Bioterrorism and Biocrimes

Total Page:16

File Type:pdf, Size:1020Kb

Bioterrorism and Biocrimes WORKING PAPER Bioterrorism and Biocrimes The Illicit Use of Biological Agents Since 1900 W. Seth Carus August 1998 (February 2001 Revision) Center for Counterproliferation Research National Defense University Washington, D.C. Opinions, conclusions, and recommendations expressed or implied within are solely those of the author, and do not necessarily represent the views of the National Defense University, the Department of Defense, or any other U.S. Government agency. This study documents numerous instances in which someone claimed that individuals or groups engaged in criminal conduct. The sources of the allegations are documented in the text. Every effort has been made to distinguish between instances in which the alleged conduct led to criminal convictions and those that were never authoritatively proven. This is a work in progress. The author welcomes comments, especially those that correct errors, identify additional cases for research, or identify additional sources of information on any of the existing cases. Because additional research can change conclusions based on this data, the author encourages readers to contact him before they use of any of the data discussed in this manuscript. Please direct comments to the following address: Dr. W. Seth Carus Center for Counterproliferation Research National Defense University Fort McNair, Building 62, Room 211 Washington, D.C. 20319-6000 Voice: 202-685-2242 Fax: 202-685-2264 E-mail: [email protected] ii Table of Contents TABLE OF CONTENTS.......................................................................................................................... III PREFACE.............................................................................................................................................. V ACKNOWLEDGEMENTS ......................................................................................................................VII PART I: BIOTERRORISM IN PERSPECTIVE............................................................................... 1 CHAPTER 1 : INTRODUCTION............................................................................................................... 3 What is Bioterrorism? .................................................................................................................... 3 Studying Bioterrorism .................................................................................................................... 4 CHAPTER 2 : THE PRACTICE................................................................................................................ 7 Experience of Bioterrorism ............................................................................................................ 7 Trends in Bioterrorism................................................................................................................. 10 Acquiring Biological Agents ........................................................................................................ 12 Employing Biological Agents....................................................................................................... 16 CHAPTER 3 : THE PRACTITIONERS .................................................................................................... 25 Nature of the Perpetrators ........................................................................................................... 25 Terrorist Group Characteristics .................................................................................................. 27 Operational Considerations......................................................................................................... 31 PART II: CASES................................................................................................................................. 33 CHAPTER 4 : CASE DEFINITION ......................................................................................................... 35 Sources of information ................................................................................................................. 37 Assessing the data ........................................................................................................................ 38 Organization of cases................................................................................................................... 39 CHAPTER 5 : USE OF BIOLOGICAL AGENTS....................................................................................... 42 Confirmed Use.............................................................................................................................. 42 Probable or Possible Use............................................................................................................. 76 CHAPTER 6 : THREATENED USE ........................................................................................................ 95 Threatened Use (Probable or Known Possession)....................................................................... 95 Threatened Use (No Known Possession) ................................................................................... 104 Threatened Use (Anthrax Hoaxes)............................................................................................. 122 CHAPTER 7 : POSSESSION ................................................................................................................ 151 Confirmed Possession ................................................................................................................ 151 Probable or Possible Possession ............................................................................................... 154 CHAPTER 8 : OTHER ........................................................................................................................ 161 Possible Interest in Acquisition (No Known Possession)........................................................... 161 False cases and hoaxes .............................................................................................................. 167 APPENDIX A: LIST OF CASES .................................................................................................... 179 SOURCES.......................................................................................................................................... 199 INDEX .............................................................................................................................................. 205 ABOUT THE AUTHOR ....................................................................................................................... 209 iii Preface This is the eighth revision of a working paper on biological terrorism first released in August 1998. The last version was released in April 2000. As with the earlier versions, it is an interim product of the research conducted by the author into biological terrorism at the National Defense University’s Center for Counterproliferation Research. It incorporates new cases identified through December 31, 2000, as well as a considerable amount of new material on older cases acquired since publication of the previous revision. The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents. Research into the cases is ongoing, and additional information will be incorporated as further information is uncovered. v Acknowledgements This working paper could not have been prepared without the assistance of a large number Most important were my colleagues at the Center for Counterproliferation Research at the National Defense University. Ambassador Robert Joseph, director of the Center when the bulk of the work was conducted, provided the author with the opportunity to work at the Center, which provided the time needed to research and write this manuscript. He showed extraordinary forbearance and support for this project. In addition, his careful editing substantially strengthened the manuscript. Writing this study would have been impossible without the expert guidance provided by many people who took the time to explain the arcana of biological warfare. To all of them, I express my appreciation. In particular, I have benefited from the willingness of several people who have had first hand experience in the development of biological agents to spend time explaining the esoteric art of biological warfare. This includes the late Thomas Dashiell, William J. Patrick III, and Ken Alibek. Detailed research into two of the bioterrorism incidents was supported in part by Jonathan Tucker and the Monterey Institute
Recommended publications
  • Virginia Commonwealth University Volunteer Doula Program Training Manual Kathleen M
    Virginia Commonwealth University VCU Scholars Compass School of Nursing Publications School of Nursing 2015 Virginia Commonwealth University Volunteer Doula Program Training Manual Kathleen M. Bell Virginia Commonwealth University, [email protected] Susan L. Linder Virginia Commonwealth University, [email protected] Follow this and additional works at: http://scholarscompass.vcu.edu/nursing_pubs Part of the Maternal, Child Health and Neonatal Nursing Commons Copyright © 2015 The Authors Downloaded from http://scholarscompass.vcu.edu/nursing_pubs/16 This Curriculum Material is brought to you for free and open access by the School of Nursing at VCU Scholars Compass. It has been accepted for inclusion in School of Nursing Publications by an authorized administrator of VCU Scholars Compass. For more information, please contact [email protected]. Virginia Commonwealth University Volunteer Doula Program Training Manual “Empowerment, advocacy and support for one of life’s greatest journeys.” 1 Reflection and Discussion Why are you here? Why did you decide to do this doula training? What experiences do you have with birth, and how have they shaped your desire to participate in this program? What does it mean to be a doula with the VCU School of Nursing? What other reflections do you have? 2 Table of Contents 1. An overview of birth: Statistics and trends………………page 4-6 2. Birth workers and their roles………………...……………pages 7-10 3. You are a doula! Your birth-bag and preparation………..pages 11-14 4. Anatomy and Physiology of birth………………………...pages 15-18 5. Hormonal regulation of labor and birth…………………..pages 19-21 6. Pharmacologic management of labor…………………….pages 22-26 7.
    [Show full text]
  • University of Cincinnati
    ! "# $ % & % ' % !" #$ !% !' &$ &""! '() ' #$ *+ ' "# ' '% $$(' ,) * !$- .*./- 0 #!1- 2 *,*- Atomic Apocalypse – ‘Nuclear Fiction’ in German Literature and Culture A dissertation submitted to the Graduate School of the University of Cincinnati In partial fulfillment of the requirements for the degree of DOCTORATE OF PHILOSOPHY (Ph.D.) in the Department of German Studies of the College of Arts and Sciences 2010 by Wolfgang Lueckel B.A. (equivalent) in German Literature, Universität Mainz, 2003 M.A. in German Studies, University of Cincinnati, 2005 Committee Chair: Sara Friedrichsmeyer, Ph.D. Committee Members: Todd Herzog, Ph.D. (second reader) Katharina Gerstenberger, Ph.D. Richard E. Schade, Ph.D. ii Abstract In my dissertation “Atomic Apocalypse – ‘Nuclear Fiction’ in German Literature and Culture,” I investigate the portrayal of the nuclear age and its most dreaded fantasy, the nuclear apocalypse, in German fictionalizations and cultural writings. My selection contains texts of disparate natures and provenance: about fifty plays, novels, audio plays, treatises, narratives, films from 1946 to 2009. I regard these texts as a genre of their own and attempt a description of the various elements that tie them together. The fascination with the end of the world that high and popular culture have developed after 9/11 partially originated from the tradition of nuclear fiction since 1945. The Cold War has produced strong and lasting apocalyptic images in German culture that reject the traditional biblical apocalypse and that draw up a new worldview. In particular, German nuclear fiction sees the atomic apocalypse as another step towards the technical facilitation of genocide, preceded by the Jewish Holocaust with its gas chambers and ovens.
    [Show full text]
  • Patterns of Global Terrorism 1999
    U.S. Department of State, April 2000 Introduction The US Government continues its commitment to use all tools necessary—including international diplomacy, law enforcement, intelligence collection and sharing, and military force—to counter current terrorist threats and hold terrorists accountable for past actions. Terrorists seek refuge in “swamps” where government control is weak or governments are sympathetic. We seek to drain these swamps. Through international and domestic legislation and strengthened law enforcement, the United States seeks to limit the room in which terrorists can move, plan, raise funds, and operate. Our goal is to eliminate terrorist safehavens, dry up their sources of revenue, break up their cells, disrupt their movements, and criminalize their behavior. We work closely with other countries to increase international political will to limit all aspects of terrorists’ efforts. US counterterrorist policies are tailored to combat what we believe to be the shifting trends in terrorism. One trend is the shift from well-organized, localized groups supported by state sponsors to loosely organized, international networks of terrorists. Such a network supported the failed attempt to smuggle explosives material and detonating devices into Seattle in December. With the decrease of state funding, these loosely networked individuals and groups have turned increasingly to other sources of funding, including private sponsorship, narcotrafficking, crime, and illegal trade. This shift parallels a change from primarily politically motivated terrorism to terrorism that is more religiously or ideologically motivated. Another trend is the shift eastward of the locus of terrorism from the Middle East to South Asia, specifically Afghanistan. As most Middle Eastern governments have strengthened their counterterrorist response, terrorists and their organizations have sought safehaven in areas where they can operate with impunity.
    [Show full text]
  • Palynology of Badger Coprolites from Central Spain
    Palaeogeography, Palaeoclimatology, Palaeoecology 226 (2005) 259–271 www.elsevier.com/locate/palaeo Palynology of badger coprolites from central Spain J.S. Carrio´n a,*, G. Gil b, E. Rodrı´guez a, N. Fuentes a, M. Garcı´a-Anto´n b, A. Arribas c aDepartamento de Biologı´a Vegetal (Bota´nica), Facultad de Biologı´a, 30100 Campus de Espinardo, Murcia, Spain bDepartamento de Biologı´a (Bota´nica), Facultad de Ciencias, Universidad Auto´noma de Madrid, 28049 Cantoblanco, Madrid, Spain cMuseo Geominero, Instituto Geolo´gico y Minero de Espan˜a, Rı´os Rosas 23, 28003 Madrid, Spain Received 21 January 2005; received in revised form 14 May 2005; accepted 23 May 2005 Abstract This paper presents pollen analysis of badger coprolites from Cueva de los Torrejones, central Spain. Eleven of fourteen coprolite specimens showed good pollen preservation, acceptable pollen concentration, and diversity of both arboreal and herbaceous taxa, together with a number of non-pollen palynomorph types, especially fungal spores. Radiocarbon dating suggests that the coprolite collection derives from badger colonies that established setts and latrines inside the cavern over the last three centuries. The coprolite pollen record depicts a mosaic, anthropogenic landscape very similar to the present-day, comprising pine forests, Quercus-dominated formations, woodland patches with Juniperus thurifera, and a Cistaceae- dominated understorey with heliophytes and nitrophilous assemblages. Although influential, dietary behavior of the badgers does not preclude palaeoenvironmental
    [Show full text]
  • U.S. Department of State, 1991 Patterns of Global Terrorism
    Terrorism Resources Patterns of Global Terrorism: 1991 Office of the Secretary of State Office of the Coordiantor for Couterterrorism Released April 1991 Table of Contents Introduction The Year in Review Africa Overview Asia Overview Western European Overview Latin America Overview Middle East Overview Overview of State-Sponsored Terrorism Appendix A: Chronology of Significant Terrorist Incidents, 1991 Appendix B: Background Information on Terrorist Groups Patterns of Global Terrorism: 1991 The Year in Review The number of international terrorist incidents rose in 1991 as a result of the Persian Gulf war, when terrorists in many regions of the world attacked targets belonging to the international coalition opposed to Saddam Hussein. Most of these were minor incidents, resulting only in property damage. War-related attacks brought the total number of international terrorist incidents in 1991 to 557, up from 456 in 1990. Fully half of the incidents in 1991 occurred during January and February, while Operation Desert Storm was under way. After the war, however, the number of terrorist incidents dropped sharply and actually fell below 1990 levels. Several events in 1991 revealed the threat and extent of state-sponsored terrorism, particularly as practiced by Iraq, Libya, and Iran. In the months following Iraq's invasion of Kuwait, Iraq issued repeated exhortations to terrorists to strike at coalition targets worldwide. Terrorists of many stripes embraced Saddam Hussein and publicly vowed to launch attacks in the event of war. During Operation Desert Storm, we recorded 275 terrorist incidents. Most of these attacks, however, were sporadic, uncoordinated, and low-level incidents. Only a small percentage resulted in deaths, significant injuries, or property damage.
    [Show full text]
  • Active Shooter Training SAFETY & SECURITY ST
    Active Shooter Training SAFETY & SECURITY ST. BONAVENTURE UNIVERSITY Active Shooter/ Dangerous Person What is an Active Shooter? The Department of Homeland Security defines an active shooter as “an individual actively engaged in killing or attempting to kill people in a confined and populated area”. The situation occurs rapidly and without warning. The shooter’s objective may be a specific target such as an estranged spouse or former boss but generally victims are selected at random. Most incidents end in 4 - 12 minutes. The average law enforcement response is 18 minutes so the arrival of Law Enforcement may have little effect on the outcome. The shooter often commits suicide or is looking for “suicide by cop.” Individuals need to prepare physically and mentally to respond to an active shooter incident. What is an Dangerous Person? . A Dangerous Person is someone who may be making threatening actions or displaying a weapon on campus . A Dangerous Person may possess or use weapons other than a firearm, such as a knife, improvised explosive device or mace . SBU will respond to a Dangerous Person in the same manner as an Active Shooter Active Shooter Trends 2000-2016 INCIDENTS Some Known Active Shooters Eric Harris & Dylan Kiebold James Holmes Adam Lanza Columbine High School Aurora, CO Newtown, CT Seung-Hui Cho Dr Amy Bishop Jared Lee Loughner Virginia Tech University of Alabama Tucson, AZ COLUMBINE HIGH SCHOOL • Occurred on April 20, 1999 in Jefferson County, Colorado, by Eric Harris and Dylan Kiebold • Used liquid petroleum tanks, pipe
    [Show full text]
  • Bugs, Bones & Botany Workshop October 30-November 4, 2016 Gainesville, Florida
    Bugs, Bones & Botany Workshop October 30‐November 4, 2016 Gainesville, Florida October 30, 2016 Classroom Lecture Topics 1. Entomology: History & Overview of Entomology, Dr. Jason 8AM‐12 PM Byrd 2. Anthropology: Introduction to Forensic Anthropology, Instructor: Dr. Mike Warren 3. Botany: Using Botanical Evidence in a Forensic Investigation, Instructor: Dr. David Hall 4. Crime Scene: Search & Field Recovery Techniques, Gravesite excavation, begin 1‐5 PM Field Topic 1. Entomology: Field Demonstration of Collection Procedures, Instructor: Dr. Jason Byrd 2. Anthropology: Hands‐on Skeletal Analysis Instructor: Dr. Mike Warren 3. Botany: Where Plants Grow & Mapping/Collecting Equipment, Instructor: Dr. David Hall November 1, 2016 Classroom Topic 1. Entomology: Processing a Death Scene for Entomological 8‐12 AM Evidence, Instructor: Dr. Jason Byrd 2. Anthropology: Human and Nonhuman Skeletal Anatomy, Instructor: Dr. Mike Warren 3. Botany: Characteristics of Plants, Instructor: Dr. David Hall 1‐5 PM Field topic 1. Entomology: Collection of Entomological Evidence Instructor: Dr. Jason Byrd 2. Anthropology: Students will excavate buried remains, Instructor: Dr. Mike Warren 3. Botany: Collecting Botanical Evidence & Mapping Surface Scatter, Instructor: Dr. David Hall November 2, 2016 Classroom Topic 1. Entomology: Estimation of PMI Using Entomological Evidence, 8 AM – 12 PM Instructor: Dr. Jason Byrd 2. Anthropology: Methods of Human Identification Instructor: Dr. Mike Warren 3. Botany: When to call a Forensic Botanist Instructor: Dr. David Hall 1‐5 PM Field Topic 1. Entomology: Continue Processing of Entomological Evidence, Instructor: Dr. Jason Byrd 2. Anthropology: Continue Processing Anthropological Evidence, Instructor: Dr. Mike Warren 3. Botany: Continue Processing Botanical Evidence & Surface Scatter, Instructor: Dr. David Hall November 3, 2016 Classroom Topic 1.
    [Show full text]
  • Bioterrorism and Biocrimes: the Illicit Use of Biological Agents Since 1900
    WORKING PAPER Bioterrorism and Biocrimes The Illicit Use of Biological Agents Since 1900 W. Seth Carus August 1998 (February 2001 Revision) Center for Counterproliferation Research National Defense University Washington, D.C. Opinions, conclusions, and recommendations expressed or implied within are solely those of the author, and do not necessarily represent the views of the National Defense University, the Department of Defense, or any other U.S. Government agency. This study documents numerous instances in which someone claimed that individuals or groups engaged in criminal conduct. The sources of the allegations are documented in the text. Every effort has been made to distinguish between instances in which the alleged conduct led to criminal convictions and those that were never authoritatively proven. This is a work in progress. The author welcomes comments, especially those that correct errors, identify additional cases for research, or identify additional sources of information on any of the existing cases. Because additional research can change conclusions based on this data, the author encourages readers to contact him before they use of any of the data discussed in this manuscript. Please direct comments to the following address: Dr. W. Seth Carus Center for Counterproliferation Research National Defense University Fort McNair, Building 62, Room 211 Washington, D.C. 20319-6000 Voice: 202-685-2242 Fax: 202-685-2264 E-mail: [email protected] ii Table of Contents TABLE OF CONTENTS.........................................................................................................................
    [Show full text]
  • Aryan Nations Deflates
    HATE GROUP MAP & LISTING INSIDE PUBLISHED BY SPRING 2016 // ISSUE 160 THE SOUTHERN POVERTY LAW CENTER PLUS: ARYAN NATIONS DEFLATES ‘SOVEREIGNS’ IN MONTANA EDITORIAL A Year of Living Dangerously BY MARK POTOK Anyone who read the newspapers last year knows that suicide and drug overdose deaths are way up, less edu- 2015 saw some horrific political violence. A white suprem- cated workers increasingly are finding it difficult to earn acist murdered nine black churchgoers in Charleston, S.C. a living, and income inequality is at near historic lev- Islamist radicals killed four U.S. Marines in Chattanooga, els. Of course, all that and more is true for most racial Tenn., and 14 people in San Bernardino, Calif. An anti- minorities, but the pressures on whites who have his- abortion extremist shot three people to torically been more privileged is fueling real fury. death at a Planned Parenthood clinic in It was in this milieu that the number of groups on Colorado Springs, Colo. the radical right grew last year, according to the latest But not many understand just how count by the Southern Poverty Law Center. The num- bad it really was. bers of hate and of antigovernment “Patriot” groups Here are some of the lesser-known were both up by about 14% over 2014, for a new total political cases that cropped up: A West of 1,890 groups. While most categories of hate groups Virginia man was arrested for allegedly declined, there were significant increases among Klan plotting to attack a courthouse and mur- groups, which were energized by the battle over the der first responders; a Missourian was Confederate battle flag, and racist black separatist accused of planning to murder police officers; a former groups, which grew largely because of highly publicized Congressional candidate in Tennessee allegedly conspired incidents of police shootings of black men.
    [Show full text]
  • How I Set up My Own Body Farm by Jennifer Dean
    How I Set Up My Own Body Farm By Jennifer Dean To prepare for a new forensic science elective at Camas High School, and determined to make this new course an exciting application of biology and chemistry principles, I began by collecting forensic science resources, ordering books and enrolling in the local community college course on forensic science. I spent every extra hour soaking up as much as I could about this field during the “time off” teachers get in the summer. I was particularly fascinated by the fields of forensic entomology and anthropology. From books such as Stiff: The Curious Lives of Human Cadavers by Mary Roach and Dr. Bill Bass’s work around the creation of a human body farm at the University of Tennessee Forensic Anthropology Center, I decided to create something similar for our new high school forensic science program. As we met for dinner after a day of revitalizing workshops in Seattle at an NSTA conference, I shared my thoughts about the creation of an animal body farm with my talented and dedicated colleagues. These teachers have a passion for their students and their work. I felt free to share these ideas with them and know I’d be supported in making it a reality. As the Science Department, we formally agreed to dedicate ourselves to submitting grants to make it a reality. Back at work, I sent copies of the farm proposal to my immediate supervisors, and they responded with letters of support. The next step was getting the farm started—with or without grant money—because the first class of forensic science would be starting in the fall.
    [Show full text]
  • Preservation of Buried Human Remains in Soil by Map Unit, Soil Survey of the State of Connecticut
    U.S. Department of Agriculture Natural Resources Conservation Service CONNECTICUT Preservation of Buried Human Remains in Soil This bone was located in a Hadley silt loam soil (map unit 105). Hadley soils are rated as having a high potential for preservation of buried remains. Deborah Surabian, Soil Scientist Natural Resources Conservation Service Tolland, Connecticut December 2012 USDA is an equal opportunity employer and provider. Table of Contents INTRODUCTION ......................................................................................................... 1 PURPOSE ....................................................................................................................... 1 USE CONSTRAINTS .................................................................................................... 1 FACTORS THAT INFLUENCE PRESERVATION ................................................. 2 BURIAL IN SOIL ......................................................................................................... 3 EVALUATION CRITERIA ........................................................................................ 4 CONNECTICUT CASE STUDY A ............................................................................. 9 CONNECTICUT CASE STUDY B ............................................................................ 10 CONNECTICUT CASE STUDY C ........................................................................... 11 CONNECTICUT CASE STUDY D ..........................................................................
    [Show full text]
  • Practical LSD Manufacture Free
    FREE PRACTICAL LSD MANUFACTURE PDF Uncle Fester | 135 pages | 01 Feb 2007 | FESTERING PUBN | 9780970148575 | English | United Kingdom Erowid Library/Bookstore : 'Practical LSD Manufacture' Contact me! My work has not gone unnoticed! I'm very sure you will chuckle uncontrollably as you read these somewhat exaggerated, but very entertaining stories Or if your interest varies, check out my friends at Earthlight Books. Order Now. New 8. I wrote the original edition of this book in while doing time for making meth. Eight editions later it is still the most comprehensive and reliable source for all the info and detailed explanation of techniques related to making meth. Practical LSD Manufacture closely related compounds MDA and MDMA X or Ecstacy and other psychedelic amphetamines are also covered, with detailed instructions for their manufacture from commonly available essential oils. This tour de force of clandestine ingenuity has been the training ground for champions for over 20 years, and makes clear the futility of what Practical LSD Manufacture officials and their media lapdogs call "the war on drugs". Police state goon squads and their lowest common denominator, pandering politician masters Practical LSD Manufacture exposed Practical LSD Manufacture what they are in underground classic. It's my pleasure to show that they have bitten off more than they Practical LSD Manufacture chew, and so it is my pleasure to stuff it down their throats while holding them up to the only thing they dread: public ridicule and demonstrations of their impotence. This book heaps both upon their heads, in liberal portions! Read an article by clicking here Click here to read a great review! Read a testimonial by,"The Aussie Clandestine Chemist" by Practical LSD Manufacture here.
    [Show full text]