Bioterrorism: Recipe for Protection - PowerPoint PPT Presentation

1 / 42
About This Presentation
Title:

Bioterrorism: Recipe for Protection

Description:

Terrorism is the unlawful use of force against persons or property to ... They are invisible, silent, odorless, and tasteless. Widespread contamination is easy ... – PowerPoint PPT presentation

Number of Views:46
Avg rating:3.0/5.0
Slides: 43
Provided by: cco84
Category:

less

Transcript and Presenter's Notes

Title: Bioterrorism: Recipe for Protection


1
Bioterrorism Recipe for Protection
  • Charlene Contreras, REHS
  • Los Angeles County
  • Environmental Health

2
Terrorism
  • Terrorism is the unlawful use of force against
    persons or property to intimidate or coerce a
    government, the civilian population, or any
    segment thereof, in furtherance of political or
    social objectives. -FBI

3
Types of Forces
  • Biological
  • Nuclear
  • Incendiary
  • Chemical
  • Explosive
  • Radiological

4
Types of Forces
  • B
  • N
  • I
  • C
  • E
  • R

5
Why Biological Weapons?
  • They are invisible, silent, odorless, and
    tasteless
  • Widespread contamination is easy
  • Create fear, terror, and panic in a population

6
Why Food?
  • Agriculture is a 200 billion business
  • Provides 22 of all jobs in US
  • Food and Agriculture is the nations largest
    business

From the National Agriculture Statistics Service.
7
Agents used to contaminate food
  • Bacteria
  • Toxins
  • Viruses
  • Chemicals
  • Physical Agents

8
Intentional Contamination
  • In 1984 The Dalles, Oregon

9
Intentional Contamination
  • In 1996 Dallas, Texas

10
Intentional Contamination
  • In 2003 Michigan

11
What can the Food Operator Do?
12
  • Risk Management

13
Operational Risk Management
  • Effective use of resources
  • Design preventive measures

14
Operational Risk Management
  • An approach similar to HACCP
  • Identify critical control points
  • Take proper safety measures

15
Operational Risk Management
  • Food Safety
  • Food Security

16
Operational Risk Management
17
Operational Risk Management
1. Identify the Hazards
18
1. Identify the Hazards
Food Flow Diagram
19
1. Identify the Hazards
  • Facility Security
  • Hiring
  • Personnel
  • Food Security

20
Operational Risk Management
1. Identify the Hazards
2. Assess the Risks
21
2. Assess the Risks
  • Probability
  • Severity

22
ASSESS THE RISK - Probability
  • Frequent
  • Likely
  • Occasional
  • Seldom
  • Unlikely

23
ASSESS THE RISK - Severity
  • CATASTROPHIC
  • CRITICAL
  • MODERATE
  • NEGLIGIBLE

24
Step 2. Assess the Risk
25
Operational Risk Management
1. Identify the Hazards
2. Assess the Risks
3. Analyze Risk Control Measures
26
3. Analyze risk control measures
  • Design for minimum risks
  • Safety features
  • Warning devices
  • Develop procedures and training

27
Operational Risk Management
1. Identify the Hazards
2. Assess the Risks
4. Make Control Decisions
3. Analyze Risk Control Measures
28
4. Make Control Decisions
  • Benefits vs. Risks
  • Practical
  • Fund availability

29
Operational Risk Management
1. Identify the Hazards
5. Implement Risk Controls
2. Assess the Risks
4. Make Control Decisions
3. Analyze Risk Control Measures
30
5. Implement Risk Controls
  • Make it clear
  • Establish accountability
  • Promote support

31
Operational Risk Management
1. Identify the Hazards
6. Supervise and Review
5. Implement Risk Controls
2. Assess the Risks
4. Make Control Decisions
3. Analyze Risk Control Measures
32
All Clear
33
What are Governmental Agencies Doing?
  • New Legislation
  • Surveillance
  • Prevention
  • Response
  • Coordination and Communication

34
New Legislation
  • Bioterrorism Act of 2002 (BTA)
  • Homeland Security Presidential Directive

35
Coordination
  • Inter-agency
  • communication

36
Coordination
  • Food Emergency Response Network (FERN)

37
Coordination
  • Exercises

38
Surveillance
  • Electronic Laboratory Exchange Network (eLEXNET)

39
Surveillance
  • Syndromic Surveillance

40
Prevention
  • Food Security Guidance for Industry
  • Operational Risk Management

41
Response
42
Conclusion
Write a Comment
User Comments (0)
About PowerShow.com