Advertisement

Protecting the Food Supply Chain from Terrorist Attack

Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 342)

Abstract

The food supply chain is a critical infrastructure that is an attractive target for terrorist attacks. Despite its importance, relatively little research has focused on improving the security of the food supply chain infrastructure. This is largely due to a lack of awareness on the part of food supply chain stakeholders and authorities about the threats. This paper describes a methodology for assessing the risk associated with threats to the food supply chain, with the goal of enhancing awareness and helping develop appropriate security measures.

Keywords

Food supply chain threats food defense risk assessment 

References

  1. 1.
    Arma dei Carabinieri, Comando Carabinieri per la Tutela della Salute, Rome, Italy (www.carabinieri.it/Internet/Cittadino/Informazioni/Tutela /Salute).Google Scholar
  2. 2.
    Asia-Pacific Economic Cooperation, APEC to increase protection of the food supply from terrorist attack, News Release, APEC Secretariat, Da Nang, Vietnam, September 15, 2006.Google Scholar
  3. 3.
    W. Boddie and L. Kun, Health care, public health and the food and agriculture critical infrastructures, IEEE Engineering in Medicine and Biology, vol. 27(6), pp. 54–58, 2008.CrossRefGoogle Scholar
  4. 4.
    G. Bush, Critical Infrastructure Identification, Prioritization and Protection, Homeland Security Presidential Directive 7 (HSPD-7), The White House, Washington, DC, December 17, 2003.Google Scholar
  5. 5.
    G. Bush, Defense of United States Agriculture and Food, Homeland Security Presidential Directive 9 (HSPD-9), The White House, Washington, DC, January 30, 2004.Google Scholar
  6. 6.
    Centre for the Protection of National Infrastructure and British Standards Institute, Defending Food and Drink: Guidance for the Deterrence, Detection and Defeat of Ideologically Motivated and Other Forms of Malicious Attack on Food and Drink and their Supply Arrangements, Report PAS 96:2010, London, United Kingdom (www.cpni.gov.uk/Docs/PAS96 _vis14.pdf), 2010.Google Scholar
  7. 7.
    G. Dalziel, Food Defense Incidents 1950-2008: A Chronology and Analysis of Incidents Involving the Malicious Contamination of the Food Supply Chain, Technical Report, Centre of Excellence for National Security, S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, 2009.Google Scholar
  8. 8.
    Department of Food Safety, Terrorist Threats to Food: Guidance for Establishing and Strengthening Prevention and Response Systems, World Health Organization, Geneva, Switzerland, 2008.Google Scholar
  9. 9.
    European Commission, Green Paper on Bio-Preparedness, COM (2007) 399 Final, Brussels, Belgium (ec.europa.eu/food/resources/gp_bio_prepar edness_en.pdf), 2007.Google Scholar
  10. 10.
    European Commission, Rapid Alert System for Food and Feed (RASFF), Brussels, Belgium (ec.europa.eu/food/food/rapidalert/index_en.htm).Google Scholar
  11. 11.
    B. Ezell and D. von Winterfeldt, Probabilistic risk analysis and bioterrorism risk, Biosecurity and Bioterrorism: Biodefense Strategy, Practice and Science, vol. 7(1), pp. 108–110, 2009.CrossRefGoogle Scholar
  12. 12.
    A. Khan, D. Swerdlow and D. Juranek, Precautions against biological and chemical terrorism directed at food and water supplies, Public Health Reports, vol. 116(1), pp. 3–14, 2001.Google Scholar
  13. 13.
    R. Lawley, L. Curtis and J. Davis, Food Safety Hazard Guidebook, Royal Society of Chemistry, London, United Kingdom, 2008.Google Scholar
  14. 14.
    R. Lee, R. Harbison and F. Draughon, Food as a weapon, Food Protection Trends, vol. 23(8), pp. 664–674, 2003.Google Scholar
  15. 15.
    J. Monke, Agroterrorism: Threats and Preparedness, CRS Report for Congress RL32521, Congressional Research Service, Washington, DC (www.fas.org/irp/crs/RL32521.pdf), 2004.Google Scholar
  16. 16.
    B. Rasco and G. Bledsoe, Bioterrorism and Food Safety, CRC Press, Boca Raton, Florida, 2005.Google Scholar
  17. 17.
    SecuFood Project Secretariat, SecuFood: Security of the European Food Supply Chain, University Campus Bio-Medico, Rome, Italy (secufood.uni campus.it).Google Scholar
  18. 18.
    M. Sekheta, A. Sahtout, F. Sekheta, N. Pantovic and A. Al Omari, Terrorist threats to food and water supplies and the role of HACCP implementation as one of the major effective and preventive measures, Internet Journal of Food Safety, vol. 8, pp. 30–34, 2006.Google Scholar
  19. 19.
    D. Shea and F. Gottron, Small-Scale Terrorist Attacks Using Chemical and Biological Agents: An Assessment Framework and Preliminary Comparisons, CRS Report for Congress RL32391, Congressional Research Service, Washington, DC (www.fas.org/irp/crs/RL32391.pdf), 2004.Google Scholar
  20. 20.
    U.S. Department of Homeland Security, U.S. Department of Agriculture and U.S. Food and Drug Administration, Agriculture and Food: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan, Washington, DC (www.dhs.gov /xlibrary/assets/nipp-ssp-ag-food.pdf), 2007.Google Scholar
  21. 21.
    U.S. Food and Drug Administration, CARVER Software, Washington, DC (www.fda.gov/Food/FoodDefense/CARVER/default.htm#whatis).Google Scholar
  22. 22.
    P. Valle, A. Girard and O. Saldate, Defensa alimentaria, Mundo Lácteo y Cárnico, pp. 12–19, September/October 2007.Google Scholar
  23. 23.
    L. Wein and Y. Liu, Analyzing a bioterror attack on the food supply: The case of botulinum toxin in milk, Proceedings of the National Academy of Sciences, vol. 102(28), pp. 9984–9989, 2005.CrossRefGoogle Scholar
  24. 24.
    World Health Organization, Global Public Health Response to Natural Occurrence, Accidental Release or Deliberate Use of Biological and Chemical Agents or Radionuclear Material that Affect Health, Resolution WHA 55.16, Fifty-Fifth World Health Assembly, Geneva, Switzerland (apps .who.int/gb/archive/pdf_files/WHA55/ewha5516.pdf), 2002.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

There are no affiliations available

Personalised recommendations