Skip to main content

Protecting Water Supply Critical Infrastructure: An Overview

  • Chapter
  • First Online:

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 2))

Abstract

Government planners have long been aware that urban water systems are vulnerable to threats and disasters, both manmade and natural, including water shortages and droughts, earthquakes, and storms with high winds and flooding. Since the attacks of September 11, 2001, government planners in the United States have been forced to also consider the vulnerability of the nation’s critical infrastructure, including water systems, to terrorism. The Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (U.S. Congress 2002) intensified the focus on water security research in the United States. Homeland Security Presidential Directive 7 (HSPD-7), signed on December 17, 2003, established a national policy for Federal departments and agencies to identify and prioritize critical infrastructure and to protect them from terrorist attacks. HSPD-7 established the Environmental Protection Agency (EPA) as the lead agency for the Water Sector’s critical infrastructure protection activities. Consequently the EPA developed a Homeland Security Strategy, which is regularly updated (U.S. EPA 2013). The intent of the act was to enhance national security and protect human health and the environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Abbreviations

CANARY:

Contamination event detection system

CMMS:

Computerized maintenance management systems

CWS:

Contamination warning system

DHS:

Department of Homeland Security

DSL:

Digital subscriber lines

EDS:

Event detection system

EPA:

U.S. Environmental Protection Agency

GA:

Genetic algorithm

GAO:

Government Accountability Office

h:

Hours

HMI:

Human–machine interface

ICS:

Industrial control system

IT:

Information technology

LIMS:

Laboratory information management system

LAN:

Local area network

MCMC:

Marko chain Monte Carlo

MILP:

Mixed integer linear programming

NFPA:

National fire protection association

NTNCWS:

Nontransient, noncommunity water supply

ODE:

Ordinary differential equation

ORP:

Oxidation reduction potential

pH:

A measure of acidity

PIN:

Possible ingress nodes

PLC:

Programmable logic controller

QP:

Quadratic programming

RTU:

Remote terminal units

S:

Seconds

SCADA:

Supervisory control and data acquisition

SDWA:

Safe drinking water Act

TEVA-SPOT:

Threat ensemble vulnerability assessment sensor placement optimization tool

TEVA:

Threat ensemble vulnerability assessment

TNCWS:

Transient noncommunity water supply

TOC:

Total organic carbon

VPN:

Virtual private network

VX:

An extremely toxic substance that has no known uses except in chemical warfare as a nerve agent

WDS:

Water distribution system

WSi:

Water security initiative

WS:

Water security

References

  • Allgeier SC, Lee Y, Umberg K, Tyree M (2008) Operational experience with water quality event detection during the Cincinnati water security initiative pilot. In: Proceedings of the AWWA water quality technology conference, Cincinnati, OH, 16–20 Nov, 2008. American Water Works Association, Denver

    Google Scholar 

  • Allgeier SC, Umberg K, Johnson R, Sahni N (2011) Detection of distribution system contamination incidents using online water quality monitoring. In: Proceedings of the AWWA water quality technology conference, Phoenix, AZ, 13–17 Nov, 2011. American Water Works Association, Denver

    Google Scholar 

  • Allmann TP, Carlson KH (2005) Extended summary: modeling intentional distribution system contamination and detection. J Am Water Works Ass 97(1):58

    Google Scholar 

  • American Society of Civil Engineers (ASCE) (2004) Interim voluntary guidelines for designing an online contaminant monitoring system. American Society of Civil Engineers, Reston

    Google Scholar 

  • American Water Works Association (AWWA) (2004) Interim voluntary security guidance for water utilities. American Water Works Association, Denver

    Google Scholar 

  • American Water Works Association (AWWA) (2010) Virus exploits USB vulnerability to reach SCDA systems. Streamlines (e-newsletter), July 27, 2010, Vol. 2, No. 19

    Google Scholar 

  • Angulo FJ, Tippen S, Sharp DJ, Payne BJ, Collier C, Hill JE, Barrett TJ, Clark RM, Geldreich EE, Donnell HD Jr, Swerdlow DL (1997) A community waterborne outbreak of salmonellosis and the effectiveness of a boil water order. Am J Public Health 87(4):580–584

    Article  CAS  Google Scholar 

  • Bahadur R, Samuels WB, Pickus J (2003) Case study for a distribution system emergency response tool. American Water Works Association Research Foundation, Denver, CO

    Google Scholar 

  • Baranowski T, Janke R, Murray R, Bahl S, Sanford L, Steglitz B and Skadsen J (2008) Case study analysis to identify and evaluate potential response initiatives in a drinking water distribution system following a contamination event. In: Proceedings, 2008 Borchardt conference, Ann Arbor, Michigan, 27–28 Feb, 2008

    Google Scholar 

  • Beering PS (2002) Threats on tap: understanding the terrorist threat to water. J Water-ASCE 128(3):163–167

    Article  Google Scholar 

  • Berry J, Fleischer L, Hart WE, Phillips CA, Watson JP (2005a) Sensor placement in municipal water networks. J Water Res Pl-ASCE 131(3):237–243

    Article  Google Scholar 

  • Berry J, Hart WE, Phillips CA, Uber JG, Walski TM (2005b) Water quality sensor placement in water networks with budget constraints. In: Proceedings, world water and environmental resources congress. American Society of Civil Engineers, Reston

    Google Scholar 

  • Boulos PF, Karney BW, Wood DJ, Lingireddy S (2005) Hydraulic transient guidelines for protecting water distribution systems. J Am Water Works Ass 97(5):111–124

    CAS  Google Scholar 

  • Boulos PF, Lansey KE, Karney BW (2006) Comprehensive water distribution systems analysis handbook for engineers and planners. 2nd edn. MWH Soft Pub, Broomfield. 660 pp

    Google Scholar 

  • Bristow E, Brumbelow K (2006) Delay between sensing and response in water contamination events. J Infrastruct Syst 12(2):87–95

    Article  Google Scholar 

  • Brosnan TM (ed) (1999) Early warning monitoring to detect hazardous events in water supplies. In: An ILSI (International Life Sciences Institute) Risk Science Institute workshop report. ILSI Press, Washington

    Google Scholar 

  • Burrows WD, Renner SE (1999) Biological warfare agents as threats to potable water. Environ Health Perspect 107(12):975–984

    Article  CAS  Google Scholar 

  • Chandrasekaran L (2006) Predicting disease incidence due to contaminant intrusion in a water distribution system. Master’s thesis, University of Cincinnati, Cincinnati. 178 pp

    Google Scholar 

  • Clark RM (2011) U.S. water and wastewater critical infrastructure. In: Clark RM, Hakim S, Ostfeld A (eds) The handbook for securing water and wastewater systems. Springer, New York

    Google Scholar 

  • Clark RM, Deininger RA (2000) Protecting the nation’s critical infrastructure: the vulnerability of U.S. water supply systems. JCCM 8(2):73–80

    Google Scholar 

  • Clark RM, Deininger RA (2001) Minimizing the vulnerability of water supplies to natural and terrorist threats. In: Proceedings of the American Water Works Association’s IMTech conference, Atlanta, GA, 8–11 April, 2001, pp 1–20

    Google Scholar 

  • Clark RM, Tippen DL (1990) Water supply. In: Corbitt RA (ed) Standard handbook of environmental engineering. McGraw-Hill, New York, pp 5.173–5.220

    Google Scholar 

  • Clark RM, Grayman WM, Males RM (1988) Contaminant propagation in distribution systems. J Environ Eng-ASCE 114(2):929–943

    Article  CAS  Google Scholar 

  • Clark RM, Grayman WM, Goodrich JA (1991a) Water quality modeling: its regulatory implications. In: Proceedings, AwwaRF/EPA conference on water quality modeling in distribution systems, 4–5 Feb, 1991, Cincinnati, OH. AWWA Research Foundation, Denver

    Google Scholar 

  • Clark RM, Grayman WM, Goodrich JA, Deininger RA, Hess AF (1991b) Field testing of distribution water quality models. J Am Water Works Ass 83(7):67–75

    CAS  Google Scholar 

  • Clark RM, Geldreich EE, Fox KR, Rice EW, Johnson CH, Goodrich JA, Barnik JA, Abdesaken F (1996) Tracking a Salmonella serovar Typhimurium outbreak in Gideon, Missouri: role of contaminant propagation modeling. J Water Supply Res T 45(4):171–183

    CAS  Google Scholar 

  • Clark RM, Grayman WM, Buchberger SG, Lee Y, Hartman DJ (2004) Drinking water distribution systems: an overview. In: Mays LW (ed) Water supply systems security. McGraw-Hill, New York, pp 4.1– 4.49

    Google Scholar 

  • Clark RM, Hakim S, Ostfeld A (2011) Securing water and wastewater systems: an overview. In: Clark RM, Hakim S, Ostfeld A (ed) Handbook of water and wastewater systems protection. Springer, New York. pp 1–25

    Google Scholar 

  • Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. HarperCollins Publishers, New York

    Google Scholar 

  • U.S. Congress (2002) Public health security and bioterrorism preparedness and response act of 2002: Public law 107–188. 107th Congress, June 12, 2002

    Google Scholar 

  • Copeland C (2010) Terrorism and security issues facing the water infrastructure sector. Congressional Research Service, 7-5700, www.crs.gov, RL32189, 16 Mar, 2010

  • Craun MF, Craun GF, Calderon RL, Beach MJ (2006) Waterborne outbreaks reported in the United States. J Water Health 4(Supplement 2):19–30

    Article  Google Scholar 

  • Danyluk MD, Harris LJ, Schaffner DW (2006) Monte Carlo simulations assessing the risk of salmonellosis from consumption of almonds. J Food Protect 69(7):1594–1599

    Google Scholar 

  • Davis MJ, Janke R (2008) Importance of exposure model in estimating impacts when a water distribution system is contaminated. J Water Resour Plann Manage 134(5):449–456

    Article  Google Scholar 

  • Davis MJ, Janke R (2009) Development of a probabilistic timing model for the ingestion of tap water. J Water Resour Plann Manage 135(5):397–405

    Article  Google Scholar 

  • Davis MJ, Janke R (2011) Patterns in potential impacts associated with contamination events in water distribution systems. J Water Res Pl-ASCE 137(1):1–9

    Article  Google Scholar 

  • Davis MJ, Janke R, Taxon TN (2010) Assessing potential impacts associated with contamination events in water distribution systems: a sensitivity analysis. EPA/600/R-10/061. U.S. Environmental Protection Agency, Cincinnati

    Google Scholar 

  • Davis MJ, Janke R, Magnuson M (2013) A framework for estimating the adverse health effects of contamination events in water distribution systems and its application. Accepted Risk Analysis

    Google Scholar 

  • Davis MJ, Janke R, Phillips C (2013a) Robustness of designs for drinking-water contamination warning systems under uncertain conditions. In preparation

    Google Scholar 

  • DeSanctis A, Shang F, Uber JG (2009) Real-time identification of possible contamination sources using network backtracking methods. J Water Res Pl-ASCE 136(4):444–453

    Article  Google Scholar 

  • DiCristo C, Leopardi A (2008) Pollution source identification of accidental contamination in water distribution networks. J Water Res Pl-ASCE 134(2):197–202

    Article  Google Scholar 

  • Economic Research Service (2008) Foodborne illness cost calculator: Salmonella. United States Department of Agriculture

    Google Scholar 

  • Fair GM, Geyer JC (1971) Water supply and waste-water disposal. Wiley, New York

    Google Scholar 

  • Fox KR, Lytle DA (1996) Milwaukee’s crypto outbreak: investigation and recommendations. J Am Water Works Ass 88(9):87–94

    CAS  Google Scholar 

  • Friedman M, Radder L, Harrison S, Howie D, Britton M, Boyd G, Wang H, Gullick R, LeChevallier M, Wood D, Funk J (2004) Verification and control of pressure transients and intrusion in distribution systems. AWWA Research Foundation, Denver

    Google Scholar 

  • Fujiwara M, Manwaring JM, Clark RM (1995) Drinking water in Japan and the United States: conference objectives. In: Clark RM, Clark DA (eds) Drinking water quality management. Technomic Publishing Company Inc, Lancaster

    Google Scholar 

  • Geldreich EE, Fox KR, Goodrich JA, Rice EW, Clark RM, Swerdlow DL (1992) Searching for a water supply connection in the Cabool, Missouri disease outbreak of Escherichia coli 0157:H7. Water Res 26(8):1127–1137

    Article  Google Scholar 

  • Ghimire SR, Barkdoll BD (2006) A heuristic method for water quality sensor location in a municipal water distribution system: mass-released based approach. In: Proceedings, 8th annual water distribution systems analysis symposium, Cincinnati, OH, 27–30 Aug, 2006. American Society of Civil Engineer, Reston

    Google Scholar 

  • Gleick PH (2006) Water and terrorism. Water Policy 8:481–503

    Article  Google Scholar 

  • Grayman WM, Clark RM, Harding BL, Maslia ML, Aramini J (2004) Reconstructing historical contamination events. In: Mays L (ed) Water supply systems security. McGraw-Hill, New York. pp 10.1–10.55

    Google Scholar 

  • Grayman WM, Buchberger S, Samuels W (2008) Hydraulic models of buildings for use in contamination studies. In: Van Zyl JE, Ilemobade AA, Jacobs HE (eds) Proceedings, 10th annual water distribution system analysis conference, 17–20 Aug, 2008, Kruger National Park, South Africa. American Society of Civil Engineers, Reston

    Google Scholar 

  • Guan J, Aral MM, Maslia ML, Grayman WM (2006) Identification of contaminant sources in water distribution systems using simulation–optimization method: case study. J Water Res Pl-ASCE 132(4):252–262

    Article  Google Scholar 

  • Gullick RW, LeChevallier MW, Svindland RC, Friedman MJ (2004) Occurrence of transient low and negative pressures in distribution systems. J Am Water Works Ass 96(11):52–66

    CAS  Google Scholar 

  • Haimes YY, Horowitz BM (2004) Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. J Homel Secur Emerg 1(3): article 302

    Google Scholar 

  • Hall J, Szabo J (2010) On-line water quality monitoring in drinking water distribution systems: A summary report of USEPA research and best practices. JAWWA 102(8):20–22

    CAS  Google Scholar 

  • Hall J, Zaffiro AD, Marx RB, Kefauver PC, Krishnan ER, Haught RC, Herrmann JG (2007) On-line water quality parameters as indicators of distribution system contamination. J Am Water Works Ass 99(11):66–77

    CAS  Google Scholar 

  • Hart WE, Murray R (2010) Review of sensor placement strategies for contamination warning systems in drinking water distribution systems. J Water Res Pl-ASCE 136(6):611–619

    Article  Google Scholar 

  • Hart D, McKenna SA, Klise K, Cruz V, Wilson M (2007) CANARY: a water quality event detection algorithm development tool. In: Proceedings, world environmental and water resources congress, Tampa, FL, 15–19 May, 2007. American Society of Civil Engineers, Reston

    Google Scholar 

  • Hart D, McKenna SA, Murray R, Haxton T (2010) Combining water quality and operational data for improved event detection. In: Proceedings, 12th annual conference on water distribution systems analysis, Tucson, AZ, 12–15 Sept, 2010. American Society of Civil Engineers: Reston

    Google Scholar 

  • Hatchett S, Uber J, Boccelli D, Haxton T, Janke R, Kramer A, Matracia A, Panguluri S (2011) Real- time distribution system modeling: development, application, and insights. In: Savic DA, Kapelan Z and Butler D (eds) Proceedings of the eleventh international conference on computing and control for the water industry, Exeter, UK. Centre for Water Systems, University of Exeter, Exeter, Sept 5–7, 2011

    Google Scholar 

  • Haxton T, Murray R and Klise K (2012) Examining the application of modeling tools to identify effective flushing locations. In: Proceedings, world environmental and water resources congress 2012, Albuquerque, New Mexico, 20–24 May, 2012, pp 3071–3081. American Society of Civil Engineers, Reston

    Google Scholar 

  • Herrick RL, Buchberger SG, Clark RM, Kupferle M, Murray R, Succop P (2011) A Markov model to estimate Salmonella morbidity mortality, illness, duration, and cost. Health Econ 21(10):1169–1182. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/hec.1779

    Google Scholar 

  • Hickman DC (1999) A chemical and biological warfare threat: USAF water systems at risk. Future Warfare Series No. 3. Air University, U.S. Air Force Counterproliferation Center, Maxwell AFB, Alabama, p. 36. Accessed 23 April, 2013. http://www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.htm

  • Holcomb DL, Smith MA, Ware GO, Hung YC, Brackett RE, Doyle MP (1999) Comparison of six dose-response models for use with food-borne pathogens. Risk Anal 19(6):1091–1100

    CAS  Google Scholar 

  • Hrudey SE, Hrudey EJ (2004) Safe drinking water: lessons from recent outbreaks in affluent nations. IWA Publishing, London

    Google Scholar 

  • Janke R, Murray R, Uber J, Taxon T (2006) Comparison of physical sampling and real-time monitoring strategies for designing a contamination warning system in a drinking water distribution system. J Water Resour Plann Manage 132(4):310–313

    Article  Google Scholar 

  • Janke R, Haxton T, Grayman W, Bahadur R, Murray R, Samuels W, Taxon T (2009) Sensor network design and performance in water systems dominated by multi-story buildings. In: Proceedings, world environmental and water resources congress, Kansas City, MO, 17–19 May, 2009. American Society for Civil Engineers, Reston

    Google Scholar 

  • Janke R, Morley K, Uber J, Haxton T (2011) Real-time modeling for water distribution system operation: integrating security developed technologies with normal operations. In: Proceedings, American water works association, water security conference and distribution systems symposium, Nashville, TN, 11–14 Sept, 2011. American Water Works Association, Denver

    Google Scholar 

  • Jung BS, Karney BW, Boulos PF, Wood DJ (2007) The need for comprehensive transient analysis of distribution systems. J Am Water Works Ass 99(1):112–123

    CAS  Google Scholar 

  • Karim MR, Abbaszadegan M, LeChevallier MW (2003) Potential for pathogen intrusion during pressure transients. J Am Water Works Ass 95(5):134–146

    CAS  Google Scholar 

  • Khanal N, Buchberger SG, McKenna SA (2006) Distribution system contamination events: exposure, influence, and sensitivity 2006. J Water Res Pl-ASCE 132(4):283–292

    Article  Google Scholar 

  • Koch MW, McKenna SA (2011) Distributed sensor fusion in water quality event detection. J Water Res Pl-ASCE 137(1):10–19

    Article  Google Scholar 

  • Krause A, Leskovec J, Guestrin C, VanBriesen JM, Faloutsos C (2008) Efficient sensor placement optimization for securing large water distribution networks. J Water Resour Plann Manage 134(6):516–526

    Article  Google Scholar 

  • Kroll DJ (2006) Securing our water supply: protecting a vulnerable resource. PennWell Corp, Tulsa. ISBN 10: 1593700695

    Google Scholar 

  • Kumar J, Brill ED, Mahinthakumar G, Ranjithan S (2012) Contaminant source characterization in water distribution systems using binary signals. J Hydroinform 14(3):585–602

    Article  Google Scholar 

  • Laird CD, Biegler LT, van der Bloeman Waanders BGV, Bartlett RA (2005) Contaminant source determination for water works. J Water Res Pl-ASCE 131(2):125–134

    Article  Google Scholar 

  • Laird CD, Biegler LT, van der Bloeman Waanders BGV (2006) Mixed-integer approach for obtaining unique solutions in source inversion of water networks. J Water Res Pl-ASCE 132(4):242–251

    Article  Google Scholar 

  • LeChevallier MW, Gullick RW, Karim MR, Friedman M, Funk JE (2003) The potential for health risks from intrusion of contaminants into distribution systems from pressure transients. J Water Health 1(1):3–14

    Google Scholar 

  • Liu L, Ranjithan S, Mahinthakumar G (2011a) Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure. J Water Res Pl-ASCE 137(2):183–192

    Article  Google Scholar 

  • Liu L, Sankarasubramanian A, Ranjithan SR (2010b) Logistic regression analysis to estimate contaminant sources in water distribution systems. J Hydroinform 13(3):545–557

    Article  Google Scholar 

  • Liu L, Zechman EM, Mahinthakumar G, Ranjithan SR (2012) Identifying contaminant sources for water distribution systems using a hybrid method. Civil Eng Environ Syst 29(2):123–136

    Article  Google Scholar 

  • MacKenzie WR, Hoxie NJ, Proctor ME, Gradus MS, Blair KA, Peterson DE et al (1994) A massive outbreak in Milwaukee of Cryptosporidium infection transmitted through the public water supply. New Engl J Med 331:161–167

    Article  CAS  Google Scholar 

  • Mann AV, McKenna SA, Hart WE, Laird CD (2012) Real-time inversion in large-scale water networks using discrete measurements. Comput Chem Eng 37:143–151

    Article  CAS  Google Scholar 

  • Mena KD, Mota LC, Meckes MC, Green CF, Hurd WW, Gibbs SG (2008) Quantitative microbial risk assessment of a drinking water—wastewater cross-connection simulation. J Environ Eng Sci 7(5):525–530

    Article  CAS  Google Scholar 

  • Morley K, Janke R, Murray R, Fox K (2007) Drinking water contamination—warning systems: water utilities driving water security research. J Am Water Works Ass 99(6):40–46

    CAS  Google Scholar 

  • Murray R, Janke R, Uber J (2004) The threat ensemble vulnerability assessment program for drinking water distribution system security. In: Proceedings, ASCE-EWRI world water and environmental resources congress, Salt Lake City, UT, June 27–July 1, 2004

    Google Scholar 

  • Murray R, Uber J, Janke R (2006) Model for estimating acute health impacts from consumption of contaminated drinking water. J Water Res Pl-ASCE 132(4):293–299

    Article  Google Scholar 

  • Murray R, Janke R, Hart WE, Berry JW, Taxon T, Uber J (2008) Sensor network design of contamination warning systems: a decision framework. J Am Water Works Ass 100(11):97–109

    CAS  Google Scholar 

  • Murray R, Hart WE, Phillips CA, Berry J, Boman EG, Carr RD, Riesen LA, Watson JP, Haxton T, Herrmann JG, Janke R, Gray G, Taxon T, Uber JG, Morley KM (2009) US Environmental Protection Agency uses operations research to reduce contamination risks in drinking water. Interfaces 39(1):57–68

    Article  Google Scholar 

  • National Fire Protection Association (NFPA) (2003) Fire protection handbook, 19th edn. In: Cote AE (ed). National Fire Protection Association, Quincy

    Google Scholar 

  • Neupauer RM, Records MK, Ashwood WH (2009) Backward probabilistic modeling to identify contaminant sources in water distribution systems. J Water Res Pl-ASCE 136(5):587–591

    Article  Google Scholar 

  • Nilsson KA, Buchberqer SG, Clark RM (2005) Simulating exposures to deliberate intrusions into water distribution systems. J Water Res Pl-ASCE 131(3):228–236

    Article  Google Scholar 

  • Nuzzo JB (2006) The biological threat to U.S. water supplies: toward a national water security policy. Biosecur Bioterr 4(2):147–159

    Google Scholar 

  • Ostfeld A, Uber JG, Salomons E, Berry JW, Hart WE, Phillips CA, Watson JP, Dorini G, Jonkergouw P, Kapelan Z, di Pierro F, Khu ST, Savic D, Eliades D, Polycarpou M, Ghimire SR, Barkdoll BD, Gueli R, Huang JJ, McBean EA, James W, Krause A, Leskovec J, Isovitsch S, Xu JH, Guestrin C, VanBriesen J, Small M, Fischbeck P, Preis A, Propato M, Piller O, Trachtman GB, Wu ZY, Walski T (2008) The battle of the water sensor networks (BWSN): a design challenge for engineers and algorithms. J Water Res Pl-ASCE 134(6):556–568

    Article  Google Scholar 

  • Panguluri S, William PR Jr, Clark RM (2004) Cyber threats and IT/SCADAsystem vulnerability. In: Mays LW (ed) Water supply systems security. Mc Graw-Hill, New York. pp 5.1–5.18

    Google Scholar 

  • Panguluri S, William PR Jr, Ellis P (2011) Cyber security: protecting water and wastewater infrastructure. In: Clark Robert M, Hakim Simon, Ostfeld Avi (eds) Handbook of water and wastewater systems protection. Springer-Science, New York, pp 285–318

    Chapter  Google Scholar 

  • Perelman L, Ostfeld A (2010) Extreme impact contamination events sampling for water distribution systems security. J Water Resour Plann Manage 136(1):80–87

    Article  Google Scholar 

  • Porco JW, Elwell B, McFee J (2006) Domestic municipal end-to-end water security architecture study. In: 8th annual water distribution systems analysis symposium, Cincinnati, Ohio, 27–30 Aug, 2006. American Society of Civil Engineering, Reston

    Google Scholar 

  • Preis A, Ostfeld A (2006) Contamination source identification in water systems: a hybrid model trees–linear programming scheme. J Water Res Pl-ASCE 132(4):263–273

    Article  Google Scholar 

  • Preis A, Ostfeld A (2007) A contamination source identification model for water distribution system security. Eng Optimiz 39(8):941–947

    Article  Google Scholar 

  • Preis A, Ostfeld A (2008) Genetic algorithm for contaminant source characterization using imperfect sensors. Civil Eng Environ Syst 25(1):29–39

    Article  Google Scholar 

  • Preis A, Ostfeld A (2011) Hydraulic uncertainty inclusion in water distribution systems contamination source identification. Urban Water J 8(5):267–277

    Article  Google Scholar 

  • President, Presidential Decision Directive (PDD) 63 (1998) Protecting America’s critical infrastructure. Presidential decision directive 63. The William J. Clinton Presidential Library, directives. Accessed 17 April, 2013. http://www.clintonlibrary.gov/pdd.html

  • President’s Commission on Critical Infrastructure Protection (PCCIP), Critical Foundations: protecting America’s Infrastructures (Washington, DC: October 1997). Report can be accessed at: http://www.fas.org/sgp/library/pccip.pdf

  • Propato M, Uber J (2004) Vulnerability of water distribution systems to pathogen intrusion: how effective is a disinfectant residual? Environ Sci Technol 38(13):3713–3722

    Article  CAS  Google Scholar 

  • Propato M, Sarrazy F, Tryby M (2010) Linear algebra and minimum relative entropy to investigate contamination events in drinking water systems. J Water Res Pl-ASCE 136(4):483–492

    Article  Google Scholar 

  • Rizak SN, Hrudey SE (2006) Misinterpretation of drinking water quality monitoring data with implications for risk management. Environ Sci Technol 40(17):5244–5250

    Article  CAS  Google Scholar 

  • Roberson JA, Morley KM (2005) Contamination warning systems for water: an approach for providing actionable information to decision-makers. American Water Works Association, Denver

    Google Scholar 

  • Rossman LA (2000) EPANET version 2 users manual. EPA/600/R-00/057. Drinking Water Research Division, U.S. Environmental Protection Agency, Cincinnati

    Google Scholar 

  • Safe Drinking Water Act (SDWA) (1974) U.S. Public Law 93-523, 93rd Cong., 16 Dec, 1974

    Google Scholar 

  • Scallan E, Hoekstra RM, Angulo FJ, Tauxe RV, Widdowson M, Roy SL, Jones JL, Griffin PM (2011) Foodborne illness acquired in the United States–major pathogens. Emerg Infect Dis 17(1):7–15

    Google Scholar 

  • Shang F, Uber JG, Rossman LA (2008) Modeling reaction and transport of multiple species in water distribution systems. Environ Sci Technol 42:808–814

    Article  CAS  Google Scholar 

  • Skadsen J, Janke R, Grayman W, Samuels W, TenBroek M, Steglitz B, Bahl S (2008) Distribution system on-line monitoring for detecting contamination and water quality changes. J Am Water Works Ass 100(7):81–94

    CAS  Google Scholar 

  • Tao T, Huang H, Xin K, Liu S (2012) Identification of contamination source in water distribution network based on consumer complaints. J Cent South Univ 19(6):1600–1609

    Article  CAS  Google Scholar 

  • Török TJ, Tauxe RV, Wise RP, Livengood JR, Sokolow R, Mauvais S, Birkness KA, Skeels MR, Horan JM, Foster LR (1997) A large community outbreak of salmonellosis caused by intentional contamination of restaurant salad bars. JAMMA 278(5):389–395

    Article  Google Scholar 

  • Trachtman GB (2006) A “strawman” common sense approach for water quality sensor site selection. In: Proceedings, 8th annual water distribution systems analysis symposium, Cincinnati, OH, 27–30 Aug, 2006. American Society of Civil Engineers, Reston

    Google Scholar 

  • Tucker JB (2000) Lessons from case studies. In: Tucker JB (ed) Toxic terror: assessing terrorist use of chemical and biological weapons. MIT Press, Cambridge. pp 250–251

    Google Scholar 

  • Tularam GA, Properjohn M (2011) An Investigation into modern water distribution network security: risk and implications. Secur J 24(4):283–301

    Article  Google Scholar 

  • U. S. Environmental Protection Agency (U.S. EPA) (2013). Models, tools, and applications. Available at: http://www.epa.gov/nhsrc/toolsandapps.html. Accessed on 5 Feb, 2013

  • U. S. Environmental Protection Agency (U.S. EPA) (2004) Water security research and technical support action plan. EPA/600/R-04/063. U.S. Environmental Protection Agency, Office of Research and Development and Office of Water, Washington

    Google Scholar 

  • U. S. Environmental Protection Agency (U.S. EPA) (2007) Water security initiative: Interim guidance on planning for contamination warning system deployment. EPA 817-R-07-002. U.S. Environmental Protection Agency, Office of Water, Cincinnati

    Google Scholar 

  • U. S. Environmental Protection Agency (U.S. EPA) (2008) Water security initiative Cincinnati pilot post-implementation system status: covering the pilot period: December 2005 through December 2007. EPA-817-R-08-004. U.S. Environmental Protection Agency, Office of Water, Office of Ground Water and Drinking Water, Washington

    Google Scholar 

  • U. S. Government Accountability Office (U.S. GAO) (2006) Internet infrastructure: DHS faces challenges in developing a joint public/private recovery plan. GAO-06-672 (June, 2006) U.S. Government Accountability Office, Washington

    Google Scholar 

  • Uber J, Murray R, Janke R (2004) Use of systems analysis to assess and minimize water security risks. J Contemp Water Res Edu 129(1):34–40

    Article  Google Scholar 

  • U.S Department of Homeland Security (USDHS) (2003) Advisory: potential Al Qaeda threats to U.S. water supply. June 23, 2003

    Google Scholar 

  • U.S. Environmental Protection Agency (U.S. EPA) (2005) Technologies and techniques for early warning systems to monitor and evaluate drinking water quality: a state-of-the-art review. EPA/600/R-05/156. U.S. Environmental Protection Agency, Washington

    Google Scholar 

  • U.S. Environmental Protection Agency (U.S. EPA) (2009) Sensor network design for drinking water contamination warning systems: a compendium of research results and case studies using TEVA-SPOT. EPA/600/R-09/141. Office of Research and Development, National Homeland Security Research Center, U.S. EPA, Cincinnati

    Google Scholar 

  • U.S. Environmental Protection Agency (U.S. EPA) (2011) Fiscal Year 2011 ground water and drinking water statistics. EPA 816-R-13-003. U.S. Environmental Protection Agency, Office of Water, Washington

    Google Scholar 

  • U.S. Environmental Protection Agency () (2013) Homeland security and EPA’s strategic plan. www.epa.gov/homelandsecurityportal/strategicplan.htm. Accessed April 23, 2013

  • Vankayala P, Sankarasubramanian A, Ranjithan SR, Mahinthakumar G (2009) Contaminant source identification in water distribution networks under conditions of demand uncertainty. Environ Forensics 10(3):253–263

    Article  CAS  Google Scholar 

  • Vugrin E, McKenna SA, Hart D (2009) Trajectory clustering approach for reducing water quality event false alarms. In: Proceedings, world environmental and water resources congress, Kansas City, Missouri, 17–21 May, 2009. American Society of Civil Engineers, Reston

    Google Scholar 

  • Walski TM, Chase DV, Savic DA, Grayman WM, Beckwith S, Koelle E (2003) Advanced water distribution modeling and management. Haestad Press, Waterbury, pp 1–4

    Google Scholar 

  • Wang H, Harrison KW (2013) Bayesian update method for contaminant source characterization in water distribution systems. J Water Res Pl-ASCE 139(1):13–22

    Article  Google Scholar 

  • Weiss J. Industrial Control System (ICS) Cyber Security for Water and Waste Water Systems to appear in securing water and waste water systems: global experiences.In: Clark RM and Hakim S (ed). Springer, New York, 10013

    Google Scholar 

  • Welter G, Lechevallier M, Cotruvo J, Moser R, Spangler S (2009) Guidance for decontamination of water system infrastructure. In: Water Research Foundation, Report No. 2981. 2009

    Google Scholar 

  • Willis HH, Morral AR, Kelly TK, Medby JJ (2005) Estimating terrorism risk. RAND Corporation, Center for Terrorism Risk Management Policy

    Google Scholar 

  • Wong AV, McKenna SA, Hart WE, Laird CD (2010) Real-time inversion and response planning in large-scale networks. Comp Aided Chem Eng 28:1027–1032

    Article  CAS  Google Scholar 

  • Wood DJ, Lingireddy S, Boulos PF (2005) Pressure wave analysis of transient flow in pipe distribution systems. MWH Soft Pub, Pasadena

    Google Scholar 

  • Zechman EM, Ranjithan SR (2009) Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system. J Water Res Pl-ASCE 135(5):334–343

    Article  Google Scholar 

Download references

Acknowledgments

The authors gratefully acknowledge the efforts and contributions of the peer reviewers and technical editor Marti Sinclair [contract GS35F4594G, TO1533) who helped to significantly improve the material presented here. The views expressed here are those of the authors and do not necessarily reflect the views or policies of EPA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Janke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Janke, R., Tryby, M.E., Clark, R.M. (2014). Protecting Water Supply Critical Infrastructure: An Overview. In: Clark, R., Hakim, S. (eds) Securing Water and Wastewater Systems. Protecting Critical Infrastructure, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-01092-2_2

Download citation

Publish with us

Policies and ethics