospitalization of patients - potential victims of bioterrorist attacks.

Original languageEnglish (US)
JournalDisaster medicine and public health preparedness
StateAccepted/In press - 2020
Externally publishedYes


  • biological threats detection
  • biological weapon
  • bioterrorism
  • Key Words:

ASJC Scopus subject areas

  • Public Health, Environmental and Occupational Health

Fingerprint Dive into the research topics of 'Bioterrorism Preparedness and Response in Poland: Prevention, Surveillance, and Mitigation Planning'. Together they form a unique fingerprint.

Cite this