Understanding Technologies of Terror 9 a B,!, 10 Victoria Sutton , D

Total Page:16

File Type:pdf, Size:1020Kb

Understanding Technologies of Terror 9 a B,!, 10 Victoria Sutton , D DTD 5 ARTICLE IN PRESS 1 2 3 Technology in Society xx (xxxx) 1–23 www.elsevier.com/locate/techsoc 4 5 6 7 8 Understanding technologies of terror 9 a b,!, 10 Victoria Sutton , D. Allan Bromley * 11 a 12 Texas Tech University School of Law, 1802 Hartford Avenue, Lubbock, TX 79409, USA bYale University, P.O. Box 208124, New Haven, CT 06520, USA 13 OF 14 15 Abstract 16 17 The variety of weapons of mass destruction are intended to create the maximum possible fear, 18 death, destruction, and general terror in the target region or nation, particularly with new and creative 19 ways of using them. An understanding of how these weapons work, the ways they may be used, and 20 the scope of their destruction can contribute to effectively combating their effects. This article examines these weapons—nuclear, electromagnetic pulse, radiological, chemical and biological 21 technologies—as well as policy approaches to defending against them. The development of national 22 programs directed toward the understanding, potential use, and response to weapons of mass 23 destruction by the United States, Japan and the Soviet Union are reviewed and compared, as are the 24 international agreements that have thus far addressed the possible use of such weapons. 25 q 2005 Elsevier Ltd. All rights reserved. 26 27 Keywords: Nuclear and chemical explosives; Electromagnetic pulse weapons; Chemical and biological weapons; 28 Weapons of mass destruction; WMD 29 30 1. Introduction 31 32 The 20th century has witnessed dramatic changes in the kinds of weaponry available 33 for national and international conflicts as well as potential targets for that weaponry. 34 Although some of the agents have been known since the Dark Ages, the technologies 35 necessary for their development, effective use, and delivery have undergone major change. 36 In this paper, we focus on what are referred to generically as weapons of mass destruction 37 (WMD). This term includes nuclear, electromagnetic pulse, radiological, chemical, and 38 biological weapons of various kinds and because the American public has relatively little 39 40 41 * Corresponding author. Tel: C1 806 742 3990; fax: C1 806 742 0251. 42 E-mail address: [email protected] (V. Sutton). ! Deceased.UNCORRECTED PRO 43 44 0160-791X/$ - see front matter q 2005 Elsevier Ltd. All rights reserved. 45 doi:10.1016/j.techsoc.2005.04.002 TIS 463—18/5/2005—21:55—SWAPNA—146064—XML MODEL 1 – pp. 1–23 DTD 5 ARTICLE IN PRESS 2 V. Sutton, D.A. Bromley / Technology in Society xx (xxxx) 1–23 46 information—and in some cases, substantial misinformation—about each of these 47 weapons, there is widespread confusion and misunderstanding that make it difficult to 48 develop coherent and effective policies for detection and response to future attacks. This is 49 especially true because attacks involving these weapons have widely different 50 characteristics, and each weapon system cannot be addressed effectively under any 51 generic WMD approach. 52 Policy makers and administrators, as well as our citizens, began to scrutinize our 53 approach to possible attack ever since the terrorist attacks of September 11, 2001 on the 54 World Trade Center in New York and the Pentagon in Washington, and the subsequent 55 anthrax attacks on national leaders in both politics and the media. All these require a more 56 introspective examination of our national policy approach to responding to these threats. 57 As just noted, while anthrax has been known for a long time, the technologies for delivery 58 of this and other WMD, both long- and short-range, including intercontinental ballistic OF 59 missiles, cruise missiles, and the production of aerosols essential to weaponizing 60 biological agents, are of far-reaching importance. Table 1 compares the loss of life 61 involved in a wide variety of catastrophes and gives some context for this discussion. 62 Table 1 63 Comparison of life loss in major world catastrophes 64 65 Date location Cause No. of victims 66 1347–1351 Europe Black Plague, pandemic 25 million 67 1520 South America, Aztecs Smallpox brought by 35 million 68 Spaniards 1556 Shaanxi, China Earthquake 830,000 69 1815 Mount Tambora, Indo- Volcanic Eruption 160,000 70 nesia 71 1876–1879 Northern China Famine 10 million 72 1914–1918 Mainly in Europe First World War 20 million a 73 1918 Entire World 1918 Flu Pandemic 20–100 million 1917 Halifax Harbor, Canada Accidental chemical 1654 74 explosion 75 1931 Huang He Basin, China Flood 3.7 million 76 1939–1945 Entire World Second World War 40 million 77 1945 Hiroshima, Japan Nuclear Weapon 140,000 78 Explosion 1945 Nagasaki, Japan Nuclear Weapon 90,000 79 Explosion 80 1970 Bangladesh Cyclone 300,000 81 1980 Entire World AIDS O3 million persons per 82 year seropositive 83 1984 Bhopal, India Chemical Discharge 5000 1986 Chernobyl, Soviet Union Nuclear Power Plant 30,000 84 Accident 85 2004 Southeast Asia Tsunami 300,000 86 ? Entire World Nuclear War 1 billion perhaps 87 Sources: AdaptedUNCORRECTED from Sagan, Turco. A path where no man thought: nuclear winter and the end of thePRO arms race. 88 Random House; 1990. 89 a Gina Kolata, Flu: The story of the great influenza pandemic of 1918 and the search for the virus that caused it. 90 Farrar, Straus and Giroux, New York; 1999. TIS 463—18/5/2005—21:55—SWAPNA—146064—XML MODEL 1 – pp. 1–23 DTD 5 ARTICLE IN PRESS V. Sutton, D.A. Bromley / Technology in Society xx (xxxx) 1–23 3 91 We will consider separately each of the weapon systems as potential threats. It is 92 essential to bear in mind that the purpose of a WMD is to create maximum fear, death, 93 destruction, and general terror in the target region or nation. For example, nuclear attacks 94 would cause both human deaths and infrastructure destruction; biological attacks would 95 cause human fatalities while keeping the infrastructure intact. All these weapons are 96 designed to cause terror and destruction in the target region and they become even more 97 frightening because of the new and creative ways that terrorists choose to use them. The 98 weapons used in the September 11, 2001 attacks—large, fully fueled jet airliners— 99 represent a new and unanticipated approach to terrorism. Cyberterrorism—the destruction 100 of communications infrastructure—can be used in conjunction with any of these weapons 101 systems to magnify their effectiveness. 102 WMD has traditionally been addressed as a singular threat by national security policy 103 analysts. Most terrorist activity had occurred outside the US, and little focus was placed on OF 104 domestic activity prior to September 11, 2001. National security concerns outside the US 105 were addressed by the CIA; terrorism inside the US borders was addressed by the FBI. 106 Then, via Presidential Decision Directives 39 and 62 (PDD 39, PDD 62) [10], the Clinton 107 Administration designated the FBI as the lead agency to respond to acts of terrorism. The 108 FBI’s traditional mission, however, has been criminal investigation, which is not an 109 optimal approach for addressing situations involving WMD, each of which requires 110 knowledgeable leadership with a specific set of interdisciplinary and multi-agency 111 responses. 112 The Department of Homeland Security, established on March 7, 2003, is an important 113 component of the US response to terrorist attacks of all kinds (Fig. 1). From its inception, 114 the department realized there are many aspects of terrorist activity that are the clear 115 responsibility of the federal government. However, the balance of federal and state powers 116 117 Executive Secretary 118 Commandant of Coast Guard (1) 119 Legislative Affairs Secretary Inspector General 120 ----------------------------- Public Affairs Deputy Secretary 121 General Counsel 122 State and Local Coordination Civil Rights and Citizenship & Director, Bureau of Citizenship Civil Liberties 123 Special Assistant to the Secretary Immigration Service Ombudsman(1) & Immigration Services (1) (private sector) Director of the 124 Secret Service(1) Small & Disadvantaged National Capital Region Privacy Officer 125 Business Coordination Chief of Staff International Affairs 126 Shared Services 127 Counter Narcotics 128 129 Under Secretary Under Secretary Under Secretary Under Secretary Under Secretary Information Analysis Border & Emergency Science and 130 Management and Infrastructure Transportation Preparedness and Technology Protection Security Response 131 132 Note (1): Effective MarchUNCORRECTED 1st, 2003 PRO 133 134 Fig. 1. Organizational chart for the Department of Homeland Security (as of Aug. 2004). Source: !http://www. 135 dhs.gov/interweb/assetlibrary/DHS_OrgChart_2004.pdfO. Site visited 03/21/05. TIS 463—18/5/2005—21:55—SWAPNA—146064—XML MODEL 1 – pp. 1–23 DTD 5 ARTICLE IN PRESS 4 V. Sutton, D.A. Bromley / Technology in Society xx (xxxx) 1–23 136 provided for in the US Constitution reserves exclusively to the states the powers to 137 regulate and manage public health except where there is a ‘substantial effect on interstate 138 commerce’ [11]. This separation of powers and its consequent lack of coherent planning 139 for response to any terrorist attack is one of the most serious weaknesses of our current 140 response policies. 141 142 143 2. Nuclear weapons 144 145 Nuclear explosives were first used by the United States in 1945 to end World War II in 146 the Pacific. The 10-kilotons uranium weapon (60 pounds of enriched U-235) detonated at 147 Hiroshima, and the 22-kilotons plutonium weapon (6 pounds of plutonium) subsequently 148 used at Nagasaki, essentially destroyed both cities, although both weapons were small and OF 149 crude by modern standards [5, p. 59]. 150 Because a typical nuclear reaction releases roughly one million times the energy of a 151 typical chemical reaction, the impact of a nuclear explosion is qualitatively different from 152 that of a chemical explosion.
Recommended publications
  • Pharmaceutical Patents Exemption Right As A
    AGAINST THE PLAGUE: EXEMPTION OF PHARMACEUTICAL PATENT RIGHTS AS A BIOSECURITY STRATEGY Taiwo A. Oriola* I. INTRODUCTION Acts of terrorism involve threats to use or use of weapons of mass destruction to kill, maim, or destroy property by individuals, groups, or states1 mainly on political grounds, and for maximum political effects.2 Terror attacks are characterized by stealth, indiscriminate violence, and destruction meant to heighten people’s fears and concerns for their lives and property.3 As terrorism has increased, so have the number of counterterrorism strategies by governments around the world.4 However, terrorism is as old as mankind.5 * Cardiff Law School, and the ESRC Centre for Business Relationships, Accountability, Sustainability, & Society, University of Cardiff, United Kingdom. 1. An early example of a state-sponsored terrorist was the Roman emperor Nero, who ruled by fear, slaughtered many members of the nobility, and has been blamed for the burning of Rome. CINDY C. COMBS & MARTIN SLANN, ENCYCLOPEDIA OF TERRORISM 201 (2002). Dysfunctional or anarchistic individuals or groups acting alone or in concert can perpetrate terrorist attacks. See Jonathan Glover, State Terrorism, in VIOLENCE, TERRORISM, AND JUSTICE 256, 257-60 (Raymond G. Frey & Christopher W. Morris eds., 1991) (contrasting historical state and independent terrorists, highlighting essential features of state-sponsored terrorism, and explaining why states commit acts of terrorism). 2. Political motivation has been described as “a necessary component to a definition of terrorism.” COMBS & SLANN, supra note 1, at 211. For examples of statutory definitions of terrorism, see Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, Pub.
    [Show full text]
  • REFOCUSING NATO's INTELLIGENCE OUTLOOK TOWARDS BIOLOGICAL WARFARE
    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS REFOCUSING NATO's INTELLIGENCE OUTLOOK TOWARDS BIOLOGICAL WARFARE by Claro William Villareal September, 1996 Thesis Advisor: Rodney Kennedy-Minott Second Reader: Robert E. Looney Approved for public release; distribution is unlimited. Thesis V682 -* h,/, . -'OSTGRADU' MONTEREY CA W REPORT DOCUMENTATION PAGE Form Approved OMB No 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing date sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services. Directorate for Information Operations and Reports. 1215 Jefferson Davis Highway. Suite 1 204. Arlington. VA 22202-4302. and to the Office of Management and Budget. Paperwork Reduction Project (0704-01 88) Washington DC 20503 1 AGENCY USE ONLY (Leave blank) REPORT DATE REPORT TYPE AND DATES COVERED September 1996 Master's Thesis TITLE AND SUBTITLE FUNDING NUMBERS Refocusing NATO's Intelligence Outlook Towards Biological Warfare 6. AUTHOR Claro William Villareal 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) PERFORMING Naval Postgraduate School ORGANIZATION Monterey CA 93943-5000 REPORT NUMBER SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 1 1 . SUPPLEMENTARY NOTES The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION/AVAILABILITY STATEMENT 12b.
    [Show full text]
  • It Came from Outer Space: the Virus, Cultural Anxiety, and Speculative
    Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2002 It came from outer space: the virus, cultural anxiety, and speculative fiction Anne-Marie Thomas Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the English Language and Literature Commons Recommended Citation Thomas, Anne-Marie, "It came from outer space: the virus, cultural anxiety, and speculative fiction" (2002). LSU Doctoral Dissertations. 4085. https://digitalcommons.lsu.edu/gradschool_dissertations/4085 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. IT CAME FROM OUTER SPACE: THE VIRUS, CULTURAL ANXIETY, AND SPECULATIVE FICTION A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of English by Anne-Marie Thomas B.A., Texas A&M-Commerce, 1994 M.A., University of Arkansas, 1997 August 2002 TABLE OF CONTENTS Abstract . iii Chapter One The Replication of the Virus: From Biomedical Sciences to Popular Culture . 1 Two “You Dropped A Bomb on Me, Baby”: The Virus in Action . 29 Three Extreme Possibilities . 83 Four To Devour and Transform: Viral Metaphors in Science Fiction by Women . 113 Five The Body Electr(on)ic Catches Cold: Viruses and Computers . 148 Six Coda: Viral Futures .
    [Show full text]
  • THE CBW CONVENTIONS BULLETIN News, Background and Comment on Chemical and Biological Weapons Issues
    THE CBW CONVENTIONS BULLETIN News, Background and Comment on Chemical and Biological Weapons Issues ISSUE NO. 61 SEPTEMBER 2003 Quarterly Journal of the Harvard Sussex Program on CBW Armament and Arms Limitation NON-LETHAL WEAPONS, THE CWC AND THE BWC It is hard to think of any issue having as much potential for including short-term memory impairment, breathing jeopardizing the long-term future of the Chemical and difficulty and flaccid paralysis! One of these chemicals is Biological Weapons Conventions as does the interest in fentanyl, which was the basis for the knockout gas used by creating special exemptions for so-called non-lethal Russian special forces to rescue several hundred hostages chemical weapons! The First CWC Review Conference in the Moscow theatre siege of October 2002! The US Army earlier this year was opportunity to address the issue Chemical Corps was studying fentanyl and related chemicals constructively! But, save in the national statements of New as candidate disabling weapons as early as May 1963! Zealand, Norway and Switzerland, the OPCW chose not to There are innumerable other kinds of receptors in the do so! In the programme of Review-Conference follow-up brain, most of which we know almost nothing about! Of the work that is now getting under way, there is no mention of few that have been investigated, we do know that some can disabling chemicals, not even tear gas, still less the so-called mediate temporary blindness, for example, or can cause calmatives and other such incapacitating agents in which submissiveness,
    [Show full text]
  • Nov03 POSTER1106.Indd
    The National Cancer Institute Ft. Detrick’s 60th Anniversary story on page 3. News from the NCI-Frederick NOVEMBER 2003 Offi ce of Scientifi c Operations IN THIS ISSUE This year we celebrate the 60th Owned-Contractor Operated (GOCO) Ft. Detrick’s 60th Anniversary 3 anniversary of Fort (Ft.) Detrick. facility. Ft. Detrick’s roots can be traced to The fi rst employees of the NCI- Major Construction Projects 4 a small municipal airport known as Frederick (then known as the Detrick Field1, The Field was named Frederick Cancer Research Center) Building 470 Update 5 to honor Major Frederick L. Detrick, appeared on campus in June 1972 and who served in France during World numbered around 20 by the end of Scientifi c Publications, War I. The fi rst military presence at that month. By 1976 these numbers Graphics & Media News 6 the airfi eld was in 1931 when the had grown to about 750 individuals, Maryland National Guard established and by 1987 the staff numbered over Awards 6 a cadet pilot training center at Detrick 1,400 with a budget of nearly $100 Field and subsequently Platinum Publications 8 changed the name to Camp Detrick. Poster-Script 11 As we pause to think about the history of Ft. Did You Know? 12 Detrick and the many contributions that the Transfer Technology Branch 14 staff of Ft. Detrick has made in the areas of Community Outreach 15 infectious disease and national defense, it Offi ce of Diversity and seems that now is an Employee Programs 16 appropriate time to also look back at the history Environment, Health, and Safety of the NCI here at Ft.
    [Show full text]
  • Bioterrorism & Biodefense
    Hugh-Jones et al. J Bioterr Biodef 2011, S3 Bioterrorism & Biodefense http://dx.doi.org/10.4172/2157-2526.S3-001 Review Article Open Access The 2001 Attack Anthrax: Key Observations Martin E Hugh-Jones1*, Barbara Hatch Rosenberg2 and Stuart Jacobsen3 1Professor Emeritus, Louisiana State University; Anthrax Moderator, ProMED-mail, USA 2Sloan-Kettering Institute for Cancer Research and State Univ. of NY-Purchase (retired); Scientists Working Group on CBW, Center for Arms Control and Non-Proliferation, USA 3Technical Consultant Silicon Materials, Dallas, TX,USA Abstract Unresolved scientificquestions, remaining ten years after the anthrax attacks, three years after the FBI accused a dead man of perpetrating the 2001 anthrax attacks singlehandedly, and more than a year since they closed the case without further investigation, indictment or trial, are perpetuating serious concerns that the FBI may have accused the wrong person of carrying out the anthrax attacks. The FBI has not produced concrete evidence on key questions: • Where and how were the anthrax spores in the attack letters prepared? There is no material evidence of where the attack anthrax was made, and no direct evidence that any specific individual made the anthrax, or mailed it. On the basis of a number` of assumptions, the FBI has not scrutinized the most likely laboratories. • How and why did the spore powders acquire the high levels of silicon and tin found in them? The FBI has repeatedly insisted that the powders in the letters contained no additives, but they also claim that they have not been able to reproduce the high silicon content in the powders, and there has been little public mention of the extraordinary presence of tin.
    [Show full text]
  • David Christopher Kelly, 1944-2003
    David Christopher Kelly, 1944-2003. We mourn the passing of David Kelly, a modest and good man, an internationally recognised British authority on biological weapons, and a valued friend of the Harvard Sussex Program. He died on 17 July 2003. He was then Senior Adviser to the Directorate of Counter Proliferation and Arms Control of the UK Ministry of Defence and to the Counter Proliferation Department of the UK Foreign and Commonwealth Office. He had become a member of the country’s Scientific Civil Service in 1973 upon joining, as a molecular virologist, what is now the National Environment Research Council Centre for Ecology and Hydrology in Oxford. There he contributed much to the field of biological control applicable in agriculture, specifically the use of viruses to attack insect pests. In July 1984 he was recruited by the Ministry of Defence to work at what was then the Chemical Defence Establishment at Porton Down as head of microbiology. He directed the research into improved defensive measures against biological warfare that, during the 1991 Kuwait war, enhanced the protection of UK forces against possible Iraqi biological weapons. He also led the successful decontamination of Gruinard Island, which had been a proving ground for anthrax weapons during the second world war. In 1989 he first became involved as a technical expert in the interpretation of the disturbing data emanating from the Soviet Union, chiefly via defectors such as Vladimir Pasechnik, whom he interviewed early on, that pointed to covert Soviet violation of the 1972 Biological Weapons Convention. In 1990, an initially very private ‘trilateral process’ had been set in motion by the three co-depositaries of the Convention – the governments of the UK, the USA and the USSR — that sought to resolve the situation through on-site inspections in the three countries.
    [Show full text]
  • Agricultural Bioterrorism
    From the pages of Recent titles Agricultural Bioterrorism: A Federal Strategy to Meet the Threat Agricultural in the McNair MCNAIR PAPER 65 Bioterrorism: Paper series: A Federal Strategy to Meet the Threat 64 The United States ignores the The Strategic Implications of a Nuclear-Armed Iran Agricultural potential for agricultural bioter- Kori N. Schake and rorism at its peril. The relative Judith S. Yaphe Bioterrorism: ease of a catastrophic bio- weapons attack against the 63 A Federal Strategy American food and agriculture All Possible Wars? infrastructure, and the devastat- Toward a Consensus View of the Future Security to Meet the Threat ing economic and social conse- Environment, 2001–2025 quences of such an act, demand Sam J. Tangredi that the Nation pursue an aggres- sive, focused, coordinated, and 62 stand-alone national strategy to The Revenge of the Melians: Asymmetric combat agricultural bioterrorism. Threats and the Next QDR The strategy should build on Kenneth F. McKenzie, Jr. counterterrorism initiatives already underway; leverage exist- 61 ing Federal, state, and local pro- Illuminating HENRY S. PARKER grams and capabilities; and Tomorrow’s War Martin C. Libicki involve key customers, stake- PARKER holders, and partners. The U.S. 60 Department of Agriculture The Revolution in should lead the development of Military Affairs: this strategy. Allied Perspectives Robbin F. Laird and Holger H. Mey Institute for National Strategic Studies National Defense University About the Author NATIONAL DEFENSE UNIVERSITY President: Vice Admiral Paul G. Gaffney II, USN Henry S. Parker is National Program Leader for Aquaculture at the Vice President: Ambassador Robin Lynn Raphel Agricultural Research Service in the U.S.
    [Show full text]
  • April 2000 – February 2001)
    U.S. Commission on National Security/21st Century (click on heading to be linked directly to that section) Phase 1 (July 1998 - August 1999) Major Themes And Implications Supporting Research And Analysis Phase 2 (August 2000 – April 2000) Seeking A National Strategy: A Concert For Preserving Security And Promoting Freedom Phase 3 (April 2000 – February 2001) Roadmap For National Security: Imperative For Change 71730_DAPS.qx 10/12/99 5:06 PM Page #1 NEW WORLD COMING: AMERICAN SECURITY IN THE 21ST CENTURY MAJOR THEMES AND IMPLICATIONS The Phase I Report on the Emerging Global Security Environment for the First Quarter of the 21st Century The United States Commission on National Security/21st Century September 15, 1999 71730_DAPS.qx 10/12/99 5:06 PM Page #3 Preface In 1947, President Harry Truman signed into law the National Security Act, the landmark U.S. national security legislation of the latter half of the 20th century. The 1947 legislation has served us well. It has undergirded our diplomatic efforts, provided the basis to establish our military capa- bilities, and focused our intelligence assets. But the world has changed dramatically in the last fifty years, and particularly in the last decade. Institutions designed in another age may or may not be appropriate for the future. It is the mandate of the United States Commission on National Security/21st Century to examine precise- ly that question. It has undertaken to do so in three phases: the first to describe the world emerging in the first quarter of the next century, the second to design a national security strategy appropri- ate to that world, and the third to propose necessary changes to the national security structure in order to implement that strategy effectively.
    [Show full text]
  • Find PDF ^ the Demon in the Freezer: a True Story (Paperback)
    96EHBX15RXDC » Book » The Demon in the Freezer: A True Story (Paperback) Find Book THE DEMON IN THE FREEZER: A TRUE STORY (PAPERBACK) Fawcett Books, United States, 2003. Paperback. Condition: New. Language: English. Brand new Book. "The bard of biological weapons captures the drama of the front lines."--Richard Danzig, former secretary of the navy The rst major bioterror event in the United States-the anthrax attacks in October 2001-was a clarion call for scientists who work with "hot" agents to nd ways of protecting civilian populations against biological weapons. In The Demon in the Freezer, his rst nonfiction book since The Hot Zone, a... Read PDF The Demon in the Freezer: A True Story (Paperback) Authored by Richard Preston Released at 2003 Filesize: 3.59 MB Reviews The very best ebook i possibly read through. Indeed, it is enjoy, continue to an amazing and interesting literature. I am just very happy to inform you that here is the best ebook i have read in my personal daily life and may be he finest pdf for possibly. -- Mr. Luis Renner V This sort of ebook is every thing and made me looking in advance and a lot more. It is really basic but excitement inside the fty percent of your book. I realized this book from my i and dad advised this ebook to find out. -- Torrey Schaden TERMS | DMCA NTBTMNEJVEYI » Book » The Demon in the Freezer: A True Story (Paperback) Related Books The Marine Sniping Handbook - Remastered: Completely Overhauled, New & Improved - Full Size Edition - Master the Art of Long-Range Combat Shooting, from Beginner..
    [Show full text]
  • Biologiset Aseet Sodankäynnin Ja Terrorismin Välineenä
    31 BIOLOGISET ASEET SODANKÄYNNIN JA TERRORISMIN VÄLINEENÄ Akateemikko Jorina K. Miettinen .JOHDANTO Myrkkyjä ja tauteja on käytetty sodankäynnin välineinä ilmeisesti aikojen alusta. Historiassa on jo antiikin ajoilta tietoa kaivojen myrkyttämisestä ar­ senikilla tai tautiin kuolleiden eläinten raadoilla. Kuuluisa on keskiajalla rai­ vonnut "musta rutto" (paiserutto, Y. pestis), jonka väitetään saaneen alkunsa tataarien singottua katapultilla ruttoon kuolleiden potilaiden ruumiita piirit­ tämänsä Kaffan (nyk. Feodosia) kaupungin muurien yli Krimillä v. 1346. Sieltä laivoilla paenneet asukkaat toivat sen Kreikkaan mistä se levisi koko Eurooppaan tappaen n. 25 miljoonaa ihmistä eli arviolta kolmasosan maan­ osan väestöstä (1). KUNNIATTOMAT ASEET Kaikkina aikoina myrkkyjen ja tautien käyttö sodassa on herättänyt inhoa ihmisissä, myös valtion johtajissa ja sotapäälliköissä. Vanhat roomalaiset sanoivat, "Armis bella, non venenis geri!", so. "Käykää sotaa aseilla, ei myr­ kyillä!", ja ensimmäisessä maailmansodassa tapahtuneen laajan kaasujen käy• tönjälkeen maailman yleinen mielipide katsoi että myrkkyjen ja tautien käyttö aseena on rikos ihmiskuntaa vastaan. Syntyi kaasu- ja bakteerisodankäynnin kieltävä "Geneven kaasuprotokolla" v. 1925. Se ei kuitenkaan kieltänyt ko. aseiden valmistamista ja varastoimista. Mikroobi- ja toksiiniaseista saatiin v. 1972 aikaan täyskielto (ilman val­ vontasopimusta) , joka astui voimaan v. 1975. Kemiallisista aseista saatiin v. 1993 vastaava täyskieltosopimus, joka astui voimaan v. 1995. Siihen liittyy myös erittäin
    [Show full text]
  • TPWKY This Is Exactly Right
    TPWKY This is Exactly Right. Erin Welsh "The red areas spread into blotches across the face and arms and within hours the blotches broke out into seas of tiny pimples. They were sharp-feeling, not itchy, and by nightfall they covered the face, arms, hands, and feet. Pimples were rising out of the soles of the feet and on the palms of the hands, too. During the night the pimples developed tiny blistered heads and the heads continued to grow larger, rising all over the body at the same speed, like a field of barley sprouting after the rain. They hurt dreadfully and they were enlarging into boils. They had a waxy, hard look and they seemed unripe. Fever soared abruptly and began to rage. The rubbing of pajamas on the skin felt like a roasting fire. By dawn, the body had become a mass of knob-like blisters. They were everywhere, all over, but clustered most thickly on the face and extremities. The inside of the mouth and ear canals and sinuses had pustulated. It felt as if the skin was pulling off of the body, that it would split and rupture. The blisters were hard and dry and they didn't leak, they were like ball bearings embedded in the skin with a soft, velvety-feel on the surface. Each pustule had a dimple in the center. They were pressurized with an opalescent pus. The pustules began to touch one another, and finally they merged into confluent shapes that covered the body like a cobblestone street. The skin was torn away across the body and the pustules on the face combined into a bubbled mass filled with fluid, until the skin of the face essentially detached from its under layers and became a bag surrounding the tissues of the head.
    [Show full text]