CASE CLOSED … what really happened in the 2001 anthrax attacks?

* Stevens v. United States – Motion To Extend Expert Discovery Deadline/ excerpt

Posted by Lew Weinstein on August 11, 2011

******

******

******

Advertisements

4 Responses to “* Stevens v. United States – Motion To Extend Expert Discovery Deadline/ excerpt”

  1. DXer said

    Drs. Shaw and Chefetz are now scheduled to be deposed on September 22 and 23.

  2. DXer said

    The docket today reveals that a new motion has been filed asking to also extend the time to respond to the pending motions.

    Will DOJ be able to succeed in forcing Stevens to respond before GAO issues its report?

    The District Court will be able to take judicial notice of that report.

    To date, the Plaintiff’s questioning witnesses at deposition has been superficial and there has been scant reliance on the documentary evidence.

  3. DXer said

    Rita Colwell is a familiar name to those of us following Amerithrax.
    http://www.cbcb.umd.edu/~rcolwell/

    Bob Hawley wrote:

    Annu Rev Microbiol. 2001;55:235-53.
    Biological weapons–a primer for microbiologists.
    Hawley RJ, Eitzen EM Jr.

    Chief, Safety and Radiation Protection, U.S. Army Medical Research Institute of Infectious Diseases, Fort Detrick, Maryland, 21702-5011, USA.
    Abstract

    Biological weapons are not new. Biological agents have been used as instruments of warfare and terror for thousands of years to produce fear and harm in humans, animals, and plants. Because they are invisible, silent, odorless, and tasteless, biological agents may be used as an ultimate weapon-easy to disperse and inexpensive to produce. Individuals in a laboratory or research environment can be protected against potentially hazardous biological agents by using engineering controls, good laboratory and microbiological techniques, personal protective equipment, decontamination procedures, and common sense. In the field or during a response to an incident, only personal protective measures, equipment, and decontamination procedures may be available. In either scenario, an immediate evaluation of the situation is foremost, applying risk management procedures to control the risks affecting health, safety, and the environment. The microbiologist and biological safety professional can provide a practical assessment of the biological weapons incident to responsible officials in order to help address microbiological and safety issues, minimize fear and concerns of those responding to the incident, and help manage individuals potentially exposed to a threat agent.

    • Anonymous said

      Dr Hawley is also well known:

      Biological weapons–a primer for microbiologists.
      Hawley RJ, Eitzen EM Jr.
      SourceChief, Safety and Radiation Protection, U.S. Army Medical Research Institute of Infectious Diseases, Fort Detrick, Maryland, 21702-5011, USA. bob.hawley@amedd.army.mil

      Abstract
      Biological weapons are not new. Biological agents have been used as instruments of warfare and terror for thousands of years to produce fear and harm in humans, animals, and plants. Because they are invisible, silent, odorless, and tasteless, biological agents may be used as an ultimate weapon-easy to disperse and inexpensive to produce. Individuals in a laboratory or research environment can be protected against potentially hazardous biological agents by using engineering controls, good laboratory and microbiological techniques, personal protective equipment, decontamination procedures, and common sense. In the field or during a response to an incident, only personal protective measures, equipment, and decontamination procedures may be available. In either scenario, an immediate evaluation of the situation is foremost, applying risk management procedures to control the risks affecting health, safety, and the environment. The microbiologist and biological safety professional can provide a practical assessment of the biological weapons incident to responsible officials in order to help address microbiological and safety issues, minimize fear and concerns of those responding to the incident, and help manage individuals potentially exposed to a threat agent.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: