Crisis planning to manage risks posed by animal rights extremists

ILAR J. 2010;51(2):138-48. doi: 10.1093/ilar.51.2.138.

Abstract

Among the multitude of crises that US research institutions may face are those caused by animal rights activists. While most activists opposed to animal research use peaceful and lawful means of expressing their opinions, some extremists resort to illegal methods. Arson, break-ins, and theft with significant property damage at US animal research facilities began in the 1980s. The most troubling trend to develop in the past decade is the targeting of individuals associated with animal research, whether directly or indirectly, and the use of violent scare tactics to intimidate researchers and their families. The National Association for Biomedical Research has a 30-year history of monitoring the animal rights movement and assisting member institutions with crisis situations. In this article we discuss attacks on researchers at their homes, cyber crimes, exploitation of new media formats, infiltration of research facilities, and the targeting of external research stakeholders and business partners. We describe the need for a well-conceived crisis management plan and strong leadership to mitigate crisis situations. Institutions with well-informed leaders and crisis management teams ready to take timely action are best equipped to protect staff, laboratory animals, and research programs. They act on early warnings, provide support for targeted staff, seek legal remedies, thoughtfully control access to research facilities, and identify and enlist new research supporters. We underscore the importance of up-to-date crisis planning so that institutions are not only aware of ongoing risks posed by animal rights extremists but also better prepared to take preemptive action and able to manage those risks successfully.

MeSH terms

  • Animal Rights*
  • Animal Welfare*
  • Animals
  • Animals, Laboratory*
  • Crime / prevention & control*
  • Disaster Planning*
  • Humans
  • Risk Management / methods*
  • Security Measures