Two Letters Re: On Suture, Staples, and Glue for Wound Closure

James:

After reading David in Israel I had a few further suggestions. All open wounds do not have to be sutured, in fact most wounds that are dirty should not be sutured but allowed to drain, and heal by “secondary intention” or basically healing from within. Not all soft tissue wounds need to be cleaned, and dead and nonviable tissue trimmed away. Abscess and further extension of infection can occur with a dirty wound that it sutured closed. Wash with copious amount sterile water, dilute betadine, or dilute hydrogen peroxide. Non dilute solutions often can cause more damage to the tissue than necessary. Straight bleach, rubbing alcohol, vinegar are all too strong and will cause additional damage. Oral or IV antibiotics may be needed during this time. Now organ lacerations are a different animal, particularly with bowel wound, these need to be isolated and repaired. Obviously only a well trained person will be able to do “surgery” to this extent. Leaving sutures in can scar, so a rule of thumb is 10 days for most wounds, 7 for thinner skin, and 3-5 on the face. Obviously scar formation is less of an issue in a SHTF case, and some wounds may need to be over sutured in order to transport a patient over rough terrain etc, but these will need to be followed closely and even allowed to drain.
Staple guns work great, and pretty much anyone who has had surgery recently has seen how widespread they are used. Highly vascular skin heals just as well with staples as sutures.
Dermabond or cyanoacrylate works great for small wounds, I have even seen some ER docs use this over suture which I do not recommend as it is very difficult to remove the sutures, but makes for a strong barrier. – Mike M.D. in MO

 

Jim:

David in Israel gives some unfortunately common, and bad advice about suturing. Unless you know (like a physician or physician assistant/nurse practitioner) what is UNDERNEATH the skin, and how to suture them back together, untrained people should NOT close wounds.
The body is made of layers of different tissues – skin, fascia (underlying tough fibrous tissue), muscles (in several layers, usually) and other things, like blood vessels, nerves, and organs. Each of these layers has different ways of being sutured, requiring different types of suture materials and needles, and just sewing the skin closed will allow blood to leak out of vessels and decay, causing infection.
The best thing for the untrained to do if there is a deep wound is to wash it out (as David in Israel said) with clean water or saline solution (a teaspoon of table salt per quart of water), maybe with some Povidone/iodine (Betadine solution (not scrub), and then pack the wound loosely with gauze and let it heal from the inside out. Such healing will take much longer and leave a worse scar, but closing prematurely can be disastrous.
Other closure techniques (glue, staples) are great within their limitations. Glues should not be used on wounds under stress, and staples are great for small skin or scalp lacerations. Neither addresses closing the underlying tissues.
Even in normal times, a minor wound that has gone for more than a few hours (six hours, in my hospital) is left open for at least a few days, to make certain that no foreign materials are trapped in the wound, and are closed after 48-72 hours. The skills for suturing itself are quite simple – the knowledge to know when to and to NOT suture is not. – Flighter

JWR Replies: Suturing does have its purpose under some circumstances.  I recommend that you stock up on suturing materials, as part of a comprehensive set of medical supplies for your retreat. OBTW, I recall that the folks at Ready Made Resources (one of our advertisers) has pre-loaded surgical staplers in sealed sterile packages (tres cool) available for sale.



Letter Re: “Shooter” on The Draw Technique, or “Shooter’s Five Steps to Keeping Ten Fingers”

Jim,
I’d like to add three observations to Shooter’s otherwise outstanding tutorial on weapons drawing and presentation – “Shooter” on The Draw Technique, or “Shooter’s Five Steps to Keeping Ten Fingers”. First, it is absolutely critical to be aware of your state’s protocols for use of lethal force in armed encounters. The most common elements that must be met to protect yourself legally is opportunity, ability and jeopardy. Go to www.packing.org and review your own state’s statutes. Second, I highly recommend that prior to reholstering and reversing the steps of the draw stroke which Shooter outlined, the weapon is brought from extension to the midriff pointing perpendicular from your body in the same two handed position and you conduct a 360 degree scan without moving your body to assess any additional threats and then you reholster WITHOUT looking at your holster (this will take some practice). This 360 scan must become a habit for the rest of your life whenever your reholster. The intensity of focus and tunnel vision common in these “Condition Black” encounters can insulate the shooter from being alerted to any additional threats that may be around or emerged during the shooting. You will never exceed your highest level of training. Third, register or indexing of the trigger finger is critical for safety and efficiency. There is never a reason to do otherwise until you are ready to fire. This probably accounts for most negligent discharges (“NDs”) in police departments as a result of sympathetic flinch on the trigger during stressful situations or reholstering with the finger on the trigger. In conclusion, seek professional training in tactical shooting from a local school or a nationally recognized marquee like Thunder Ranch or Gunsite. Training dollars should become a household budget item. Cordially, B.B. in North Idaho



Letter Re: Getting Your Group to Buy In: The $20 Medical Kit, By EMT J.N.

Dear Mr. Rawles,
I was very interested in the blog on the $20 medical kit. I was thinking of the situation where in the event of a major storm, hurricane, blizzard, fuel crisis, nuclear attack or where transportation and communications are severely disrupted over a wide area for an extended period, it may not be possible to get to the doctor or pharmacy or if one could get there, it may not be open due to a lack of electric power or severe damage to the facility.

Instead of discussing a group buy, a more practical approach may be the development of several master lists of the items needed or names of the drugs, the approximate cost of these items, a place to buy them and the primary use of the drugs. Some obvious things needed were not included such as hydrogen peroxide to clean wounds, Pepto Bismol for indigestion, [syrup of] ipecac to induce vomiting, colloidal silver for internal and external use, a thermometer to take temperature, blood thinner for circulation problems, and curved needles and nylon thread for suturing wounds. Information to help identify and overcome dehydration issues would also be helpful. The $20 price cap may be too low. Is there a source where the general public can buy Novocain to deaden teeth for dental work, dental pliers to pull teeth, and some type of pain deadener to inject into an injury to kill the pain while the suturing is being done? Most people could not think of all of the things that may be needed and would not know where to get them if they did have the list. What is the answer to the problem of an inability to refill prescriptions because the pharmacy is no longer open? Are there substitute drugs available? Some people with heart problems, diabetes, kidney problems, and other major health problems may be at serious risk if their drugs are no longer available. Is buying drugs in advance from Canada or Mexico a realistic option considering that mail and parcel services may no longer be available after the disaster? I am talking about people with the resources to purchase these items and it would be a disservice to not include them in an effort to stay below a specific dollar limit. Does anyone know of any hospital supply companies that sell to the general public in small quantities? Some of these items are readily available without a prescription if the person can know that the item would be needed in an emergency and think to buy it before it is needed.

It may also be desirable to develop different lists to reflect different situations. The man hunting in the woods or cutting wood with a chainsaw has a totally different risk and needs situation as compared to the elderly lady who may never go into the woods or the pregnant woman who is expected to deliver within the next six months or the person on antidepressant medications.

Would some medical types, EMT, nurse, retired medical doctor, or other types familiar with these issues be willing to develop a comprehensive list to cover one or more of these situations or to provide links to other sites that may include such information to be posted here for the benefit of your readers? It would be greatly appreciated and could greatly assist people surviving in a future emergency.

It appears that most of the medical articles and books are too general and tell you to provide fluids, clean the wound, and see the doctor etc without specific instructions on what to do if the doctor and pharmacy are not available. Any information on low cost books on these subjects that provide the necessary details would be greatly appreciated. People hate to buy the book and later find that the specific drugs needed are not listed or are not available. – S.F.



Odds ‘n Sods:

Defense Aerospace reports: “Future of US Nuclear Arsenal in Flux after Peacekeeper Missiles De-Activated”  See:
http://www.defense-aerospace.com/cgi-bin/client/modele.pl?prod=66020&session=dae.17150781.1138033046.Q9UBgsOa9dUAAGt1mV8&modele=jdc_1

 

  o  o  o

Reader OSOM (“Out of Sight, Out of Mind”)  recommends the recent Popular Mechanics magazine article on “Worst Case Scenarios”  See: http://www.popularmechanics.com/science/worst_case_scenario/

  o  o  o

Check out http://www.FreeCycle.org. If you have the storage space, this is a great place to pick up free items for charity or barter.

 

  o  o  o

Some details and commentary on “Getting Ready for a Nuclear-Ready Iran” prepared by the US Army War College. (plus a PDF link to the original document) can be found at The Belmont Club. See: http://fallbackbelmont.blogspot.com/2006/01/coming-of-bomb.html



Jim’s Quote of the Day:

"For earthly princes lay aside their power when they rise up against God, and are unworthy to be reckoned among the number of mankind. We ought, rather, utterly to defy them." – John Calvin, 1509-1564



Note From JWR:

Please mention SurvivalBlog.com whenever your are a caller or a guest on a talk radio show. Keep spreading the word. Thanks!





Three Letter Re: Internet and Search Engine Privacy

Jim:
I’ve done a lot of experimenting on this and offer my take:

Rule Number One: The U.S. Government is monitoring domestic internet traffic. Anybody visiting Survivalblog is already suspect by the government because of it’s very subject matter. Assume that you are being monitored. Let’s not be naive here please.

Anonymizer is obviously monitored by the Government because it maintains logs of in/out IP Addresses.

Tor…the Onion Router is the best way to go if you have DSL or Cable high-speed internet connection because there is no central logging. I use it.

CCleaner [Cache Cleaner] at http://www.ccleaner.com/ is the very best way to keep your computer free of what snoops want. It is FREE, tiny, fast, easy, and I click on it after every internet surf. It instantly removes all tracking cookies. It also instantly removes all those useless internet temp files that clog/slow your computer. Download it FREE right now. -Book

 

James:

You mentioned that your readers might be interested in a brief write up of privacy on the Internet and how to keep yourself off of the radar. I’ll try to oblige.
First some background: My company and I do Information Security for small businesses, so we and I have experience in keeping private things private in the real world. What I’m doing is basically putting into text the Security Speech that I give any client who I consult for (and will sit still long enough to hear it). I’ll stay away from technical terms and specific products/’solutions’ until the very end where I’ll describe a few different levels of ‘security’ in real-world examples. Specific privacy stuff is further towards the end.
Rule Number One: There Is No Such Thing As A Secure Computer (or Anything Else)
Perfect security is impossible. Computer security researchers are fond of saying that the only secure computer is one that’s unplugged from the network, turned off, sealed in a vault and protected by well-paid guards, and they’re only partially joking. (Yes this is what passes for humor in the computer security profession.) No matter what steps you take to keep your stuff secure, someone, somewhere can break into it and steal them; given sufficient time and money all computers are vulnerable. The only thing you can do to an attacker is slow him or her down. All of modern security is devoted to slowing attackers down. This has two effects: it makes you less appealing to casual attackers and it frustrates determined attackers.
In WWII the Germans used an encryption device called “enigma” to send secret messages to their troops. They thought it was unbreakable. The allies broke it. The moral of the story is that what we think is ‘secure’ today will be as tough as tissue paper in fifty years.
Rule Number Two: Security Is Not A Product.
What I mean by this is twofold: one, anyone who sells you a “secure” widget is lying. Widgets, computers, servers and networks are not secure or insecure by their nature; they are merely tools. Any tool can be used for good or ill, just think of the climate concerning guns. This is a continuation of the first rule; not only is there no such thing as a secure computer, any steps that have been taken to create a more secure computer can be blown away by the mentality of the user. This rule probably should read Security Is A State Of Mind, but this way I can combine two rules into one. In a nutshell, every system is only as secure as the users of that system are willing to make it.
The canonical example of this is a hospital. Hospitals have insane oversight in terms of confidentiality of patient information and they can get in real trouble for letting the Wrong People see certain files. So the natural step is to make each level of access have a separate password and each user must login to separate authentication levels, blah blah blah. Its a ‘very secure system.’ End result? Nurses get tired of remembering so many passwords and write them down on sticky notes on the monitor. Security that is too hard to use will be defeated.
Rule Number Three: Your Computer Is A Castle.
Traditional security is a good analogy to computer security. Things that people would never do in the real world they don’t think twice about doing online. When you open an attachment you’re not expecting, its like licking your neighbor’s doorknob. When you blindly click ‘OK’ on every pop up window, its like walking around in a bad neighborhood with a roll of hundred dollar bills poking out of your pocket. Remember the Trojan Horse? Trusting everyone online will get you in trouble, just like in real life.
Likewise, when you evaluate a system for security the first place you look is the place where security is the weakest. If you double-encrypt everything and lock your computer in a safe but your password is ‘secret’, you’re not really secure. Always look at the big picture and don’t lose the forest for the trees. Likewise, if you have an uber-secure locked-down machine but its in an office where the cleaning staff have physical access, you’re not secure.
Rule Number Four: Security is Boring
This is the hardest thing to get right. The best way to be secure online is to do the little things all the time. Boring things like keeping your security updates up-to-date and getting an anti-virus. Being paranoid about your email and choosing the right software go a huge way towards keeping your stuff safe. Have a legal copy of all your software, especially your anti-virus. Pay for it. If you don’t want to pay for it, AVG anti virus is free and damn good. More detail later.
That’s it for the theory, there will be a quiz on Thursday. Now the practice. There are a few things that you can do to keep yourself secure and protect what little privacy you still have.
The first thing to know is that email is not secure. Think of email as sending a postcard, there’s nothing to stop anyone who touches it from reading it. Email is hard but not impossible to anonymize, but there are few remaining anonymizers left. Any old Hotmail or other free account will work for certain values of ‘anonymous’ but they probably will not stand up to a legal search warrant unless you are very careful. Gmail is not a good provider for anonymous email because of the invite system. Unless you can get an invite anonymously anyone tracing it can simply look up who invited you and compel them to spill the beans.
Another thing is that any site you visit on the web can get a huge amount of information on you that your browser just sends out on its own. Things like your IP address which can be traced to a rough location and if the government gets involved can probably be traced down to whoever pays the bills. This can be mitigated by using anonymizing proxies, Tor and privoxy. More detail further on
Yet another key facet is that anything that is on your computer is something that you are trusting fully. If you follow good protocol, you are trusting Microsoft with all of your data, and you are trusting whoever makes your anti-virus or firewall with all your data. There is precedent for law enforcement using the anti-virus update to compromise the computer of a group that was holed up in their cabin to prevent them from emailing out. In case I wasn’t clear, this has happened and will happen again.
Now for some details and the all-important links:
In terms of an operating system, Windows is the default and there’s no budging most people from it. With good practices and by keeping up to date you can keep windows tolerably secure. I would trust it for mildly embarrassing data but not critical data. Please upgrade to at least Windows 2000. Windows XP with Service Pack 2 is best. I know its expensive, but Windows 95, 98, and ME are outdated and not secure.
Since no one has access to the code that makes Windows tick, there is no way to determine for sure that there is not an easy back door that could be leveraged against you. I cannot recommend keeping mission critical data on a Windows machine. If you have a bit more freedom about what you run, I heartily recommend getting a Macintosh. The new Apple OS X is built upon a very secure BSD base and it strikes an excellent balance between usability and security. Any version of Linux or BSD can be made secure, but if you’re running those you probably know how to secure it.
Web browsers: There really is only one. Firefox is the best that has come along yet. It can be setup for decent everyday browsing and keep a good rein on your cookies and history. In the firefox settings, you can exercise very fine control over what sites are allowed to set cookies on your machine and when to expire them. Please do not use Internet Explorer on ANY OS. It is not secure in any way. A good addition is Privoxy and/or Tor. A must-have extension for Firefox is Adblock Plus and “Filterset.G”


Email client: I recommend either Mozilla Thunderbird, but basically anything but Outlook (Express) is acceptable. Outlook is massively insecure, Please do not use it.
Anti Virus: They’re all equally mediocre. I use AVG which is free for personal use. Pick one and keep it updated.
Firewall: Again, the windows firewall cannot be trusted. I recommend Kerio Personal Firewall, and I use it myself. Tiny Personal Firewall is good too. Zone Alarm is less powerful and Black Ice is worthless.
Proxies: Privoxy is a nice semi-anonymizing proxy that runs on your local machine. It can’t hide your IP but it will strip out a lot of identifiable information. Its pretty easy to set up too.
Tor is a very clever onion routing network that passes your traffic through a few levels of other machines so that theoretically not only does the site you’re visiting not know who you are, nobody could trace your connection back to you. An added benefit is that Tor servers are encrypted so your traffic is harder to snoop on as well as being more anonymous. The disadvantage is that this is SLOW.
Encryption: BestCrypt can create secure images that can be viewed on Windows and Linux.
Below I’m going to outline three levels of security and what they should be reasonably protected against.
The first is an easy to use everyday machine. You will be protected from most common automated and non-directed attacks but a determined attacker will still be able to penetrate as will a governmental entity. If there is demand I can work up a similar profile for a Mac.
Microsoft Windows 2000 or XP.
AVG anti virus or similar.
Kerio Personal Firewall of similar.
Firefox, Adblock Plus and Filterset.G set to only allow same-domain cookies.
Privoxy
The second is more anonymous but it sacrifices speed. You will use this if you want to do something that you wouldn’t want broadcasted.
The same as above except Firefox is set to expire cookies on close, and keep no disk cache or history. Privoxy is also connected to Tor for anonymization.
For email, Thunderbird and Enigmail can be setup to encrypt your email to a very strong degree, as long as the recipient has a similar setup. New Enigmail versions are very user-friendly in this regard.
Also, it is possible to have two different “profiles” of firefox on one machine, one that simply browses normally with sane cookie rules, and another that passes through Tor/Privoxy and keeps no history or cache and clears cookies on exit. This is simple to do and a good mix of usability and the ability to be more anonymous if desired.
One note: Remember that today’s “uncrackable” will be a joke in fifty years. Also, encrypted traffic will probably raise a certain level of awareness among those doing the spying. Legally this poses no problems but if you’re doing something you wouldn’t like discovered sending encrypted e-mails to osama@alqaida.com it is probably a bad idea.
A Proviso: The above two systems rely on closed code and trusting updates. They would be very vulnerable to any form of governmental intrusion and nothing can be done to mitigate this. IF YOU ARE GOING TO DO SOMETHING ILLEGAL, DON’T USE ANYTHING CLOSED-SOURCE TO DO IT WITH. If you do intend to do something illegal, or even if you’re just paranoid like me, a good idea would be to have a second machine. This is similar to what the NSA does internally: Classified machines cannot talk to Top Secret machines, and none of them can talk to Unclassified machines.
A good Classified or Top Secret machine might look like this. This machine should be reasonably secure against anything but a direct, physical attack.
BSD or Linux OS, properly configured (details are outside the scope of this article. I will be happy to provide further information upon request).
A solid, encrypted file system or BestCrypt for any user data.
Not connected to the network. Use a USB flash keychain/thumb drive for getting data off of it.
Again, none of this is any good at all if your master password is your birthday.
I hope someone finds this useful and I’m happy to answer any more detailed questions either via SurvivalBlog or directly. – Paedrig Hawkwing (PaedrigHawkwing-at-gmail.com–change the “-at-” to an @ symbol)

JWR Adds:  Our web statistics show that 19% of our readers now use the Firefox browser, up substantially from the 16% when we started SurvivalBlog back in August of Aught Five. My advice:  DUMP that back-door ridden, data mining Microsoft Internet Explorer. Firefox is free!

Hi Jim,
Another option for anonymous web browsing is to install Tor, an “onion routing” package that sends your data through ‘layers’ of different servers before reaching your desired destination. After I first installed Tor, I visited Google and was surprised to see it looked a little different — Google detected that I was coming from Austria (since the last server ‘layer’ was located there) and presented me with “Google Österreich”! Tor is free and easy to setup. The EFF has instructions for Windows ( http://tor.eff.org/cvs/tor/doc/tor-doc-win32.html) and OSX (http://tor.eff.org/cvs/tor/doc/tor-doc-osx.html ). Regards, – MP



Odds ‘n Sods:

A handy website for retreat location research can be found at: http://www.city-data.com/

  o  o  o

A SurvivalBlog reader mentioned that nationally syndicated radio talk show host Derry Brownfield has been talking about NAIS for years. See: http://www.derrybrownfield.com/

  o  o  o

There are some great links at:  http://www.bigsecrets.cc/prepare.htm

  o  o  o

The Pre-1899 Specialist reports that they have been going fast (since SurvivalBlog readers have been cleaning them out), but they still have a few Model 1893 Oberndorf Mausers available. They are considered Federally exempt “antiques”, so no FFL is required!

  o  o  o

As reported by Voice of America (FWIW, since it is produced by the U.S. Government), Israel has hinted at possible military action against Iran.





From David In Israel: On Suture, Staples, and Glue for Wound Closure

One of the most used high skill medical interventions is suturing. In times of disaster when qualified medical practitioners are not available, suturing can be performed easily as long as it is not in nerve rich areas such as the face and hands. (Sutures in these areas could cause debilitating nerve damage and should only be attempted by a person that is specially trained.)

1- Suture. I will not attempt to describe the knot in writing but practice with forceps and pre-threaded suture packs on raw chicken or turkey skin on the bird (sew then eat). Keep Ethylon 5 and 3 as well as chromic gut 3 in your gear. Generally, gut is used for internal sutures and Ethylon for removable [external] sutures.

2- Surgical Staple Guns. For surgical closure, staple guns are an easier but messier way to close a wound. Stapling can even be performed one handed.

3- Glue A close chemical relative of cyanoacrylate “super glue” (2-octyl cyanoacrylate) is available from veterinary suppliers as vetabond. See: http://en.wikipedia.org/wiki/Cyanoacrylate
Super glue cyanoacrylate is an irritant, so sensitive tissues especially need the dermabond/vetabond formula. For the face and hand wounds just butterfly closures or glue [instead of sutures], unless you have special training in nerve and vascular location.

Wounds needing suture must be fully cleaned, preferably with betadine and even then they still have high risk of infection. If there is sign of infection open and drain. Consider systemic antibiotics.



NAIS: What Does it Take to Raise an Alarm These Days? by Ken Anderson of “All Maine Matters”

I can remember when 1984 was a scary book. Today, it seems that we worry only about those things that we’re told to worry about, and accept the answers that are given to us, no questions asked. On September 11, 2001, three passenger planes were crashed into the World Trade Towers and the Pentagon, while a fourth came to fiery rest in a Pennsylvania field. Less than a month later, the USA PATRIOT Act was introduced in Congress, to be signed – more than 300 pages of it – on October 26, 2001 with few objections from the public or its elected representatives.
I am not about to join those conspiracy theorists who claim that an agency of the United States government was responsible for the 9-11 attacks, but it does seem clear to me that the USA PATRIOT Act had been already prepared, waiting in the wings for just such an occasion.
United States citizens were happy to trade in their rights for the sense of security offered by this Act.
Certainly the 9-11 attacks justified the media frenzy that followed it, but it also served a number of purposes that our government took full advantage of. But that’s not what this article is about.
Over the past couple of years, we’ve been subjected to a series of media scares relating to our meat supply. From Mad Cow, to swine flu, to e.Coli, to mutant flesh-eating viruses, and now the Avian flu, we’ve been led to believe that if we don’t act immediately, we’re all going to die.
Enter the National Animal Identification System, a governmental program which utilizes public-private partnerships in an attempt to identify and track every animal in the United States.
And despite the fact that we haven’t had a single case of Mad Cow or the Avian flu transmitted to humans in the United States, and that the NAIS couldn’t possibly do a thing to prevent contaminations of our meat supply occurring after the meat has been processed, we’re all expected to expel a deep sigh of relief.
Uncle Sam has come through for us again.
But at what cost?
The National Animal Identification System will force farmers, hobbyists, and even pet owners to register each animal they own, and tag that animal with an identifying tag, band, or implanted electronic chip, for the purpose of tracking that animal through the food chain whether or not it even enters the food chain.
When fully implemented in January of 2009, the NAIS will require two types of mandatory registration: registration of the premises, and registration of the animal.
Anyone who owns even one horse, cow, pig, sheep, chicken, pigeon, or any other livestock animal will be required to register their home, including the owner’s name and other identifying information, along with the address of your farm or home, to be keyed to global positioning system (GPS) coordinates in a federal database under a 7-digit “premises ID number.”
Additionally, each animal will have to be identified with a 15-digit ID number, also to be kept in the federal database. Even if you are raising your own food, your animal will be required to have an ID number if it is to be sent to a slaughterhouse. Animals that do not have an ID number cannot be bought or sold, or used to obtain stud service.
Any animal that leaves the owner’s premises for any reason will be required to have an ID number, and be tagged. This includes animals that are shown, as well as horses that may be ridden off of the owner’s property.
The costs of this program are to be shared by the animal owners and the larger base of taxpayers, meaning that there are likely to be significant fees connected with full implementation of the NAIS program.
Large-scale meat producers are on board with the program, perhaps because they’ll be given a break. Large herds of cattle, pigs, or other animals raised and processed together can be identified by a single group ID number, while farmers and ranchers with small groups of animals will, in most cases, have to identify each animal individually for purposes of breeding, sale, or slaughter. If you own two cows, a horse, and twelve chickens, each would require an individual ID number if the animal is ever to leave your property for any reason, or have any contact (commingling) with any other animal.
The form of identification will most likely be an ear tag or implanted microchip containing a radio frequency identification device (RFID) which can be read from a distance. In addition to RFID tags, some industries may require the use of retinal scans or DNA identification for all animals.
The costs associated with this program may well be beyond the reach of small farmers and hobbyists, and make it impractical, from an economic standpoint, for people to raise their own meat.
The costs are not only economic, but time consuming as well. Within the system, animal owners will be required to report the birth date of each animal, including chickens, as well as the application of the animal’s ID tag. Every time the animal enters or leaves the premises, this will have to be reported. When a tag is lost or replaced, this will need to be reported. If an animal dies, or goes missing, there will have to be a report. These events will have to be reported to the government within 24 hours.
With full implementation of this program in 2009, the USDA intends to ensure compliance with NAIS regulations in a manner not yet specified, but which could be expected to include fines or seizure of animals.
Another possible reason for the enthusiastic support of the NAIS program by large-scale meat producers is that, as stakeholders in the program, they will likely have control over much of it, perhaps putting them in a position to exert economic pressures on competing small farmers and homesteaders.
Will implementation of the NAIS make our meat supply safer? Probably not, and it’s not likely that we’d know if it did. It’s not like people are dropping like flies from Mad Cow disease, as it is. The NAIS might be compared to using a cannon to hunt black flies in February.
The NAIS is likely to drive small meat producers out of business, placing an unfair economic burden on the traditional American businesses that have fed us since we’ve existed as a nation. Once the program is established, animal owners will bear the costs associated with the requirements for registration, identification, and reporting.
Costs to large-scale producers of meat will be absorbed by consumers, raising the cost of living for all of us.
The NAIS will prevent many people from raising animals for their own food. The NAIS is said to be necessary in order to make our food supply secure against disease or terrorism, yet what can be more secure than raising your own food or buying from a local farmer who you actually know?
What of those, such as the Amish in Smyrna, who may have a religious objection to participating in a system of electronically numbering and identifying their animals? When fully implemented, the NAIS is a compulsory registration with the government of all people who wish to raise their own animals for food. As written, the NAIS will force these people to make a choice between abandoning their livestock or violating their religious beliefs.
As I read the documentation put out by the U.S. Department of Agriculture, and as I have searched for additional information on this program, I was struck by the fact that so little has been said about it in the media. Search engine results yield almost exclusively web sites put out by various federal and state agencies, and associations of large-scale meat producers, all of whom are enthusiastically supporting this program.
Sadly, it seems that opposition to the program appears to be limited to the Countryside & Small Stock Journal, published in Wisconsin, and someone in a forum on the Mother Earth News site.
Further information about the National Animal Identification System can be found online at www.usaip.info/. Please read it through for yourselves, but the scariest stuff that I found came from the USAIP’s own FAQs. You’ll find that when they ask a question and answer it no, the text often goes on to explain that, when the plan is fully implemented, the answer will be yes.
Never one to pass up federal funds or to neglect an opportunity to make government bigger, the State of Maine has implemented its own program, funded in part by a grant from the U.S. Department of Agriculture. Its web site can be found at www.maine.gov/agriculture/idme/.
Although it seems to be slow in coming, there is yet time for an outcry over this program to have some effect. Small farmers and landowners can take action to oppose implementation of this plan.
First, do not participate in the “voluntary” state program to register either your farm or your animals, as they’ll use your willingness to participate in the program as justification for making it mandatory for everyone in the near future. If state or federal officials urge you to register either your premises or your animals, ask them whether your participation is voluntary or mandatory. Ask to see a copy of any legislation that gives them the authority to require compliance.
More importantly, contact any farming, breeding, or other associations that you might be a member of, asking them to oppose the NAIS. Ask these organizations to sponsor letter-writing campaigns to elected officials, both state and federal. Individually, you can write to your state and federal legislators. Letters sent via the postal service carry more weight than emails or form letters, but anything is better than nothing.
The United States Department of Agriculture plans the issuance of a NAIS rule for public comment in July of 2006. Be aware of this when the time comes, and be prepared to submit an individual comment opposing this rule.
Also, you should be aware of any state rules that might mandate earlier compliance. For example, Maine farmers are already being encouraged to voluntarily join the state’s ID program, and it intends to implement mandatory registration of livestock premises by March 7, 2005.
I am surprised, and discouraged, that there isn’t already an outcry over this program.
” … and he provides that no one will be able to buy or to sell, except the one who has the mark, either the name of the beast or the number of his name.” — Rev. 13:17 (NASB)

National Animal Identification System Timeline

  • April, 2005 — The USDA issued its Draft Strategic Plan & Draft Program Standards for public comment, which ended in July of 2005.
  • July, 2006 — The target date for the USDA to issue a proposed rule setting forth the requirements for NAIS premises registration, animal identification, and animal tracking. There will be a limited public comment period after publication of the rule.
  • Fall, 2007 — The USDA will publish a final rule to establish the requirements of the mandatory NAIS.
  • January, 2008 — Premises registration and animal identification become mandatory.
  • January, 2009 — Animal tracking becomes mandatory, including enforcement of the reporting of all animal movements.

This article was reprinted with permission from “All Maine Matters” which can be found online at www.allmainematters.com.



Letter Re: Supplementing The Medical Kit

Mr. Rawles:
The two links listed below provide good basic information to supplement the low cost medical kits previously discussed on your site. This information is available free for downloading and printing. This link is to the Virtual Naval Hospital which is being discontinued due to a lack of funding. It was set up for use by military medical personnel: http://www.vnh.org/

The link below is another free link that was mainly for use where there is no doctor and pharmacy available and would be helpful in an emergency situation. One example of a good source of information is Chapter 7 which provides information on the types of antibiotics and things to consider before using them.   See; http://www.healthwrights.org/books/WTINDonline.htm

These two links provide information that information that should be made available to assist people in an emergency situation when there were no doctors or pharmacies are available due to a loss of power, lack of fuel, or a major disaster Regards, – S.F.



Jim’s Quote of the Day:

"The people of the various provinces are strictly forbidden to have in their possession any swords, short swords, bows, spears, firearms, or other types of arms. The possession of unnecessary implements makes difficult the collection of taxes and dues and tends to foment uprisings." – Toyotomi Hideyoshi, Lord Chancellor of Japan, August 1588, the order that instituted "The Great Sword Hunt"



Note from JWR:

Please spread the word about SurvivalBlog. Just a brief “bcc-ed” e-mail to the folks on your e-mail address list would be greatly appreciated.  Remember: Every friend, neighbor, and co-worker that gets squared away logistically will be one less individual that comes begging on your doorstep, come TEOTWAWKI+1.  So it is in your own best interest to let them know about SurvivalBlog.