Thursday 8 October 2015

Backdoor (computing), cryptosystem and algorithm

The threat of backdoors surfaced when multiuser and networked operating systems became widely adopted. Petersen and Turn discussed computer subversion in a paper published in the proceedings of the 1967 AFIPS Conference.[4] They noted a class of active infiltration attacks that use "trapdoor" entry points into the system to bypass security facilities and permit direct access to data. The use of the word trapdoor here clearly coincides with more recent definitions of a backdoor. However, since the advent of public key cryptography the term trapdoor has acquired a different meaning (see trapdoor function), and thus the term "backdoor" is now preferred. More generally, such security breaches were discussed at length in a RAND Corporation task force report published under ARPA sponsorship by J.P. Anderson and D.J. Edwards in 1970.[5]
A backdoor in a login system might take the form of a hard coded user and password combination which gives access to the system. A famous example of this sort of backdoor was used as a plot device in the 1983 film WarGames, in which the architect of the "WOPR" computer system had inserted a hardcoded password (his dead son's name) which gave the user access to the system, and to undocumented parts of the system (in particular, a video game-like simulation mode and direct interaction with the artificial intelligence).
Although the number of backdoors in systems using proprietary software (software whose source code is not publicly available) is not widely credited, they are nevertheless frequently exposed. Programmers have even succeeded in secretly installing large amounts of benign code as Easter eggs in programs, although such cases may involve official forbearance, if not actual permission.
Many computer worms, such as Sobig and Mydoom, install a backdoor on the affected computer (generally a PC on broadband running Microsoft Windows and Microsoft Outlook). Such backdoors appear to be installed so that spammers can send junk e-mail from the infected machines. Others, such as the Sony/BMG rootkit distributed silently on millions of music CDs through late 2005, are intended as DRM measures—and, in that case, as data gathering agents, since both surreptitious programs they installed routinely contacted central servers.
A sophisticated attempt to plant a backdoor in the Linux kernel, exposed in November 2003, added a small and subtle code change by subverting the revision control system.[6] In this case, a two-line change appeared to checkroot access permissions of a caller to the sys_wait4 function, but because it used assignment = instead of equality checking ==, it actually grantedpermissions to the system. This difference is easily overlooked, and could even be interpreted as an accidental typographical error, rather than an intentional attack.[7]
The mystery of why RSA would use a flawed, NSA-championed algorithm as the default random number generator for several of its encryption products appears to be solved, and the answer is utterly banal, if true: the NSA paid it to.
Reuters reports that RSA received $10m from the NSA in exchange for making the agency-backed Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG) its preferred random number algorithm, according to newly disclosed documents provided by whistleblower Edward Snowden.
If that figure sounds small, that's because it is. Tech giant EMC acquired RSA for $2.1bn in 2006 – around the same time as the backroom NSA deal – so it seems odd that RSA would kowtow to the g-men so cheaply.
But according to Reuters, at the time, things weren't looking so good for the division of RSA that was responsible for its BSafe encryption libraries. In 2005, those tools brought in a mere $27.5m of RSA's $310m in annual revenue, or just 8.9 per cent.
By accepting $10m from the NSA, as Reuters claims, the BSafe division managed to increase its contribution to RSA's bottom line by more than a third.
It wasn't long after RSA switched to Dual EC DRBG as its default, however, that security experts began to question whether this new algorithm was really all it was cracked up to be. In 2007, a pair of Microsoft researchers observed that the code contained flaws that had the potential to open "a perfect backdoor" in any encryption that made use of it [PDF].
Such concerns remained largely within the province of security experts until earlier this year, when documents leaked by Snowden confirmed the existence of NSA-created backdoors in encryption based on RSA's technology.
In late September, RSA itself even warned its customers that they should choose a different cryptographically secure random number generator while it reviews its own products for potential vulnerabilities. OpenSSL, the software library used by countless applications to perform encryption and decryption, has also written off Dual EC DRBG. How the NSA came to be involved with the algorithm is discussed in detail here by computer security expert Bruce Schneier.
For its part, however, RSA maintains that it never conspired with the NSA to compromise the security of its products, and that if the government knew how to break RSA's encryption, it never let on.
"RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products," the company wrote in a canned statement. "Decisions about the features and functionality of RSA products are our own." ®=
In January 2014, a backdoor was discovered in certain Samsung Androidproducts, like the Galaxy devices. The Samsung proprietary Android versions are fitted with a backdoor that provides remote access to the data stored on the device. In particular, the Samsung Android software that is in charge of handling the communications with the modem, using the Samsung IPC protocol, implements a class of requests known as remote file server (RFS) commands, that allows the backdoor operator to perform via modem remote I/O operations on the device hard disk or other storage. As the modem is running Samsung proprietary Android software, it is likely that it offers over-the-air remote control that could then be used to issue the RFS commands and thus to access the file system on the device.[8]

Harder to detect backdoors involve modifying object code, rather than source code – object code is much harder to inspect, as it is designed to be machine-readable, not human-readable. These backdoors can be inserted either directly in the on-disk object code, or inserted at some point during compilation, assembly linking, or loading – in the latter case the backdoor never appears on disk, only in memory. Object code backdoors are difficult to detect by inspection of the object code, but are easily detected by simply checking for changes (differences), notably in length or in checksum, and in some cases can be detected or analyzed by disassembling the object code. Further, object code backdoors can be removed (assuming source code is available) by simply recompiling from source.
Thus for such backdoors to avoid detection, all extant copies of a binary must be subverted, and any validation checksums must also be compromised, and source must be unavailable, to prevent recompilation. Alternatively, these other tools (length checks, diff, checksumming, disassemblers) can themselves be compromised to conceal the backdoor, for example detecting that the subverted binary is being checksummed and returning the expected value, not the actual value. To conceal these further subversions, the tools must also conceal the changes in themselves – for example, a subverted checksummer must also detect if it is checksumming itself (or other subverted tools) and return false values. This leads to extensive changes in the system and tools being needed to conceal a single change.
Because object code can be regenerated by recompiling (reassembling, relinking) the original source code, making a persistent object code backdoor (without modifying source code) requires subverting the compileritself – so that when it detects that it is compiling the program under attack it inserts the backdoor – or alternatively the assembler, linker, or loader. As this requires subverting the compiler, this in turn can be fixed by recompiling the compiler, removing the backdoor insertion code. This defense can in turn be subverted by putting a source meta-backdoor in the compiler, so that when it detects that it is compiling itself it then inserts this meta-backdoor generator, together with the original backdoor generator for the original program under attack. After this is done, the source meta-backdoor can be removed, and the compiler recompiled from original source with the compromised compiler executable: the backdoor has been bootstrapped. This attack dates to Karger & Schell (1974), and was popularized in Thompson (1984), entitled "Reflections on Trusting Trust"; it is hence colloquially known as the "Trusting Trust" attack. See compiler backdoors, below, for details. Analogous attacks can target lower levels of the system, such as the operating system, and can be inserted during the system booting process; these are also mentioned in Karger & Schell (1974), and now exist in the form of boot sector viruses.[9]

Earlier this week a number of organizations, companies, and individuals wrote a letter to the President of the United States in which they expressed their worries about the suggestion from US officials that companies should refrain from providing products with strong encryption unless ‘those companies also weaken their security in order to maintain the capability to decrypt their customers’ data at the government’s request’.
Let me be clear: I strongly support this letter.
The arguments made in the letter are not new. Encryption is one of the enablers of the Internet economy that protects users from all sorts of harm. Building in encryption "backdoors" would actually decrease the trust in the Internet and therefore its utility.
Of course, there are also cases in which encryption is put to bad use. The most common examples are use of encryption by terrorists and criminals. The issues that law enforcement face with the application of encryption by the bad actors are not trivial. But I do not think that creating backdoors will eliminate any of those concerns.
One of my theses about the success of the Internet is that the technology on which its been built is highly democratized. The sharing of knowledge and implementation through Open Source and Open Standards brings the agility and innovation that makes the Internet flourish: The Internet technology is based on highly democratized knowledge. Highly democratized knowledge means that the bad actors can also get their hands on technology and wreak havoc.
The same goes for encryption. While it is not easy to build an implementation of an encryption system, the mathematical theory on which encryption is built is public knowledge and there are quite a few open-source reference implementations available of encryption technology. As a result, even if vendors are forced to build backdoors, the bad guys will still be able to use unbreakable encryption. I am pretty sure that any law or regulation that forces a backdoor in a products will not apply to the ransomware that some unfortunate victim may find infecting their computers.
As an engineer, I don't like building vulnerabilities into systems and that is essentially what a backdoor is. Anyone thinking that those backdoor-vulnerabilities will not be found, no matter how well protected they are, seems to deny the curiosity of smart technologists. Curious technologists, security researchers, hackers, however you want to call them, find vulnerabilities in software on a daily basis. (The logjam vulnerability being the example of the day. Ironically, according to the researchers that weakness is partly a result of earlier attempts to restrict the utility of encryption.) And while a lot of these vulnerabilities are responsibly disclosed, we must assume that curiosity and clue is also bestowed on some of the bad actors. Inserting backdoors is simply a path to leaving us all unprotected.
At the Internet Society we aspire to pervasive implementation of end-to-end encryption. We realize that aspiration comes with a set of difficult technical, economic, and policy questions. Technical questions have to do with the ability to manage traffic, cache content, and implement bona fide security policies. Economic questions have to do with transit costs absent the ability to cache and perhaps around data monetization. Policy question focus on whether law enforcement agencies can do their work versus the security of individuals around the globe. The answers will not be easy, especially since there doesn’t seem to be a choice with encryption; it’s either all or nothing and both choices may lead to lives threatened.
Let me end on a more positive note: Even though encryption technology is highly democratized it is not easy to build and implement. There are numerous pitfalls that can all lead to potential exploits by bad actors. How can you have the highest certainty that you have the most secure implementation for the encryption box you are going to be relying on for e.g. your e-commerce application, or the storage of your customers credit cards?
Open and peer-reviewed standards, designs and implementations provide high assurance that such vulnerabilities do not exist. We support our aspiration for pervasive end-to-end encryption by supporting the CrypTech projectThe project sets out to build a trustable piece of hardware that can be used to store keys and perform encryption for all sorts of applications that rely on encryption, e.g. any e-commerce application.  I would ask you to visit and support that project.  Similarly, efforts to make TLS usage more common and to deploy additional layers of trust through technologies such as the DANE protocol are critical for encryption to be available for all.
We shouldn't shy away from some difficult challenges but strong encryption will continue to be a reality. I believe that open development, wide deployment, and usage of strong encryption makes the Internet more trustworthy and is critical to realize the opportunities and full potential of the Internet.

In recent months top American and British political leaders have been arguing that there should be no encrypted communication system that they cannot unlock whenever they deem it necessary to do so. Officials like the director of the National Security Agency, Michael Rogers, and Prime Minister David Cameron have said that unless technology companies grant them the technical equivalent of a back door to snoop on encrypted communications, the world’s bad guys will “go dark” and become untraceable.
Now, 13 prominent encryption and information security experts have responded with an important report that explains in plain English why what Mr. Rogers and Mr. Cameron are asking for would be terrible for the Internet.
To start, giving governments back-door access to encrypted technologies like email servers, video chats, online banking services and so on would make those systems much more vulnerable to hacking. Furthermore, giving encryption keys to governments would increase the risk of those keys being stolen by criminals and spies from other countries.
There is yet another big problem: How should technology companies decide which governments they should give back-door access to? If the United States and Britain have access to, say, all of Google’s encrypted servers, the governments of China, Russia and many other nations will surely demand similar privileges. Or should Western tech companies simply stop doing business in some foreign countries?
This is hardly a new debate. In the 1990s, the Clinton administration proposed requiring the tech industry to use the Clipper chip, a device that would help the government decrypt communications. Businesses, technical experts and civil liberties groups defeated that effort by showing that hackers and criminals could easily exploit that system.
Not having such an invasive back door into Internet-based communications systems has hardly hurt the government’s ability to conduct surveillance. In fact, Edward Snowden revealed that American and British agencies have had extensive access to our communications for years. If anybody has been kept in the dark, it is ordinary citizens.
The Congress is forced now to struggle with that, and they’re going to have to listen to these various arguments about protection and safety on the one hand and preservation and privacy and confidentiality on the other,” Cerf said, as reported by The Hill.
The Obama administration has been trying to force companies like Google and Apple to create defects in encryption so the FBI and other government agencies can gain access to people’s information; this despite mounting criticism over the plan – a criticism that’s shared by Cerf.








Wednesday 6 May 2015

Ebola

Ebola virus disease (EVD; also Ebola hemorrhagic fever, or EHF), or simply Ebola, is a disease of humans and other primates caused by ebolaviruses. Signs and symptoms typically start between two days and three weeks after contracting the virus with a fever,sore throat, muscular pain, and headaches. Then, vomiting, diarrhea and rash usually follow, along with decreased function of the liver and kidneys. At this time some people begin to bleed both internally and externally.[1] The disease has a high risk of death, killing between 25 and 90 percent of those infected with an average of about 50 percent.[1] This is often due to low blood pressure from fluid loss, and typically follows six to sixteen days after symptoms appear.[2]
The virus spreads by direct contact with body fluids, such as blood, of an infected human or other animals.[1] This may also occur through contact with an item recently contaminated with bodily fluids.[1] Spread of the disease through the air between primates, including humans, has not been documented in either laboratory or natural conditions.[3] Semen orbreast milk of a person after recovery from EVD may still carry the virus for several weeks to months.[1][4] Fruit bats are believed to be the normal carrier in nature, able to spread the virus without being affected by it. Other diseases such as malariacholeratyphoid fever,meningitis and other viral hemorrhagic fevers may resemble EVD. Blood samples are tested for viral RNA, viral antibodies or for the virus itself to confirm the diagnosis.[1]
Control of outbreaks requires coordinated medical services, alongside a certain level of community engagement. The medical services include rapid detection of cases of disease,contact tracing of those who have come into contact with infected individuals, quick access to laboratory services, proper healthcare for those who are infected, and proper disposal of the dead through cremation or burial.[1][5] Samples of body fluids and tissues from people with the disease should be handled with special caution. Prevention includes limiting the spread of disease from infected animals to humans. This may be done by handling potentially infected bush meat only while wearing protective clothing and by thoroughly cooking it before eating it. It also includes wearing proper protective clothing and washing hands when around a person with the disease.[1]
No specific treatment or vaccine for the virus is available, although a number of potential treatments are being studied. Supportive efforts, however, improve outcomes. This includes either oral rehydration therapy (drinking slightly sweetened and salty water) or givingintravenous fluids as well as treating symptoms. The disease was first identified in 1976 in two simultaneous outbreaks, one in Nzara, and the other in Yambuku, a village near the Ebola River from which the disease takes its name.[6] EVD outbreaks occur intermittently in tropical regions of sub-Saharan Africa.[1] Between 1976 and 2013, the World Health Organization reports a total of 24 outbreaks involving 1,716 cases.[1][7] The largest outbreak is the ongoing epidemic in West Africa centered in GuineaSierra Leone and Liberia.[8][9][10] As of 3 May 2015, this outbreak has 26,571 reported cases resulting in 10,995 deaths.[11] The length of time between exposure to the virus and the development of symptoms (incubation period) is between 2 to 21 days,[1][12] usually between 4 to 10 days.[13] However, recent estimates based on mathematical models predict that around 5% of cases may take greater than 21 days to develop.[14]
Symptoms usually begin with a sudden influenza-like stage characterized by feeling tiredfever,weaknessdecreased appetitemuscular painjoint pain, headache, and sore throat.[1][13][15][16]The fever is usually higher than 38.3 °C (101 °F).[17] This is often followed by vomiting, diarrheaand abdominal pain.[16] Next, shortness of breath and chest pain may occur, along with swelling,headaches and confusion.[16] In about half of the cases, the skin may develop a maculopapular rash, a flat red area covered with small bumps, 5 to 7 days after symptoms begin.[13][17]
In some cases, internal and external bleeding may occur.[1] This typically begins five to seven days after the first symptoms.[18] All infected people show some decreased blood clotting.[17]Bleeding from mucous membranes or from sites of needle punctures has been reported in 40–50 percent of cases.[19] This may cause vomiting bloodcoughing up of blood, or blood in stool.[20] Bleeding into the skin may createpetechiaepurpuraecchymoses or hematomas (especially around needle injection sites).[21] Bleeding into the whites of the eyes may also occur. Heavy bleeding is uncommon; if it occurs, it is usually located within the gastrointestinal tract.[17][22]
Recovery may begin between 7 and 14 days after first symptoms.[16] Death, if it occurs, follows typically 6 to 16 days from first symptoms and is often due to low blood pressure from fluid loss.[2] In general, bleeding often indicates a worse outcome, and blood loss may result in death.[15] People are often in a coma near the end of life.[16] Those who survive often have ongoing muscular and joint pain, liver inflammation, decreased hearing, and may have constitutional symptoms such as feeling tired, continued weakness, decreased appetite, and difficulty returning to pre-illness weight.[16][23] Additionally they develop antibodies against Ebola that last at least 10 years, but it is unclear if they are immune to repeated infections.[24] If someone recovers from Ebola, they can no longer transmit the disease.[24]

VD in humans is caused by four of five viruses of the genus Ebolavirus. The four are Bundibugyo virus (BDBV), Sudan virus (SUDV),Taï Forest virus (TAFV) and one simply called Ebola virus (EBOV, formerly Zaire Ebola virus).[25] EBOV, species Zaire ebolavirus, is the most dangerous of the known EVD-causing viruses, and is responsible for the largest number of outbreaks.[26] The fifth virus, Reston virus (RESTV), is not thought to cause disease in humans, but has caused disease in other primates.[27][28] All five viruses are closely related to marburgviruses.[25]

Ebolaviruses contain single-stranded, non-infectious RNA genomes.[29] Ebolavirus genomes contain seven genes including 3'-UTR-NP-VP35-VP40-GP-VP30-VP24-L-5'-UTR.[21][30] The genomes of the five different ebolaviruses (BDBV, EBOV, RESTV, SUDV and TAFV) differ insequence and the number and location of gene overlaps. As with all filoviruses, ebolavirus virions are filamentous particles that may appear in the shape of a shepherd's crook, of a "U" or of a "6," and they may be coiled, toroid or branched.[30][31] In general, ebolavirions are 80 nanometers (nm) in width and may be as long as 14,000 nm.[32]
Their life cycle is thought to begin with a virion attaching to specific cell-surface receptors such asC-type lectinsDC-SIGN, or integrins, which is followed by fusion of the viral envelope with cellular membranes.[33] The virions taken up by the cell then travel to acidic endosomes and lysosomes where the viral envelope glycoprotein GP is cleaved.[33] This processing appears to allow the virus to bind to cellular proteins enabling it to fuse with internal cellular membranes and release the viralnucleocapsid.[33] The Ebolavirus structural glycoprotein (known as GP1,2) is responsible for the virus' ability to bind to and infect targeted cells.[34] The viral RNA polymerase, encoded by the L gene, partially uncoats the nucleocapsid and transcribes the genes into positive-strand mRNAs, which are then translated into structural and nonstructural proteins. The most abundant protein produced is the nucleoprotein, whose concentration in the host cell determines when L switches from gene transcription to genome replication. Replication of the viral genome results in full-length, positive-strand antigenomes that are, in turn, transcribed into genome copies of negative-strand virus progeny.[35] Newly synthesized structural proteins and genomes self-assemble and accumulate near the inside of the cell membrane. Virions bud off from the cell, gaining their envelopes from the cellular membrane from which they bud from. The mature progeny particles then infect other cells to repeat the cycle. The genetics of the Ebola virus are difficult to study because of EBOV's virulent characteristics.[36]Between people, Ebola disease spreads only by direct contact with the blood or body fluids of a person who has developed symptoms of the disease.[37][38][39] Body fluids that may contain ebola viruses include saliva, mucus, vomit, feces, sweat, tears, breast milk, urine and semen.[24] The WHO states that only people who are very sick are able to spread Ebola disease in saliva, and whole virus has not been reported to be transmitted through sweat. Most people spread the virus through blood, feces and vomit.[40] Entry points for the virus include the nose, mouth, eyes, open wounds, cuts and abrasions.[24] Ebola may be spread through large droplets; however, this is believed to occur only when a person is very sick.[41] This can happen if a person is splashed with droplets.[41] Contact with surfaces or objects contaminated by the virus, particularly needles and syringes, may also transmit the infection.[42][43] The virus is able to survive on objects for a few hours in a dried state, and can survive for a few days within body fluids.[24]
The Ebola virus may be able to persist for more than 3 months in the semen after recovery, which could lead to infections via sexual intercourse.[44][45] Ebola may also occur in the breast milk of women after recovery, and it is not known when it is safe to breastfeed again.[4] Otherwise, people who have recovered are not infectious.[42]
The potential for widespread infections in countries with medical systems capable of observing correct medical isolation procedures is considered low.[46] Usually when someone has symptoms of the disease, they are unable to travel without assistance.[47]
Dead bodies remain infectious; thus, people handling human remains in practices such as traditional burial rituals or more modern processes such as embalming are at risk.[46] 69% of the cases of Ebola infections in Guinea during the 2014 outbreak are believed to have been contracted via unprotected (or unsuitably protected) contact with infected corpses during certain Guinean burial rituals.[48][49]
Health-care workers treating people with Ebola are at greatest risk of infection.[42] The risk increases when they do not have appropriate protective clothing such as masks, gowns, gloves and eye protection; do not wear it properly; or handle contaminated clothing incorrectly.[42] This risk is particularly common in parts of Africa where the disease mostly occurs and health systems function poorly.[50]There has been transmission in hospitals in some African countries that reuse hypodermic needles.[51][52] Some health-care centers caring for people with the disease do not have running water.[53] In the United States the spread to two medical workers treating infected patients prompted criticism of inadequate training and procedures.[54]
Human-to-human transmission of EBOV through the air has not been reported to occur during EVD outbreaks,[3] and airborne transmission has only been demonstrated in very strict laboratory conditions, and then only from pigs to primates, but not from primates to primates.[37][43] Spread of EBOV by water, or food other than bushmeat, has not been observed.[42][43] No spread by mosquitos or other insects has been reported.[42]
The apparent lack of airborne transmission among humans is believed to be due to low levels of the virus in the lungs and other parts of the respiratory system of primates, insufficient to cause new infections.[55] A number of studies examining airborne transmission broadly concluded that transmission from pigs to primates could happen without direct contact because, unlike humans and primates, pigs with EVD get very high ebolavirus concentrations in their lungs, and not their bloodstream.[56] Therefore pigs with EVD can spread the disease through droplets in the air or on the ground when they sneeze or cough.[57] By contrast, humans and other primates accumulate the virus throughout their body and specifically in their blood, but not very much in their lungs.[57] It is believed that this is the reason researchers have observed pig to primate transmission without physical contact, but no evidence has been found of primates being infected without actual contact, even in experiments where infected and uninfected primates shared the same air.[56][57]Although it is not entirely clear how Ebola initially spreads from animals to humans, the spread is believed to involve direct contact with an infected wild animal or fruit bat.[42] Besides bats, other wild animals sometimes infected with EBOV include several monkey species, chimpanzees, gorillas, baboons and duikers.[61]
Animals may become infected when they eat fruit partially eaten by bats carrying the virus.[62]Fruit production, animal behavior and other factors may trigger outbreaks among animal populations.[62]
Evidence indicates that both domestic dogs and pigs can also be infected with EBOV.[63] Dogs do not appear to develop symptoms when they carry the virus, and pigs appear to be able to transmit the virus to at least some primates.[63] Although some dogs in an area in which a human outbreak occurred had antibodies to EBOV, it is unclear whether they played a role in spreading the disease to people.[63]

Reservoir

The natural reservoir for Ebola has yet to be confirmed; however, bats are considered to be the most likely candidate species.[43] Three types of fruit bats (Hypsignathus monstrosusEpomops franqueti and Myonycteris torquata) were found to possibly carry the virus without getting sick.[64] As of 2013, whether other animals are involved in its spread is not known.[63] Plants, arthropods and birds have also been considered possible viral reservoirs.[1]
Bats were known to roost in the cotton factory in which the first cases of the 1976 and 1979 outbreaks were observed, and they have also been implicated in Marburg virus infections in 1975 and 1980.[65] Of 24 plant and 19 vertebrate species experimentally inoculated with EBOV, only bats became infected.[66] The bats displayed no clinical signs of disease, which is considered evidence that these bats are a reservoir species of EBOV. In a 2002–2003 survey of 1,030 animals including 679 bats from Gabon and the Republic of the Congo, 13 fruit bats were found to contain EBOV RNA.[67] Antibodies against Zaire and Reston viruses have been found in fruit bats inBangladesh, suggesting that these bats are also potential hosts of the virus and that the filoviruses are present in Asia.[68]
Between 1976 and 1998, in 30,000 mammals, birds, reptiles, amphibians and arthropods sampled from regions of EBOV outbreaks, no Ebola virus was detected apart from some genetic traces found in six rodents (belonging to the species Mus setulosus and Praomys) and one shrew (Sylvisorex ollula) collected from the Central African Republic.[65][69] However, further research efforts have not confirmed rodents as a reservoir.[70] Traces of EBOV were detected in the carcasses of gorillas and chimpanzees during outbreaks in 2001 and 2003, which later became the source of human infections. However, the high rates of death in these species resulting from EBOV infection make it unlikely that these species represent a natural reservoir for the virus.[65]imilar to other filoviruses, EBOV replicates very efficiently in many cells, producing large amounts of virus in monocytesmacrophagesdendritic cells and other cells including liver cells,fibroblasts, and adrenal gland cells.[71] Viral replication triggers the release of high levels of inflammatory chemical signals and leads to a septic state.[23]
EBOV is thought to infect humans through contact with mucous membranes or through skin breaks.[37] Once infected, endothelial cells (cells lining the inside of blood vessels), liver cells, and several types of immune cells such as macrophages, monocytes, and dendritic cells are the main targets of infection.[37] Following infection with the virus, the immune cells carry the virus to nearby lymph nodes where further reproduction of the virus takes place.[37] From there, the virus can enter the bloodstream and lymphatic system and spread throughout the body.[37]Macrophages are the first cells infected with the virus, and this infection results in programmed cell death.[32] Other types of white blood cells, such as lymphocytes, also undergo programmed cell death leading to an abnormally low concentration of lymphocytes in the blood.[37] This contributes to the weakened immune response seen in those infected with EBOV.[37]
Endothelial cells may be infected within 3 days after exposure to the virus.[32] The breakdown of endothelial cells leading to blood vessel injury can be attributed to EBOV glycoproteins. This damage occurs due to the synthesis of Ebola virus glycoprotein (GP), which reduces the availability of specific integrins responsible for cell adhesion to the intercellular structure and causes liver damage, leading to improper clotting. The widespread bleeding that occurs in affected people causes swelling and shock due to loss of blood volume.[72] The dysfunction in bleeding and clotting commonly seen in EVD has been attributed to increased activation of the extrinsic pathway of the coagulation cascade due to excessive tissue factorproduction by macrophages and monocytes.[13]
After infection, a secreted glycoprotein, small soluble glycoprotein (sGP or GP) is synthesized. EBOV replication overwhelms protein synthesis of infected cells and the host immune defenses. The GP forms a trimeric complex, which tethers the virus to the endothelial cells. The sGP forms a dimeric protein that interferes with the signaling of neutrophils, another type of white blood cell, which enables the virus to evade the immune system by inhibiting early steps of neutrophil activation. The presence of viral particles and the cell damage resulting from viruses budding out of the cell causes the release of chemical signals (such as TNF-αIL-6 and IL-8), which are molecular signals for fever and inflammation.

Immune system evasion

Filoviral infection also interferes with proper functioning of the innate immune system.[33][35] EBOV proteins blunt the human immune system's response to viral infections by interfering with the cells' ability to produce and respond to interferon proteins such as interferon-alphainterferon-beta, and interferon gamma.[34][73]
The VP24 and VP35 structural proteins of EBOV play a key role in this interference. When a cell is infected with EBOV, receptors located in the cell's cytosol (such as RIG-I and MDA5) or outside of the cytosol (such as Toll-like receptor 3 (TLR3)TLR7TLR8 and TLR9), recognize infectious molecules associated with the virus.[34] On TLR activation, proteins including interferon regulatory factor 3 andinterferon regulatory factor 7 trigger a signaling cascade that leads to the expression of type 1 interferons.[34] The type 1 interferons are then released and bind to the IFNAR1 and IFNAR2 receptors expressed on the surface of a neighboring cell.[34] Once interferon has bound to its receptors on the neighboring cell, the signaling proteins STAT1 and STAT2 are activated and move to the cell's nucleus.[34]This triggers the expression of interferon-stimulated genes, which code for proteins with antiviral properties.[34] EBOV's V24 protein blocks the production of these antiviral proteins by preventing the STAT1 signaling protein in the neighboring cell from entering the nucleus.[34] The VP35 protein directly inhibits the production of interferon-beta.[73] By inhibiting these immune responses, EBOV may quickly spread throughout the body.[32]

Diagnosis

When EVD is suspected in a person, his or her travel and work history, along with an exposure to wildlife, are important factors to consider with respect to further diagnostic efforts.

Laboratory testing

Possible non-specific laboratory indicators of EVD include a low platelet count; an initially decreased white blood cell count followed by anincreased white blood cell count; elevated levels of the liver enzymes alanine aminotransferase (ALT) and aspartate aminotransferase(AST); and abnormalities in blood clotting often consistent with disseminated intravascular coagulation (DIC) such as a prolongedprothrombin timepartial thromboplastin time, and bleeding time.[74] Filovirions, such as EBOV, may be identified by their unique filamentous shapes in cell cultures examined with electron microscopy, but this method cannot distinguish the various filoviruses.[75]
The specific diagnosis of EVD is confirmed by isolating the virus, detecting its RNA or proteins, or detecting antibodies against the virus in a person's blood. Isolating the virus by cell culture, detecting the viral RNA by polymerase chain reaction (PCR)[13] and detecting proteins by enzyme-linked immunosorbent assay (ELISA) are methods best used in the early stages of the disease and also for detecting the virus in human remains. Detecting antibodies against the virus is most reliable in the later stages of the disease and in those who recover.[76]IgM antibodies are detectable two days after symptom onset and IgG antibodies can be detected 6 to 18 days after symptom onset.[13]During an outbreak, isolation of the virus via cell culture methods is often not feasible. In field or mobile hospitals, the most common and sensitive diagnostic methods are real-time PCR and ELISA.[77] In 2014, with new mobile testing facilities deployed in parts of Liberia, test results were obtained 3–5 hours after sample submission.[78] In 2015 a rapid antigen test which gives results in 15 minutes was approved for use by WHO. It is able to confirm Ebola in 92% of those affected and rule it out in 85% of those not affected.[79]

Differential diagnosis

Early symptoms of EVD may be similar to those of other diseases common in Africa, including malaria and dengue fever.[15] The symptoms are also similar to those of Marburg virus disease and other viral hemorrhagic fevers.[80]
The complete differential diagnosis is extensive and requires consideration of many other infectious diseases such as typhoid fever,shigellosisrickettsial diseasescholerasepsisborreliosisEHEC enteritisleptospirosisscrub typhusplagueQ fevercandidiasis,histoplasmosistrypanosomiasisvisceral leishmaniasismeasles, and viral hepatitis among others.[81]
Non-infectious diseases that may result in symptoms similar to those of EVD include acute promyelocytic leukemiahemolytic uremic syndromesnake envenomationclotting factor deficiencies/platelet disorders, thrombotic thrombocytopenic purpurahereditary hemorrhagic telangiectasiaKawasaki disease, and warfarin poisoning.[77][82][83][84]eople who care for those infected with Ebola should wear protective clothing including masks, gloves, gowns and goggles.[85] The US Centers for Disease Control (CDC) recommend that the protective gear leaves no skin exposed.[86]These measures are also recommended for those who may handle objects contaminated by an infected person's body fluids.[87] In 2014, the CDC began recommending that medical personnel receive training on the proper suit-up and removal of personal protective equipment (PPE); in addition, a designated person, appropriately trained in biosafety, should be watching each step of these procedures to ensure they are done correctly.[86] In Sierra Leone, the typical training period for the use of such safety equipment lasts approximately 12 days.[88]
The infected person should be in barrier-isolation from other people.[85] All equipment, medical waste, patient waste and surfaces that may have come into contact with body fluids need to be disinfected.[87] During the 2014 outbreak, kits were put together to help families treat Ebola disease in their homes, which include protective clothing as well as chlorine powder and other cleaning supplies.[89]Education of those who provide care in these techniques, and the provision of such barrier-separation supplies has been a priority of Doctors Without Borders.[90]
Ebolaviruses can be eliminated with heat (heating for 30 to 60 minutes at 60 °C or boiling for 5 minutes). To disinfect surfaces, some lipid solvents such as some alcohol-based products, detergents, sodium hypochlorite (bleach) or calcium hypochlorite (bleaching powder), and other suitable disinfectants may be used at appropriate concentrations.[61][91] Education of the general public about the risk factors for Ebola infection and of the protective measures individuals may take to prevent infection is recommended by the World Health Organization.[1]These measures include avoiding direct contact with infected people and regular hand washingusing soap and water.[92]
Bushmeat, an important source of protein in the diet of some Africans, should be handled and prepared with appropriate protective clothing and thoroughly cooked before consumption.[1]Some research suggests that an outbreak of Ebola disease in the wild animals used for consumption may result in a corresponding human outbreak. Since 2003, such animal outbreaks have been monitored to predict and prevent Ebola outbreaks in humans.[93]
If a person with Ebola disease dies, direct contact with the body should be avoided.[85] Certain burial rituals, which may have included making various direct contacts with a dead body, require reformulation such that they consistently maintain a proper protective barrier between the dead body and the living.[94][95][96] Social anthropologists may help find alternatives to traditional rules for burials.[97]
Transportation crews are instructed to follow a certain isolation procedure should anyone exhibit symptoms resembling EVD.[98] As of August 2014, the WHO does not consider travel bans to be useful in decreasing spread of the disease.[47] In October 2014, the CDC defined four risk levels used to determine the level of 21-day monitoring for symptoms and restrictions on public activities.[99] In the United States, the CDC recommends that restrictions on public activity, including travel restrictions, are not required for the following defined risk levels:[99]
  • having been in a country with widespread Ebola disease transmission and having no known exposure (low risk); or having been in that country more than 21 days ago (no risk)
  • encounter with a person showing symptoms; but not within 3 feet of the person with Ebola without wearing PPE; and no direct contact of body fluids
  • having had brief skin contact with a person showing symptoms of Ebola disease when the person was believed to be not very contagious (low risk)
  • in countries without widespread Ebola disease transmission: direct contact with a person showing symptoms of the disease while wearing PPE (low risk)
  • contact with a person with Ebola disease before the person was showing symptoms (no risk).
The CDC recommends monitoring for the symptoms of Ebola disease for those both at "low risk" and at higher risk.[99]
In laboratories where diagnostic testing is carried out, biosafety level 4-equivalent containment is required.[100] Laboratory researchers must be properly trained in BSL-4 practices and wear proper PPE.[100]

Isolation

Isolation refers to separating those who are sick from those who are not. Quarantine refers to separating those who may have been exposed to a disease until they either show signs of the disease or are no longer at risk.[101] Quarantine, also known as enforced isolation, is usually effective in decreasing spread.[102][103] Governments often quarantine areas where the disease is occurring or individuals who may transmit the disease outside of an initial area.[104] In the United States, the law allows quarantine of those infected with ebolaviruses.[105]

Contact tracing

Contact tracing is considered important to contain an outbreak. It involves finding everyone who had close contact with infected individuals and watching for signs of illness for 21 days. If any of these contacts comes down with the disease, they should be isolated, tested and treated. Then the process is repeated by tracing the contacts' contacts.[106][107]

Management

No specific treatment is currently approved.[108] The Food and Drug Administration (FDA) advises people to be careful of advertisements making unverified or fraudulent claims of benefits supposedly gained from various anti-Ebola products.[109][110]reatment is primarily supportive in nature.[111] Early supportive care with rehydration and symptomatic treatment improves survival.[1] Rehydration may be via the oral or by intravenousroute.[111] These measures may include management of painnauseafever and anxiety.[111] The World Health Organization recommends avoiding the use of aspirin or ibuprofen for pain due to the bleeding risk associated with use of these medications.[112]
Blood products such as packed red blood cellsplatelets or fresh frozen plasma may also be used.[111] Other regulators of coagulation have also been tried including heparin in an effort to prevent disseminated intravascular coagulation and clotting factors to decrease bleeding.[111]Antimalarial medications and antibiotics are often used before the diagnosis is confirmed,[111]though there is no evidence to suggest such treatment helps. A number of experimental treatments are being studied.
If hospital care is not possible, the World Health Organization has guidelines for care at home that have been relatively successful. In such situations, recommendations include using towels soaked in bleach solutions when moving infected people or bodies and applying bleach on stains. It is also recommended that the caregivers wash hands with bleach solutions and cover their mouth and nose with a cloth.[113]

Intensive care

Intensive care is often used in the developed world.[21] This may include maintaining blood volume and electrolytes (salts) balance as well as treating any bacterial infections that may develop.[21] Dialysis may be needed for kidney failure, and extracorporeal membrane oxygenation may be used for lung dysfunction.[21]

Prognosis

EVD has a high risk of death in those infected which varies between 25 percent and 90 percent of those infected.[1][114] As of September 2014, the average risk of death among those infected is 50 percent.[1] The highest risk of death was 90 percent in the 2002–2003Republic of the Congo outbreak.[115]
Death, if it occurs, follows typically six to sixteen days after symptoms appear and is often due to low blood pressure from fluid loss.[2]Early supportive care to prevent dehydration may reduce the risk of death.[116]
If an infected person survives, recovery may be quick and complete. Prolonged cases are often complicated by the occurrence of long-term problems, such as inflammation of the testiclesjoint painsmuscular painskin peeling, or hair loss.[13] Eye symptoms, such as light sensitivityexcess tearingiritisiridocyclitischoroiditis, and blindness have also been described.[citation needed]

Epidemiology


For more about specific outbreaks, see List of Ebola outbreaks.
The disease typically occurs in outbreaks in tropical regions of Sub-Saharan Africa.[1]From 1976 (when it was first identified) through 2013, the World Health Organization reported 1,716 confirmed cases.[1][7] The largest outbreak to date is the ongoing 2014 West Africa Ebola virus outbreak, which has caused a large number of deaths inGuineaSierra Leone, and Liberia.[9][10]

2014 to 2015 West African outbreak


Increase over time in the cases and deaths during the 2013–2015 outbreak
In March 2014, the World Health Organization (WHO) reported a major Ebola outbreak in Guinea, a western African nation.[117]Researchers traced the outbreak to a one-year-old child who died December 2013.[118][119] The disease then rapidly spread to the neighboring countries of Liberiaand Sierra Leone. It is the largest Ebola outbreak ever documented, and the first recorded in the region.[117] On 8 August 2014, the WHO declared the epidemic to be an international public health emergency. Urging the world to offer aid to the affected regions, the Director-General said, "Countries affected to date simply do not have the capacity to manage an outbreak of this size and complexity on their own. I urge the international community to provide this support on the most urgent basis possible."[120] By mid-August 2014, Doctors Without Borders reported the situation in Liberia's capital Monrovia as "catastrophic" and "deteriorating daily". They reported that fears of Ebola among staff members and patients had shut down much of the city’s health system, leaving many people without treatment for other conditions.[121] In a 26 September statement, the WHO said, "The Ebola epidemic ravaging parts of West Africa is the most severe acute public health emergency seen in modern times. Never before in recorded history has a biosafety level four pathogen infected so many people so quickly, over such a broad geographical area, for so long."[122]
Intense contact tracing and strict isolation techniques largely prevented further spread of the disease in the countries that had imported cases, but in the most severely affected countries, Guinea, Liberia, and Sierra Leone, this disease is ongoing. As of 3 May 2015, 26,571 suspected cases and 10,995 deaths have been reported;[11][123] however, the WHO has said that these numbers may be underestimated.[124] Because they work closely with the body fluids of infected patients, healthcare workers have been especially vulnerable to catching the disease; in August 2014, the WHO reported that ten percent of the dead have been healthcare workers.[125]
In September 2014, it was estimated that the countries' capacity for treating Ebola patients was insufficient by the equivalent of 2,122 beds; by December there were a sufficient number of beds to treat and isolate all reported Ebola cases, although the uneven distribution of cases was resulting in serious shortfalls in some areas.[126] On 28 January 2015, the WHO reported that for the first time since the week ending 29 June 2014, there had been fewer than 100 new confirmed cases reported in a week in the three most-affected countries. The response to the epidemic then moved to a second phase, as the focus shifted from slowing transmission to ending the epidemic.[127]On 8 April 2015, the WHO reported a total of only 30 confirmed cases, the lowest weekly total since the third week of May 2014.[128]

2014 Ebola spread outside of West Africa

As of 15 October 2014, there have been 17 cases of Ebola treated outside of Africa, four of whom have died.[129]
In early October, Teresa Romero, a 44-year-old Spanish nurse, contracted Ebola after caring for a priest who had been repatriated from West Africa. This was the first transmission of the virus to occur outside of Africa.[130] On 20 October, it was announced that Teresa Romero had tested negative for the Ebola virus, suggesting that she may have recovered from Ebola infection.[131]
On 19 September, Eric Duncan flew from his native Liberia to Texas; 5 days later he began showing symptoms and visited a hospital, but was sent home. His condition worsened and he returned to the hospital on 28 September, where he died on 8 October.[132] Health officials confirmed a diagnosis of Ebola on 30 September—the first case in the United States.[54] On 12 October, the CDC confirmed that a nurse in Texas who had treated Duncan was found to be positive for the Ebola virus, the first known case of the disease to be contracted in the United States.[133] On 15 October, a second Texas health-care worker who had treated Duncan was confirmed to have the virus.[134] Both of these people have since recovered.[135]
On 23 October, a doctor in New York City, who returned to the United States from Guinea after working with Doctors Without Borders, tested positive for Ebola. His case is unrelated to the Texas cases.[136] The person has recovered and was discharged from Bellevue Hospital Center on November 11.[135] On 24 December 2014, a laboratory in Atlanta, Georgia reported that a technician had been exposed to Ebola.[137]
On 29 December 2014, Pauline Cafferkey, a British nurse who had just returned to Glasgow from Sierra Leone was diagnosed with Ebola at Glasgow's Gartnavel General Hospital.[138] After initial treatment in Glasgow, she was transferred by air to RAF Northolt, then to the specialist high-level isolation unit at the Royal Free Hospital in London for longer-term treatment.[139]

1995 to 2014

The second major outbreak occurred in Zaire (now the Democratic Republic of the Congo) in 1995, affecting 315 and killing 254.[1]
In 2000, Uganda had an outbreak affecting 425 and killing 224; in this case the Sudan virus was found to be the Ebola species responsible for the outbreak.[1]
In 2003 there was an outbreak in the Republic of the Congo that affected 143 and killed 128, a death rate of 90 percent, the highest death rate of a genus Ebolavirus outbreak to date.[140]
In 2004 a Russian scientist died from Ebola after sticking herself with an infected needle.[141]
Between April and August 2007, a fever epidemic[142] in a four-village region[143] of the Democratic Republic of the Congo was confirmed in September to have cases of Ebola.[144] Many people who attended the recent funeral of a local village chief died.[143] The 2007 outbreak eventually affected 264 individuals and resulted in the deaths of 187.[1]
On 30 November 2007, the Uganda Ministry of Health confirmed an outbreak of Ebola in the Bundibugyo District in Western Uganda. After confirmation of samples tested by the United States National Reference Laboratories and the Centers for Disease Control, the World Health Organization confirmed the presence of a new species of genus Ebolavirus, which was tentatively named Bundibugyo.[145]The WHO reported 149 cases of this new strain and 37 of those led to deaths.[1]
The WHO confirmed two small outbreaks in Uganda in 2012. The first outbreak affected 7 people and resulted in the death of 4 and the second affected 24, resulting in the death of 17. The Sudan variant was responsible for both outbreaks.[1]
On 17 August 2012, the Ministry of Health of the Democratic Republic of the Congo reported an outbreak of the Ebola-Bundibugyo variant[146] in the eastern region.[147][148] Other than its discovery in 2007, this was the only time that this variant has been identified as responsible for an outbreak. The WHO revealed that the virus had sickened 57 people and claimed 29 lives. The probable cause of the outbreak was tainted bush meat hunted by local villagers around the towns of Isiro and Viadana.[1][149]
In 2014, an outbreak of Ebola virus disease occurred in the Democratic Republic of the Congo (DRC). Genome-sequencing has shown that this outbreak was not related to the 2014–15 West Africa Ebola virus outbreak, but was of the same EBOV species, the Zaire species.[150] It began in August 2014 and was declared over in November of that year with a total of 66 cases and 49 deaths.[151] This is the 7th outbreak in the DRC, three of which occurred during the period when the country was known as Zaire.[152]

1976


CDC worker incinerates medical waste from Ebola patients in Zaire in 1976.

Sudan outbreak

The first known outbreak of EVD was identified only after the fact, occurring between June and November 1976 in Nzara, South Sudan,[25][153] (then part of Sudan) and was caused by Sudan virus (SUDV). The Sudan outbreak infected 284 people and killed 151. The first identifiable case in Sudan occurred on 27 June in a storekeeper in a cotton factory in Nzara, who was hospitalized on 30 June and died on 6 July.[21][154] Although the WHO medical staff involved in the Sudan outbreak were aware that they were dealing with a heretofore unknown disease, the actual "positive identification" process and the naming of the virus did not occur until some months later in the Democratic Republic of the Congo.[154]

Zaire outbreak

On 26 August 1976, a second outbreak of EVD began in Yambuku, a small rural village inMongala District in northern Zaire (now known as the Democratic Republic of the Congo).[155][156]This outbreak was caused by EBOV, formerly designated Zaire ebolavirus, which is a different member of the genus Ebolavirus than in the first Sudan outbreak. The first person infected with the disease was village school headmaster Mabalo Lokela, who began displaying symptoms on 26 August 1976.[157] Lokela had returned from a trip to Northern Zaire near the Central African Republic border, having visited the Ebola River between 12 and 22 August. He was originally believed to have malaria and was givenquinine. However, his symptoms continued to worsen, and he was admitted to Yambuku Mission Hospital on 5 September. Lokela died on 8 September, 14 days after he began displaying symptoms.[158][159][160]
Soon after Lokela's death, others who had been in contact with him also died, and people in the village of Yambuku began to panic. This led the country's Minister of Health along with Zaire President Mobutu Sese Seko to declare the entire region, including Yambuku and the country's capital, Kinshasa, a quarantine zone. No one was permitted to enter or leave the area, with roads, waterways, and airfields placed under martial law. Schools, businesses and social organizations were closed.[161] Researchers from the CDC, including Peter Piot, co-discoverer of Ebola, later arrived to assess the effects of the outbreak, observing that "the whole region was in panic."[162][163][164]Piot concluded that the Belgian nuns had inadvertently started the epidemic by giving unnecessary vitamin injections to pregnant women, without sterilizing the syringes and needles. The outbreak lasted 26 days, with the quarantine lasting 2 weeks. Among the reasons that researchers speculated caused the disease to disappear, were the precautions taken by locals, the quarantine of the area, and discontinuing the injections.[161]
During this outbreak, Dr. Ngoy Mushola recorded the first clinical description of EVD in Yambuku, where he wrote the following in his daily log: "The illness is characterized with a high temperature of about 39 °C (102 °F), hematemesis, diarrhea with blood, retrosternal abdominal pain, prostration with "heavy" articulations, and rapid evolution death after a mean of 3 days."[165]
The virus responsible for the initial outbreak, first thought to be Marburg virus, was later identified as a new type of virus related to marburgviruses. Virus strain samples isolated from both outbreaks were named as the "Ebola virus" after the Ebola River, located near the originally identified viral outbreak site in Zaire.[21] Reports conflict about who initially coined the name: either Karl Johnson of the American CDC team[166] or Belgian researchers.[167] Subsequently a number of other cases were reported, almost all centered on the Yambuku mission hospital or having close contact with another case.[157] 318 cases and 280 deaths (an 88 percent fatality rate) occurred in Zaire.[168] Although it was assumed that the two outbreaks were connected, scientists later realized that they were caused by two distinct ebolaviruses, SUDV and EBOV.[156] The Zaire outbreak was contained with the help of the World Health Organization and transport from the Congolese air force, by quarantining villagers, sterilizing medical equipment, and providing protective clothing.

Society and culture

Weaponization

Ebolavirus is classified as a biosafety level 4 agent, as well as a Category A bioterrorism agent by the Centers for Disease Control and Prevention.[71][169] It has the potential to be weaponized for use in biological warfare,[170][171] and was investigated by Biopreparat for such use, but might be difficult to prepare as a weapon of mass destruction because the virus becomes ineffective quickly in open air.[172]Fake emails pretending to be Ebola information from the WHO or the Mexican Government have in 2014 been misused to spread computer malware.[173] The BBC reported in 2015 that, "North Korean state media has suggested the disease was created by the US military as a biological weapon."[174]

Literature

Richard Preston's 1995 best-selling book, The Hot Zone, dramatized the Ebola outbreak in Reston, Virginia.[175]
William Close's 1995 Ebola: A Documentary Novel of Its First Explosion and 2002 Ebola: Through the Eyes of the People focused on individuals' reactions to the 1976 Ebola outbreak in Zaire.[176]
Tom Clancy's 1996 novel, Executive Orders, involves a Middle Eastern terrorist attack on the United States using an airborne form of a deadly Ebola virus strain named "Ebola Mayinga" (see Mayinga N'Seka).[177]
As the Ebola virus epidemic in West Africa developed in 2014, a number of popular self-published and well-reviewed books containing sensational and misleading information about the disease appeared in electronic and printed formats. The authors of some such books admitted that they lacked medical credentials and were not technically qualified to give medical advice. The World Health Organization and the United Nations stated that such misinformation had contributed to the spread of the disease.[178]

Other animals

Wild animals

Ebola has a high mortality among primates.[108] Frequent outbreaks of Ebola may have resulted in the deaths of 5,000 gorillas.[179]Outbreaks of Ebola may have been responsible for an 88 percent decline in tracking indices of observed chimpanzee populations in 420 square kilometer Lossi Sanctuary between 2002 and 2003.[180] Transmission among chimpanzees through meat consumption constitutes a significant risk factor, whereas contact between the animals, such as touching dead bodies and grooming, is not.[181]
Recovered carcasses from gorillas contain multiple Ebola virus strains, which suggest multiple introductions of the virus. Bodies decompose quickly and carcasses are not infectious after 3 to 4 days. Contact between gorilla groups is rare, suggesting transmission among gorilla groups is unlikely, and that outbreaks result from transmission between viral reservoir and animal populations.[180]

Domestic animals

In 2012 it was demonstrated that the virus can travel without contact from pigs to nonhuman primates, although the same study failed to achieve transmission in that manner between primates.[63][182]
Dogs may become infected with EBOV but not develop symptoms. Dogs in some parts of Africa scavenge for food, and they sometimes eat EBOV-infected animals and also the corpses of humans. A 2005 survey of dogs during an EBOV outbreak found that although they remain asymptomatic, about 32 percent of dogs closest to an outbreak showed a seroprevalence for EBOV versus 9 percent of those farther away.[183] The authors concluded that there were "potential implications for preventing and controlling human outbreaks."

Reston virus

For more about the outbreak in Virginia, US, see Reston virus.
In late 1989, Hazelton Research Products' Reston Quarantine Unit in Reston, Virginia, suffered an outbreak of fatal illness amongst certain lab monkeys. This lab outbreak was initially diagnosed as simian hemorrhagic fever virus (SHFV), and occurred amongst a shipment of crab-eating macaque monkeys imported from the Philippines. Hazelton's veterinary pathologist sent tissue samples from dead animals to the United States Army Medical Research Institute of Infectious Diseases (USAMRIID) at Fort Detrick, Maryland, where an ELISA test indicated the antibodies present in the tissue were a response to Ebola virus and not SHFV.[184] An electron microscopist from USAMRIID discovered filoviruses similar in appearance to Ebola in the tissue samples sent from Hazelton Research Products' Reston Quarantine Unit.[185]
US Army team headquartered at USAMRIID euthanized the surviving monkeys, and brought all the monkeys to Ft. Detrick for study by the Army's veterinary pathologists and virologists, and eventual disposal under safe conditions.[184] Blood samples were taken from 178 animal handlers during the incident.[186] Of those, six animal handlers eventually seroconverted, including one who had cut himself with a bloody scalpel.[72][187] Despite its status as a Level‑4 organism and its apparent pathogenicity in monkeys, when the handlers did not become ill, the CDC concluded that the virus had a very low pathogenicity to humans.[187][188]
The Philippines and the United States had no previous cases of Ebola infection, and upon further isolation, researchers concluded it was another strain of Ebola, or a new filovirus of Asian origin, which they named Reston ebolavirus (RESTV) after the location of the incident.[184] Reston virus (RESTV) can be transmitted to pigs.[63] Since the initial outbreak it has since been found in nonhuman primatesin Pennsylvania, Texas, and Italy,[189] where the virus had infected pigs.[190] According to the WHO, routine cleaning and disinfection of pig (or monkey) farms with sodium hypochlorite or detergents should be effective in inactivating the Reston ebolavirus. Pigs that have been infected with RESTV tend to show symptoms of the disease.

Research

Treatments


Researchers looking at slides of cultures of cells that make monoclonal antibodies. These are grown in a lab and the researchers are analyzing the products to select the most promising.
There is as yet no known effective medication or vaccine. The director of the US National Institute of Allergy and Infectious Diseases has stated that the scientific community is still in the early stages of understanding how infection with the Ebola virus can be treated and prevented.[191] A number of experimental treatments are being considered for use in the context of this outbreak, and are currently or will soon undergo clinical trials,[192] but it will still be some time before sufficient quantities have been produced for widespread trials.[193] On 13 November, Médecins Sans Frontières announced that trials of possible treatments would start during November in Ebola treatment centres.[194]

Vaccines

Main article: Ebola vaccine
Many Ebola vaccine candidates had been developed in the decade prior to 2014,[195] but as of November 2014, none had yet been approved by the United States Food and Drug Administration (FDA) for clinical use in humans.[196][197][198] Several promising vaccine candidates have been shown to protect nonhuman primates (usually macaques) against lethal infection.[25][153][199] These include replication-deficient adenovirus vectors, replication-competent vesicular stomatitis (VSV) and human parainfluenza (HPIV-3) vectors, and virus-like particle preparations. Conventional trials to study efficacy by exposure of humans to the pathogen after immunization are obviously not feasible in this case. For such situations, the FDA has established the “animal rule” allowing licensure to be approved on the basis of animal model studies that replicate human disease, combined with evidence of safety and a potentially potent immune response (antibodies in the blood) from humans given the vaccine. Phase I clinical trials involve the administration of the vaccine to healthy human subjects to evaluate the immune response, identify any side effects and determine the appropriate dosage.
In September 2014, an Ebola vaccine was used after exposure to Ebola and the person appears to have developed immunity without getting sick.[200]

Diagnostic tests

One issue which hinders control of Ebola is that diagnostic tests which are currently available require specialized equipment and highly trained personnel. Since there are few suitable testing centers in West Africa, this leads to delay in diagnosis. In December, a conference in Geneva will aim to work out which diagnostic tools could be to identify Ebola reliably and more quickly. The meeting, convened by the WHO and the non-profit Foundation for Innovative New Diagnostics, seeks to identify tests that can be used by untrained staff, do not require electricity or can run on batteries or solar power and use reagents that can withstand temperatures of 40 °C.[201]
On 29 November, a new 15-minute Ebola test was reported that if successful, "not only gives patients a better chance of survival, but it prevents transmission of the virus to other people." The new equipment, about the size of a laptop and solar-powered, allows testing to be done in remote areas. The equipment is currently being tested in Guinea.[202]
On December 29, the FDA approved LightMix (R) Ebola Zaire rRT-PCR Test on patients with symptoms of Ebola. The report indicates it could help health care authorities around the world.[203]