Keywords

1.1 Introduction

The vast majority of plant derived foods which are produced for human or animal consumption are safe and wholesome. However, often complex production and distribution systems are not immune to a range of potential threats and imperfections in the “seed to salad on the plate” food chain. There are a wide range of protective systems in place to prevent the adverse consequences of natural, accidental or malicious contamination including disease outbreaks affecting both food plants and consumers. Many of these protective measures have been established following significant outbreaks either in the plants themselves or because of an adverse effect on consumers. The strong science base that exists in this field has built upon the need to prevent and respond to such events and has made major contributions in particular to the prevention and control of disease and contamination at all stages of this arm of the food chain.

The PlantFoodSec project (https://www.plantfoodsec.eu/) has brought together key members of the international scientific community who understand plant production methods and have experience of developing, establishing and using tools to enhance biosecurity and safeguard the plant food chain. As part of this project team, a small group of specialists (the security panel) provided internal review and guidance to the project teams on matters which may have potential to be misused for malicious purposes. In reality this function provided reassurance to the teams that their work should be published and disseminated as their outputs reinforced protective measures rather than highlight major gaps in knowledge and vulnerabilities in the food chain. The panel also encouraged collaboration with other agencies and promoted project outputs to those engaged in emergency response and in particular with protection of agricultural food production systems. Although the project had a plant focus, the vulnerabilities considered and gaps filled by the project have wider applicability which this chapter aims to demonstrate.

As we live in an ever changing world, vigilance is required to identify new and emerging issues that could impact on production capacity, plant biosecurity or food safety and food chain resilience. In this chapter we will explore a number of ways in which vulnerabilities can be identified, threats evaluated and suggest how gaps in food and plant biosecurity can be managed to acceptable levels. Many of these approaches refer to tools and datasets that have been developed within PlantFoodSec to support a proportionate response to any predictable issues. Rather than highlight particular weaknesses, this chapter seeks to explain some of the many approaches available to stakeholders at different levels to identify gaps in food chain biosecurity.

In this chapter the term “food security” is used in the context of guarantee of supply and “food defence” in the context of safeguarding the food chain from malicious intervention with “food safety” being used in the context of ensuring food is wholesome and can be consumed safely.

1.2 Vulnerabilities

One definition of the term vulnerability is:

“Exposed to the possibility of being attacked or harmed, either physically or emotionally” (http://www.oxforddictionaries.com/definition/english/vulnerable). In this context, emotional impacts will include public perception encompassinging, at times, the adverse consequences of intervention. Perception of food safety risks is a topic outside the scope of this work but there is a large literature describing the importance of the topic (e.g. Lobb et al. 2007; Redmond and Griffith 2007; Verbeke et al. 2007).

There is little doubt that closer links between the natural and social sciences are developing with mutual benefits but there are still challenges in developing a common lexicon and shared understanding in this area. Managing stakeholder expectation will continue to be a key aspect of consequence management of unexpected events.

It would be naïve to suggest that the food chain or plant production systems are not open to the possibility of damage or could suffer harmful impacts from natural, accidental or malicious actions but the detailed examination of vulnerabilities (and mitigation measures) is conducted at many levels. For example,

  • at the operational level producers or food processors may consider production of single products or crops,

  • at the tactical level, larger businesses might consider production and storage options to maximise retailer choice and shelf-life,

  • strategically, international businesses or Governments may consider a wider international food chain, cross border issues and multiple supply chains to guarantee supply.

These are not rigid examples but hopefully demonstrate the complexity of assessing vulnerabilities in the food chain and the need to consider a very wide range of stakeholder requirements. Vulnerabilities can arise for a number of reasons and it is convenient to consider these as natural, accidental or malicious.

1.3 Natural Vulnerabilities

Plants for food or feed are rarely grown aseptically outside of specialised research institutes (some hydroponic systems may be near to this) and the growing environment is itself vulnerable to a range of naturally occurring events that impact upon food/feed plants.

Perhaps the most obvious natural vulnerability is susceptibility to disease outbreaks (e.g. Johnson and Cummings 2015) or pest infestation (e.g. http://www.fao.org/emergencies/emergency-types/plant-pests-and-diseases/en/) which can affect yields, impact upon availability or affect nutritional value with an impact on food security (guarantee of supply), especially in those countries where alternatives are scarce or uneconomically viable to access.

Water security is increasingly becoming recognised as being a key vulnerability in some countries with impacts on irrigation as well as biosecurity, e.g. where disinfection or processing of water is needed before use. Control of water will become more important if recent changes in weather patterns continue to develop with a shift in deposition causing a change in drought and flooding patterns across the globe.

Other natural vulnerabilities include events such as the eruption of the Eyjafjallajökull volcano in Iceland in April 2010 which received widespread press coverage (http://news.bbc.co.uk/1/hi/world/europe/8634944.stm). Significant impacts of this event included restrictions on air travel from the resulting ash cloud which impacted across many parts of Europe. Whilst direct impacts on food were limited to potential increased fluoride levels in deposited ash affecting nearby pasture and grazing, indirect impacts were felt on transportation of short shelf-life produce which is mainly conducted by air. Not only does a freeze on air travel result in financial losses as perishable goods deteriorate but also a potential biosecurity challenge and waste disposal issues.

Without needing to engage in the climate change debate (http://www3.epa.gov/climatechange/science/overview.html, http://www.worldbank.org/en/topic/climatechange/overview), the world is clearly undergoing a series of weather variances that are impacting on plant production with increased vulnerability to weather extremes, changes in growing seasons and increased prevalence of diseases that previously would have been classified as being exotic being observed.

In addition, natural evolutionary change in organisms has caused problems that have impacted across Europe. For example an outbreak of Shiga-toxin producing Escherichia coli (STEC), serotype O104:H4 (Karch et al. 2012) originally reported in Germany (European Food Safety Authority 2011) in May 2011, proved to be a significant event. This was initially associated with consumption of fresh vegetables although later, this was linked to consumption of seed sprouts. Assignment of the source of infection in consumers was initially flawed and attributed in error to cucumbers grown in Spain where German laboratories detected E. coli in imported cucumbers. Application of the precautionary principle (http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri = URISERV:l32042&from = EN) meant that, in the absence of data to the contrary at the time, large volumes of cucumbers in Spain were consigned to landfill (as well as other salad vegetables which consumers felt were at risk). Compensation payments from the EU to the affected producers of €210 million did not meet all losses with substantial reputational loss by a major industry. Further examination of the organisms detected in the cucumbers identified a different strain of E Coli to that causing serious health issues.

Consumption of sprouted seeds was subsequently associated with occurrence of an identical outbreak in France in June of 2011 with evidence suggesting a common source. Eventually, tracing suggested that the contaminated material most likely arose from a specific consignment of fenugreek seeds imported from Egypt.

The situation was complicated by the fact that STEC O104:H4 was a very rare serogroup in humans in the EU and indeed worldwide with only low single figure cases being reported before the outbreak. At the end of the outbreak, a total of 3911 cases had been reported to the ECDC and WHO.

This is a good example of how vulnerable the plant food supply chain can be from naturally evolving organisms. It is not uncommon for assignment of the causative agent for food poisoning to be made from clinical isolates rather than from examination of the foods consumed. It is of course a key protective measure that the food industry tests routinely for microbial contamination in produce. Nevertheless genetic mutation of E. coli O104 impacted on the assays used by National and EU Community Reference Laboratories (NRL and CRL) but rapid diagnostic method development by the CRL allowed NRL to begin testing with minimal method development which aided public reassurance and eventual control of a complex situation. This infrastructure was a significant resource used to manage the outbreak.

It may be worthwhile describing the precautionary principle used by regulatory authorities across Europe to safeguard consumers. This is invoked “when a phenomenon, product or process may have a dangerous effect, identified by a scientific and objective evaluation, if this evaluation does not allow the risk to be determined with sufficient certainty” (http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri = URISERV:l32042&from = EN).

This principle may only be invoked when the following three conditions are met after a suitable risk assessment where:

  • Adverse effects or potentially adverse effects have been identified;

  • Scientific data available has been evaluated and

  • Scientific uncertainty has been taken into account.

In addition, any response should,

  • Ensure proportionality between the measures taken and the chosen level of protection;

  • Maintain non-discrimination in application of the measures;

  • Require consistency of the measures to be taken with similar measures already used in similar situations or using similar approaches;

  • Include an examination of the benefits and costs of action or lack of action;

  • Review the measures in the light of scientific developments.

The legislation notes that “in the case of an action being taken under the precautionary principle, the producer, manufacturer or importer may be required to prove the absence of danger.”

Producers/suppliers requiring additional testing to demonstrate lack of hazard will add to pressures on finite laboratory resources and in practice collaboration between authorities and producers can be mutually beneficial.

In general, food production chains are protected by well-established mechanisms operating at local, national and international levels so as to safeguard products from a range of challenges throughout their life cycle.

The majority of plant based foods are grown in environments which are controlled to a greater or lesser extent by human activity. Growers will tend crops with the aim of maximising yields which can be a driver towards increased biosecurity (prevention of infection/infestation) and biosafety (prevention of harm arising from a biological infection).

1.4 Accidents

Accidental contamination of food plants occurs from time to time from man-made or natural events but in general, accidental chemical contamination occurs much more frequently than biological. However, one of the more common sources of accidental biological contamination arises from non-ideal storage of harvested crops. There are many examples of this resulting in fungal growth with generation of toxin.

One example of popular interest concerns recent theories regarding the Salem Village (USA) Witch Trials in the late 1690s. Environmental conditions in the village of Salem Massachusetts in 1691–3 were possibly favourable for growth of the fungal contaminant, ergot, producing LSD like compounds which could induce hallucinations and symptoms thought at the time to be associated with demonic possession (Caporael 1976). Whether this was the case or not, it remains a credible example of possible accidental food poisoning with disastrous consequences for those affected.

Food poisoning from preparation of regional delicacies can be due to carelessness, poor hygiene or in some cases an unfortunate combination of events. For example, the Indonesian delicacy Tempeh Bongkrek is made by fermenting coconut presscake or coconut milk with the fungus Rhizopus oligosporus. When the mould grows, the mycelia physically bind the coconut together to form a cake. However, if the product is contaminated with Burkholderia cocovenenans, an aerobic gram-negative bacteria, then serious poisoning can occur with 34 deaths per year being reported in the ostensibly plant based product between 1951 and 1975, at which time it was banned (although illicit kitchens were suspected as still producing the delicacy). Burkholderia cocovenenans has some interesting biology and when particular nutrient combinations are available, the organism will produce toxins with bongkrekic acid being the main toxin produced (Garcia et al. 1999; Scotter et al. 2015).

Accidental release from experimental facilities remains another vulnerability, albeit such facilities operate under tight controls. Research into highly infectious diseases is normally conducted in specialised high containment laboratories or assessing invasive species in tightly controlled environments. Such facilities are tightly managed and will include measures to prevent accidental release, safe disposal of wastes and fumigation routines to mitigate the risk from spills or other adverse events. Some plant pathogens do not require such high containment (biosafety level 3 or 4) but if they are exotic (not endemic in the area where research is being conducted) then additional precautions offered by such containment facilities (biosafety level 3 for example) may be useful in risk mitigation.

Many generic biosecurity measures are aimed at limiting the impact of accidental importation or releases of plant disease or pests. For example, the UK plant biosecurity strategy published in 2014 (https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/307355/pb14168-plant-health-strategy.pdf) describes a number of the key considerations that need to be taken:

  • activity should be directed at priority pests and pathways and be informed by comprehensive risk assessment

  • includes plant pathology, population dynamics, and

  • epidemiology, as well as the social sciences to understand the values at stake

  • meets EU and international obligations, to enable businesses to trade in clean material and grow

  • ensures everyone (government and its agencies, industry, NGOs, landowners and the public) shares a common understanding of biosecurity and their role and responsibilities

  • ensures that those who benefit from plant biosecurity activity should, where appropriate, be responsible for that activity and bear the cost of it

  • ensures the Plant Health Services are able to respond effectively to new and emerging threats

  • ensures GB as a whole is resilient, capable and prepared to respond flexibly to new and emerging threats

  • ensures GB production has a good reputation to allow exports of plants and plant products to develop, with consequent economic and social benefits

As part of this strategy, work is taken:

  • pre-border through collaboration with international authorities to share understanding of disease movement through Europe and understanding of novel threats,

  • at the borders to assess incoming plant material (and some soils) to mitigate the risk of accidental importation of invasive species,

  • inland to detect any new infections quickly and develop/exercise eradication contingency plans.

Similar approaches are taken across Europe although managing plant material movements across land borders has additional challenges.

Good biosecurity is key to management of accidental outbreaks. Biosecurity is very much scenario dependant but hinges on good hygiene, high levels of diligence in plant product inspection, effective record keeping to aid tracing and importantly shared risk assessments on specific hazards. As an example the UK plant pest risk register (https://secure.fera.defra.gov.uk/phiw/riskRegister/downloadEntireRiskRegister.cfm) contains over 800 pests affecting food and decorative plants.

Vulnerabilities are not limited to agricultural crops or imported material and even the so called “free foods” (wild fungi, fruits, berries, etc.) are not immune to natural disease outbreaks and disease reservoirs in companion plants (e.g. in hedgerows) can be an important factor in risk evaluation, mitigation and outbreak recovery.

There may be overlap between natural and accidental vulnerabilities and it may not always be easy to identify malicious events if they are covert in nature.

1.5 Malicious Actions

Fortunately, malicious attacks against plant production are relatively rare. Nevertheless they do occur. Gardening competitions such as “Britain in Bloom” can attract unwanted addition of pesticides by rivals to flower baskets/beds with disastrous consequences for competitors. However, although such events and domestic dispute equivalents are reported from time to time, there are few malicious attacks either against food plant production capacity using biological agents or using food plants as a delivery mechanism. However, there has been a widely publicised attack using salad vegetables as a delivery vector in an attempt to affect human health on a local population.

In 1981, the Rajneeshee cult bought a 64,000 acre farm in Oregon USA as part of a plan by their leader, an Indian philosopher Bhagwan Shree Rajneesh, to build a Utopian city on their new land. Having taken over control of the local town council through elections, the cult was able to gain permissions to undertake limited development but was still unable to obtain the regional planning consents they required to expand their development into a new city.

In the middle of September 1984, several locals became ill from salmonella food poisoning with all having eaten at a local restaurant. Salmonella typhimurium was quickly recognised as the causative agent and those affected recovered after treatment with normal therapies (Torok et al. 1997). Initial views of investigating authorities were that this was a natural event with poor food handling being suspected as the root cause.

However, a week or so later, the total number of affected persons in the outbreak reached over 750 in a biphasic epidemic. A major response was initiated with local hospitals dealing successfully with 45 hospitalised casualties but fortunately again there were no fatalities. At that time, there was no evidence of deliberate contamination. Once again poor food handling practices were considered as being the cause although the relatively high number of restaurants involved was unusual. The incident would have remained a natural/accidental contamination event but a year later, a disaffected member of the cult alerted the authorities to the possibility that the food poisoning was deliberate.

On further investigation, US authorities found covert laboratories within the cult premises with identical Salmonella typhimurium to the outbreak strain being found. Prosecutions resulted and it later became clear that cult members had been encouraged to avoid restaurants during the period in which salad bar items were contaminated. This was to reduce the number of non-cult voters who would attend the polls at a local election thus influencing the election results in favour of cult members. This example highlights that detection of covert biological attacks is challenging although response (health management) processes are virtually identical for covert and overt releases.

1.6 Assessing Vulnerabilities and Gaps

There are well documented approaches to assessing food chain vulnerabilities (e.g. http://www.sigmachain.eu/uploads/dateien/fp6-518451_stakeholders_guide_on_vulnerabilities_web.pdf; http://www.springer.com/978-90-481-9557-2) which may also apply in general to plant production systems. Plant and wider food production systems encompass a “farm to fork” process which can be extremely variable in scale and complexity.

At the simplest end of this spectrum, production can be at a local level with the aim of growing food for personal consumption. At the other end of the spectrum, large industrial scale facilities may be producing millions of units daily (e.g. billions of loaves of bread annually from the 731.6 million metric tons of wheat produced each year) which often feed into broad distribution and retail networks from which consumers make an informed choice. In the latter instance the food chain is not widely vulnerable to a short term disturbance of a few days in one particular location (e.g. a spoilage problem caused by transport disruption in one country). Whilst this could impact locally, an international supply chain would support larger scale users who could switch suppliers to overcome limited timespan shortages. However, should a plant disease outbreak occur in the major wheat producing countries affecting yields, then this could have a much wider impact, especially if the genetic pool of plants used is common amongst producers and is susceptible to the same diseases.

Products themselves can be complex involving large numbers of ingredients and the growing demand in industrialised nations for “ready to cook” products means that a single unexpected contaminant in a common ingredient can have major consequences. In the UK, a major product recall in the period 2003–2005 (http://tna.europarchive.org/20111030113958/http://www.food.gov.uk/safereating/chemsafe/sudani/) was initiated because widely used ingredients (chilli powder) had been coloured with non-permitted Sudan Dyes to make them more visually attractive to users (perhaps based on adding a red coloured chemical to make the chilli seem hotter.).

The recall included contaminated spices themselves, sauces made from them in products destined for retail consumption and for use in commercial production facilities or in pre-prepared foods. With around 600 retail and wholesale product types being recalled by UK and EU authorities because of a potential health impact from the genotoxic and carcinogenic contaminant, there was a significant impact on regulators, producers and significant concern for consumers.

Mislabelled foods and fraudulent descriptions are all known vulnerabilities but much work has been conducted to improve traceability of foods and in effective labelling to ensure authenticity of products (Kelly et al. 2011; Vemireddy et al. 2015; Phelan and Jonker 2015).

Whether a production system is simple or complicated, it is important to consider and document considerations of vulnerabilities and the different compartments in the food chain often include quite specific production and distribution networks. It is common practice for each link in the chain to consider relevant microbiological, chemical and physical hazards and to establish and document effective interventions using the Hazard Analysis and Critical Control Point (HACCP) approach. More recently, Threat Analysis Critical Control Point (TACCP) and Vulnerability Analysis Critical Control Point (VACCP) approaches have become parts of the method by which the food chain can be reviewed, allowing high risk activities to be mitigated and safeguards introduced to prevent rather than manage the risks.

A variant, Risk Analysis Critical Control Point analysis (Serra et al. 1999), has also been reported in which the consequences of product or process variation on the consumer/end user are assessed but this is not, as yet, in common use.

These approaches are not developed specifically for any one part of the food chain but can be applied generically both vertically (up and down a food chain) and horizontally (encompassing the detail of a particular element of the chain). Whilst the level of detail will vary from a farmer producing a single crop to a retailer ensuring that multiple short shelf-life product lines remain available for consumers, similar approaches are possible.

There is no intention to describe HACCP in detail in this chapter as the wide literature on the subject is easy to obtain with formal training courses being readily available from a range of providers. Suffice to say that in common with other critical control point assessments, the first stage is to map the process under consideration. A simple process map or process flow is shown in Fig. 1.1 as an example. Process maps will vary in detail but it is important to prioritise efforts in complex systems, for example, work undertaken which identified agents of concern has been extended to include naturally occurring diseases and food crops (Suffert et al. 2009).

Fig. 1.1
figure 1

Process map for a generic plant based food production system

From a HACCP perspective, this may be too high a level of detail with each box in Fig. 1.1 having to be broken down into more detail to identify intervention points that would reduce the possibility of a biosecurity breach. Figure 1.2 shows a more detailed breakdown of the irrigation element of the system outlined in Fig. 1.1.

Fig. 1.2
figure 2

Process map for one element of a plant based food production system

Clearly each of the boxes shown in Fig. 1.2 can be broken down further, for example, the borehole sprinkler system box may need to include microbiological loading of the water, whether there is an intermediate storage tank for the irrigation system, dead legs in the system, etc.

In the system described in Fig. 1.1, ensuring that certified disease free seed is used may be a critical control point, or perhaps ensuring that the post-harvest cleaning process does not produce a reservoir of disease in a dip tank may be another. Ensuring the soil used for planting is clean of disease and the field margins are free of other plants that can harbour crop disease could be other key steps. For each critical node in the process, a monitoring and control plan should be developed with associated record keeping and management infrastructure to develop and inform contingency plans for dealing with anomalous occurrences. Importantly this can be used to reassure customers (wholesalers, retailers and consumers) that production is under control.

1.7 Learning Lessons

Despite best endeavours, food poisoning and plant disease outbreaks will occur from time to time but understanding the reasons for outbreaks is vital in identifying vulnerabilities in the food chain and informing risk assessments.

For example, in 2006, an E. coli outbreak in the USA (Grant et al. 2008) was found to have been caused by contamination of spinach leaves in retail “ready to eat” salad leaf packets. In that outbreak nearly 200 persons were affected with 3 fatalities and haemolytic-uremic syndrome was observed in a number of infections.

The disease was identified in 13 samples of product from a single production run (as shown by a common batch code which highlights the importance of product traceability) but the impact was felt across the USA (http://www.cdc.gov/ecoli/2006/spinach-10-2006.html). Sourcing staple foods from a wide geographical area is not uncommon and a faulty product could be quickly spread over a wide geographical area (perhaps controlled by different regulatory authorities) which could make epidemiology based tracing based on clinical cases challenging.

However, in this instance, tracing of infected material using production batch codes suggested contaminated packages had used plant material sourced from potentially 4 ranches. Investigation teams visited these premises and relatively large numbers of feral swine were observed on at least one of them (Jay et al. 2007). The teams took swab samples from captured feral animals and on one ranch in particular, the strain of disease found was very similar to the outbreak strain. With 149 animals (estimated) on these premises, this was considered to be a likely cause of the outbreak. Major incidents are quite often the result of multiple factors and although E. coli was not observed in local waterways (a common vector in the environment to plant transfer chain), faecal contamination by feral animals direct onto the plants or adjacent soil was also considered possible.

The fencing used around production fields was not sufficient to prevent ingress of animals onto the fields (swine can dig under fences) and signs of rooting were observed in the soil where plants were grown. In addition, the machine used to harvest baby spinach could also pick up faecal material on soil along with the plants harvested and thus could have contributed to contamination of the produce.

Lessons from this outbreak would suggest that enhanced monitoring of water sources, improved physical separation of large wildlife from spinach fields, a different harvesting approach and improved washing/process water testing with an increased sampling rate for final product testing may be worth considering. Such lessons are invaluable in highlighting issues that might have wider applicability and are a major resource for those wishing to improve food chain resilience.

Additional monitoring of the finished product gives extra reassurance for consumers and may increase the probability of finding contamination “hot spots”. However in large scale production systems finding spot contamination in time to be of use is a significant challenge given finite analytical resources, some relatively lengthy analytical turnaround times and a short shelf-life product.

Focussing the use of finite resources to key control points is a significant benefit of a HACCP approach both in terms of cost effectiveness and consumer protection. In the above example, it may well be that monitoring the wash water used to clean multiple plants could show the system was under control compared to the benefits of extending finished product examination. Each compartment in the process flow is potentially specific to that scenario and assessments need to be undertaken by staff trained in risk assessment who fully understand the processes under consideration and the limitations of microbiological examination methods.

Irrigation water is a significant potential source of contamination; particularly for those crops which undergo limited processing (crops undergoing heat treatment may be less vulnerable). Other control points worth considering in HACCP assessments would include operator hygiene, machine cleaning regimes, process/cleaning water condition and storage conditions.

Protecting plants growing in the fields from infection by plant pathogens is also critical to ensure a satisfactory yield and quality of product. This will require consideration of seed quality – is the seed stock from disease free sources?, is there a need to use coated seed and are there associated risks, if the farmer chooses to use young plants from a nursery?, what checks are required to ensure the seedlings are disease free?, is there a history of plant disease in the fields to be used?, can the plants in the margins of the field act as reservoirs of disease?. A HACCP approach needs to consider a very wide range of issues and expert advice may need to be developed and maintained by a multi-disciplinary team.

1.8 Microbiological Examination

One of the major technical challenges facing microbiologists is rapid detection of food poisoning organisms or plant pathogens at infectious dose levels in produce. Whilst modern molecular methods such as RT-PCR (e.g. Szabo et al. 2015; Zhang et al. 2011), or LAMP (e.g. D’Agostino et al. 2015; Wu et al. 2015) are sensitive and can detect for example salmonella, listeria and some yersinia spp. at levels likely to cause infection, this is not the case for all human pathogens. Some E. coli (Lynch et al. 2009; Friesema et al. 2008), norovirus (Cook et al. 2014), Shigella spp (Lewis et al. 2009) for example can have infective doses in food of the order of 10–100 colony forming units (cfu) which would be challenging to detect rapidly unless large sample volumes were taken for testing or if culturing was performed to grow microbes up to detectable levels. Inevitably culturing of bacteria takes time (e.g. 8–36 h) and with short shelf-life foods, this approach may only give a result after the product has been purchased and possibly consumed. Nevertheless it is clear that technologies are getting closer to being suitable for routine use in real time production system monitoring with increasing research consideration being given to development of field side testing capability, especially for plant pathogens. (Tomlinson et al. 2005).

An alternative approach to looking for target organisms that originate from faecal contamination is to look for other indicators of contamination (e.g. coliform markers rather than specific bio-threats) as these may be easier to find at higher concentrations that the biothreat agent (e.g. Harwood et al. 2014; Amoah et al. 2006). Optical detection of such contamination or disease on plants, e.g. using hyperspectral imaging (Bock et al. 2010) has been developed to the point where commercial food scanners are now becoming available. Test samples are irradiated with specific wavelengths of light and reflectance or fluorescence is used to detect surface anomalies where disease or faecal contamination may be present. Faecal material residues can be seen on plants using scanners at levels below that possible using the naked eye and are being evaluated for screening salad leaf crops and apples and isolate cultures. This is a rapidly evolving application (Pu et al. 2015) of established technology and scanners can range well beyond the visible spectrum on a production line.

Classical microbiological approaches to identifying plant disease or contamination are not discussed here but many of the “gold standard” methods available to laboratories require intensive and time consuming effort to develop, validate and obtain agreement that they are fit for purpose, examples being the many methods established as ISO standards (http://www.iso.org/iso/home.html). Even so, escalation of capacity to deal with an unexpected outbreak can be challenging if laboratories need to expand their scope or scale of operations, e.g. to develop high throughput methods (Adams et al. 2013) or consider unusual organisms. Many relevant laboratories have a portfolio of accredited methods or management systems (e.g. to ISO 17025:2005 (http://www.iso.org/iso/catalogue_detail.htm?csnumber = 39883) or ISO 9001:2015 (http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=62085)) and thus can demonstrate a quality infrastructure around which extensions to scope or quality control of examinations can be based.

Networks of plant protection laboratories are key to safeguarding the plant food chain. Organisations such as the EPPO (http://www.eppo.int/), an intergovernmental organization which facilitates for European cooperation in plant health, develops international strategies to prevent the introduction and spread of dangerous pests and promote safe and effective control methods. The World Trade Organisation and the International Plant Protection Convention are also key drivers in this area (https://www.wto.org/english/thewto_e/coher_e/wto_ippc_e.htm). Human pathogens on plant issues are managed through a mixture of plant examination specialists and human health expertise, e.g. the European Centre for Disease Prevention and Control (http://ecdc.europa.eu/en/Pages/home.aspx) and their regional/national counterparts. The links between such control laboratories are vital in advising of outbreaks, novel developments (either in disease evolution or novel testing methods) and in managing cross-border issues.

Increasing surge capacity can be problematic in the midst of an outbreak where rapid screening is required and alternative examination methods may need to be considered, even if there are relatively large uncertainties associated with testing outcomes. As long as there is a low false negative testing rate and confirmatory methods are used to evaluate presumptive positive findings from screening, then less well defined methods may have utility if large numbers of samples are to be examined.

1.9 Other Critical Control Points

HACCP tends to be used close to production but more strategic considerations are also valuable, looking at where a wider food chain may be vulnerable or where a processing facility could be open to malicious abuse. Considering the latter point, threat assessment critical control point (TACCP) evaluations are a relatively new approach but work by the UK Food Standards Agency (https://www.food.gov.uk/) and Centre for Protection of the National Infrastructure (CPNI) (http://www.cpni.gov.uk/) has resulted in a helpful description of TACCP being published by the British Standards Institute under the reference PAS-96 (http://www.food.gov.uk/sites/default/files/pas96-2014-food-drink-protection-guide.pdf). In this type of control point assessment, a multi-disciplinary approach to protective security is applied to food production.

Once again a process flow is developed but in this case from the perspective of more than accidental or natural contamination. Experts from a number of disciplines (ingredient supply, security, personnel, engineering, marketing, distribution, production, packaging, etc.) consider the processes that go into getting a product to market and identify where there are weaknesses which could be exploited for financial or political gain. Many large scale suppliers, transportation companies and wholesale/retail outlets will routinely take steps to prevent such risks to their businesses in any event although there is a tendency to focus on fraud and similar criminal activity.

Having identified vulnerabilities in the process flow, a mitigation plan needs to be developed and decision makers have the options of:

  • Treating the risk – taking action to remove the cause or take steps to prevent the risk from maturing. This could be as simple as locking up key ingredients when not in use to prevent loss or deliberate contamination or a more complex activity involving supplier audits and background checks on staff to increase trust in service provision.

  • Tolerate the risk – the risk is accepted even though mitigating activities are not likely to be effective. In general, this categorisation would be for low probability events which cannot be managed. One example may be the risk of hurricane damage to a farm during the growing season where these were 1 in 1000 year events. Understanding the risk appetite of the stakeholders is critical in this option.

  • Transfer the risk – this is where the risk is changed by moving it to another organisation. An example of this may be to move to planting seedlings rather than seed to reduce the risk of germination failure.

  • Terminate the risk – use another process. The risk of deterioration of soil quality affecting production efficiency could be mitigated by switching to hydroponic methods or planting an alternative crop not susceptible to an endemic disease.

Simple TACCP mitigation actions may be as simple as knowing the staff on the farm, making sure they are appropriately supervised by trusted managers, opportunities for mischief are minimised (e.g. lock up cleaning materials and essential equipment when not in use by designated staff). However, with all of these assessments and recommended actions it is important to ensure that a proportionate response is maintained and that actions are prioritised appropriately.

Prioritisation of risk is essential. For example, although there are contingency plans within UK Government Departments to deal with risks ranging from extreme weather to a satellite falling to Earth and hitting the UK (https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/61354/lead-government-department-march-2010.pdf), a structured approach to considering likelihood and impact is sometimes helpful in deciding how to best use limited resources.

1.10 Risk Prioritisation

There are a number of methods of risk ranking (e.g. as discussed by the European Food Safety Agency (EFSA) (van der Fels-Klerx et al. 2015)) ranging from a simple grid approach to quantitative assessments considering data uncertainty and detailed plant risk assessments for new species of plant/organism. A widespread, but simple, approach to prioritisation is to give the probability of a risk maturing a value from 1 (unlikely) to 5 (very probable) and an impact score from 1 (nothing appreciable) to 5 (major impact). Multiplying likelihood and impact gives a score which can be used to prioritise risks (Fig. 1.3)

Fig. 1.3
figure 3

Risk scoring matrix (PAS96:2014)

This approach has the advantage of identifying those risks which can be tolerated (green scale), those that should be treated if cost effective (pink/amber) and those that must be treated or transferred (yellow/red).

More complex quantitative processes and expert elicitation methods can be used to consider individual risks in significantly more detail which has benefits for policy makers to reduce risk profiles at national or international level.

One of the tools considered in PlantFoodSec was the so called PESTLE approach.

1.11 PESTLE

The so called PESTLE methodology was initially developed as a marketing tool but more recently has been expanded to assess impacts (with implicit risks) and to identify response triggers to complex scenario risks. The approach (or precursors) have been used since the late 1960s and provide a framework in which Political, Economic, Sociological, Technological, Legal and Environmental factors can be reviewed in a structured manner to produce a comparative framework that can be used to assess the relative management or impact priorities different scenarios. There are some differences to the simple 1–5 risk/impact method described above but once again a numerical score can be assigned for each PESTLE factor. The benefit of the approach is that it is flexible but because it is subjective a sense check should be included in the process to ensure it is not biased.

Experience has shown that one of the more effective approaches to scoring is to use:

  • negligible outcomes score zero,

  • low/very low outcomes score 1,

  • a medium one gives a 3 and

  • a significant/major outcome has a score of 9.

A non-linear approach encourages the assessor to differentiate which can be helpful in complex scenarios where key outcomes need to be identified.

The following describes a potential implementation of the approach. Examples are given for information only and do no describe a particular threat or vulnerability.

1.12 Political

There are several aspects to political risks and impacts ranging from whether national policies exist to support management of a given type of incident to considering the national and international impacts that might arise.

As an example, a malicious attack conducted using human pathogens on plants would require a multi-agency response with several agencies working in parallel. A clearly criminal act would require forensic investigation, affected persons would require treatment, guidance would need to be issued to consumers, epidemiology conducted to trace affected produce and steps taken to protect consumers and growers from further exposure. Coordinating activities would be necessary at local, regional, national and potentially international levels (Table 1.1). Understanding and managing these interfaces requires careful planning and very importantly exercising.

Table 1.1 Political criteria and scores – an example

In general, existing food safety legislation, phytosanitary and health protection measures at local, national and international levels could work closely with counter-terrorism and criminal investigation authorities although detailed briefing may be needed to give context to any incident. Whilst there may be some debate as to which agencies would take the lead (unless agreed in advance), existing coordination mechanisms should enable decisions to be made promptly. The lead department may also change as the scenario develops from crisis to recovery to restoration, with the latter perhaps being a lengthy process of return to normality. Rating political factors could therefore focus on mitigation and consequences.

Where the incident is self-limiting and no special powers need to be enacted, the scores will be relatively low. However, as the E.coli 0104 outbreak in Germany demonstrated (Caprioli et al. 2012; Appel et al. 2012) a significant but local challenge can quickly build up into an outbreak with serious international consequences. One feature of the PESTLE approach is that regular reviews are required as incidents progress. This can provide evidence of when the different phases of incident can be considered as being over.

1.13 Economic

Economic impacts of an incident affecting food plants can result from direct consequences or appear in the form of collateral damage. Direct impacts could include losses due to seizure and destruction of infected crops or withdrawal of foods from sale and remedial action costs (land remediation, enhanced biosecurity, treatment costs, etc.). Collateral damage could include loss of reputation and therefore loss of market share for affected foods or countries of origin or additional surveillance costs to allow positive release of fresh material. In positive release scenarios, the produce must be tested and shown to be contaminant free before release to wholesalers or retailers.

Fresh plant foods tend to have short shelf-lives with production chains being designed to allow a high turnaround of produce. Where the source of infection is unknown then collateral damage can be high because application of the precautionary principle will require intervention for more than the minimum number of products.

The numerical values in Table 1.2 are arbitrary and are for demonstration purposes only.

Table 1.2 Economic criteria and scores

1.14 Sociological

The impact of a disease outbreak on society depends upon the societal groups involved or targeted, lifestyle choice adjustments either chosen or enforced because of the outbreak, and the impact of control measures at a cultural level.

Using the Rajneeshee cult attack on salad bars example described earlier, targeting salad items would have a disproportionate effect on those who choose not to eat meat if such items were removed from restaurants or the wider marketplace. It is likely that societal pressures would only ease with proactive measures, e.g. positive release of foods as being contamination free or re-certification of plant seedstock, etc to build stakeholder confidence.

Where food supplies are scarce, migration may be induced by poor crop yields with substantial social impacts, including potential unrest and cross-border issues (Table 1.3).

Table 1.3 Social criteria and scores

Perception of risk or hazard is an important aspect of managing vulnerabilities in the food chain and the social and natural sciences must work closer together to better manage incidents in future.

1.15 Technological

In this proposed implementation of the PESTLE approach, some of the key considerations of a disease outbreak affecting humans from consumption of plants are given below. Note: Tables 1.4.1, 1.4.2, 1.4.3, 1.4.4, and 1.4.5 are guides and it is recognised that for each scenario the scores and criteria must be reviewed and revised to best suit particular circumstances.

Table 1.4.1 Infectious dose and scores
Table 1.4.2 Incubation period
Table 1.4.3 Transmission
Table 1.4.4 Diagnostic method availability
Table 1.4.5 Health impacts

1.15.1 Infectious Dose

If the disease is not infectious with little human to human transfer or inefficient transfer by known plant vectors, then it is unlikely to be a significant problem. However, some caution is needed as some groups within the population may be more sensitive than others (e.g., very young and very old or immune compromised individuals). Any assessments must therefore clearly identify the model boundaries to avoid mis-interpretation.

1.15.2 Incubation Period

There are scenarios where mass prophylaxis or intensified surveillance can reduce the impact of an outbreak. In general, the longer the incubation period, the more effective intervention can be at reducing exposure and infection but conversely time to impact will be longer and could result in wider distribution of the affected persons/foods.

1.15.3 Primary Route of Transmission

Once released, there are multiple routes by which the disease can move from host to host. This assessment considers disease vectors, e.g. in irrigation water, or via aerosol formation or manual inoculation.

This is different to infectivity which relates to susceptibility of the host to infection. A disease can be highly infectious but if there are no transmission vectors then it may be of limited importance. As weather patterns change, there are concerns that changes in insect populations may impact on vectors of disease, positively or negatively and this has already been observed in the animal kingdom with the progression of bluetongue disease across Europe (e.g. Mehlhorn et al. 2009) being a well-publicised example.

1.15.4 Diagnostic Method Availability

Although modern molecular methods enable rapid assessment of large DNA sequences, simple screening tests to enable positive release of produce may not be widespread. The EHEC E.coli outbreak in Germany in 2011 arose from a genetic mutation that allowed E.coli 0104 to express the toxin normally associated with EHEC. The ECDC’s Community Reference Laboratory and National Reference Laboratories were however, able to modify their procedures to detect this variant very quickly to support investigations.

1.15.5 Health Impacts

Human or plant health impacts are key to assessing the importance of a potential outbreak and the priority that is assigned for remediation. Some plant disease symptoms may only be a nuisance or affect the cosmetic appearance of the produce but others may be much more severe.

Health impacts of disease outbreaks are important to ensure optimal crop growth and yields, to allow efficient use as food/feedstock and ensure consumer safety.

1.15.6 Legal Consequences

There are two aspects to this part of the PESTLE analysis. One relates to whether there is legislation that can be used to support outbreak management and rapid epidemiological investigation. The other concerns whether or not that legislation has been applied effectively. The question of developing legislation has not been considered here as it is closely aligned to the Political issue review. Many countries have enabling legislation that allows a flexible response to an outbreak but that is not always the case (Table 1.5).

Table 1.5 Legal

1.16 Environmental Considerations

The impact of a disease outbreak on the environment can be significant. Major remediation activities can produce waste and interventions to remove the threat to consumers can increase levels of waste requiring special treatment, e.g. incineration to destroy infected materials. An outbreak of Foot-and-mouth disease (FMD) in 2001 (The Comptroller and Auditor General 2002) and again in 2007 (Anderson 2008) in the UK highlighted the importance of environmental impact considerations in disease management strategies. Waste disposal in some FMD cases in 2001 had a major environmental impact where open ground incineration was used. Additional vehicular transport to move waste to authorised disposal sites added to local environmental disruption and extra landfill sites were required to deal with the 1.3 million animal carcases disposed of. It is to be hoped that a plant disease outbreak would not reach these levels of disruption but the need to monitor impacts on the wider environment remains a useful lesson. Should soil sterilisation be required then the environmental impact could be significant from use of gaseous fumigants or liquid disinfectants (Table 1.6).

Table 1.6 Environmental

1.16.1 PESTLE Outputs

Table 1.7 is an example of how the approach could have been used to model progression the German E.coli outbreak. As in any proposed use of the tool, it is subjective and in this example not subject to external review or challenge (which should be part of any risk assessment undertaken in emergency response situations if time permits).

Table 1.7 A retrospective example of the PESTLE approach

As shown in Table 1.7, as the incident develops, the PESTLE score changes and priorities alter, a situation experienced emergency planners will recognise. With finite resources, it is now clear where priorities lie although as this table was produced after the event it does not reflect the difficulty of standing back from an incident to develop enhanced situational awareness. This tool can also be used to inform development of a Commonly Recognised Information Picture (as used by UK authorities (https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/192425/CONOPs_incl_revised_chapter_24_Apr-13.pdf) and others) to take a snapshot of a situation. Shared situational awareness and goals is vital if response to an incident is to be effective.

1.17 Plant Risk Assessments

Many countries undertake plant risk assessments and prioritise those organisms for which contingency planning is appropriate or equally those for which risks can be tolerated or treated. These assessments can be performed in advance of an outbreak and can support development of response plans.

Pest risk assessments (PRA) take several forms but contain similar information including:

  • The name of the pest – phylogenetic grouping can and does change which can add confusion for the non-specialist so it is important to explain the exact nature of the pest under consideration. Similarly the names of the disease or diseases produced by the organisms should be described.

  • The status of the pest in national and/or local legislation (including EPPO lists).

  • Background to the reason for a PRA.

  • Current geographical distribution.

  • Is the pest established or transient?

  • What are the pest’s natural and experimental host plants?

  • What is the economic and environmental importance of the host plants?

  • Does the pest need a vector for transmission?

  • Can the credible pathways upon which the pest may move be described?

  • How likely is it that this pest can become established either indoors or outdoors?

  • What geographical area is at risk?

  • Is there evidence of economic, environmental or social impact where it is already found?

  • Can the economic social or environmental impacts be estimated should the disease arrive here?

Outputs from this detailed assessment can be and are used to identify those organisms for which contingency plans are required.

Once again such assessments identify those organisms for which associated risks to plant heath can be treated, tolerated, terminated or transferred, e.g. by monitoring imports, increasing surveillance of growers, restricting use of high risk materials or using lower risk crops where this is an option.

1.18 PlantFoodSec

The PlantFoodSec project builds on existing national (e.g. https://www.gov.uk/guidance/plant-health-controls) and international arrangements (e.g. through the Food and Agriculture Organisation, World Health organisation IPPO and EPPO) to support growers to consumers in the “seed to salad” food chain.

This chapter has focussed on a variety of methods available to identify vulnerabilities and perhaps the main ones this project has sought to overcome are a lack of shared understanding across the various compartments of the food chain, a common lexicon to avoid misunderstanding, appreciation of technical limitations and future technologies and assessment and communication of risk.

There is no intention to repeat the detail found in other chapters of this book but when considering vulnerabilities and gaps, the following project activities to develop a toolbox that will be of value for many years to come, are of note.

Information gathering is key when considering vulnerabilities in a very complex area as prioritisation is only possible if based on evidence. Within this project substantial effort has gone into establishing a list of key crops of interest to EU consumers and the diseases that might impact upon them. With over 450 crops and 500 diseases being considered, this was a major undertaking and the tools developed to ensure a consistent approach to prioritisation fill an important capability gap.

Those diseases that impact on humans, the so-called Human Pathogens on Plants (HPOP), are used in examples given in this chapter but were part of a larger study conducted by specialists within the project. The PESTLE approach described above was one of the outputs of this work.

As discussed above, detection of when a disease is present, particularly in the pre-symptomatic phase is a challenge. Maintaining a consistent approach across Europe to both undertake presence/absence examination and more detailed contaminant species/toxin identification is not easy. Within this project, work has been undertaken to identify those laboratories with the necessary technical capability, to critically review methodologies and share understanding of performance criteria between national experts. In addition, expanding technical capability and capacity through formal training courses in both general and specialised test methods has boosted EU capability to respond to an incident. Extending analytical capability to forensically discriminate between strains is not trivial but is essential to support epidemiological investigations. The vast majority of food poisoning organisms occur naturally and, as the E Coli outbreak in Norther Europe has shown, mis-identification of the causative agent can have disastrous consequences. Maintenance of a diagnostic network to support responses to future outbreaks and encourage efficient information exchange are important outcomes of this project.

It is because food borne and plant disease outbreaks do occur from time to time that tools are needed to help authorities decide if an outbreak is a natural or due to malicious intervention. Logic trees have been used for many years to support risk assessments but the tools developed in this project not only incorporate expert opinions but also consider uncertainty or lack of evidence. It would not be unusual for a new or poorly studied disease to have high levels of uncertainty over behaviour in the food chain although use of analogues could be helpful. Models incorporating uncertainty are important as they can provide more realistic indications of priority areas for research or intervention.

Much of the work in this area suffers from a lack of credible scenarios with many being protectively marked because of sensitivities over vulnerabilities that could be exploited for malicious purposes. Nevertheless, within this project over 100 scenarios have been developed and considered allowing the toolkit to be evaluated and benefits identified. This approach will have benefits beyond the plant food chain into wider emergency response.

The project team recognise that incidents will occur and it is important to be able to deal with them. Developing strategies of generic importance is a valuable result from this project, in particular emphasising the importance of taking a broader perspective. In one example considered by specialists in detail, endemic contamination of an onion crop by a fungal agent cannot be controlled by simple remediation methods, in part because of disease reservoirs in wild plants in the margins of grower’s fields. Switching the type of product to a more resistant variety appears to be a pragmatic solution to restore production to previous levels and yields. Maintenance of a wide genetic pool of commercial crops is becoming increasingly important to mitigate outbreaks in high yield but susceptible crops. Ensuring national and international crop and pathogen collections are maintained and shared remains a key risk mitigation activity.

Within the Emergency Response community, significant effort is expended on dealing with the crisis phase of an incident and this phase is exercised at local, national and international levels. What is much more difficult to exercise is the recovery phase of an incident and for that reason the return to normality (whatever that may be) is less well practiced. Recently the UK published a recovery handbook for biological incidents which considers a wide range of contamination events, responses and recovery strategies (Pottage et al. 2015). Although not specifically aimed at plant disease outbreaks, there are lessons for those responding to HPOP issues and where food chain biosecurity needs are important. Some of the data contained on disease aetiology, survival in the environment and disinfection choice have wider utility.

With a project team encompassing major European countries and candidate EU member states, Israel and the USA, perhaps the key gap that this project has filled is in developing a shared understanding of the topic at an international scientific level. Further work is needed to reinforce the successes of this project and development of a virtual Centre of Competence of Plant and Food Biosecurity is one way of doing this.

1.19 Conclusions

Within this chapter some approaches to identifying vulnerabilities and their prioritisation for resolution have been considered. Of necessity, this chapter has drawn heavily on experience learnt from disease outbreaks that do not affect plants but the fundamental principles remain valid. The PlantFoodSec project is part of a wider programme of studies funded by the EU to enhance resilience to malicious, accidental and deliberate releases of infectious agents and there is little doubt that a number of capability and capacity gaps have been filled at its conclusion.