Following the events of 9/11, the Administrator of the US Environmental Protection Agency created the Water Protection Task Force (WPTF), which identified water distribution networks as a major area of vulnerability. Steps can be taken to reduce the chances of future occurrences and to make it as difficult as possible for potential saboteurs to succeed, and security will have to be scrutinized with renewed vigor to secure water and wastewater systems against these possible threats. While it is impossible to defend all water treatment facilities against terrorism with existing resources, it is necessary to have a response plan in the event an act of terrorism occurs. Novel technologies from various fields of science and engineering are addressing water security issues and looking for innovative solutions. The need is for rapid on-line detection methods that are accurate and have a wide detection range. Once such technologies are available, there will be a rapid implementation process that will present many business opportunities for the private sector.
The proposed volume will address the problems associated with intended terrorist attack or natural disaster affecting water or wastewater systems. The book is divided into parts based on the kinds of threats on a water distribution system: (1) a direct attack on major infrastructure, such as dams, treatment plants, storage reservoirs, and pipelines; (2) a cyber attack disabling the functionality of the water utility system or taking over control of key components which might result water outages; and (3) a deliberate chemical or biological contaminant injection at one of the water distribution system's nodes. It will examine unique plans, technological and managerial innovations in protecting such systems, or description of projects that were implemented. The volume also address the role Public-Private Partnerships in securing such systems. Case studies discuss existing projects evaluates their performance, with an emphasis on providing guidelines involving protecting methods that could be implemented.
We Also Recommend