Feeds

FBI sets out case against anthrax 'rogue scientist'

Strong but circumstantial - is there still room for doubt?

Beginner's guide to SSL certificates

Yesterday the FBI published its search warrants and affidavits pertaining to the case of Bruce Ivins, the Ft. Detrick scientist fingered by the agency as the perpetrator of the 'Amerithrax anthrax mailings..

These documents contain no rigorous scientific evidence, but refer to it, and the FBI explains its rationale for accusing Ivins in overviews scattered through the documents.

The argument boils down to the anthrax being specifically traced to a spore-containing flask of which Ivins was the master. Called RMR-1029, it was also referred to by Ivins as "Dugway Ames spores - 1997," apparently from its original point of manufacture, at Dugway Proving Ground in Utah, an Army biodefense center administered by a company called Battelle.

The source sample

RMR-1029 was genetically typed by the FBI through an independent company, and uniquely linked to the mailed anthrax in 2004-2005. However, part of the investigation was engaged in building a repository of Ames strain anthrax isolates from every laboratory in the United States in possession of samples. As part of the inventory, Ft. Detrick had to derive specific unique characteristics for all of its sources of Ames. Genetic testing allowed the FBI to distinguish special mutations unique to all isolates so as to be able to compare them with the signature derived from the anthrax mailings.

The FBI states in its documents that Ivins furnished two sets of samples in February of 2002 in complying with this part of the investigation, representing them as drawn from RMR-1029. This set was unusable, explains the FBI, at which point Ivins was asked to furnish a second set. Given to the FBI in April 2002, these samples did not genetically match the mailed anthrax.

In December of 2003, an FBI agent again surveyed the lab where RMR-1209 resided, identifying cultures of Ames which had not been submitted in the initial part of the investigation. Four months later Ivins furnished culture slants taken from these sources to the FBI. On the same day (although the statements are a bit unclear), the FBI returned to the lab and seized the original samples, as well as RMR-1029, which was eventually removed to the Navy Medical Research Center. When the seized RMR-1029 was tested, its genetic mutation profile matched with the mailed anthrax.

Internet Security Threat Report 2014

Next page: Pinning it to Ivins

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Relive the death of Earth over and over again in Extinction Game
Apocalypse now, and tomorrow, and the next day, and the day after that ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.