Biden Ignoring Ukraine in Favor of Russia

The real hurt and consequence is Ukraine as you read on.

The Biden administration has waived sanctions on a company building a controversial gas pipeline between Russia and Germany.

The US also lifted sanctions on the executive – an ally of Russia’s Vladimir Putin – who leads the firm behind the Nord Stream 2 project.

The move came in a report on Russian sanctions delivered to Congress by the Department of State.

Critics say the pipeline is a major geopolitical prize for the Kremlin.

The project, which would take gas from the Russian Arctic under the Baltic Sea to Germany, is already more than 95% complete.

The Department of State report notes that Nord Stream 2 AG and its chief executive, Matthias Warnig, a former East German intelligence officer, engaged in sanctionable activity.

Nord Stream 2: Biden waives US sanctions on Russian pipeline - BBC News

How it bypasses Ukraine further putting Ukraine into a financial crisis –>

Ukraine crisis: Europe's stored gas high as prices soar - BBC News

But it concludes that it is in the US national interest to waive the sanctions.

 

The Department of State also imposed sanctions on four Russian ships involved in the building of Nord Stream 2, though detractors said that would not be enough to stop the pipeline.

Meanwhile:

Ukrainians breathed a collective sigh of relief last month when Russian President Vladimir Putin said he would withdraw the majority of more than 100,000 troops that had been shifted to the Russian-Ukrainian border. So did the U.S., NATO and the rest of Europe.

But nobody should be breathing easy: Putin isn’t one to stay on the retreat. So, where should we expect his next provocation? Very likely, the waters of the Black Sea.

Russia invaded Ukraine in 2014 and carved off the strategically vital peninsula of Crimea, the largest land grab from a sovereign state in this century. Since then, he has supplied money, training, arms and military advisers to separatist forces in the Donbas region of southeast Ukraine.

The recent buildup was probably a signal to the West of how relentless Putin will be on pressuring Ukraine, and of his deep opposition to it joining the North Atlantic Treaty Organization. It was also a distraction from his persecution of opposition leader Alexey Navalny, and played well with Putin’s base in Russia, where his approval rating soared during the Crimea annexation. Finally, the buildup allowed the Russian military a pretty effective practice run, in case Putin does decide to roll the dice and invade across the border.

Although one should never underestimate Putin’s ability to surprise his geopolitical rivals, this doesn’t seem like the moment for a full-blown land incursion. Putin is already financially overextended with his overseas adventures. Reconstructing Syria will come with a huge bill. Support to Ukrainian separatists is expensive. He has a great appetite for expensive new weapons (militarizing space, for example). And he remains under significant sanctions from the West. source

***

Seems President Biden got the lobby memo to support Moscow.

OS: Biden has not made any moves that would prevent completion of the pipeline, which would transfer natural gas from Russia to Germany while bypassing Poland and Ukraine. That’s a win for both Berlin and Moscow. It’s also a win for Washington lobbyists.

Companies involved with the pipeline spent more than $1 million lobbying on sanctions and other issues related to the project through the first three months of 2021.

Nord Stream 2 AG spent $840,000 on lobbying in the first quarter of 2021, on pace to surpass its nearly $3.6 million lobbying spending last year. The Swiss firm is wholly-owned by Russia’s state-run energy firm Gazprom. Alexei Miller, Gazprom’s executive chairman, is longtime Putin ally, as is Nord Stream CEO Matthias Warnig.

The company spent $600,000 to dispatch Vincent Roberti, a top lobbyist and prolific Democratic donor. Roberti reported lobbying on “issues related to the U.S. position toward the Nord Stream 2 pipeline, including potential financial sanctions affecting the project.” The firm spent another $240,000 to dispatch BGR Group’s Walker Roberts, a former Republican staffer for foreign affairs congressional committees.

Other foreign firms are also dispatching lobbyists to advocate for the pipeline. Five foreign companies partnering on the project — Austria’s OMV AG, the Netherlands’ Shell International, France’s ENGIE, and Germany’s Wintershall and Uniper SE — hired lobbyists at McLarty Inbound to lobby the State Department and the National Security Council. They collectively paid the firm more than $840,000 for lobbying in 2020 and $210,000 in the first quarter of 2021.

McLarty managing partner Richard Burt, the former U.S. Ambassador to West Germany and a member of several influential Washington think-tanks, reported lobbying for a slate of foreign companies that have partnered on the project on “Russian sanctions issues” and “natural gas as an element of European energy security.” Burt donated $2,000 to Biden’s 2020 campaign and $10,000 to pro-Biden super PAC Unite the Country while he was a registered lobbyist for foreign companies partnering with Nord Stream on the pipeline. Biden’s campaign had not refunded Burt’s money at the time of publication, more than 6 months after the donations were given, despite pledging to reject lobbyist donations.

Because firms working for proponents of the pipeline registered under the Lobbying Disclosure Act instead of the Foreign Agents Registration Act, details of which government officials the lobbyists met with remain hidden from the public.

Lobbyists for private entities that would otherwise be required to follow FARA disclosure requirements may choose to instead register under the LDA with the House Clerk’s Office and Secretary of the Senate so long as the “principal beneficiary” of the influence operation is not a foreign government or political party. Nord Stream is owned by a Russian state-run firm, but the Kremlin has insisted the pipeline is a “commercial project.”

CNA Financial reportedly paid $40 million due to Ransomware Demand

CNA is the seventh largest commercial insurer in the United States as of 2018. CNA provides property and casualty insurance products and services for businesses and professionals in the U.S., Canada, Europe and Asia.

CNA itself is 90% owned by a holding company, Loews Corporation. This holding company also has interests in offshore oil and gas drilling rigs, natural gas transmission pipelines, oil and gas exploration, hotel operations and package manufacturing.

CNA Financial Corporation – Jenkins MBA Careers | Poole College of  Management | NC State University

CNA Financial, one of the largest US insurance companies, paid $40 million to free itself from a ransomware attack that occurred in March, according to a report from Bloomberg. The hackers reportedly demanded $60 million when negotiations started about a week after some of CNA’s systems were encrypted, and the insurance company paid the lower sum a week later.

If the $40 million figure is accurate, CNA’s payout would rank as one of the highest ransomware payouts that we know about, though that’s not for lack of trying by hackers: both Apple and Acer had data that was compromised in separate $50 million ransomware demands earlier this year. It also seems like the hackers are looking for bigger payouts: just this week we saw reports that Colonial Pipeline paid a $4.4 million ransom to hackers. While that number isn’t as staggering as the demands made to CNA, it’s still much higher than the estimated average enterprise ransomware demand in 2020.

Law enforcement agencies recommend against paying ransoms, saying that payouts will encourage hackers to keep asking for higher and higher sums. For its part, CNA told Bloomberg that it wouldn’t comment on the ransom, but that it had “followed all laws, regulations, and published guidance, including OFAC’s 2020 ransomware guidance, in its handling of this matter.” In an update from May 12, CNA says that it believes its policyholders’ data were unaffected.

According to Bloomberg, the ransomware that locked CNA’s systems was Phoenix Locker, a derivative of another piece of malware called Hades. Hades was allegedly created by a Russian group with the Mr. Robot-esque name Evil Corp.

***

Ransomware Attack Payment

Ransomware attack payments are rarely disclosed. According to Palo Alto Networks, the average payment in 2020 was $312,493, and it is a 171% increase from the payments that companies made in 2019.

The $40 million payment made by CNA Financial is bigger than any previously disclosed payments to hackers, The Verge reported.

Disclosure of the payment is likely to draw the ire of lawmakers and regulators that are already unhappy that companies from the United States are making large payouts to criminal hackers who, over the last year, have targeted hospitals, drug makers, police forces, and other entities that are critical to public safety.

The FBI discourage organizations from paying ransom because it encourages additional attacks and does not guarantee that data will be returned.

Ransomware is a type of malware that encrypts the data of the victim. Cybercriminals using ransomware usually steal the data too. The hackers, then, ask for a payment to unlock the files and promise not to leak stolen data. In recent years, hackers have been targeting victims with cyber insurance policies and huge volumes of sensitive consumer data that make them more likely to pay a ransom.

Last year was a banner year for ransomware groups, with security experts and law enforcement agencies estimating that victims paid about $350 million in ransom. The cybercriminals took advantage of the pandemic, a time when hospitals, medical companies, and insurance companies were the busiest.

As per Bloomberg’s report, CNA Financial initially ignored the hackers’ demands while pursuing options to recover their files without engaging with the criminals. However, within a week, the company decided to start negotiations with the hackers, who were demanding $60 million.

Payment was made a week later. source

CNA notifying cyberattack

Source

The ransomware cyberattack interrupted the company’s employee and customer services for three days as the firm closed down “out of an abundance of caution” to prevent further damage. Certain CNA systems were impacted, including corporate email.

Your Questions Ready when the UFO Report is Released?

The anticipation is growing as we wait for the report that is slated to be released June 1st. Take notes from the text below if you want some details beyond flying saucers and green people…

The sightings which are not only common in the United States but they too are reported by other countries across the globe. Will these sightings be fully explained? Not likely. So here is a primer for the reader to consider:

    1. We are often told that the weird things in the heavens above are weather balloons, so just accept that answer. Well, there are balloons in the skies and they are not commonly for weather. In fact, those balloons have some very secretive objectives.

      These high-altitude balloons are the property of Raven Aerostar, a division of Raven Industries, based in Sioux Falls, South Dakota. In recent years, Raven Aerostar has been known for its collaboration with Google’s parent company Alphabet in Project Loon, an ambitious venture intended to extend Internet access to rural areas. The “Loon balloons” were designed by Raven Aerostar to fly at high altitude for extremely long durations. Project Loon announced it would shut down in January this year, despite making significant technical strides. Since then, Raven Aerostar has continued to develop its balloon technologies for other sectors, notably in the realm of intelligence and defense.

      ADSBExchange.com

      The high altitude balloons as seen on flight trackers off Southern California. They have caught people’s attention especially due to the fact that they can stay on station for long periods of time, seemingly flying against the prevailing winds in the area.

      The vehicles appear to be derivatives of Raven Aerostar’s Thunderhead balloon system. The Thunderhead balloons are designed to be able to persist over an area of interest in order to carry out a wide variety of tasks. According to the company, common applications include intelligence, surveillance, and reconnaissance (ISR) missions and acting as communications relays. Additionally, the balloons can also serve roles in augmenting navigational systems.

      Their recent appearance over both coasts of the United States appears to be a test of exactly this networking capability. Federal Communications Commissions records reflect an approved license for one of Raven Aerostar’s subsidiaries, Aerostar Technical Solutions, to fly balloons within a two hundred-mile radius around Vista, California from May 9th until May 30th this year.

      The stated purpose is to test networked radio systems, the Silvus 4400E and Silvus 4200E, on the high altitude balloons. Although the application only lists the California locations, further correspondence in FCC records show a conversation about permitting additional locations on the East Coast:

      Official Email

      The company appears to have aggressively pursued its balloon testing in recent years, with experimental radio license applications dating back until at least February 2020. Balloon tests had previously been approved and conducted across the Southeast and Southwest. For example, residents of Jackson, Mississippi may have noticed a meandering balloon track around May 4th this year. Click here for more crazy details.

       

    2. In December 2020, the government enacted the Intelligence Authorization Act, which called for the release of an unclassified and all-sources report on unidentified aerial phenomenon (UAP) — the official military term used for unidentified flying objects. The act was included in the mammoth appropriations bill that also included financial aid checks for people living with the economic fallout from Covid-19.The report will include a thorough analysis of
      1. Available data
      2. Intelligence reporting on UAPs

      It will be presented to the congressional intelligence and armed services committees on UAPs.

      When the Pentagon officially released the footage of the unidentified aircraft last year, the agency admitted that the videos aren’t exactly sure what is going on in the video, and that they cannot explain how the crafts are able to pull such maneuvers.

      It remains unclear whether the government believes these to be sightings of foreign aircrafts using technologies unfamiliar to the United States, or whether they believe the craft are not of this world.

What else should we be asking? Well, the military and the intelligence community has some exceptional tools that are helpful in this quest so we may wonder if they are used in processing this report. Tools such as Geo-Spatial, DARPA, and then the known and unknown tools of the Space Force.

There is spacial wide-and communications, satellites (beyond line of sight) and geospatial intelligence that could or should be exploited in this mission of identification.

But wait…there are non-government agencies as well that often contract to government agencies such as Maxar.

From a 2019 blog post on the Maxar site is the following for consideration:

The Space Safety Coalition (SSC) issued the “Best Practices for Sustainability of Space Operations.” This document, co-signed by 21 space companies, advocates that any spacecraft operating at 400 kilometers or more above Earth should include a propulsion system for maneuvering, allowing each spacecraft to move itself out of a potential collision path instead of relying on others to always maneuver around it, as well as a number of other common sense principles. This will create a safer space environment for all to operate in now and for generations to come.

Maxar Technologies fully endorses the “Best Practices for Sustainability of Space Operations” and encourages Congress to introduce legislation based on these best practices. Below is Maxar’s reasoning for supporting the “Endorsement of Best Practices for Sustainability of Space Operations.”

We rely on space for our everyday lives. Weather satellites enable us to forecast the next snowstorm, so we can stock up on food. GPS lets us navigate to a new destination, using maps that come from imaging satellites. GPS also provides the precise timing used for banking transactions and to make it possible for cell phones—and banking transactions—to work. And, of course, there is NFL Sunday Ticket on DirecTV.

Space is also a big place. To put this into context, between the lowest practical orbit (350 km above Earth’s surface) and geostationary orbit (100 times further up, at 35,000 km), the volume of “near Earth” space is about 270 times the volume of Earth! Current estimates indicate there’s 29,000 objects that are 4 inches or bigger being tracked in that space [1], so it seems like it would be pretty empty and we don’t have to worry about collisions, right?

Well, not exactly. There’s another aspect of space: orbital velocity. Satellites in space don’t stand still, but zip around in their orbits at high speed. In low earth orbit (closest to Earth’s gravitation pull), this is around 7.6 km/sec, or over 16,000 miles an hour! If two objects in space collide, it’s not a gentle nudge but rather a big resounding KABOOM. This results in a lot more small pieces of debris that need to be tracked. If you’re lucky, the collision may knock off a corner of your solar array, like happened when Maxar’s WorldView-2 satellite was hit back in 2016 by a small piece of debris. Fortunately, this had no impact on WorldView-2’s ability to operate. If you’re unlucky, you get a collision like the one between a defunct Russian Cosmos satellite and an Iridium communications satellite back in 2009, which was responsible for nearly doubling the amount of debris in that orbital band.

I’ve mentioned there are about 29,000 tracked objects in space. But there are a lot more pieces too small to track – an estimated 166 million pebble sized pieces [1] are zipping around in space.

While the probability of one of these pieces hitting a satellite is small (on the order of a million to one chance), each collision makes the problem worse. There’s actually a term for this, the Kessler Syndrome, in which each collision makes the problem exponentially worse. We don’t want that to happen, because if it did, it could make certain regions of near Earth space completely unusable for satellites or humans.

Fortunately, we’re quite a long time away from space becoming unusable. Companies are creating new ways to track objects on orbit, including a new commercial solution Maxar is testing, which is the first step in containing the space debris problem. But space, similar to other common areas (like the oceans), requires responsible actions by all space operators to keep it usable for future generations. This is where rules of the road come in, and I’d like to lay out a few common sense ones:

  • Propulsion. Spacecraft operating above 400 km altitude should be required to carry propulsion to executive timely and effective avoidance maneuvers. It’s simply not acceptable for a satellite operator to place the burden of avoiding a collision on other satellite operators; it’s everyone’s responsibility. This is why SSC‘s “Best Practices for Sustainability of Space Operations” advocates for spacecraft operators to adopt space operations concepts that enhance sustainability of the space environment. Why 400 kilometers? It’s a natural dividing line; the International Space Station operates at 403 km altitude (nobody wants to see the movie “Gravity” played out in real life), and below 400 km, atmospheric drag is enough to make those orbits “self-cleaning” (see below).
  • Encryption. Satellites with propulsion should be required to have encryption and authentication on their command link, to ensure that only the satellite operator can control how the propulsion is used. We don’t want a hacker to take control of a satellite and maneuver it into the path of another one to cause an intentional collision.
  • Navigation. Satellites with propulsion should be able to determine their position, and the operators of these satellites should be required to share this position data (along with any planned maneuvers) with a central repository, such as the Combined Space Operations Center (formerly known as the Joint Space Operations Center [JSpOC]), to facilitate safe navigation by all satellite operators. The U.S. government is working on a plan to move this repository to a civilian agency, such as the U.S. Department of Commerce, to enable a more open and accessible repository for all global satellite operators. This is akin to the use of automatic identification system (AIS) transponders in ocean-going vessels, which broadcast their location to other ships using AIS to enable safe navigation, and the data is available publicly online.
  • Littering. Satellites and launch vehicles need to be designed so they do not throw off debris during or after launch. While already largely adopted, it’s important that launch providers and space operators have a plan to deorbit launch materials at the end of their life or move them to a safe orbit that’s out of the way and won’t have collision risks.

We could, however, designate the region below 400 km altitude as an “experimental” zone where the above requirements would not be imposed. These orbits are low enough that any debris will tend to reenter Earth’s atmosphere, burning up within weeks to months, making them much less of a concern. And few, if any, commercial or government satellites operate at those altitudes. Leaving the below-400 km region available without the above restrictions makes operating in space still affordable for operators of the growing number of inexpensive, experimental or educational cubesats.

The commercial and government use of space is accelerating rapidly. It’s time we have a way to regulate space traffic, just like how traffic on Earth is controlled. Even though the first gas-powered automobile was created in the 1880s, it took until the 1910s (three decades!) to bring some sensibility to who had the right-of-way on the road with the invention of the stop light.

Maxar along with the other co-signers of the SSC believe it’s time to bring sensibility to space. We’re asking the U.S. space industry to unite behind these best practices and talk to their senators and representatives about introducing legislation that reflect these best practices. We ask our international industry partners to bring these ideas to their respective governments for consideration. The “Best Practices for Sustainability of Space Operations” is a starting point to getting rules of the road established in space – but, in the big picture, all four common sense principles I’ve outlined above need to be implemented to keep space a safe environment available now and in the years to come.

 

Apple’s Loyalty to China Threatens our Security

Hat tip to the Federalist as they read the very long article that I did this morning about Apple risking it all just to favor the Chinese Communist Party. With that, I will use their summary.(It is extraordinary however that the New York Times is exposing Apple and it’s faults and policy for the sake of doing business in China)

The Apple data center in Guiyang as seen in a satellite image. Apple plans to store the personal data of its Chinese customers there on computer servers run by a state-owned Chinese firm.

Censorship, Surveillance and Profits: A Hard Bargain for Apple in China

Apple built the world’s most valuable business on top of China. Now it has to answer to the Chinese government.

Apple willingly compromises certain privacy and security business practices to build a partnership with the Chinese government, a new report from the New York Times explains.

Not only does the Big Tech company store personal data of Chinese users on servers that are managed and serviced by a firm owned by the communist regime, but Apple’s CEO Tim Cook has spent years “making frequent, statesmanlike visits and meeting with top leaders” in the Asian country and caving to its wishes.

The entrance to Apple’s new data center, which the company hoped to complete next month.
Credit…Keith Bradsher/The New York Times

Apple often boasts that it believes “privacy is a fundamental human right,” but the company’s relationship with China seems to discard that “core value” in exchange for doing China’s bidding such as removing certain encryption technology and digital key that the communist regime disagreed with.

“We have never compromised the security of our users or their data in China or anywhere we operate,” the company said.

But in data centers similar to the one being built outside Guiyang, China, experts and Apple engineers warn, “Apple’s compromises have made it nearly impossible for the company to stop the Chinese government from gaining access to the emails, photos, documents, contacts, and locations of millions of Chinese residents” who they aren’t afraid to oppress.

The Chinese government also has a long list of human rights abuses including enslaving the Uyghurs, a minority group located in the Xijiang province, and squashing pro-democracy movements in Hong Kong, but once again, Apple is unbothered. Despite offering a long creed promising a commitment to human rights causes, Apple has repeatedly bowed to the wishes of the communist regime to censor apps and blacklist people that government officials think could pose a danger to Xi Jinping or his rule.

Over the last few years, tens of thousands of apps containing content considered objectionable to the communist government were removed from the Chinese version of the app store. Some of the most notable disappearances were apps for worldwide news outlets, pro-democracy organizations, certain religious institutions and figures such as the Dalai Lama, and even apps that provided encryption or shortcuts to users who wanted more digital privacy and security.

“After Chinese employees complained, it even dropped the ‘Designed by Apple in California’ slogan from the backs of iPhones,” the Times report says, noting the regime’s unwillingness to let Apple’s branding remain “American.”

Cook has repeatedly tried to quiet criticism of Apple’s relationship with China by noting how efficient it makes the company. Not only does Apple’s partnership with the regime allow for access to, housing for, and factories for Chinese workers who “assemble nearly every iPhone, iPad, and Mac” to rake in at least “$55 billion a year from the region, far more than any other American company makes in China,” but it also gives the company an easy global reach.

China’s power over Cook and the company, however, is quite evident. In addition to bending to the regime’s will on censorship and privacy, Apple went out of its way to give data to the Chinese government, despite American laws prohibiting it, by giving legal ownership of user data to Guizhou-Cloud Big Data, a “company owned by the government of Guizhou Province, whose capital is Guiyang.”

“Apple recently required its Chinese customers to accept new iCloud terms and conditions that list GCBD as the service provider and Apple as ‘an additional party,’” the Times says. “Apple told customers the change was to ‘improve iCloud services in China mainland and comply with Chinese regulations.’”

Apple did not respond to The Federalist’s request for comment.

At Least 18 Scientists Demand Lab Leak Investigation on Covid

Primer: Who is Dr. Ralph Baric and what is his role in the Wuhan lab?

UNC-CH ranks as a world leader in COVID-19 research - here ...

This page lists documents in Professor Ralph Baric’s emails, which U.S. Right to Know obtained via a public records request. Dr. Baric is a coronavirus expert at the University of North Carolina, Chapel Hill (UNC). He has developed genetic techniques to enhance the pandemic potential of existing bat coronaviruses in collaboration with Dr. Zhengli Shi at the Wuhan Institute of Virology and with EcoHealth Alliance.

The emails show internal discussions and an early draft of a key scientists’ letter about coronavirus origins, and shed some light on relationships between U.S. and Chinese experts in biodefense and infectious diseases, and the roles of organizations such as EcoHealth Alliance and National Academy of Sciences (NAS).

Please email anything of interest we may have missed to [email protected], so that we can include them below.

Items from Baric emails

  1. Tracy McNamara, Professor of Pathology at Western University of Health Sciences in Pomona, California wrote on March 25, 2020: : “The Federal govt has spent over $1 billion dollars in support of the Global Health Security Agenda to help developing nations create the capacity to detect/report/respond to pandemic threats. An additional $200 million was spent on the PREDICT project via USAID looking for emerging viruses in bats, rats and monkeys overseas. And now the Global Virome Project wants $1.5 billion dollars to run around the world hunting down every virus on the face of the earth. They will probably get funding. But none of these programs have made taxpayers safer right here at home.” (emphasis in the original)
  2. Dr. Jonathan Epstein, Vice President for Science and Outreach at EcoHealth Alliance, sought guidance for a request from the U.S. Defense Advanced Research Projects Agency (DARPA) about communicating “potentially sensitive dual-use information” (March 2018).
  3. EcoHealth Alliance paid Dr. Baric an undisclosed sum as honorarium (January 2018).
  4. Invitation to U.S. National Academy of Sciences, Engineering and Medicine (NASEM) and the Chinese Academy of Agricultural Sciences (CAAS) U.S. China Dialogue and Workshop on the Challenges of Emerging Infections, Laboratory Safety, Global Health Security and Responsible Conduct in the Use of Gene Editing in Viral Infectious Disease Research, Harbin, China, Jan 8-10, 2019 (November 2018-January 2019). Preparatoryemails and a travel memorandum indicate the identities of the American participants.
  5. NAS invitation to a meeting of U.S. and Chinese experts working to counter infectious disease and improve global health (November 2017). The meeting was convened by the NAS and the Galveston National Laboratory. It took place on January 16-18, 2018, in Galveston, Texas. A travel memorandum indicates the identities of the American participants. Subsequent emails show that the WIV’s Dr. Zhengli Shi is present at the meeting.
  6. On February 27, 2020, Baric wrote, “at this moment the most likely origins are bats, and I note that it is a mistake to assume that an intermediate host is needed.”
  7. On March 5, 2020, Baric wrote, “there is absolutely no evidence that this virus is bioengineered.”

For more information

A link to Professor Ralph Baric’s emails can be found here:Baric emails (~83,416 pages)

U.S. Right to Know is posting documents from our Biohazards investigation. See:FOI documents on origins of SARS-CoV-2, hazards of gain-of-function research and biosafety labs.

NR:

For well over a year, a certain clique of researchers tarred the idea that COVID-19 initially escaped from a laboratory in Wuhan as a conspiracy theory. Now, their grip on that narrative within the scientific community is loosening, as a growing chorus of experts calls for a closer look at this lab-leak hypothesis.

In a letter published this afternoon at Science, 18 scientists call for an investigation into the pandemic’s origins that does not discount the possibility of a lab leak. “Theories of accidental release from a lab and zoonotic spillover both remain viable,” they write. “Knowing how COVID-19 emerged is critical for informing global strategies to mitigate the risk of future outbreaks.”

These researchers include Dr. Ralph Baric, a leading coronavirus expert who has done research on bat coronaviruses with Dr. Shi Zhengli of the Wuhan Institute of Virology, and several other prominent virologists. They have joined the WHO director-general, top intelligence officials, and other U.S. government experts in asserting that such a leak remains a possible explanation, despite a joint WHO-China study’s findings that such a theory is “extremely unlikely.” Like the Biden administration and 13 other countries that signed onto a U.S.-led statement after the report’s release, they raise concerns about how the panel reached its findings. Their letter comes as members of Congress have started to ramp up their scrutiny of a potential lab-leak origin. Already, the scientists’ letter has caught the attention of lawmakers involved in COVID investigation efforts, with Representatives Cathy McMorris Rodgers, Brett Guthrie, and Morgan Griffith, saying in a statement, “We look forward to working with them and all who will follow the science in order to complete this investigation.”

Jamie Metzl, an adviser to the WHO and a senior fellow at the Atlantic Council, explained the letter’s significance on Twitter. “The chokehold on public consideration of an accidental lab incident as a possible #pandemic origin has just been broken. Following publication of the Science letter, it will be irresponsible for any scientific journal or news outlet to not fully represent this viable hypothesis.”

The Science letter finds the joint WHO-China report lacking and evaluates the likelihood of the different origin theories that the panel assessed: “Although there were no findings in clear support of either a natural spillover or a lab accident, the team assessed a zoonotic spillover from an intermediate host as ‘likely to very likely, and a laboratory incident as ‘extremely unlikely.’”

The authors of the letters add, “Furthermore, the two theories were not given balanced consideration. Only 4 of the 313 pages of the report and its annexes addressed the possibility of a laboratory accident.”

The letter doesn’t claim that the lab-leak hypothesis is more credible than the zoonotic origin theory. It’s notable, however, that a letter in a major scientific journal is putting these two theories on equal footing.

The Lancet, another journal, rejected a letter submitted by 14 biologists and geneticists in January arguing that “a lab origin cannot be formally discarded.”

Some figures associated with The Lancet have called the lab-leak scenario a conspiracy theory, including Jeffrey Sachs, the chair of the medical journal’s COVID commission, and Peter Daszak, the chair of the commission’s sub-committee on COVID’s origins. Daszak, whose nonprofit research group received hundreds of thousands of dollars from the National Institutes of Health for studies on bat coronaviruses at the Wuhan Institute of Virology, was a member of the joint WHO-China panel and has faced accusations that he failed to disclose potential conflicts of interest.

Richard Ebright, a Rutgers University chemical biology professor, told National Review last month that their efforts helped to create the false impression that there is a scientific consensus against the possibility of a lab-leak origin. “No such consensus existed then. No such consensus exists now,” he said.

This latest entry into the debate, in the pages of a preeminent scientific journal, shows that the ground is shifting away from a hollow narrative that has been all-too pervasive since the start of the pandemic.