In a Poultry Production Setting Courtesy of Food Technology
magazine, from "Defending the Food Supply," August 2005, Vol. 59,
No.8. Food Technology is a publication of the Institute of Food
Technologists, www.ift.org.www.ift.org
Slide 3
Is Our Food Safe From Attack?
Slide 4
The U.S. government has declared the food and agriculture
sector to be one of 17 critical national infrastructures vulnerable
to intentional attack.
Slide 5
Will this Effect Missouri? Missouri ranks 2 nd in the nation
for number of farms. 5 th in the nation for turkeys raised 15 th in
the nation for egg production 16 th in the nation for all
chicken
Slide 6
How is Food Supply a Critical Infrastructure? Most states
produce 30% or less of what its residents eat. Most cities have
only a 5 day food supply. The average persons food travels 1,300
miles from farm to table.
Slide 7
Case Study: Bitter Harvest 1973 Fire retardant (PBB)
accidentally mixed into feed rations for cattle. Over a year later
sickness in animals, and humans is linked to PBBs. Cattle, pigs,
sheep, chickens, and contaminated commodities are destroyed and
buried. 97% of humans living in Michigan during that time have PBBs
in their system.
Slide 8
What Type of Harm Could Occur? Intentional delivery of a
harmful biological or chemical agent to the food supply system
could cause: Physical harm (illness or mortality) Economic
disruption Direct Indirect International Political unrest
Psychological harm loss of confidence in food supply
Slide 9
Case Study: The END Oct. 12 2002 Exotic Newcastle Disease (END)
is confirmed in small backyard flocks in Los Angeles County. 46,000
square miles of southern CA were quarantined By August 2003 the
disease is eradicated. More than 3 million birds were euthanized
Costs to control the outbreak exceeded $160 million.
Slide 10
Laying Hens
Slide 11
Broiler Operation
Slide 12
Turkey Operation
Slide 13
Transportation
Slide 14
-Supply Chain
Slide 15
Food Defense focuses on security, protecting the food supply
from intentional contamination. Courtesy of Food Technology
magazine, from "Defending the Food Supply," August 2005, Vol. 59,
No.8. Food Technology is a publication of the Institute of Food
Technologists, www.ift.org. www.ift.org
Slide 16
Is Food Defense Different than Biosecurity? Food Defense
focuses on protecting the food supply from intentional
contamination. unintentional Biosecurity and Food Safety (HACCP)
focus on protecting the food supply from unintentional
contamination. They help with, but are not a substitute for food
defense.
Slide 17
Who Might Intentionally Contaminate an Animal Production
Facility? Disgruntled employee/former employee Contract or
temporary employee Members of terrorist or extremist groups Truck
driver Affiliate of a competing facility Visitor to facility
Slide 18
Potential Contaminants Biological Agents: Injure by causing
disease, or producing toxin. Chemical Agents: Injure through
toxicity to biological systems, or chemical burns to tissue.
Radiological Agents: Injure externally with radiation burns and
potentially deadly acute radiation sickness. Injure internally by
causing damage to internal organs.
Slide 19
Biological Agents of Concern in a Poultry Production Facility
Foreign Animal Disease (FAD) Exotic Newcastle Disease (END)
Zoonotic Disease High Pathogenicity H5N1 Avian Influenza
Slide 20
Case Study: Take the High-Path 1983 outbreak of High
Pathogenicity Avian Influenza (HPAI H5N2) in PA >17 million
birds were destroyed, 2 years to control Direct cost of $65 million
and a 30% increase in retail egg prices Indirect costs are
estimated at $250 million Outbreak originated in a live bird
market
Slide 21
Chemical Agents Any Chemical not approved for use on the
animals, or in their feed would be considered a contaminant.
Chemical agents used in acts of terrorism against livestock
include: Arsenic Cyanide salt Pesticides
Slide 22
Radiological Agents Livestock can be exposed to radiation via
inhalation, ingestion of contaminated feed, or direct exposure.
Polonium 210 Plutonium Uranium (U-235 or U-238) Iodine 131
(I-131)
Slide 23
What Makes an Attractive Agent of Intentional Contamination?
Long incubation period/delayed effect Highly effective History of
use Available (easily produced in adequate quantity) Low
traceability
Slide 24
Following several major food recalls in the US, consumer
surveys were conducted. Courtesy of Food Technology magazine, from
"Defending the Food Supply," August 2005, Vol. 59, No.8. Food
Technology is a publication of the Institute of Food Technologists,
www.ift.org. www.ift.org
Slide 25
Consumer Confidence in Food Defense Systems After National Food
Recalls Stinson et al., 2008
Slide 26
Who Do Consumers Believe is Responsible for Food Defense?
Stinson et al., 2008
Slide 27
Who do Consumers Believe Should Pay for Food Defense? Stinson
et al., 2008
Slide 28
Products That Consumers Believe Most Likely to be Intentionally
Contaminated Stinson et al., 2008
Slide 29
Defense plans are encouraged but not required for farms and
most food establishments. Courtesy of Food Technology magazine,
from "Defending the Food Supply," August 2005, Vol. 59, No.8. Food
Technology is a publication of the Institute of Food Technologists,
www.ift.org.www.ift.org
Slide 30
Facilities Currently Required to Participate in Food Defense
All vendors providing food for USDA feeding programs must now be in
compliance with the Food Defense System.
Slide 31
Four Steps for Developing a Food Defense Plan Assess the
vulnerabilities Write a plan Evaluate the plan Maintain the
plan
Slide 32
Assess the vulnerabilities Gather a team of key personnel to
make the assessment. Think like someone who wants to harm your
operation. Look for areas where contamination would be spread
through normal operations. Look for sensitive areas that are not
frequently observed.
Slide 33
Poultry Vulnerability Assessment
Slide 34
Countermeasures are actions taken to shield vulnerable areas,
reducing the risk of intentional contamination.
Slide 35
Areas to Consider for Countermeasure Development Procedures
Facility Technology Personnel
Slide 36
Workforce Shipping and Receiving Visitors and Customers
Marketing Countermeasures for Procedures
Slide 37
Light it Lock it Limit Access Countermeasures for Facility
Slide 38
Write the Plan Develop a countermeasure to defend each
vulnerable point identified as high risk. Create a written plan
including those countermeasures that are reasonable for the
situation. Identify the individual who will implement the
countermeasure. Set a timeline to implement the
countermeasure.
Slide 39
Poultry Food Defense Plan
Slide 40
Should such an event occur a timely and efficient response will
be critical to minimizing the damage.
Slide 41
Develop a Written Response Plan Plan for handling of
contaminated animals Emergency Planning Facility Map Emergency
Contact Phone List Visitor Log Supplier/Customer Contacts Employee
Emergency Information
Slide 42
Handling of Contaminated Animals First hold all potentially
contaminated animals Potentially contaminated animals will need to
be quarantined prior to euthanasia. Quarantine will need to be
separate from non contaminated animals. Prepare a plan for carcass
disposal, to be reviewed by APHIS and state authorities in case of
an intentional contamination.
Slide 43
Poultry Containment and Disposal
Slide 44
Facility Map Name, address, and phone of owner/proprietor
Relationship of the facility to adjacent properties and/or
structures. Road access including transportation routes Perimeter
boundaries, include fences, and gates (with dimensions)
Slide 45
Facility Map continued Buildings, outbuildings, doors, windows,
AC/heating, ventilation Utilities (water, gas, electric, phones)
location and shutoff Septic System and drainage areas with
direction of flow Web sites such as Google Earth
www.earth.google.com
Slide 46
Poultry Emergency Phone List
Slide 47
Poultry Suppliers Contact List
Slide 48
Poultry Employee Emergency Contact List
Slide 49
Evaluate the plan Check the perimeter regularly. Make
unannounced entrances at various times. Check locks in vulnerable
areas. Perform a mock quarantine.
Slide 50
Maintain the plan Ensure that measures implemented continue to
be effective. Train the family/employees regarding their effort in:
Prevention Detection Response Re-evaluate the plan annually or as
operations or facilities change.