In a Poultry Production Setting Food Technology

advertisement
In a Poultry
Production Setting
Courtesy of Food Technology magazine, from "Defending the Food
Supply," August 2005, Vol. 59, No.8. Food Technology is a publication
of the Institute of Food Technologists, www.ift.org.
Is Our Food Safe From Attack?
Will this Effect Missouri?
Missouri ranks 2nd in the
nation for number of farms.
5th in the nation for
turkeys raised
15th in the nation for egg
production
16th in the nation for all
chicken
How is Food Supply a Critical
Infrastructure?
Most states produce 30% or less of
what it’s residents eat.
Most cities have only a 5 day food
supply.
The average person’s food travels 1,300
miles from farm to table.
Case Study: Bitter Harvest
1973 Fire retardant (PBB) accidentally mixed
into feed rations for cattle.
Over a year later sickness in animals, and
humans is linked to PBBs.
Cattle, pigs, sheep, chickens, and
contaminated commodities are destroyed
and buried.
97% of humans living in
Michigan during that time
have PBBs in their system.
What Type of Harm Could Occur?
Intentional delivery of a harmful biological
or chemical agent to the food supply
system could cause:
Physical harm (illness or mortality)
Economic disruption
 Direct
 Indirect
 International
Political unrest
Psychological harm – loss of
confidence in food supply
Case Study: The END
Oct. 12 2002 Exotic Newcastle Disease
(END) is confirmed in small backyard
flocks in Los Angeles County.
46,000 square miles of southern CA were
quarantined
By August 2003 the disease is eradicated.
More than 3 million birds were
euthanized
Costs to control the outbreak exceeded
$160 million.
Vulnerable Areas in The Farm to
Fork Food Supply Chain
Farm
Supply Chain
Feed Mill
Transportation
Food Defense focuses
on security, protecting
the food supply from
intentional
contamination.
Courtesy of Food Technology magazine, from "Defending the
Food Supply," August 2005, Vol. 59, No.8. Food Technology
is a publication of the Institute of Food Technologists,
www.ift.org.
Is Food Defense Different than
Biosecurity?
Food Defense focuses on
protecting the food supply from
intentional contamination.
Biosecurity and Food Safety
(HACCP) focus on protecting the
food supply from unintentional
contamination. They help with, but
are not a substitute for food defense.
Who Might Intentionally Contaminate an
Animal Production Facility?
Disgruntled employee/former
employee
Contract or temporary employee
Members of terrorist or extremist
groups
Truck driver
Affiliate of a competing facility
Visitor to facility
Potential Contaminants
Biological Agents: Injure by causing
disease, or producing toxin.
Chemical Agents: Injure through
toxicity to biological systems, or chemical
burns to tissue.
Radiological Agents: Injure externally
with radiation burns and potentially
deadly acute radiation sickness. Injure
internally by causing damage to internal
organs.
Case Study: Take the High-Path
 1983 outbreak of High Pathogenicity Avian
Influenza (HPAI H5N2) in PA
 >17 million birds were destroyed, 2 years to
control
 Direct cost of $65 million
and a 30% increase in
retail egg prices
 Indirect costs are estimated at $250 million
 Outbreak originated in a live bird market
What Makes an Attractive Agent of
Intentional Contamination?
Long incubation
period/delayed effect
Highly effective
History of use
Available (easily produced
in adequate quantity)
Low traceability
Defense plans are
encouraged but not
required for farms and
most food
establishments.
Courtesy of Food Technology magazine, from "Defending the Food
Supply," August 2005, Vol. 59, No.8. Food Technology is a publication
of the Institute of Food Technologists, www.ift.org.
Facilities Currently Required to
Participate in Food Defense
All vendors providing food for USDA feeding
programs must now be in compliance with
the Food Defense System.
Four Steps for Developing a
Food Defense Plan
Assess the vulnerabilities
Write a plan
Evaluate the plan
Maintain the plan
Assess the vulnerabilities
Countermeasures are actions taken to
shield vulnerable areas, reducing the
risk of intentional contamination.
Areas to Consider for
Countermeasure Development
 Procedures
 Facility
 Technology
 Personnel
Countermeasures for
Procedures
Workforce
Shipping and Receiving
Visitors and Customers
Marketing
Countermeasures for Facility
Light it
Lock it
Limit Access
Write the Plan
Should such an event occur a timely and
efficient response will be critical to
minimizing the damage.
Develop a Written Response Plan
Plan for handling of contaminated
animals
Emergency Planning
Facility Map
Emergency Contact Phone List
Visitor Log
Supplier/Customer Contacts
Employee Emergency Information
Handling of Contaminated Animals
First hold all potentially contaminated
animals
Potentially contaminated animals will need
to be quarantined prior to euthanasia.
Quarantine will need to be separate from
non contaminated animals.
Prepare a plan for carcass disposal, to be
reviewed by APHIS and state authorities in
case of an intentional contamination.
Poultry Containment and Disposal
Facility Map
Name, address, and phone of
owner/proprietor
Relationship of the facility to adjacent
properties and/or structures.
Road access including transportation
routes
Perimeter boundaries, include fences,
and gates (with dimensions)
Facility Map continued
Buildings, outbuildings, doors, windows,
AC/heating, ventilation
Utilities (water, gas, electric, phones)
location and shutoff
Septic System and drainage areas with
direction of flow
Web sites such as Google Earth
www.earth.google.com
Poultry Emergency Phone List
Poultry Supplier Contact List
Poultry Employee Emergency
Contact List
Evaluate the plan
 Check
the perimeter
regularly.
 Make unannounced
entrances at various times.
 Check locks in vulnerable
areas.
 Perform a mock quarantine.
Maintain the plan
Ensure that measures implemented
continue to be effective.
Train the family/employees regarding their
effort in:
Prevention
Detection
Response
Re-evaluate the plan annually or as
operations or facilities change.
References
www.aphis.gov
www.fsis.gov
www.bt.cdc.gov
www.dhs.gov
Download