TECHNICAL PAPERS
Jun 1, 2006

Comparative Analysis of Water Vulnerability Assessment Methodologies

Publication: Journal of Infrastructure Systems
Volume 12, Issue 2

Abstract

The Public Health Security and Bioterrorism Response Act of 2002 amended the Safe Drinking Water Act requiring community water systems serving over 3,300 customers to complete water vulnerability assessments (WVAs); however, no specific methodology was provided. Forty-five government and industry agencies associated with water security were identified. Existing WVA methodologies were compared to the EPA’s six-step WVA guidance and an expanded version of the hierarchical holographic modeling (HHM) framework for the hardening of water systems, a technique previously used for assessing vulnerability of infrastructure. Neither the AWWA Water System Security Field Guide, nor the Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems were in complete agreement with the EPA’s WVA guidance. Inclusion of HHM risk scenarios in the assessed methodologies ranged from 64 to 95%. Fifty-nine of the 112 HHM risk scenarios were not included in at least one, and 34 risk scenarios were not included in at least two WVA methods. No method emerged as a “best practice” technique for small and medium sized water systems. Consistent standards for WVA methods are needed.

Get full access to this article

View all available purchase options and get full access to this article.

References

American Water Works Association (AWWA). (2002). Water system security: A field guide. Denver.
Associated Press (AP). (2002). “Embassy water was possible target.” Rome, Italy, http://www.cbsnews.com/stories/2002/02/25/attack/main330412.shtml (Feb. 25, 2002).
Associated Press (AP). (2003a). “New Zealand plagued by terror threats.” Wellington New Zealand, http://cnews.canoe.ca/CNEWS/World/2003/02/26/32883-ap.html (Feb. 26, 2003).
Associated Press (AP). (2003b). “Report: Al Qaeda threatens poison attacks on US water supplies.” Cairo Egypt, http://www.foxnews.com/story/0,2933,88100,00.html (May 29, 2003).
Association of Metropolitan Sewerage Agencies (AMSA). (2002). Vulnerability self assessment tool (VSAT), version 2.0 (CD-ROM), Computer Software, PA Consulting Group, and SCIENTECH, Inc.
Association of State Drinking Water Administrators (ASDWA) and National Rural Water Association (NRWA). (2002). Security vulnerability self-assessment guide for small drinking water systems serving population between 3,300 and 10,000.
Atlas, R. M. (1999). “Combating the threats of biowarfare and bioterrorism: Defending against biological weapons is critical to global security.” BioScience, 49(6), 465–477.
Beering, P. S. (2002). “Threat on tap: Understanding the terrorist threat to water.” J. Water Resour. Plan. Manage., 128(3), 163–167.
Bodansky, Y. (1998). Bin Laden: The man who declared war on America, Prima Publishing, Roseville.
Bush, G. W. (2001a). “Executive Order 13228: Establishing the Office of Homeland Security and the Homeland Security Council.” Federal Register 66(No. 196; October 10), 51812.
Bush, G. W. (2001b). “Executive Order 13231: Critical infrastructure protection in the information age.” Federal Register 66(No. 202; October 18), 53063.
Clark, R. M., and Deininger, R. A. (2000). “Protecting the nation’s critical infrastructure: The vulnerability of U.S. water supply systems.” J. Contingen. Crisis Manage., 8(2), 73–80.
Clinton, W. J. (1996). “Executive Order 13010: Critical infrastructure protection.” Federal Register 61(No. 138; July 17), 37347.
Clinton, W. J. (1999). “Executive Order 13130: National Infrastructure Assurance Council.” Federal Register 66(No. 137; July 19), 38535.
Defense Intelligence Agency (DIA). (1990). “Defense intelligence terrorism summary.” DITSUM 232-90. File: 970613_dtsm232_90_txt_0001.txt, Washington, D.C., http://www.gulflink.osd.mil/cgi-bin/texis/search/gulfsearch/+ DhC5eCp3w_qTy0-fA 0NI0afNR0PPfH0Ng0aR022Z2flTaluTTE2jqhmYeHiMbm_qinmovvtBinX3Me+xwwwezmktqmniow/view.html (Dec. 1, 1990).
Defense Threat Reduction Agency (DTRA). (2004). “Fact-sheet: Joint staff integrated vulnerability assessments.” http://www.dtra.mil/news/fact/nw_jsiva.html (Jan. 2004).
DeNileon, G. P. (2001). “The who, what, why and how.” J. Am. Water Works Assoc., 93(5), 78–85.
De Young, T., and Gravley, A. (2002). “Coordinating efforts to secure American public water supplies.” NR&E (Natural Resources and Environment), 16, 146–152.
Environmental Water Resources Institute (EWRI) of the American Society of Civil Engineers (ASCE) in association with The Infrastructure Security Partnership (TISP). (2005). “Critical water infrastructure: A beginning dialogue—Networking U.S. water associations, organizations, and agencies.” www.ewrinstitute.org/pdf/cwid.pdf (Apr. 2005).
Flynt, B. (2004). “CARVER plus shock: A framework for assessing vulnerability.” http://www.appanet.org/login.cfm?reason=denied empty&script_name=/Members/Meetings/Conference/FlvntConf2002.pdf (Jan. 2004).
Grigg, N. S. (2003). “Water utility security: Multiple hazards and multiple barriers.” J. Infrastruct. Syst., 9(2), 81–88.
Gwin, J., Deanda, H., and Cadena, F. (2003). “SDWA: Safe Drinking Water Act.” Southwest Biotechnology and Informatics Center, http//www.swbic.org/education/env-engr7sdwa/sdwa (Sep. 12, 2003).
Haestad Methods. (2004). “ WaterSAFE : A dynamic add-on component of WaterGEMS and WaterCAD.” http://www.haestad.com/software/watersafe/default.asp (Jan. 2004).
Haimes, Y. Y. (1981). “Hierarchical holographic modeling.” IEEE Trans. Syst. Man Cybern., 11(9), 606–617.
Haimes, Y. Y. (1998). Risk modeling, assessment, and management, Wiley, New York.
Haimes, Y. Y., Kaplan, S., and Lambert, J. H. (2002a). “Risk filtering, ranking, and management framework using hierarchical holographic modeling.” Risk Anal., 22(2), 383–398.
Haimes, Y. Y., Matalas, N. C., Lambert, J. H., Jackson, B. A., and Fellows, J. F. R. (1998). “Reducing vulnerability of water supply systems to attack.” J. Infrastruct. Syst., 4(4), 164–177.
Haimes, Y. Y., Ozinci, C., Singleton, M., Stobbart, K., Zulick, L., Leung, P., Mosenthal, A., and Ferguson, W. (2002b). “Virginia’s critical infrastructure protection: A statewide risk assessment study.” IEEE Systems and Information Design Symp., Univ. of Virginia, 175–179.
International Committee of the Red Cross (ICRC). (2005). “The Geneva Conventions: The core of international humanitarian law.” http://www.icrc.org/Web/Eng/siteeng0.nsf/html/genevaconventions (Apr. 2005)
Jagielski, K. D. (2003). “Water vulnerability and risk assessments for potable water assets.” IOH-RS-BR-TR-2003-0001, Air Force Institute for Operational Health (AFIOH), Brooks City-Base.
Karasik, T. (2002). Toxic warfare, Rand, Santa Monica, Calif., (Contract No. F49642-01-C-0003 Project Air Force).
KPMG Peat Marwick LLP. (1998). Vulnerability assessment framework 1.1, Critical Infrastructure Assurance Office.
Kunze, D. R. (1997). “Assessing utility threats.” Security Management, 41(2), 75–77.
National Environmental Training Center for Small Communities (NETCSC). (2003). “Preparing for the unexpected: Security for small water system.” Managing a small drinking water system: A short course for local officials training module, USEPA Assistance Agreement No. T-98375501, Morgantown, W. Va.
National Rural Water Association (NRWA). (2004). “Security vulnerability assessment engine.” http://www.vulnerabilityassessment.org/ (Jan. 2004).
New England Water Works Association (NEWWA). (2004). “ASSET security software.” http://www.newwa.org/asset software/ (Jan. 2004).
Paterson, L. (2002). The first U-boat flotilla, Naval Institute Press, Annapolis, Md.
Sandia National Laboratories (SNL). (2003). Risk assessment methodology for water utilities (RAMW) , Security Systems and Technology Center, Civilian Surety Programs, AwwaRF, Los Alamos, N.M.
Simscience. (2003). “Dam busters: Clips from the movie.” http://simscience.org/cracks/dambusters.html (Aug, 10, 2003).
Smith, R. J. (1998). “Poisoned wells plague towns all over Kosovo, aid organizations blame Yugoslav security forces.” The Washington Post, December 8, A30.
Staudinger, T. J. (2004). “Comparative analysis of water vulnerability assessment methodologies.” Master’s thesis, Air Force Institute of Technology.
Tucker, J. B., and Sands, A. (1999). “An unlikely threat.” Bull. At. Sci. 55(4), 46–52.
United Press International. (UPI), Washington. (2003). “Al-Qaida threat to U.S. water supply.” UPI, Wash., http://www.newsmax.com/archives/2003/5/202658.shtml (May 29, 2003).
US ACHPPM. (2003). “U.S. Army food and water vulnerability assessment guide.” TG 188, U.S. Army Center for Health Promotion and Preventative Medicine, Washington, D.C.
U.S. Congress. (2002a). “Homeland Security Act of 2002.” Public Law No. 107, H.R. 5005, 107th Congress, Second Session, Government Printing Office, Washington, D.C.
U.S. Congress. (2002b). “Public Health Security and Bioterrorism Preparedness and Response Act of 2002.” Public Law No. 107-188, H.R. 3448, 107th Congress. Government Printing Office, Washington, D.C.
USEPA. (1999). “Understanding the safe drinking water act.” EPA 810-F-99-008, Washington, D.C.
USEPA, Office of Water. (2002). “Vulnerability assessment fact sheet.” EPA 816-F-02-025, www.epa.gov/ogwdw/security/index.html (Nov. 2002).
Venter, A. J. (1999). “Poisoned chalice poses problems: The terrorist threat to the world’s water,” Jane’s International Defense Review, 32(1), 57–61.
Venzke, B., and Ibrahim, A. (2003). The al-Qaeda threat: An analytical guide to al-Qaeda’s tactics & targets. Tempest Publishing, Alexandria, Va.
Walk, K. (1998). “How to write a comparative analysis.” Writing Center at Harvard Univ., http://www.fas.harvard.edu/~wricntr/documents/CompAnalysis.html .
Whelton, A. (2003). “Overview of available vunerability assessment methods (PowerPoint presentation).” Water Security Train the Assessor Training, Fort Lewis, Wash.

Information & Authors

Information

Published In

Go to Journal of Infrastructure Systems
Journal of Infrastructure Systems
Volume 12Issue 2June 2006
Pages: 96 - 106

History

Received: Jun 7, 2004
Accepted: Jul 25, 2005
Published online: Jun 1, 2006
Published in print: Jun 2006

Permissions

Request permissions for this article.

Authors

Affiliations

Tiffany J. Staudinger
Civil Engineering Squadron, Langley AFB VA.
Ellen C. England
Dept. of Systems and Engineering Management, Air Force Institute of Technology, 2950 Hobson Way, WPAFB, OH 45433.
Charles Bleckmann
Dept. of Systems and Engineering Management, Air Force Institute of Technology, 2950 Hobson Way, WPAFB, OH 45433.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share