Skip to main content

Drinking Water Critical Infrastructure and Its Protection

  • Chapter
  • First Online:
Handbook of Water and Wastewater Systems Protection

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 2))

  • 1415 Accesses

Abstract

Drinking water in the United States has long been recognized as among the safest in the world, but the devastating events of September 11, 2001 brought water security to the forefront as a priority. Terrorist attacks against the United States and the consequent war on terrorism being waged by the United States and its allies have provided great impetus for the development of tools and technologies that can be utilized to detect and/or neutralize terrorist threats. One of the greatest concerns facing the nations is the intentional introduction of chemical, biological, or radiological (CBR) contaminants into the nation’s drinking water supplies. Damage to or destruction of the nation’s water supply and water quality infrastructure by terrorist attack could disrupt the delivery of vital human services, threatening public health and the environment, or possibly causing loss of life. This chapter deals with drinking water security tools and procedures. It also discusses the evolutionary concept of security in the water sector and the current state of technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.epa.gov/nrmrl/wswrd/dw/epanet.html

  2. 2.

    http://www.mwhsoft.com/

  3. 3.

    http://www.helixtech.com.au/

  4. 4.

    http://www.mwhsoft.com/

  5. 5.

    http://www.bossintl.com/

  6. 6.

    http://www.optiwater.com

  7. 7.

    http://www.kypipe.com/

  8. 8.

    http://www.tswg.gov/tswg/ip/PipelineNetTB.htm

  9. 9.

    http://www.stafu.de

  10. 10.

    http://www.wadiso.com

  11. 11.

    http://www.haestad.com

  12. 12.

    http://www.oe.netl.doe.gov/docs/prepare/21stepsbooklet.pdf

References

  • ASCE. (2004). “Interim Voluntary Guidelines for Designing an Online Contaminant Monitoring System.” Publication No. 817R08007, http://www.asce.org/files/pdf/wise/3.pdf

  • ASCE. (2006). “Guidelines for the Physical Security of Water Utilities.” Publication No. 817R08009, http://www.asce.org/files/pdf/wise/4.pdf

  • AWWA. (2008). “Roadmap to Secure Control Systems in the Water Sector,” http://www.awwa.org/files/GovtPublicAffairs/PDF/WaterSecurityRoadmap031908.pdf

  • Burrows, W. D., and Renner, S. E. (1999). “Biological Warfare Agents as Threats to Potable Water.” Environmental Health Perspectives, Vol. 107, No. 12, pp. 975–984.

    Google Scholar 

  • CBO. (1983). “Public Works Infrastructure: Policy Considerations for the 1980s.” U.S. Congressional Budget Office.

    Google Scholar 

  • Clark, R. M., and Deininger, R. A. (2000). “Protecting the Nation’s Critical Infrastructure: The Vulnerability of U.S. Water Supply Systems.” Journal of Contingencies and Crisis Management, Vol. 8, No. 2, pp.73–80.

    Article  Google Scholar 

  • Cristopher. G. W., Cieslak, T. J., Pavlin, J. A., and Eitzen, E. M. Jr. (1997). “Biological Warfare: A Historical Perspective.” JAMA, Vol. 278, No. 5, pp. 412–417.

    Article  Google Scholar 

  • Deininger, R. A. (2000). “The Threat of Chemical and Biological Agents to Public Water Supply Systems.” Science Applications International Corporation, McLean, VA.

    Google Scholar 

  • DHS. (2007). “Water: Critical Infrastructure and Key Resources; Sector-Specific Plan as input to the National Infrastructure Protection Plan.” Dept. of Homeland Security, http://www.dhs.gov/xlibrary/assets/nipp-ssp-water.pdf

  • E.O. (1996). “Executive Order 13010 – Critical Infrastructure Protection.” Federal Register, Vol. 61, No. 138, pp. 37347–37350, July 17, 1996.

    Google Scholar 

  • E.O. (2001). “Executive Order 13228 – Establishing the Office of Homeland Security and the Homeland Security Council.” Federal Register, Vol. 66, No. 196, pp. 51812–51817, October 8, 2001.

    Google Scholar 

  • EPA. (2003). “Response Protocol Toolbox: Planning for and Responding to Drinking Water Contamination Threats and Incidents,” http://www.epa.gov/safewater/watersecurity/pubs/rptb_response_guidelines.pdf

  • EPA. (2005a). “The Water Security Research and Technical Support Action Plan, Progress Report for 2005.” EPA National Homeland Security Research Center and Water Security Division, http://www.epa.gov/nhsrc/pubs/600r05104.pdf

  • EPA. (2005b). “EPA Needs to Determine What Barriers Prevent Water Systems from Securing Known Supervisory Control and Data Acquisition (SCADA) Vulnerabilities.” Report No. 2005-P-00002, January 6, 2005.

    Google Scholar 

  • EPA. (2006). “A Water Security Handbook: Planning for and Responding to Drinking Water Contamination Threats and Incidents,” EPA 817-B-06-001.

    Google Scholar 

  • EPA. (2007a). “Contamination Warning System Deployment.” Office of Water, EPA 817-R-07-002, 2007, http://www.epa.gov/safewater/watersecurity/pubs/guide_watersecurity_securityinitiative _interimplanningpdf.pdf

  • EPA. (2007b). “Standardized Analytical Methods for Environmental Restoration following Homeland Security Events.” EPA/600/R-07/136, http://www.epa.gov/NHSRC/pubs/600r07136.pdf

  • Federal Register. (2005). Title 42- Public Health, Part 72 – Interstate Shipment of Etiologic Agents. http://www.access.gpo.gov/nara/cfr/waisidx_06/42cfr72_06.html

  • Hart, D., McKenna, S., Klise, K., Cruz, V., and Wilson, M. (2007). “CANARY: A water quality event detection algorithm development tool.” Proceedings of the 2007 World Water and Environmental Resources Congress, May 15–19, 2007, Tampa, Florida, sponsored by the Environmental and Water Resources Institute of the American Society of Civil Engineers.

    Google Scholar 

  • Hawley, R. J., and Eitzen, E. M. (2000). “Bioterrorism and Biological Safety.” Diane O. Fleming and Debra L. Hunt (eds.) “Biological Safety: Principles and Practices,” 3rd edition. American Society for Microbiology (ASM) Press, Washington, DC, p. 784.

    Google Scholar 

  • Hickman, D. (1999). “A Chemical and Biological Warfare Threat: USAF Water Systems at Risk”. The Counter proliferation Papers, Future Warfare Series No. 3, http://www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.htm

  • Hoover, J. E. (1941). “Water Supply Facilities and National Defense.” Journal of the American Water Works Association, Vol. 33, No. 11, pp. 1861–1865.

    Google Scholar 

  • HSPD-7. (2003). “Homeland Security Presidential Directive: Critical Infrastructure Identification, Prioritization, and Protection,” http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html

  • Moteff, J., and Parfomak, P. (2004). “Critical Infrastructure and Key Assets: Definition and Identification.” October 1, 2004, Resources, Science, and Industry Division, Congressional Research Service, RL32631.

    Google Scholar 

  • Munro, N. B., Talmage, S. S., Griffin, G. D., Waters, L. C., Watson, A. P., King, J. F., and Hauschild, V. (1999). “The Source, Fate, and Toxicity of Chemical Warfare Agent Degradation Products.” Environmental Health Perspectives, Vol. 107, No. 12, pp. 933–974.

    Google Scholar 

  • Murray, R., Janke, R., and Uber, J. (2004). “The Threat Ensemble Vulnerability Assessment (TEVA) Program for Drinking Water Distribution System Security.” Proceedings of the 2004 World Water and Environmental Resources Congress, June 27–July 1, 2004, Salt Lake City, Utah, sponsored by the Environmental and Water Resources Institute and the American Society of Civil Engineers.

    Google Scholar 

  • Murray, R., Janke, R., Hart, W. E., Berry, W., Taxon, T., and Uber, J. (2008). “Sensor Network Design of Contamination Warning Systems: A Decision Framework.” Journal of the American Water Works Association, Vol. 100, No. 711, pp. 97–109.

    Google Scholar 

  • NAP. (2002). “Making the Nation Safer the Role of Science and Technology in Countering Terrorism.” National Academy Press, Washington, DC.

    Google Scholar 

  • NCPWI. (1983). “Fragile Foundations: A Report on America’s Public Works.” National Council on Public Works Improvement. Final Report to the President and Congress. Washington DC, February, 1988, p. 33.

    Google Scholar 

  • NRC. (1995). “National Research Council, Guidelines for Chemical Warfare Agents in Military Drinking Water.” PB95-267142.

    Google Scholar 

  • NSHS. (2002). “The National Strategy for Homeland Security.” U.S. Office of Homeland Security. July 16, 2002, http://www.whitehouse.gov/homeland/book/nat_strat_hls.pdf

  • NSPP. (2003). “The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets.” Office of the President. February, 2003. p. 71, http://www.whitehouse.gov/pcipb/physical_strategy.pdf

  • PDD-63. (1998). “The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive No. 63.” White Paper, May 22, 1998.

    Google Scholar 

  • Sandia. (2002). “Risk Assessment Methodology for Water (RAM™)

    Google Scholar 

  • Skasden, J., Janke, R., Grayman, W., Samuels, W., TenBroek, M., Steglitz, B., and Bahl, S. (2008). “Distribution system monitoring for detecting contamination events and water quality changes.” Journal of the American Water Works Association, Vol. 100, No. 7, pp. 81–94.

    Google Scholar 

  • Stamp, J., Dillinger, J., Young, W., and DePoy, J. (2003). “Common Vulnerabilities in Critical Infrastructure Control Systems.” (2nd edition, 22 May 2003; revised 11 November 2003),” Sandia National Laboratories, http://www.oe.netl.doe.gov/docs/prepare/vulnerabilities.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rakesh Bahadur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Bahadur, R., Samuels, W.B. (2011). Drinking Water Critical Infrastructure and Its Protection. In: Clark, R., Hakim, S., Ostfeld, A. (eds) Handbook of Water and Wastewater Systems Protection. Protecting Critical Infrastructure, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0189-6_4

Download citation

Publish with us

Policies and ethics