Comparative Analysis of Water Vulnerability Assessment Methodologies
Publication: Journal of Infrastructure Systems
Volume 12, Issue 2
Abstract
The Public Health Security and Bioterrorism Response Act of 2002 amended the Safe Drinking Water Act requiring community water systems serving over 3,300 customers to complete water vulnerability assessments (WVAs); however, no specific methodology was provided. Forty-five government and industry agencies associated with water security were identified. Existing WVA methodologies were compared to the EPA’s six-step WVA guidance and an expanded version of the hierarchical holographic modeling (HHM) framework for the hardening of water systems, a technique previously used for assessing vulnerability of infrastructure. Neither the AWWA Water System Security Field Guide, nor the Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems were in complete agreement with the EPA’s WVA guidance. Inclusion of HHM risk scenarios in the assessed methodologies ranged from 64 to 95%. Fifty-nine of the 112 HHM risk scenarios were not included in at least one, and 34 risk scenarios were not included in at least two WVA methods. No method emerged as a “best practice” technique for small and medium sized water systems. Consistent standards for WVA methods are needed.
Get full access to this article
View all available purchase options and get full access to this article.
References
American Water Works Association (AWWA). (2002). Water system security: A field guide. Denver.
Associated Press (AP). (2002). “Embassy water was possible target.” Rome, Italy, http://www.cbsnews.com/stories/2002/02/25/attack/main330412.shtml (Feb. 25, 2002).
Associated Press (AP). (2003a). “New Zealand plagued by terror threats.” Wellington New Zealand, http://cnews.canoe.ca/CNEWS/World/2003/02/26/32883-ap.html (Feb. 26, 2003).
Associated Press (AP). (2003b). “Report: Al Qaeda threatens poison attacks on US water supplies.” Cairo Egypt, http://www.foxnews.com/story/0,2933,88100,00.html (May 29, 2003).
Association of Metropolitan Sewerage Agencies (AMSA). (2002). Vulnerability self assessment tool (VSAT), version 2.0 (CD-ROM), Computer Software, PA Consulting Group, and SCIENTECH, Inc.
Association of State Drinking Water Administrators (ASDWA) and National Rural Water Association (NRWA). (2002). Security vulnerability self-assessment guide for small drinking water systems serving population between 3,300 and 10,000.
Atlas, R. M. (1999). “Combating the threats of biowarfare and bioterrorism: Defending against biological weapons is critical to global security.” BioScience, 49(6), 465–477.
Beering, P. S. (2002). “Threat on tap: Understanding the terrorist threat to water.” J. Water Resour. Plan. Manage., 128(3), 163–167.
Bodansky, Y. (1998). Bin Laden: The man who declared war on America, Prima Publishing, Roseville.
Bush, G. W. (2001a). “Executive Order 13228: Establishing the Office of Homeland Security and the Homeland Security Council.” Federal Register 66(No. 196; October 10), 51812.
Bush, G. W. (2001b). “Executive Order 13231: Critical infrastructure protection in the information age.” Federal Register 66(No. 202; October 18), 53063.
Clark, R. M., and Deininger, R. A. (2000). “Protecting the nation’s critical infrastructure: The vulnerability of U.S. water supply systems.” J. Contingen. Crisis Manage., 8(2), 73–80.
Clinton, W. J. (1996). “Executive Order 13010: Critical infrastructure protection.” Federal Register 61(No. 138; July 17), 37347.
Clinton, W. J. (1999). “Executive Order 13130: National Infrastructure Assurance Council.” Federal Register 66(No. 137; July 19), 38535.
Defense Intelligence Agency (DIA). (1990). “Defense intelligence terrorism summary.” DITSUM 232-90. File: 970613_dtsm232_90_txt_0001.txt, Washington, D.C., http://www.gulflink.osd.mil/cgi-bin/texis/search/gulfsearch/+ DhC5eCp3w_qTy0-fA 0NI0afNR0PPfH0Ng0aR022Z2flTaluTTE2jqhmYeHiMbm_qinmovvtBinX3Me+xwwwezmktqmniow/view.html (Dec. 1, 1990).
Defense Threat Reduction Agency (DTRA). (2004). “Fact-sheet: Joint staff integrated vulnerability assessments.” http://www.dtra.mil/news/fact/nw_jsiva.html (Jan. 2004).
DeNileon, G. P. (2001). “The who, what, why and how.” J. Am. Water Works Assoc., 93(5), 78–85.
De Young, T., and Gravley, A. (2002). “Coordinating efforts to secure American public water supplies.” NR&E (Natural Resources and Environment), 16, 146–152.
Environmental Water Resources Institute (EWRI) of the American Society of Civil Engineers (ASCE) in association with The Infrastructure Security Partnership (TISP). (2005). “Critical water infrastructure: A beginning dialogue—Networking U.S. water associations, organizations, and agencies.” www.ewrinstitute.org/pdf/cwid.pdf (Apr. 2005).
Flynt, B. (2004). “CARVER plus shock: A framework for assessing vulnerability.” http://www.appanet.org/login.cfm?reason=denied empty&script_name=/Members/Meetings/Conference/FlvntConf2002.pdf (Jan. 2004).
Grigg, N. S. (2003). “Water utility security: Multiple hazards and multiple barriers.” J. Infrastruct. Syst., 9(2), 81–88.
Gwin, J., Deanda, H., and Cadena, F. (2003). “SDWA: Safe Drinking Water Act.” Southwest Biotechnology and Informatics Center, http//www.swbic.org/education/env-engr7sdwa/sdwa (Sep. 12, 2003).
Haestad Methods. (2004). “ : A dynamic add-on component of WaterGEMS and WaterCAD.” http://www.haestad.com/software/watersafe/default.asp (Jan. 2004).
Haimes, Y. Y. (1981). “Hierarchical holographic modeling.” IEEE Trans. Syst. Man Cybern., 11(9), 606–617.
Haimes, Y. Y. (1998). Risk modeling, assessment, and management, Wiley, New York.
Haimes, Y. Y., Kaplan, S., and Lambert, J. H. (2002a). “Risk filtering, ranking, and management framework using hierarchical holographic modeling.” Risk Anal., 22(2), 383–398.
Haimes, Y. Y., Matalas, N. C., Lambert, J. H., Jackson, B. A., and Fellows, J. F. R. (1998). “Reducing vulnerability of water supply systems to attack.” J. Infrastruct. Syst., 4(4), 164–177.
Haimes, Y. Y., Ozinci, C., Singleton, M., Stobbart, K., Zulick, L., Leung, P., Mosenthal, A., and Ferguson, W. (2002b). “Virginia’s critical infrastructure protection: A statewide risk assessment study.” IEEE Systems and Information Design Symp., Univ. of Virginia, 175–179.
International Committee of the Red Cross (ICRC). (2005). “The Geneva Conventions: The core of international humanitarian law.” http://www.icrc.org/Web/Eng/siteeng0.nsf/html/genevaconventions (Apr. 2005)
Jagielski, K. D. (2003). “Water vulnerability and risk assessments for potable water assets.” IOH-RS-BR-TR-2003-0001, Air Force Institute for Operational Health (AFIOH), Brooks City-Base.
Karasik, T. (2002). Toxic warfare, Rand, Santa Monica, Calif., (Contract No. F49642-01-C-0003 Project Air Force).
KPMG Peat Marwick LLP. (1998). Vulnerability assessment framework 1.1, Critical Infrastructure Assurance Office.
Kunze, D. R. (1997). “Assessing utility threats.” Security Management, 41(2), 75–77.
National Environmental Training Center for Small Communities (NETCSC). (2003). “Preparing for the unexpected: Security for small water system.” Managing a small drinking water system: A short course for local officials training module, USEPA Assistance Agreement No. T-98375501, Morgantown, W. Va.
National Rural Water Association (NRWA). (2004). “Security vulnerability assessment engine.” http://www.vulnerabilityassessment.org/ (Jan. 2004).
New England Water Works Association (NEWWA). (2004). “ASSET security software.” http://www.newwa.org/asset software/ (Jan. 2004).
Paterson, L. (2002). The first U-boat flotilla, Naval Institute Press, Annapolis, Md.
Sandia National Laboratories (SNL). (2003). Risk assessment methodology for water utilities , Security Systems and Technology Center, Civilian Surety Programs, AwwaRF, Los Alamos, N.M.
Simscience. (2003). “Dam busters: Clips from the movie.” http://simscience.org/cracks/dambusters.html (Aug, 10, 2003).
Smith, R. J. (1998). “Poisoned wells plague towns all over Kosovo, aid organizations blame Yugoslav security forces.” The Washington Post, December 8, A30.
Staudinger, T. J. (2004). “Comparative analysis of water vulnerability assessment methodologies.” Master’s thesis, Air Force Institute of Technology.
Tucker, J. B., and Sands, A. (1999). “An unlikely threat.” Bull. At. Sci. 55(4), 46–52.
United Press International. (UPI), Washington. (2003). “Al-Qaida threat to U.S. water supply.” UPI, Wash., http://www.newsmax.com/archives/2003/5/202658.shtml (May 29, 2003).
US ACHPPM. (2003). “U.S. Army food and water vulnerability assessment guide.” TG 188, U.S. Army Center for Health Promotion and Preventative Medicine, Washington, D.C.
U.S. Congress. (2002a). “Homeland Security Act of 2002.” Public Law No. 107, H.R. 5005, 107th Congress, Second Session, Government Printing Office, Washington, D.C.
U.S. Congress. (2002b). “Public Health Security and Bioterrorism Preparedness and Response Act of 2002.” Public Law No. 107-188, H.R. 3448, 107th Congress. Government Printing Office, Washington, D.C.
USEPA. (1999). “Understanding the safe drinking water act.” EPA 810-F-99-008, Washington, D.C.
USEPA, Office of Water. (2002). “Vulnerability assessment fact sheet.” EPA 816-F-02-025, www.epa.gov/ogwdw/security/index.html (Nov. 2002).
Venter, A. J. (1999). “Poisoned chalice poses problems: The terrorist threat to the world’s water,” Jane’s International Defense Review, 32(1), 57–61.
Venzke, B., and Ibrahim, A. (2003). The al-Qaeda threat: An analytical guide to al-Qaeda’s tactics & targets. Tempest Publishing, Alexandria, Va.
Walk, K. (1998). “How to write a comparative analysis.” Writing Center at Harvard Univ., http://www.fas.harvard.edu/~wricntr/documents/CompAnalysis.html .
Whelton, A. (2003). “Overview of available vunerability assessment methods (PowerPoint presentation).” Water Security Train the Assessor Training, Fort Lewis, Wash.
Information & Authors
Information
Published In
Copyright
© 2006 ASCE.
History
Received: Jun 7, 2004
Accepted: Jul 25, 2005
Published online: Jun 1, 2006
Published in print: Jun 2006
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.