Call Our Firm:   605.385.0330

Commercial Transactions & Litigation, Environmental Law, Natural Resources Law, & Energy Law

Water Systems Security

Posted on: April 28th, 2014
by David Ganje

WATER SYSTEMS SECURITY

INTRODUCTION……………………………………………………………………………………………………….. 1

BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1

WATER SECURITY……………………………………………………………………………………………………. 2

  1. Physical Security ………………………………………………………………………………………….. 3
    1. i.        Milwaukee & Cryptosporidium…………………………………………………………….. 4
    2. ii.      WaterWorks: Physcial Security…………………………………………………………….. 6
  2. Cyber-Security………………………………………………………………………………………………. 9
    1. i.        WaterWorks: Cyber-Security………………………………………………………………… 11

RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12

VIRTUAL ATTACHMENT:

Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.

 

 

Presentation to the Illinois Chapter of the American Water Works Association.

 

 

© 2014. All Rights Reserved. David L. Ganje.

 

I. Introduction

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.

 

by .

Tags: , , , ,