Skip to main content

Terrorism “Assessing the Threat for Critical Infrastructure” Methodologies for Water Supplier

  • Conference paper
Threats to Food and Water Chain Infrastructure

Abstract

Operators of water supply infrastructures will find tons of information on terrorism against critical infrastructures. In the close history of middle Europe, we can come up with many criminal attacks against water suppliers. The attack against the “Bodenseewasserversorgung” in fall 2005 demonstrated again, that water supply is clearly a target for criminals and/or terrorist. Before this event, specially after this repeated event then, many efforts where made to secure the supply chain for providing pure drinking water to our citizens. Infraprotect itself was and still is involved in many research programs to secure drinking water against terrorism. The aim of all these programs beginning by the EPCIP program down to national programs in various countries is to identify and quantify the threat to water supply. In fact there are two common approaches to identify threats; the most common used approach is risk based followed by an effect based approach only.

This work describes and compares the methodologies of water supply operators and the concerns of military leaders, securing water supply for citizens during peace keeping operations.

EPCIP, European program critical infrastructure protection

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    VAT Vulnerability Assessment Team

Bibliography

  • ACO Directive 80-25 Force Protection

    Google Scholar 

  • Antiterrorism Vulnerability Assessment Team Guidelines, Dtra 2002

    Google Scholar 

  • AS/NZS 4360:2004; Australian/New Zealand Standard Risk Management, Standards Australia, Standards New Zealand, Third Edition 2004

    Google Scholar 

  • BMI, BKK, Protecting Critical Infrastructures. A guide for companies and government authorities Risk and Crisis Management

    Google Scholar 

  • EPCIP European program critical infrastructure protection program

    Google Scholar 

  • FwDV 100, Feuerwehr-Dienstvorschrift 100, Führung und Leitung im Einsatz, Stand: 10. März 1999

    Google Scholar 

  • Gustin Joseph F., Disaster & Recovery Planning: A Guide for Facility Managers, Fairmont Press Inc

    Google Scholar 

  • Haimes Yacov Y., Risk Modeling, Assessment, and Management, Wiley, Second Edition, 2004

    Google Scholar 

  • Hirschmann, Kai: Das Phänomen “Terrorismus“: Entwicklungen und neue Herausforderungen; in BAKS: Sicherheitspolitik in neuen Dimensionen; Verlag E.S. Mittler & Sohn GmbH, Hamburg Berlin Bonn, 2001

    Google Scholar 

  • International Risk Governance Council, White paper on managing and reducing social vul- nerabilities from coupled critical infrastructures, October 2006

    Google Scholar 

  • Lewis, Ted G. Critical Infrastructure Protection in Homeland Security — Defending a Networked Nation, Wiley, 2006

    Google Scholar 

  • Rosenthal, Uriel: Crisis management: on the thin line between success and failure. In: Asian Review of Public Administration, 1992

    Google Scholar 

  • Schoch, Bruno: Der neue Terrorismus: Hintergründe und Handlungsfelder in arabischen Staaten; in Kai Hirschmann / Christian Leggemann (Hrsg.): Der Kampf gegen den Terrorismus: Strategien und Handlungserfordernisse in Deutschland; Berliner Wissenschafts-Verlag GmbH; 2003

    Google Scholar 

  • The Business Continuity Institute, BCI, Business Continuity Management, Good Practice Richtlinien, 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Di Wolfgang Czerni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science + Business Media B.V.

About this paper

Cite this paper

Czerni, D.W. (2010). Terrorism “Assessing the Threat for Critical Infrastructure” Methodologies for Water Supplier. In: Koukouliou, V., Ujevic, M., Premstaller, O. (eds) Threats to Food and Water Chain Infrastructure. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3546-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3546-2_7

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3544-8

  • Online ISBN: 978-90-481-3546-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics