Skip to main content

Securing Water and Wastewater Systems: An Overview

  • Chapter
  • First Online:

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 2))

Abstract

This book discusses the inherent vulnerability of urban water and wastewater systems to both manmade and natural threats and disasters including droughts, earthquakes, and terrorist attacks. It contains insights from an internationally recognized group of experts on the problems associated with natural and manmade disasters as well as recommendations on how to anticipate and remediate those disasters. It is well established that natural disasters including major storms, such as hurricanes and flooding, can effect water supply security and integrity. Earthquakes and terrorist attacks have many characteristics in common because they are almost impossible to predict and can cause major devastation and confusion. Terrorism is also a major threat to water security and recent attention has turned to the potential that these attacks have for disrupting urban water supplies. Government planners have been forced to consider the possibility that the nation’s critical infrastructure, including water systems, may in fact be vulnerable to terrorism. After the attacks of September 11, 2001, the US Environmental Protection Agency (EPA) developed a Homeland Security Strategy (USEPA, 2004). Its intent was to enhance national security and protect human health and the environment. The state of the art in protecting water and wastewater systems from natural and manmade threats is discussed in this book with chapters from US and international experts. A particular area of concern for water systems is cyber security. A report by the US Government Accountability Office has highlighted some of the vulnerabilities associated with possible cyber attacks and some possible solutions are discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • American Society of Civil Engineers (ASCE) (2004) “Guidelines for designing an online contaminant monitoring system.”

    Google Scholar 

  • American Water Works Association (AWWA) (2004) “Security guidance for water utilities.”

    Google Scholar 

  • American Water Works Association-Streamlines (2010a) “Virus exploits USB vulnerability to reach SCDA systems.” July 27, 2010, Vol. 2, No. 19, November 2, 2010a.

    Google Scholar 

  • American Water Works Association-Streamlines (2010b) “Cyber alert for SCADA program.” Vol. 2, No. 26, November 2, 2010b.

    Google Scholar 

  • Bruins, H.J. (2000) “Proactive Contingency Planning vis-à-vis Declining Water Security in the 21st Century.” Journal of Contingencies and Crisis Management, Vol. 8, No. 2, pp. 63–72.

    Article  Google Scholar 

  • Clark, Robert M. and Deininger, Rolf A. (2000) “Protecting the Nation’s Critical Infrastructure: The Vulnerability of US Water Supply Systems,” Journal of Contingencies and Crisis Management, Vol. 8, No. 2, pp. 73–80.

    Article  Google Scholar 

  • Clark, R.M. and Deininger, R.A. (2001) “Minimizing the Vulnerability of Water Supplies to Natural and Terrorist Threats,” in the Proceedings of the American Water Works Association’s IMTech Conference held in Atlanta, GA, April 8–11, pp. 1–20.

    Google Scholar 

  • Clarke, Richard A. and Knake, Robert K. (2010) Cyber War: The Next Threat to National Security and What to Do About It. Harper-Collins, New York, NY, pp. 18–21.

    Google Scholar 

  • Gleick, P.H. (2006) “Water and Terrorism,” Water Policy, Vol. 8, pp. 481–503.

    Article  Google Scholar 

  • Mays, L.W. (2004) “Water Supply Security: An Introduction,” in Water Supply Systems Security, edited by Larry W. Mays. McGraw-Hill: Two-Penn Plaza, New York, NY. pp. 1.1–1.12.

    Google Scholar 

  • New York Times (1986) White House water cut off temporarily. July 10, p. 16.

    Google Scholar 

  • States, S. (2010) “Security and Emergency Planning for Water and Wastewater Utilities”. American Water Works Association. 6666 West Quincy Avenue, Denver, CO 80235-3098.

    Google Scholar 

  • US Congress (2002) Public Health Security and Bioterrorism Preparedness and Response Act of 2002: Public Law 107–188. http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.3448.ENR:. Accessed 03 March 2010.

  • United States Government Accountability Office (USGAO) (2006) Internet Infrastructure: DHS Faces Challenges in Developing a Joint Public/Private Recovery Plan. GAO-06-672.

    Google Scholar 

  • US Environmental Protection Agency (2004) Water Security Research and Technical Support Action Plan. Publication number EPA/600/R-04/063. http://www.epa.gov/nhsrc/pubs/600r04063.pdf. Accessed 02 March 2010.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert M. Clark .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Clark, R.M., Hakim, S., Ostfeld, A. (2011). Securing Water and Wastewater Systems: An Overview. In: Clark, R., Hakim, S., Ostfeld, A. (eds) Handbook of Water and Wastewater Systems Protection. Protecting Critical Infrastructure, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0189-6_1

Download citation

Publish with us

Policies and ethics