Locating Monitors in Water Distribution Systems: Red Team–Blue Team Exercise
Publication: Journal of Water Resources Planning and Management
Volume 132, Issue 4
Abstract
Red team–blue team exercises are methods of evaluating security by creating a “game” where one team (the red team) attempts to “attack” a target and the other team (the blue team) tries to defend it. This paper describes a computer exercise where the red team simulates the contamination of a water distribution system and the blue team defends the system by installing monitors to detect the presence of the contaminant. This exercise was developed and has been used as part of several demonstrations on the effectiveness of contamination monitoring systems for distribution systems. For comparison, a mathematical model is applied to the same network to select monitor locations that provide the optimal solution in terms of a set of objectives.
Get full access to this article
View all available purchase options and get full access to this article.
Acknowledgments
The writers would like to acknowledge the assistance of Dr. Lewis Rossman in modifying EPANET to calculate exposures. The financial support to Dr. Avi Ostfeld and Elad Salomons by the Technion Grand Water Research Institute and the North Atlantic Treaty Organization [Science for Peace (SfP) Project No. CBD.MD.SFP 981456] is acknowledged. Alan Roberson [American Water Works Association (AWWA)] and Stanley States (Pittsburgh Water and Sewer Authority) made useful suggestions in the development of the original red team–blue team exercise as part of AWWA’s Contamination Monitoring Technologies course.
References
Berry, J., Fleisher, L., Hart, W. E., Phillips, C. A., and Watson, J. (2005). “Sensor placement in municipal water networks.” J. Water Resour. Plan. Manage., 131(3), 237–243.
Craft, R. L. (2002). “A concept for the use of red teams in homeland defense.” Advanced Concepts Group, Sandia National Labs, Albuquerque, N.M. ⟨http://www.sandia.gov/ACG/documents/sandreports/SAND2003-0063P.pdf⟩ (April 3, 2006).
Murray, R., Robert, J., and Uber, J. (2004). “The Threat Ensemble Vulnerability Assessment (TEVA) program for drinking water distribution system security.” Proc., EWRI World Water and Environmental Resources Congress, ASCE, Reston, Va., 1–8.
Ostfeld, A., and Salomons, E. (2004). “A stochastic early warning detection system model for drinking water distribution systems security.” Proc., EWRI World Water and Environmental Resources Congress, ASCE, Reston, Va., 1–6.
Rossman, L. A. (2000). EPANET 2 user’s manual, National Risk Management Research Laboratory, Cincinnati.
Sinnreich, R. H. (2002). “Red team insights from wargaming.” DART working paper #02-3, Hicks and Associates, Inc. ⟨http://www.hicksandassociates.com/reports/⟩ (April 3, 2006).
Information & Authors
Information
Published In
Copyright
© 2006 ASCE.
History
Received: Aug 23, 2005
Accepted: Dec 29, 2005
Published online: Jul 1, 2006
Published in print: Jul 2006
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.