in a poultry production setting courtesy of food technology magazine, from "defending the food...

Download In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is

If you can't read please download the document

Post on 19-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Slide 2
  • In a Poultry Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists, www.ift.org.www.ift.org
  • Slide 3
  • Is Our Food Safe From Attack?
  • Slide 4
  • The U.S. government has declared the food and agriculture sector to be one of 17 critical national infrastructures vulnerable to intentional attack.
  • Slide 5
  • Will this Effect Missouri? Missouri ranks 2 nd in the nation for number of farms. 5 th in the nation for turkeys raised 15 th in the nation for egg production 16 th in the nation for all chicken
  • Slide 6
  • How is Food Supply a Critical Infrastructure? Most states produce 30% or less of what its residents eat. Most cities have only a 5 day food supply. The average persons food travels 1,300 miles from farm to table.
  • Slide 7
  • Case Study: Bitter Harvest 1973 Fire retardant (PBB) accidentally mixed into feed rations for cattle. Over a year later sickness in animals, and humans is linked to PBBs. Cattle, pigs, sheep, chickens, and contaminated commodities are destroyed and buried. 97% of humans living in Michigan during that time have PBBs in their system.
  • Slide 8
  • What Type of Harm Could Occur? Intentional delivery of a harmful biological or chemical agent to the food supply system could cause: Physical harm (illness or mortality) Economic disruption Direct Indirect International Political unrest Psychological harm loss of confidence in food supply
  • Slide 9
  • Case Study: The END Oct. 12 2002 Exotic Newcastle Disease (END) is confirmed in small backyard flocks in Los Angeles County. 46,000 square miles of southern CA were quarantined By August 2003 the disease is eradicated. More than 3 million birds were euthanized Costs to control the outbreak exceeded $160 million.
  • Slide 10
  • Laying Hens
  • Slide 11
  • Broiler Operation
  • Slide 12
  • Turkey Operation
  • Slide 13
  • Transportation
  • Slide 14
  • -Supply Chain
  • Slide 15
  • Food Defense focuses on security, protecting the food supply from intentional contamination. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists, www.ift.org. www.ift.org
  • Slide 16
  • Is Food Defense Different than Biosecurity? Food Defense focuses on protecting the food supply from intentional contamination. unintentional Biosecurity and Food Safety (HACCP) focus on protecting the food supply from unintentional contamination. They help with, but are not a substitute for food defense.
  • Slide 17
  • Who Might Intentionally Contaminate an Animal Production Facility? Disgruntled employee/former employee Contract or temporary employee Members of terrorist or extremist groups Truck driver Affiliate of a competing facility Visitor to facility
  • Slide 18
  • Potential Contaminants Biological Agents: Injure by causing disease, or producing toxin. Chemical Agents: Injure through toxicity to biological systems, or chemical burns to tissue. Radiological Agents: Injure externally with radiation burns and potentially deadly acute radiation sickness. Injure internally by causing damage to internal organs.
  • Slide 19
  • Biological Agents of Concern in a Poultry Production Facility Foreign Animal Disease (FAD) Exotic Newcastle Disease (END) Zoonotic Disease High Pathogenicity H5N1 Avian Influenza
  • Slide 20
  • Case Study: Take the High-Path 1983 outbreak of High Pathogenicity Avian Influenza (HPAI H5N2) in PA >17 million birds were destroyed, 2 years to control Direct cost of $65 million and a 30% increase in retail egg prices Indirect costs are estimated at $250 million Outbreak originated in a live bird market
  • Slide 21
  • Chemical Agents Any Chemical not approved for use on the animals, or in their feed would be considered a contaminant. Chemical agents used in acts of terrorism against livestock include: Arsenic Cyanide salt Pesticides
  • Slide 22
  • Radiological Agents Livestock can be exposed to radiation via inhalation, ingestion of contaminated feed, or direct exposure. Polonium 210 Plutonium Uranium (U-235 or U-238) Iodine 131 (I-131)
  • Slide 23
  • What Makes an Attractive Agent of Intentional Contamination? Long incubation period/delayed effect Highly effective History of use Available (easily produced in adequate quantity) Low traceability
  • Slide 24
  • Following several major food recalls in the US, consumer surveys were conducted. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists, www.ift.org. www.ift.org
  • Slide 25
  • Consumer Confidence in Food Defense Systems After National Food Recalls Stinson et al., 2008
  • Slide 26
  • Who Do Consumers Believe is Responsible for Food Defense? Stinson et al., 2008
  • Slide 27
  • Who do Consumers Believe Should Pay for Food Defense? Stinson et al., 2008
  • Slide 28
  • Products That Consumers Believe Most Likely to be Intentionally Contaminated Stinson et al., 2008
  • Slide 29
  • Defense plans are encouraged but not required for farms and most food establishments. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food Technology is a publication of the Institute of Food Technologists, www.ift.org.www.ift.org
  • Slide 30
  • Facilities Currently Required to Participate in Food Defense All vendors providing food for USDA feeding programs must now be in compliance with the Food Defense System.
  • Slide 31
  • Four Steps for Developing a Food Defense Plan Assess the vulnerabilities Write a plan Evaluate the plan Maintain the plan
  • Slide 32
  • Assess the vulnerabilities Gather a team of key personnel to make the assessment. Think like someone who wants to harm your operation. Look for areas where contamination would be spread through normal operations. Look for sensitive areas that are not frequently observed.
  • Slide 33
  • Poultry Vulnerability Assessment
  • Slide 34
  • Countermeasures are actions taken to shield vulnerable areas, reducing the risk of intentional contamination.
  • Slide 35
  • Areas to Consider for Countermeasure Development Procedures Facility Technology Personnel
  • Slide 36
  • Workforce Shipping and Receiving Visitors and Customers Marketing Countermeasures for Procedures
  • Slide 37
  • Light it Lock it Limit Access Countermeasures for Facility
  • Slide 38
  • Write the Plan Develop a countermeasure to defend each vulnerable point identified as high risk. Create a written plan including those countermeasures that are reasonable for the situation. Identify the individual who will implement the countermeasure. Set a timeline to implement the countermeasure.
  • Slide 39
  • Poultry Food Defense Plan
  • Slide 40
  • Should such an event occur a timely and efficient response will be critical to minimizing the damage.
  • Slide 41
  • Develop a Written Response Plan Plan for handling of contaminated animals Emergency Planning Facility Map Emergency Contact Phone List Visitor Log Supplier/Customer Contacts Employee Emergency Information
  • Slide 42
  • Handling of Contaminated Animals First hold all potentially contaminated animals Potentially contaminated animals will need to be quarantined prior to euthanasia. Quarantine will need to be separate from non contaminated animals. Prepare a plan for carcass disposal, to be reviewed by APHIS and state authorities in case of an intentional contamination.
  • Slide 43
  • Poultry Containment and Disposal
  • Slide 44
  • Facility Map Name, address, and phone of owner/proprietor Relationship of the facility to adjacent properties and/or structures. Road access including transportation routes Perimeter boundaries, include fences, and gates (with dimensions)
  • Slide 45
  • Facility Map continued Buildings, outbuildings, doors, windows, AC/heating, ventilation Utilities (water, gas, electric, phones) location and shutoff Septic System and drainage areas with direction of flow Web sites such as Google Earth www.earth.google.com
  • Slide 46
  • Poultry Emergency Phone List
  • Slide 47
  • Poultry Suppliers Contact List
  • Slide 48
  • Poultry Employee Emergency Contact List
  • Slide 49
  • Evaluate the plan Check the perimeter regularly. Make unannounced entrances at various times. Check locks in vulnerable areas. Perform a mock quarantine.
  • Slide 50
  • Maintain the plan Ensure that measures implemented continue to be effective. Train the family/employees regarding their effort in: Prevention Detection Response Re-evaluate the plan annually or as operations or facilities change.
  • Slide 51
  • References www.aphis.gov www.fsis.gov www.bt.cdc.gov www.dhs.gov