Feeds

Fact, fiction or bioterror drill? How to cook up a ricin scare

Take one reservoir, two tons ricin mash, stir vigorously

Seven Steps to Software Security

We Yanks love to be scared. The more scared we can be, the better. The Effect of Bioterrorism Messages on Anxiety Levels, a recent article in a peer-reviewed health quarterly, put a point to it. Those covering the science of terror beat in the United States have known for a bit that the mainstream media's uncritical transmission of expert hectoring on doom has had the proper effect.

Epidemiologist Hillel Cohen and two colleagues performed a small study in which graduate students were advised of the gravity of bioterror through excerpts from Richard Preston's The Cobra Event (review) or another warning (see Can bioterrorism warnings make you sick?). Unsurprisingly, those who read the material based on Preston were more scared of bioterror.

Preston, for those who don't recall, is the non-fiction/fiction writer equivalent of the grindhouse movie director. (Gentle fans, please hold the hate mail.) He turned the relatively rare and terrible hemorrhagic diseases caused by the Ebola and Marburg viruses into an infotainment franchise. Preston never met a virus that didn't cause ichors to spurt. The Cobra Event was his fictional treatment, continuing the flogging of a favorite riff.

For it the bioterror weapon was a custom-made virus that destroys you with a fatal case of Lesch-Nyhan Syndrome, an exceedingly rare and ugly genetic disorder. Preston's bioterror casualties bit off their lips, chewed fingers, plucked out eyes, squirted fluids and mewled like kittens with their tails caught in a door. Unbelievable and disturbed, it was a bestseller, good stuff for President Bill Clinton who apparently felt it was one appropriate example among a number of justifications upon which to gin up fear.

The Cobra Event was a fantasy - but anything delivered via the news, no matter how fantastical, is legitimate. If a feat is impossible, it's not an obstacle. American emergency responders and terror experts drill for things that can't happen on a regular basis.

Before the New Year, one such drill ran in State College, Pennsylvania, based on the idea that ricin would be put in the water in time for a collegiate game of pigskin. Readers should know States College's Beaver Stadium holds over 100,000. On Saturdays in season, State College becomes the third largest city in Pennsylvania. A terrorist team striking it with something like ricin, through the water, would have to envision contaminating a water supply of some goodly size.

We can do some figures on the back of an envelope to show the how impractical it is, even if we toss out the reality that Penn State football fans bring most of their beverages, like bottled and canned beer, in their SUVS and RVs.

We start with the work of Porton Down whose scientists conveniently worked out the science of terrorist ricin-making during the trial of Kamel Bourgass. Bourgass's ricin recipe, they determined, starting from five grams of castor seed, would not be a fatal dose, but would cause nausea, vomiting and abdominal pain.

Now assume you want to hit a water supply serving 150,000 people. How should that five grams be apportioned to sicken the public? Per cup or per pint? Keep in mind an awful lot of water will go down the toilet and into the drain during showers. One has to aim big. Assuming the low ball estimate of 150,000 pints, Biochemical Ali needs, at the very least, 750 kilograms of castor mash, or about 1650 pounds. Make it a ton to allow for modest losses in milling.

This means you must install a castor mill where none exists and then figure out how to get a dumptruck of bean mash evenly distributed within a central water supply. The bean mash is also filled with a certain amount of insolubles. These will turn to a gluey glop when they hit water, necessitating stirring - hoo boy (!), a lot of stirring, a godlike amount of agitation. It's not salt.

So much for that plan! Now one understands the attraction of car bombs.

Moving on to polonium, you mistakenly thought the Litvinenko assassination was a British affair. Wrong, it's about us.

Starting with the New York Times and traveling subsequently through the Los Angeles Times and the Washington Post, each major newspaper did a big feature on how terrorists could use polonium. A new terror weapon was invented, the smoky bomb, to replace the obsolete dirty bomb. A smoky bomb, as told by the New York Times op-ed page, is a dirty bomb with the new flavor, polonium. Every one of the newspaper articles used the similar sources, most notably Peter D. Zimmerman, who has campaigned to more tightly regulate polonium.

"Radiation safety experts calculate that a single gram of polonium could sicken 100 million people, killing half," wrote the Los Angeles Times. A smoky bomb "particularly in a crowded, enclosed space, could cause numerous fatalities and sow widespread panic," wrote the Post. Poloniumize pure American water and food and "the consequences could be even more dire."

Are there hints of smoky bomb or polonium in the water threats? Unimportant. The commissioner of the Nuclear Regulatory Commission claimed that American's shouldn't tremble over it but was ignored. He was not with the program. ®

George Smith is a Senior Fellow at GlobalSecurity.org, a defense affairs think tank and public information group. At Dick Destiny, he blogs his way through chemical, biological and nuclear terror hysteria, often by way of the contents of neighborhood hardware stores.

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.