Behold, John Brennan’s Scary Memo!

Brennan with TortureI’ve been writing for a long time about the “Scary Memos” the government used to justify its dragnet.

As the Joint IG Report described, they started in tandem with George Bush’s illegal wiretap program, and were written before each 45-day reauthorization to argue the threat to the US was serious enough to dismiss any Fourth Amendment concerns that the President was wiretapping Americans domestically.

Jack Goldsmith relied on one for his May 6, 2004 memo reauthorizing some — but not all — of the dragnet.

Yesterday, James Clapper’s office released the Scary Memo included in the FISA Court application to authorize the Internet dragnet just two months later, on July 14, 2004.

ODNI calls it the Tenet Declaration — indeed it is signed by him (which, given that he left government on July 11, 2004 and that final FISC applications tend to be submitted days before their approval, may suggest signing this Scary Memo was among the very last things he did as CIA Director).

Yet the Memo would have been written by the Terrorist Threat Integration Center, then headed by John Brennan.

Much of the Scary Memo describes a “possible imminent threat” that DOJ plans to counter by,

seeking authority from this Court [redacted] to install and use pen register and trap and trace devices to support FBI investigations to identify [redacted], in the United States and abroad, by obtaining the metadata regarding their electronic communications.

There is no mention of NSA. There is no mention that the program operated without legal basis for the previous 2.5 years. And there’s a very curious redaction after “this Court;” perhaps CIA also made a show of having the President authorize it, so as to sustain a claim that all this could be conducted exclusively on Presidential authority?

After dropping mention of WMD — anthrax! fissile material! chemical weapons! — the Scary Memo admits it has no real details about this “possible imminent threat.”

[W]e have no specific information regarding the exact times, targets, or tactics for those planned attacks, we have gathered and continue to gather intelligence that leads us to believe that the next terrorist attack or attacks on US soil could be imminent.

[snip]

Reporting [redacted] does not provide specific information on the targets to be hit or methods to be used in the US attack or attacks.

But based on “detainee statements and [redacted] public statements since 9/11,” the Scary Memo lays out, CIA believes al Qaeda (curiously, sometimes they redact al Qaeda, sometimes they don’t) wants to target symbols of US power that would negatively impact the US economy and cause mass casualties and spread fear.

It took an “intelligence” agency to come up with that.

Based on that “intelligence,” it appears, but not on any solid evidence, CIA concludes that the Presidential conventions would make juicy targets for al Qaeda.

Attacks against or in the host cities for the Democratic and Republican Party conventions would be especially attractive to [redacted].

And because of that — because CIA’s “intelligence” has decided a terrorist group likes to launch attacks that cause terror and therefore must be targeting the Presidential conventions — the FBI (though of course it’s really the NSA) needs to hunt out “sleeper cells.”

Identifying and disrupting the North American-based cells involved in tactical planning offers the most direct path to stopping an attack or attacks against the US homeland. Numerous credible intelligence reports since 9/11 indicate [redacted] has “sleepers” in North America. We judge that these “sleepers” have been in North American, and the US in general, for much of the past two years. We base our judgment, in part, [redacted] as well as on information [redacted] that [redacted] had operatives here.

Before we get to what led CIA to suggest the US was targeted, step back and look at this intelligence for a moment. This report mentions detainee reporting twice. It redacts the name of what are probably detainees in several places. Indeed, several of the claims in this report appear to match those from the exactly contemporaneous document CIA did on Khalid Sheikh Mohammed to justify its torture program, thus must come from him.

Yet, over a year after KSM had been allegedly rendered completely cooperative via waterboarding, CIA still did not know the answer to a question that KSM was probably one of the only people alive who could answer.

We continue to investigate whether the August 2001 arrest of Zacarias Moussaoui may have accelerated the timetable for the 9/11 attacks because he knew of al-Qa’ida’s intention to use commercial aircraft as weapons.

Nevertheless, they believed KSM was being totally straight up and forthcoming.

Note, too, the CIA relied on claims of sleeper cells that were then two years old, dating back to the time they were torturing Abu Zubaydah, whom we know did give “intelligence” about sleeper cells.

To be sure, we know CIA’s claims of a “possible imminent threat” in the US do not derive exclusively from CIA’s earlier torture (though CIA had claimed, just months earlier, that their best intelligence came from that source for the Inspector General’s report).

Less than 3 weeks after this Scary Memo was written, we’d begin to see public notice of this “possible imminent threat,” when Tom Ridge raised the threat level on August 1, 2004 because of an election year plot, purportedly in response to the capture of Muhammad Naeem Noor Khan in Pakistan on July 13 (which could only have been included in “the Tenet declaration” if Khan were secretly arrested and flipped earlier, because Tenet was no longer CIA Director on July 13). But what little basis the election year plot had in any reality dated back to the December 2003 British arrest and beating of Khan’s cousin, Babar Ahmed, which would lead to both Khan’s eventual capture as well as the British surveillance of Dhiren Barot as early as June 10 and the latter’s premature arrest on August 3. KSM’s nephew, Musaad Aruchi, was also handed over by Pakistan to CIA on June 12; best as I know, he remains among those permanently disappeared in CIA’s torture program. This would also lead to a new round of torture memos reauthorizing everything that had been approved in the August 1, 2002 Bybee Memo plus some.

The claims the US was a target derive, based on the reporting in the NYT, from Dhiren Barot. Barot apparently did want to launch a terrorist attack. Both KSM and Hambali had identified Barot during interrogations in 2003, and he had scouted out attack sites in the US in 2000 and 2001. But his active plots in 2004 were all focused on the UK. In 2007 the Brits reduced his sentence because his plots weren’t really all that active or realistic.

Which is to say this election plot — the Scary Plot that drives the Scary Memo that provided the excuse for rolling out (or rather, giving judicial approval for continuing) an Internet dragnet that would one day encompass all Americans — arose in significant part from 2003 torture-influenced interrogations that led to the real world detention of men who had contemplated attacking the US in 2000, but by 2004 were aspirationally plotting to attack the UK, not the US, as well as men who may have been plotting in Pakistan but were not in the US.

That, plus vague references to claims that surely were torture derived, is what John Brennan appears to have laid out in his case for legally justifying a US dragnet.

You see, it’s actually John Brennan’s dragnet — it all goes back to his Scary Memo — and his role in it is presumably one of the reasons he doesn’t want us to know how many lies went into the CIA torture program.

Brennan’s Scary Memo provides yet more evidence how closely linked are torture and the surveillance of every American.

Mike Flynn Invokes OUR Anthrax and Calls Them the Terrorists

In an interview to mark his departure from the Defense Intelligence Agency, General Mike Flynn talks about the increased threats facing the United States.

Here’s one:

For instance, we’re doing all we can to understand the outflow of foreign fighters from Syria and Iraq, many of them with Western passports, because another threat I’ve warned about is Islamic terrorists in Syria acquiring chemical or biological weapons. We know they are trying to get their hands on chemical weapons and use what they already have to create a chemical weapons capability.

Remember anthrax was used in 2001 [killing five people] and pretty much paralyzed Capitol Hill. If that anthrax had been dispersed more efficiently, it could have killed a quarter million people.

That is, Flynn points to an anthrax terror attack officially blamed on a defense lab employee, not actually solved convincingly at all, but almost certainly carried out by a US government employee or contractor, and says that’s proof terrorists are more dangerous than they used to be.

And he does so to make sure we’re scared. He uses political violence to make sure we treat what is admittedly expanding crises as war.

But he says the mindset of jihadists fighting perpetual wars is something the US cannot understand.

JK: You also said recently that terrorist leaders like Osama bin Laden represent the leadership of al-Qaeda, but that “core al-Qaeda” is its ideology of perpetual jihad.

Flynn: Yes, and unfortunately the core ideology and belief system is spreading, not shrinking. Look at the unbelievably violent videos [of beheadings, executions and the destruction of religious places] coming out of Iraq just in recent days. I’ve physically interrogated some of these guys, and I’ve had the opportunity to hear them talking about their organizations and beliefs. These are people who have a very deeply-rooted belief system that is just difficult for Americans to comprehend. Just think about the mindset of a suicide bomber.

Nowhere besides America’s domestic anthrax attacker does Flynn mention our own actions, not even in his discussion of Ukraine — unless you count extremist adaptation to our attacks.

JK: When the Islamic State of Iraq and Syria routed the Iraqi Army recently, the terrorists also appeared to have become much better organized, disciplined and led.

Flynn: These various groups have learned from fighting the U.S. military for a decade, and they have created adaptive organizations as a means to survive.

Which Flynn immediately follows with this observation about how crafty those Islamic extremists are:

They write about and share ‘Lessons Learned’ all the time. That was something Bin Laden taught them before he died. 

Those crafty terrorists. Actually learning lessons!

USA Freedom Does Not Rein in the Spies

Honest. I started writing about this David Cole column asking, “Can Congress rein in the spies?” before John Brennan admitted that, contrary to his earlier assurances, his spooks actually had been spying on their Congressional overseers and also before President Obama announced that, nevertheless, he still has confidence in Brennan.

Cole’s column isn’t about the the Senate Intelligence Committee’s struggles to be able to document CIA torture, however. It’s about how Patrick Leahy introduced his version of USA Freedom Act “not a moment too soon.”

I don’t want to gripe with the column’s presentation of Leahy’s version of Freedom; with a few notable exceptions (one which I’ll get to), it accurately describes how Leahy’s bill improves on the bill the spies gutted in the House.

I first wanted to point to why Cole says Leahy’s bill comes not a moment too soon.

Leahy’s bill comes not a moment too soon. Two reports issued on Monday bring into full view the costs of a system that allows its government to conduct dragnet surveillance without specific suspicions of wrongdoing. In With Liberty to Monitor All, Human Rights Watch and the ACLU make a powerful case that mass surveillance has already had a devastating effect on journalists’ ability to monitor and report on national security measures, and on lawyers’ ability to represent victims of government overreaching. And the same day, the New America Foundation issued Surveillance Costs, a report noting the widespread economic harm to US tech companies that NSA surveillance has inflicted, as potential customers around the world take their business elsewhere.

Together, these reports make concrete the damaging effects of out-of-control surveillance, even to those with “nothing to hide.” Our democracy has long rested on a vibrant and vigorous press and open legal system. On matters of national security, journalists probably serve as a more important check on the executive than even the courts or Congress.

[snip]

And, it turns out, tech companies also need to be able to promise confidentiality. Customers of Internet services or cloud computing storage programs, for example, expect and need to be certain that their messages and stored data will be private. Snowden’s revelations that the NSA has been collecting vast amounts of computer data, and has exploited vulnerabilities in corporate encryption programs, have caused many to lose confidence in the security of American tech companies in particular.

Cole describes the great costs out-of-control surveillance imposes on journalists, lawyers, and cloud providers, and implies we cannot wait to reverse those costs.

Then he embraces a bill that would not protect journalists’ conversations with whistleblowers (Leahy’s Freedom still permits the traditional access of metadata for counterintelligence purposes as well as the Internet dragnet conducted overseas) or alleged terrorists, would not protect lawyers’ discussions with their clients (the known attorney-client protected collections happened under traditional FISA, EO 12333, and possibly Section 702, none of which get changed in this bill), and would expose American companies’ clouds even further to assisted government access under the new Call Detail Record provision.

Cole does admit the bill does not address Section 702; he doesn’t mention EO 12333 at all, even though both the HRW and NAF reports did.

Senator Leahy’s bill is not a cure-all. It is primarily addressed to the collection of data within the United States, and does little to reform Section 702, the statute that authorizes the PRISM program and allows the government to collect the content of electronic communications of noncitizens abroad, even if they are communicating with US citizens here. And it says nothing about the NSA’s deeply troubling practice of inserting vulnerabilities into encryption programs that can be exploited by any hacker. It won’t, therefore, solve all the problems that the HRW and New American Foundation reports identify. But it would mark an important and consequential first step.

But he doesn’t admit the bill does little to address the specific sources of the costs identified in the two reports. It’s not a minute too soon to address these costs, he says, but then embraces a bill that doesn’t really address the actual sources of the costs identified in the reports.

That is mostly besides the point of whether Leahy’s bill is a fair apples-to-oranges trade-off with the status quo as to represent an improvement — an answer to which I can’t yet give, given some of the obvious unanswered questions about the bill. It is, however, a testament to how some of its supporters are overselling this bill and with it anyone’s ability to rein in the intelligence community.

But it’s one testament to that that bugs me most about Cole’s column. As I noted, he does mention Leahy’s failure to do anything about Section 702. Nowhere in his discussion of 702, however, does he mention that it permits warrantless access to Americans’ content, one which FBI uses when conducting mere assessments of Americans. Which of course means Cole doesn’t mention the most inexcusable part of the bill — its exemption on already soft reporting requirements to provide the numbers for how many Americans get exposed to these back door searches.

I’m not a fancy Georgetown lawyer, but I strongly believe the back door searches — conducted as they are with no notice to anyone ultimately prosecuted based off such information — are illegal, and probably unconstitutional. When retired DC Circuit Court judge Patricia Wald raised these problems with the practice, Director of National Intelligence Counsel Bob Litt simply said it would be “impracticable” to add greater oversight to back door searches. And in spite of the fact that both the President’s Review Group and PCLOB advised significant controls on this practice (which implicates the costs identified in both the HRW and NAF reports), the version of USA Freedom Act crafted by the head of the Senate Judiciary Committee — the Committee that’s supposed to ensure the government follows the law — not only doesn’t rein in the practice, but it exempts the most egregious part of the practice from the transparency applauded by people like Cole, thereby tacitly endorsing the worst part of the practice.

And all that’s before you consider that the IC also conducts back door searches of EO 12333 collected information — as first reported by me, but recently largely confirmed by John Napier Tye. And before you consider the IC’s explicit threat — issued during the passage of the Protect America Act — that if they don’t like any regulation Congress passes, they’ll just move the program to EO 12333.

The point is, Congress can’t rein in the IC, and that’s only partly because (what I expect drives the Senate’s unwillingness to deal with back door searches) many members of Congress choose not to. The have not asserted their authority over the IC, up to and including insisting that the protections for US persons under FISA Amendments Act actually get delivered.

In response to the news that Brennan’s spies had been spying on its Senate overseers, Patrick Leahy (who of course got targeted during the original PATRIOT debate with a terrorist anthrax attack) issued a statement insisting on the importance of Congressional oversight.

Congressional oversight of the executive branch, without fear of interference or intimidation, is fundamental to our Nation’s founding principle of the separation of powers.

Yet his bill — which is definitely an improvement over USA Freedumber but not clearly, in my opinion, an improvement on the status quo — tacitly endorses the notion that FBI can conduct warrantless searches on US person communications without even having real basis for an investigation.

That’s not reining in the spies. That’s blessing them.

The “Conspiracy Theory” That Prompted Kevin Curtis’ Earlier Letters to Politicians

Yesterday, charges against Paul Kevin Curtis that he sent letters testing positive for ricin to Senator Lowell Wicker and the White House were dropped. It is quite encouraging that the FBI would this time choose not to continue harassing Curtis once they realized they had no evidence against him, unlike their behavior in the Amerithrax case where they pursued Steven Hatfill for years (until paying out a $2.8 million dollar settlement) and drove Bruce Ivins to his grave on the basis of evidence that couldn’t withstand scrutiny.

Curtis was true to his quirky and colorful character yesterday after being released, and the New York Times reported how he explained at a subsequent press conference that he had no idea what ricin is:

Mr. Curtis, a party entertainer who dresses and sings as Elvis, Prince, Johnny Cash, Bon Jovi and others, had been in jail since Wednesday. He said he had never even heard of ricin. “I thought they said rice,” he said. “I said I don’t even eat rice.”

Curtis was already known to local officials when the tainted letters surfaced and most press coverage of his arrest provided details about why he wrote so many letters before the tainted ones emerged. From a Washington Post article on his arrest:

But a darker world apparently also existed for Curtis, according to frequent writings on social media Web sites, legal records and a lengthy trail of letters sent previously to lawmakers from Mississippi to Capitol Hill.

The man the FBI says unnerved much of official Washington this week, leaving mail handlers, staffers and aides seeing danger in any crinkled or unmarked envelope, was also a well-practiced conspiracy theorist. He wrote online that Elvis-impersonating contests had become rigged and politicized.

Many of his diatribes revolved around conspiracy theories, on which he blamed many of the malignancies in his life. The broken relationships, the financial duress, the increasing isolation he perceived — all grew out of an episode when he was working in a morgue as a contract cleaner, according to an online post on ripoffreport.com, which was signed, “I am Kevin Curtis and I approve this message.”

According to the long, detailed post, Curtis accidentally discovered bags of body parts in the morgue and reported his finding to authorities, who immediately made him a “person of interest where my every move was watched and video taped.” He described cameras zooming in on him and said he was followed by agents.

So the picture painted when he was arrested and charged was that Curtis was a disturbed person who was so crazy he believed that there is a black market in human body parts and that he was being persecuted for exposing a portion of that market. Interestingly, now that the charges against him have been dropped, the New York Times piece linked above makes no mention of the conspiracy theory while today’s Washington Post story makes only a very brief reference to it in a list of other portions of his life story:

Curtis is known for detailed Internet diatribes, his long-held conspiracy theory about underground trafficking in human body parts — which he has turned into a novel-in-progress called “Missing Pieces” — and his work as an Elvis impersonator. The Corinth, Miss., man has been arrested four times since 2000 on charges that include cyber-harassment.

Curtis’ account of discovering evidence of illegal body part trafficking stood out to me because I knew that such illegal trafficking in fact exists. A local firm here in Gainesville has been in the middle of an ugly story unfolding around the difficult legal and ethical issues relating to how tremendous advances in medical science have driven a huge demand for human tissue and bone.

Most people are quite aware of the process of organ transplantation and how organ donation either through advance planning or by surviving family members signing off on donation saves many lives. But there also are many medical procedures that rely on human bone or tissue that has been processed.

Back in July of 2012, the International Consortium of Investigative Journalists posted a long article that goes into the details of the black market for human tissue and bones and how this market is driven by the huge profits to be made: Read more

BioWatch: Even Stupider Than Reagan’s “Star Wars” System

On July 31 of this year, President Barack Obama signed a cover letter attached to the White House release of the National Strategy for Biosurveillance (pdf). The misguided premise on which this strategy (and the underlying boondoggle of the program known as BioWatch) rests stands out clearly in the President’s opening sentence:

There is no higher priority than the security and safety of the American people.

The mass delusion that total safety is both achievable and worth the tremendous sacrifices of resources and liberties that would be needed to even get close to such a state got a huge boost in President Ronald Reagan’s watershed “Star Wars” speech of March 23, 1983, giving birth to the Strategic Defense Initiative. It was clear from the start that this program had no chance of working as Reagan dreamed it, but massive amounts of money went into the program anyway, as William Broad described last month (emphasis added):

Since the 1980s, when President Ronald Reagan began the modern hunt for defenses against long-range missiles, Washington has spent more than $200 billion devising ways to hit incoming enemy warheads that move at speeds in excess of four miles per second. Critics have long faulted the goal as delusional, saying that any country smart enough to make intercontinental ballistic missiles could also make simple countermeasures sure to foil any defense.

President George W. Bush announced the program that would become BioWatch as a part of his larger Project Bioshield in his 2003 State of the Union address (again, emphasis added):

We’ve intensified security at the borders and ports of entry, posted more than 50,000 newly trained federal screeners in airports, begun inoculating troops and first responders against smallpox, and are deploying the nation’s first early warning network of sensors to detect biological attack.

/snip/

I thank the Congress for supporting these measures. I ask you tonight to add to our future security with a major research and production effort to guard our people against bio-terrorism, called Project Bioshield.

The budget I send you will propose almost $6 billion to quickly make available effective vaccines and treatments against agents like anthrax, botulinum toxin, ebola and plague. We must assume that our enemies would use these diseases as weapons, and we must act before the dangers are upon us.

(APPLAUSE)

The monitoring system that is now BioWatch is rife with problems. David Willman of the Los Angeles Times has continuously documented the many problems with and failings of BioWatch. He has informed us of the extremely high false positive rate from the currently deployed version of the system and has followed in real time the failures as DHS has forged ahead in purchasing the next generation of the technology before it is ready.

Willman’s latest article, carried by McClatchy, reveals jaw-dropping failures by the BioWatch system along with a cynical cover-up by the Department of Homeland Security: Read more

New Anthrax Scare: This Time Leahy’s Letter Tests Negative

With the war drums on Iran beating loudly, homeland security theater is ratcheting up yet another level as a wave of letters containing a powdery substance have been mailed again to media and political figures. This time, unlike the October-November 2001 episode, all letters tested so far have been negative for anthrax or other harmful substances, but the mailer has threatened that ten percent of the large number of letters mailed will be deadly. Most notable in this current series is that a letter was received at the Burlington, Vermont office of Senator Patrick Leahy. Recall that Senator Leahy was one of those targeted with the most deadly version of the anthrax mailed in 2001.

Details on this latest episode were first reported by Reuters on Wednesday:

Several members of the Congress received mail threatening a biological attack and containing a suspicious powder later found to be harmless as law enforcement officials warned on Wednesday that more letters could be on their way.

A number of media organizations and TV shows, including the New York Times and The Daily Show with Jon Stewart, received mail postmarked Oregon warning that letters had been sent to the Washington or local offices of all 100 U.S. senators and that 10 contained a deadly pathogen, a law enforcement source said.

House of Representatives Speaker John Boehner, the top Republican in Congress, received a letter containing a powdery substance at one of his offices in his home state of Ohio, a Republican aide said, adding that the powder was harmless.

/snip/

In a notice to Senate staffers titled “Urgent: Suspicious Mail Alert,” [Senate Sergeant at Arms Terrance] Gainer warned that the sender of the letters had “indicated that additional letters containing a powdery substance will be arriving at more Senate offices and that some of these letters may contain actual harmful material.”

More details have since come out:

The letters make vague complaints about too much money in politics and had a Portland, Oregon return address from an organization listed as “The MIB, LLC,” a law enforcement official told CBS News.

In addition to the letters to the lawmakers, officials said television comedians Jon Stewart and Stephen Colbert received letters mentioning the letters to senators.

The author told the comedians he would send letters to all 100 senators and ten percent of them would contain “lethal pathogens,” an official told CBS News.

The author wanted an end to corporate money and lobbying, an end to “corporate personhood,” and called for a new constitutional convention to rewrite the constitution.

The author also told the comedians he would tell the senators they are “working for the wrong side” and there is a ten percent chance they have been exposed to a lethal pathogen. The author also said he “randomized” which letters would contain the pathogen and even he did not know who would get which letter.

Because of the advance notice, the letter received at Leahy’s office was spotted and the authorities were called: Read more

Anthrax Sent to Pakistan’s PM Begs Question of Whether FBI Investigated Presumed Anthrax Sent to US Pak Embassy in 2001

Yesterday’s revelation by Pakistan that a package containing anthrax had been sent to Prime Minister Yousuf Raza Gilani has both shocked Gilani’s security staff and provoked memories that anthrax was sent to multiple targets in Pakistan in late 2001 while the US was enduring its own deadly anthrax attacks. Thinking on these issues raises the question of why the FBI had in its possession a sample of presumed anthrax sent to the US embassy in Pakistan in late 2001 but we have not seen a comparison of its DNA to the DNA of the anthrax used in the US attacks of 2001.

Although initial reports suggested that the parcel was received at the Prime Minister’s residence about 20 days ago, the consensus now is that the package was received last October. Multiple reports are claiming the package was sent by a “female professor” in Jamshoro, just north of Karachi. So far, only the New York Times has provided a portion of the suspect’s name. I have found a faculty listing for a female associate professor whose name includes the portion printed in the Times, but since her field of work as listed does not overlap at all with the biological and microbiological skills that would be needed to produce anthrax, I will not repeat the name, since there is a distinct possibility her name was chosen randomly.

One of the more detailed reports comes from The News:

The Secretariat sources told The News that Deputy Secretary Abdul Hafiz, in his written complaint said: “The Secretariat received a registered envelop (Registered No 209) from Sindh University, Campus Colony, Jamshoroo, in the name of Prime Minister of Pakistan Yusuf Raza Gilani through the Post Office in the inner CR Section of this Secretariat on October 18, 2011, at 3:20pm. There was also a plastic envelop inside the outer paper envelop, containing some type of powder or chemical. On receipt of the envelop, the security officer of the Secretariat sent the envelop, along with the material, to Dr Shaukat Pervaiz, PCSIR, Islamabad, for its examination and submission of report.

We also learn from the Daily Times that the anthrax may have been weaponized:

 A senior police official, on the condition of anonymity, told Daily Times that the packet was received by a security official at the main gate of the secretariat. The security official found that the packet was filled with a suspicious powder and sent it to the PCSIR laboratories for test. “The PCSIR report confirmed that the packet was filled with anthrax, which could also contain silica or other sophisticated additives to make it float more easily in the air,” the police official maintained.

Given that the anthrax was real and possibly even weaponized accounts for the fear shown by Gilani’s security staff:

The security staff members of Prime Minister Yousuf Raza Gilani on Wednesday went into a state of shock over the revelation that a parcel received at their boss’s official residence in October last year carried deadly anthrax.

It would appear that the anthrax was meant as a warning, considering that it was sealed inside plastic within the paper envelope in which it was mailed. Read more

Did Ivins Move the Refrigerator? New Cold Facts Cast Further Doubt on Amerithrax Conclusions

The top-notch Frontline/ProPublica/McClatchy group that has been continuing to investigate the anthrax attacks of 2001 and the subsequent Amerithrax investigation by the FBI posted some photos on Monday that they obtained through FOIA requests. They are here. Mouse over the first photo and then you can click through the slideshow. The most important photo is the one of the lyophilizer. The FBI is claiming Bruce Ivins used this to dry the spores used in the attacks. That is not two pieces of equipment in the photo; here’s a clearer shot of what looks like the same model available on the used market. The thing is huge! The problem is that it is NOT in Ivins’ “hot suite”, so using it in its place would have put spores all over the place in area where at least some of the personnel probably weren’t vaccinated (and thus would have died). This would have been an obvious contamination event Ivins could not have hidden. Technically, the lyophilizer is “mobile”, but as you can see, it’s the size of a refrigerator and it would have been obviously missing if Ivins wheeled it into the hot suite. Also, it uses 220V (see the wiring that obviously was put in so the lyophilizer could be used in this spot), so Ivins might not have had an outlet available in the hot lab. Also notice the piece of paper on the top part;  that’s most likely a sign-up sheet to reserve it since this thing is used for drying down large amounts of liquid and these runs take a number of hours. You can bet if Ivins had signed into the log during the critical period we would know about it. There is only one sheet there, though, so the sheet from the appropriate time period might not have survived until the time USAMRIID was being looked at carefully.

Here is the photo of the lyophilizer, slightly enlarged from the PBS website:

The caption supplied by the Frontline/ProPublica/McClatchy team reads:

The lyophilizer, or freeze dryer, which the FBI says Ivins could have used to make the attack anthrax. Stored outside of the secure BSL-3 hot suite, the lyophilizer was a central focus of the investigation; however, the FBI was never able to definitively link it to the attack anthrax, and some of Ivins’ colleagues are skeptical that he would have risked drying anthrax outside of the secure suite.

The FBI’s claim that this lyophilizer was used by Ivins came about in a very emabarrassing way for the Department of Justice. DOJ had submitted a document in the wrongful death suit filed by the widow of Robert Stevens, who was the first fatality in the attacks. The initial filing stated flatly that Bruce Ivins did not have access to the equipment needed to dry the anthrax spores used in the attacks. After the FBI went ballistic over that filing, a judge allowed DOJ to submit an amended document (see page 3) where DOJ referred to the “refrigerator sized” lyophilizer in the BSL-2 containment area, where DOJ also noted that no work with live anthrax was carried out.

For those of you who want more details on the science behind the reasoning that Ivins could not have used this lyophilizer in this spot to dry the spores used in the attack, keep reading after the jump.  Read more

In Ferreting Out Science’s Secrets, There Is No Room for Censorship

Ferret photo via Wikimedia Commons

On Tuesday afternoon, the Washington Post announced that the National Science Advisory Board for Biosecurity (NSABB) has officially asked two scientific journals to censor portions of manuscripts that are pending for publication:

The federal government on Tuesday asked two science journals to censor parts of two papers describing how researchers produced what appears to be a far more dangerous version of the “bird flu” virus that has circulated in Asia for more than a decade.

/snip/

After weeks of reviewing the manuscripts the board recommended their “general conclusions” be published but “not include the methodological and other details that could enable replication of the experiments by those who would seek to do harm.”

The board — 23 scientists and public-health experts from outside the government, and 18 from within — cannot stop publication. Its advice goes to the Department of Health and Human Services, whose leaders will ask the journals — Science, published in Washington, and Nature, published in London — to comply.

The folly of the board’s request is monumental. First of all, it’s already too late for the workers to “not include the methodological and other details that could enable replication of the experiments”. Read more

Why Didn’t DOJ Look More Closely at DTRA’s Role in 2001 Anthrax Attacks?

The 317,000 square foot DTRA headquarters opened in 2005 to bring together the agency's 2000 employees.

[Note: This post has been updated to correct an error regarding the location of the Project BACUS facility.  Erroneous material has not been deleted but has been put into strikethrough font.]

In following up on yesterday’s announcement that the family of Robert Stevens, the first victim in the 2001 anthrax attacks, has settled their wrongful death suit with the US Government for $2.5 million, Marcy came across a number of documents recently released through the case. One of those documents got my attention from its title: “Integrated Capabilities Assessment of the U.S. Army Medical Research Institute of Infectious Diseases” (USAMRIID Capabilities pdf). I had anticipated that the document would be a technical assessment that would be relevant to the question of whether the facilities and equipment available to Bruce Ivins would have been appropriate for production of the anthrax spores used in the 2001 attacks. However, it turns out that the document was a report on a 1996 security assessment of the USAMRIID facility where Ivins worked. I almost moved on to other documents, but then I saw the list of agencies that conducted the review:

The last entry on the list is what stands out. The Defense Special Weapons Agency was folded into the newly formed Defense Threat Reduction Agency, or DTRA, in late 1998. And DTRA was important to me because they were the agency that carried out Project BACUS, first reported by Judy Miller on September 4, 2001. Miller’s Times article described DTRA building a facility at the Dugway Proving Grounds in Utah Nevada Test Site with a 50 liter fermenter capable of producing bioweapons microbes. The project was an exercise to determine how difficult it would be for authorities to spot a bioweapons production facility built by terrorists. Later, I found that in her bioweapons book published in 2001, Miller disclosed that the BACUS facility also is capable of weaponizing bacterial spores.

With those bits of history in mind, some of the findings from the 1996 assessment stand out. From the introductory material, we find this summary: Read more

image_print