In a Poultry Production Setting Food Technology

advertisement
In a Poultry
Production Setting
Courtesy of Food Technology magazine, from "Defending the Food
Supply," August 2005, Vol. 59, No.8. Food Technology is a publication
of the Institute of Food Technologists, www.ift.org.
Is Our Food Safe From Attack?
The U.S. government has declared
the food and agriculture sector to
be one of 17 critical national
infrastructures vulnerable to
intentional attack.
Will this Effect Missouri?
Missouri ranks 2nd in the
nation for number of farms.
5th in the nation for
turkeys raised
15th in the nation for egg
production
16th in the nation for all
chicken
How is Food Supply a Critical
Infrastructure?
Most states produce 30% or less of
what it’s residents eat.
Most cities have only a 5 day food
supply.
The average person’s food travels 1,300
miles from farm to table.
Case Study: Bitter Harvest
1973 Fire retardant (PBB) accidentally mixed
into feed rations for cattle.
Over a year later sickness in animals, and
humans is linked to PBBs.
Cattle, pigs, sheep, chickens, and
contaminated commodities are destroyed
and buried.
97% of humans living in
Michigan during that time
have PBBs in their system.
What Type of Harm Could Occur?
Intentional delivery of a harmful biological
or chemical agent to the food supply
system could cause:
Physical harm (illness or mortality)
Economic disruption
 Direct
 Indirect
 International
Political unrest
Psychological harm – loss of
confidence in food supply
Case Study: The END
Oct. 12 2002 Exotic Newcastle Disease
(END) is confirmed in small backyard
flocks in Los Angeles County.
46,000 square miles of southern CA were
quarantined
By August 2003 the disease is eradicated.
More than 3 million birds were
euthanized
Costs to control the outbreak exceeded
$160 million.
Laying Hens
Broiler Operation
Turkey Operation
Transportation
-Supply Chain
Food Defense focuses
on security, protecting
the food supply from
intentional
contamination.
Courtesy of Food Technology magazine, from "Defending the
Food Supply," August 2005, Vol. 59, No.8. Food Technology
is a publication of the Institute of Food Technologists,
www.ift.org.
Is Food Defense Different than
Biosecurity?
Food Defense focuses on
protecting the food supply from
intentional contamination.
Biosecurity and Food Safety
(HACCP) focus on protecting the
food supply from unintentional
contamination. They help with, but
are not a substitute for food defense.
Who Might Intentionally Contaminate an
Animal Production Facility?
Disgruntled employee/former
employee
Contract or temporary employee
Members of terrorist or extremist
groups
Truck driver
Affiliate of a competing facility
Visitor to facility
Potential Contaminants
Biological Agents: Injure by causing
disease, or producing toxin.
Chemical Agents: Injure through
toxicity to biological systems, or chemical
burns to tissue.
Radiological Agents: Injure externally
with radiation burns and potentially
deadly acute radiation sickness. Injure
internally by causing damage to internal
organs.
Biological Agents of Concern
in a Poultry Production Facility
Foreign Animal Disease (FAD)
Exotic Newcastle Disease (END)
Zoonotic Disease
High Pathogenicity H5N1 Avian
Influenza
Case Study: Take the High-Path
 1983 outbreak of High Pathogenicity Avian
Influenza (HPAI H5N2) in PA
 >17 million birds were destroyed, 2 years to
control
 Direct cost of $65 million
and a 30% increase in
retail egg prices
 Indirect costs are estimated at $250 million
 Outbreak originated in a live bird market
Chemical Agents
Any Chemical not approved for use on
the animals, or in their feed would be
considered a contaminant.
Chemical agents used in acts of
terrorism against livestock include:
Arsenic
Cyanide salt
Pesticides
Radiological Agents
Livestock can be exposed to
radiation via inhalation,
ingestion of contaminated feed,
or direct exposure.
Polonium 210
Plutonium
Uranium (U-235 or U-238)
Iodine 131 (I-131)
What Makes an Attractive Agent of
Intentional Contamination?
Long incubation
period/delayed effect
Highly effective
History of use
Available (easily produced
in adequate quantity)
Low traceability
Following several
major food recalls in
the US, consumer
surveys were
conducted.
Courtesy of Food Technology magazine, from "Defending the
Food Supply," August 2005, Vol. 59, No.8. Food Technology
is a publication of the Institute of Food Technologists,
www.ift.org.
Consumer Confidence in Food Defense
Systems After National Food Recalls
Stinson et al., 2008
Who Do Consumers Believe is
Responsible for Food Defense?
Government
31%
Farmers 12%
Manufacturers
and Processors
27%
Consumers 11%
Retailers 10%
Transporters
and
Distrubuters
9%
Stinson et al., 2008
Who do Consumers Believe
Should Pay for Food Defense?
Government
30%
Consumers 8%
Farmers 15%
Manufacturers
and Processors
22%
Retailers 12%
Transporters
and
Distrubuters
13%
Stinson et al., 2008
Products That Consumers Believe Most
Likely to be Intentionally Contaminated
June 2007
60
50
40
30
20
10
0
Produce
Dairy
Meat
Seafood
Baked
Canned
Boxed
Stinson et al., 2008
Defense plans are
encouraged but not
required for farms and
most food
establishments.
Courtesy of Food Technology magazine, from "Defending the Food
Supply," August 2005, Vol. 59, No.8. Food Technology is a publication
of the Institute of Food Technologists, www.ift.org.
Facilities Currently Required to
Participate in Food Defense
All vendors providing food for USDA feeding
programs must now be in compliance with
the Food Defense System.
Four Steps for Developing a
Food Defense Plan
Assess the vulnerabilities
Write a plan
Evaluate the plan
Maintain the plan
Assess the vulnerabilities
Gather a team of key personnel to make the
assessment.
Think like someone who wants to harm your
operation.
Look for areas where contamination would be
spread through normal operations.
Look for sensitive areas that are not frequently
observed.
Poultry Vulnerability Assessment
Countermeasures are actions taken to
shield vulnerable areas, reducing the
risk of intentional contamination.
Areas to Consider for
Countermeasure Development
 Procedures
 Facility
 Technology
 Personnel
Countermeasures for
Procedures
Workforce
Shipping and Receiving
Visitors and Customers
Marketing
Countermeasures for Facility
Light it
Lock it
Limit Access
Write the Plan
Develop a countermeasure to defend each
vulnerable point identified as high risk.
Create a written plan including those
countermeasures that are reasonable for the
situation.
Identify the individual who will implement
the countermeasure.
Set a timeline to implement the
countermeasure.
Poultry Food Defense Plan
Should such an event occur a timely and
efficient response will be critical to
minimizing the damage.
Develop a Written Response Plan
Plan for handling of contaminated
animals
Emergency Planning
Facility Map
Emergency Contact Phone List
Visitor Log
Supplier/Customer Contacts
Employee Emergency Information
Handling of Contaminated Animals
First hold all potentially contaminated
animals
Potentially contaminated animals will need
to be quarantined prior to euthanasia.
Quarantine will need to be separate from
non contaminated animals.
Prepare a plan for carcass disposal, to be
reviewed by APHIS and state authorities in
case of an intentional contamination.
Poultry Containment and Disposal
Facility Map
Name, address, and phone of
owner/proprietor
Relationship of the facility to adjacent
properties and/or structures.
Road access including transportation
routes
Perimeter boundaries, include fences,
and gates (with dimensions)
Facility Map continued
Buildings, outbuildings, doors, windows,
AC/heating, ventilation
Utilities (water, gas, electric, phones)
location and shutoff
Septic System and drainage areas with
direction of flow
Web sites such as Google Earth
www.earth.google.com
Poultry Emergency Phone List
Poultry Suppliers Contact List
Poultry Employee Emergency
Contact List
Evaluate the plan
 Check
the perimeter
regularly.
 Make unannounced
entrances at various times.
 Check locks in vulnerable
areas.
 Perform a mock quarantine.
Maintain the plan
Ensure that measures implemented
continue to be effective.
Train the family/employees regarding their
effort in:
Prevention
Detection
Response
Re-evaluate the plan annually or as
operations or facilities change.
References
www.aphis.gov
www.fsis.gov
www.bt.cdc.gov
www.dhs.gov
Download