FBI Launched Inquiry Into NIH Funding Of Wuhan Lab, Emails Show
Authored by Eva Fu via The Epoch Times (emphasis ours),
The Federal Bureau of Investigation (FBI) launched an inquiry into the National Institutes of Health (NIH) funding of bat research in the Wuhan Institute of Virology, newly released emails show.
The interest from the top U.S. intelligence agency adds to the international scrutiny on the Wuhan facility, which houses one of China’s highest-level biosecurity labs that has been considered a possible source of the COVID-19 pandemic.
“In preparation for our call on Tuesday, Erik [Stemmy] (cc’d) has provided responses to your initial questions below (also attached),” wrote Ashley Sanders, an investigation officer at the NIH’s division of program integriy, in an email (pdf) dated May 22, 2020 with the subject “Grant Questions – FBI Inquiry,” and directed to FBI agent David Miller.
The email was obtained by government transparency watchdog Judicial Watch through a Freedom of Information Act lawsuit, which asked for records of communications, contracts, and agreements with the Wuhan Institute of Virology (WIV).
The scope of the inquiry is unclear because the rest of the email correspondence, five pages in total, are entirely redacted. But the name of the email attachment “SF 424 AI110964-06 (received date 11/05/2018),” corresponds to the NIH grant “Understanding the Risk of Bat Coronavirus Emergence.”
The project in question is headed by Peter Daszak of EcoHealth Alliance, which then funnels money to the lab in Wuhan. From 2014 to 2019, the New York nonprofit received six yearly grants totaling $3,748,715 from the National Institute of Allergy and Infectious Diseases under the NIH to fund the project, which was expected to end in 2026.
The FBI inquiry had focused on at least two of the grants, in 2014 and 2019 respectively, the email subject line suggests.
The 2014 grant aimed to “understand what factors increase the risk of the next CoV emerging in people by studying CoV diversity in a critical zoonotic reservoir (bats), at sites of high risk for emergence (wildlife markets) in an emerging disease hotspot (China),” according to the project description. Specifically, the researchers would assess the coronavirus spillover potential, develop predictive models of bat coronavirus emergence risk, and use virus infection experiments as well as “reverse genetics” to test the virus’s transmission between species.
In the project summary for the 2019 grant, EcoHealth stated that they had found that “bats in southern China harbor an extraordinary diversity of SARSr-CoVs,” and some of those viruses can “infect humanized mouse models causing SARS-like illness, and evade available therapies or vaccines.”
Recently disclosed documents show that, under one grant, the WIV had conducted an experiment that resulted in a more potent version of a bat coronavirus.
Read more here…
- Mapping The Migration Of The World’s Millionaires In 2023 September 22, 2023
- Swiss Parliament Approves Burqa Ban, Imposes Steep Fine September 22, 2023
- India Suspends Visas For Canadians, Denounces Terrorist “Safe Haven” September 22, 2023
- Seattle Reverses Course, Makes Public Drug Use Arrestable Crime September 21, 2023
- US Wants Saudi Defense Pact Modeled After South Korea, Japan Deals September 21, 2023
- America’s First ‘Shroom Clinic’ Opens In Oregon September 21, 2023
- On The Idiotic Notion That It’s Brave To Support Nuclear Brinkmanship In Ukraine September 21, 2023
- Eric Clapton Helps RFK Jr. Raise $2.2 Million At Los Angeles Fundraiser September 21, 2023
- Olive Garden Owner Warns: “Decline In Fine Dining” As Wealthy Americans Trade Down To Cheap Booze September 21, 2023
- Musk’s SpaceX Countersues DOJ, Says Case Over Refusal To Hire Refugees Is Unconstitutional September 21, 2023
- “Large Number Of Issues Settled”: Strikes At Australian LNG Plants Might End As Early As Friday September 21, 2023
- Bitcoin Vs Ethereum: A Culture War Rooted In First Principles September 21, 2023
- Hollywood Writers Strike Could Be Over As Soon As Today September 21, 2023
- BOE Surprises Markets By Keeping Rates Unchanged For The First Time In Two Years September 21, 2023
- This Is The Worst Global Food Crisis In Modern History, And It Is About To Go To An Entirely New Level September 21, 2023
- Rebooted Clinton Global Initiative Licks Chops Over Ukraine ‘Humanitarian’ Aid September 21, 2023
- Negotiations Break Down Between Chevron And Australian LNG Workers September 21, 2023
- Backfire: World’s Fourth Largest Iron Ore Producer Stops Purchasing Carbon Offsets September 21, 2023
- Syria On The Verge Of Collapse? September 21, 2023
- Escobar: Russia, North Korea Stage ‘Strategic Coup’ Against Western Hegemony September 20, 2023
- ApexSMS - 23,246,481 breached accounts September 21, 2023In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and […]
- dBforums - 363,468 breached accounts September 20, 2023In July 2016, a data breach of the now defunct database forum "dBforums" appeared for sale alongside several others hacked from the parent company, Penton. The breach of the vBulletin based forum contained 363k unique email addresses alongside usernames, IP addresses, dates of birth and salted MD5 password hashes.
- MalindoAir - 4,328,232 breached accounts September 14, 2023In early 2019, the Malaysian airline Malindo Air suffered a data breach that exposed tens of millions of customer records. Containing 4.3M unique email addresses, the breach also exposed extensive personal information including names, dates of birth, genders, physical addresses, phone numbers and passport details. The data was later extensively shared on popular hacking forums.
- Viva Air - 932,232 breached accounts September 11, 2023In March 2022, the now defunct Columbian airline Viva Air suffered a data breach and subsequent ransomware attack. Among a trove of other ransomed data, the incident exposed a log of 2.6M transactions with 932k unique email addresses, physical and IP addresses, names, phone numbers and partial credit card data (last 4 digits).
- Dymocks - 836,120 breached accounts September 8, 2023In September 2023, the Australian book retailer Dymocks announced a data breach. The data dated back to June 2023 and contained 1.2M records with 836k unique email addresses. The breach also exposed names, dates of birth, genders, phone numbers and physical addresses.
- Phished Data via CERT Poland - 67,943 breached accounts August 31, 2023In August 2023, CERT Poland observed a phishing campaign that collected credentials from 68k victims. The campaign collected email addresses and passwords via a phishing email masquerading as a purchase order confirmation. CERT Poland identified a further 202 other phishing campaigns operating on the same C2 server, which has now been dismantled.
- Pampling - 383,468 breached accounts August 31, 2023In January 2020, the online clothing retailer Pampling suffered a data breach that exposed 383k unique customer email addresses. The data was later shared on a popular hacking forum and also included names, usernames and unsalted MD5 password hashes.
- PlayCyberGames - 3,681,753 breached accounts August 31, 2023In August 2023, PlayCyberGames which "allows users to play any games with LAN function or games using IP address" suffered a data breach which exposed 3.7M customer records. The data included email addresses, usernames and MD5 password hashes with a constant value in the "salt" field. PlayCyberGames did not respond to multiple attempts to disclose […]
- SevenRooms - 1,205,385 breached accounts August 24, 2023In December 2022, over 400GB of data belonging to restaurant customer management platform SevenRooms was posted for sale to a popular hacking forum. The data included 1.2M unique email addresses alongside names and purchases. SevenRooms advised that the breach was due to unauthorised access of "a file transfer interface of a third-party vendor".
- Duolingo - 2,676,696 breached accounts August 23, 2023In August 2023, 2.6M records of data scraped from Duolingo were broadly distributed on a popular hacking forum. Obtained by enumerating a vulnerable API, the data had earlier appeared for sale in January 2023 and contained email addresses, names, the languages being learned, XP (experience points), and other data related to learning progress on Duolingo. […]