WORKING PAPER Bioterrorism and Biocrimes The Illicit Use of Biological Agents Since 1900 W. Seth Carus August 1998 (February 2001 Revision) Center for Counterproliferation Research National Defense University Washington, D.C. Opinions, conclusions, and recommendations expressed or implied within are solely those of the author, and do not necessarily represent the views of the National Defense University, the Department of Defense, or any other U.S. Government agency. This study documents numerous instances in which someone claimed that individuals or groups engaged in criminal conduct. The sources of the allegations are documented in the text. Every effort has been made to distinguish between instances in which the alleged conduct led to criminal convictions and those that were never authoritatively proven. This is a work in progress. The author welcomes comments, especially those that correct errors, identify additional cases for research, or identify additional sources of information on any of the existing cases. Because additional research can change conclusions based on this data, the author encourages readers to contact him before they use of any of the data discussed in this manuscript. Please direct comments to the following address: Dr. W. Seth Carus Center for Counterproliferation Research National Defense University Fort McNair, Building 62, Room 211 Washington, D.C. 20319-6000 Voice: 202-685-2242 Fax: 202-685-2264 E-mail: [email protected] ii Table of Contents TABLE OF CONTENTS..........................................................................................................................III PREFACE..............................................................................................................................................V ACKNOWLEDGEMENTS......................................................................................................................VII PART I: BIOTERRORISM IN PERSPECTIVE...............................................................................1 CHAPTER 1 : INTRODUCTION...............................................................................................................3 What is Bioterrorism?....................................................................................................................3 Studying Bioterrorism....................................................................................................................4 CHAPTER 2 : THE PRACTICE................................................................................................................7 Experience of Bioterrorism............................................................................................................7 Trends in Bioterrorism.................................................................................................................10 Acquiring Biological Agents........................................................................................................12 Employing Biological Agents.......................................................................................................16 CHAPTER 3 : THE PRACTITIONERS....................................................................................................25 Nature of the Perpetrators...........................................................................................................25 Terrorist Group Characteristics..................................................................................................27 Operational Considerations.........................................................................................................31 PART II: CASES.................................................................................................................................33 CHAPTER 4 : CASE DEFINITION.........................................................................................................35 Sources of information.................................................................................................................37 Assessing the data........................................................................................................................38 Organization of cases...................................................................................................................39 CHAPTER 5 : USE OF BIOLOGICAL AGENTS.......................................................................................42 Confirmed Use..............................................................................................................................42 Probable or Possible Use.............................................................................................................76 CHAPTER 6 : THREATENED USE........................................................................................................95 Threatened Use (Probable or Known Possession).......................................................................95 Threatened Use (No Known Possession)...................................................................................104 Threatened Use (Anthrax Hoaxes).............................................................................................122 CHAPTER 7 : POSSESSION................................................................................................................151 Confirmed Possession................................................................................................................151 Probable or Possible Possession...............................................................................................154 CHAPTER 8 : OTHER........................................................................................................................161 Possible Interest in Acquisition (No Known Possession)...........................................................161 False cases and hoaxes..............................................................................................................167 APPENDIX A: LIST OF CASES....................................................................................................179 SOURCES..........................................................................................................................................199 INDEX..............................................................................................................................................205 ABOUT THE AUTHOR.......................................................................................................................209 iii Preface This is the eighth revision of a working paper on biological terrorism first released in August 1998. The last version was released in April 2000. As with the earlier versions, it is an interim product of the research conducted by the author into biological terrorism at the National Defense University’s Center for Counterproliferation Research. It incorporates new cases identified through December 31, 2000, as well as a considerable amount of new material on older cases acquired since publication of the previous revision. The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents. Research into the cases is ongoing, and additional information will be incorporated as further information is uncovered. v Acknowledgements This working paper could not have been prepared without the assistance of a large number Most important were my colleagues at the Center for Counterproliferation Research at the National Defense University. Ambassador Robert Joseph, director of the Center when the bulk of the work was conducted, provided the author with the opportunity to work at the Center, which provided the time needed to research and write this manuscript. He showed extraordinary forbearance and support for this project. In addition, his careful editing substantially strengthened the manuscript. Writing this study would have been impossible without the expert guidance provided by many people who took the time to explain the arcana of biological warfare. To all of them, I express my appreciation. In particular, I have benefited from the willingness of several people who have had first hand experience in the development of biological agents to spend time explaining the esoteric art of biological warfare. This includes the late Thomas Dashiell, William J. Patrick III, and Ken Alibek. Detailed research into two of the bioterrorism incidents was supported in part by Jonathan Tucker and the Monterey Institute for International Studies. Case studies based on that research were published in Jonathan B. Tucker, editor, Toxic Terror: Assessing Terrorist Use of Chemical and Biological Agents (Cambridge, Massachusetts: MIT Press, 2000). In addition, the author benefited considerably from interactions with his fellow authors, although the conclusions reached here sometimes differ from theirs. The author is grateful for the assistance provided by the staff of the National Defense University Library. In particular, the author is indebted to Jeannemarie Faison, Lorna Dodt, and Bruce Thornlow for their expertise in performing electronic searches. Especially appreciated is the expert assistance of Katrina Elledge provided valuable research assistance while serving as an intern at the Counterproliferation Center. A considerable number of people have provided useful suggestions that corrected errors and otherwise improved the manuscript. My thanks to Kathleen Bailey, Ph.D., Gordon Burck, LTC George W. Christopher, USAF, MC, Joseph Goldberg, Ph.D., Ambassador Read Hanmer, Dave Huxsoll, D.V.M., Ph.D., Noreen A. Hynes, M.D., M.P.H., Ambassador Robert Joseph, Ph.D., Shellie A. Kolavic, DDS, Cornelius G. McWright, Ph.D., Dennis Perrotta, Ph.D., and Brad Roberts, Ph.D. I am indebted to them all. Any remaining errors are the fault of the author. Finally, the research and writing of this study was guided in many ways, more than she may realize, by the sage advice and expert assistance of my wife, Noreen. vii viii P I: ART B IOTERRORISM IN P ERSPECTIVE