This is a really great summary and reference document, thanks for writing this! I have two comments:
1. There is a difference between detectable levels of RNA/DNA/Antigen and an active, transmissible infection. While most of the time this is not important when thinking about a global surveillance system, it is good to keep in mind especially in PoP testing.
Edit: You address my point 1 in your Part 2
2. You write:
However, while we can use animal surveillance systems to regularly monitor animals’ health and collect samples, we lack the capability of characterizing the pathogens effectively so as to predict their virulence and transmissibility to humans. This is a serious problem as it is infeasible to analyze and monitor every single pathogen strain found in animals. Microbiologists are working on this problem, but until then, zoonotic surveillance may not be suitable as an early-warning system
Kevin Esvelt has convincingly argued that we should not do this, because this would publish what and where viruses or pathogens are that could cause a pandemic to bad actors. It seems related to your point on “Potential for Dual-Use by Bad Actors”. While the technology itself may not be used by bad actors, the information gathered would immediately be an information hazard which could be used by bad actors.
Again, thanks a lot for this overview of the topic!
This is a really great summary and reference document, thanks for writing this! I have two comments:
1. There is a difference between detectable levels of RNA/DNA/Antigen and an active, transmissible infection. While most of the time this is not important when thinking about a global surveillance system, it is good to keep in mind especially in PoP testing.
Edit: You address my point 1 in your Part 2
2. You write:
Kevin Esvelt has convincingly argued that we should not do this, because this would publish what and where viruses or pathogens are that could cause a pandemic to bad actors. It seems related to your point on “Potential for Dual-Use by Bad Actors”. While the technology itself may not be used by bad actors, the information gathered would immediately be an information hazard which could be used by bad actors.
Again, thanks a lot for this overview of the topic!