1 / 35

Food Defense

Food Defense. In a Swine Production Setting. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8.  Food Technology is a publication of the Institute of Food Technologists, www.ift.org. Is Our Food Safe From Attack?. Will this Effect Missouri?.

viola
Download Presentation

Food Defense

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Food Defense In a Swine Production Setting Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8.  Food Technology is a publication of the Institute of Food Technologists, www.ift.org.

  2. Is Our Food Safe From Attack?

  3. Will this Effect Missouri? • Missouri ranks 2nd in the nation for number of farms. • 7th in the nation for hogs and pigs

  4. “Show Me the Money” • Missouri farms rank 15th nationally for cash receipts. • Missouri farms have estimated cash receipts of 5.82 billion dollars per year.

  5. Case Study: Bitter Harvest • 1973 Fire retardant (PBB) accidentally mixed into feed rations for cattle. • Over a year later sickness in animals, and humans is linked to PBBs. • Cattle, pigs, sheep, chickens, and contaminated commodities are destroyed and buried. • 97% of humans living in Michigan during that time have PBBs in their system.

  6. What Type of Harm Could Occur? Intentional delivery of a harmful biological or chemical agent to the food supply system could cause: • Physical harm (illness or mortality) • Economic disruption • Direct • Indirect • International • Political unrest • Psychological harm – loss of confidence in food supply

  7. Case Study: Melamine • Contaminated Wheat Gluten→ pet food . • Cats and dogs fall ill and some die. • Massive recall of pet food • Contamination was intentional. • Waste pet food fed to hogs in 7 states • 56,000 hogs quarantined

  8. Vulnerable Areas in The Farm to Fork Food Supply Chain • Farm • Boar Semen • Supply Chain • Feed Mill • Transportation • Buying Station

  9. What is Food Defense? Food Defense focuses on security, protecting the food supply from intentional contamination. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8.  Food Technology is a publication of the Institute of Food Technologists, www.ift.org.

  10. Is Food Defense Different than Biosecurity? • Food Defense focuses on protecting the food supply fromintentional contamination. • Biosecurity and Food Safety (HACCP) focus on protecting the food supply from unintentional contamination. They help with, but are not a substitute for food defense.

  11. Who Might Intentionally Contaminate an Animal Production Facility? • Disgruntled employee/former employee • Contract or temporary employee • Members of terrorist or extremist groups • Truck driver • Affiliate of a competing facility • Visitor to facility

  12. Biological Agents: Injure by causing disease, or producing toxin. Chemical Agents: Injure through toxicity to biological systems, or chemical burns to tissue. Radiological Agents: Injure externally with radiation burns and potentially deadly acute radiation sickness. Injure internally by causing damage to internal organs. Potential Contaminants

  13. Case Study: This Little Piggy • 1998, Malaysia cases of pigs dying were not immediately recognized as outbreak • Oct. 1998 Pig farm workers suffer possible encephalitis epidemic(265 cases, 105 deaths) • Identified as new virus now called Nipah • Over a million pigs from nearly 1,000 farms were destroyed. • Pig production is reduced from 2.4 million to 1.32 million, and farms from 1885 to 829.

  14. What Makes an Attractive Agent of Intentional Contamination? • Long incubation period/delayed effect • Highly effective • History of use • Available (easily produced in adequate quantity) • Low traceability

  15. Food Defense Plan Defense plans are encouraged but not required for farms and most food establishments. Courtesy of Food Technology magazine, from "Defending the Food Supply," August 2005, Vol. 59, No.8.  Food Technology is a publication of the Institute of Food Technologists, www.ift.org.

  16. Facilities Currently Required to Participate in Food Defense All vendors providing food for USDA feeding programs must now be in compliance with the Food Defense System.

  17. Four Steps for Developing a Food Defense Plan • Assess the vulnerabilities • Write a plan • Evaluatethe plan • Maintain the plan

  18. Assessthe vulnerabilities

  19. Countermeasures Countermeasures are actions taken to shield vulnerable areas, reducing the risk of intentional contamination.

  20. Areas to Consider for Countermeasure Development • Procedures • Facility • Technology • Personnel

  21. Countermeasures for Procedures • Workforce • Shipping and Receiving • Visitors and Customers • Marketing

  22. Countermeasures for Facility • Light it • Lock it • Limit Access

  23. Writethe Plan

  24. What if the Food Supply is Intentionally Contaminated? Should such an event occur a timely and efficient response will be critical to minimizing the damage.

  25. Develop a Written Response Plan • Plan for handling of contaminated animals • Emergency Planning • Facility Map • Emergency Contact Phone List • Visitor Log • Supplier/Customer Contacts • Employee Emergency Information

  26. Handling of Contaminated Animals • First hold all potentially contaminated animals • Potentially contaminated animals will need to be quarantined prior to euthanasia. • Quarantine will need to be separate from non contaminated animals. • Prepare a plan for carcass disposal, to be reviewed by APHIS and state authorities in case of an intentional contamination.

  27. Swine Operation Containment and Disposal Plan

  28. Facility Map • Name, address, and phone of owner/proprietor • Relationship of the facility to adjacent properties and/or structures. • Road access including transportation routes • Perimeter boundaries, include fences, and gates (with dimensions)

  29. Facility Map continued • Buildings, outbuildings, doors, windows, AC/heating, ventilation • Utilities (water, gas, electric, phones) location and shutoff • Septic System and drainage areas with direction of flow • Web sites such as Google Earth www.earth.google.com

  30. Water access AC

  31. Swine Operation Emergency Phone List

  32. Swine Operation Employee Emergency Contacts

  33. Evaluatethe plan • Check the perimeter regularly. • Make unannounced entrances at various times. • Check locks in vulnerable areas. • Perform a mock quarantine.

  34. Maintainthe plan • Ensure that measures implemented continue to be effective. • Train the family/employees regarding their effort in: • Prevention • Detection • Response • Re-evaluate the plan annually or as operations or facilities change.

  35. References • www.aphis.gov • www.animalagriculture.org • www.porkscience.org

More Related