Abstract
Operators of water supply infrastructures will find tons of information on terrorism against critical infrastructures. In the close history of middle Europe, we can come up with many criminal attacks against water suppliers. The attack against the “Bodenseewasserversorgung” in fall 2005 demonstrated again, that water supply is clearly a target for criminals and/or terrorist. Before this event, specially after this repeated event then, many efforts where made to secure the supply chain for providing pure drinking water to our citizens. Infraprotect itself was and still is involved in many research programs to secure drinking water against terrorism. The aim of all these programs beginning by the EPCIP program down to national programs in various countries is to identify and quantify the threat to water supply. In fact there are two common approaches to identify threats; the most common used approach is risk based followed by an effect based approach only.
This work describes and compares the methodologies of water supply operators and the concerns of military leaders, securing water supply for citizens during peace keeping operations.
EPCIP, European program critical infrastructure protection
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
VAT Vulnerability Assessment Team
Bibliography
ACO Directive 80-25 Force Protection
Antiterrorism Vulnerability Assessment Team Guidelines, Dtra 2002
AS/NZS 4360:2004; Australian/New Zealand Standard Risk Management, Standards Australia, Standards New Zealand, Third Edition 2004
BMI, BKK, Protecting Critical Infrastructures. A guide for companies and government authorities Risk and Crisis Management
EPCIP European program critical infrastructure protection program
FwDV 100, Feuerwehr-Dienstvorschrift 100, Führung und Leitung im Einsatz, Stand: 10. März 1999
Gustin Joseph F., Disaster & Recovery Planning: A Guide for Facility Managers, Fairmont Press Inc
Haimes Yacov Y., Risk Modeling, Assessment, and Management, Wiley, Second Edition, 2004
Hirschmann, Kai: Das Phänomen “Terrorismus“: Entwicklungen und neue Herausforderungen; in BAKS: Sicherheitspolitik in neuen Dimensionen; Verlag E.S. Mittler & Sohn GmbH, Hamburg Berlin Bonn, 2001
International Risk Governance Council, White paper on managing and reducing social vul- nerabilities from coupled critical infrastructures, October 2006
Lewis, Ted G. Critical Infrastructure Protection in Homeland Security — Defending a Networked Nation, Wiley, 2006
Rosenthal, Uriel: Crisis management: on the thin line between success and failure. In: Asian Review of Public Administration, 1992
Schoch, Bruno: Der neue Terrorismus: Hintergründe und Handlungsfelder in arabischen Staaten; in Kai Hirschmann / Christian Leggemann (Hrsg.): Der Kampf gegen den Terrorismus: Strategien und Handlungserfordernisse in Deutschland; Berliner Wissenschafts-Verlag GmbH; 2003
The Business Continuity Institute, BCI, Business Continuity Management, Good Practice Richtlinien, 2005
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science + Business Media B.V.
About this paper
Cite this paper
Czerni, D.W. (2010). Terrorism “Assessing the Threat for Critical Infrastructure” Methodologies for Water Supplier. In: Koukouliou, V., Ujevic, M., Premstaller, O. (eds) Threats to Food and Water Chain Infrastructure. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3546-2_7
Download citation
DOI: https://doi.org/10.1007/978-90-481-3546-2_7
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3544-8
Online ISBN: 978-90-481-3546-2
eBook Packages: EngineeringEngineering (R0)