Be Prepared

April 2, 2018
October 2001 Editor's Desk

About the author: Bill Swichtenberg is the editorial director for Water Engineering & Management

In the wake of tragic terrorist events at the World Trade Center and the Pentagon, I had a couple of friends call me worried about their water supply and its accessibility to foul play. While nothing is really safe from terrorists, the water/wastewater industry has been studying these issues to prevent such actions.

In the May 2001 issue of the AWWA Journal, an article ("The Who, What, Why, and How of Counterterrorism Issues" by Gay Porter Denileon) details a signed threat from a terrorist group indicating that they intended to disrupt water operations in 28 US cities. Water utilities were warned by the FBI of this threat on Jan. 24, 2001, and told "to take precautions and to be on the lookout for anyone or anything out of the ordinary." While later this threat turned out to be a forgery, it sent an alarm to utilities and security across the United States.

In 1998, a Presidential Commission focusing on Critical Infrastructure Protection recommended that threat and risk assessments be performed to enhance and increase the security of those systems. Critical infrastructures are defined as those physical and cyber-based systems essential to the minimum operations of the U.S. economy and government. These infrastructures include telecommunications, energy, banking and finance, water systems and emergency services.

Steve Pappas, the director of Loss Control for Indiana-American Water Co., has outlined a plan for enhancing safety and security in his white paper "America?s Critical Infrastructures?How Vulnerable Are We?" According to Pappas, there are several factors to consider when making risk management decisions. Threat and risk assessments are recognized as decision support tools to establish and prioritize security program requirements. The risk assessment process consists of six steps.

* Develop a plan and select a team.

* Gather information.

* Identify asset vulnerabilities.

* Determine risk through scenarios.

* Identify actions that lead to risk reduction.

* Reporting and follow up.

Methods of destruction and therefore vulnerabilities mentioned by Denileon include physical, bioterrorism/chemical contamination and cyber attack. While bioterrorism gets the most headlines, many observers believe that the physical destruction or disruption of a plant is a more likely scenario.

At the recent AWWA Conference, a workshop titled Critical Infrastructure Terrorism and Security gave participants a view of a vulnerability assessment tool being developed and practical advice from FBI agents, researchers and utility professionals who already have a security program in place. AWWA is planning to develop a Seminar in a Box program in 2002 that would take an in-depth look at the issues presented at the 2001 conference workshop.

Terrorism transcends all geographic and demographic boundaries. An attack against a water utility is a possibility. Hopefully, current events will prompt utility officials to take another look at their processes and discuss security improvements with federal, state and local agencies.

Download: Here

About the Author

Bill Swichtenberg

Sponsored Recommendations

Get Utility Project Solutions

June 13, 2024
Lightweight, durable fiberglass conduit provides engineering benefits, performance and drives savings for successful utility project outcomes.

Energy Efficient System Design for WWTPs

May 24, 2024
System splitting with adaptive control reduces electrical, maintenance, and initial investment costs.

Meeting the Demands of Wastewater Treatment Plants

May 24, 2024
KAESER understands the important requirements wastewater treatment plant designers and operators consider when evaluating and selecting blowers and compressed air equipment. In...

Modernize OT Cybersecurity to Mitigate Risk

April 25, 2024
Rockwell Automation supports industry-leading Consumer Packaged Goods company, Church & Dwight, along their industrial cybersecurity journey.