Global Food Defense InstituteProtecting the Food, Agricultural and Chemical Supply From Intentional, Deliberate Contamination and Adulteration1 Contact Us send
We believe that the Client experience is ongoing and isreflected in the long-term results. We believe that Customer ownership and loyalty are thekeys to our success. We will never compromise the quality of our work.We will consistently create a great experience for ourcustomers, one project at a time.We are creating a culture of belonging, inclusion anddiversity.We believe food defense is not a job but a passion.Global Food Defense InstituteWe at the Global Food Defense Institute are committed to providing exemplaryservice to our clients; services that far exceed their expectations. We take pridein our work and our ethics are beyond reproach.The Threat Is Real… But So Is Our Response!! The tragic events of 9/11 reshaped our nation and the entire world. As such, companies located domestically here in the United States and around the world are being challenged each day with new opportunities to better protect their assets, their employees, products and all of their stakeholders. There is a growing demand for better security at companies all across the nation. A company's survival could depend on how prepared they are to prevent and respond when disaster strikes.Vulnerability - Risk Identification, Recognition and Mitigation: Disasters could come in many forms ranging from catastrophic weather events, an active shooter at your facility or workplace, or a terrorist or protester determined to cause harm to your people, products, image or brand.World Class Solutions That Work! Society is becoming more complicated and diverse. News travel faster and the general public have much more access to information. It is critical and imperative that companies and facilities are prepared for whatever crises may occur within their organization – prepared not only to deal with each situation but also to inform various audiences about what is being done.Global Food Defense Institute32Our ValuesFood Defense Emergency Preparedness &People/Asset Protection
Global Food Defense InstituteFood Defense Yesterday, Today and Tomorrow! Situational Response: Product Tampering & Threat Response Workshop Understating Crime and The New Face of TerrorismFDA Food Safety Modernization Act (FSMA)Developing Mitigation StrategiesIdentifying Actionable Process StepsLearn the Key Activity Types/Hybrid Assessment MethodologyEconomically Motivated Adulteration-Food FraudCompliance with GFSI and other Food Safety/Defense Audit Schemes Developing Your Facility General Food Defense Security Plans and ProgramsEmergency Evacuations,Cargo & Transportation SecurityBomb/Threat Response ProceduresKey, Lock and Seal ControlProper Mail HandlingCCTV & Card Access Chemical Storage Systems SecurityShipping/Receiving Warehouse SecuritySecurityVisitor and Contractor Natural Disasters/Weather PoliciesEmergency PreparednessSecurity Guard PersonnelGlobal Food Defense InstituteSite Specific Security Vulnerability AssessmentsCrisis Management and Hostile SituationsCrisis Management WorkshopActive Shooter Response and Safety ProtocolsActive Shooter Video-Run, Hide, FightDeveloping and Implementing Facility Specific WorkplaceViolence ProgramsHow To Conduct Internal Tampering Investigations Conducting InterviewsUnderstanding Body Language and other signs of deception Recalls: Evidence Gathering 4 5FSMA I.A. Rule:Food Defense Management Intentional Adulteration Certification Training
Global Food Defense InstituteVulnerability Assessments are an important first step for any facility or operation,as it provides a critical analysis of what possibilities may lurk within or outside ofthe operation in which someone with ill intent could do harm to people, products and assets. Facility Readiness: Facilities can go a long way to better protect their employee’s and products. The Global Food Defense Institute utilizes the FDA’s Carver Shock, Operational Risk Management and other assessment methodologies, and have developed a set of measurable components which will allow a company to clearly show that it is in compliance with and is aware of the guidelines and recommendations for asset, facility and product security according to the FDA and FSMA. Increase and broaden awareness of management and front line workers, to enable them to better and more quickly identify hazards and other acts of suspicious behavior. Establish a baseline by which to enhance and enforce security procedures and protocol at your facility. Without developing this baseline, one could assume that security is not important or on the minds of others, and therefore, may present an opportunity for a criminal act. If a baseline has been established, this could be an opportunity for a facility to evaluate and assess the facility’s bearing with regards to security. Global Food Defense InstituteIdentify events or threats that could potentially pose a threat to the business continuity, brand image, reputation, products and people. Further, by identifying these potential threats, a facility could develop response measures, incident recovery and business restoration. Identification of internal exposures and self induced threats, which could be potentially hazardous to the operations of the business. Examples of internal exposures would be those protections in place to guard or mitigate events such as workplace violence, theft, or internet/intranet system compromise and breach. Enhances the overall culture of security at a facility by allowing employees and management to develop the essential skills and build expertise in the area in which they work that focuses on security events that may affect the operations or personnel of the business. Further, a vulnerability assessment serves as a communication tool, to enable others to become engaged in the overall security effort, planning and procedures. 6Several benefits to conducting a GFDI vulnerability assessment at yourfacility: 712Strategic Mitigation StrategiesFDA/FSMA Compliant345
Global Food Defense InstituteA food ingredient's vulnerability to fraud increases with the complexity of the supply chain. While this is related to the traceability of an ingredient through the supply chain, traceability in the absence of oversight and controls does not preclude the potential for fraud. The vulnerability of the supply chain is related to the degree of "control" that is held by parties with a vested interest in preventing fraud at various points in the supply chain. The optimum scenario with the lowest vulnerability can be described as a single ingredient food sourced directly from a known, trusted supplier, who in turn, sources from a known, trusted supplier. In theory, the scenario presenting the greatest vulnerability for adulteration is when ingredients are sourced from multiple sources in an open market where there is limited knowledge about the supplier and when the ingredient, either because of storage, transportation, or processing, is handled by multiple parties and the source identity is lost or not actively tracked, as when ingredients are blended.Conduct a product supply vulnerability assessment with close examinationof contributing factors such as supply chain, audit strategy, supplier relationship, history of supplier quality and safety issues, susceptibility of quality assurance methods and specifications, testing frequency, fraud history, geopolitical considerations and economic anomalies.Conduct an impact assessment in relation to the product, brand and economic impact on the organization if fraud were to occur. Development of a mitigation strategy, response protocol and readiness plan. This includes training and education of food fraud to members of management and others. Global Food Defense InstituteAssist with providing guidance and instruction to your designated security coordinator, to assist with the creation and implementation of your company security and loss prevention plans and policiesReview the facility Vulnerability & Threat Assessment and work with the designated facility security representative with the implementation of the recommendationsCreation of daily Security, Safety and Loss Prevention Audits for the facility.Train, provide guidance and assist with the creation of security “SPO’s” (Security Performance Objectives) for the facility security officers/teamReview existing policies and procedures for conducting internal investigations including, but not limited to financial investigations, background checks on personnel and business associates. Make recommendations on what else is essential for a full security program. Insure that all alarm systems are in working order. Provide Employee Awareness training to all employees.8The Global Food Defense Institute has been on the leading edge of assisting companies identify and protect the integrity of their products and brand. With regards to Food Fraud, GFDI recommends a three-step approach:9123Economically MotivationAdulteration: Real Life Experiences:Practical Training Courses &Services Food Defense and Security PlanFood Fraud Understanding, Training and Assessments
A critical element to the continued success of the safety, security and defense of the food infrastructure is our ability to conduct efficient and effective investigations of suspected product tampering. The FDA’s Federal Anti-Tampering Act outlines elements required for an act to be considered product tampering. Particularly, Section 1365 clearly states that anyone who tampers with any consumer product, its labels or containers with disregard for the risk that another person will be injured or placed in danger or death will be subject to a fine or imprisonment. The Global Food Defense Institute has conducted dozens of product tampering investigations for organizations of every size. Some of the investigations have resulted in criminal prosecutions of those identified and responsible. Investigate any tampering event or threats to your products, assets andpeopleDevelop a tampering investigation plan to address and comply with the requirements of FSMADevelop, identify and interview potential persons of interest/witnessesProperly document the facts and circumstances surrounding the tampering eventGather, secure and properly process any and all evidence surrounding the incident protecting and preserving the integrity of the evidence for further processing or presentation to prosecuting agencies. Coordinate with authorities, legal representatives and others who are involved with the incidentIdentify those person(s) responsible for the tampering event, and provide guidance on establishing preventative measures to prevent future occurrences.Global Food Defense InstituteGlobal Food Defense InstituteReview Crisis Prevention and Response plans to several different typesof potential incidents Conduct role-play scenarios with Management and Supervisory personnel to insure continuity of understanding of the established company crisis plansReview and make recommendations to insure clear and precise communication strategies to use in the event of a crisisReview existing security back-up resources are in place and available in case of a crisis (flashlights, mass notification systems, alarm systems, etc.)Insure that the Crisis Mitigation Response policies are clear and comprehensive. 10Our skilled and experienced investigators can assist you with the following: 11Product TamperingInvestigationsFacility Security &Crisis Incident Management Plan
Global Food Defense InstituteWrite and implement a company-wide workplace violence policy that addresses all forms of violence in the workplaceInsure that management and staff are trained to recognize the early warning signs of workplace violence.Teach and instruct management and supervisory personnel on the varioustypesof workplace violence and how to deal with themTrain and education of staff on how to deescalate a brewing workplace situation with the potential for violence.Assist with the investigation, evaluation and resolution of workplace violence incidents.The Global Food Defense Institute can deliver tried and trusted management and employee training programs that will help your staff prepare, identify and respond to events of violence in the workplace. We can also assist you with the development of essential policies that can aid in prevention of Workplace Violence at your facility.Global Food Defense InstituteAggressive or hostile behavior that creates an objective reasonable fear ofinjury to another person or subjects another individual to emotional distressIntentionally damaging employer property or property of another employeeHitting or shoving an individual with any part of one’s body and/or object;Threatening to harm an individual or his/her family, friends, associates, or their propertyThe intentional destruction or threat of destruction of property owned, operated, or controlled by your companyMaking harassing or threatening telephone calls, or sending harassing or threatening letters or other forms of written or electronic communicationsIntimidating or attempting to coerce an employee to do wrongful acts, as defined by applicable, law, administrative rule, or policy that would affect the business interests of your companyThe willful, malicious and repeated following of another person, also known as “stalking”, and making of a credible threat with intent to place the other person in reasonable fear for his or her safetyMaking a suggestion or otherwise conveying that an act to injure persons or property is “appropriate”, without regard to the location where such suggestion occursPossession of a weapon while on employer property or while on employer businessCommitting acts of violence motivated by, or related to, race, age, color, national origin, religion, sexual orientation, sex, disability, marital status, sexual harassment or domestic violenceViolent behavior also consists of threats and acts of aggression. Some examples of threats are remarks of revenge and abusive and obscene statements. Acts of aggression are abusive behavior, such as stalking, pounding of fists, stomping, swiping at objects, tearing paper and tampering with property, in an attempt to intimidate, inflict harm or destroy property.12 13Acts of workplace violence can come in many different forms. Some ofthose are:Workplace Violence Training
Global Food Defense InstituteAccording to the US Occupational, Safety and Health administration, an ActiveShooter is an individual actively engaged in killing or attempting to kill people in a confined and populated area. In most cases, active shooters use firearms(s) and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. Typically, the immediate deployment of law enforcement is required to stop the shooting and mitigate harm to victims. Because active shooter situations are often over within 10 to 15 minutes before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation. Global Food Defense InstituteWays to "profile" a potential shooter. What are some common characteristics?Development of an Active Shooter Threat Response PlanHow to recognize the early "warning signs" of an active shooter by simply looking at conditions at your facilityWhat to do when an Active Shooter is in your facility or vicinity.What to do when LawEnforcement arrives on the sceneLearn ways to "fight-back or take-out" an active shooter when all else fails and evacuation isn't possibleHow to manage and learn from an active shooter situation or even14Some of the areas the training will focus on are:15Survive! Active Shooter Response & Protection Training for Employees
Global Food Defense Institute Global Food Defense InstituteUnderstanding Food Defenseand Facility ProtectionUnderstanding FSMA/FDAYour role in Food DefenseRecognizing Suspicious PersonsParking Lot Security/Visitor Facilitation Understanding Terrorism and Intentional Tampering at a Food FacilityShipping and Receiving SecurityCargo SecurityProper mail handling Checking in visitorsReviewing drivers licenses and other credentials Recognizing and dealing with suspicious personsHandling a bomb threat Understanding and using CCTV, Developing and maintaining a key control program Emergency Evacuations Dealing with threatening telephone calls Cargo Security Personal Security/ProtectionCertificate of Completion with a GFDI Seal of Security Awareness, Chemical Control/Laboratory Security How to handle suspicious packagesBuilding Access Policies. Preventing Piggybacking/ Tailgating. Why this is important.Emergency Evacuations Active Shooter Protocols: Run, Hide, FightPersonal Safety and Protection: Don’t be a victim!16 17Introducing: StreetSmartReceptionist/Front OfficePersonnel Security Training Interactive Security Awareness TrainingFrontline Employee Awareness
Learn how to secure productsthat you transport from wouldbe attackersDevelop ways to stagger your routes to make it difficult for the bad guy to figure outTaking Action if you suspect you are being followedFocused Mitigation Strategies Broad Mitigation Strategies Understanding and conducting “Mini-Physical Security Assessments” that can aid your clientsSecurity Penetration TestsSecurity CountermeasuresProtective Measures that can be used to increase physical securityCrime Prevention Through Environmental Design ConceptEmergency Evacuation Procedures and PlansDisplaying the proper credentials at a food plantWhat to do if you are hijacked! Know if the products you are carrying is a target for terrorism or theftUnderstanding and complying with concealed-carry lawsFight back-Safety TipsGlobal Food Defense InstituteHow to properly check and verify identification credentials Ethics & Integrity of a license, Passports, Company ID, etc. Understanding your role/Performing a “Quick Search” of a facility and working in apartnership with other first responders in the event of an emergency. Proper Mail Handling & Safety PrecautionsResponding to the Threat of TerrorismHandling Suspicious PackagesConducting proper and professional Emergency EvacuationsCreating & Understanding Post OrdersOfficer Patrols…Foot, Segway and VehiclesDeveloping and enforcing no trespass lawsDeveloping a parking program for your faclityProper Report Writing (Incident Report/Daily Activity Records)Recognizing and reporting discrimination/harassment at the workplace. Reporting Security IncidentsMedical Emergencies (AED and CPR) Practices and Post Orders CertificationTraining)Checking In Visitors Telephone & Bomb ThreatsDeescalating hostile situationsDealing with the MediaRecognizing and Approaching Suspicious PersonsCrisis Management for the Security OfficerLeaning the proper use of CCTV and Access Control SystemsResponding to an Active Shooter Situation…Security Officers Role & Crime andthe Community.Guards are not an uncommon sight in today’s food facilities. They can be an essentialelement of a company’s food defense program. The way guard services are used can vary at each location. The most important aspect of a guard service program ismanagement and training. A common food plant failure is to hire a guard service,implement the service, and fail to provide any oversight, guidance, or direction for theguards.The Global Food Defense Institute Security Office Training Program has set out tochange the “thinking” of security officers, by providing expert security training to thosepersons providing security services for the food and chemical industries. The GFDItraining program can be tailored for individual company security officers, whichenables the training to be “site-specific” to the needs and concerns of thebusiness/client. The training consist of the following topic areas: Global Food Defense Institute1918Cargo, Highway & Truck Driver Security Protecting Your Cargo From TerrorismPest Control Operator/Food SafetyAuditor Food Defense Vulnerability Assessment Training & CertificationSecurity Guard/OfficerTraining (Certification)
Global Food Defense Institute20The Global Food Defense Institute, LLC. Phone: (202) 368-3007Email: info@myfooddefense.com Website: www.myfooddefense.comThe Global Food Defense Institute Experienced Team of Food Safety, Law Enforcement, Crisis Management and Food Defense Experts!Rod Wheeler, Founder & CEODetective Dwayne Stanton(Ret), Law Enforcement/Crisis ExpertSecurity VulnerabilityAssessments Sherriff Dan Dytchkowskyj(Ret), Law Enforcement/Crisis ExpertSecurity VulnerablityAssessments Sarah Malenich FSMA Compliance Expert Food Defense Dr. Mike Fagel Emergency/IncidentManagement Luisa Tapia Food Safety/FSMA/FoodDefense Expert (ACET Global) Acet Global LLC. NSF InternationalFood Safety & QualityServices, LLCOur Food Safety Partners: