Acknowledgement; Contents; Contributors; 1 Securing Water and Wastewater Systems: An Overview; 1.1 Introduction; 1.2 History of Water Supply Vulnerability; 1.3 Threats from Earthquakes; 1.3.1 The Loma Prieta Earthquake; 1.3.2 The Northridge Earthquake; 1.3.3 Kobe City Earthquake; 1.3.4 Technological and Institutional Adaptation; 1.3.4.1 Technological Adaptations; 1.3.4.2 Institutional Adaptations; 1.4 Vulnerable Characteristics of US Water Supply Systems; 1.5 The Threat of Terrorism to Urban Water Systems; 1.5.1 Bioterrorism and Chemical Contamination; 1.6 Countermeasures Against Terrorism 1.6.1 Physical Countermeasures1.6.2 Sensor Networks; 1.7 Cyber Security; 1.7.1 Laws and Regulations Governing the Internet; 1.7.2 Internet Recovery; 1.7.3 Examples of Internet Interruption; 1.7.3.1 Case Study -- The Slammer Worm; 1.7.3.2 Case Study -- A Root Server Attack; 1.7.3.3 Case Study -- The Baltimore Train Tunnel Fire; 1.7.3.4 Case Study -- The September 11, 2001, Terrorist Attack on the World Trade Center; 1.7.3.5 Case Study -- Hurricane Katrina; 1.7.4 Cyber Attacks in the Public Sector; 1.7.4.1 The ''Stuxnet'' Virus; 1.8 Material to Be Included in This Book 1.8.1 Current State of Water Supply and Wastewater Systems Security: An Overview1.8.2 Characteristics of Water and Wastewater Systems in the United States; 1.8.3 Chemical and Microbiological Threats for Water System Contamination; 1.8.4 Monitoring for Natural and Manmade Threats in Water and Wastewater Systems; 1.8.5 Modeling Contaminant Propagation and Contaminant Threats; 1.8.6 Case Study Applications; 1.8.7 Distribution System Modeling, SCADA Systems, Security and Surveillance Systems; 1.8.8 Institutional and Management Issues in Responding to Natural and Manmade Threats 1.8.9 Developing Techniques and Approaches for Natural and Manmade Threat Response1.9 Summary and Conclusions; References; 2 Water/Wastewater Infrastructure Security: Threats and Vulnerabilities; 2.1 Introduction; 2.2 Why Secure Water Infrastructure?; 2.3 Threats to Water Systems; 2.3.1 Evolving Threat Environment; 2.3.1.1 September 11 Terrorist Attacks; 2.3.1.2 Hurricane Katrina; 2.3.2 Threat Assessments; 2.3.3 Natural Disasters; 2.3.3.1 Human-Caused Incidents; 2.3.3.2 External Threats; 2.3.3.3 Internal Threats; 2.3.3.4 Cyber Threats; 2.3.4 Design Basis Threat 2.3.5 Continuity Threats to Workforce and Infrastructure2.3.5.1 The Dual Threat: Aging Infrastructure and Aging Workforce; 2.3.5.2 Aging Infrastructure; 2.3.5.3 Interdependent Infrastructure Failures; 2.3.5.4 Workforce Illness; 2.4 Water System Vulnerabilities; 2.4.1 Above-Ground Structures; 2.4.2 Below-Ground Structures; 2.4.3 SCADA and Cyber Systems; 2.4.4 Vulnerability Assessments; References; 3 EPA Drinking Water Security Research Program; 3.1 Background; 3.2 Research Drivers; 3.3 Objectives and Desired Outcomes; 3.4 Water Security Research; 3.4.1 Protection and Prevention 3.4.1.1 Blast Vulnerability Assessment Tool |