WATER SYSTEMS SECURITY
INTRODUCTION……………………………………………………………………………………………………….. 1
BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1
WATER SECURITY……………………………………………………………………………………………………. 2
- Physical Security ………………………………………………………………………………………….. 3
- i. Milwaukee & Cryptosporidium…………………………………………………………….. 4
- ii. WaterWorks: Physcial Security…………………………………………………………….. 6
- Cyber-Security………………………………………………………………………………………………. 9
- i. WaterWorks: Cyber-Security………………………………………………………………… 11
RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12
VIRTUAL ATTACHMENT:
Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.
Presentation to the Illinois Chapter of the American Water Works Association.
© 2014. All Rights Reserved. David L. Ganje.
I. Introduction
This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.
Tags: Environmental Law, Natural Resources Law, Water Law, Water Regulation, Water Systems Security