Hazards and Hoaxes

Biochemical threats require ubiquitous detection systems

Less than eight years ago, anthrax letters killed five people, sickened many others and disrupted mail operations nationwide. Despite large investments in time and treasure, suspicious white powder continues to bedevil security executives and mail center managers worldwide.

Last year was particularly painful for all concerned. A series of white powder envelopes shut down banks, government offices and media organizations. Even the worldwide news media are aware of these incidents— tracking of the words “white powder hoax” and “anthrax” finds more than a thousand mentions in the media every week.

In 2008, more than 50 letters containing white powder were mailed to JP Morgan Chase bank facilities across the country. The FDIC office and Office of Thrift Supervision in Dallas, and the Federal Home Loan Bank in Atlanta were also targeted in these attacks.

The outbreak of white powder letters continued when suspicious letters were sent to governors in more than 40 states. Most were determined to have contained bleached flour. State Department embassies and consulates in more than 18 countries received white powder letters as the year ended. With the exception of a lone perpetrator in Sacramento, Calif., the person or people responsible for these incidents remains at large.

As if the outbreak of white powder letters was not enough to cause concern, the bipartisan Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism also released its report, “World at Risk,” in December 2008. The report focused on biological and nuclear risks, causing the commission to predict that “a weapon of mass destruction will be used in a terrorist attack somewhere in the world by the end of 2013.” Homeland Security Secretary Michael Chertoff echoed the commission’s view at a December press conference when he predicted that more terrorists will soon learn how to make biological weapons and dirty bombs.

Detecting and defending oneself against white powder threats remains difficult and potentially dangerous. Whether the powder is anthrax or flour, it can have the same type of disruptive effect on operations and employees. Therefore, defense against these fundamentally different types of threats always has the same core components: detection, containment, identification and decontamination.

The number of systems available to HAZMAT and other first responders to identify suspicious substances such as white powder has grown dramatically. The Department of Homeland Security’s authorized equipment list for biological detection equipment now describes 87 different samplers, kits and screening devices.

Systems designed to protect us from hazardous substances such as anthrax all have two basic components: a collection system and an identification system. Northrop Grumman’s biohazard detection system, now widely deployed throughout U.S. Postal Service processing centers, contains a hood that collects an air sample near mail being processed and sends it to a system built by Cepheid Inc. that identifies the presence of anthrax by its DNA.

Systems such as the Bio-Seeq Mail Sentry Biological Detection System built by Smiths Detection Inc. and the ASAP II System developed by Research International Inc. perform similar processes using slightly different identification technologies. Other approaches collect ambient air samples from mail centers—or entire buildings—for identification. Examples include the AirSentinel BioAerosol Sensor from ICx Technologies, which acts as the biological equivalent of a smoke detector and sends an alarm if it detects elevated levels of airborne biological material.

Most of the systems introduced since 2001 are designed to detect actual pathogen contamination or help first responders identify the substance; however, by the time first responders have arrived on the scene, the damage has already been done. Mail center personnel have been removed from the scene, businesses have been disrupted and employees are struggling to manage the emotional impact associated with potential exposure to a weapon of mass destruction.

Security managers employ a range of containment approaches from personal downdraft tables to roomsized facilities. DualDraw builds an air filtration table integrating both localized containment and several detection systems. Full mail-center-sized negative pressure air rooms are being built by American Safe Air Inc. for government agencies, Fortune 500 companies and nonprofit organizations.

One unique approach to combining containment, collection and identification is the low-cost, DHS SAFETY Act designated Biohazard Isolation and Screening System built and marketed by Pitney Bowes Inc. It isolates mail from facilities and employees and maintains it in quarantine until a highly sensitive and specific DNA or laboratory test determines that the mail is safe.

Decontamination is the process whereby biohazards are cleaned up in already contaminated mail facilities. There is another approach to decontamination that involves a rather unique system developed by BioDefense Corp. of Boston. MailDefender is designed to eliminate the anthrax threat by neutralizing it at the source. The easy-to-use system is a safe, proven disinfection technology that kills and/or neutralizes anthrax, smallpox and ricin—all dangerous substances.

Unlike other systems that focus only on detection and identification, MailDefender uses a combination of disinfection technologies, including electromagnetic irradiation, ultraviolet, microwave, high-intensity broadbeam, infrared and other light sources to kill biological pathogens that may be in a letter. Whether the letter contains anthrax or a sugar substitute, the recipient is protected when opening it. MailDefender is designed to comply with Homeland Security, federal law enforcement and judicial agencies recommendations as a first line of defense against biochemical assault.

Ideally suited for small batches of mail, an individual MailDefender system decontaminates up to 200 pieces, or 3 pounds, of mail in less than an hour.

Whether hazard or hoax, envelopes filled with suspicious white powder are obvious attempts at biochemical assaults with the intent to harm, disrupt or even kill. The detection, identification, containment and decontamination systems that have been created to deal with this problem are making the task somewhat more manageable, but much remains to be done.

It has been seven years since the original letters paralyzed America—but we’re still counting.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3