Abstract
Government planners have long been aware that urban water systems are vulnerable to threats and disasters, both manmade and natural, including water shortages and droughts, earthquakes, and storms with high winds and flooding. Since the attacks of September 11, 2001, government planners in the United States have been forced to also consider the vulnerability of the nation’s critical infrastructure, including water systems, to terrorism. The Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (U.S. Congress 2002) intensified the focus on water security research in the United States. Homeland Security Presidential Directive 7 (HSPD-7), signed on December 17, 2003, established a national policy for Federal departments and agencies to identify and prioritize critical infrastructure and to protect them from terrorist attacks. HSPD-7 established the Environmental Protection Agency (EPA) as the lead agency for the Water Sector’s critical infrastructure protection activities. Consequently the EPA developed a Homeland Security Strategy, which is regularly updated (U.S. EPA 2013). The intent of the act was to enhance national security and protect human health and the environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAbbreviations
- CANARY:
-
Contamination event detection system
- CMMS:
-
Computerized maintenance management systems
- CWS:
-
Contamination warning system
- DHS:
-
Department of Homeland Security
- DSL:
-
Digital subscriber lines
- EDS:
-
Event detection system
- EPA:
-
U.S. Environmental Protection Agency
- GA:
-
Genetic algorithm
- GAO:
-
Government Accountability Office
- h:
-
Hours
- HMI:
-
Human–machine interface
- ICS:
-
Industrial control system
- IT:
-
Information technology
- LIMS:
-
Laboratory information management system
- LAN:
-
Local area network
- MCMC:
-
Marko chain Monte Carlo
- MILP:
-
Mixed integer linear programming
- NFPA:
-
National fire protection association
- NTNCWS:
-
Nontransient, noncommunity water supply
- ODE:
-
Ordinary differential equation
- ORP:
-
Oxidation reduction potential
- pH:
-
A measure of acidity
- PIN:
-
Possible ingress nodes
- PLC:
-
Programmable logic controller
- QP:
-
Quadratic programming
- RTU:
-
Remote terminal units
- S:
-
Seconds
- SCADA:
-
Supervisory control and data acquisition
- SDWA:
-
Safe drinking water Act
- TEVA-SPOT:
-
Threat ensemble vulnerability assessment sensor placement optimization tool
- TEVA:
-
Threat ensemble vulnerability assessment
- TNCWS:
-
Transient noncommunity water supply
- TOC:
-
Total organic carbon
- VPN:
-
Virtual private network
- VX:
-
An extremely toxic substance that has no known uses except in chemical warfare as a nerve agent
- WDS:
-
Water distribution system
- WSi:
-
Water security initiative
- WS:
-
Water security
References
Allgeier SC, Lee Y, Umberg K, Tyree M (2008) Operational experience with water quality event detection during the Cincinnati water security initiative pilot. In: Proceedings of the AWWA water quality technology conference, Cincinnati, OH, 16–20 Nov, 2008. American Water Works Association, Denver
Allgeier SC, Umberg K, Johnson R, Sahni N (2011) Detection of distribution system contamination incidents using online water quality monitoring. In: Proceedings of the AWWA water quality technology conference, Phoenix, AZ, 13–17 Nov, 2011. American Water Works Association, Denver
Allmann TP, Carlson KH (2005) Extended summary: modeling intentional distribution system contamination and detection. J Am Water Works Ass 97(1):58
American Society of Civil Engineers (ASCE) (2004) Interim voluntary guidelines for designing an online contaminant monitoring system. American Society of Civil Engineers, Reston
American Water Works Association (AWWA) (2004) Interim voluntary security guidance for water utilities. American Water Works Association, Denver
American Water Works Association (AWWA) (2010) Virus exploits USB vulnerability to reach SCDA systems. Streamlines (e-newsletter), July 27, 2010, Vol. 2, No. 19
Angulo FJ, Tippen S, Sharp DJ, Payne BJ, Collier C, Hill JE, Barrett TJ, Clark RM, Geldreich EE, Donnell HD Jr, Swerdlow DL (1997) A community waterborne outbreak of salmonellosis and the effectiveness of a boil water order. Am J Public Health 87(4):580–584
Bahadur R, Samuels WB, Pickus J (2003) Case study for a distribution system emergency response tool. American Water Works Association Research Foundation, Denver, CO
Baranowski T, Janke R, Murray R, Bahl S, Sanford L, Steglitz B and Skadsen J (2008) Case study analysis to identify and evaluate potential response initiatives in a drinking water distribution system following a contamination event. In: Proceedings, 2008 Borchardt conference, Ann Arbor, Michigan, 27–28 Feb, 2008
Beering PS (2002) Threats on tap: understanding the terrorist threat to water. J Water-ASCE 128(3):163–167
Berry J, Fleischer L, Hart WE, Phillips CA, Watson JP (2005a) Sensor placement in municipal water networks. J Water Res Pl-ASCE 131(3):237–243
Berry J, Hart WE, Phillips CA, Uber JG, Walski TM (2005b) Water quality sensor placement in water networks with budget constraints. In: Proceedings, world water and environmental resources congress. American Society of Civil Engineers, Reston
Boulos PF, Karney BW, Wood DJ, Lingireddy S (2005) Hydraulic transient guidelines for protecting water distribution systems. J Am Water Works Ass 97(5):111–124
Boulos PF, Lansey KE, Karney BW (2006) Comprehensive water distribution systems analysis handbook for engineers and planners. 2nd edn. MWH Soft Pub, Broomfield. 660 pp
Bristow E, Brumbelow K (2006) Delay between sensing and response in water contamination events. J Infrastruct Syst 12(2):87–95
Brosnan TM (ed) (1999) Early warning monitoring to detect hazardous events in water supplies. In: An ILSI (International Life Sciences Institute) Risk Science Institute workshop report. ILSI Press, Washington
Burrows WD, Renner SE (1999) Biological warfare agents as threats to potable water. Environ Health Perspect 107(12):975–984
Chandrasekaran L (2006) Predicting disease incidence due to contaminant intrusion in a water distribution system. Master’s thesis, University of Cincinnati, Cincinnati. 178 pp
Clark RM (2011) U.S. water and wastewater critical infrastructure. In: Clark RM, Hakim S, Ostfeld A (eds) The handbook for securing water and wastewater systems. Springer, New York
Clark RM, Deininger RA (2000) Protecting the nation’s critical infrastructure: the vulnerability of U.S. water supply systems. JCCM 8(2):73–80
Clark RM, Deininger RA (2001) Minimizing the vulnerability of water supplies to natural and terrorist threats. In: Proceedings of the American Water Works Association’s IMTech conference, Atlanta, GA, 8–11 April, 2001, pp 1–20
Clark RM, Tippen DL (1990) Water supply. In: Corbitt RA (ed) Standard handbook of environmental engineering. McGraw-Hill, New York, pp 5.173–5.220
Clark RM, Grayman WM, Males RM (1988) Contaminant propagation in distribution systems. J Environ Eng-ASCE 114(2):929–943
Clark RM, Grayman WM, Goodrich JA (1991a) Water quality modeling: its regulatory implications. In: Proceedings, AwwaRF/EPA conference on water quality modeling in distribution systems, 4–5 Feb, 1991, Cincinnati, OH. AWWA Research Foundation, Denver
Clark RM, Grayman WM, Goodrich JA, Deininger RA, Hess AF (1991b) Field testing of distribution water quality models. J Am Water Works Ass 83(7):67–75
Clark RM, Geldreich EE, Fox KR, Rice EW, Johnson CH, Goodrich JA, Barnik JA, Abdesaken F (1996) Tracking a Salmonella serovar Typhimurium outbreak in Gideon, Missouri: role of contaminant propagation modeling. J Water Supply Res T 45(4):171–183
Clark RM, Grayman WM, Buchberger SG, Lee Y, Hartman DJ (2004) Drinking water distribution systems: an overview. In: Mays LW (ed) Water supply systems security. McGraw-Hill, New York, pp 4.1– 4.49
Clark RM, Hakim S, Ostfeld A (2011) Securing water and wastewater systems: an overview. In: Clark RM, Hakim S, Ostfeld A (ed) Handbook of water and wastewater systems protection. Springer, New York. pp 1–25
Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. HarperCollins Publishers, New York
U.S. Congress (2002) Public health security and bioterrorism preparedness and response act of 2002: Public law 107–188. 107th Congress, June 12, 2002
Copeland C (2010) Terrorism and security issues facing the water infrastructure sector. Congressional Research Service, 7-5700, www.crs.gov, RL32189, 16 Mar, 2010
Craun MF, Craun GF, Calderon RL, Beach MJ (2006) Waterborne outbreaks reported in the United States. J Water Health 4(Supplement 2):19–30
Danyluk MD, Harris LJ, Schaffner DW (2006) Monte Carlo simulations assessing the risk of salmonellosis from consumption of almonds. J Food Protect 69(7):1594–1599
Davis MJ, Janke R (2008) Importance of exposure model in estimating impacts when a water distribution system is contaminated. J Water Resour Plann Manage 134(5):449–456
Davis MJ, Janke R (2009) Development of a probabilistic timing model for the ingestion of tap water. J Water Resour Plann Manage 135(5):397–405
Davis MJ, Janke R (2011) Patterns in potential impacts associated with contamination events in water distribution systems. J Water Res Pl-ASCE 137(1):1–9
Davis MJ, Janke R, Taxon TN (2010) Assessing potential impacts associated with contamination events in water distribution systems: a sensitivity analysis. EPA/600/R-10/061. U.S. Environmental Protection Agency, Cincinnati
Davis MJ, Janke R, Magnuson M (2013) A framework for estimating the adverse health effects of contamination events in water distribution systems and its application. Accepted Risk Analysis
Davis MJ, Janke R, Phillips C (2013a) Robustness of designs for drinking-water contamination warning systems under uncertain conditions. In preparation
DeSanctis A, Shang F, Uber JG (2009) Real-time identification of possible contamination sources using network backtracking methods. J Water Res Pl-ASCE 136(4):444–453
DiCristo C, Leopardi A (2008) Pollution source identification of accidental contamination in water distribution networks. J Water Res Pl-ASCE 134(2):197–202
Economic Research Service (2008) Foodborne illness cost calculator: Salmonella. United States Department of Agriculture
Fair GM, Geyer JC (1971) Water supply and waste-water disposal. Wiley, New York
Fox KR, Lytle DA (1996) Milwaukee’s crypto outbreak: investigation and recommendations. J Am Water Works Ass 88(9):87–94
Friedman M, Radder L, Harrison S, Howie D, Britton M, Boyd G, Wang H, Gullick R, LeChevallier M, Wood D, Funk J (2004) Verification and control of pressure transients and intrusion in distribution systems. AWWA Research Foundation, Denver
Fujiwara M, Manwaring JM, Clark RM (1995) Drinking water in Japan and the United States: conference objectives. In: Clark RM, Clark DA (eds) Drinking water quality management. Technomic Publishing Company Inc, Lancaster
Geldreich EE, Fox KR, Goodrich JA, Rice EW, Clark RM, Swerdlow DL (1992) Searching for a water supply connection in the Cabool, Missouri disease outbreak of Escherichia coli 0157:H7. Water Res 26(8):1127–1137
Ghimire SR, Barkdoll BD (2006) A heuristic method for water quality sensor location in a municipal water distribution system: mass-released based approach. In: Proceedings, 8th annual water distribution systems analysis symposium, Cincinnati, OH, 27–30 Aug, 2006. American Society of Civil Engineer, Reston
Gleick PH (2006) Water and terrorism. Water Policy 8:481–503
Grayman WM, Clark RM, Harding BL, Maslia ML, Aramini J (2004) Reconstructing historical contamination events. In: Mays L (ed) Water supply systems security. McGraw-Hill, New York. pp 10.1–10.55
Grayman WM, Buchberger S, Samuels W (2008) Hydraulic models of buildings for use in contamination studies. In: Van Zyl JE, Ilemobade AA, Jacobs HE (eds) Proceedings, 10th annual water distribution system analysis conference, 17–20 Aug, 2008, Kruger National Park, South Africa. American Society of Civil Engineers, Reston
Guan J, Aral MM, Maslia ML, Grayman WM (2006) Identification of contaminant sources in water distribution systems using simulation–optimization method: case study. J Water Res Pl-ASCE 132(4):252–262
Gullick RW, LeChevallier MW, Svindland RC, Friedman MJ (2004) Occurrence of transient low and negative pressures in distribution systems. J Am Water Works Ass 96(11):52–66
Haimes YY, Horowitz BM (2004) Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. J Homel Secur Emerg 1(3): article 302
Hall J, Szabo J (2010) On-line water quality monitoring in drinking water distribution systems: A summary report of USEPA research and best practices. JAWWA 102(8):20–22
Hall J, Zaffiro AD, Marx RB, Kefauver PC, Krishnan ER, Haught RC, Herrmann JG (2007) On-line water quality parameters as indicators of distribution system contamination. J Am Water Works Ass 99(11):66–77
Hart WE, Murray R (2010) Review of sensor placement strategies for contamination warning systems in drinking water distribution systems. J Water Res Pl-ASCE 136(6):611–619
Hart D, McKenna SA, Klise K, Cruz V, Wilson M (2007) CANARY: a water quality event detection algorithm development tool. In: Proceedings, world environmental and water resources congress, Tampa, FL, 15–19 May, 2007. American Society of Civil Engineers, Reston
Hart D, McKenna SA, Murray R, Haxton T (2010) Combining water quality and operational data for improved event detection. In: Proceedings, 12th annual conference on water distribution systems analysis, Tucson, AZ, 12–15 Sept, 2010. American Society of Civil Engineers: Reston
Hatchett S, Uber J, Boccelli D, Haxton T, Janke R, Kramer A, Matracia A, Panguluri S (2011) Real- time distribution system modeling: development, application, and insights. In: Savic DA, Kapelan Z and Butler D (eds) Proceedings of the eleventh international conference on computing and control for the water industry, Exeter, UK. Centre for Water Systems, University of Exeter, Exeter, Sept 5–7, 2011
Haxton T, Murray R and Klise K (2012) Examining the application of modeling tools to identify effective flushing locations. In: Proceedings, world environmental and water resources congress 2012, Albuquerque, New Mexico, 20–24 May, 2012, pp 3071–3081. American Society of Civil Engineers, Reston
Herrick RL, Buchberger SG, Clark RM, Kupferle M, Murray R, Succop P (2011) A Markov model to estimate Salmonella morbidity mortality, illness, duration, and cost. Health Econ 21(10):1169–1182. Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/hec.1779
Hickman DC (1999) A chemical and biological warfare threat: USAF water systems at risk. Future Warfare Series No. 3. Air University, U.S. Air Force Counterproliferation Center, Maxwell AFB, Alabama, p. 36. Accessed 23 April, 2013. http://www.au.af.mil/au/awc/awcgate/cpc-pubs/hickman.htm
Holcomb DL, Smith MA, Ware GO, Hung YC, Brackett RE, Doyle MP (1999) Comparison of six dose-response models for use with food-borne pathogens. Risk Anal 19(6):1091–1100
Hrudey SE, Hrudey EJ (2004) Safe drinking water: lessons from recent outbreaks in affluent nations. IWA Publishing, London
Janke R, Murray R, Uber J, Taxon T (2006) Comparison of physical sampling and real-time monitoring strategies for designing a contamination warning system in a drinking water distribution system. J Water Resour Plann Manage 132(4):310–313
Janke R, Haxton T, Grayman W, Bahadur R, Murray R, Samuels W, Taxon T (2009) Sensor network design and performance in water systems dominated by multi-story buildings. In: Proceedings, world environmental and water resources congress, Kansas City, MO, 17–19 May, 2009. American Society for Civil Engineers, Reston
Janke R, Morley K, Uber J, Haxton T (2011) Real-time modeling for water distribution system operation: integrating security developed technologies with normal operations. In: Proceedings, American water works association, water security conference and distribution systems symposium, Nashville, TN, 11–14 Sept, 2011. American Water Works Association, Denver
Jung BS, Karney BW, Boulos PF, Wood DJ (2007) The need for comprehensive transient analysis of distribution systems. J Am Water Works Ass 99(1):112–123
Karim MR, Abbaszadegan M, LeChevallier MW (2003) Potential for pathogen intrusion during pressure transients. J Am Water Works Ass 95(5):134–146
Khanal N, Buchberger SG, McKenna SA (2006) Distribution system contamination events: exposure, influence, and sensitivity 2006. J Water Res Pl-ASCE 132(4):283–292
Koch MW, McKenna SA (2011) Distributed sensor fusion in water quality event detection. J Water Res Pl-ASCE 137(1):10–19
Krause A, Leskovec J, Guestrin C, VanBriesen JM, Faloutsos C (2008) Efficient sensor placement optimization for securing large water distribution networks. J Water Resour Plann Manage 134(6):516–526
Kroll DJ (2006) Securing our water supply: protecting a vulnerable resource. PennWell Corp, Tulsa. ISBN 10: 1593700695
Kumar J, Brill ED, Mahinthakumar G, Ranjithan S (2012) Contaminant source characterization in water distribution systems using binary signals. J Hydroinform 14(3):585–602
Laird CD, Biegler LT, van der Bloeman Waanders BGV, Bartlett RA (2005) Contaminant source determination for water works. J Water Res Pl-ASCE 131(2):125–134
Laird CD, Biegler LT, van der Bloeman Waanders BGV (2006) Mixed-integer approach for obtaining unique solutions in source inversion of water networks. J Water Res Pl-ASCE 132(4):242–251
LeChevallier MW, Gullick RW, Karim MR, Friedman M, Funk JE (2003) The potential for health risks from intrusion of contaminants into distribution systems from pressure transients. J Water Health 1(1):3–14
Liu L, Ranjithan S, Mahinthakumar G (2011a) Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure. J Water Res Pl-ASCE 137(2):183–192
Liu L, Sankarasubramanian A, Ranjithan SR (2010b) Logistic regression analysis to estimate contaminant sources in water distribution systems. J Hydroinform 13(3):545–557
Liu L, Zechman EM, Mahinthakumar G, Ranjithan SR (2012) Identifying contaminant sources for water distribution systems using a hybrid method. Civil Eng Environ Syst 29(2):123–136
MacKenzie WR, Hoxie NJ, Proctor ME, Gradus MS, Blair KA, Peterson DE et al (1994) A massive outbreak in Milwaukee of Cryptosporidium infection transmitted through the public water supply. New Engl J Med 331:161–167
Mann AV, McKenna SA, Hart WE, Laird CD (2012) Real-time inversion in large-scale water networks using discrete measurements. Comput Chem Eng 37:143–151
Mena KD, Mota LC, Meckes MC, Green CF, Hurd WW, Gibbs SG (2008) Quantitative microbial risk assessment of a drinking water—wastewater cross-connection simulation. J Environ Eng Sci 7(5):525–530
Morley K, Janke R, Murray R, Fox K (2007) Drinking water contamination—warning systems: water utilities driving water security research. J Am Water Works Ass 99(6):40–46
Murray R, Janke R, Uber J (2004) The threat ensemble vulnerability assessment program for drinking water distribution system security. In: Proceedings, ASCE-EWRI world water and environmental resources congress, Salt Lake City, UT, June 27–July 1, 2004
Murray R, Uber J, Janke R (2006) Model for estimating acute health impacts from consumption of contaminated drinking water. J Water Res Pl-ASCE 132(4):293–299
Murray R, Janke R, Hart WE, Berry JW, Taxon T, Uber J (2008) Sensor network design of contamination warning systems: a decision framework. J Am Water Works Ass 100(11):97–109
Murray R, Hart WE, Phillips CA, Berry J, Boman EG, Carr RD, Riesen LA, Watson JP, Haxton T, Herrmann JG, Janke R, Gray G, Taxon T, Uber JG, Morley KM (2009) US Environmental Protection Agency uses operations research to reduce contamination risks in drinking water. Interfaces 39(1):57–68
National Fire Protection Association (NFPA) (2003) Fire protection handbook, 19th edn. In: Cote AE (ed). National Fire Protection Association, Quincy
Neupauer RM, Records MK, Ashwood WH (2009) Backward probabilistic modeling to identify contaminant sources in water distribution systems. J Water Res Pl-ASCE 136(5):587–591
Nilsson KA, Buchberqer SG, Clark RM (2005) Simulating exposures to deliberate intrusions into water distribution systems. J Water Res Pl-ASCE 131(3):228–236
Nuzzo JB (2006) The biological threat to U.S. water supplies: toward a national water security policy. Biosecur Bioterr 4(2):147–159
Ostfeld A, Uber JG, Salomons E, Berry JW, Hart WE, Phillips CA, Watson JP, Dorini G, Jonkergouw P, Kapelan Z, di Pierro F, Khu ST, Savic D, Eliades D, Polycarpou M, Ghimire SR, Barkdoll BD, Gueli R, Huang JJ, McBean EA, James W, Krause A, Leskovec J, Isovitsch S, Xu JH, Guestrin C, VanBriesen J, Small M, Fischbeck P, Preis A, Propato M, Piller O, Trachtman GB, Wu ZY, Walski T (2008) The battle of the water sensor networks (BWSN): a design challenge for engineers and algorithms. J Water Res Pl-ASCE 134(6):556–568
Panguluri S, William PR Jr, Clark RM (2004) Cyber threats and IT/SCADAsystem vulnerability. In: Mays LW (ed) Water supply systems security. Mc Graw-Hill, New York. pp 5.1–5.18
Panguluri S, William PR Jr, Ellis P (2011) Cyber security: protecting water and wastewater infrastructure. In: Clark Robert M, Hakim Simon, Ostfeld Avi (eds) Handbook of water and wastewater systems protection. Springer-Science, New York, pp 285–318
Perelman L, Ostfeld A (2010) Extreme impact contamination events sampling for water distribution systems security. J Water Resour Plann Manage 136(1):80–87
Porco JW, Elwell B, McFee J (2006) Domestic municipal end-to-end water security architecture study. In: 8th annual water distribution systems analysis symposium, Cincinnati, Ohio, 27–30 Aug, 2006. American Society of Civil Engineering, Reston
Preis A, Ostfeld A (2006) Contamination source identification in water systems: a hybrid model trees–linear programming scheme. J Water Res Pl-ASCE 132(4):263–273
Preis A, Ostfeld A (2007) A contamination source identification model for water distribution system security. Eng Optimiz 39(8):941–947
Preis A, Ostfeld A (2008) Genetic algorithm for contaminant source characterization using imperfect sensors. Civil Eng Environ Syst 25(1):29–39
Preis A, Ostfeld A (2011) Hydraulic uncertainty inclusion in water distribution systems contamination source identification. Urban Water J 8(5):267–277
President, Presidential Decision Directive (PDD) 63 (1998) Protecting America’s critical infrastructure. Presidential decision directive 63. The William J. Clinton Presidential Library, directives. Accessed 17 April, 2013. http://www.clintonlibrary.gov/pdd.html
President’s Commission on Critical Infrastructure Protection (PCCIP), Critical Foundations: protecting America’s Infrastructures (Washington, DC: October 1997). Report can be accessed at: http://www.fas.org/sgp/library/pccip.pdf
Propato M, Uber J (2004) Vulnerability of water distribution systems to pathogen intrusion: how effective is a disinfectant residual? Environ Sci Technol 38(13):3713–3722
Propato M, Sarrazy F, Tryby M (2010) Linear algebra and minimum relative entropy to investigate contamination events in drinking water systems. J Water Res Pl-ASCE 136(4):483–492
Rizak SN, Hrudey SE (2006) Misinterpretation of drinking water quality monitoring data with implications for risk management. Environ Sci Technol 40(17):5244–5250
Roberson JA, Morley KM (2005) Contamination warning systems for water: an approach for providing actionable information to decision-makers. American Water Works Association, Denver
Rossman LA (2000) EPANET version 2 users manual. EPA/600/R-00/057. Drinking Water Research Division, U.S. Environmental Protection Agency, Cincinnati
Safe Drinking Water Act (SDWA) (1974) U.S. Public Law 93-523, 93rd Cong., 16 Dec, 1974
Scallan E, Hoekstra RM, Angulo FJ, Tauxe RV, Widdowson M, Roy SL, Jones JL, Griffin PM (2011) Foodborne illness acquired in the United States–major pathogens. Emerg Infect Dis 17(1):7–15
Shang F, Uber JG, Rossman LA (2008) Modeling reaction and transport of multiple species in water distribution systems. Environ Sci Technol 42:808–814
Skadsen J, Janke R, Grayman W, Samuels W, TenBroek M, Steglitz B, Bahl S (2008) Distribution system on-line monitoring for detecting contamination and water quality changes. J Am Water Works Ass 100(7):81–94
Tao T, Huang H, Xin K, Liu S (2012) Identification of contamination source in water distribution network based on consumer complaints. J Cent South Univ 19(6):1600–1609
Török TJ, Tauxe RV, Wise RP, Livengood JR, Sokolow R, Mauvais S, Birkness KA, Skeels MR, Horan JM, Foster LR (1997) A large community outbreak of salmonellosis caused by intentional contamination of restaurant salad bars. JAMMA 278(5):389–395
Trachtman GB (2006) A “strawman” common sense approach for water quality sensor site selection. In: Proceedings, 8th annual water distribution systems analysis symposium, Cincinnati, OH, 27–30 Aug, 2006. American Society of Civil Engineers, Reston
Tucker JB (2000) Lessons from case studies. In: Tucker JB (ed) Toxic terror: assessing terrorist use of chemical and biological weapons. MIT Press, Cambridge. pp 250–251
Tularam GA, Properjohn M (2011) An Investigation into modern water distribution network security: risk and implications. Secur J 24(4):283–301
U. S. Environmental Protection Agency (U.S. EPA) (2013). Models, tools, and applications. Available at: http://www.epa.gov/nhsrc/toolsandapps.html. Accessed on 5 Feb, 2013
U. S. Environmental Protection Agency (U.S. EPA) (2004) Water security research and technical support action plan. EPA/600/R-04/063. U.S. Environmental Protection Agency, Office of Research and Development and Office of Water, Washington
U. S. Environmental Protection Agency (U.S. EPA) (2007) Water security initiative: Interim guidance on planning for contamination warning system deployment. EPA 817-R-07-002. U.S. Environmental Protection Agency, Office of Water, Cincinnati
U. S. Environmental Protection Agency (U.S. EPA) (2008) Water security initiative Cincinnati pilot post-implementation system status: covering the pilot period: December 2005 through December 2007. EPA-817-R-08-004. U.S. Environmental Protection Agency, Office of Water, Office of Ground Water and Drinking Water, Washington
U. S. Government Accountability Office (U.S. GAO) (2006) Internet infrastructure: DHS faces challenges in developing a joint public/private recovery plan. GAO-06-672 (June, 2006) U.S. Government Accountability Office, Washington
Uber J, Murray R, Janke R (2004) Use of systems analysis to assess and minimize water security risks. J Contemp Water Res Edu 129(1):34–40
U.S Department of Homeland Security (USDHS) (2003) Advisory: potential Al Qaeda threats to U.S. water supply. June 23, 2003
U.S. Environmental Protection Agency (U.S. EPA) (2005) Technologies and techniques for early warning systems to monitor and evaluate drinking water quality: a state-of-the-art review. EPA/600/R-05/156. U.S. Environmental Protection Agency, Washington
U.S. Environmental Protection Agency (U.S. EPA) (2009) Sensor network design for drinking water contamination warning systems: a compendium of research results and case studies using TEVA-SPOT. EPA/600/R-09/141. Office of Research and Development, National Homeland Security Research Center, U.S. EPA, Cincinnati
U.S. Environmental Protection Agency (U.S. EPA) (2011) Fiscal Year 2011 ground water and drinking water statistics. EPA 816-R-13-003. U.S. Environmental Protection Agency, Office of Water, Washington
U.S. Environmental Protection Agency () (2013) Homeland security and EPA’s strategic plan. www.epa.gov/homelandsecurityportal/strategicplan.htm. Accessed April 23, 2013
Vankayala P, Sankarasubramanian A, Ranjithan SR, Mahinthakumar G (2009) Contaminant source identification in water distribution networks under conditions of demand uncertainty. Environ Forensics 10(3):253–263
Vugrin E, McKenna SA, Hart D (2009) Trajectory clustering approach for reducing water quality event false alarms. In: Proceedings, world environmental and water resources congress, Kansas City, Missouri, 17–21 May, 2009. American Society of Civil Engineers, Reston
Walski TM, Chase DV, Savic DA, Grayman WM, Beckwith S, Koelle E (2003) Advanced water distribution modeling and management. Haestad Press, Waterbury, pp 1–4
Wang H, Harrison KW (2013) Bayesian update method for contaminant source characterization in water distribution systems. J Water Res Pl-ASCE 139(1):13–22
Weiss J. Industrial Control System (ICS) Cyber Security for Water and Waste Water Systems to appear in securing water and waste water systems: global experiences.In: Clark RM and Hakim S (ed). Springer, New York, 10013
Welter G, Lechevallier M, Cotruvo J, Moser R, Spangler S (2009) Guidance for decontamination of water system infrastructure. In: Water Research Foundation, Report No. 2981. 2009
Willis HH, Morral AR, Kelly TK, Medby JJ (2005) Estimating terrorism risk. RAND Corporation, Center for Terrorism Risk Management Policy
Wong AV, McKenna SA, Hart WE, Laird CD (2010) Real-time inversion and response planning in large-scale networks. Comp Aided Chem Eng 28:1027–1032
Wood DJ, Lingireddy S, Boulos PF (2005) Pressure wave analysis of transient flow in pipe distribution systems. MWH Soft Pub, Pasadena
Zechman EM, Ranjithan SR (2009) Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system. J Water Res Pl-ASCE 135(5):334–343
Acknowledgments
The authors gratefully acknowledge the efforts and contributions of the peer reviewers and technical editor Marti Sinclair [contract GS35F4594G, TO1533) who helped to significantly improve the material presented here. The views expressed here are those of the authors and do not necessarily reflect the views or policies of EPA.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Janke, R., Tryby, M.E., Clark, R.M. (2014). Protecting Water Supply Critical Infrastructure: An Overview. In: Clark, R., Hakim, S. (eds) Securing Water and Wastewater Systems. Protecting Critical Infrastructure, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-01092-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-01092-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01091-5
Online ISBN: 978-3-319-01092-2
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)