SlideShare a Scribd company logo
Bioterrorism Confronting A Complex Threat
Andreas Wenger Editor download
https://ebookbell.com/product/bioterrorism-confronting-a-complex-
threat-andreas-wenger-editor-51894114
Explore and download more ebooks at ebookbell.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Bioterrorism The History Of A Crisis In American Society Epidemics
Bioweapons And Policy History 1st Edition David Mcbride
https://ebookbell.com/product/bioterrorism-the-history-of-a-crisis-in-
american-society-epidemics-bioweapons-and-policy-history-1st-edition-
david-mcbride-48332162
Bioterrorism A Guide For Facility Managers Joseph F Gustin
https://ebookbell.com/product/bioterrorism-a-guide-for-facility-
managers-joseph-f-gustin-2222268
Bioterrorism Field Guide To Disease Identification And Initial Patient
Management Dag Kje Von Lubitz
https://ebookbell.com/product/bioterrorism-field-guide-to-disease-
identification-and-initial-patient-management-dag-kje-von-
lubitz-2248502
Bioterrorism S Morse
https://ebookbell.com/product/bioterrorism-s-morse-4113600
Bioterrorism Preparedness Medicine Public Health Policy Nancy Khardori
https://ebookbell.com/product/bioterrorism-preparedness-medicine-
public-health-policy-nancy-khardori-4300046
Bioterrorism In Medical And Healthcare Administration 1st Edition
Laure Paquette Author
https://ebookbell.com/product/bioterrorism-in-medical-and-healthcare-
administration-1st-edition-laure-paquette-author-11909438
Bioterrorism And Food Safety 1st Edition Barbara A Rasco
https://ebookbell.com/product/bioterrorism-and-food-safety-1st-
edition-barbara-a-rasco-1269930
Bioterrorism Preparedness Attack And Response 1st Edition M Fottler
https://ebookbell.com/product/bioterrorism-preparedness-attack-and-
response-1st-edition-m-fottler-1343014
Bioterrorism And Infectious Agents A New Dilemma For The 21st Century
1st Edition Kenneth Alibek
https://ebookbell.com/product/bioterrorism-and-infectious-agents-a-
new-dilemma-for-the-21st-century-1st-edition-kenneth-alibek-1623982
Bioterrorism Confronting A Complex Threat Andreas Wenger Editor
Bioterrorism
Wenger_FM.qxd 12/14/06 11:29 AM Page i
Wenger_FM.qxd 12/14/06 11:29 AM Page ii
Bioterrorism
Confronting
a Complex Threat
edited by
Andreas Wenger
Reto Wollenmann
Wenger_FM.qxd 12/14/06 11:29 AM Page iii
Published in the United States of America in 2007 by
Lynne Rienner Publishers, Inc.
1800 30th Street, Boulder, Colorado 80301
www.rienner.com
and in the United Kingdom by
Lynne Rienner Publishers, Inc.
3 Henrietta Street, Covent Garden, London WC2E 8LU
© 2007 by Lynne Rienner Publishers, Inc. All rights reserved
Library of Congress Cataloging-in-Publication Data
Bioterrorism : confronting a complex threat / Andreas Wenger and
Reto Wollenmann (eds.).
p. cm.
Includes bibliographical references and index.
ISBN-13: 978-1-58826-525-8 (hardcover : alk. paper)
1. Bioterrorism. 2. Bioterrorism—Prevention. I. Wenger, Andreas.
II. Wollenmann, Reto.
HV6433.3.B56 2007
363.325'3—dc22
2006033578
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book
is available from the British Library.
Printed and bound in the United States of America
The paper used in this publication meets the requirements
of the American National Standard for Permanence of
Paper for Printed Library Materials Z39.48-1992.
5 4 3 2 1
Wenger_FM.qxd 12/14/06 11:29 AM Page iv
Foreword, Richard Danzig vii
Acknowledgments ix
1 Bioterrorism: A Complex Threat 1
Andreas Wenger and Reto Wollenmann
Part 1 Understanding the Threat:
Actors and Capabilities
2 The Legacy of Secret State Programs 13
Jeanne Guillemin
3 Evolution of the Current Threat 39
Milton Leitenberg
4 The Impact of Scientific and Technological Change 77
Malcolm Dando
Part 2 Assessing the Threat: Differing Perceptions
5 Knowledge Gaps and Threat Assessments 93
Peter R. Lavoy
6 Why Do Conclusions from the Experts Vary? 119
Marie Isabelle Chevrier
v
Contents
Wenger_FM.qxd 12/14/06 11:29 AM Page v
Part 3 Managing the Threat: Policy Options
7 When to Cry Wolf, What to Cry, and How to Cry It 155
Anthony H. Cordesman
8 More Transparency for a Secure Biodefense 179
Iris Hunger
Part 4 Conclusion
9 Securing Society Against the Risk of Bioterrorism 199
Andreas Wenger
List of Acronyms 221
Bibliography 223
The Contributors 227
Index 229
About the Book 241
vi Contents
Wenger_FM.qxd 12/14/06 11:29 AM Page vi
THE USE OF PATHOGENS AS WEAPONS OF WAR AND TERROR HAS A LONG HISTORY,
but in recent years our focus on these risks has greatly intensified. Ear-
lier, many policymakers thought of bioweapons as the stuff of antiquity
(cadavers catapulted over walls to spread plague in medieval cities
under siege, blankets infected with smallpox to decimate American
Indians opposing the British in their American colonies) or eccentricity
(a Rajneeshee cult spreading salmonella in salad bars to disable politi-
cal opponents, Aum Shinrikyo attempting to obtain and work with
anthrax before resorting to sarin in their efforts to trigger an apocalypse
by attacking Tokyo subway passengers). Starting in 1989, however,
Russian defectors triggered an appreciation of how heavily the Soviet
Union had invested in this weaponry. More recently, the attacks of Sep-
tember 11, 2001, and the anthrax letters that were mailed to US senators
and media figures immediately afterward focused attention on both bio-
weaponry and the imaginative malevolence of terrorist groups that
might use it. Since that time, an order of magnitude more money, effort,
and debate has gone into the subject.
The first response when confronting a newly perceived risk is to con-
tinue to do what was being done previously in other contexts, but to re-
label it as relevant to the new threat. A second common reaction is to
allocate much more money to the problem, permitting us to double, quad-
ruple, or otherwise greatly multiply those preexisting efforts. A third
response is to reorganize: forming committees, councils, commissions,
divisions, and ultimately even departments bearing names that suggest
they will solve, or at least address, the newly perceived problem.
Normally, it is only later that we start to do what we should have
done first: debate the character of the new problem. How substantial is
vii
Foreword
Wenger_FM.qxd 12/14/06 11:29 AM Page vii
this risk? What are its special characteristics? Will the problem be the
same in the next decades as at present? How might it manifest itself?
What near-term capabilities might protect us? Are these capabilities the
same as those we should be pursuing for the long term, or do our long-
term and short-term strategies diverge? It is only when these and other
fundamental questions are asked and answered that we can begin to
choose wisely among existing efforts, detect the gaps in what we are
doing, initiate relevant new efforts, and organize and invest to respond
to our challenges.
It took us some years to develop new thinking in response to the
realities of nuclear weapons. Bioterrorism is, if anything, a more com-
plicated problem. It demands not only an understanding of both biol-
ogy—a science that is changing faster than nuclear physics did after
World War II—and terrorism, but also a grasp of such diverse topics as
the physics of aerosols, our food distribution systems, agricultural and
public health systems, mechanisms of decontamination, and systems of
policing and interdiction.
Moreover, in one dimension bioterrorism is a security problem,
related to foreign enemies. In another, it is a domestic problem, subject
to exploitation by criminals and disaffected loners as in the model of the
Unabomber. Viewed a third way, bioterrorism is intimately connected to
natural challenges, particularly those of pandemic disease. From a
fourth perspective, bio-challenges may occur from “bio-blunders,”
problems that arise neither naturally nor malevolently but from scien-
tists who accidentally unleash new pathogens. Fifth, bioterrorism should
not be considered in isolation, but instead in tandem with all other po-
tential hazards.
It should not be surprising, then, that we are still in the midst of
debate and at present have no consensus as to the problem, much less as
to how to deal with it. It is the strength of this volume that it captures
the range and richness of this debate. While we have no consensus, the
way we will get there is through discussions like this.
—Richard Danzig,
Former Secretary of the US Navy (1998–2001)
viii Foreword
Wenger_FM.qxd 12/14/06 11:29 AM Page viii
THIS BOOK EVOLVED OUT OF AN ATTEMPT TO SHED NEW LIGHT ON THE BIOTERROR-
ism threat—a threat that became the subject of widespread media atten-
tion and political rhetoric in the aftermath of the 2001 anthrax letters.
It is the result of collaboration by an interdisciplinary group of col-
leagues in areas ranging from security policy and counterterrorism to
public health and the life sciences.
Along the way, we received the support and assistance of many peo-
ple and in a variety of ways. We thank the authors of this book for their
patience with our comments and suggestions and for their willingness to
take into account new developments. A conference organized by ETH
Zürich (Swiss Federal Institute of Technology) was a crucial part of our
collaborative process, and we thank all the conference participants who
presented their views and shared their insights. In addition to the
authors of this volume, they are Ken Alibek, Janet Martha Blatny, Jürg
Balmer, Edward Borodzicz, Richard Danzig, Myriam Dunn, Gerald
Epstein, Ernst Felberbauer, John Gilbert, Frank Gottron, Gigi Kwik Grön-
vall, Jesper Grönvall, Michael Guery, Rohan Gunaratna, Stein Henriksen,
Melissa Hersh, David Heyman, David Humair, Frida Kuhlau, Ajey Lele,
Michael Mair, Mark Maskow, Victor Mauer, Michael Moodie, Eric K.
Noji, Anders Norqvist, Aleksandr Rabodzey, Klaus Riedmann, Martin
Schütz, Yoram Schweitzer, Ted Whiteside, and Doron Zimmermann.
We are delighted that our manuscript ended up in the capable hands
of Lynne Rienner and Lisa Tulchin, who have handled the review and
publication process with great skill. We wish to extend our thanks to
Isabelle Abele-Wigert and Martin Wählisch, and especially to Jennifer
Gassmann of the Center for Security Studies, for their outstanding work
in preparing and organizing the conference. We thank Michelle Norgate
ix
Acknowledgments
Wenger_FM.qxd 12/14/06 11:29 AM Page ix
and Christopher Findlay for their excellent editorial assistance. Finally,
we owe a great debt to Susanne Schmid as a truly indispensable part-
ner in our day-to-day work.
While we have greatly benefited from the comments, criticism, and
encouragement of all those mentioned above, the final responsibility for
any errors is of course ours alone.
—Andreas Wenger and Reto Wollenmann
x Acknowledgments
Wenger_FM.qxd 12/14/06 11:29 AM Page x
Bioterrorism
Wenger_FM.qxd 12/14/06 11:29 AM Page xi
Wenger_FM.qxd 12/14/06 11:29 AM Page xii
BIOTERRORISM, A HIGHLY COMPLEX THREAT, IS THE CONCERN OF A WIDE RANGE
of academic and political fields, including science, politics, law, and se-
curity. Soon after the terrorist attacks of 9/11, the 2001 anthrax letters
and a worldwide series of related hoaxes alerted the world’s media to the
potential threat of bioterrorism and catapulted the issue onto the secu-
rity policy agendas of the United States and many Western governments.
The debate about bioterrorism and biodefense is not entirely new in
expert circles, and, given the difficulties in defining the extent and char-
acteristics of the threat, it comes as no surprise that the many expert
evaluations have often contradicted one another. However, the degree to
which this debate has been—and will continue to be—shaped by US
policies, on the one hand, and by a growing gap between the views held
by the academic community and those held by the policymaking com-
munity, on the other, is indeed remarkable.
This book addresses two important topics: the nature and the rele-
vance of the threat to our societies of the deliberate use of biological
weapons, and the difficulties associated with designing the right policy
mix to successfully manage a complex and still largely unsubstantiated
threat. The better we understand the many challenges involved in the
assessment of the threat—the persistence of political conflict and the
changing nature of terrorist warfare, the present and future activities of
state actors in bioweapons production and biodefense research, the
rapid technological advances in the life sciences, the global spread of
dual-use expertise and commercial biotechnological applications, and
the risk of a rapid global spread of natural diseases—the better able we
will be to deal with the problem.
1
1
Bioterrorism:
A Complex Threat
ANDREAS WENGER AND RETO WOLLENMANN
Wenger_1.qxd 12/12/06 4:16 PM Page 1
An examination of bioterrorism elicits a host of complex questions:
How urgent is the bioterrorism threat? Do we underestimate or overesti-
mate bioterrorism, and what are the potential consequences of our esti-
mates? What can we learn from bioterrorism events of the past? How will
the rapid developments of technology and those in the life sciences
affect the future threat? Who are the likely perpetrators of bioterrorism?
How much of a threat are state actors, nonstate terrorist actors, and
lonely insiders of growing governmental biodefense programs? What
policy options are there for managing the bioterrorism threat? How do
governments prioritize their policies for the prevention and management
of natural diseases, on the one hand, and for the prevention and manage-
ment of the malicious use of bioweapons on the other? To what degree is
bioterrorism a security policy issue as opposed to one of health or other
public policies? The authors of this book address these questions.
While not intended as the final word on bioterrorism, the present
book offers the opportunity to compare a variety of views of experts from
a wide range of professional and academic backgrounds. Most of the lit-
erature to date has focused either on the technical aspects of bioterrorism
or, more generally, on the threat posed by weapons of mass destruction
(WMD). Several recent books, for example, discuss technical issues
related to a specific sector of bioterrorism, such as laboratory security,
food safety, infectious agents, viral bioterrorism, and biodefense or syn-
dromic surveillance.1 Others track the evolution of the WMD threat.2
This book, by contrast, focuses on bioterrorism in general and on the
security policy aspects of the bioterrorism threat in particular.
The book consists of three sections. The first covers actors and capa-
bilities; the second, threat perceptions; and the third, policy options. Part
1 deals with the legacy of the secret state biowarfare programs of the
twentieth century, analyzing the factors that have influenced the histori-
cal evolution of state bioweapons capabilities. Aiming to provide a bet-
ter understanding of the past, it also addresses the controversies sur-
rounding the current threat by both state and nonstate actors. With a view
to the future, it concludes with a discussion of the impact of scientific
and technological change in biology and the associated life sciences on
the potential malicious use of microorganisms by a wide range of actors.
Part 2 addresses the various, and sometimes contradictory, percep-
tions held by different communities about the nature of the biological
weapons threat. It identifies a high level of uncertainty as a key character-
istic of the bioterrorism threat and discusses a series of knowledge gaps
about the scope and sophistication of existing biowarfare programs and
past instances of biowarfare. Examining the literature and identifying
2 Bioterrorism
Wenger_1.qxd 12/12/06 4:16 PM Page 2
uncertainty as the key determiner of such perceptions, it shows why
experts make such very different policy prescriptions even though they
usually work with the same historical data.
Part 3 highlights a set of policy challenges relating to bioterrorism
and offers some solutions to them. It emphasizes the practical problems
that policymakers face when making decisions about the trade-offs
needed between investing resources in defense against bioterrorism and
investing them in the prevention of natural diseases. Finally, it discusses
endeavors for more security in the biosciences and in biodefense pro-
grams, and it calls for more transparency as a precondition for an in-
formed public policy debate at the national and international levels.
Introducing Part 1, Jeanne Guillemin investigates the history of state
biowarfare programs as a means of providing the reader with an assess-
ment of the future likelihood of a bioweapons attack. Unlike chemical
and nuclear weapons, biological weapons were rarely debated in public
in the twentieth century. Secrecy, Guillemin shows, was the most im-
portant facilitator of the growth of the biological warfare programs of
all major powers—whether democracies, republics, monarchies, totali-
tarian states, or military dictatorships—yet the extent of such programs
remained largely unknown, even well into the twenty-first century. In
addition to secrecy, scientific advocacy, an existing military-industrial
infrastructure, the political perception of a dire threat to national sur-
vival, and the doctrine of total war, with its justification of using civil-
ians as targets—all played an essential role in allowing for the creation
of state biological programs.
The end of the Cold War brought about a new awareness of the dan-
gers of biowarfare as the focus shifted to the potential diffusion of bio-
logical weapons to lesser states and nonstate terrorist actors. According
to Guillemin, however, this diffusion is directly affected by the policies
of advanced states in general and the United States in particular. Accel-
erated by the events of 9/11 and the subsequent Amerithrax3 cases, US
interest in—and consequently the research and funding of—biodefense
increased dramatically. Dozens of counter-bioterrorism programs, most
of them concealed from the public and not subject to congressional
oversight, are now entrenched in a wide range of US federal agencies as
a result of the shift in US policies toward defending all its citizens
against germ attack. The emphasis of these programs, Guillemin points
out, is on the development of new biodefense technologies, which has
inadvertently led to a huge increase in the number of trained micro-
biologists who know how to grow and test lethal pathogens for warfare,
Bioterrorism: A Complex Threat 3
Wenger_1.qxd 12/12/06 4:16 PM Page 3
exacerbating the danger of the diffusion of such expertise and technol-
ogy to potential bioterrorists.
The US export of a narrow national security mission to its allies,
Guillemin argues, undermines the long-term security interests of the
United States. A strictly civil defense approach to bioterrorism, like that
of the United States, ignores both the unstoppable global diffusion of
biotechnologies and also the risk of an unusually deadly outbreak of an
infectious disease. The spread of biotechnologies and natural epidemics
can be effectively regulated and controlled only by multiple, coordi-
nated international efforts. The alternative to transparency, institutional
oversight, and organizational accountability at the national level, and to
the criminalization of biological weapons at the international level, Guil-
lemin concludes, is a disease catastrophe that will highlight the danger of
government secrecy and the failures in international cooperation at the
cost of lives and public trust.
Analyzing the current biological weapons threat from state and non-
state actors, Milton Leitenberg takes issue with the claim of some ex-
perts that bioterrorism is the greatest existential threat of our age. Leiten-
berg shows that the number of state bioweapons programs has decreased
markedly over the past few years. Various US authorities implicitly
acknowledged the lessening threat of biowarfare when they dropped
South Africa, Libya, Iraq, and Cuba from their intelligence assessments,
and when they became more cautious after their intelligence failures in
Iraq and qualified their assessments of several other national bioweapons
programs, among them those of Iran, North Korea, and Syria. Accord-
ing to Leitenberg, no state is known to have assisted any nonstate or ter-
rorist group in obtaining biological weapons.
Leitenberg goes on to show that there has been an extremely low
incidence of real biological events in the past, in contrast to the large
number of hoaxes spawned by political rhetoric and media attention.
Aside from several right-wing groups in the United States and the Raj-
neesh group in The Dalles, Oregon, no terrorist group is known to have
successfully cultured any pathogen. The most serious known attempt,
Leitenberg notes, was Al-Qaida’s efforts to develop bioweapons, which
appear to have been at the early conceptual stage when the group’s facil-
ity was overrun by US forces in Afghanistan and the individual who car-
ried out the laboratory work was arrested. In fact, the production and dis-
tribution of anthrax powder in the United States in 2001 remains the most
significant example of a nonstate biological weapons capability.
Since the mid-1990s, the risk and imminence of the use of biologi-
cal agents by nonstate actors and terrorist organizations have been sys-
tematically and deliberately exaggerated and remain almost certainly
4 Bioterrorism
Wenger_1.qxd 12/12/06 4:16 PM Page 4
the single greatest factor in provoking Al-Qaida’s interest in bioweapons,
according to Leitenberg. He further points to increasing concerns about
the risk of a natural flu pandemic, concurring with Guillemin that the
current political rhetoric of the US government should be tempered in
the face of the greater likelihood of a natural disease outbreak, and that
the United States has been using an overwhelming proportion of its
resources to prepare for the wrong contingency.
Focusing on the fields of biology and chemistry, which in recent
years and through recent research breakthroughs have expanded into the
fields of molecular biology and biochemistry, Malcolm Dando addresses
the potential for the misuse of new and developing technologies. Dando
first outlines the stages of development of these sciences in the twenti-
eth century, moving on to show that the palette of agents now available
to potential perpetrators has grown significantly as a result in particu-
lar of new manipulations of old viruses and bacteria. Of special concern
is the fact that genetic engineering of traditional agents could increase
the number of possible agents and the characteristics and uses of such
agents to the extent that biodefense becomes unable to anticipate and
protect against the threats.
In the not-too-distant future the rapidly expanding knowledge in
biology could allow potential attackers to target any number of physio-
logical processes in the human (or animal) body in many different ways.
It took a hundred years, Dando points out, to achieve the ability to de-
code human DNA, and another fifty years to describe the DNA se-
quence of the human species. If developments in genetic science con-
tinue at the current pace, the ease with which various pathogens could
be synthetically produced could well increase—and with it the diversity
of pathogens and the means of delivering such pathogens. Thus, Dando
argues, the future impact of the advances in biology has to be thor-
oughly investigated in order to curb the potential hostile use of life sci-
ence research.
Dando draws the conclusion that we need a web of prevention, that
is, a multilateral set of policies, including better intelligence on poten-
tial perpetrators, effective controls on exports of agents and equipment,
and a strengthening of current public health and emergency planning
procedures. This web of prevention, Dando argues, has to be bound
together by the internationally accepted norm that modern life sciences
must not be used for hostile purposes. The best way of achieving this,
Dando suggests, is to ensure that the Biological and Toxin Weapons
Convention (BTWC) is reassessed by the states parties to give the con-
vention permanent organizational support and to ensure that strong
measures are taken to strengthen the BTWC.
Bioterrorism: A Complex Threat 5
Wenger_1.qxd 12/12/06 4:16 PM Page 5
Introducing Part 2, Peter Lavoy addresses the contrast between, on the
one hand, the extraordinary rhetoric of the United States and other gov-
ernments in describing biowarfare and bioterrorism as one of the most
frightening security threats and, on the other, the low level of prepared-
ness of those governments, societies, and armed forces to deal with this
threat. In explaining this contrast, Lavoy highlights two knowledge gaps,
both linked to a lack of certainty about nearly every aspect of the threat.
The first gap is the poor level of understanding about the scope and
sophistication of the biological warfare programs that state and nonstate
groups might currently possess. The second results from the technical,
political, social, cultural, and other difficulties in identifying, character-
izing, and attributing attacks involving biological weapons once they
have occurred.
Discussing the biological weapons programs of the former Soviet
Union, Iraq, and Al-Qaida, Lavoy points to the failure of the US intel-
ligence community to adequately assess these programs at different
points in time, when that community has either seriously underestimated
the threat, as with the Soviet Union, or dramatically overestimated it, as
with Iraq. Lavoy attributes these errors to a tendency of the US intelli-
gence community to deal with a lack of reliable information by rally-
ing behind one specific hypothesis to explain an adversary’s conduct.
Addressing a set of cases of alleged biowarfare by both superpowers
and other states during the Cold War, Lavoy acknowledges the propa-
ganda value of biological weapons while noting also the extreme diffi-
culty in authoritatively validating their use or nonuse.
The two knowledge gaps addressed by Lavoy make it extremely
difficult for governments to develop effective strategies and policies
and to assign adequate resources to the management of potential bio-
warfare and bioterrorism. In order to ameliorate these policy problems,
governments should try, Lavoy advises, to gain more information about
the status of biowarfare programs and about the cases in which biolog-
ical agents have been or may have been used. Since major information
gaps will persist, Lavoy concludes, the military acquisition and war plan-
ning process should be based on planning scenarios that feature realistic
biological weapons employment.
Marie Isabelle Chevrier addresses the widespread view that expert
evaluations of bioterrorism appear to vary widely. She analyzes bioterror-
ism threat assessments by well-known experts, focusing particularly on
the framing of the research question, the data considered, and the meth-
ods used. Chevrier finds similar arguments in the assessments, based on
similar data, using similar reasoning, and evidencing little disagreement
6 Bioterrorism
Wenger_1.qxd 12/12/06 4:16 PM Page 6
about the likelihood of bioterrorism and the likely vulnerability of mod-
ern societies. Although the policy prescriptions of the experts vary con-
siderably, the assessments themselves, Chevrier finds, mostly show that
a successful bioterrorism event causing mass casualties is not likely to
occur.
However, Chevrier demonstrates how the use of vague terminology
makes it difficult to understand what experts mean when they describe the
future likelihood of mass casualty bioterrorism as either “low,” “not
likely,” “extremely unlikely,” or “possible but not probable.” Most ex-
perts fail to relate the likelihood of an event to a specific time frame (for
example, “highly likely within the next five years”), and all find that there
is insufficient historical data to predict with any certainty the likely occur-
rence of future bioterrorism events; consequently, most researchers have
felt, Chevrier points out, that terrorist incidents involving chemical agents
were appropriate cases from which to draw inferences about bioterrorism.
However, given the differences in production and dissemination between
chemical agents and biological agents, Chevrier notes, such analysis may
overstate the estimated probability of a bioterrorism attack. The bottom
line in most of the assessments is widespread agreement that any bioter-
rorism estimate is surrounded by a great deal of uncertainty.
Chevrier divides the assessments into two groups, those done before
2001 and those undertaken after the anthrax letters of 2001. She found
that the assessments done after 9/11 and the Amerithrax cases represented
some change, but not a substantial one. However, the gap between the
academic and the policy communities has grown since 2001, driven by
highly publicized exercises simulating worst-case scenarios. Most aca-
demic bioterrorism experts have been far more cautious and reserved in
their assessments than those in the policy community. While the former
often focus on the nexus between the terrorism threat and the biological
weapons threat, the latter tend to see the bioterrorism threat in the larger
context of the likelihood of deliberately caused disease.
Introducing Part 3, Anthony H. Cordesman notes that for policymakers
there is no reliable way to establish the level of effort needed to deal
with the biological weapons risk. Nonetheless, although there are grave
uncertainties and extreme difficulties in tracking any form of biologi-
cal warfare activity, governments cannot ignore the fact, Cordesman
states, that Islamic terrorists have shown an interest in acquiring biolog-
ical weapons. Further, the difficulties in manufacturing, weaponizing,
and disseminating bioweapons are being steadily reduced by the spread
of biological facilities, dual-use equipment, and technical skills. At the
Bioterrorism: A Complex Threat 7
Wenger_1.qxd 12/12/06 4:16 PM Page 7
same time, Cordesman warns, governments should be extremely careful
about crying wolf. The fact that a threat exists does not predetermine the
kind of response that is needed; the priority the bioterrorism risk should
be given in the context of other security policy and health risks; and the
levels of investment in time, expertise, and money that are required.
According to Cordesman, most governments that have examined
bioterrorism in terms of technological capability have acknowledged the
possibility of a high-level attack. But dramatizing worst-case scenarios,
he argues, should give way to real-world capability studies. Most
bioterrorism events are likely to take the form of attacks where there is
little real damage in terms of lethality, and where the main impact is
most likely to be a mix of panic and political and economic effects. The
level of uncertainty in the use of a bioagent and in terms of its poten-
tial lethality remains very high. The technical expertise is concentrated
in official laboratories and research centers, but it is often lacking at the
broader public policy level. As a result, Cordesman concludes, there is
little transparency about the scale of national efforts that could shape an
informed public policy debate or foster international cooperation at the
operational level.
Addressing key policy challenges in the management of the biolog-
ical risk, Cordesman points to the problems—with regard to both
national policy and global cooperation—in determining the extent to
which investments in the defense against and response to biological ter-
rorism are competing with those in natural disease research, and also in
defining possible synergies between the two. Even though there are
practical limits to transparency and cooperation, he concludes, both are
key to any effort to prevent bioterrorism, to deal with its political im-
pact, and to create cost-effective programs. For if bioterrorism does
become a serious reality, there will be an immediate need for large-scale
cooperation—a fact that planning and preparation efforts should take
into account.
Iris Hunger identifies a trend toward more secrecy in the biological
field and argues that this trend has to be reversed in order to prevent an
erosion of existing international norms against the use of biological
agents as weapons. The rapid developments in the biosciences, together
with the increasing civilian use of biotechnologies and the lack of
national and international control measures, have resulted in a growing
threat potential from bioweapons, from both states and terrorist groups.
One reason why the threat is growing is the dual-use nature of many of
the research, development, production, and testing activities in the bio-
logical field. Since it is often difficult to differentiate between peaceful
8 Bioterrorism
Wenger_1.qxd 12/12/06 4:16 PM Page 8
and hostile activities, transparency, Hunger argues, must be the basis of
such activities in the long run.
According to Hunger, two recent developments have increased the
level of secrecy in scientific biodefense work in general, and in US efforts
in particular. As a reaction to 9/11 and the Amerithrax events of 2001,
governments have drastically limited their openness in the biosciences,
while at the same time the scientific community has been imposing
restrictions upon its own activities. In the United States, the reemer-
gence of the category of “sensitive but unclassified” information, allow-
ing restrictions on unclassified research, has occurred along with stricter
controls on the transfer of knowledge to foreign nationals and, at the
same time, the inclusion of prepublication review clauses into grants
and contracts.
In addition, many states have created or enlarged their existing bio-
defense programs, a trend that is particularly pronounced in the United
States. Not only has the US government not reported some of its secret
biodefense programs to the member states of the BTWC, but it has also
provided an enormous funding boost to bioweapons research, which in
turn has dramatically increased the number of individuals who know
how to deal with these agents, while funding for other diseases has been
cut. Yet Western states have a chance to influence how biological re-
search is conducted, Hunger asserts, since most of the sensitive research
is still done in the West. Thus, they should lead by example and set
legally binding standards by which biodefense programs that are close
to the line between offensive and defensive activities can be identified
and closely monitored.
This book makes apparent how difficult it is for governments to design
sensible policies against bioterrorism. The threat of the malicious use of
microorganisms or toxins by state and nonstate actors, along with the
high level of uncertainty regarding both the intentions and capabilities
of potential malevolent actors, defies traditional approaches to threat
analysis. Consequently, if the aim is to secure our societies against the
risk of bioterrorism, we must involve experts from a variety of aca-
demic and policy fields, including public and private actors at the local,
national, and international levels.
Drawing on the findings of the chapters in this book, the conclud-
ing section discusses a series of key policy challenges in managing an
elusive threat. Although the threat may be exaggerated and manipulated,
it can neither be denied by experts nor ignored by policymakers. For-
mulating and implementing policy to protect a population against the
Bioterrorism: A Complex Threat 9
Wenger_1.qxd 12/12/06 4:16 PM Page 9
threat of bioterrorism is a remarkably different challenge from formulat-
ing and implementing policy to secure a state against the threat of an
armed attack by another state. With this difference in mind, the conclud-
ing section discusses the new policy challenges to both states and soci-
eties in their efforts to define countermeasures, assign responsibilities,
and provide resources.
Notes
1. For example, see David McBride, Bioterrorism: The History of a Crisis
in American Society (New York: Routledge, 2003); Barbara A. Rasco and Gleyn
E. Bledsoe, Bioterrorism and Food Safety (Boca Raton, FL: CRC Press, 2005).
2. For example, see Jonathan B. Tucker, ed., Toxic Terror: Assessing Ter-
rorist Use of Chemical and Biological Weapons (Cambridge, MA: MIT Press,
2000); Brad Roberts, ed., Hype or Reality? The “New Terrorism” and Mass
Casualty Attacks (Alexandria, VA: Chemical and Biological Arms Control
Institute, 2000).
3. The US Federal Bureau of Investigation dubbed the anthrax attacks
“Amerithrax.” It created a special website, which was given the same name, for
the ongoing anthrax investigation.
10 Bioterrorism
Wenger_1.qxd 12/12/06 4:16 PM Page 10
Part 1
Understanding the Threat:
Actors and Capabilities
Wenger_2.qxd 12/12/06 4:02 PM Page 11
Wenger_2.qxd 12/12/06 4:02 PM Page 12
A DEFINING CHARACTERISTIC OF THE TWENTIETH CENTURY WAS THE EXPLOITATION
of the advanced sciences of chemistry, biology, and physics for military
advantage in the realm of unconventional strategic weapons. Biologi-
cal weapons were the least successful of this trio of weapons of mass
destruction (WMD), in the sense that they were never fully assimilated
by any state military. In the twentieth century, biological weapons were
never used on a grand scale in battle the way chemicals were in World
War I. Nor did they become a symbol of ultimate strategic military
force, as nuclear weapons did after the 1945 US bombings of Japan.
Instead, despite extensive development by the major powers (France,
Japan, Britain, the United States, and the former Soviet Union), their
history remained secret or ignored.1 In the twenty-first century, though,
biological weapons have assumed a new symbolic importance, greatly
influenced by US policies, that links them to the potential exploitation
of biotechnology by outlaw states and terrorists. Understanding the fun-
damental characteristics of the former programs can inform us about
future prospects for biological weapons and restraints on them.
How the twentieth-century biological warfare ventures began is
itself a historical conundrum. The literature on technological innova-
tions in the modern military offers many examples of organizational
resistance to the assimilation of new weapons.2 Yet the major military
powers of the twentieth century (with the notable exception of Ger-
many) embarked on large antipersonnel germ weapons programs, despite
admitted uncertainties about whether such weapons were technically
possible or morally defensible. The potential of biological weapons to
cause large-scale death and havoc accounts for the allure they had for
certain advocates and also for the skepticism and even revulsion with
13
2
The Legacy of
Secret State Programs
JEANNE GUILLEMIN
Wenger_2.qxd 12/12/06 4:02 PM Page 13
which they were greeted by others within government. Biological weapons
rely on living organisms that are inherently difficult to produce and stan-
dardize. They depend on the scientific ability to produce germs that kill
or weaken important life-forms—humans, livestock, and crops. Their
destructive effects might be delayed and uncertain; they might also (as
with anthrax spores) result in prolonged environmental contamination, or
they might (as with contagious diseases) infect friendly troops and civil-
ians. Their main advantage—the element of surprise—could readily be
subverted if an adversary were forewarned and protected with vaccines,
antibiotics, masks, or other defensive technologies.
At present, most analysts presume that the advanced industrial pow-
ers are highly unlikely to resort to biological weapons given the end of
the Cold War and the legal and moral norms against this category of arms.
All but a few nations are party to the 1925 Geneva Protocol, which bans
the use of both chemical and bacteriological weapons. The same is true
for the 1972 Biological and Toxin Weapons Convention (BTWC), which
bans bioweapons programs and the possession of such weapons. The
intense secrecy necessary to hide a state program (to conceal its labora-
tories, production facilities, training and testing grounds, modes of trans-
portation, and special troops) is generally uncharacteristic of advanced
industrial states, and difficult for any country to sustain in a world of
globalized commerce, travel, and communication. In addition, modern con-
ventional and nuclear weapons have long fulfilled the requirements of
national defense, including deterrence. Biological weapons have almost
no place in modern state arsenals, nor do chemical weapons, which were
banned by the 1993 Chemical Weapons Convention.
The end of the Cold War focused new attention on the potential dif-
fusion of biological weapons to less politically powerful nations. The
United States, in particular, has emphasized the danger that hostile
“rogue states” and terrorists beyond the reach of political persuasion
might acquire biological, chemical, or nuclear weapons. Still, as in the
past, the policies of advanced industrialized nations directly affect the
diffusion of the weapons they invent, including biological ones.3 Now
the world’s preeminent power, the United States sets the standard for
restraints against germ weapons programs and use. Since the mid-
1990s, instead of engaging in broad international cooperation to reduce
risks, the United States has emphasized limited national security goals.
Following 9/11 and the 2001 anthrax postal attacks, this approach inten-
sified as a part of new homeland security initiatives. The US “war on
terror” has also entailed the engagement of US allies, particularly the
North Atlantic Treaty Organization (NATO) and NATO-affiliated nations,
14 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 14
in defensive exercises as well as in efforts to interdict traffic in materials
relating to biological, chemical, and nuclear weapons. US preoccupation
with bioterrorism has introduced a new integration of national security
and the US biological sciences, ranked first in the world. The question is
whether this approach can keep new biotechnologies and their inevitable
global diffusion beyond Western industrialized nations for strictly bene-
ficent rather than destructive purposes. A review of the political circum-
stances that fostered the former state programs suggests what the future
threats of the hostile exploitation of the life sciences might be and what
policies might reduce these threats.
Historical Background
A hundred years ago, the United States was neither the world’s first mil-
itary power nor its leader in the biological sciences. Rather, Germany
and France emerged from the nineteenth century as dominant forces in
both armaments and microbiology. In World War I, at Ypres in Belgium,
Germany, then the leading nation in the chemical industry, launched the
first mass chemical attack, provoking a chemical arms race that still has
repercussions today. Also in World War I, the German army mounted a
minor biological campaign against its enemies’ pack animals, attempt-
ing to kill them with anthrax and glanders. After the war, partly in fear
that a rearmed Germany might resort to germ air attacks, France and,
soon after, the Soviet Union began their first forays into biological war-
fare programs. The militaries of both countries used their existing
chemical programs as the basis for this new kind of indiscriminate
weapon, anticipated for use in aerial bombing. After its 1931 military
invasion of Manchuria, Japan (not a party to the 1925 Geneva Protocol)
established a secret biological warfare program there, near the city of
Harbin. In 1940, the Japanese Imperial Army began the only modern
use of germ weapons in battle, attacking Chinese cities and towns with
plague-infected fleas and poisoning food and wells. As part of its bru-
tal retribution for the 1942 Doolittle Raid on Tokyo, the Japanese army
attacked thousands of villagers southwest of Hankow with anthrax and
glanders because they had aided or shown support for the US pilots.4
Britain’s biological program, created in 1940 while it was under
German air attack, had the most lasting consequence for sophisticated
weapons development. The Soviet program was undermined by the
1937–1938 purges, and the French venture came to a halt with the Nazi
occupation in 1940. After the US entrance into World War II in 1941,
The Legacy of Secret State Programs 15
Wenger_2.qxd 12/12/06 4:02 PM Page 15
the United States took its cue from the British and in late 1942 insti-
tuted its program for developing virulent disease agents, aerosols, and
bombs. After the war, British and US advocates of biological weapons
argued that the lethal impact of their newly invented biological bombs,
much lighter than chemical ones, might achieve the devastating capabil-
ity of atomic weapons. They speculated that the Soviet Union, and later
Communist China, could be subdued with disease agents such as
anthrax, tularemia, and brucellosis, against which entire cities would be
unprotected. During the Vietnam War, the US Army proceeded aggres-
sively with biological attack simulations, achieving what it claimed was
a new capability for regional dispersal of disease agents.
In the 1960s, the United Kingdom, armed with a nuclear weapons
capability, retreated from its offensive biological programs and pro-
moted legal restraints against biological weapons. France did the same,
but more discreetly and slowly. In 1969, President Richard Nixon, con-
curring with the British, renounced biological weapons on behalf of the
United States. Nixon’s decision paved the way for the belated US ratifi-
cation of the 1925 Geneva Protocol and the formulation of the 1972
BTWC. Thus, the military exploitation of new biotechnologies seemed
to end. But by 1975, the Soviet Union was using a radical moderniza-
tion of its biological sciences to mask a large biological warfare pro-
gram. For nearly two decades, until its demise in 1991, the Soviet Union
violated the 1972 BTWC, despite its having served as a depository nation
for it, together with the United States and Britain.
Totalitarianism enhanced the bureaucratic secrecy that allowed the
Soviet program to thrive. Yet the governments that sponsored biological
warfare programs included representational democracies as well as total-
itarian states and military dictatorships. Of the smaller states, apartheid
South Africa and Saddam Hussein’s Iraq were eventually known to be
emulating the WMD programs of the major powers, while Israel has
been strongly suspected of nuclear, chemical, and biological weapons
programs, the latter as early as 1947.5
The Importance of Secrecy
Secrecy was the most essential factor in the growth of the biological
weapons programs of the twentieth century. Closed-door decisions
facilitated the creation of offensive programs and sheltered them from
oversight and severe budget cuts, so that eventually they established
16 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 16
secure organizational niches. The world learned a great deal about chem-
ical weapons during World War I and a great deal about nuclear weapons
at the end of World War II. In contrast, biological weapons were rarely
discussed in public forums and never aroused the kind of international
protest that brought about treaty and organizational restraints on chemi-
cal and nuclear weapons proliferation.6
The extent of the secrecy that enveloped each of the major biologi-
cal warfare programs would be difficult to exaggerate. In open as well as
closed societies, in war and in peace, the programs were often unknown
to those in the other sectors of the military, and government leaders were
often uninformed about or ignored the goals and achievements of their
own biological weapons programs. In renouncing the US offensive bio-
logical weapons program, President Nixon accurately pointed to the fif-
teen years that had passed without the program’s being subject to com-
prehensive review. During those years, a few congressional members had
made sure that funding for the program was ample and secure. Later, in
a much different context, the massive Soviet program was embedded in
bureaucratic layers of secrecy until the 1990 defection to Britain of one
of its leading scientists.7
Throughout the history of biological weapons, secret information was
shared among allies, if not with the public. Soviet relations with satellite
and client states likely included the sharing of information and perhaps of
technology relevant to biological warfare. During World War II, Britain,
Canada, and the United States shared personnel, research, and testing
grounds; this tripartite arrangement continued after the war and later
included Australia. In 1947, the US government secretly made a deal with
Japanese bioweapons scientists to protect the Japanese from war crimes
prosecutions in exchange for information on Japan’s program and its use
of germ weapons. In this way, evidence of the devastating impact of bio-
logical weapons on civilians, which otherwise would have been presented
at the Tokyo war crimes tribunal (1946–1948), was suppressed.
Also during the history of secret biological weapons programs, gov-
ernments encouraged disinformation to protect these ventures. When
Japan attacked Chinese civilians with plague-infected fleas and with poi-
soned food and water, it masked its aggression by allowing these attacks
to pass as naturally occurring epidemics. In the 1950s, the United States
and Britain dismissed as propaganda reports about the December 1949
Soviet trial of Japanese germ warfare scientists its troops had captured in
China in 1945. In other contexts, states exploited the public fear of and
ignorance about diseases associated with biological weapons. In 1952,
The Legacy of Secret State Programs 17
Wenger_2.qxd 12/12/06 4:02 PM Page 17
the Chinese and North Koreans accused the United States of using crude
Japanese methods of attack in the Korean War, and they produced a huge
compendium of largely concocted data to bolster their claims.8 Following
these accusations, the Chinese government instituted a nationwide anti-
insect campaign, which it based on propaganda about US disease attacks.9
In the Soviet Union in the 1970s, two accidental outbreaks caused by
the covert program were also explained as epidemics of natural occur-
rence. In the first, in 1972, several people were infected with smallpox in
the Aral Sea test area. In the second, in 1979, sixty-eight people died from
inhalational anthrax in the city of Sverdlovsk (present-day Yekaterin-
burg), in the Ural Mountains. An investigation of the latter showed the
harmful effects of military secrecy: first, diagnosis was delayed, and sec-
ond, the affected community was not alerted to the risks of exposure.10
In the 1980s, the United States accelerated its defensive toxin projects
and promoted chemical weapons innovation and production, while at the
same time it accused the Soviet Union of assisting Laos and Vietnam with
mycotoxin attacks on Hmong tribes and on Cambodians.11 Cuba and the
United States had long accused each other of making or using germ
weapons, and they continued to do so after the Cold War had ended.12
Persuasive Scientific Experts
In addition to secrecy, four other factors allowed the major programs of
the twentieth century to begin and to endure: scientific advocacy, estab-
lished military-industrial resources, a perceived dire threat to national
survival, and a total-war doctrine. Not all advanced industrial nations,
even those capable of starting a biological program, chose to do so.
Rather, key leaders, by interpreting national interests, determined whether
and how research on this unusual weapon would commence.
Scientists played an essential role in laying the groundwork for state
biological programs and in recruiting other scientific experts. In the
interwar period, French, Soviet, and Japanese scientists were part of a
general arms buildup. In France, Auguste Trillat started his career at the
Institut Pasteur in Paris after obtaining his doctorate in chemistry in
Munich. In World War I he was part of the French chemical corps. Then,
in 1921, he became the first head of the French program, after reporting
confidential information from a German source that Germany had begun
its own biological weapons initiative. That information exaggerated Ger-
many’s activities, which centered on rearmament with conventional
weapons and air power. Later, as the Nazis took power and Germany’s
18 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 18
belligerence intensified, Adolf Hitler’s aversion to biological weapons
restrained those German scientists who might have pursued such weapons
programmatically.13 Nonetheless, until the 1940 hiatus, the French pro-
gram drew on the Institut Pasteur for resources and personnel.14
In the Soviet Union around 1925, military biologist Jacov Fishman
started a biological weapons program as part of the modernization of
the Soviet army promoted by General Mikhail Tukhachevsky.15 That
program was short-lived due to the 1937 Stalinist purges that led to the
execution of Tukhachevsky and the incarceration of Fishman and many
microbiologists from the fields of military and public health. In Japan,
General Ishii Shiro, a military physician, spearheaded in 1931 the Japa-
nese Imperial Army’s offensive program, which lasted until 1945.16
The more technically sophisticated programs, which began with the
United Kingdom and the United States in World War II, relied heavily on
the talents of academic microbiologists. In 1939, in response to German
military aggression, key civilian microbiologists in Canada, Britain, and
the United States began to think like military strategists. In 1939, Nobel
laureate Frederick Banting, the codiscoverer of insulin, urged the cre-
ation of a British offensive and defensive program and built his own
research team in Toronto with funds from private donors.17 Similarly,
before becoming head of the British program at Porton Down in 1940,
bacteriologist Paul Fildes advocated his country’s need for a retaliatory
and offensive capacity against Germany, and later he successfully argued
this position at the highest levels.18 In 1941, the United States began
drawing on its many university scientists. Columbia University scien-
tists Theodor Rosebury and Elvin Kabat wrote a comprehensive outline
of select potential bioagents and a plan for a biological weapons pro-
gram.19 Rosebury went on to lead the important division that pioneered
the study of aerobiology at Camp Detrick. After the war, as a civilian,
he wrote openly against biological warfare programs.20 Ira Baldwin, a
University of Wisconsin expert on fermentation, became an important
leader of the US wartime effort, in particular of the initiative to produce
anthrax bombs.21
The role of civilian versus military scientists in the resurgence of the
Soviet program in the 1970s is less well recorded. The well-known
Soviet academician Yuriy Ovchinnikov is often portrayed as having per-
suaded the Kremlin to create Biopreperat, the state conglomerate that
housed both commercial and secret research. At the same time, within
the military, the older World War II veteran General Yefim Smirnov, for-
mer head of the Soviet public health ministry, was a powerful advocate
for a biological warfare capability.22
The Legacy of Secret State Programs 19
Wenger_2.qxd 12/12/06 4:02 PM Page 19
The Existing Military-Industrial Infrastructure
The most advanced state biological programs (in France, Britain, the
United States, and the former Soviet Union) were adjoined to the chem-
ical weapons programs created during World War I. The use of chemi-
cal weapons in World War I established a precedent of indiscriminate
attack employing the dispersal of toxic aerosols and mustard gas to
break the impasse of trench warfare and claim broad terrain. In the
interwar years, bomber aircraft presented even broader possibilities for
strategic, long-range chemical attacks and, more theoretically, for bio-
logical attacks.
Adding early biological programs to established chemical ones
brought considerable technical advantages. In the best of circumstances,
the chemical programs had already developed effective bombs and
spray generators, mastered aerosols, and conducted aerial tests. In the
1940s, the British biological warfare program, though small, benefited
greatly from its physical proximity to the chemical program at Porton
Down, where it was able to take advantage of its experts on aerodynam-
ics and engineering. Its technical innovations were shared with the United
States in 1942 and after. In the United States, the new biological program
heralded an expansion of the militarily marginal chemical programs,
with budget increases and enlarged testing sites and production facili-
ties. The chemical program also had vociferous advocates in the mili-
tary, industry, and among congressional officials who argued to govern-
ment on behalf of both types of programs.
The move from laboratory research to volume production of disease
agents, coupled with the mass production of suitable munitions for strate-
gic attack, distinguished the two postwar superpower programs. The US
program’s accomplishments in these areas from World War II until 1969
brought biological weapons close to the early mass destruction capabil-
ity envisioned by Banting, Fildes, and others. Before it ended, the Soviet
program increased the scale of its endeavor, adding long-range missile
capability and attempts to exploit the techniques of modern genetics.23
The Japanese program differed from programs in the West in that it
was relatively isolated from Japan’s chemical program. Although joint
aerial chemical and biological exercises were occasionally conducted,
the large central facility, Unit 731 near Harbin, was exclusively devoted
to biological weapons research, as were subsidiary facilities. General
Ishii, the creator of the Japanese program, was never able to devise a
successful biological bomb, and the program’s aerosolization techniques
lagged significantly behind those of the Western allies. During World
20 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 20
War II, when the Japanese decided to retreat from chemical weapons,
their biological program continued unaffected and unimproved.
Political Perceptions of a Dire Threat
A principal justification for offensive biological programs was the exis-
tence of a dire threat to national survival, a perception that bolstered the
rationale for seeking an unconventional advantage over the enemy. By
the early twentieth century, aided by increasingly destructive weapons,
the military forces in Europe could threaten each other with extreme lev-
els of physical destruction and human harm, and carried out those threats
in two world wars. When the specific threat of biological weapons arose,
though, it was usually ill-founded—a by-product of the larger conflict,
but one with organizational repercussions.
In the 1920s, for example, the French suspected that their traditional
enemy, Germany, would use its advanced microbiology and superior air
power to invade and conquer France. Concerning German air power and
intentions, the French assessments were accurate, but France was in error
concerning its enemy’s biological weapons. Although the German mili-
tary had used anthrax and glanders in World War I, such use had proved
to be of limited military value. As Germany began rearmament, French
fears fueled its own pursuit of a biological weapons advantage. Later,
Britain and the United States became similarly convinced of a biological
threat from Nazi Germany. It was only in late 1944 that reliable Allied
intelligence sources showed conclusively that Germany had no biologi-
cal program.24 By then, however, both the British and the US biological
programs had become organizationally entrenched.
Japan’s belligerence in the 1930s presented a different model of
political motivation. In the 1930s, a militarized Japanese government
had ambitions to make Japan the dominant force in Asia, replacing the
British Empire. The dire threat to the nation, as Japan’s leaders per-
ceived it, was a lack of raw materials for industrial growth—an eco-
nomic dilemma to which the solution was expansion into China.25 In
1931, the Japanese forcibly occupied Manchuria and set up a puppet
government under army control. In addition to building new cities and
transportation systems, Japan located its secret biological warfare pro-
gram there. Armed conflict with Soviet troops in the north, and then the
war with China, troubled this territorial expansion. Years later, when
asked to justify the program’s secret horrors (which included human
vivisection, the murder of Chinese research subjects, and attacks on
The Legacy of Secret State Programs 21
Wenger_2.qxd 12/12/06 4:02 PM Page 21
civilians), one former Japanese biologist replied, “Because in a war, you
have to win.”26
Each government differed in the way authority was granted to its
military to foster innovative biological programs. In 1940, with London
under siege, a few key civil servants initiated the British program, plac-
ing it at Porton Down without the permission of the war cabinet or of the
prime minister.27 Later, Prime Minister Winston Churchill approved the
program, although his advisers disagreed about the program’s offensive
goals. US president Franklin D. Roosevelt perhaps knew little about the
US wartime biological program, which was orchestrated mainly by Sec-
retary of War Henry Stimson. In imperial Japan, Emperor Hirohito, him-
self a biologist, likely approved the military program and authorized its
expansion. Some believe that Soviet secretary-general Leonid Brezhnev
personally gave the order to create Biopreperat, the conglomerate that
housed both the secret biological weapons program and open biological
research. Despite these variations, in each case civil authorities invari-
ably made the crucial decision to start the program and then gave pro-
gram officials extensive latitude to covertly pursue their objectives.
In the long Cold War era, dire threats to national survival were per-
ceived both in terms of nuclear annihilation and mutual destruction.
After World War II, the US and British offensive programs were revived
in response to the perceived threat of Soviet aggression and the spread
of Communism in Eastern Europe and China. Although military advo-
cates argued that the Soviet Union would have biological weapons by
the early 1950s, this estimate failed to take into account the war’s
severe toll on Soviet public health conditions and the retrograde impact
of Stalinism on its biological sciences. As the Cold War commenced,
US and British civil and military advocates spoke out in favor of the
potential of germ weapons to rank with nuclear weapons in their de-
structive power.28
The United States, Britain, and France later abandoned germ weapons,
in part because their nuclear and conventional weapons provided suffi-
cient deterrence against the threat of aggression. Why the Soviet Union
opted for biological weapons in the 1970s remains unexplained. Its
nuclear arsenal was enormous, and its biological program was too secret
to serve as a deterrent. Soviet leaders may have erroneously believed
that the United States still secretly maintained its advanced program. As
a monolithic garrison state, the Soviet Union may simply have been
seeking to maximize all its military options.29
Cold War geopolitics spurred some diffusion of superpower biological
programs to lesser states, but how much is uncertain. The best documented
22 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 22
instances are the now defunct programs in apartheid South Africa and
Saddam Hussein’s Iraq, which were also fueled by perceptions of dire
threats to national survival. Much more remains to be known about the
extent to which other states under similar pressures and with sufficient
resources—for instance, Israel, Cuba, Iran, Syria, Taiwan, and North
Korea—secretly opted for biological weapons or, as in the case of Libya,
rejected them.
Total War and Civilian Targets
The doctrine of total war, a response to the new scale of industrial-age
warfare, included a justification for attacking civilians, who were inte-
gral to the production of weapons and the general sustenance of the
armed forces.30 By some reckonings, the destruction of a factory could
weaken the enemy as much as a battlefield victory could. Frederick
Banting wrote about the basis of the doctrine in his 1939 argument for
a British biological weapons program:
In the past, war was confined for the most part to men in uniform, but
with increased mechanization of armies and the introduction of air
forces, there is an increased dependence on the home country, and
eight to ten people working at home are now required to keep one man
in the fighting line. This state of affairs alters the complexion of war.
It really amounts to one nation fighting another nation. This being so,
it is just as effective to kill or disable ten unarmed workers at home
as to put a soldier out of action, and if this can be done with less risk,
then it would be advantageous to employ any mode of warfare to
accomplish this.31
The total war doctrine signaled a striking moral regression. Indus-
trialization had already produced the massification of the labor force
that degraded individual autonomy and rights. The doctrine of total war
went further by postulating that the deaths of enemy civilians en masse
was a significant means to military victory as an end. Military air power
became a vital part of this doctrine, inasmuch as aerial bombings prom-
ised unobstructed access behind enemy lines and the destruction of critical
economic infrastructures, including factories and cities. Visions of biolog-
ical bombs eradicating large populations with deadly diseases were part of
a modernistic approach to warfare, which included chemical weapons as
a theoretically quick way to shorten battles by overpowering the enemy
with a single attack. Within the secret confines of the biological weapons
The Legacy of Secret State Programs 23
Wenger_2.qxd 12/12/06 4:02 PM Page 23
programs, the total war doctrine gave militaries a license to target entire
enemy populations with deadly or debilitating diseases.
An important supposition underpinning the total war doctrine was
that a technological advantage would prevent the enemy from mounting
an equally devastating retaliatory attack. During World War II, the
Allied carpet bombing of enemy targets in Europe, and similar attacks
on Japan, were conducted under the expectation that neither Germany
nor Japan could counterattack with equal or greater force. The same
rationale applied to the US decision to drop atomic bombs on Japan in
1945. During the Cold War, the nuclear arsenals of the United States
and the Soviet Union pushed the total war doctrine to new limits in that
they introduced the threat of mutually assured destruction to civilians
on both sides of the conflict, “a stable, if grotesque, stalemate.”32
With biological weapons, the expectation was that civilian targets
were at a sufficient distance to avoid a risk of infection in the homeland.
As for retaliation, each program proceeded as though it alone had the
advantage of surprise, which, despite political perceptions of foreign
threats, was generally true. Among major powers secretly developing
biological weapons, the mass protection of civilians against exotic germ
weapons was rarely proposed and never implemented. Soldiers and pro-
gram researchers were, of course, vaccinated or otherwise protected, if
possible, but public health systems operated separately from the secret
military programs, although at the higher echelons in the United States
and Soviet Union, not in total ignorance of them.
Present Threats
The trend in industrial societies has been toward an increase in technolog-
ical risks, particularly the inescapable risk of transnational environmen-
tal damage caused by late industrial-age manufacture and energy use.33
Similarly, the production of nuclear and chemical weapons by the two
superpowers in the twentieth century has become recognized as a desta-
bilizing global hazard in the twenty-first century. In contrast, biological
weapons of the twentieth century have generated a different legacy, one
of US scenarios of potential mass disease attacks that stir the public imag-
ination, even though these predicted catastrophes have not occurred.
An important change in US policy occurred in the 1990s, when there
was a shift toward defending all US citizens against germ attacks by for-
eign enemies, whether such attacks were against US military members
24 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 24
stationed in the Middle East or Asia or against civilians in the home-
land. This defensive position was in part a reaction to post–Cold War
revelations about the Soviet biological program and, in 1992, that of
Saddam Hussein, compounded by unprecedented acts of terrorism that,
in method and scale, seemed to redefine US vulnerability to attack. This
policy shift became embodied in legislation for “domestic prepared-
ness” programs in 120 major cities and in presidential directives for
antibiotic stockpiling and other measures to counter the threat of bioter-
rorism, including a troubled universal anthrax vaccination program for
the US military.34 Although the United States was not at war, the nas-
cent framework for domestic policies was national civil defense, a con-
struct that found favor among Republicans who dominated Congress
after 1994. Domestic preparedness was also generally supported by
elected members of Congress on both sides of the aisle who sought a
new source of funds for their states and districts.
The 11 September 2001 Al-Qaida attacks on the United States rein-
forced this orientation toward civil defense, and the anthrax postal attacks
that followed soon after guaranteed that bioterrorism would be a major
national security issue. Washington’s quick response was to demand in-
creased regulation of any biological research involving disease agents that
had been cultivated for biological weapons use and, subsequently, to ini-
tiate an aggressive project to develop defensive technologies, with an
emphasis on pharmaceutical innovations. The fright value of biological
weapons also lent itself to political rhetoric and media exploitation.35 In
October 2001, the fictional bioterrorist scenario Dark Winter, created by a
Washington think tank and exploited by the press and other mass media,
caught the attention of Vice President Dick Cheney. Dark Winter depicted
invading Iraqi terrorists infected with smallpox causing a US pandemic of
catastrophic dimensions, based on facts that were later roundly criticized
by medical experts.36 Convinced by the scenario, Cheney immediately
advised President George Bush to institute a national vaccination cam-
paign. The president did so in late 2002, when the United States was bas-
ing part of its case for the invasion of Iraq on the threat of Saddam Hus-
sein’s biological weapons. By that time, many US citizens had been
persuaded that smallpox was an imminent threat to their health.37 Partici-
pation in the vaccination campaign faltered early on, after several older
first responders died from coronary complications soon after being vacci-
nated. Following the Iraq invasion, as it became evident that Saddam’s
biological program had been destroyed in the 1990s, US fears about small-
pox sharply declined and with them the national vaccination campaign.
The Legacy of Secret State Programs 25
Wenger_2.qxd 12/12/06 4:02 PM Page 25
The smallpox vaccination campaign aside, the perceived threat of
biological weapons has had lasting organizational effects. Dozens of
federal counter-bioterrorism programs are entrenched in the Department
of Homeland Security, the Department of Defense, the Department of
Health and Human Services, the Department of Energy, the Department
of Agriculture, the Federal Bureau of Investigation (FBI), the Central
Intelligence Agency (CIA), and elsewhere. As part of the national secu-
rity apparatus, many of the activities of these programs have been kept
secret from the public and exempted from congressional or other gov-
ernment oversight. At the local level, state and city governments have
been funded to intensify emergency response systems that adhere to the
civil defense model, even as support for police, firefighters, and public
health infrastructure diminishes. In this new era, a major emphasis has
been placed on the invention of defensive pharmaceuticals (vaccines,
antibiotics, serums, and antivirals) and of surveillance and detection tech-
nologies to counter the threat of bioterrorist attacks.
Scientific and Technical Resources
and Weapons Capability
Sixty years ago, when the United States decided to continue its postwar
biological warfare program, the numbers of expert microbiologists were
relatively low and located in the West, and only a small number of
states had built up the modern military organizations and arsenals that
could potentially support a secret biological weapons venture. Today,
thousands of microbiologists worldwide have skills comparable to those
of scientists working in the old state programs. The military buildup in
industrializing countries has also expanded, in organizational size and
range of weapons. China, India, and Pakistan have acquired nuclear
weapons, and others, including North Korea and Iran, may do the same.
Technologically, the contemporary threat of biological weapons dif-
fusion exists on two levels, neither of which can be effectively controlled
except by long-term international efforts. One threat can be called a
“moderate capability,” that is, proliferation that could arise from skills
and technologies no more advanced than those used in the US and Soviet
programs. These would include, for example, generic methods for in-
creasing the virulence of pathogens, techniques for aerosolization, and
the industrial-scale production of agents and munitions. As in the old
programs, certain technical challenges would have to be met, such as the
large-scale production of virulent agents and the building of effective
26 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 26
mechanisms for agent dispersal. Compared to the proven military value of
modern conventional weapons, even a moderate capability in biological
weapons remains a luxury for small, economically disadvantaged states.
Biological weapons could, however, appeal to more affluent states whose
complex military-industrial bureaucracies might at least temporarily shel-
ter covert programs. Some industrializing nations (for instance, China,
India, Pakistan, and Brazil) now have the microbiological resources that
could be exploited by their militaries should their governments feel com-
pelled to seek a secret, illegal advantage. The major risk of a moderate
capability in biological weapons is the onus of discovery, which would
make a pariah of any nation known to violate existing treaties.
New biotechnologies that have “futuristic” weapons capabilities
pose a second order of threat. These advances range from the cloning of
higher mammals to new techniques for shaping human neurology and
development.38 Such innovations may sharpen the already considerable
divide between the privileged who enjoy the benefits of modern medi-
cine and those for whom they remain beyond reach. The science in
Aldous Huxley’s Brave New World is fanciful, but the use of technology
to create a biologically determined social hierarchy may be a future haz-
ard for humanity. US microbiology has had the edge in biotechnology
so far, but the field is essentially international, and other centers of
innovation, in Asia for example, are emerging.
The US biodefense initiative inaugurated in 2002 also poses some
risks. The inadvertent consequences of biodefense technology—the
unanticipated repercussions that can cascade into the future39—are a
cause for concern. Lacking oversight and mechanisms for critical review,
various biodefense projects could lead to the pioneering of new, more
virulent select agents or futuristic technologies on the presumption, com-
mon in the old programs, that defensive research required offensive
capability. In addition, by creating new environments for honing biolog-
ical weapons skills, increased funding for biodefense research could
have other unanticipated negative consequences. The biodefense project
is predicated on having more high-containment laboratories (six or more
at the maximum level four, plus eleven or more regional centers) and
increased federal funding overall for select agent research in level-two
and level-three laboratories. At the least, this multibillion-dollar enter-
prise will increase the absolute numbers of scientists familiar with the
growing and testing of dangerous weapons agents.40 Unlike those few
government or military career scientists previously working on defenses
against select agents, some thousands of new biodefense scientists, many
affiliated with academic medical centers, must rely on federal grants and
The Legacy of Secret State Programs 27
Wenger_2.qxd 12/12/06 4:02 PM Page 27
contracts. One problem will be whether they can survive shifting policy
directives from Washington, which can produce boom or bust fluctua-
tions in funding. Another will be the new impingement of secrecy on
their scientific work and other challenges to publication and education.41
The Likely Perpetrators
What are the political opportunities that might engage today’s many
microbiologists in secret biological weapons programs? As in the past,
the future of biological weapons depends on the intent of key authority
figures, either heads of state or those in the higher echelons of decision-
making, or, as another possibility, leaders of terrorist organizations. If
the past is prologue, the states most likely to persist with or to initiate
illegal biological programs are those whose centralized governments,
existing military-industrial resources, and perception of dire political
threats predispose them to seek unconventional weapons. Escalating bor-
der wars, internal conflict, or frustration with guerrilla warfare can lead
to the choice of unconventional weapons; or militaristic economic
national expansion might be used as justification, as with Japan in China.
Eastern Europe—where the Soviet chemical weapons program was dif-
fused to Bulgaria, Yugoslavia, Czechoslovakia, and Romania—has also
been beset by conflict and political unrest. The United States itself is not
immune to pressures to increase its options for unconventional weapons,
especially when its military is engaged in ending insurgent and terrorist
violence in Iraq and Afghanistan.
The past use of chemical weapons suggests models that could one
day apply to biological warfare should the present implementation of
treaty restraints prove insufficient. Following World War I and after the
1925 Geneva Protocol, chemical weapons were used in two different
contexts. One was when an advanced industrial nation had the advan-
tage of attack on foreign soil (Italy against Ethiopia in 1935–1936 and
the US use of tear gas for lethal purposes in Vietnam); the other was
when a relatively powerful developing nation sought to quell insurgents,
civilian activists, or a relatively unprotected state adversary (for exam-
ple, Egypt against Yemeni royalists in 1963–1967 and Saddam Hussein
against Iran in the Iran-Iraq War and against Iraqi Kurds in 1988–1989).
As a relevant example, apartheid South Africa employed small amounts
of chemical and biological agents against insurgents within the state, in
neighboring countries, and also in foreign sabotage.42
Generalized fears about the survival of their traditions and political
influence might also influence nonstate actors to gain access to biological
28 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 28
or chemical weapons. In two well-known, unusual cases involving reli-
gious cults, the choice of biological weapons paralleled in miniature the
processes characteristic of state systems: scientists proposed the method,
the leadership approved it, and resources were freed for laboratory
research and experimental attacks. In 1989, the Rajneesh cult in Oregon
spread nonlethal salmonella in restaurant salad bars and coffee stations
in order to test a way to tilt voting participation in their favor. Some five
hundred people fell ill, none fatally. As a second example, the Japanese
cult Aum Shinrikyo was responsible for twelve deaths and dozens of
injuries in the 1995 sarin nerve gas attacks on the Tokyo subway. Aum
Shinrikyo included a number of scientists who also experimented with
anthrax bacterium growth and dispersal.43
Fear and anger over violated traditions, worker deracination in the
global economy, a distrust of government, military invasion and occu-
pation, and ethnic enmity—the annals of terrorism include all these
motivations. While Islamic extremists have come to represent fanatical
resistance to Western influence, US militia groups and Christian funda-
mentalists have also been violently opposed to larger impersonal forces
that they perceive as threats to individual freedom, their communities,
or to family values. Timothy McVeigh was an out-of-work Gulf War
veteran skilled with explosives who in 1995, influenced by the militia
and the Christian Identity movement and enraged against the US gov-
ernment and society, blew up the Murrah Building in Oklahoma City,
killing 168 people. Even suicide bombers, who appear insanely destruc-
tive, have also been analyzed as consistently motivated by altruistic
resistance to foreign occupation.44
The motivations for terrorism are many, but thus far they have been
only weakly linked to the means of bioterrorism. The 2001 anthrax
postal attacks suggest that even a single disaffected scientist can cause
havoc. For this reason alone, the expansion of the US biodefense proj-
ect requires a prudent assessment of the risks of training a new genera-
tion of microbiologists to research, develop, and test select agents.
Civilians as Targets
The total war doctrine that justified attacks on enemy civilians during
World War II was repudiated by the 1949 Geneva Convention, which
affirmed protection of “the whole of the populations of the countries in
conflict, without adverse distinction based, in particular, on race,
nationality, religion or political opinion” (Section II, Article 13). The
convention could not, however, prevent nuclear or biological weapons
The Legacy of Secret State Programs 29
Wenger_2.qxd 12/12/06 4:02 PM Page 29
programs premised on mass civilian targeting, nor did the widespread
killing of civilians in conflicts outside advanced industrialized nations
cease.45
Contemporary terrorism after World War II, as it turned to civilian
targets rather than political assassinations, has been characterized as an
aftereffect of the war’s violations of humane political codes and rule of
law.46 The tendency of contemporary terrorists to attack physical infra-
structures such as subways and city centers appears to reenact total war
strategies to disrupt technology “behind the lines.” Civilians in demo-
cratic societies have become prime targets for terrorists, a liability that
requires weighing the political infringements of antiterrorism projects
against the preservation of individual privacy, group protest, political
competition, and constitutional order.47 In other states, such as Bosnia,
Rwanda, and Sudan, the ultimate terrorism, genocide, has posed moral
and political problems about mass civilian murder that the world believed
ended in 1945.48
Biological weapons were created to target large numbers of civil-
ians, and it is that aspect that warrants the most serious concern. What
populations, then, are potentially most vulnerable to the impact of germ
weapons? The level of risk from a naturally occurring disease varies by
individual and group; in the same way, the risks of intentional epi-
demics vary, with some populations (for example, the very young and
very old, pregnant women, those already sick or with compromised
immune systems) more vulnerable to serious infection than others.
Structural factors like social class also affect risk. Minorities and the
poor can be disadvantaged in their general health status, education, and
access to health care.
The literature suggests three different models of civilian vulnerabil-
ity, involving terrorism, warfare, and accidental exposure, in which dif-
ferential health risks can figure as variables. State-directed terrorist
attacks invariably target marginal or low status groups (by ethnicity,
religion, race, gender, or political beliefs) to coerce the wider society.49
The same types of groups were targeted in twentieth-century cases of
individual crimes in which disease agents (usually hoaxes) have been
used.50 It follows that, depending on the national context, populations
against which animosities have already been expressed constitute the
most likely future victims.
International conflict also presents a potential venue for disease
attacks on civilians. Following World War II, after the advanced indus-
trial nations ceased to make war against each other, the most vulnerable
civilians in wars have been those in developing nations, where deaths
30 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 30
due to direct violence have been augmented by preexisting poverty and
disease, intensified by the privations of conflict. An attempt by a more
powerful nation to disguise a hostile biological intervention in a sub-
servient country would perhaps be less feasible now than when Japan
was attacking China in 1940–1943, but it is not beyond the realm of
possibility.
As a third model, the accidental release or spread of biological
weapons agents highlights the health risks of the socially disadvan-
taged, who, like the working-class victims of the 1979 Sverdlovsk out-
break, would suffer disproportionately from an inadvertent exposure.51
Although the mailing of the 2001 anthrax letters was intentional, the
dispersal of spores in postal facilities was likely unforeseen by the per-
petrator and had the effect of an accidental hazard. In the aftermath,
federal officials in Washington proved more protective of predomi-
nantly white, middle-class Senate employees than of the black postal
workers at the Brentwood postal facility, two of whom died after the
alert about contamination in the building was withheld for four days.52
The US expansion of the number of high containment facilities to re-
search and test defenses against select agents has generated fears of
similar differential risks based on social factors. In Boston, for example,
local African American groups protested the location of a level four lab-
oratory adjacent to their communities and demanded government over-
sight and regulation of research. While the new biodefense laborato-
ries follow federal guidelines to prevent accidental releases or security
breaches, no laboratory administrator or scientist can guarantee that
accidents will never happen or that disease risks will be minor.
Secrecy, Transparency, and Biological Weapons
Government secrecy made past biological weapons proliferation possi-
ble, and it remains the greatest threat today. Even though the norms
against biological weapons appear to be widely supported, secrecy can
still provide a state with the necessary latitude to defy those norms,
which increases the chances of nonstate actors’ gaining access to biolog-
ical weapons. The world remains full of highly centralized governments
with military-industrial resources, where internal and external threats
might be used to justify the secret exploitation of lethal and nonlethal
biological weapons. Such threats from insurgents, enemies at the border,
or ethnic or religious minorities might conceivably be employed to jus-
tify the eventual use of biological weapons masked as natural outbreaks
The Legacy of Secret State Programs 31
Wenger_2.qxd 12/12/06 4:02 PM Page 31
or accidents. All governments, as well as nongovernmental corpora-
tions, depend on “the secrets of the temple,” that is, the information that
insiders keep from outsiders in order to safeguard institutional author-
ity.53 Thus, in many bureaucracies, transparency is interpreted as a
weakness within or incursion on the hierarchical structure, especially
in the military; or as an intolerable disruption of channels of communi-
cation, as in intelligence agencies; or as a threat to profit, as in industry.
In democratic societies, government institutions are charged with
serving the public, and they are obliged to be open, to allow citizens
and their elected representatives to exercise their authority. Regarding
disease threats, governments and other organizations, such as pharma-
ceutical companies, charged with mitigating risks are accountable for
providing the public with open, accurate, and timely communication, so
that the population at risk can make informed decisions. The possibil-
ity of a lethal outbreak from any source requires a responsive and open
government. Today, the way in which a state manages infectious disease
threats can be an indication of good governance—or bad.54 The success-
ful containment of an epidemic depends primarily on informed individ-
ual response on the part of the public, including the recognition of
symptoms and decisions about appropriate preventive interventions and
therapeutic approaches. A most successful scenario in this regard was
the 1947 New York City response to a potential smallpox outbreak, dur-
ing which the coordinated cooperation of local health clinics, volunteer
civilians, the media, and an informed public allowed the orderly vacci-
nation of 5 million people in two weeks—in an epoch when New York
could staff nearly 179 local clinical stations.55
Every instance of governments’ withholding or distorting informa-
tion about disease threats demonstrates the increased risks of delayed
diagnosis or misdiagnosis that secrecy imposes on the victims.56 China’s
six-week denial of the 2003 SARS (severe acute respiratory syndrome)
epidemic precipitated a global alert and the near catastrophe of interna-
tional contagion, even as the crisis generated a rapid global public health
response. Secrecy was also a determining factor in the 1979 Sverdlovsk
anthrax outbreak, which was caused by an accidental emission of spores
from a military facility engaged in activities forbidden by the 1972
BTWC. The outbreak, the largest of its kind in history, was then exacer-
bated by continued government denials and disinformation regarding the
source.57 The impeded flow of US government information in the course
of responses to the 2001 anthrax postal attacks presents another instance
of public endangerment, particularly for minority postal workers. Among
the worst effects of such secrecy is the breakdown of trust between
32 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 32
exposed communities and public health agencies, a trust vital to the con-
tainment of high-risk outbreaks. Currently, as the SARS epidemic demon-
strated, it takes rapid international cooperation, including coordination
with science and industry and the engagement of an informed public, to
ensure protection against a dangerous emerging or unusual infectious
disease. The same coordination of resources and information would be
necessary in the event of a concerted bioterrorism attack.
For the same reasons, secrecy in biodefense research programs height-
ens civilian risk. A cloak of secrecy around laboratory research, for in-
stance, forcibly narrows the critical review of laboratory techniques,
objectives, and results and can easily lead to delayed or faulty solutions.
Although rarely documented in the history of biological weapons, the
organizational culture of classified government research can create
closed systems within which political agendas trump quality science
and groupthink overrides reflection on moral issues.58 In addition to its
negative impact on scientific credibility, secrecy undermines organiza-
tional accountability, so that errors tend to be excused or hidden and
thereby perpetuated. Mistakes and delays also occur through “mission
clash,” when government agencies with different directives and stan-
dards of openness fail to cooperate. During the response to the 2001
anthrax postal attacks, turf wars between public health authorities, the
FBI, the military, the CIA, and other agencies confused an anxious pub-
lic and increased the risks of delayed or inappropriate medical response,
and also impeded criminal investigation.
Given the risks of both moderate and futuristic biological capability,
of chronic international tensions, and of the persistent social inequities in
health risks, one must question why the current minimal restraints on bio-
logical weapons are tolerated. The BTWC remains as if still shackled by
Cold War secrecy, when it could be forcefully updated to increase trans-
parency in this new century. Even if international openness is imperfect,
advanced industrial nations should seize the opportunity to offer develop-
ing nations new biotechnologies important to global health as an incen-
tive for active treaty compliance. Present loopholes in the state-by-state
enforcement of the BTWC make for erratic international security.59
Equally serious is the lack of international law to criminalize the individ-
ual possession or use of biological and chemical weapons, which would
ensure that no perpetrator of such crimes could find a state haven against
prosecution.60 The pharmaceutical industry is behind the curve in under-
standing its civic responsibility to support the BTWC. The US biodefense
initiative also needs comprehensive evaluation and oversight, with a
reduction of the scale of the project to less risky dimensions. If the
The Legacy of Secret State Programs 33
Wenger_2.qxd 12/12/06 4:02 PM Page 33
biodefense initiative is sustained without accountability to the public,
it could cause more health risks than it eliminates. Further, the US ex-
port of a narrow national security mission to its allies undermines long-
term international security interests. Instead, the United States should
use its primacy to address the policy deficits that compound the risks
of destabilization and preventable human tragedy. Deadly infectious
disease outbreaks from any source can have regional and global conse-
quences, and therefore require innovative international approaches to
solutions and sanctions. Since an intentional epidemic also demands a
criminal investigation, it automatically requires an open, cooperative
response, with no exceptions for the military, the intelligence commu-
nity, private contractors, or industry.
The protection of civilians in the short and long term is the primary
goal in countering the threat of biological weapons, and one on which
everyone should agree. Such disagreement as exists is largely about
which policies might best achieve that goal. A strictly civil defense
approach to bioterrorism fails to reckon the unstoppable global diffusion
of new biotechnologies and the pressures that might propel certain states
toward biological weapons. Nor does civil defense protect citizens
against the risks of an unusual deadly outbreak, whether natural, inten-
tional, or accidental; by definition it does not promote the international
coordination necessary to safeguard the public. The strengthening of
existing treaties to promote transparency, increased oversight at national
levels, and the international criminalization of biological weapons are all
forward-looking policies that would keep the biological sciences active
for beneficent rather than hostile purposes. The alternative is the risk of
a disease catastrophe that underscores the danger of government secrecy
and failed response, at the cost of lives and public trust.
Notes
1. For a historical overview, see Jeanne Guillemin, Biological Weapons:
From the Invention of State-Sponsored Programs to Contemporary Bioterror-
ism (New York: Columbia University Press, 2005).
2. See Stephen Peter Rosen, New Ways of War: Understanding Military
Innovation (Ithaca, NY: Cornell University Press, 1991).
3. Susan Wright, ed., Biological Warfare and Disarmament: New Prob-
lems/New Perspectives (New York: Rowman and Littlefield, 2002), pp. 3–24.
4. Li Xiofang, Blood-Weeping Accusations: Records of Anthrax Victims
(Beijing: CCP Press, 2005).
5. Avner Cohen, “Israel and Chemical/Biological Weapons: History, Deter-
rence, and Arms Control,” Nonproliferation Review 8, no. 3 (Fall/Winter 2001):
27–53.
34 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 34
6. Frederic J. Brown, Chemical Warfare: A Study in Restraints (New
Brunswick, NJ: Transaction Publishers, 2005).
7. Simon Cooper, “Life in the Pursuit of Death,” Seed 4 (January/February
2003): 68–72, 104–107.
8. Eric Croddy, “China’s Role in the Chemical and Biological Disarma-
ment Regimes,” Nonproliferation Review 9, no. 91 (Spring 2002): 16–47.
9. Albert E. Cowdery, “‘Germ Warfare’ and Public Health in the Korean
Conflict,” Journal of the History of Medicine and Allied Sciences 39 (April
1984): 153–172.
10. Jeanne Guillemin, Anthrax: The Investigation of a Deadly Outbreak
(Berkeley: University of California Press, 1999).
11. Julian Robinson, Jeanne Guillemin, and Matthew Meselson, “‘Yellow
Rain’ in Southeast Asia: The Story Collapses,” Foreign Policy 68 (Fall 1987):
108–112.
12. Guillemin, Biological Weapons, pp. 138–145.
13. Erhard Geissler, “Biological Weapons Activities in Germany, 1923–
45,” in Biological and Toxin Weapons: Research, Development, and Use from
the Middle Ages to 1945, ed. Erhard Geissler and John Ellis van Courtland
Moon, 102–104 (New York: Oxford University Press, 1999).
14. Olivier Lepick, “French Activities Related to Biological Warfare,” in
Geissler and Moon, Biological and Toxin Weapons, pp. 70–90.
15. Sally Stoecker, Forging Stalin’s Army: Marshal Tukhachevsky and the
Politics of Military Innovation (Boulder, CO: Westview Press, 1998), pp.
91–93.
16. “Summary of Information, Subject Ishii, Shiro, 10 January 1947,” Docu-
ment 41, US Army Intelligence and Security Command Archive, Fort Meade, MD.
17. John Bryden, Deadly Allies: Canada’s Secret War 1937–1947 (Toronto:
McClelland and Stewart, 1989), pp. 34–57; Donald Avery, “Canadian Biologi-
cal and Toxin Warfare,” in Geissler and Moon, Biological and Toxin Weapons,
pp. 190–214.
18. Brian Balmer, Britain and Biological Warfare: Expert Advice and Sci-
ence Policy, 1930–65 (London: Palgrave, 2001), p. 27.
19. Theodor Rosebury and Elvin A. Kabat, with the assistance of Martin H.
Boldt, “Bacterial Warfare,” Journal of Immunology 56, no. 1 (1947): 7–96.
20. Theodor Rosebury, Peace or Pestilence? Biological Warfare and How
to Avoid It (New York: McGraw-Hill, 1949).
21. Bryden, Deadly Allies, pp. 118–119, 197–199.
22. Ken Alibek, with Stephen Handelman, Biohazard: The Chilling True
Story of the Largest Covert Biological Weapons Program in the World—Told
from Inside by the Man Who Ran It (New York: Random House, 1999), p. 37.
23. In addition to Alibek, Biohazard, see Igor V. Domaradskij and Wendy
Orent, Biowarrior: Inside the Soviet/Russian Biological War Machine (Amherst,
NY: Prometheus Books, 2003).
24. Geissler, “Biological Warfare Activities in Germany,” pp. 91–126.
25. Louise Young, Japan’s Total Empire: Manchuria and the Culture of
Wartime Imperialism (Berkeley: University of California Press, 1998), pp.
55–114.
26. “Japan Confronting New Atrocity,” New York Times, 17 March 1995.
The Legacy of Secret State Programs 35
Wenger_2.qxd 12/12/06 4:02 PM Page 35
27. Balmer, Britain and Biological Warfare, pp. 36–37.
28. Peter Hammond and Gradon Carter, From Biological Warfare to Health-
care: Porton Down, 1940–2000 (New York: Palgrave, 2002), pp. 102–104;
Balmer, Britain and Biological Warfare, pp. 98–101; “Report by the Joint
Strategic Plans Committee to the Joint Chiefs of Staff on Statements of Policy
and Directives on Biological Warfare,” JCS 1837/34, 11 June 1952.
29. Alibek, Biohazard, pp. 234–235; Raymond L. Garthoff, “Polyakov’s Run,”
Bulletin of the Atomic Scientists 56, no. 5 (September/October 2000): 37–40.
30. Arthur Marwick, Britain in the Century of Total War: War, Peace and
Social Change (Boston: Little, Brown, 1968).
31. Frederick O. Banting, “Memorandum on the Present Situation Regarding
Bacterial Weapons,” London: Public Record Office, WO188/653 10, n.d., p. 3.
This statement was circulated by Banting in Britain in November-December 1939.
32. Graham Allison, Nuclear Terror: The Ultimate Preventable Catastro-
phe (New York: Holt, 2004), p. 129.
33. Ulrich Beck, Risk Society: Towards a New Modernity, trans. M. Ritter
(London: Sage, 1992).
34. Jeanne Guillemin, “Inventing Bioterrorism” in Making Threats: Bio-
fears and Environmental Anxieties, ed. Banu Subramaniam, Elizabeth Hartmann,
and Charles Zerner, 197–216 (New York: Rowman and Littlefield, 2005).
35. See Zygmunt Bauman on “risk-fright” in Postmodern Ethics (Oxford:
Blackwell, 1993), p. 204.
36. Martin I. Meltzer et al., “Modeling Potential Responses to Smallpox as
a Bioterrorist Weapon,” Emerging Infectious Diseases 7, no. 6 (November–
December 2001): 959–969; Thomas Mack, “A Different View of Smallpox and
Vaccination,” New England Journal of Medicine 348, no. 5 (January 2003):
1–4; Raymond Gani and Steve Leach, “Transmission Potential of Smallpox in
Contemporary Populations,” Nature 414, no. 13 (December 2001): 748–751.
37. Robert J. Blendon et al., “The Public and the Smallpox Threat,” New
England Journal of Medicine 348, no. 5 (January 2003): 426–432; Tara O’Toole,
Michael Mair, and Thomas V. Inglesby, “Shining Light on Dark Winter,” Clini-
cal Infectious Diseases 34 (April 2002): 972–983.
38. Matthew Meselson, “Bioterrorism: What Can Be Done?” in Striking
Terror: America’s New War, ed. Robert B. Silvers and Barbara Epstein, 257–
276 (New York: New York Review Books, 2002).
39. Robert K. Merton, Social Theory and Social Structure (Glencoe, IL:
Free Press, 1957), pp. 60–69.
40. Nicholas Schwellenbach, “Biodefense: A Plague of Scientists,” Bulletin
of the Atomic Scientists 61, no. 3 (May–June 2005): 14–16.
41. National Research Council Committee on Research Standards and Prac-
tices to Prevent the Destructive Application of Biotechnology, Biotechnology in
an Age of Terrorism: Confronting the Dual Use Dilemma (Washington, DC:
National Academy Press, 2003), p. 14.
42. Chandré Gould and Peter Folb, Project Coast: Apartheid’s Chemical
and Biological Program (Geneva: United Nations Institute for Disarmament
Research, 2002).
43. David E. Kaplan and Andrew Marshall, The Cult at the End of the
World (New York: Crown, 1996); W. Seth Carus, “The Rajneeshees,” in Toxic
36 Understanding the Threat
Wenger_2.qxd 12/12/06 4:02 PM Page 36
Terror: Assessing Terrorist Use of Chemical and Biological Weapons, ed.
Jonathan B. Tucker, 115–137 (Cambridge, MA: MIT Press, 2000).
44. Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terror-
ism (New York: Random House, 2005); Mia Bloom, Dying to Win: The Allure
of Suicide Terror (New York: Columbia University Press, 2005).
45. Irving Louis Horowitz, Taking Lives: Genocide and State Power (New
Brunswick, NJ: Transaction Publishers, 2002), pp. 153–179; Benjamin A.
Valentino, Final Solutions: Mass Killing and Genocide in the Twentieth Cen-
tury (Ithaca, NY: Cornell University Press, 2004).
46. Michael Walzer, Just and Unjust Wars: A Moral Argument with Histor-
ical Illustrations (New York: Basic Books, 1980), pp. 197–204.
47. Horowitz, Taking Lives, p. 110.
48. Samantha Powers, The Problem from Hell: America and the Age of
Genocide (New York: Basic Books, 2002).
49. E. V. Walter, Terror and Resistance: A Study of Political Violence (New
York: Oxford University Press, 1969).
50. W. Seth Carus, Bioterrorism and Biocrimes: The Illicit Use of Biolog-
ical Agents Since 1900 (Washington, DC: Center for Counterproliferation
Research, National Defense University, 2002).
51. Guillemin, Anthrax, pp. 207–239.
52. Jeanne Guillemin, “The Deliberate Release of Anthrax Spores Through
the United States Postal System,” in Public Health Response to Biological and
Chemical Weapons: WHO Guidance, ed. Julian Perry Robinson, 98–108 (Geneva:
World Health Organization, 2004).
53. Everett C. Hughes, The Sociological Eye (New Brunswick, NJ: Trans-
action Publishers, 1989).
54. David P. Sidler, “Germs, Governance, and Global Public Health in the
Wake of SARS.” Journal of Clinical Investigation 113 (March 2004): pp.
799–804.
55. Israel Weinstein, “An Outbreak of Smallpox in New York City,” Amer-
ican Journal of Public Health 37 (November 1947): 1347–1384.
56. Jeanne Guillemin, “Bioterrorism and the Hazards of Secrecy: A History
of Three Epidemic Cases,” Harvard Health Policy Review 4, no. 1 (Spring
2003): 36–50.
57. Guillemin, Anthrax, pp. 188–206.
58. Diane Vaughan, The Challenger Launch Decision: Risky Technology,
Culture, and Desire at NASA (New York: Oxford University Press, 1996); Hugh
Gusterson, Nuclear Rites: An Anthropologist Among Weapons Scientists (Berke-
ley: University of California Press, 1996).
59 Nicholas A. Sims, “A Proposal for Putting the 26 March 2005 Anniver-
sary to Best Use for the BWC,” CBW Conventions Bulletin 62 (December
2003): 1–6; Angela Woodward, Time to Lay Down the Law: National Legisla-
tion to Enforce the BWC (London: Vertic, 2003).
60. Matthew Meselson and Julian Perry Robinson, “Draft Convention to
Prohibit Biological and Chemical Weapons Under International Criminal Law,”
in Treaty Enforcement and International Cooperation in Criminal Matters, ed.
Rodrigo Yepes-Enríquez and Lisa Tabassi, 457–469 (The Hague: OPCW, 2002).
The Legacy of Secret State Programs 37
Wenger_2.qxd 12/12/06 4:02 PM Page 37
Wenger_2.qxd 12/12/06 4:02 PM Page 38
Random documents with unrelated
content Scribd suggests to you:
822 Drame.
823 Roman.
824 Essais.
825 Eloquence.
826 Lettres.
827 Satire. Humour.
828 Mélanges.
829 Littérature anglo-saxonne.
830 Littérature germanique.
831 Poésie.
832 Drame.
833 Roman.
834 Essais.
835 Eloquence.
836 Lettres.
837 Satire. Humour.
838 Mélanges.
839 Littératures germaniques sec.
840 Littérature française.
841 Poésie.
842 Drame.
843 Roman.
844 Essais.
845 Eloquence.
846 Lettres.
847 Satire. Humour.
848 Mélanges.
849
850 Littérature italienne.
851 Poésie.
852 Drame.
853 Roman.
854 Essais.
855 Eloquence.
856 Lettres.
857 Satire. Humour.
858 Mélanges.
859 Littérat. roumaine et vallaque.
860 Littérature espagnole.
861 Poésie.
862 Drame.
863 Roman.
864 Essais.
865 Eloquence.
866 Lettres.
867 Satire. Humour.
868 Mélanges.
869 Littérature portugaise.
870 Littérature latine.
871 Poésie.
872 Dramatique.
873 Epique.
874 Lyrique.
875 Eloquence.
876 Lettres.
877 Satire. Humour.
878 Mélanges.
879 Littérat. italiques secondaires.
880 Littérature grecque.
881 Poésie.
882 Dramatique.
883 Epique.
884 Lyrique.
885 Eloquence.
886 Lettres.
887 Satire. Humour.
888 Mélanges.
879 Littérat. helléniq. secondaires.
890 Littératures secondaires.
891 Indo-européennes secondaires.
892 Sémitique.
893 Hamitique.
894 Scythique.
895 Asie orientale.
896 Afrique.
897 Amérique du Nord.
898 Amérique du Sud.
899 Polynésie. Autres.
HISTOIRE
900 Histoire en général.
901 Philosophie.
902 Manuels. Chronologie.
903 Dictionnaires.
904 Essais.
905 Revues. Périodiques.
906 Sociétés.
907 Etude. Enseignement.
908 Polygraphie.
909 Histoire universelle.
910 Géographie et descript.
911 Géographie historique.
912 Cartes. Atlas.
913 Antiquités. Archéologie.
914 Europe.
915 Asie.
916 Afrique.
917 Amérique du Nord.
918 Amérique du Sud.
919 Océanie et Régions polaires.
920 Biographie.
921 Philosophie.
922 Théologie.
923 Sociologie.
924 Philologie.
925 Sciences.
926 Sciences appliquées.
927 Beaux-Arts.
928 Littérature.
929 Généalogie. Héraldique.
930 Histoire ancienne.
931 Chinois.
932 Egyptiens.
933 Juifs.
934 Indiens.
935 Mèdes et Perses.
936 Celtes.
937 Romains.
938 Grecs.
939 Peuples secondaires.
940 Europe.
941 Ecosse. Irlande.
942 Angleterre. Pays de Galles.
943 Allemagne. Autriche.
944 France.
945 Italie.
946 Espagne. Portugal.
947 Russie.
948 Norwége. Suède. Danemark.
949 Petits pays.
950 Asie.
951 Chine.
952 Japon.
953 Arabie.
954 Indes.
955 Perse.
956 Turquie d’Asie.
957 Sibérie.
958 Turkestan. Afghanist. Beloutc.
959 Inde orientale.
960 Afrique.
961 Afrique du Nord.
962 Egypte. Nubie.
963 Abyssinie.
964 Maroc.
965 Algérie.
966 Afrique centrale du Nord.
967 Afrique centrale du Sud.
968 Afrique méridionale.
969 Madagascar.
970 Amérique du Nord.
971 Amérique anglaise. Canada.
972 Mexique. Amérique centrale.
973 Etats-Unis.
974 Etats de l’Atlantique, Nord.
975 Etats de l’Atlantique, Sud.
976 Etats du Centre, Sud.
977 Etats du Centre, Nord-Est.
978 Etats du Centre, Est.
979 Etats du Pacifique.
980 Amérique du Sud.
981 Brésil.
982 République Argentine.
983 Chili.
984 Bolivie.
985 Pérou.
986 Colombie. Equateur.
987 Venezuela.
988 Guyane.
989 Paraguay. Uruguay.
990 Océanie, Régions polaires.
991 Malaisie.
992 Iles de la Sonde.
993 Australasie.
994 Australie.
995 Nouvelle Guinée.
996 Polynésie.
997 Iles isolées.
998 Régions arctiques.
999 Régions antarctiques.
*** END OF THE PROJECT GUTENBERG EBOOK DECIMAL
CLASSIFICATION. TABLES GÉNÉRALES ***
Updated editions will replace the previous one—the old editions will
be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.
START: FULL LICENSE
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the free
distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only be
used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com

More Related Content

PPTX
Bioterrorism,introduction,types,challenges
PPTX
Threats and preventions of bioterrorism
PDF
Bioterrorism An Introduction
DOCX
After thoroughly reading this week’s course material, choose one p.docx
PPT
Bioterrorism
PPTX
biological weapns
PPTX
Bioterrorism / Biological warfare created by Dr. X
PPTX
Microorganisms in biological warfare
Bioterrorism,introduction,types,challenges
Threats and preventions of bioterrorism
Bioterrorism An Introduction
After thoroughly reading this week’s course material, choose one p.docx
Bioterrorism
biological weapns
Bioterrorism / Biological warfare created by Dr. X
Microorganisms in biological warfare

Similar to Bioterrorism Confronting A Complex Threat Andreas Wenger Editor (20)

DOCX
Bioterrorism CIIT ATD sp13-bty-001
DOC
The Commission WMD
PDF
Bioterrorism An Introduction
PPT
Group 1 Final Presentation The Bioterrorism Act
PPT
13523323234781372-Biological-Weapons.ppt
PPTX
BIOTERRORISM.pptx. bioterrorism world wide usage about natural weapons and ...
PDF
Biological warfare
PDF
BIOTERRORISM.pdf
PPTX
bioterrorism13.pptx
PPT
BIOTERRORISM SKG.ppt
PPT
Bioterrorism
PDF
Bio terrorism
PPSX
Bioterrorism 29.03.2020
PPT
Bioterror.ppt
PPTX
Bioterrorism 2018
PPTX
bio terrorism
PPTX
bioterrorism microbiology final ppt.pptx
PPTX
bioterrorism.pptx
PDF
Disease or bio-warfare? The usage of various pathogens in bioterrorism
PDF
Disease or bio-warfare? The usage of various pathogens in bioterrorism
Bioterrorism CIIT ATD sp13-bty-001
The Commission WMD
Bioterrorism An Introduction
Group 1 Final Presentation The Bioterrorism Act
13523323234781372-Biological-Weapons.ppt
BIOTERRORISM.pptx. bioterrorism world wide usage about natural weapons and ...
Biological warfare
BIOTERRORISM.pdf
bioterrorism13.pptx
BIOTERRORISM SKG.ppt
Bioterrorism
Bio terrorism
Bioterrorism 29.03.2020
Bioterror.ppt
Bioterrorism 2018
bio terrorism
bioterrorism microbiology final ppt.pptx
bioterrorism.pptx
Disease or bio-warfare? The usage of various pathogens in bioterrorism
Disease or bio-warfare? The usage of various pathogens in bioterrorism
Ad

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PPTX
GDM (1) (1).pptx small presentation for students
PDF
RMMM.pdf make it easy to upload and study
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Computing-Curriculum for Schools in Ghana
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Institutional Correction lecture only . . .
GDM (1) (1).pptx small presentation for students
RMMM.pdf make it easy to upload and study
Supply Chain Operations Speaking Notes -ICLT Program
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Computing-Curriculum for Schools in Ghana
O5-L3 Freight Transport Ops (International) V1.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Ad

Bioterrorism Confronting A Complex Threat Andreas Wenger Editor

  • 1. Bioterrorism Confronting A Complex Threat Andreas Wenger Editor download https://ebookbell.com/product/bioterrorism-confronting-a-complex- threat-andreas-wenger-editor-51894114 Explore and download more ebooks at ebookbell.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. Bioterrorism The History Of A Crisis In American Society Epidemics Bioweapons And Policy History 1st Edition David Mcbride https://ebookbell.com/product/bioterrorism-the-history-of-a-crisis-in- american-society-epidemics-bioweapons-and-policy-history-1st-edition- david-mcbride-48332162 Bioterrorism A Guide For Facility Managers Joseph F Gustin https://ebookbell.com/product/bioterrorism-a-guide-for-facility- managers-joseph-f-gustin-2222268 Bioterrorism Field Guide To Disease Identification And Initial Patient Management Dag Kje Von Lubitz https://ebookbell.com/product/bioterrorism-field-guide-to-disease- identification-and-initial-patient-management-dag-kje-von- lubitz-2248502 Bioterrorism S Morse https://ebookbell.com/product/bioterrorism-s-morse-4113600
  • 3. Bioterrorism Preparedness Medicine Public Health Policy Nancy Khardori https://ebookbell.com/product/bioterrorism-preparedness-medicine- public-health-policy-nancy-khardori-4300046 Bioterrorism In Medical And Healthcare Administration 1st Edition Laure Paquette Author https://ebookbell.com/product/bioterrorism-in-medical-and-healthcare- administration-1st-edition-laure-paquette-author-11909438 Bioterrorism And Food Safety 1st Edition Barbara A Rasco https://ebookbell.com/product/bioterrorism-and-food-safety-1st- edition-barbara-a-rasco-1269930 Bioterrorism Preparedness Attack And Response 1st Edition M Fottler https://ebookbell.com/product/bioterrorism-preparedness-attack-and- response-1st-edition-m-fottler-1343014 Bioterrorism And Infectious Agents A New Dilemma For The 21st Century 1st Edition Kenneth Alibek https://ebookbell.com/product/bioterrorism-and-infectious-agents-a- new-dilemma-for-the-21st-century-1st-edition-kenneth-alibek-1623982
  • 7. Bioterrorism Confronting a Complex Threat edited by Andreas Wenger Reto Wollenmann Wenger_FM.qxd 12/14/06 11:29 AM Page iii
  • 8. Published in the United States of America in 2007 by Lynne Rienner Publishers, Inc. 1800 30th Street, Boulder, Colorado 80301 www.rienner.com and in the United Kingdom by Lynne Rienner Publishers, Inc. 3 Henrietta Street, Covent Garden, London WC2E 8LU © 2007 by Lynne Rienner Publishers, Inc. All rights reserved Library of Congress Cataloging-in-Publication Data Bioterrorism : confronting a complex threat / Andreas Wenger and Reto Wollenmann (eds.). p. cm. Includes bibliographical references and index. ISBN-13: 978-1-58826-525-8 (hardcover : alk. paper) 1. Bioterrorism. 2. Bioterrorism—Prevention. I. Wenger, Andreas. II. Wollenmann, Reto. HV6433.3.B56 2007 363.325'3—dc22 2006033578 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. Printed and bound in the United States of America The paper used in this publication meets the requirements of the American National Standard for Permanence of Paper for Printed Library Materials Z39.48-1992. 5 4 3 2 1 Wenger_FM.qxd 12/14/06 11:29 AM Page iv
  • 9. Foreword, Richard Danzig vii Acknowledgments ix 1 Bioterrorism: A Complex Threat 1 Andreas Wenger and Reto Wollenmann Part 1 Understanding the Threat: Actors and Capabilities 2 The Legacy of Secret State Programs 13 Jeanne Guillemin 3 Evolution of the Current Threat 39 Milton Leitenberg 4 The Impact of Scientific and Technological Change 77 Malcolm Dando Part 2 Assessing the Threat: Differing Perceptions 5 Knowledge Gaps and Threat Assessments 93 Peter R. Lavoy 6 Why Do Conclusions from the Experts Vary? 119 Marie Isabelle Chevrier v Contents Wenger_FM.qxd 12/14/06 11:29 AM Page v
  • 10. Part 3 Managing the Threat: Policy Options 7 When to Cry Wolf, What to Cry, and How to Cry It 155 Anthony H. Cordesman 8 More Transparency for a Secure Biodefense 179 Iris Hunger Part 4 Conclusion 9 Securing Society Against the Risk of Bioterrorism 199 Andreas Wenger List of Acronyms 221 Bibliography 223 The Contributors 227 Index 229 About the Book 241 vi Contents Wenger_FM.qxd 12/14/06 11:29 AM Page vi
  • 11. THE USE OF PATHOGENS AS WEAPONS OF WAR AND TERROR HAS A LONG HISTORY, but in recent years our focus on these risks has greatly intensified. Ear- lier, many policymakers thought of bioweapons as the stuff of antiquity (cadavers catapulted over walls to spread plague in medieval cities under siege, blankets infected with smallpox to decimate American Indians opposing the British in their American colonies) or eccentricity (a Rajneeshee cult spreading salmonella in salad bars to disable politi- cal opponents, Aum Shinrikyo attempting to obtain and work with anthrax before resorting to sarin in their efforts to trigger an apocalypse by attacking Tokyo subway passengers). Starting in 1989, however, Russian defectors triggered an appreciation of how heavily the Soviet Union had invested in this weaponry. More recently, the attacks of Sep- tember 11, 2001, and the anthrax letters that were mailed to US senators and media figures immediately afterward focused attention on both bio- weaponry and the imaginative malevolence of terrorist groups that might use it. Since that time, an order of magnitude more money, effort, and debate has gone into the subject. The first response when confronting a newly perceived risk is to con- tinue to do what was being done previously in other contexts, but to re- label it as relevant to the new threat. A second common reaction is to allocate much more money to the problem, permitting us to double, quad- ruple, or otherwise greatly multiply those preexisting efforts. A third response is to reorganize: forming committees, councils, commissions, divisions, and ultimately even departments bearing names that suggest they will solve, or at least address, the newly perceived problem. Normally, it is only later that we start to do what we should have done first: debate the character of the new problem. How substantial is vii Foreword Wenger_FM.qxd 12/14/06 11:29 AM Page vii
  • 12. this risk? What are its special characteristics? Will the problem be the same in the next decades as at present? How might it manifest itself? What near-term capabilities might protect us? Are these capabilities the same as those we should be pursuing for the long term, or do our long- term and short-term strategies diverge? It is only when these and other fundamental questions are asked and answered that we can begin to choose wisely among existing efforts, detect the gaps in what we are doing, initiate relevant new efforts, and organize and invest to respond to our challenges. It took us some years to develop new thinking in response to the realities of nuclear weapons. Bioterrorism is, if anything, a more com- plicated problem. It demands not only an understanding of both biol- ogy—a science that is changing faster than nuclear physics did after World War II—and terrorism, but also a grasp of such diverse topics as the physics of aerosols, our food distribution systems, agricultural and public health systems, mechanisms of decontamination, and systems of policing and interdiction. Moreover, in one dimension bioterrorism is a security problem, related to foreign enemies. In another, it is a domestic problem, subject to exploitation by criminals and disaffected loners as in the model of the Unabomber. Viewed a third way, bioterrorism is intimately connected to natural challenges, particularly those of pandemic disease. From a fourth perspective, bio-challenges may occur from “bio-blunders,” problems that arise neither naturally nor malevolently but from scien- tists who accidentally unleash new pathogens. Fifth, bioterrorism should not be considered in isolation, but instead in tandem with all other po- tential hazards. It should not be surprising, then, that we are still in the midst of debate and at present have no consensus as to the problem, much less as to how to deal with it. It is the strength of this volume that it captures the range and richness of this debate. While we have no consensus, the way we will get there is through discussions like this. —Richard Danzig, Former Secretary of the US Navy (1998–2001) viii Foreword Wenger_FM.qxd 12/14/06 11:29 AM Page viii
  • 13. THIS BOOK EVOLVED OUT OF AN ATTEMPT TO SHED NEW LIGHT ON THE BIOTERROR- ism threat—a threat that became the subject of widespread media atten- tion and political rhetoric in the aftermath of the 2001 anthrax letters. It is the result of collaboration by an interdisciplinary group of col- leagues in areas ranging from security policy and counterterrorism to public health and the life sciences. Along the way, we received the support and assistance of many peo- ple and in a variety of ways. We thank the authors of this book for their patience with our comments and suggestions and for their willingness to take into account new developments. A conference organized by ETH Zürich (Swiss Federal Institute of Technology) was a crucial part of our collaborative process, and we thank all the conference participants who presented their views and shared their insights. In addition to the authors of this volume, they are Ken Alibek, Janet Martha Blatny, Jürg Balmer, Edward Borodzicz, Richard Danzig, Myriam Dunn, Gerald Epstein, Ernst Felberbauer, John Gilbert, Frank Gottron, Gigi Kwik Grön- vall, Jesper Grönvall, Michael Guery, Rohan Gunaratna, Stein Henriksen, Melissa Hersh, David Heyman, David Humair, Frida Kuhlau, Ajey Lele, Michael Mair, Mark Maskow, Victor Mauer, Michael Moodie, Eric K. Noji, Anders Norqvist, Aleksandr Rabodzey, Klaus Riedmann, Martin Schütz, Yoram Schweitzer, Ted Whiteside, and Doron Zimmermann. We are delighted that our manuscript ended up in the capable hands of Lynne Rienner and Lisa Tulchin, who have handled the review and publication process with great skill. We wish to extend our thanks to Isabelle Abele-Wigert and Martin Wählisch, and especially to Jennifer Gassmann of the Center for Security Studies, for their outstanding work in preparing and organizing the conference. We thank Michelle Norgate ix Acknowledgments Wenger_FM.qxd 12/14/06 11:29 AM Page ix
  • 14. and Christopher Findlay for their excellent editorial assistance. Finally, we owe a great debt to Susanne Schmid as a truly indispensable part- ner in our day-to-day work. While we have greatly benefited from the comments, criticism, and encouragement of all those mentioned above, the final responsibility for any errors is of course ours alone. —Andreas Wenger and Reto Wollenmann x Acknowledgments Wenger_FM.qxd 12/14/06 11:29 AM Page x
  • 17. BIOTERRORISM, A HIGHLY COMPLEX THREAT, IS THE CONCERN OF A WIDE RANGE of academic and political fields, including science, politics, law, and se- curity. Soon after the terrorist attacks of 9/11, the 2001 anthrax letters and a worldwide series of related hoaxes alerted the world’s media to the potential threat of bioterrorism and catapulted the issue onto the secu- rity policy agendas of the United States and many Western governments. The debate about bioterrorism and biodefense is not entirely new in expert circles, and, given the difficulties in defining the extent and char- acteristics of the threat, it comes as no surprise that the many expert evaluations have often contradicted one another. However, the degree to which this debate has been—and will continue to be—shaped by US policies, on the one hand, and by a growing gap between the views held by the academic community and those held by the policymaking com- munity, on the other, is indeed remarkable. This book addresses two important topics: the nature and the rele- vance of the threat to our societies of the deliberate use of biological weapons, and the difficulties associated with designing the right policy mix to successfully manage a complex and still largely unsubstantiated threat. The better we understand the many challenges involved in the assessment of the threat—the persistence of political conflict and the changing nature of terrorist warfare, the present and future activities of state actors in bioweapons production and biodefense research, the rapid technological advances in the life sciences, the global spread of dual-use expertise and commercial biotechnological applications, and the risk of a rapid global spread of natural diseases—the better able we will be to deal with the problem. 1 1 Bioterrorism: A Complex Threat ANDREAS WENGER AND RETO WOLLENMANN Wenger_1.qxd 12/12/06 4:16 PM Page 1
  • 18. An examination of bioterrorism elicits a host of complex questions: How urgent is the bioterrorism threat? Do we underestimate or overesti- mate bioterrorism, and what are the potential consequences of our esti- mates? What can we learn from bioterrorism events of the past? How will the rapid developments of technology and those in the life sciences affect the future threat? Who are the likely perpetrators of bioterrorism? How much of a threat are state actors, nonstate terrorist actors, and lonely insiders of growing governmental biodefense programs? What policy options are there for managing the bioterrorism threat? How do governments prioritize their policies for the prevention and management of natural diseases, on the one hand, and for the prevention and manage- ment of the malicious use of bioweapons on the other? To what degree is bioterrorism a security policy issue as opposed to one of health or other public policies? The authors of this book address these questions. While not intended as the final word on bioterrorism, the present book offers the opportunity to compare a variety of views of experts from a wide range of professional and academic backgrounds. Most of the lit- erature to date has focused either on the technical aspects of bioterrorism or, more generally, on the threat posed by weapons of mass destruction (WMD). Several recent books, for example, discuss technical issues related to a specific sector of bioterrorism, such as laboratory security, food safety, infectious agents, viral bioterrorism, and biodefense or syn- dromic surveillance.1 Others track the evolution of the WMD threat.2 This book, by contrast, focuses on bioterrorism in general and on the security policy aspects of the bioterrorism threat in particular. The book consists of three sections. The first covers actors and capa- bilities; the second, threat perceptions; and the third, policy options. Part 1 deals with the legacy of the secret state biowarfare programs of the twentieth century, analyzing the factors that have influenced the histori- cal evolution of state bioweapons capabilities. Aiming to provide a bet- ter understanding of the past, it also addresses the controversies sur- rounding the current threat by both state and nonstate actors. With a view to the future, it concludes with a discussion of the impact of scientific and technological change in biology and the associated life sciences on the potential malicious use of microorganisms by a wide range of actors. Part 2 addresses the various, and sometimes contradictory, percep- tions held by different communities about the nature of the biological weapons threat. It identifies a high level of uncertainty as a key character- istic of the bioterrorism threat and discusses a series of knowledge gaps about the scope and sophistication of existing biowarfare programs and past instances of biowarfare. Examining the literature and identifying 2 Bioterrorism Wenger_1.qxd 12/12/06 4:16 PM Page 2
  • 19. uncertainty as the key determiner of such perceptions, it shows why experts make such very different policy prescriptions even though they usually work with the same historical data. Part 3 highlights a set of policy challenges relating to bioterrorism and offers some solutions to them. It emphasizes the practical problems that policymakers face when making decisions about the trade-offs needed between investing resources in defense against bioterrorism and investing them in the prevention of natural diseases. Finally, it discusses endeavors for more security in the biosciences and in biodefense pro- grams, and it calls for more transparency as a precondition for an in- formed public policy debate at the national and international levels. Introducing Part 1, Jeanne Guillemin investigates the history of state biowarfare programs as a means of providing the reader with an assess- ment of the future likelihood of a bioweapons attack. Unlike chemical and nuclear weapons, biological weapons were rarely debated in public in the twentieth century. Secrecy, Guillemin shows, was the most im- portant facilitator of the growth of the biological warfare programs of all major powers—whether democracies, republics, monarchies, totali- tarian states, or military dictatorships—yet the extent of such programs remained largely unknown, even well into the twenty-first century. In addition to secrecy, scientific advocacy, an existing military-industrial infrastructure, the political perception of a dire threat to national sur- vival, and the doctrine of total war, with its justification of using civil- ians as targets—all played an essential role in allowing for the creation of state biological programs. The end of the Cold War brought about a new awareness of the dan- gers of biowarfare as the focus shifted to the potential diffusion of bio- logical weapons to lesser states and nonstate terrorist actors. According to Guillemin, however, this diffusion is directly affected by the policies of advanced states in general and the United States in particular. Accel- erated by the events of 9/11 and the subsequent Amerithrax3 cases, US interest in—and consequently the research and funding of—biodefense increased dramatically. Dozens of counter-bioterrorism programs, most of them concealed from the public and not subject to congressional oversight, are now entrenched in a wide range of US federal agencies as a result of the shift in US policies toward defending all its citizens against germ attack. The emphasis of these programs, Guillemin points out, is on the development of new biodefense technologies, which has inadvertently led to a huge increase in the number of trained micro- biologists who know how to grow and test lethal pathogens for warfare, Bioterrorism: A Complex Threat 3 Wenger_1.qxd 12/12/06 4:16 PM Page 3
  • 20. exacerbating the danger of the diffusion of such expertise and technol- ogy to potential bioterrorists. The US export of a narrow national security mission to its allies, Guillemin argues, undermines the long-term security interests of the United States. A strictly civil defense approach to bioterrorism, like that of the United States, ignores both the unstoppable global diffusion of biotechnologies and also the risk of an unusually deadly outbreak of an infectious disease. The spread of biotechnologies and natural epidemics can be effectively regulated and controlled only by multiple, coordi- nated international efforts. The alternative to transparency, institutional oversight, and organizational accountability at the national level, and to the criminalization of biological weapons at the international level, Guil- lemin concludes, is a disease catastrophe that will highlight the danger of government secrecy and the failures in international cooperation at the cost of lives and public trust. Analyzing the current biological weapons threat from state and non- state actors, Milton Leitenberg takes issue with the claim of some ex- perts that bioterrorism is the greatest existential threat of our age. Leiten- berg shows that the number of state bioweapons programs has decreased markedly over the past few years. Various US authorities implicitly acknowledged the lessening threat of biowarfare when they dropped South Africa, Libya, Iraq, and Cuba from their intelligence assessments, and when they became more cautious after their intelligence failures in Iraq and qualified their assessments of several other national bioweapons programs, among them those of Iran, North Korea, and Syria. Accord- ing to Leitenberg, no state is known to have assisted any nonstate or ter- rorist group in obtaining biological weapons. Leitenberg goes on to show that there has been an extremely low incidence of real biological events in the past, in contrast to the large number of hoaxes spawned by political rhetoric and media attention. Aside from several right-wing groups in the United States and the Raj- neesh group in The Dalles, Oregon, no terrorist group is known to have successfully cultured any pathogen. The most serious known attempt, Leitenberg notes, was Al-Qaida’s efforts to develop bioweapons, which appear to have been at the early conceptual stage when the group’s facil- ity was overrun by US forces in Afghanistan and the individual who car- ried out the laboratory work was arrested. In fact, the production and dis- tribution of anthrax powder in the United States in 2001 remains the most significant example of a nonstate biological weapons capability. Since the mid-1990s, the risk and imminence of the use of biologi- cal agents by nonstate actors and terrorist organizations have been sys- tematically and deliberately exaggerated and remain almost certainly 4 Bioterrorism Wenger_1.qxd 12/12/06 4:16 PM Page 4
  • 21. the single greatest factor in provoking Al-Qaida’s interest in bioweapons, according to Leitenberg. He further points to increasing concerns about the risk of a natural flu pandemic, concurring with Guillemin that the current political rhetoric of the US government should be tempered in the face of the greater likelihood of a natural disease outbreak, and that the United States has been using an overwhelming proportion of its resources to prepare for the wrong contingency. Focusing on the fields of biology and chemistry, which in recent years and through recent research breakthroughs have expanded into the fields of molecular biology and biochemistry, Malcolm Dando addresses the potential for the misuse of new and developing technologies. Dando first outlines the stages of development of these sciences in the twenti- eth century, moving on to show that the palette of agents now available to potential perpetrators has grown significantly as a result in particu- lar of new manipulations of old viruses and bacteria. Of special concern is the fact that genetic engineering of traditional agents could increase the number of possible agents and the characteristics and uses of such agents to the extent that biodefense becomes unable to anticipate and protect against the threats. In the not-too-distant future the rapidly expanding knowledge in biology could allow potential attackers to target any number of physio- logical processes in the human (or animal) body in many different ways. It took a hundred years, Dando points out, to achieve the ability to de- code human DNA, and another fifty years to describe the DNA se- quence of the human species. If developments in genetic science con- tinue at the current pace, the ease with which various pathogens could be synthetically produced could well increase—and with it the diversity of pathogens and the means of delivering such pathogens. Thus, Dando argues, the future impact of the advances in biology has to be thor- oughly investigated in order to curb the potential hostile use of life sci- ence research. Dando draws the conclusion that we need a web of prevention, that is, a multilateral set of policies, including better intelligence on poten- tial perpetrators, effective controls on exports of agents and equipment, and a strengthening of current public health and emergency planning procedures. This web of prevention, Dando argues, has to be bound together by the internationally accepted norm that modern life sciences must not be used for hostile purposes. The best way of achieving this, Dando suggests, is to ensure that the Biological and Toxin Weapons Convention (BTWC) is reassessed by the states parties to give the con- vention permanent organizational support and to ensure that strong measures are taken to strengthen the BTWC. Bioterrorism: A Complex Threat 5 Wenger_1.qxd 12/12/06 4:16 PM Page 5
  • 22. Introducing Part 2, Peter Lavoy addresses the contrast between, on the one hand, the extraordinary rhetoric of the United States and other gov- ernments in describing biowarfare and bioterrorism as one of the most frightening security threats and, on the other, the low level of prepared- ness of those governments, societies, and armed forces to deal with this threat. In explaining this contrast, Lavoy highlights two knowledge gaps, both linked to a lack of certainty about nearly every aspect of the threat. The first gap is the poor level of understanding about the scope and sophistication of the biological warfare programs that state and nonstate groups might currently possess. The second results from the technical, political, social, cultural, and other difficulties in identifying, character- izing, and attributing attacks involving biological weapons once they have occurred. Discussing the biological weapons programs of the former Soviet Union, Iraq, and Al-Qaida, Lavoy points to the failure of the US intel- ligence community to adequately assess these programs at different points in time, when that community has either seriously underestimated the threat, as with the Soviet Union, or dramatically overestimated it, as with Iraq. Lavoy attributes these errors to a tendency of the US intelli- gence community to deal with a lack of reliable information by rally- ing behind one specific hypothesis to explain an adversary’s conduct. Addressing a set of cases of alleged biowarfare by both superpowers and other states during the Cold War, Lavoy acknowledges the propa- ganda value of biological weapons while noting also the extreme diffi- culty in authoritatively validating their use or nonuse. The two knowledge gaps addressed by Lavoy make it extremely difficult for governments to develop effective strategies and policies and to assign adequate resources to the management of potential bio- warfare and bioterrorism. In order to ameliorate these policy problems, governments should try, Lavoy advises, to gain more information about the status of biowarfare programs and about the cases in which biolog- ical agents have been or may have been used. Since major information gaps will persist, Lavoy concludes, the military acquisition and war plan- ning process should be based on planning scenarios that feature realistic biological weapons employment. Marie Isabelle Chevrier addresses the widespread view that expert evaluations of bioterrorism appear to vary widely. She analyzes bioterror- ism threat assessments by well-known experts, focusing particularly on the framing of the research question, the data considered, and the meth- ods used. Chevrier finds similar arguments in the assessments, based on similar data, using similar reasoning, and evidencing little disagreement 6 Bioterrorism Wenger_1.qxd 12/12/06 4:16 PM Page 6
  • 23. about the likelihood of bioterrorism and the likely vulnerability of mod- ern societies. Although the policy prescriptions of the experts vary con- siderably, the assessments themselves, Chevrier finds, mostly show that a successful bioterrorism event causing mass casualties is not likely to occur. However, Chevrier demonstrates how the use of vague terminology makes it difficult to understand what experts mean when they describe the future likelihood of mass casualty bioterrorism as either “low,” “not likely,” “extremely unlikely,” or “possible but not probable.” Most ex- perts fail to relate the likelihood of an event to a specific time frame (for example, “highly likely within the next five years”), and all find that there is insufficient historical data to predict with any certainty the likely occur- rence of future bioterrorism events; consequently, most researchers have felt, Chevrier points out, that terrorist incidents involving chemical agents were appropriate cases from which to draw inferences about bioterrorism. However, given the differences in production and dissemination between chemical agents and biological agents, Chevrier notes, such analysis may overstate the estimated probability of a bioterrorism attack. The bottom line in most of the assessments is widespread agreement that any bioter- rorism estimate is surrounded by a great deal of uncertainty. Chevrier divides the assessments into two groups, those done before 2001 and those undertaken after the anthrax letters of 2001. She found that the assessments done after 9/11 and the Amerithrax cases represented some change, but not a substantial one. However, the gap between the academic and the policy communities has grown since 2001, driven by highly publicized exercises simulating worst-case scenarios. Most aca- demic bioterrorism experts have been far more cautious and reserved in their assessments than those in the policy community. While the former often focus on the nexus between the terrorism threat and the biological weapons threat, the latter tend to see the bioterrorism threat in the larger context of the likelihood of deliberately caused disease. Introducing Part 3, Anthony H. Cordesman notes that for policymakers there is no reliable way to establish the level of effort needed to deal with the biological weapons risk. Nonetheless, although there are grave uncertainties and extreme difficulties in tracking any form of biologi- cal warfare activity, governments cannot ignore the fact, Cordesman states, that Islamic terrorists have shown an interest in acquiring biolog- ical weapons. Further, the difficulties in manufacturing, weaponizing, and disseminating bioweapons are being steadily reduced by the spread of biological facilities, dual-use equipment, and technical skills. At the Bioterrorism: A Complex Threat 7 Wenger_1.qxd 12/12/06 4:16 PM Page 7
  • 24. same time, Cordesman warns, governments should be extremely careful about crying wolf. The fact that a threat exists does not predetermine the kind of response that is needed; the priority the bioterrorism risk should be given in the context of other security policy and health risks; and the levels of investment in time, expertise, and money that are required. According to Cordesman, most governments that have examined bioterrorism in terms of technological capability have acknowledged the possibility of a high-level attack. But dramatizing worst-case scenarios, he argues, should give way to real-world capability studies. Most bioterrorism events are likely to take the form of attacks where there is little real damage in terms of lethality, and where the main impact is most likely to be a mix of panic and political and economic effects. The level of uncertainty in the use of a bioagent and in terms of its poten- tial lethality remains very high. The technical expertise is concentrated in official laboratories and research centers, but it is often lacking at the broader public policy level. As a result, Cordesman concludes, there is little transparency about the scale of national efforts that could shape an informed public policy debate or foster international cooperation at the operational level. Addressing key policy challenges in the management of the biolog- ical risk, Cordesman points to the problems—with regard to both national policy and global cooperation—in determining the extent to which investments in the defense against and response to biological ter- rorism are competing with those in natural disease research, and also in defining possible synergies between the two. Even though there are practical limits to transparency and cooperation, he concludes, both are key to any effort to prevent bioterrorism, to deal with its political im- pact, and to create cost-effective programs. For if bioterrorism does become a serious reality, there will be an immediate need for large-scale cooperation—a fact that planning and preparation efforts should take into account. Iris Hunger identifies a trend toward more secrecy in the biological field and argues that this trend has to be reversed in order to prevent an erosion of existing international norms against the use of biological agents as weapons. The rapid developments in the biosciences, together with the increasing civilian use of biotechnologies and the lack of national and international control measures, have resulted in a growing threat potential from bioweapons, from both states and terrorist groups. One reason why the threat is growing is the dual-use nature of many of the research, development, production, and testing activities in the bio- logical field. Since it is often difficult to differentiate between peaceful 8 Bioterrorism Wenger_1.qxd 12/12/06 4:16 PM Page 8
  • 25. and hostile activities, transparency, Hunger argues, must be the basis of such activities in the long run. According to Hunger, two recent developments have increased the level of secrecy in scientific biodefense work in general, and in US efforts in particular. As a reaction to 9/11 and the Amerithrax events of 2001, governments have drastically limited their openness in the biosciences, while at the same time the scientific community has been imposing restrictions upon its own activities. In the United States, the reemer- gence of the category of “sensitive but unclassified” information, allow- ing restrictions on unclassified research, has occurred along with stricter controls on the transfer of knowledge to foreign nationals and, at the same time, the inclusion of prepublication review clauses into grants and contracts. In addition, many states have created or enlarged their existing bio- defense programs, a trend that is particularly pronounced in the United States. Not only has the US government not reported some of its secret biodefense programs to the member states of the BTWC, but it has also provided an enormous funding boost to bioweapons research, which in turn has dramatically increased the number of individuals who know how to deal with these agents, while funding for other diseases has been cut. Yet Western states have a chance to influence how biological re- search is conducted, Hunger asserts, since most of the sensitive research is still done in the West. Thus, they should lead by example and set legally binding standards by which biodefense programs that are close to the line between offensive and defensive activities can be identified and closely monitored. This book makes apparent how difficult it is for governments to design sensible policies against bioterrorism. The threat of the malicious use of microorganisms or toxins by state and nonstate actors, along with the high level of uncertainty regarding both the intentions and capabilities of potential malevolent actors, defies traditional approaches to threat analysis. Consequently, if the aim is to secure our societies against the risk of bioterrorism, we must involve experts from a variety of aca- demic and policy fields, including public and private actors at the local, national, and international levels. Drawing on the findings of the chapters in this book, the conclud- ing section discusses a series of key policy challenges in managing an elusive threat. Although the threat may be exaggerated and manipulated, it can neither be denied by experts nor ignored by policymakers. For- mulating and implementing policy to protect a population against the Bioterrorism: A Complex Threat 9 Wenger_1.qxd 12/12/06 4:16 PM Page 9
  • 26. threat of bioterrorism is a remarkably different challenge from formulat- ing and implementing policy to secure a state against the threat of an armed attack by another state. With this difference in mind, the conclud- ing section discusses the new policy challenges to both states and soci- eties in their efforts to define countermeasures, assign responsibilities, and provide resources. Notes 1. For example, see David McBride, Bioterrorism: The History of a Crisis in American Society (New York: Routledge, 2003); Barbara A. Rasco and Gleyn E. Bledsoe, Bioterrorism and Food Safety (Boca Raton, FL: CRC Press, 2005). 2. For example, see Jonathan B. Tucker, ed., Toxic Terror: Assessing Ter- rorist Use of Chemical and Biological Weapons (Cambridge, MA: MIT Press, 2000); Brad Roberts, ed., Hype or Reality? The “New Terrorism” and Mass Casualty Attacks (Alexandria, VA: Chemical and Biological Arms Control Institute, 2000). 3. The US Federal Bureau of Investigation dubbed the anthrax attacks “Amerithrax.” It created a special website, which was given the same name, for the ongoing anthrax investigation. 10 Bioterrorism Wenger_1.qxd 12/12/06 4:16 PM Page 10
  • 27. Part 1 Understanding the Threat: Actors and Capabilities Wenger_2.qxd 12/12/06 4:02 PM Page 11
  • 29. A DEFINING CHARACTERISTIC OF THE TWENTIETH CENTURY WAS THE EXPLOITATION of the advanced sciences of chemistry, biology, and physics for military advantage in the realm of unconventional strategic weapons. Biologi- cal weapons were the least successful of this trio of weapons of mass destruction (WMD), in the sense that they were never fully assimilated by any state military. In the twentieth century, biological weapons were never used on a grand scale in battle the way chemicals were in World War I. Nor did they become a symbol of ultimate strategic military force, as nuclear weapons did after the 1945 US bombings of Japan. Instead, despite extensive development by the major powers (France, Japan, Britain, the United States, and the former Soviet Union), their history remained secret or ignored.1 In the twenty-first century, though, biological weapons have assumed a new symbolic importance, greatly influenced by US policies, that links them to the potential exploitation of biotechnology by outlaw states and terrorists. Understanding the fun- damental characteristics of the former programs can inform us about future prospects for biological weapons and restraints on them. How the twentieth-century biological warfare ventures began is itself a historical conundrum. The literature on technological innova- tions in the modern military offers many examples of organizational resistance to the assimilation of new weapons.2 Yet the major military powers of the twentieth century (with the notable exception of Ger- many) embarked on large antipersonnel germ weapons programs, despite admitted uncertainties about whether such weapons were technically possible or morally defensible. The potential of biological weapons to cause large-scale death and havoc accounts for the allure they had for certain advocates and also for the skepticism and even revulsion with 13 2 The Legacy of Secret State Programs JEANNE GUILLEMIN Wenger_2.qxd 12/12/06 4:02 PM Page 13
  • 30. which they were greeted by others within government. Biological weapons rely on living organisms that are inherently difficult to produce and stan- dardize. They depend on the scientific ability to produce germs that kill or weaken important life-forms—humans, livestock, and crops. Their destructive effects might be delayed and uncertain; they might also (as with anthrax spores) result in prolonged environmental contamination, or they might (as with contagious diseases) infect friendly troops and civil- ians. Their main advantage—the element of surprise—could readily be subverted if an adversary were forewarned and protected with vaccines, antibiotics, masks, or other defensive technologies. At present, most analysts presume that the advanced industrial pow- ers are highly unlikely to resort to biological weapons given the end of the Cold War and the legal and moral norms against this category of arms. All but a few nations are party to the 1925 Geneva Protocol, which bans the use of both chemical and bacteriological weapons. The same is true for the 1972 Biological and Toxin Weapons Convention (BTWC), which bans bioweapons programs and the possession of such weapons. The intense secrecy necessary to hide a state program (to conceal its labora- tories, production facilities, training and testing grounds, modes of trans- portation, and special troops) is generally uncharacteristic of advanced industrial states, and difficult for any country to sustain in a world of globalized commerce, travel, and communication. In addition, modern con- ventional and nuclear weapons have long fulfilled the requirements of national defense, including deterrence. Biological weapons have almost no place in modern state arsenals, nor do chemical weapons, which were banned by the 1993 Chemical Weapons Convention. The end of the Cold War focused new attention on the potential dif- fusion of biological weapons to less politically powerful nations. The United States, in particular, has emphasized the danger that hostile “rogue states” and terrorists beyond the reach of political persuasion might acquire biological, chemical, or nuclear weapons. Still, as in the past, the policies of advanced industrialized nations directly affect the diffusion of the weapons they invent, including biological ones.3 Now the world’s preeminent power, the United States sets the standard for restraints against germ weapons programs and use. Since the mid- 1990s, instead of engaging in broad international cooperation to reduce risks, the United States has emphasized limited national security goals. Following 9/11 and the 2001 anthrax postal attacks, this approach inten- sified as a part of new homeland security initiatives. The US “war on terror” has also entailed the engagement of US allies, particularly the North Atlantic Treaty Organization (NATO) and NATO-affiliated nations, 14 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 14
  • 31. in defensive exercises as well as in efforts to interdict traffic in materials relating to biological, chemical, and nuclear weapons. US preoccupation with bioterrorism has introduced a new integration of national security and the US biological sciences, ranked first in the world. The question is whether this approach can keep new biotechnologies and their inevitable global diffusion beyond Western industrialized nations for strictly bene- ficent rather than destructive purposes. A review of the political circum- stances that fostered the former state programs suggests what the future threats of the hostile exploitation of the life sciences might be and what policies might reduce these threats. Historical Background A hundred years ago, the United States was neither the world’s first mil- itary power nor its leader in the biological sciences. Rather, Germany and France emerged from the nineteenth century as dominant forces in both armaments and microbiology. In World War I, at Ypres in Belgium, Germany, then the leading nation in the chemical industry, launched the first mass chemical attack, provoking a chemical arms race that still has repercussions today. Also in World War I, the German army mounted a minor biological campaign against its enemies’ pack animals, attempt- ing to kill them with anthrax and glanders. After the war, partly in fear that a rearmed Germany might resort to germ air attacks, France and, soon after, the Soviet Union began their first forays into biological war- fare programs. The militaries of both countries used their existing chemical programs as the basis for this new kind of indiscriminate weapon, anticipated for use in aerial bombing. After its 1931 military invasion of Manchuria, Japan (not a party to the 1925 Geneva Protocol) established a secret biological warfare program there, near the city of Harbin. In 1940, the Japanese Imperial Army began the only modern use of germ weapons in battle, attacking Chinese cities and towns with plague-infected fleas and poisoning food and wells. As part of its bru- tal retribution for the 1942 Doolittle Raid on Tokyo, the Japanese army attacked thousands of villagers southwest of Hankow with anthrax and glanders because they had aided or shown support for the US pilots.4 Britain’s biological program, created in 1940 while it was under German air attack, had the most lasting consequence for sophisticated weapons development. The Soviet program was undermined by the 1937–1938 purges, and the French venture came to a halt with the Nazi occupation in 1940. After the US entrance into World War II in 1941, The Legacy of Secret State Programs 15 Wenger_2.qxd 12/12/06 4:02 PM Page 15
  • 32. the United States took its cue from the British and in late 1942 insti- tuted its program for developing virulent disease agents, aerosols, and bombs. After the war, British and US advocates of biological weapons argued that the lethal impact of their newly invented biological bombs, much lighter than chemical ones, might achieve the devastating capabil- ity of atomic weapons. They speculated that the Soviet Union, and later Communist China, could be subdued with disease agents such as anthrax, tularemia, and brucellosis, against which entire cities would be unprotected. During the Vietnam War, the US Army proceeded aggres- sively with biological attack simulations, achieving what it claimed was a new capability for regional dispersal of disease agents. In the 1960s, the United Kingdom, armed with a nuclear weapons capability, retreated from its offensive biological programs and pro- moted legal restraints against biological weapons. France did the same, but more discreetly and slowly. In 1969, President Richard Nixon, con- curring with the British, renounced biological weapons on behalf of the United States. Nixon’s decision paved the way for the belated US ratifi- cation of the 1925 Geneva Protocol and the formulation of the 1972 BTWC. Thus, the military exploitation of new biotechnologies seemed to end. But by 1975, the Soviet Union was using a radical moderniza- tion of its biological sciences to mask a large biological warfare pro- gram. For nearly two decades, until its demise in 1991, the Soviet Union violated the 1972 BTWC, despite its having served as a depository nation for it, together with the United States and Britain. Totalitarianism enhanced the bureaucratic secrecy that allowed the Soviet program to thrive. Yet the governments that sponsored biological warfare programs included representational democracies as well as total- itarian states and military dictatorships. Of the smaller states, apartheid South Africa and Saddam Hussein’s Iraq were eventually known to be emulating the WMD programs of the major powers, while Israel has been strongly suspected of nuclear, chemical, and biological weapons programs, the latter as early as 1947.5 The Importance of Secrecy Secrecy was the most essential factor in the growth of the biological weapons programs of the twentieth century. Closed-door decisions facilitated the creation of offensive programs and sheltered them from oversight and severe budget cuts, so that eventually they established 16 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 16
  • 33. secure organizational niches. The world learned a great deal about chem- ical weapons during World War I and a great deal about nuclear weapons at the end of World War II. In contrast, biological weapons were rarely discussed in public forums and never aroused the kind of international protest that brought about treaty and organizational restraints on chemi- cal and nuclear weapons proliferation.6 The extent of the secrecy that enveloped each of the major biologi- cal warfare programs would be difficult to exaggerate. In open as well as closed societies, in war and in peace, the programs were often unknown to those in the other sectors of the military, and government leaders were often uninformed about or ignored the goals and achievements of their own biological weapons programs. In renouncing the US offensive bio- logical weapons program, President Nixon accurately pointed to the fif- teen years that had passed without the program’s being subject to com- prehensive review. During those years, a few congressional members had made sure that funding for the program was ample and secure. Later, in a much different context, the massive Soviet program was embedded in bureaucratic layers of secrecy until the 1990 defection to Britain of one of its leading scientists.7 Throughout the history of biological weapons, secret information was shared among allies, if not with the public. Soviet relations with satellite and client states likely included the sharing of information and perhaps of technology relevant to biological warfare. During World War II, Britain, Canada, and the United States shared personnel, research, and testing grounds; this tripartite arrangement continued after the war and later included Australia. In 1947, the US government secretly made a deal with Japanese bioweapons scientists to protect the Japanese from war crimes prosecutions in exchange for information on Japan’s program and its use of germ weapons. In this way, evidence of the devastating impact of bio- logical weapons on civilians, which otherwise would have been presented at the Tokyo war crimes tribunal (1946–1948), was suppressed. Also during the history of secret biological weapons programs, gov- ernments encouraged disinformation to protect these ventures. When Japan attacked Chinese civilians with plague-infected fleas and with poi- soned food and water, it masked its aggression by allowing these attacks to pass as naturally occurring epidemics. In the 1950s, the United States and Britain dismissed as propaganda reports about the December 1949 Soviet trial of Japanese germ warfare scientists its troops had captured in China in 1945. In other contexts, states exploited the public fear of and ignorance about diseases associated with biological weapons. In 1952, The Legacy of Secret State Programs 17 Wenger_2.qxd 12/12/06 4:02 PM Page 17
  • 34. the Chinese and North Koreans accused the United States of using crude Japanese methods of attack in the Korean War, and they produced a huge compendium of largely concocted data to bolster their claims.8 Following these accusations, the Chinese government instituted a nationwide anti- insect campaign, which it based on propaganda about US disease attacks.9 In the Soviet Union in the 1970s, two accidental outbreaks caused by the covert program were also explained as epidemics of natural occur- rence. In the first, in 1972, several people were infected with smallpox in the Aral Sea test area. In the second, in 1979, sixty-eight people died from inhalational anthrax in the city of Sverdlovsk (present-day Yekaterin- burg), in the Ural Mountains. An investigation of the latter showed the harmful effects of military secrecy: first, diagnosis was delayed, and sec- ond, the affected community was not alerted to the risks of exposure.10 In the 1980s, the United States accelerated its defensive toxin projects and promoted chemical weapons innovation and production, while at the same time it accused the Soviet Union of assisting Laos and Vietnam with mycotoxin attacks on Hmong tribes and on Cambodians.11 Cuba and the United States had long accused each other of making or using germ weapons, and they continued to do so after the Cold War had ended.12 Persuasive Scientific Experts In addition to secrecy, four other factors allowed the major programs of the twentieth century to begin and to endure: scientific advocacy, estab- lished military-industrial resources, a perceived dire threat to national survival, and a total-war doctrine. Not all advanced industrial nations, even those capable of starting a biological program, chose to do so. Rather, key leaders, by interpreting national interests, determined whether and how research on this unusual weapon would commence. Scientists played an essential role in laying the groundwork for state biological programs and in recruiting other scientific experts. In the interwar period, French, Soviet, and Japanese scientists were part of a general arms buildup. In France, Auguste Trillat started his career at the Institut Pasteur in Paris after obtaining his doctorate in chemistry in Munich. In World War I he was part of the French chemical corps. Then, in 1921, he became the first head of the French program, after reporting confidential information from a German source that Germany had begun its own biological weapons initiative. That information exaggerated Ger- many’s activities, which centered on rearmament with conventional weapons and air power. Later, as the Nazis took power and Germany’s 18 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 18
  • 35. belligerence intensified, Adolf Hitler’s aversion to biological weapons restrained those German scientists who might have pursued such weapons programmatically.13 Nonetheless, until the 1940 hiatus, the French pro- gram drew on the Institut Pasteur for resources and personnel.14 In the Soviet Union around 1925, military biologist Jacov Fishman started a biological weapons program as part of the modernization of the Soviet army promoted by General Mikhail Tukhachevsky.15 That program was short-lived due to the 1937 Stalinist purges that led to the execution of Tukhachevsky and the incarceration of Fishman and many microbiologists from the fields of military and public health. In Japan, General Ishii Shiro, a military physician, spearheaded in 1931 the Japa- nese Imperial Army’s offensive program, which lasted until 1945.16 The more technically sophisticated programs, which began with the United Kingdom and the United States in World War II, relied heavily on the talents of academic microbiologists. In 1939, in response to German military aggression, key civilian microbiologists in Canada, Britain, and the United States began to think like military strategists. In 1939, Nobel laureate Frederick Banting, the codiscoverer of insulin, urged the cre- ation of a British offensive and defensive program and built his own research team in Toronto with funds from private donors.17 Similarly, before becoming head of the British program at Porton Down in 1940, bacteriologist Paul Fildes advocated his country’s need for a retaliatory and offensive capacity against Germany, and later he successfully argued this position at the highest levels.18 In 1941, the United States began drawing on its many university scientists. Columbia University scien- tists Theodor Rosebury and Elvin Kabat wrote a comprehensive outline of select potential bioagents and a plan for a biological weapons pro- gram.19 Rosebury went on to lead the important division that pioneered the study of aerobiology at Camp Detrick. After the war, as a civilian, he wrote openly against biological warfare programs.20 Ira Baldwin, a University of Wisconsin expert on fermentation, became an important leader of the US wartime effort, in particular of the initiative to produce anthrax bombs.21 The role of civilian versus military scientists in the resurgence of the Soviet program in the 1970s is less well recorded. The well-known Soviet academician Yuriy Ovchinnikov is often portrayed as having per- suaded the Kremlin to create Biopreperat, the state conglomerate that housed both commercial and secret research. At the same time, within the military, the older World War II veteran General Yefim Smirnov, for- mer head of the Soviet public health ministry, was a powerful advocate for a biological warfare capability.22 The Legacy of Secret State Programs 19 Wenger_2.qxd 12/12/06 4:02 PM Page 19
  • 36. The Existing Military-Industrial Infrastructure The most advanced state biological programs (in France, Britain, the United States, and the former Soviet Union) were adjoined to the chem- ical weapons programs created during World War I. The use of chemi- cal weapons in World War I established a precedent of indiscriminate attack employing the dispersal of toxic aerosols and mustard gas to break the impasse of trench warfare and claim broad terrain. In the interwar years, bomber aircraft presented even broader possibilities for strategic, long-range chemical attacks and, more theoretically, for bio- logical attacks. Adding early biological programs to established chemical ones brought considerable technical advantages. In the best of circumstances, the chemical programs had already developed effective bombs and spray generators, mastered aerosols, and conducted aerial tests. In the 1940s, the British biological warfare program, though small, benefited greatly from its physical proximity to the chemical program at Porton Down, where it was able to take advantage of its experts on aerodynam- ics and engineering. Its technical innovations were shared with the United States in 1942 and after. In the United States, the new biological program heralded an expansion of the militarily marginal chemical programs, with budget increases and enlarged testing sites and production facili- ties. The chemical program also had vociferous advocates in the mili- tary, industry, and among congressional officials who argued to govern- ment on behalf of both types of programs. The move from laboratory research to volume production of disease agents, coupled with the mass production of suitable munitions for strate- gic attack, distinguished the two postwar superpower programs. The US program’s accomplishments in these areas from World War II until 1969 brought biological weapons close to the early mass destruction capabil- ity envisioned by Banting, Fildes, and others. Before it ended, the Soviet program increased the scale of its endeavor, adding long-range missile capability and attempts to exploit the techniques of modern genetics.23 The Japanese program differed from programs in the West in that it was relatively isolated from Japan’s chemical program. Although joint aerial chemical and biological exercises were occasionally conducted, the large central facility, Unit 731 near Harbin, was exclusively devoted to biological weapons research, as were subsidiary facilities. General Ishii, the creator of the Japanese program, was never able to devise a successful biological bomb, and the program’s aerosolization techniques lagged significantly behind those of the Western allies. During World 20 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 20
  • 37. War II, when the Japanese decided to retreat from chemical weapons, their biological program continued unaffected and unimproved. Political Perceptions of a Dire Threat A principal justification for offensive biological programs was the exis- tence of a dire threat to national survival, a perception that bolstered the rationale for seeking an unconventional advantage over the enemy. By the early twentieth century, aided by increasingly destructive weapons, the military forces in Europe could threaten each other with extreme lev- els of physical destruction and human harm, and carried out those threats in two world wars. When the specific threat of biological weapons arose, though, it was usually ill-founded—a by-product of the larger conflict, but one with organizational repercussions. In the 1920s, for example, the French suspected that their traditional enemy, Germany, would use its advanced microbiology and superior air power to invade and conquer France. Concerning German air power and intentions, the French assessments were accurate, but France was in error concerning its enemy’s biological weapons. Although the German mili- tary had used anthrax and glanders in World War I, such use had proved to be of limited military value. As Germany began rearmament, French fears fueled its own pursuit of a biological weapons advantage. Later, Britain and the United States became similarly convinced of a biological threat from Nazi Germany. It was only in late 1944 that reliable Allied intelligence sources showed conclusively that Germany had no biologi- cal program.24 By then, however, both the British and the US biological programs had become organizationally entrenched. Japan’s belligerence in the 1930s presented a different model of political motivation. In the 1930s, a militarized Japanese government had ambitions to make Japan the dominant force in Asia, replacing the British Empire. The dire threat to the nation, as Japan’s leaders per- ceived it, was a lack of raw materials for industrial growth—an eco- nomic dilemma to which the solution was expansion into China.25 In 1931, the Japanese forcibly occupied Manchuria and set up a puppet government under army control. In addition to building new cities and transportation systems, Japan located its secret biological warfare pro- gram there. Armed conflict with Soviet troops in the north, and then the war with China, troubled this territorial expansion. Years later, when asked to justify the program’s secret horrors (which included human vivisection, the murder of Chinese research subjects, and attacks on The Legacy of Secret State Programs 21 Wenger_2.qxd 12/12/06 4:02 PM Page 21
  • 38. civilians), one former Japanese biologist replied, “Because in a war, you have to win.”26 Each government differed in the way authority was granted to its military to foster innovative biological programs. In 1940, with London under siege, a few key civil servants initiated the British program, plac- ing it at Porton Down without the permission of the war cabinet or of the prime minister.27 Later, Prime Minister Winston Churchill approved the program, although his advisers disagreed about the program’s offensive goals. US president Franklin D. Roosevelt perhaps knew little about the US wartime biological program, which was orchestrated mainly by Sec- retary of War Henry Stimson. In imperial Japan, Emperor Hirohito, him- self a biologist, likely approved the military program and authorized its expansion. Some believe that Soviet secretary-general Leonid Brezhnev personally gave the order to create Biopreperat, the conglomerate that housed both the secret biological weapons program and open biological research. Despite these variations, in each case civil authorities invari- ably made the crucial decision to start the program and then gave pro- gram officials extensive latitude to covertly pursue their objectives. In the long Cold War era, dire threats to national survival were per- ceived both in terms of nuclear annihilation and mutual destruction. After World War II, the US and British offensive programs were revived in response to the perceived threat of Soviet aggression and the spread of Communism in Eastern Europe and China. Although military advo- cates argued that the Soviet Union would have biological weapons by the early 1950s, this estimate failed to take into account the war’s severe toll on Soviet public health conditions and the retrograde impact of Stalinism on its biological sciences. As the Cold War commenced, US and British civil and military advocates spoke out in favor of the potential of germ weapons to rank with nuclear weapons in their de- structive power.28 The United States, Britain, and France later abandoned germ weapons, in part because their nuclear and conventional weapons provided suffi- cient deterrence against the threat of aggression. Why the Soviet Union opted for biological weapons in the 1970s remains unexplained. Its nuclear arsenal was enormous, and its biological program was too secret to serve as a deterrent. Soviet leaders may have erroneously believed that the United States still secretly maintained its advanced program. As a monolithic garrison state, the Soviet Union may simply have been seeking to maximize all its military options.29 Cold War geopolitics spurred some diffusion of superpower biological programs to lesser states, but how much is uncertain. The best documented 22 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 22
  • 39. instances are the now defunct programs in apartheid South Africa and Saddam Hussein’s Iraq, which were also fueled by perceptions of dire threats to national survival. Much more remains to be known about the extent to which other states under similar pressures and with sufficient resources—for instance, Israel, Cuba, Iran, Syria, Taiwan, and North Korea—secretly opted for biological weapons or, as in the case of Libya, rejected them. Total War and Civilian Targets The doctrine of total war, a response to the new scale of industrial-age warfare, included a justification for attacking civilians, who were inte- gral to the production of weapons and the general sustenance of the armed forces.30 By some reckonings, the destruction of a factory could weaken the enemy as much as a battlefield victory could. Frederick Banting wrote about the basis of the doctrine in his 1939 argument for a British biological weapons program: In the past, war was confined for the most part to men in uniform, but with increased mechanization of armies and the introduction of air forces, there is an increased dependence on the home country, and eight to ten people working at home are now required to keep one man in the fighting line. This state of affairs alters the complexion of war. It really amounts to one nation fighting another nation. This being so, it is just as effective to kill or disable ten unarmed workers at home as to put a soldier out of action, and if this can be done with less risk, then it would be advantageous to employ any mode of warfare to accomplish this.31 The total war doctrine signaled a striking moral regression. Indus- trialization had already produced the massification of the labor force that degraded individual autonomy and rights. The doctrine of total war went further by postulating that the deaths of enemy civilians en masse was a significant means to military victory as an end. Military air power became a vital part of this doctrine, inasmuch as aerial bombings prom- ised unobstructed access behind enemy lines and the destruction of critical economic infrastructures, including factories and cities. Visions of biolog- ical bombs eradicating large populations with deadly diseases were part of a modernistic approach to warfare, which included chemical weapons as a theoretically quick way to shorten battles by overpowering the enemy with a single attack. Within the secret confines of the biological weapons The Legacy of Secret State Programs 23 Wenger_2.qxd 12/12/06 4:02 PM Page 23
  • 40. programs, the total war doctrine gave militaries a license to target entire enemy populations with deadly or debilitating diseases. An important supposition underpinning the total war doctrine was that a technological advantage would prevent the enemy from mounting an equally devastating retaliatory attack. During World War II, the Allied carpet bombing of enemy targets in Europe, and similar attacks on Japan, were conducted under the expectation that neither Germany nor Japan could counterattack with equal or greater force. The same rationale applied to the US decision to drop atomic bombs on Japan in 1945. During the Cold War, the nuclear arsenals of the United States and the Soviet Union pushed the total war doctrine to new limits in that they introduced the threat of mutually assured destruction to civilians on both sides of the conflict, “a stable, if grotesque, stalemate.”32 With biological weapons, the expectation was that civilian targets were at a sufficient distance to avoid a risk of infection in the homeland. As for retaliation, each program proceeded as though it alone had the advantage of surprise, which, despite political perceptions of foreign threats, was generally true. Among major powers secretly developing biological weapons, the mass protection of civilians against exotic germ weapons was rarely proposed and never implemented. Soldiers and pro- gram researchers were, of course, vaccinated or otherwise protected, if possible, but public health systems operated separately from the secret military programs, although at the higher echelons in the United States and Soviet Union, not in total ignorance of them. Present Threats The trend in industrial societies has been toward an increase in technolog- ical risks, particularly the inescapable risk of transnational environmen- tal damage caused by late industrial-age manufacture and energy use.33 Similarly, the production of nuclear and chemical weapons by the two superpowers in the twentieth century has become recognized as a desta- bilizing global hazard in the twenty-first century. In contrast, biological weapons of the twentieth century have generated a different legacy, one of US scenarios of potential mass disease attacks that stir the public imag- ination, even though these predicted catastrophes have not occurred. An important change in US policy occurred in the 1990s, when there was a shift toward defending all US citizens against germ attacks by for- eign enemies, whether such attacks were against US military members 24 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 24
  • 41. stationed in the Middle East or Asia or against civilians in the home- land. This defensive position was in part a reaction to post–Cold War revelations about the Soviet biological program and, in 1992, that of Saddam Hussein, compounded by unprecedented acts of terrorism that, in method and scale, seemed to redefine US vulnerability to attack. This policy shift became embodied in legislation for “domestic prepared- ness” programs in 120 major cities and in presidential directives for antibiotic stockpiling and other measures to counter the threat of bioter- rorism, including a troubled universal anthrax vaccination program for the US military.34 Although the United States was not at war, the nas- cent framework for domestic policies was national civil defense, a con- struct that found favor among Republicans who dominated Congress after 1994. Domestic preparedness was also generally supported by elected members of Congress on both sides of the aisle who sought a new source of funds for their states and districts. The 11 September 2001 Al-Qaida attacks on the United States rein- forced this orientation toward civil defense, and the anthrax postal attacks that followed soon after guaranteed that bioterrorism would be a major national security issue. Washington’s quick response was to demand in- creased regulation of any biological research involving disease agents that had been cultivated for biological weapons use and, subsequently, to ini- tiate an aggressive project to develop defensive technologies, with an emphasis on pharmaceutical innovations. The fright value of biological weapons also lent itself to political rhetoric and media exploitation.35 In October 2001, the fictional bioterrorist scenario Dark Winter, created by a Washington think tank and exploited by the press and other mass media, caught the attention of Vice President Dick Cheney. Dark Winter depicted invading Iraqi terrorists infected with smallpox causing a US pandemic of catastrophic dimensions, based on facts that were later roundly criticized by medical experts.36 Convinced by the scenario, Cheney immediately advised President George Bush to institute a national vaccination cam- paign. The president did so in late 2002, when the United States was bas- ing part of its case for the invasion of Iraq on the threat of Saddam Hus- sein’s biological weapons. By that time, many US citizens had been persuaded that smallpox was an imminent threat to their health.37 Partici- pation in the vaccination campaign faltered early on, after several older first responders died from coronary complications soon after being vacci- nated. Following the Iraq invasion, as it became evident that Saddam’s biological program had been destroyed in the 1990s, US fears about small- pox sharply declined and with them the national vaccination campaign. The Legacy of Secret State Programs 25 Wenger_2.qxd 12/12/06 4:02 PM Page 25
  • 42. The smallpox vaccination campaign aside, the perceived threat of biological weapons has had lasting organizational effects. Dozens of federal counter-bioterrorism programs are entrenched in the Department of Homeland Security, the Department of Defense, the Department of Health and Human Services, the Department of Energy, the Department of Agriculture, the Federal Bureau of Investigation (FBI), the Central Intelligence Agency (CIA), and elsewhere. As part of the national secu- rity apparatus, many of the activities of these programs have been kept secret from the public and exempted from congressional or other gov- ernment oversight. At the local level, state and city governments have been funded to intensify emergency response systems that adhere to the civil defense model, even as support for police, firefighters, and public health infrastructure diminishes. In this new era, a major emphasis has been placed on the invention of defensive pharmaceuticals (vaccines, antibiotics, serums, and antivirals) and of surveillance and detection tech- nologies to counter the threat of bioterrorist attacks. Scientific and Technical Resources and Weapons Capability Sixty years ago, when the United States decided to continue its postwar biological warfare program, the numbers of expert microbiologists were relatively low and located in the West, and only a small number of states had built up the modern military organizations and arsenals that could potentially support a secret biological weapons venture. Today, thousands of microbiologists worldwide have skills comparable to those of scientists working in the old state programs. The military buildup in industrializing countries has also expanded, in organizational size and range of weapons. China, India, and Pakistan have acquired nuclear weapons, and others, including North Korea and Iran, may do the same. Technologically, the contemporary threat of biological weapons dif- fusion exists on two levels, neither of which can be effectively controlled except by long-term international efforts. One threat can be called a “moderate capability,” that is, proliferation that could arise from skills and technologies no more advanced than those used in the US and Soviet programs. These would include, for example, generic methods for in- creasing the virulence of pathogens, techniques for aerosolization, and the industrial-scale production of agents and munitions. As in the old programs, certain technical challenges would have to be met, such as the large-scale production of virulent agents and the building of effective 26 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 26
  • 43. mechanisms for agent dispersal. Compared to the proven military value of modern conventional weapons, even a moderate capability in biological weapons remains a luxury for small, economically disadvantaged states. Biological weapons could, however, appeal to more affluent states whose complex military-industrial bureaucracies might at least temporarily shel- ter covert programs. Some industrializing nations (for instance, China, India, Pakistan, and Brazil) now have the microbiological resources that could be exploited by their militaries should their governments feel com- pelled to seek a secret, illegal advantage. The major risk of a moderate capability in biological weapons is the onus of discovery, which would make a pariah of any nation known to violate existing treaties. New biotechnologies that have “futuristic” weapons capabilities pose a second order of threat. These advances range from the cloning of higher mammals to new techniques for shaping human neurology and development.38 Such innovations may sharpen the already considerable divide between the privileged who enjoy the benefits of modern medi- cine and those for whom they remain beyond reach. The science in Aldous Huxley’s Brave New World is fanciful, but the use of technology to create a biologically determined social hierarchy may be a future haz- ard for humanity. US microbiology has had the edge in biotechnology so far, but the field is essentially international, and other centers of innovation, in Asia for example, are emerging. The US biodefense initiative inaugurated in 2002 also poses some risks. The inadvertent consequences of biodefense technology—the unanticipated repercussions that can cascade into the future39—are a cause for concern. Lacking oversight and mechanisms for critical review, various biodefense projects could lead to the pioneering of new, more virulent select agents or futuristic technologies on the presumption, com- mon in the old programs, that defensive research required offensive capability. In addition, by creating new environments for honing biolog- ical weapons skills, increased funding for biodefense research could have other unanticipated negative consequences. The biodefense project is predicated on having more high-containment laboratories (six or more at the maximum level four, plus eleven or more regional centers) and increased federal funding overall for select agent research in level-two and level-three laboratories. At the least, this multibillion-dollar enter- prise will increase the absolute numbers of scientists familiar with the growing and testing of dangerous weapons agents.40 Unlike those few government or military career scientists previously working on defenses against select agents, some thousands of new biodefense scientists, many affiliated with academic medical centers, must rely on federal grants and The Legacy of Secret State Programs 27 Wenger_2.qxd 12/12/06 4:02 PM Page 27
  • 44. contracts. One problem will be whether they can survive shifting policy directives from Washington, which can produce boom or bust fluctua- tions in funding. Another will be the new impingement of secrecy on their scientific work and other challenges to publication and education.41 The Likely Perpetrators What are the political opportunities that might engage today’s many microbiologists in secret biological weapons programs? As in the past, the future of biological weapons depends on the intent of key authority figures, either heads of state or those in the higher echelons of decision- making, or, as another possibility, leaders of terrorist organizations. If the past is prologue, the states most likely to persist with or to initiate illegal biological programs are those whose centralized governments, existing military-industrial resources, and perception of dire political threats predispose them to seek unconventional weapons. Escalating bor- der wars, internal conflict, or frustration with guerrilla warfare can lead to the choice of unconventional weapons; or militaristic economic national expansion might be used as justification, as with Japan in China. Eastern Europe—where the Soviet chemical weapons program was dif- fused to Bulgaria, Yugoslavia, Czechoslovakia, and Romania—has also been beset by conflict and political unrest. The United States itself is not immune to pressures to increase its options for unconventional weapons, especially when its military is engaged in ending insurgent and terrorist violence in Iraq and Afghanistan. The past use of chemical weapons suggests models that could one day apply to biological warfare should the present implementation of treaty restraints prove insufficient. Following World War I and after the 1925 Geneva Protocol, chemical weapons were used in two different contexts. One was when an advanced industrial nation had the advan- tage of attack on foreign soil (Italy against Ethiopia in 1935–1936 and the US use of tear gas for lethal purposes in Vietnam); the other was when a relatively powerful developing nation sought to quell insurgents, civilian activists, or a relatively unprotected state adversary (for exam- ple, Egypt against Yemeni royalists in 1963–1967 and Saddam Hussein against Iran in the Iran-Iraq War and against Iraqi Kurds in 1988–1989). As a relevant example, apartheid South Africa employed small amounts of chemical and biological agents against insurgents within the state, in neighboring countries, and also in foreign sabotage.42 Generalized fears about the survival of their traditions and political influence might also influence nonstate actors to gain access to biological 28 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 28
  • 45. or chemical weapons. In two well-known, unusual cases involving reli- gious cults, the choice of biological weapons paralleled in miniature the processes characteristic of state systems: scientists proposed the method, the leadership approved it, and resources were freed for laboratory research and experimental attacks. In 1989, the Rajneesh cult in Oregon spread nonlethal salmonella in restaurant salad bars and coffee stations in order to test a way to tilt voting participation in their favor. Some five hundred people fell ill, none fatally. As a second example, the Japanese cult Aum Shinrikyo was responsible for twelve deaths and dozens of injuries in the 1995 sarin nerve gas attacks on the Tokyo subway. Aum Shinrikyo included a number of scientists who also experimented with anthrax bacterium growth and dispersal.43 Fear and anger over violated traditions, worker deracination in the global economy, a distrust of government, military invasion and occu- pation, and ethnic enmity—the annals of terrorism include all these motivations. While Islamic extremists have come to represent fanatical resistance to Western influence, US militia groups and Christian funda- mentalists have also been violently opposed to larger impersonal forces that they perceive as threats to individual freedom, their communities, or to family values. Timothy McVeigh was an out-of-work Gulf War veteran skilled with explosives who in 1995, influenced by the militia and the Christian Identity movement and enraged against the US gov- ernment and society, blew up the Murrah Building in Oklahoma City, killing 168 people. Even suicide bombers, who appear insanely destruc- tive, have also been analyzed as consistently motivated by altruistic resistance to foreign occupation.44 The motivations for terrorism are many, but thus far they have been only weakly linked to the means of bioterrorism. The 2001 anthrax postal attacks suggest that even a single disaffected scientist can cause havoc. For this reason alone, the expansion of the US biodefense proj- ect requires a prudent assessment of the risks of training a new genera- tion of microbiologists to research, develop, and test select agents. Civilians as Targets The total war doctrine that justified attacks on enemy civilians during World War II was repudiated by the 1949 Geneva Convention, which affirmed protection of “the whole of the populations of the countries in conflict, without adverse distinction based, in particular, on race, nationality, religion or political opinion” (Section II, Article 13). The convention could not, however, prevent nuclear or biological weapons The Legacy of Secret State Programs 29 Wenger_2.qxd 12/12/06 4:02 PM Page 29
  • 46. programs premised on mass civilian targeting, nor did the widespread killing of civilians in conflicts outside advanced industrialized nations cease.45 Contemporary terrorism after World War II, as it turned to civilian targets rather than political assassinations, has been characterized as an aftereffect of the war’s violations of humane political codes and rule of law.46 The tendency of contemporary terrorists to attack physical infra- structures such as subways and city centers appears to reenact total war strategies to disrupt technology “behind the lines.” Civilians in demo- cratic societies have become prime targets for terrorists, a liability that requires weighing the political infringements of antiterrorism projects against the preservation of individual privacy, group protest, political competition, and constitutional order.47 In other states, such as Bosnia, Rwanda, and Sudan, the ultimate terrorism, genocide, has posed moral and political problems about mass civilian murder that the world believed ended in 1945.48 Biological weapons were created to target large numbers of civil- ians, and it is that aspect that warrants the most serious concern. What populations, then, are potentially most vulnerable to the impact of germ weapons? The level of risk from a naturally occurring disease varies by individual and group; in the same way, the risks of intentional epi- demics vary, with some populations (for example, the very young and very old, pregnant women, those already sick or with compromised immune systems) more vulnerable to serious infection than others. Structural factors like social class also affect risk. Minorities and the poor can be disadvantaged in their general health status, education, and access to health care. The literature suggests three different models of civilian vulnerabil- ity, involving terrorism, warfare, and accidental exposure, in which dif- ferential health risks can figure as variables. State-directed terrorist attacks invariably target marginal or low status groups (by ethnicity, religion, race, gender, or political beliefs) to coerce the wider society.49 The same types of groups were targeted in twentieth-century cases of individual crimes in which disease agents (usually hoaxes) have been used.50 It follows that, depending on the national context, populations against which animosities have already been expressed constitute the most likely future victims. International conflict also presents a potential venue for disease attacks on civilians. Following World War II, after the advanced indus- trial nations ceased to make war against each other, the most vulnerable civilians in wars have been those in developing nations, where deaths 30 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 30
  • 47. due to direct violence have been augmented by preexisting poverty and disease, intensified by the privations of conflict. An attempt by a more powerful nation to disguise a hostile biological intervention in a sub- servient country would perhaps be less feasible now than when Japan was attacking China in 1940–1943, but it is not beyond the realm of possibility. As a third model, the accidental release or spread of biological weapons agents highlights the health risks of the socially disadvan- taged, who, like the working-class victims of the 1979 Sverdlovsk out- break, would suffer disproportionately from an inadvertent exposure.51 Although the mailing of the 2001 anthrax letters was intentional, the dispersal of spores in postal facilities was likely unforeseen by the per- petrator and had the effect of an accidental hazard. In the aftermath, federal officials in Washington proved more protective of predomi- nantly white, middle-class Senate employees than of the black postal workers at the Brentwood postal facility, two of whom died after the alert about contamination in the building was withheld for four days.52 The US expansion of the number of high containment facilities to re- search and test defenses against select agents has generated fears of similar differential risks based on social factors. In Boston, for example, local African American groups protested the location of a level four lab- oratory adjacent to their communities and demanded government over- sight and regulation of research. While the new biodefense laborato- ries follow federal guidelines to prevent accidental releases or security breaches, no laboratory administrator or scientist can guarantee that accidents will never happen or that disease risks will be minor. Secrecy, Transparency, and Biological Weapons Government secrecy made past biological weapons proliferation possi- ble, and it remains the greatest threat today. Even though the norms against biological weapons appear to be widely supported, secrecy can still provide a state with the necessary latitude to defy those norms, which increases the chances of nonstate actors’ gaining access to biolog- ical weapons. The world remains full of highly centralized governments with military-industrial resources, where internal and external threats might be used to justify the secret exploitation of lethal and nonlethal biological weapons. Such threats from insurgents, enemies at the border, or ethnic or religious minorities might conceivably be employed to jus- tify the eventual use of biological weapons masked as natural outbreaks The Legacy of Secret State Programs 31 Wenger_2.qxd 12/12/06 4:02 PM Page 31
  • 48. or accidents. All governments, as well as nongovernmental corpora- tions, depend on “the secrets of the temple,” that is, the information that insiders keep from outsiders in order to safeguard institutional author- ity.53 Thus, in many bureaucracies, transparency is interpreted as a weakness within or incursion on the hierarchical structure, especially in the military; or as an intolerable disruption of channels of communi- cation, as in intelligence agencies; or as a threat to profit, as in industry. In democratic societies, government institutions are charged with serving the public, and they are obliged to be open, to allow citizens and their elected representatives to exercise their authority. Regarding disease threats, governments and other organizations, such as pharma- ceutical companies, charged with mitigating risks are accountable for providing the public with open, accurate, and timely communication, so that the population at risk can make informed decisions. The possibil- ity of a lethal outbreak from any source requires a responsive and open government. Today, the way in which a state manages infectious disease threats can be an indication of good governance—or bad.54 The success- ful containment of an epidemic depends primarily on informed individ- ual response on the part of the public, including the recognition of symptoms and decisions about appropriate preventive interventions and therapeutic approaches. A most successful scenario in this regard was the 1947 New York City response to a potential smallpox outbreak, dur- ing which the coordinated cooperation of local health clinics, volunteer civilians, the media, and an informed public allowed the orderly vacci- nation of 5 million people in two weeks—in an epoch when New York could staff nearly 179 local clinical stations.55 Every instance of governments’ withholding or distorting informa- tion about disease threats demonstrates the increased risks of delayed diagnosis or misdiagnosis that secrecy imposes on the victims.56 China’s six-week denial of the 2003 SARS (severe acute respiratory syndrome) epidemic precipitated a global alert and the near catastrophe of interna- tional contagion, even as the crisis generated a rapid global public health response. Secrecy was also a determining factor in the 1979 Sverdlovsk anthrax outbreak, which was caused by an accidental emission of spores from a military facility engaged in activities forbidden by the 1972 BTWC. The outbreak, the largest of its kind in history, was then exacer- bated by continued government denials and disinformation regarding the source.57 The impeded flow of US government information in the course of responses to the 2001 anthrax postal attacks presents another instance of public endangerment, particularly for minority postal workers. Among the worst effects of such secrecy is the breakdown of trust between 32 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 32
  • 49. exposed communities and public health agencies, a trust vital to the con- tainment of high-risk outbreaks. Currently, as the SARS epidemic demon- strated, it takes rapid international cooperation, including coordination with science and industry and the engagement of an informed public, to ensure protection against a dangerous emerging or unusual infectious disease. The same coordination of resources and information would be necessary in the event of a concerted bioterrorism attack. For the same reasons, secrecy in biodefense research programs height- ens civilian risk. A cloak of secrecy around laboratory research, for in- stance, forcibly narrows the critical review of laboratory techniques, objectives, and results and can easily lead to delayed or faulty solutions. Although rarely documented in the history of biological weapons, the organizational culture of classified government research can create closed systems within which political agendas trump quality science and groupthink overrides reflection on moral issues.58 In addition to its negative impact on scientific credibility, secrecy undermines organiza- tional accountability, so that errors tend to be excused or hidden and thereby perpetuated. Mistakes and delays also occur through “mission clash,” when government agencies with different directives and stan- dards of openness fail to cooperate. During the response to the 2001 anthrax postal attacks, turf wars between public health authorities, the FBI, the military, the CIA, and other agencies confused an anxious pub- lic and increased the risks of delayed or inappropriate medical response, and also impeded criminal investigation. Given the risks of both moderate and futuristic biological capability, of chronic international tensions, and of the persistent social inequities in health risks, one must question why the current minimal restraints on bio- logical weapons are tolerated. The BTWC remains as if still shackled by Cold War secrecy, when it could be forcefully updated to increase trans- parency in this new century. Even if international openness is imperfect, advanced industrial nations should seize the opportunity to offer develop- ing nations new biotechnologies important to global health as an incen- tive for active treaty compliance. Present loopholes in the state-by-state enforcement of the BTWC make for erratic international security.59 Equally serious is the lack of international law to criminalize the individ- ual possession or use of biological and chemical weapons, which would ensure that no perpetrator of such crimes could find a state haven against prosecution.60 The pharmaceutical industry is behind the curve in under- standing its civic responsibility to support the BTWC. The US biodefense initiative also needs comprehensive evaluation and oversight, with a reduction of the scale of the project to less risky dimensions. If the The Legacy of Secret State Programs 33 Wenger_2.qxd 12/12/06 4:02 PM Page 33
  • 50. biodefense initiative is sustained without accountability to the public, it could cause more health risks than it eliminates. Further, the US ex- port of a narrow national security mission to its allies undermines long- term international security interests. Instead, the United States should use its primacy to address the policy deficits that compound the risks of destabilization and preventable human tragedy. Deadly infectious disease outbreaks from any source can have regional and global conse- quences, and therefore require innovative international approaches to solutions and sanctions. Since an intentional epidemic also demands a criminal investigation, it automatically requires an open, cooperative response, with no exceptions for the military, the intelligence commu- nity, private contractors, or industry. The protection of civilians in the short and long term is the primary goal in countering the threat of biological weapons, and one on which everyone should agree. Such disagreement as exists is largely about which policies might best achieve that goal. A strictly civil defense approach to bioterrorism fails to reckon the unstoppable global diffusion of new biotechnologies and the pressures that might propel certain states toward biological weapons. Nor does civil defense protect citizens against the risks of an unusual deadly outbreak, whether natural, inten- tional, or accidental; by definition it does not promote the international coordination necessary to safeguard the public. The strengthening of existing treaties to promote transparency, increased oversight at national levels, and the international criminalization of biological weapons are all forward-looking policies that would keep the biological sciences active for beneficent rather than hostile purposes. The alternative is the risk of a disease catastrophe that underscores the danger of government secrecy and failed response, at the cost of lives and public trust. Notes 1. For a historical overview, see Jeanne Guillemin, Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterror- ism (New York: Columbia University Press, 2005). 2. See Stephen Peter Rosen, New Ways of War: Understanding Military Innovation (Ithaca, NY: Cornell University Press, 1991). 3. Susan Wright, ed., Biological Warfare and Disarmament: New Prob- lems/New Perspectives (New York: Rowman and Littlefield, 2002), pp. 3–24. 4. Li Xiofang, Blood-Weeping Accusations: Records of Anthrax Victims (Beijing: CCP Press, 2005). 5. Avner Cohen, “Israel and Chemical/Biological Weapons: History, Deter- rence, and Arms Control,” Nonproliferation Review 8, no. 3 (Fall/Winter 2001): 27–53. 34 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 34
  • 51. 6. Frederic J. Brown, Chemical Warfare: A Study in Restraints (New Brunswick, NJ: Transaction Publishers, 2005). 7. Simon Cooper, “Life in the Pursuit of Death,” Seed 4 (January/February 2003): 68–72, 104–107. 8. Eric Croddy, “China’s Role in the Chemical and Biological Disarma- ment Regimes,” Nonproliferation Review 9, no. 91 (Spring 2002): 16–47. 9. Albert E. Cowdery, “‘Germ Warfare’ and Public Health in the Korean Conflict,” Journal of the History of Medicine and Allied Sciences 39 (April 1984): 153–172. 10. Jeanne Guillemin, Anthrax: The Investigation of a Deadly Outbreak (Berkeley: University of California Press, 1999). 11. Julian Robinson, Jeanne Guillemin, and Matthew Meselson, “‘Yellow Rain’ in Southeast Asia: The Story Collapses,” Foreign Policy 68 (Fall 1987): 108–112. 12. Guillemin, Biological Weapons, pp. 138–145. 13. Erhard Geissler, “Biological Weapons Activities in Germany, 1923– 45,” in Biological and Toxin Weapons: Research, Development, and Use from the Middle Ages to 1945, ed. Erhard Geissler and John Ellis van Courtland Moon, 102–104 (New York: Oxford University Press, 1999). 14. Olivier Lepick, “French Activities Related to Biological Warfare,” in Geissler and Moon, Biological and Toxin Weapons, pp. 70–90. 15. Sally Stoecker, Forging Stalin’s Army: Marshal Tukhachevsky and the Politics of Military Innovation (Boulder, CO: Westview Press, 1998), pp. 91–93. 16. “Summary of Information, Subject Ishii, Shiro, 10 January 1947,” Docu- ment 41, US Army Intelligence and Security Command Archive, Fort Meade, MD. 17. John Bryden, Deadly Allies: Canada’s Secret War 1937–1947 (Toronto: McClelland and Stewart, 1989), pp. 34–57; Donald Avery, “Canadian Biologi- cal and Toxin Warfare,” in Geissler and Moon, Biological and Toxin Weapons, pp. 190–214. 18. Brian Balmer, Britain and Biological Warfare: Expert Advice and Sci- ence Policy, 1930–65 (London: Palgrave, 2001), p. 27. 19. Theodor Rosebury and Elvin A. Kabat, with the assistance of Martin H. Boldt, “Bacterial Warfare,” Journal of Immunology 56, no. 1 (1947): 7–96. 20. Theodor Rosebury, Peace or Pestilence? Biological Warfare and How to Avoid It (New York: McGraw-Hill, 1949). 21. Bryden, Deadly Allies, pp. 118–119, 197–199. 22. Ken Alibek, with Stephen Handelman, Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World—Told from Inside by the Man Who Ran It (New York: Random House, 1999), p. 37. 23. In addition to Alibek, Biohazard, see Igor V. Domaradskij and Wendy Orent, Biowarrior: Inside the Soviet/Russian Biological War Machine (Amherst, NY: Prometheus Books, 2003). 24. Geissler, “Biological Warfare Activities in Germany,” pp. 91–126. 25. Louise Young, Japan’s Total Empire: Manchuria and the Culture of Wartime Imperialism (Berkeley: University of California Press, 1998), pp. 55–114. 26. “Japan Confronting New Atrocity,” New York Times, 17 March 1995. The Legacy of Secret State Programs 35 Wenger_2.qxd 12/12/06 4:02 PM Page 35
  • 52. 27. Balmer, Britain and Biological Warfare, pp. 36–37. 28. Peter Hammond and Gradon Carter, From Biological Warfare to Health- care: Porton Down, 1940–2000 (New York: Palgrave, 2002), pp. 102–104; Balmer, Britain and Biological Warfare, pp. 98–101; “Report by the Joint Strategic Plans Committee to the Joint Chiefs of Staff on Statements of Policy and Directives on Biological Warfare,” JCS 1837/34, 11 June 1952. 29. Alibek, Biohazard, pp. 234–235; Raymond L. Garthoff, “Polyakov’s Run,” Bulletin of the Atomic Scientists 56, no. 5 (September/October 2000): 37–40. 30. Arthur Marwick, Britain in the Century of Total War: War, Peace and Social Change (Boston: Little, Brown, 1968). 31. Frederick O. Banting, “Memorandum on the Present Situation Regarding Bacterial Weapons,” London: Public Record Office, WO188/653 10, n.d., p. 3. This statement was circulated by Banting in Britain in November-December 1939. 32. Graham Allison, Nuclear Terror: The Ultimate Preventable Catastro- phe (New York: Holt, 2004), p. 129. 33. Ulrich Beck, Risk Society: Towards a New Modernity, trans. M. Ritter (London: Sage, 1992). 34. Jeanne Guillemin, “Inventing Bioterrorism” in Making Threats: Bio- fears and Environmental Anxieties, ed. Banu Subramaniam, Elizabeth Hartmann, and Charles Zerner, 197–216 (New York: Rowman and Littlefield, 2005). 35. See Zygmunt Bauman on “risk-fright” in Postmodern Ethics (Oxford: Blackwell, 1993), p. 204. 36. Martin I. Meltzer et al., “Modeling Potential Responses to Smallpox as a Bioterrorist Weapon,” Emerging Infectious Diseases 7, no. 6 (November– December 2001): 959–969; Thomas Mack, “A Different View of Smallpox and Vaccination,” New England Journal of Medicine 348, no. 5 (January 2003): 1–4; Raymond Gani and Steve Leach, “Transmission Potential of Smallpox in Contemporary Populations,” Nature 414, no. 13 (December 2001): 748–751. 37. Robert J. Blendon et al., “The Public and the Smallpox Threat,” New England Journal of Medicine 348, no. 5 (January 2003): 426–432; Tara O’Toole, Michael Mair, and Thomas V. Inglesby, “Shining Light on Dark Winter,” Clini- cal Infectious Diseases 34 (April 2002): 972–983. 38. Matthew Meselson, “Bioterrorism: What Can Be Done?” in Striking Terror: America’s New War, ed. Robert B. Silvers and Barbara Epstein, 257– 276 (New York: New York Review Books, 2002). 39. Robert K. Merton, Social Theory and Social Structure (Glencoe, IL: Free Press, 1957), pp. 60–69. 40. Nicholas Schwellenbach, “Biodefense: A Plague of Scientists,” Bulletin of the Atomic Scientists 61, no. 3 (May–June 2005): 14–16. 41. National Research Council Committee on Research Standards and Prac- tices to Prevent the Destructive Application of Biotechnology, Biotechnology in an Age of Terrorism: Confronting the Dual Use Dilemma (Washington, DC: National Academy Press, 2003), p. 14. 42. Chandré Gould and Peter Folb, Project Coast: Apartheid’s Chemical and Biological Program (Geneva: United Nations Institute for Disarmament Research, 2002). 43. David E. Kaplan and Andrew Marshall, The Cult at the End of the World (New York: Crown, 1996); W. Seth Carus, “The Rajneeshees,” in Toxic 36 Understanding the Threat Wenger_2.qxd 12/12/06 4:02 PM Page 36
  • 53. Terror: Assessing Terrorist Use of Chemical and Biological Weapons, ed. Jonathan B. Tucker, 115–137 (Cambridge, MA: MIT Press, 2000). 44. Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terror- ism (New York: Random House, 2005); Mia Bloom, Dying to Win: The Allure of Suicide Terror (New York: Columbia University Press, 2005). 45. Irving Louis Horowitz, Taking Lives: Genocide and State Power (New Brunswick, NJ: Transaction Publishers, 2002), pp. 153–179; Benjamin A. Valentino, Final Solutions: Mass Killing and Genocide in the Twentieth Cen- tury (Ithaca, NY: Cornell University Press, 2004). 46. Michael Walzer, Just and Unjust Wars: A Moral Argument with Histor- ical Illustrations (New York: Basic Books, 1980), pp. 197–204. 47. Horowitz, Taking Lives, p. 110. 48. Samantha Powers, The Problem from Hell: America and the Age of Genocide (New York: Basic Books, 2002). 49. E. V. Walter, Terror and Resistance: A Study of Political Violence (New York: Oxford University Press, 1969). 50. W. Seth Carus, Bioterrorism and Biocrimes: The Illicit Use of Biolog- ical Agents Since 1900 (Washington, DC: Center for Counterproliferation Research, National Defense University, 2002). 51. Guillemin, Anthrax, pp. 207–239. 52. Jeanne Guillemin, “The Deliberate Release of Anthrax Spores Through the United States Postal System,” in Public Health Response to Biological and Chemical Weapons: WHO Guidance, ed. Julian Perry Robinson, 98–108 (Geneva: World Health Organization, 2004). 53. Everett C. Hughes, The Sociological Eye (New Brunswick, NJ: Trans- action Publishers, 1989). 54. David P. Sidler, “Germs, Governance, and Global Public Health in the Wake of SARS.” Journal of Clinical Investigation 113 (March 2004): pp. 799–804. 55. Israel Weinstein, “An Outbreak of Smallpox in New York City,” Amer- ican Journal of Public Health 37 (November 1947): 1347–1384. 56. Jeanne Guillemin, “Bioterrorism and the Hazards of Secrecy: A History of Three Epidemic Cases,” Harvard Health Policy Review 4, no. 1 (Spring 2003): 36–50. 57. Guillemin, Anthrax, pp. 188–206. 58. Diane Vaughan, The Challenger Launch Decision: Risky Technology, Culture, and Desire at NASA (New York: Oxford University Press, 1996); Hugh Gusterson, Nuclear Rites: An Anthropologist Among Weapons Scientists (Berke- ley: University of California Press, 1996). 59 Nicholas A. Sims, “A Proposal for Putting the 26 March 2005 Anniver- sary to Best Use for the BWC,” CBW Conventions Bulletin 62 (December 2003): 1–6; Angela Woodward, Time to Lay Down the Law: National Legisla- tion to Enforce the BWC (London: Vertic, 2003). 60. Matthew Meselson and Julian Perry Robinson, “Draft Convention to Prohibit Biological and Chemical Weapons Under International Criminal Law,” in Treaty Enforcement and International Cooperation in Criminal Matters, ed. Rodrigo Yepes-Enríquez and Lisa Tabassi, 457–469 (The Hague: OPCW, 2002). The Legacy of Secret State Programs 37 Wenger_2.qxd 12/12/06 4:02 PM Page 37
  • 55. Random documents with unrelated content Scribd suggests to you:
  • 56. 822 Drame. 823 Roman. 824 Essais. 825 Eloquence. 826 Lettres. 827 Satire. Humour. 828 Mélanges. 829 Littérature anglo-saxonne. 830 Littérature germanique. 831 Poésie. 832 Drame. 833 Roman. 834 Essais. 835 Eloquence. 836 Lettres. 837 Satire. Humour. 838 Mélanges. 839 Littératures germaniques sec. 840 Littérature française. 841 Poésie. 842 Drame. 843 Roman. 844 Essais. 845 Eloquence. 846 Lettres. 847 Satire. Humour. 848 Mélanges. 849
  • 57. 850 Littérature italienne. 851 Poésie. 852 Drame. 853 Roman. 854 Essais. 855 Eloquence. 856 Lettres. 857 Satire. Humour. 858 Mélanges. 859 Littérat. roumaine et vallaque. 860 Littérature espagnole. 861 Poésie. 862 Drame. 863 Roman. 864 Essais. 865 Eloquence. 866 Lettres. 867 Satire. Humour. 868 Mélanges. 869 Littérature portugaise. 870 Littérature latine. 871 Poésie. 872 Dramatique. 873 Epique. 874 Lyrique. 875 Eloquence. 876 Lettres.
  • 58. 877 Satire. Humour. 878 Mélanges. 879 Littérat. italiques secondaires. 880 Littérature grecque. 881 Poésie. 882 Dramatique. 883 Epique. 884 Lyrique. 885 Eloquence. 886 Lettres. 887 Satire. Humour. 888 Mélanges. 879 Littérat. helléniq. secondaires. 890 Littératures secondaires. 891 Indo-européennes secondaires. 892 Sémitique. 893 Hamitique. 894 Scythique. 895 Asie orientale. 896 Afrique. 897 Amérique du Nord. 898 Amérique du Sud. 899 Polynésie. Autres.
  • 59. HISTOIRE 900 Histoire en général. 901 Philosophie. 902 Manuels. Chronologie. 903 Dictionnaires. 904 Essais. 905 Revues. Périodiques. 906 Sociétés. 907 Etude. Enseignement. 908 Polygraphie. 909 Histoire universelle. 910 Géographie et descript. 911 Géographie historique. 912 Cartes. Atlas. 913 Antiquités. Archéologie. 914 Europe. 915 Asie. 916 Afrique. 917 Amérique du Nord. 918 Amérique du Sud. 919 Océanie et Régions polaires. 920 Biographie. 921 Philosophie.
  • 60. 922 Théologie. 923 Sociologie. 924 Philologie. 925 Sciences. 926 Sciences appliquées. 927 Beaux-Arts. 928 Littérature. 929 Généalogie. Héraldique. 930 Histoire ancienne. 931 Chinois. 932 Egyptiens. 933 Juifs. 934 Indiens. 935 Mèdes et Perses. 936 Celtes. 937 Romains. 938 Grecs. 939 Peuples secondaires. 940 Europe. 941 Ecosse. Irlande. 942 Angleterre. Pays de Galles. 943 Allemagne. Autriche. 944 France. 945 Italie. 946 Espagne. Portugal. 947 Russie. 948 Norwége. Suède. Danemark. 949 Petits pays.
  • 61. 950 Asie. 951 Chine. 952 Japon. 953 Arabie. 954 Indes. 955 Perse. 956 Turquie d’Asie. 957 Sibérie. 958 Turkestan. Afghanist. Beloutc. 959 Inde orientale. 960 Afrique. 961 Afrique du Nord. 962 Egypte. Nubie. 963 Abyssinie. 964 Maroc. 965 Algérie. 966 Afrique centrale du Nord. 967 Afrique centrale du Sud. 968 Afrique méridionale. 969 Madagascar. 970 Amérique du Nord. 971 Amérique anglaise. Canada. 972 Mexique. Amérique centrale. 973 Etats-Unis. 974 Etats de l’Atlantique, Nord. 975 Etats de l’Atlantique, Sud. 976 Etats du Centre, Sud.
  • 62. 977 Etats du Centre, Nord-Est. 978 Etats du Centre, Est. 979 Etats du Pacifique. 980 Amérique du Sud. 981 Brésil. 982 République Argentine. 983 Chili. 984 Bolivie. 985 Pérou. 986 Colombie. Equateur. 987 Venezuela. 988 Guyane. 989 Paraguay. Uruguay. 990 Océanie, Régions polaires. 991 Malaisie. 992 Iles de la Sonde. 993 Australasie. 994 Australie. 995 Nouvelle Guinée. 996 Polynésie. 997 Iles isolées. 998 Régions arctiques. 999 Régions antarctiques.
  • 63. *** END OF THE PROJECT GUTENBERG EBOOK DECIMAL CLASSIFICATION. TABLES GÉNÉRALES *** Updated editions will replace the previous one—the old editions will be renamed. Creating the works from print editions not protected by U.S. copyright law means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg™ electronic works to protect the PROJECT GUTENBERG™ concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for an eBook, except by following the terms of the trademark license, including paying royalties for use of the Project Gutenberg trademark. If you do not charge anything for copies of this eBook, complying with the trademark license is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. Project Gutenberg eBooks may be modified and printed and given away—you may do practically ANYTHING in the United States with eBooks not protected by U.S. copyright law. Redistribution is subject to the trademark license, especially commercial redistribution. START: FULL LICENSE
  • 64. THE FULL PROJECT GUTENBERG LICENSE
  • 65. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg™ mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase “Project Gutenberg”), you agree to comply with all the terms of the Full Project Gutenberg™ License available with this file or online at www.gutenberg.org/license. Section 1. General Terms of Use and Redistributing Project Gutenberg™ electronic works 1.A. By reading or using any part of this Project Gutenberg™ electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg™ electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg™ electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. “Project Gutenberg” is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg™ electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg™ electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg™ electronic works. See paragraph 1.E below.
  • 66. 1.C. The Project Gutenberg Literary Archive Foundation (“the Foundation” or PGLAF), owns a compilation copyright in the collection of Project Gutenberg™ electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is unprotected by copyright law in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg™ mission of promoting free access to electronic works by freely sharing Project Gutenberg™ works in compliance with the terms of this agreement for keeping the Project Gutenberg™ name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg™ License when you share it without charge with others. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg™ work. The Foundation makes no representations concerning the copyright status of any work in any country other than the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg™ License must appear prominently whenever any copy of a Project Gutenberg™ work (any work on which the phrase “Project Gutenberg” appears, or with which the phrase “Project Gutenberg” is associated) is accessed, displayed, performed, viewed, copied or distributed:
  • 67. This eBook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook. 1.E.2. If an individual Project Gutenberg™ electronic work is derived from texts not protected by U.S. copyright law (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase “Project Gutenberg” associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg™ electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg™ License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg™ License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg™. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1
  • 68. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 69. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 70. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 71. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 72. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 73. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 74. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 75. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookbell.com