Foot-And-Mouth Disease Virus

Great Essays
Introduction
Defined by the Patriot Act of 2001, critical infrastructures are; "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters" (107th Congress, 2001). The National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience (NIPP 2013) guides the national effort managing risks that may threaten our Nation’s critical infrastructure. The NIPP identifies 16 critical infrastructure sectors (derived from PPD-21) which are vital to our Nation. These critical infrastructures
…show more content…
The foot-and-mouth disease virus (FMDV), more commonly known as foot-and-mouth disease (FMD), is an extremely contagious disease that affects all cloven-hooved species such as beef and dairy cattle, sheep, and swine. FMD is caused by genus Aphthovirus of the Picornaviridae family of which seven serotypes are recognized; including the three known as type O (now named the PanAsia strain), type A, type and C; types A and C both were present and responsible for the 2001 FMD epidemic in the United Kingdom (Arzt, Baxt, Grubman, Jackson, Juleff, Rhyan, and Rodriguez, 2011, p. 305). FMD is transmitted by direct contact between infected and susceptible animals, and by indirect contact with contaminated animal products (meat, raw milk, hides) and their feed, bedding, and equipment use for their maintenance. The disease can become airborne; when it does the spread of FMD occurs rapidly where large numbers of animals are in close proximity. According to Olsen, “The animal-to-animal airborne transmission range is 50 miles” and being an extremely stable virus, FMD can survive in bedding, on equipment, or even clothing for 1 month (2012, p. 4). An important feature of the disease in relation to its infectivity is that it may be excreted before signs become evident; thus the infection may spread before the farmer is aware that his herd …show more content…
The sector-specific plan listed goals include; improving the sector’s overall situational awareness, assessing all-hazards and risks, supporting the response and recovery, and improving analytical methods used to bolster prevention and response efforts (USG, 2015). Preventing a surreptitious and deliberate agroterrorism attack is problematic. It, therefore, becomes necessary to focus our attention elsewhere. Early detection, accurate diagnosis, and the use of advanced vaccinations will limit the overall impact. In fact, advances in technology and animal husbandry may soon eradicate FMD altogether thus eliminating the

Related Documents

  • Improved Essays

    Nt1310 Unit 1

    • 676 Words
    • 3 Pages

    There are several possible types of terrorist attacks using Weapons of Mass Destruction (WMD), using conventional firearms and explosives, or ”other means of attack (including low-tech devices and delivery, attacks on infrastructure, and cyber terrorism)”, (FEMA, 2002, P. 9). Each type of attack or a combination of several will need its own action plan by emergency managers and emergency responders, making the identification of the type of attack and weapon used critical. If an attack occurs, one tool available to a jurisdiction is the Threat and Hazard Identification Risk Assessment (THIRA), which summarizes the “threats and hazards of concern showing how they may affect the community” (DHS, 2013, P.1). The THIRA will outline the possible risks that would be facing emergency responders after a specific disaster and what they might face (FEMA, 2002). For example, the guide describes the threat of radiation after a nuclear/radiological attack, or the threat of contamination after a chemical or biological attack.…

    • 676 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This pathogen is in the Orthopoxvirus genus, and is one of the largest animal viruses. There are many other similar viruses in this genus, some of which can also infect humans, but are less virulent. The Variola major virus is a parasite that attacks a specific type of host organism, namely human hosts, and cannot be transmitted through insects or animals. Transmission through aerosols in the environment is the most common, as this virus cannot survive in the environment for long. The easy method of transmission, along with the virus’s ability to evade the host’s immune system, makes for a deadly pathogen that caused global pandemic.…

    • 854 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    12. Which is the worst of the filovirus “sisters”? What is the kill rate in humans? 13. Describe the information provided by “Mr. Jones” concerning the Marburg virus.…

    • 1002 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Summary of the “Yes” The Department of Defense is a part of the executive branch of the United States government that deals with national security and the Armed Forces. In the Department of Defense there are three subordinate military departments: The Department of the Army, The Department of the Navy, and The Department of The Air Force. The DOD is planned to have a unique role in the comprehensive response effort for the Ebola outbreak as discussed by Michael Lumpkin during the Senate Appropriations Defense Subcommittee hearing on November 12th, 2014. He stated that these efforts are, “a national security priority in response to a global threat”.…

    • 2181 Words
    • 9 Pages
    Great Essays
  • Great Essays

    The Bioethics of Bioterrorism I. Ethical Question It is universally accepted that bioterrorism, or the use of viruses and bacteria to spread disease and cause panic (“Bioterrorism”), is wrong and inhumane. However there is still a question as to whether or not research into biodefense, or the mechanisms used to battle bioterrorism (“Biodefense”), should be allowed. II. Background…

    • 1499 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    This highly contagious zoonotic disease (like avian or swine flu) also has a very fast mortality rate. Killing someone in under 24 hours in some cases. There are three different types to this painful plague that…

    • 1074 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Cows were fed meat and bone meal from infected sheep. (Bassert, 2008) Between then and 1992, there were over 190,000 confirmed cases. The origins are unknown, but it is…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Spillover Chapter Summary

    • 1492 Words
    • 6 Pages

    Some also have amplifier hosts, which is where the reservoir hosts transmits its pathogen to another animal, which can then transfer it to humans. Throughout the book, the author includes his own personal field experiences, like gorilla hunting in the Congo and netting bats in China. He tries to answer why these diseases arise when and where they do. The big question is when will the Next Big One emerge and “spillover” into humans.…

    • 1492 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Bioterrorism is terrorism involving the release of toxic biological agents. Common biological weapons are anthrax, botulism, plague, and smallpox. The plague has been one of the most devastating epidemics to mankind, second only to smallpox. Humans can become infected after being bitten by fleas that have fed on infected rodents. The plague develops rapidly and carries a high fatality rate despite immediate treatment and antibiotics.…

    • 1860 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Public-private partnerships are “effective for critical infrastructure protection and resilience strategies, and that timely, trusted information sharing among stakeholders is essential to the security of the nation’s critical infrastructure” (Homeland Security, 2006). The National Infrastructure Protection Plan (NIPP) creates a plan that that allows a partnership in protecting the critical infrastructure between federal, state, regional, local, tribal, territorial, and international governments to work with each other and…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    As explained in The Gale Encyclopedia of Science, “Humans became infected only through the bite of a flea that has ingested blood from an infected rodent. Another route of transmission is through person-to-person contact. If a person’s lungs are infected with the bacteria, the disease can be transmitted easily to another person…

    • 2531 Words
    • 11 Pages
    Superior Essays
  • Improved Essays

    Anthrax History

    • 665 Words
    • 3 Pages

    Historical Use of Anthrax The first anthrax bomb of the West was dropped onto Gruinard Island in 1942. The test was conducted by a British team while American officials observed (Mangold & Goldberg, 2000). The test provided disturbing results about how badly an anthrax weapon could contaminate a targeted area. It took half a century to finally clean up the anthrax contamination but the tests proved that anthrax could be produced, weaponized and transported quite a distance to inflict damage to a target location (Mangold & Goldberg, 2000).…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    This virus later became known as the Motaba virus when it later reemerged in Africa in the 1990s. Eventually, outbreaks…

    • 613 Words
    • 3 Pages
    Improved Essays