Skip to main content
Log in

An investigation into modern water distribution network security: Risk and implications

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Water supply network security issues such as vandalism are of concern but have received less than proper attention in the past. Clearly water infrastructure is recognised as critical; the survival of a community depends on its ability to deliver fresh, clean drinking water to its consumers. Recent security breaches in Australia and abroad have led us to consider the issues of risk and consequence of deliberate attacks. However, securing water supply networks is a complex problem; therefore it is necessary to study risks and develop appropriate management strategies. This article reviews the characteristics of water supply systems and design traits that make them susceptible. The range of potential threats are classified; biological/chemical and physical that includes physical attack, cyber attack and hoaxes. Risk analysis methodologies to assess the vulnerability are outlined, along with possible countermeasures that may minimise threats. The review highlights the vulnerability of water supply systems to deliberate attacks and sabotage and the need for a comprehensive and holistic approach to risk management and countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1

Similar content being viewed by others

References

  • Apostolakis, G.E. and Lemon, D.M. (2005) A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis 25 (2): 361–376.

    Article  Google Scholar 

  • Australian Broadcasting Commission. (2003) Sabotage deprives 300 000 Iraqis of water: ICRC (online) ABC News. 17 August, http://www.abc.net.au/news/stories/2003/08/17/926250.htm, accessed 12 December 2009.

  • Beaglehole, R., Irwin, A. and Prentice, T. (2004) The World Health Report 2004: Changing History. Geneva: World Health Orgnization.

    Google Scholar 

  • Berger, B. and Stevenson, A. (1955) Feasibility of biological warfare against public water supplies. Journal of American Water Works Association (JAWWA) 47 (2): 101–110.

    Google Scholar 

  • Chalecki, E.L. (2002) A new vigilance: Identifying and reducing the risks of environmental terrorism. Global Environmental Politics 2 (1): 46–64.

    Article  Google Scholar 

  • Clark, R.M. and Deininger, R.A. (2000) Protecting the nation's critical infrastructure: The vulnerability of US water supply systems. Journal of Contingencies and Crisis Management 8 (2): 73–80.

    Article  Google Scholar 

  • Copeland, C. and Cody, B. (2009) Terrorism and security issues facing the water infrastructure sector. Washington, DC: Congressional Research Service. 25 April 2005, http://www.fas.org/sgp/crs/terror/RL32189.pdf, accessed 10 December 2009.

  • CSIRO. (2009a) Urban water: Infrastructure technologies. 3 April, http://www.csiro.au/science/Infrastructure-Technologies.html, accessed 8 December 2009.

  • CSIRO. (2009b) Urban water: Addressing Australia's urban water challenges. 10 February, http://www.csiro.au/science/Urban-Water.html, accessed 8 December 2009.

  • Danneels, J.J. (2001) Protecting Water Supply Systems from Terrorists. Committee Holding Hearing: House Science Committees. Livermore, CA: N. Laboratories, Sandia Corporation.

    Google Scholar 

  • Durodie, B. (2005) The Concept of Risk. Nuffield Trust Global Programme on Health, Foreign Policy and Security. Swindon, UK: Risk Case Studies.

    Google Scholar 

  • Eloff, J.H.P., Labuschagne, L. and Badenhorst, K.P. (1993) A comparative framework for risk analysis methods. Computers & Security 12 (6): 597–603.

    Article  Google Scholar 

  • Foran, J.A. and Brosnan, T.M. (2000) Early warning systems for hazardous biological agents in potable water. Environmental Health Perspectives 108 (10): 993–996.

    Article  Google Scholar 

  • Fox, K.R. and Lytle, D.A. (1996) Milwaukee's crypto outbreak: Investigation and recommendations. Journal of American Water Works Association (JAWWA) 88 (9): 87–94.

    Google Scholar 

  • Franz, D.R. and Zajtchuk, R. (2002) Biological terrorism: Understanding the threat, preparation, and medical response. Disease-a-Month 48 (8): 489–564.

    Article  Google Scholar 

  • Gilbert, P.H. et al (2003) Infrastructure issues for cities – Countering terrorist threat. Journal of Infrastructure Systems 9 (1): 44–54.

    Article  Google Scholar 

  • Gleick, P.H. (2006) Water and terrorism. Water Policy 8: 481–503.

    Article  Google Scholar 

  • Gleick, P.H. (2008) Water: Threats and opportunities, recommendations for the next president, background material. 9 October, http://www.pacinst.org/publications/essays_and_opinion/presidential_recommendations/background.pdf, accessed 2 November 2009.

  • Grigg, N.S. (2003) Water utility security: Multiple hazards and multiple barriers. Journal of Infrastructure Systems 9 (2): 81–88.

    Article  Google Scholar 

  • Haimes, Y.Y., Matalas, N.C., Lambert, J.H., Jackson, B.A. and Fellows, J.F.R. (1998) Reducing vulnerability of water supply systems to attack. Journal of Infrastructure Systems 4 (4): 164–177.

    Article  Google Scholar 

  • Hickman, D.C. (1999) A Chemical and Biological Warfare Threat: USAF Water Systems at Risk. Alabama: US Air Force Counterproliferation Center, Air War College, Air University, Maxwell Air Force Base. Future Warfare Series No. 3; September.

  • Khan, A.S., Swerdlow, D.L. and Juranek, D.D. (2001) Precautions against biological and chemical terrorism directed at food and water supplies. Public Health Reports 116 (1): 3–14.

    Article  Google Scholar 

  • Khan, S., Pirzada, A.A. and Portmann, M. (2007) Robust communications using wireless mesh networks for safeguarding water infrastructures. Recent advances in security technology. Proceedings of the 2007 RNSA Security Technology Conference. Melbourne: Australian Homeland Security Research Centre.

  • Kornfeld, I.E. (2002) Terror in the water: Threats to drinking water and infrastructure. Widener Law Symposium Journal 9: 439–484.

    Google Scholar 

  • Lancaster-Brooks, R. (2002) Water terrorism: An overview of water & wastewater security problems and solutions. February, http://www.homelandsecurity.org/newjournal/articles/lancaster-brooks.htm, accessed 25 November 2009.

  • Latourrette, T. and Willis, H.H. (2007) Using Probabilistic Terrorism Risk Modelling for Regulatory Benefit-Cost Analysis: Application to the Western Hemisphere Travel Initiative Implemented in the Land Environment. Santa Monica, CA: Centre for Risk Management and Policy, Rand Corporation. Rand Working Paper WR-487-IEC.

  • Leder, K., Sinclair, M.I. and McNeil, J.J. (2002) Water and the environment: A natural resource or a limited luxury? The Medical Journal of Australia 177 (11/12): 609–613.

    Google Scholar 

  • Lindhe, A., Rosen, L., Norberg, T., Pettersson, T.J.R., Ström, J. and Bondelind, M. (2009) Fault tree analysis for integrated and probabilistic risk analysis of drinking water systems. Water Research 43 (6): 1641–1653.

    Article  Google Scholar 

  • MacGillivray, B.H., Hamilton, P.D., Strutt, J.E. and Pollard, S.J.T. (2006) Risk analysis strategies in the water utility sector: An inventory of applications for better and more credible decision making. Critical Reviews in Environmental Science and Technology 36 (2): 85–139.

    Article  Google Scholar 

  • Meinhardt, P.L. (2005) Water and bioterrorism: Preparing for the potential threat to US water supplies and public health. Annual Review of Public Health 26: 213–237.

    Article  Google Scholar 

  • Meinhardt, P.L. (2009) Physician preparedness for acts of water terrorism. 29 June, http://www.waterhealthconnection.org/bt/index.asp, accessed 5 December 2009.

  • Michaud, D. and Apostolakis, G.E. (2006) Methodology for ranking the elements of water-supply networks. Journal of Infrastructure Systems 12 (4): 230–242.

    Article  Google Scholar 

  • National Health and Medical Research Council (NHMRC) and the Natural Resource Management Ministerial Council (NRMMC). (2003) National water quality management strategy: Australian drinking water guidelines 6, 2004. 10–11 April, http://www.nhmrc.gov.au/_files_nhmrc/file/publications/synopses/adwg_11_06.pdf, accessed 3 December 2009.

  • National Water Commission. (2009) Supply risks. 26 July, http://www.nwc.gov.au/www/html/239-supply-risks.asp, accessed 17 December 2009.

  • Noah, D.L., Huebner, K.D., Darling, R.G. and Waeckerle, J.F. (2002) The history and threat of biological warfare and terrorism. Emergency Medicine Clinics of North America 20 (2): 255–271.

    Article  Google Scholar 

  • Pollard, S.J.T., Strutt, J.E., Macgillivray, B.H., Hamilton, P.D. and Hrudey, S.E. (2004) Risk analysis and management in the water utility sector, a review of drivers, tools and techniques. Process Safety and Environmental Protection 82 (B6): 1–10.

    Google Scholar 

  • Qiao, J., Jeong, D., Lawley, M., Richard, J.P., Abraham, D.M. and Yih, Y. (2005) Allocating security resources to a water supply network. IIE Transactions 39 (1): 95–109.

    Article  Google Scholar 

  • Rogers, J.W. and Louis, G.E. (2007) Risk and opportunity in upgrading the US drinking water infrastructure system. Journal of Environmental Management 87: 26–36.

    Article  Google Scholar 

  • Suresh, P.V., Babar, A.K. and Venkat, R. (1995) Uncertainty in fault tree analysis: A fuzzy approach. Fuzzy Sets and Systems 83 (2): 135–141.

    Article  Google Scholar 

  • Wang, J. and Yu, X. (2007) Security strategies for SCADA systems. Recent advances in security technology. Proceedings of the 2007 RNSA Security Technology Conference. Melbourne: Australian Homeland Security Research Centre.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gurudeo Anand Tularam.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tularam, G., Properjohn, M. An investigation into modern water distribution network security: Risk and implications. Secur J 24, 283–301 (2011). https://doi.org/10.1057/sj.2010.4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2010.4

Keywords

Navigation