National Academies Press: OpenBook
« Previous: BACKGROUND
Suggested Citation:"WORK PLAN." National Research Council. 2003. Assuring the Safety of the Pentagon Mail: Letter Report. Washington, DC: The National Academies Press. doi: 10.17226/10901.
Page 2

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

2 Initially, the inspection and mitigation procedures implemented for anthrax were applied to mail that had been quarantined while the procedures were being established. The USPS implemented special procedures for mail coming to federal departments in Washington, DC. The Department of Defense installed additional security procedures in the Pentagon to protect against such attacks. Other Federal agencies took similar actions. After weeks of continuous operations that eliminated the backlog of quarantined mail, the procedures were modified to accommodate the daily input of mail. Those extraordinary procedures add 7–9 days delay to normal mail delivery times for USPS mail coming into the Pentagon Building. In a move to reduce the amount of mail that must be handled by those special procedures in the aftermath of the anthrax attacks in 2001, DOD asked their employees to redirect all personal mail received at work to their home addresses. While that has significantly reduced the mail coming to workers in the Pentagon facility it has not eliminated Class A mailings that may include announcement and advertising mailings related to the professional activities of the recipients. After almost two years of those special operations, the Defense Post Office (DPO) asked for a National Research Council review of its mail-handling system. The review was prompted by the approach of renewals of contracts for some of the services involved in the operations and by the need for an overall threat and risk assessment of the procedures. THE COMMITTEE The committee constituted by the Research Council for this study involved experts in high-energy physics, chemistry, biology, public health, medicine, and risk assessment. The committee members and their affiliations are listed at the end of this letter, along with more detailed biographic information in Appendix A to this letter. All committee members received security clearances so that they would have access to all information necessary for an informed assessment. The statement of task agreement between the DPO and the National Academies is in Appendix B. Because of impending deadlines for contract renewals and the continued urgency surrounding the threat of bioterrorism, this study was conducted on a short timeline with a letter report requested within 2 months of the committee's first meeting. WORK PLAN The committee had two 2 1/2 day meetings. The meetings were structured in accordance with guidelines that the Academies has established for open information-gathering meetings and for meetings that review sensitive or classified information not open to the public. Section 15 of the Federal Advisory Committee Act (PL 92–463, 5 USC App1) generally requires the Academies to conduct information-gathering meetings in public, but exceptions can be made if presentations by agency officials to the Academies would disclose matter described in 5 USC 552(b). During the information-gathering process, the committee heard from representatives of the Pentagon administrative services and their contractors, of the USPS and their contractors, of the Office of Science and Technology Policy, of Lawrence Livermore National Laboratory, of Carnegie Mellon University, of Edgewood Chemical Biological Center, of the US

Assuring the Safety of the Pentagon Mail: Letter Report Get This Book
MyNAP members save 10% online.
Login or Register to save!
  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook,'s online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!