Abstract
Water supply network security issues such as vandalism are of concern but have received less than proper attention in the past. Clearly water infrastructure is recognised as critical; the survival of a community depends on its ability to deliver fresh, clean drinking water to its consumers. Recent security breaches in Australia and abroad have led us to consider the issues of risk and consequence of deliberate attacks. However, securing water supply networks is a complex problem; therefore it is necessary to study risks and develop appropriate management strategies. This article reviews the characteristics of water supply systems and design traits that make them susceptible. The range of potential threats are classified; biological/chemical and physical that includes physical attack, cyber attack and hoaxes. Risk analysis methodologies to assess the vulnerability are outlined, along with possible countermeasures that may minimise threats. The review highlights the vulnerability of water supply systems to deliberate attacks and sabotage and the need for a comprehensive and holistic approach to risk management and countermeasures.
Similar content being viewed by others
References
Apostolakis, G.E. and Lemon, D.M. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25 (2): 361–376.
Australian Broadcasting Commission. (2003) Sabotage deprives 300 000 Iraqis of water: ICRC (online) ABC News. 17 August, http://www.abc.net.au/news/stories/2003/08/17/926250.htm, accessed 12 December 2009.
Beaglehole, R., Irwin, A. and Prentice, T. (2004) The World Health Report 2004: Changing History. Geneva: World Health Orgnization.
Berger, B. and Stevenson, A. (1955) Feasibility of biological warfare against public water supplies. Journal of American Water Works Association (JAWWA) 47 (2): 101–110.
Chalecki, E.L. (2002) A new vigilance: Identifying and reducing the risks of environmental terrorism. Global Environmental Politics 2 (1): 46–64.
Clark, R.M. and Deininger, R.A. (2000) Protecting the nation's critical infrastructure: The vulnerability of US water supply systems. Journal of Contingencies and Crisis Management 8 (2): 73–80.
Copeland, C. and Cody, B. (2009) Terrorism and security issues facing the water infrastructure sector. Washington, DC: Congressional Research Service. 25 April 2005, http://www.fas.org/sgp/crs/terror/RL32189.pdf, accessed 10 December 2009.
CSIRO. (2009a) Urban water: Infrastructure technologies. 3 April, http://www.csiro.au/science/Infrastructure-Technologies.html, accessed 8 December 2009.
CSIRO. (2009b) Urban water: Addressing Australia's urban water challenges. 10 February, http://www.csiro.au/science/Urban-Water.html, accessed 8 December 2009.
Danneels, J.J. (2001) Protecting Water Supply Systems from Terrorists. Committee Holding Hearing: House Science Committees. Livermore, CA: N. Laboratories, Sandia Corporation.
Durodie, B. (2005) The Concept of Risk. Nuffield Trust Global Programme on Health, Foreign Policy and Security. Swindon, UK: Risk Case Studies.
Eloff, J.H.P., Labuschagne, L. and Badenhorst, K.P. (1993) A comparative framework for risk analysis methods. Computers & Security 12 (6): 597–603.
Foran, J.A. and Brosnan, T.M. (2000) Early warning systems for hazardous biological agents in potable water. Environmental Health Perspectives 108 (10): 993–996.
Fox, K.R. and Lytle, D.A. (1996) Milwaukee's crypto outbreak: Investigation and recommendations. Journal of American Water Works Association (JAWWA) 88 (9): 87–94.
Franz, D.R. and Zajtchuk, R. (2002) Biological terrorism: Understanding the threat, preparation, and medical response. Disease-a-Month 48 (8): 489–564.
Gilbert, P.H. et al (2003) Infrastructure issues for cities – Countering terrorist threat. Journal of Infrastructure Systems 9 (1): 44–54.
Gleick, P.H. (2006) Water and terrorism. Water Policy 8: 481–503.
Gleick, P.H. (2008) Water: Threats and opportunities, recommendations for the next president, background material. 9 October, http://www.pacinst.org/publications/essays_and_opinion/presidential_recommendations/background.pdf, accessed 2 November 2009.
Grigg, N.S. (2003) Water utility security: Multiple hazards and multiple barriers. Journal of Infrastructure Systems 9 (2): 81–88.
Haimes, Y.Y., Matalas, N.C., Lambert, J.H., Jackson, B.A. and Fellows, J.F.R. (1998) Reducing vulnerability of water supply systems to attack. Journal of Infrastructure Systems 4 (4): 164–177.
Hickman, D.C. (1999) A Chemical and Biological Warfare Threat: USAF Water Systems at Risk. Alabama: US Air Force Counterproliferation Center, Air War College, Air University, Maxwell Air Force Base. Future Warfare Series No. 3; September.
Khan, A.S., Swerdlow, D.L. and Juranek, D.D. (2001) Precautions against biological and chemical terrorism directed at food and water supplies. Public Health Reports 116 (1): 3–14.
Khan, S., Pirzada, A.A. and Portmann, M. (2007) Robust communications using wireless mesh networks for safeguarding water infrastructures. Recent advances in security technology. Proceedings of the 2007 RNSA Security Technology Conference. Melbourne: Australian Homeland Security Research Centre.
Kornfeld, I.E. (2002) Terror in the water: Threats to drinking water and infrastructure. Widener Law Symposium Journal 9: 439–484.
Lancaster-Brooks, R. (2002) Water terrorism: An overview of water & wastewater security problems and solutions. February, http://www.homelandsecurity.org/newjournal/articles/lancaster-brooks.htm, accessed 25 November 2009.
Latourrette, T. and Willis, H.H. (2007) Using Probabilistic Terrorism Risk Modelling for Regulatory Benefit-Cost Analysis: Application to the Western Hemisphere Travel Initiative Implemented in the Land Environment. Santa Monica, CA: Centre for Risk Management and Policy, Rand Corporation. Rand Working Paper WR-487-IEC.
Leder, K., Sinclair, M.I. and McNeil, J.J. (2002) Water and the environment: A natural resource or a limited luxury? The Medical Journal of Australia 177 (11/12): 609–613.
Lindhe, A., Rosen, L., Norberg, T., Pettersson, T.J.R., Ström, J. and Bondelind, M. (2009) Fault tree analysis for integrated and probabilistic risk analysis of drinking water systems. Water Research 43 (6): 1641–1653.
MacGillivray, B.H., Hamilton, P.D., Strutt, J.E. and Pollard, S.J.T. (2006) Risk analysis strategies in the water utility sector: An inventory of applications for better and more credible decision making. Critical Reviews in Environmental Science and Technology 36 (2): 85–139.
Meinhardt, P.L. (2005) Water and bioterrorism: Preparing for the potential threat to US water supplies and public health. Annual Review of Public Health 26: 213–237.
Meinhardt, P.L. (2009) Physician preparedness for acts of water terrorism. 29 June, http://www.waterhealthconnection.org/bt/index.asp, accessed 5 December 2009.
Michaud, D. and Apostolakis, G.E. (2006) Methodology for ranking the elements of water-supply networks. Journal of Infrastructure Systems 12 (4): 230–242.
National Health and Medical Research Council (NHMRC) and the Natural Resource Management Ministerial Council (NRMMC). (2003) National water quality management strategy: Australian drinking water guidelines 6, 2004. 10–11 April, http://www.nhmrc.gov.au/_files_nhmrc/file/publications/synopses/adwg_11_06.pdf, accessed 3 December 2009.
National Water Commission. (2009) Supply risks. 26 July, http://www.nwc.gov.au/www/html/239-supply-risks.asp, accessed 17 December 2009.
Noah, D.L., Huebner, K.D., Darling, R.G. and Waeckerle, J.F. (2002) The history and threat of biological warfare and terrorism. Emergency Medicine Clinics of North America 20 (2): 255–271.
Pollard, S.J.T., Strutt, J.E., Macgillivray, B.H., Hamilton, P.D. and Hrudey, S.E. (2004) Risk analysis and management in the water utility sector, a review of drivers, tools and techniques. Process Safety and Environmental Protection 82 (B6): 1–10.
Qiao, J., Jeong, D., Lawley, M., Richard, J.P., Abraham, D.M. and Yih, Y. (2005) Allocating security resources to a water supply network. IIE Transactions 39 (1): 95–109.
Rogers, J.W. and Louis, G.E. (2007) Risk and opportunity in upgrading the US drinking water infrastructure system. Journal of Environmental Management 87: 26–36.
Suresh, P.V., Babar, A.K. and Venkat, R. (1995) Uncertainty in fault tree analysis: A fuzzy approach. Fuzzy Sets and Systems 83 (2): 135–141.
Wang, J. and Yu, X. (2007) Security strategies for SCADA systems. Recent advances in security technology. Proceedings of the 2007 RNSA Security Technology Conference. Melbourne: Australian Homeland Security Research Centre.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tularam, G., Properjohn, M. An investigation into modern water distribution network security: Risk and implications. Secur J 24, 283–301 (2011). https://doi.org/10.1057/sj.2010.4
Published:
Issue Date:
DOI: https://doi.org/10.1057/sj.2010.4