Recipe for Food Safety

By Sorrells, Eddie | Security Management, August 2006 | Go to article overview
Save to active project

Recipe for Food Safety

Sorrells, Eddie, Security Management

DEBATE, AND PERHAPS SKULLDUGGERY, are the predominant tactics used during political campaigns, but years ago members of an Oregon religious commune came up with a more nefarious strategy to influence an election: food poisoning. Commune members used salmonella bacteria to contaminate local salad bars in an effort to sicken voters and prevent them from casting ballots. Although no one was killed, more than 750 people became ill and many had to be hospitalized.

Food tampering does not get as much attention as other potential national hazards, but those who work within the nourishment industry are well aware of the risk. Former Secretary of Health and Human Services Tommy Thompson remarked two years ago that he could not comprehend "why the terrorists have not ... attacked our food supply, because it is so easy to do...."

Thompson had voiced similar fears shortly after the September 11,2001, attacks in New York and Washington, D.C., when he told a congressional terrorism panel that he was concerned about the likelihood of terrorists attacking the American food supply by introducing poisons into domestically cultivated crops and livestock.

Terrorists are not the only people who present a potential threat. Others include disgruntled employees or extortionists hoping for a financial settlement from the targeted company.

Some scientists take a contrarian stance on the likelihood or possibility of the food chain being attacked by large-scale assaults such as terrorism. They argue that the known list of chemicals and biological agents that would likely be used in an attack are very easily spread among animals but have little chance of harming a great number of humans. But past examples of food attacks have illustrated that smaller operations can have a profound effect on the industry.

In fact, an attacker doesn't necessarily have to actually harm the food supply to have an economic impact. Even a hoax can be financially devastating to a company. Consider what happened in March 2005, when a female diner at a San Jose, California, Wendy's restaurant claimed that she found a severed finger in her bowl of chili. The report was very quickly revealed to be a hoax in which the woman had hoped to extort money. But by then the incident had already received nationwide press causing a scared public to eat elsewhere. It is estimated that the Wendy's chain lost in excess of $2.5 million.

Prior to 9-11, most regulations in the food industry focused on safety and prevention of accidental or environmentally based contamination. Since then, the U.S. government has focused new attention on the framework for protecting the food supply. What follows is a look at the primary agencies with jurisdiction, the potential types of attackers and means of attacks, and some of the measures now being adopted to counter the threat.

The Agencies

The two main federal agencies that are charged with food security are the Food and Drug Administration (FDA) and the Food Safety and Inspection Service (FSIS). The FSIS, which is a division of the Department of Agriculture, is tasked with protecting the nation's supply of meat, poultry, and eggs, while the FDA, under the direction of the Department of Health and Human Services, protects everything else in the food chain.

Many security practitioners favor consolidation of these entities into one department devoted to food security to eliminate the inherent inconsistencies in having dual agencies. However, that approach has yet to gain the congressional support needed to pass legislation that would restructure the regulatory bodies.

Both of these agencies have had to respond to mandates from Congress and the President to strengthen food safety in the post-9-11 world. Key among these was the Public Health Security and Bioterrorism Preparedness and Response Act of 2002. The law was designed to shore up the authority of the FDA to deal with the grave threat of a terrorist attack against the food supply.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
Loading One moment ...
Project items
Cite this article

Cited article

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited article

Recipe for Food Safety


Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

While we understand printed pages are helpful to our users, this limitation is necessary to help protect our publishers' copyrighted material and prevent its unlawful distribution. We are sorry for any inconvenience.
Full screen

matching results for page

Cited passage

Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.

Are you sure you want to delete this highlight?