Wednesday, May 15, 2013

Water supply contamination / poisoning - The Next Terror Attack or False Flag Action ? recent events concerning NYC and perhaps Boston again highlight this could be an area of legitimate concern ....


http://voicerussia.com/radio_broadcast/70924886/112995913.html


Afternoon Show   →   Tunisian national wanted to poison NYC water supply, indictment says

May 10, 2013 16:08
PrintEmailAdd to blog
New York City. Photo Credit: iStockphoto/Thinkstock.
New York City. Photo Credit: iStockphoto/Thinkstock.
NEW YORK – Federal prosecutors in New York announced charges on Thursday against a Tunisian national who allegedly tried to stay in the United States illegally in order to build a terrorist cell.
Ahmed Abassi, 26, allegedly forged green card and visa papers in order to remain in the United States so he could carry out acts of terror, such as poisoning New York City’s water supply, according to the criminal indictment unsealed on Thursday.
Host Rob Sachs spoke with Voice of Russia New York correspondent Vasili Sushko to learn more.









http://www.boston.com/news/local/massachusetts/2013/05/14/mass-police-investigate-reservoir-trespassing/Ml1qIMt8eMhu3TM8pXzUeJ/story.html

( Don't foreign chemical engineers always trespass on the grounds of water reservoirs ? Looks like surveillance before making an attempt to me ....)


Mass. Police investigate reservoir trespassing

AP /  May 14, 2013
Text Size:
  • +
BELCHERTOWN, Mass. (AP) — Massachusetts state police say they and the FBI are investigating a trespassing incident at the Quabbin Reservoir but have no evidence of terrorism.
The central Massachusetts reservoir supplies drinking water to Boston.
State Police spokesman David Procopio says Tuesday night that a trooper saw two cars parked at a reservoir park entrance at 12:30 a.m. Tuesday, then saw five young men and two young women walking toward them from the reservoir.
Procopio said they are from Pakistan, Saudi Arabia and Singapore with addresses in Amherst, Cambridge, Sunderland and Northampton, and New York City. He said law enforcement databases show no warrants, detainers or advisories on them.
The men told police they are recently graduated chemical engineers curious about the reservoir.
Procopio said they will be summoned to court later on trespassing charges.end of story marker


Is it possible to poison a City's water and if so , how might it be done ? 

http://www.jamestown.org/single/?tx_ttnews%5Btt_news%5D=5147


Jihadis Discuss Means of Poisoning the Water Supply of Denmark and Great Britain

Publication: Terrorism Focus Volume: 5 Issue: 32
September 10, 2008 02:15 PM Age: 5 yrs
A major jihadi internet forum has posted a terrorist plot to use chemical and biological agents to contaminate water resources in Europe in general and Great Britain and Denmark in particular, the latter in retaliation for insulting the Prophet Muhammad through publication of the infamous “Muhammad cartoons.” The posting, entitled “Back Breaking Blow to Denmark, the U.K, and the European Union,” discussed ways of poisoning water resources and reservoirs to cause mass killings (al-ekhlaas.net, August 16). Even though many forum participants consented to the plan and participated with ideas on the kind of chemical agents that might be used in such attacks, some forum members disagreed with the terror plan, arguing that mass killing has neither religious justification nor a fatwa (religious ruling) to authorize it. The anti-attack forum members appeared to have a strong case from a religious standpoint, leading to a protracted discussion lasting over a week.

A forum member nicknamed Baghdad al-Khilafa, with over a thousand postings, primarily on weapons and explosives, proposed the terror attack to retaliate for Denmark’s mockery of the Prophet Muhammad, to terrorize the enemy’s ranks, and to ease the infidels’ onslaught on Muslims in Iraq, Afghanistan, Morocco, Somalia, Eastern Turkistan (Xinjiang) and Chechnya. The objective of the plan was to kill as many civilians as possible by contaminating the main water supply pipelines in any of the major cities in the Europe with chemical substances.

The stages of the plot were outlined as follows:

• Collect intelligence on the target and determine the right timing for execution. This involves reconnaissance, casing facilities and frequenting the target country.
• Distract and avoid security forces at the target. A mock operation is created to divert attention from the original target.
• Use one fair-skinned blonde jihadi to execute the attack and leave the country immediately after perpetration.
• Use a highly poisonous chemical substance to contaminate the water supply.
The terror plot stirred strong interest among forum participants who requested execution plans, ways to reach the target country and further details on producing the chemical substances.

Al-Khilafa later posted links to a file hosting website - megaupload.com - that contains material on explosives and poison production manuals. A wide range of chemical substances to be used in the attack was offered by al-Khilafa and other forum participants. The list included, among others, cyanide, hydrocyanic acid, potassium cyanide, aniline hydrochloride, sodium nitrite, cobalt chloride, cobalt nitrite, and the highly toxic compound thallium, known as “the poisoner’s poison.”

Forum members discussed methods of producing and using chemical substances. Al-Khilafa posted experimental results of his own observations of the effects of these poisons on mice.

A forum member nicknamed Al-Bara Bin Malik suggested a number of poisonous gases that could be used in an attack, such as chlorine gas, mustard gas, hydrogen cyanide and nerve gas. Although Malik did not explain methods of launching the poisonous gases, he claimed they are easy to prepare and asked the other chatters to speculate on ways of developing aerosol distribution systems. Other chatters posted photos of water pipelines, water towers, and diagrams illustrating ways to inject the chemical substances into the water system. One participant, a mechanical engineer nicknamed Athab al-Qabir, suggested attacks are possible through valves or ventilation openings.

On the other hand, a forum participant nicknamed Noon questioned the religious justification of such operations and asked for the fatwa that would authorize massive attacks killing innocent men, women and children, including Muslims living in Europe. Infuriated by Noon’s opposition, the majority of forum members rebuked him, quoting their own interpretation of Quranic verses and various Hadiths they claimed supported mass killings. The debate went on for a week, intensified by Noon’s logical replies citing Quranic verses and many Hadiths he interpreted as prohibiting the terror plot from a religious jurisprudence perspective. The majority of forum members ignored Noon’s reasoning and continued exchanging information pertinent to the terror plot.

Most jihadi websites are dominated by Salafi-Jihadi extremists who propagate extreme rhetoric and call for the indiscriminate mass killing of infidels and non-adherents of “al-wala’ wa al-bara’” (Loyalty [to Islam] and Disavowal [to its Enemies]).

http://www.upmchealthsecurity.org/website/resources/publications/2006/2006-06-15-watersecuritypolicy.html

The Biological Threat to U.S. Water Supplies: Toward a National Water Security Policy PDF

Jennifer B. Nuzzo
Biosecurity and Bioterrorism. Volume 4, Number 2, 2006. © Mary Ann Liebert, Inc. Reprinted with permission.
  

Abstract: In addition to providing potable drinking water, U.S. water systems are critical to the maintenance of many vital public services, such as fire suppression and power generation. Disruption of these systems would produce severe public health and safety risks, as well as considerable economic losses. Thus, water systems have been designated as critical to national security by the U.S. government. Previous outbreaks of waterborne disease have demonstrated the vulnerability of both the water supply and the public’s health to biological contamination of drinking water. Such experiences suggest that a biological attack, or even a credible threat of an attack, on water infrastructure could seriously jeopardize the public’s health, its confidence, and the economic vitality of a community. Despite these recognized vulnerabilities, protecting water supplies from a deliberate biological attack has not been sufficiently addressed. Action in this area has suffered from a lack of scientific understanding of the true vulnerability of water supplies to intentional contamination with bioweapons, insufficient tools for detecting biological agents, and a lack of funds to implement security improvements. Much of what is needed to address the vulnerability of the national water supply falls outside the influence of individual utilities. This includes developing a national research agenda to appropriately identify and characterize waterborne threats and making funds available to implement security improvements.

Sections: Federal Water Security | Record of Past Threats | Overview of U.S. Water Supply | Vulnerability |Protection by Water Treatment | Dilution | Consequences of Attack | Limitations to Achieving Security |Recommendations | Conclusion
 | Notes | References
 


In the United States, more than 160,000 public water systems provide drinking water to more than 300 million Americans. In addition to providing potable drinking water, U.S. water systems are critical to the maintenance of many vital public services, such as fire suppression and power generation. Disruption of these systems would produce severe public health and safety risks and could be associated with considerable economic losses. Previous outbreaks of waterborne disease have demonstrated the vulnerability of both the water supply and the public’s health to contamination of drinking water. Such experiences suggest that a biological attack, or even a credible threat of an attack, on water infrastructure could seriously jeopardize the public’s health, its confidence, and the economic vitality of a community. For these reasons, water systems have been designated as critical to national security by the U.S. government.
Concern over security at water utilities increased dramatically after September 11. Since 2001, there has been an increased investment in water security efforts. In fiscal year 2002, the U.S. Environmental Protection Agency (EPA) awarded approximately $51 million in grants to help the largest community water utilities complete vulnerability assessments. Since 2002, EPA has provided over $150 million in support for development of water security–related tools, training, and technical assistance to the water sector, states, and other supporting partners.1
Despite these investments, much work remains to protect the U.S. water supply from attack. Most work to date has been at the local level and has been ad hoc; it has focused largely on physical security and has not benefited from a strategic analysis of risks and benefits. Current attempts to safeguard the nation’s water supply are, therefore, hindered by a lack of science-based analysis of water threats, inadequate tools for detecting and responding to possible attacks, insufficient federal guidance to ensure that vulnerabilities are being thoroughly identified by individual utilities, and a lack of financial resources within the water sector to appropriately implement security programs.
Although there are several ways that U.S. water supplies could be disrupted, this article focuses on the specific threat of a biological attack on U.S. water supplies and outlines challenges to developing a national strategy to secure U.S. drinking water against this potential threat. Specifically, this article proposes priority actions that the federal government should take to achieve security in this area.

Federal Agency Responsibility for Water Security

In 1996, the nation’s water supply was designated as one of eight national infrastructures vital to the security of the United States, through the issuance of Executive Order (EO) 13010. EO 13010 established the President’s Commission on Critical Infrastructure Protection, which concluded in 1997 that there was inadequate protection against chemical or biological contamination of water supplies and insufficient technology for the detection, identification, and measurement of contaminants. In response to the Commission’s findings, President Clinton issued Presidential Decision Directive 63 (PDD 63) in May 1998, which designated the U.S. Environmental Protection Agency as the lead federal agency responsible for protecting the U.S. water supply from intentional physical, chemical, and biological attacks. In response to PDD 63, EPA forged a partnership with the American Metropolitan Water Association (AMWA) to establish a secure system for sharing sensitive security information with water utilities. Security activities under PDD 63 focused primarily on the 353 community water systems that each serve more than 100,000 people.2
After September 11, 2001, EPA’s role in water security was expanded under Title IV of the Public Health Security and Bioterrorism Preparedness and Response Act (PL 107-188). A central mandate of PL 107-188 is the requirement that all water utilities serving more than 3,300 people complete and submit to EPA vulnerability assessments (VAs) that address potential opportunities for biological, chemical, and physical attacks. To protect the information from widespread dissemination, access to the more than 8,000 vulnerability assessments that are to be submitted to EPA is limited to a few individuals designated by the administrator of EPA. Water utilities that serve fewer than 3,300 people have been encouraged, but are not required, to complete vulnerability assessments.2
Since 2002, President Bush has issued a series of Homeland Security Presidential Directives to supersede previous PDDs. Central to the management of national water security efforts is Homeland Security Presidential Directive 7 (HSPD7), which reinforces EPA’s role as the sector-specific lead for water infrastructure. Under HSPD7, EPA is tasked with identifying, prioritizing, and coordinating water infrastructure protection activities, and it is directed to work with the Department of Homeland Security (DHS), which has the responsibility for coordinating the overall national effort to protect critical infrastructure.3
To that end, DHS released the Interim National Infrastructure Protection Plan (NIPP) in February 2005 as a draft framework for coordinating critical infrastructure protection across all critical infrastructure sectors. The plan states that, as the designated Sector Specific Agency for the Water Sector, EPA will “work with the private sector and State, local, and tribal entities to further refine stakeholder roles and responsibilities and implement the NIPP (Base Plan) and the Sector-Specific Plans (SSPs) that will become annexes to the NIPP.”4 A revised plan was issued in November 2005.5 The plan is currently still in draft form.
Homeland Security Presidential Directive 9 (HSPD9) directs EPA to develop a surveillance and monitoring program to provide early warning detection of a terrorist attack using biological, chemical, or radiological contaminants. HSPD9 also requires EPA to develop a nationwide laboratory network to support the routine monitoring and response requirements of the surveillance and monitoring program.6 In fulfillment of HSPD9, EPA announced in 2005 plans for its WaterSentinel, a pilot program to develop and evaluate systems for timely detection of drinking water contamination threats.7 The potential success of the program is unclear, given that it was appropriated in its first year (FY06) at less than 25% of the President’s $44 million budget request.8
In 2004, the National Drinking Water Advisory Council (NDWAC), an independent group that advises the administrator of EPA, formed a working group dedicated to water security issues. The Water Security Working Group (WSWG) was charged with identifying: (1) voluntary practices that would constitute an active and effective security program at water utilities, (2) incentives for utilities to implement those practices, and (3) measures of progress for security program implementation. The 16 members of the WSWG included representatives of water and wastewater utilities, public health practitioners, environmental regulators, and advocacy groups. The WSWG did not address specific vulnerabilities at utilities or recommend specific actions that utilities should take.1

Public Record of Past Threats to Water Supplies

The threat of intentional contamination of water supplies is not new. In 1941, Director of the Federal Bureau of Investigation J. Edgar Hoover acknowledged the vulnerability of the U.S. water supply to attack:
spacerIt has long been recognized that among the public utilities, water supply facilities offer a particularly vulnerable point of attack to the foreign agent, due to the strategic position they occupy in keeping the wheels of industry turning and in preserving the health and morale of the American Populace.2spacer
  
Recent threats to the U.S. water supply have been documented. In January 2001, the FBI warned U.S. water utilities of a threat from a “very credible, well funded, North Africa-based terrorist group” to “disrupt water operations in 28 U.S. cities.”
9 In July 2002, following the acquisition of Al Qaeda documents that included detailed maps of several U.S. public water systems, the FBI warned of possible terrorist attacks against American targets and specifically advised the nation’s water utilities to prepare for attacks on pumping stations and pipes that deliver water to consumers.10 In 2003, when the national alert status was elevated to “high risk,” the Centers for Disease Control and Prevention (CDC) and EPA issued a health advisory via the CDC’s Health Alert Network (HAN) that recommended increased vigilance by the public health community and water utilities regarding the possibility of a terrorist attack on water supplies.11 Later, in 2004, the FBI and DHS issued a four-page bulletin to law enforcement agencies and water utilities that detailed a plot by unnamed terrorists to inject poison into the water supply during chlorination. The bulletin suggested that terrorists were interested in recruiting water utility insiders to carry out the plot.12

There have been additional threats to the water supply that have not received widespread media attention. A 2003 report commissioned by the American Water Works Association Research Foundation queried water utilities, government agencies, and established terrorism incident databases and found more than 100 cases of actual, threatened, and disrupted plots to contaminate water supplies. Of those cases, 20 incidents involved actual contamination events, more than half of which occurred in modern water supplies with pressurized pipe distribution.13

Overview of U.S. Water Supply

A major challenge to safeguarding the water supply is that water systems are highly variable. In the U.S., there are more than 54,000 community water systems* that provide water to approximately 300 million people; 7% of these systems provide water to 81% of the population. The sources of water for these systems are varied: approximately 53% of all drinking water in the U.S. comes from groundwater sources (wells), while the rest comes from surface water sources (reservoirs, lakes, and rivers).14
Drinking water quality depends on the initial quality of the rivers, lakes, reservoirs, and wells that serve as source waters and the effectiveness of treatment methods employed. Generally speaking, groundwater sources are more isolated from possible microbial contamination than surface water sources; however, there is less potential in groundwater for inactivation of microbes by natural environmental processes such as sunlight.15
Given the variable nature of water supplies, U.S. water utilities use a variety of treatment processes to remove contaminants from drinking water. The most commonly employed methods include: filtration (physical removal of particles), flocculation (coagulation of smaller particles into larger particles) and sedimentation (settling out from water of coagulated particles using gravity), and disinfection (ultraviolet or chemical inactivation of microbial contaminants).16 The specific treatment scheme used by a water utility may vary, depending on utility size, cost, and quality of the source water. Most bacteria can be effectively inactivated by disinfection; however, conventional treatment methods (disinfection and filtration) may not inactivate some toxins and pathogens.15
In a typical community water supply system, treated water is transported under pressure through a distribution network of buried pipes, where it may be diverted into storage containers or delivered directly to consumers. For the most part, major investments in the infrastructure that supplies, treats, and distributes water in the U.S. have not been made for decades, and, as a result, many components of the systems are aging and in need of replacement.17
In light of the heterogeneity of water systems in the U.S., the national approach to safeguarding water supplies has placed the responsibility for assessing vulnerabilities and making security improvements on individual utilities. In conducting vulnerability assessments, it is up to each utility to determine its most likely threat scenario—for example, whether it is more likely to experience a terrorist attack or tampering by vandals—and to identify components of its system that are most vulnerable. The decentralized nature of this process has made it difficult to measure on a national level what progress has been made in securing the U.S. water supply.

Vulnerability of Water Systems to Infectious Diseases and Biotoxins

Drinking water could be intentionally contaminated at the original water source (e.g., a lake or reservoir), during treatment, in pipes that distribute water to points of use, or in storage containers. Water systems could be intentionally compromised through biological (or chemical or radiological) contamination or through physical damage to the treatment or supply infrastructure. In addition to biological attacks, water supplies could be disrupted through cyber attacks on computerized operations that control delivery and treatment, or through interruption of interdependent activities, such as transportation of chemical disinfectants or electricity for pumping. Although utilities will have to consider all of these threats, this article focuses on the possibility of a biological attack on water supplies.
There is evidence to suggest that drinking water could be a vehicle for intentional contamination with a biological agent (microbe and biotoxin). Many Category A and B biological agents are believed or known to be transmissible by water. According to one list developed by the U.S. Army, of 18 organisms and 9 biotoxins that may be used as biological weapons, 44% and 89%, respectively, have been identified as water threats.18 Another 28% of biological organisms and 11% of biotoxins are considered probable water threats. Several waterborne pathogens and toxins are known to be stable in water for long periods and are resistant to commonly employed disinfection methods.
Moreover, the ability of waterborne pathogens to cause massive outbreaks has been demonstrated. In 1993, a huge outbreak of cryptosporidiosis occurred in Milwaukee, Wisconsin. Cryptosporidium organisms passed undetected through two water treatment plants and are estimated to have caused more than 403,000 illnesses and 4,400 hospitalizations among the 800,000 customers served by the water system.19 Although this incident was not the result of bioterrorism, it demonstrated to public health professionals the vulnerabilities of populations to microbial contamination of treated water supplies. Cryptosporidium was first identified in 1907, but it was not recognized as a source of waterborne disease until 1987 when it was associated with a 15,000-person outbreak in a filtered system in Georgia.20 This suggests that there is much work to be done in improving our understanding of drinking water as a source of community illness.

Protection Afforded by Water Treatment

Water treatment (filtration and disinfection) can reduce the risk posed by pathogens if microbial contaminants are introduced into the source waters of a water supply. The use of chlorine to disinfect drinking water is commonly cited as one of the major public health successes in reducing community illness of the 20th century. Despite the use of filtration and disinfection in U.S. water systems, outbreaks of disease associated with drinking water in those systems continue to occur. The effectiveness of water treatment in removing or inactivating pathogens depends largely on the type of treatment method employed and the resistance of a particular pathogen.
While the threat posed by conventional microbial contaminants may be reduced by common methods of treatment, there is limited information regarding what levels of reduction are possible for many potential bioweapons agents. It has been shown that some waterborne pathogens, such as Cryptosporidium and Bacillus anthracis, are resistant to disinfection by chlorination. The tolerance of a number of other potential water threats—such as Brucella species, plague, and smallpox—to disinfection by chlorination is unknown or unpublished.18 Increasing the amount of disinfectant used in a water supply may improve the efficiency of pathogen inactivation; however, water utilities generally maintain chlorine residuals at the lowest levels that will keep the system in compliance with conventional microbial requirements, in an effort to minimize the formation of potentially harmful disinfection by-products.15Physical removal of pathogens through filtration is widely used in U.S. water system treatment, but it is generally not an efficient means of removing smaller pathogens, such as viral particles.21
Many experts agree that the best approach to ensuring water quality is through application of multiple barriers to contamination in supply, treatment, and distribution, but some community water systems have not adopted this approach. In particular, some surface water systems, including those that serve some of the largest U.S. cities, do not use filtration to remove pathogens that may resist the disinfection process.17

The Role of Dilution

It is a widely held view that it would be difficult to effectively poison the water supply because contaminants would be diluted by large volumes of water in most systems. It is certainly true that dilution of a contaminant reduces the amount of a biological agent to which an individual would be exposed, but the actual reduction in risk posed by the diluted contaminant is difficult to calculate. The threat of illness resulting from intentional contamination of the water supply depends in part on the infective dose of the introduced pathogen. For some waterborne pathogens, it can take as few as 1 to 10 organisms to make an individual ill. The infective dose for other waterborne pathogens, however, is not known.21 If water supplies are contaminated, it will not be possible to dilute the level of biological agents below a concentration of one.
Intentionally contaminating most surface water source waters with sufficient quantities of pathogens or toxins to sicken hundreds, thousands, or more people could be logistically difficult. Nationally, most reservoirs contain from 3–30 million gallons of water. Larger cities may be served by reservoirs that contain several hundred billion gallons of water. For example, water resides in the 412- billion gallon Quabbin reservoir that serves metropolitan Boston for years before it reaches the distribution system.22 Given the immense size of the nation’s larger reservoirs and long residence times of water in reservoirs, it is not likely that reservoirs can be intentionally contaminated with most pathogens in sufficient quantities to cause widespread illness.
A more concerning source of vulnerability is the potential introduction of a microbial agent into the distribution system of a water supply, because such systems are highly accessible, are downstream from water treatment processes, and are closer to the point of consumption than reservoirs. A biological attack on the distribution system would use utility pipes for the opposite of their intended purpose: Instead of carrying water out of a tap, the pipes would spread pathogens or biotoxins to nearby homes or businesses. With an understanding of hydraulics, an attacker could use utility pipes to inject and deliver pathogens to consumers.
The introduction of contaminants to the water supply via access points in the distribution system was demonstrated in a widely reported incident in Charlotte, North Carolina, where a fire truck accidentally pumped more than 60 gallons of firefighting foam into the distribution system through a fire hydrant.23 In addition to fire hydrants, taps in residences and businesses may be potential points of access to the distribution system.
In a recent Government Accountability Office (GAO) report, which sought water security experts’ views on key security-related vulnerabilities of drinking water systems, an attack on the distribution system was named as a key concern. Seventy-five percent of these experts cited the ease with which distribution systems can be accessed as a main concern regarding the vulnerability of the distribution system. In particular, they mentioned the difficulty of preventing the introduction of a contaminant into the distribution system from inside a public building.24

Consequences of an Attack

There is ample evidence to suggest that contamination of U.S. water supplies could produce significant public health and economic consequences. Experience with nondeliberate contamination events has demonstrated that, even when the number of deaths associated with an outbreak is low, the healthcare costs to the community may be considerable. A study that examined the financial impact of the 1993 Milwaukee outbreak estimated illness-related costs (medical costs and productivity losses) of more than $96 million.25 Only 1% of cases were hospitalized, but their medical costs accounted for 89% of total outbreak-related medical costs. Moreover, costs to government agencies that were involved in the outbreak investigation (CDC, EPA, Wisconsin Division of Public Health, City of Milwaukee Health Department, Milwaukee Water Works, and 17 local health departments) were estimated at more than $2 million immediately following the outbreak.
An important consideration regarding the strategic importance of the U.S. water supply is that the national water infrastructure affects every single U.S. citizen. Without an effective government response and proper management, an attack on a U.S. water supply could have an economic impact and cause a loss of public confidence not only in the affected system, but also in water supply systems throughout the country. Maintaining consumer confidence is an ongoing challenge for the water industry, even without having experienced an attack. The 1999 nationwide survey by the National Environmental Education & Training Foundation found that 65% of Americans either take additional steps to treat their drinking water or drink bottled water in their homes. Moreover, some 24% of Americans reported that they do not drink tap water at all.26 The study authors concluded that, despite the fact that U.S. water companies and utilities maintain some of the highest quality public drinking water in the world, many consumers are wary of tap water. Given the challenges already facing the industry, an attack on one portion of the water supply could further erode public confidence in the safety of drinking water as a whole.
Contamination events can result in political repercussions at all levels of government. In 2000, an outbreak of E. coli 0157 and Campylobacter occurred in Walkerton, Ontario, when improperly treated water was pumped to taps throughout town and sickened more than 2,000 people. Although the individual water operators were convicted of criminal charges (for falsifying water treatment reports), a public inquiry also placed blame on the provincial government. In particular, the report criticized Ontario’s privatization of water quality testing as failing to provide adequate oversight to ensure water safety: “If the Ministry of Environment had adequately fulfilled its regulatory and oversight role, the tragedy in Walkerton would have been prevented...or...reduced in scope.”27 Following the inquiry, an outraged public held its political leaders accountable: In the next provincial election, the opposition party won majority control in Ontario, partially campaigning on safe drinking water.28
Water supplies do not actually have to be contaminated for disruption to occur. Given the lack of diagnostic tools to rapidly and reliably rule out a threat of contamination, hoaxes or threatened incidents of contamination can pose considerable management and response challenges for water utilities and political leaders. One example was in the Village of Orwell, Ohio, which received a generic threat against its water supply just before the 2004 Thanksgiving weekend.29 In the interest of safety, the local leaders made the decision to advise citizens not to use their tap water for consumption while the incident was being investigated; it was ultimately determined to be a hoax. The do-not-use order lasted through the holiday weekend. To ensure that the Village’s thousand or so residents received the notice, Village employees directly contacted every home in the affected area via phone or by paper notice if they were not able to reach a household by phone (Village of Orwell, Ohio, Water/Sewer Department; personal communication). This single incident demonstrates the considerable amount of resources that hoaxes can demand even in small communities.

Current Limitations to Achieving Security

Difficulty Detecting and Recognizing Contamination Events
A fundamental challenge to protecting water supplies from deliberate or threatened contamination is our inability to rapidly assess whether an attack has occurred. Strategies that are currently used for routine monitoring of water supplies are not adequate for detecting threats real-time or for determining the presence of exotic contaminants. Water supplies are monitored routinely for only a small number of contaminants, and results may take from hours to days.
For more than a century, public health professionals have relied on an indicator organism approach to assessing microbial contamination of water supplies. That is, drinking waters are routinely monitored for enteric bacterial organisms that might suggest the presence of microbial contamination from human waste. This conventional analysis is slow and will not detect the presence of bioweapons agents that are not likely to be associated with sewage.
Additionally, the sampling strategies commonly associated with conventional water quality monitoring may not detect the presence of bioweapons before the contaminated water reaches the population. This is because monitoring of water quality in the distribution system may be conducted less frequently than sampling of reservoirs, other source waters, and treated water as it leaves the water treatment plant.
The emphasis on source water monitoring may have implications for the ability to prevent outbreaks, as there is evidence to suggest that distribution systems may be an increasingly important source of outbreaks of waterborne disease. The National Research Council (NRC) reports that the percentage of outbreaks attributable to distribution systems is on the rise. From 1999 to 2002, 50% of outbreaks reported in community water systems were related to problems in the water distribution system (as compared with 30% of outbreaks from 1971–1998).30 The reasons for this upward trend are not clear, but the NRC report suggests a possible reason may be the fact that regulations for distribution systems have not been as extensive as they have been for surface waters. Both the reliance on indicator organisms for monitoring water quality and the focus on monitoring water at the source suggest that traditional water sampling schemes may not detect a biological attack on water supply, especially one targeting the distribution system.
Enhanced techniques for real-time or near–real-time detection of contaminants (including bioweapons agents) in water supplies are currently being investigated, but considerable work is needed before they will be available for widespread use.31 The availability of specialized water testing (i.e., reference laboratories) is limited in most parts of the country, which further limits our ability to respond to a biological attack.32 The importance of improving detection capabilities and developing real-time monitoring capabilities was highlighted in a GAO survey of drinking water experts.24Approximately 93% of the experts in the GAO report rated the expansion of research and development of near–real-time monitoring technologies as a high-priority activity for federal support. Moreover, nearly 70% of the experts rated this activity as warranting the highest priority for federal funding, which far surpassed the rating of any other activity.
Until more sophisticated monitoring capabilities are developed, it is highly probable that there will be a limited ability to detect an attack before a population is exposed, and the first signs that that attack has occurred may be the recognition of increased morbidity (sickness) within a community. However, experience with naturally occurring waterborne outbreaks suggests that it may be difficult to recognize through epidemiologic investigation that a water supply has been contaminated.
Identifying drinking water as a source of an outbreak is difficult, given the epidemiologic characteristics of waterborne illness. First, many of the signs and symptoms of waterborne disease are nonspecific and often mimic more common medical conditions and disorders. While waterborne pathogens may cause significant illness, including chronic and life-threatening disease in immunocompromised populations, the health effects may be more limited in healthy patients. Even if a pathogen causes significant and recognizable morbidity in a population, it may be difficult to assess the extent of illness (i.e., case numbers) within the community. Infected individuals may not be detected by the public health system, as was observed in the Milwaukee outbreak in which it was determined that 88% of infected patients did not seek medical attention for their symptoms. Consequently, health authorities in Milwaukee did not recognize the waterborne outbreak until nearly a month after contamination began.19
Second, when a waterborne disease outbreak is recognized, the causative agent may never be identified. According to a report by the National Academies of Science, the etiology of 50–60% of identified waterborne disease outbreaks is never determined.31
Finally, it may be difficult to identify drinking water as the source of the outbreak. Even if infected individuals do seek clinical care and are reported as cases to public health authorities, these patients may not be aware of previous waterborne exposure and may not be able to provide an accurate exposure history. This decreases the likelihood that drinking water will be identified as the source of infection within the community. Furthermore, water samples taken after illness has shown up in a community may not reveal contamination, as the pathogen that caused infection is likely to have left the water system by the time illness is detected.
Therefore, it is critically important for clinicians to be familiar with the signs and symptoms of waterborne exposure to biological agents; detecting a biological attack on the water supply will be difficult if clinicians limit exposure histories to inhalational and cutaneous routes of exposure. But most practicing physicians have received limited training to help them diagnose and evaluate waterborne disease either from intentional or natural contamination of water supplies.11
Some communities have implemented syndromic surveillance systems in hopes that they will provide early recognition of disease outbreaks or a biological attack. The concept of using syndromic surveillance for detecting waterborne outbreaks is based on experience from the 1993 Milwaukee outbreak of cryptosporidiosis (which, at that time, was not a reportable disease). The outbreak was detected through reports to the city health department of widespread absenteeism and substantial increases in sales of over-the-counter antidiarrheal medications.33 There is no evidence that syndromic surveillance systems offer a comparative advantage over the likelihood that an astute clinician would notify the health department of an unusual public health event. The utility of syndromic surveillance systems in detecting any biological attack, including one on the water supply, simply has not been demonstrated. However, an evaluation of syndromic surveillance in recognizing a hypothetical aerosol attack suggests that these systems may not significantly improve the ability to recognize or respond to a biological attack.34
Some utilities also monitor calls to customer complaint centers to provide early warning of an unusual change in drinking water quality. However, given that biological agents are odorless and tasteless, it is unlikely that a biological attack will be recognized by customer complaints prior to an increase in morbidity within the community.
Lack of Data to Inform Response Planning
Most research on microbial bioweapons has focused on aerosols, rather than waterborne exposure.35 As a result, there is a paucity of data surrounding the vulnerability of the water supply to contamination with a bioweapon. How biological organisms, including most bioweapons, will perform in distribution systems is largely unknown as are infectious dose and tolerance to disinfectants. It is also not understood if known bioweapons will display similar clinical pictures when ingested as they do when acquired via airborne or dermal exposure. Such information is critical for recognizing a waterborne outbreak and for assessing its likely morbidity and mortality.
These data are critically important for utility operators and public health officials to accurately assess the degree to which public health may be threatened by an attack on the water supply. Consequently, experts have highlighted the need for additional research in the water sector. In reviewing the state of science surrounding water security, a National Academies panel found that while “conventional wisdom holds that water’s dilution effects would necessitate large quantities of contaminants to pose health problems” it is a “conjecture…poorly supported by research.”32 As a result of the paucity of scientific data, the National Academies have called for more careful analysis to determine precisely what agents, and in what quantities, pose a serious threat if present in a potable water supply.
There are also limited data available on how best to respond to a biological attack on the water supply. Since public safety concerns (such as firefighting capabilities) may prevent shutting off contaminated supplies, a routine response is to issue a boil-water advisory. This usually means that consumers are told to bring water to a boil for 1 minute before using it for drinking, brushing teeth, or washing dishes.36 While this method may be effective for inactivating pathogens commonly associated with contamination by human or animal waste, some research suggests that it may not be effective for some bioweapons agents. A study by the EPA found that holding water at a rolling boil for 1–3 minutes in an open container would not be sufficient to inactivate Bacillus anthracis spores.37 Therefore, issuing standard boil-water advice may not be adequately protective.
There is also some evidence to suggest that boiling water contaminated with certain pathogens may increase the risk of exposure.38 In 1999, researchers examined the safety of boil-water advisories if water was contaminated with an anthrax-like bacterium. The investigation found that boiling water contaminated with the spore-forming bacteriumBacillus subtilis (a surrogate of anthrax) can result in dispersal of the bacteria to local air environments. Thousands of viable spores were found in aerosols generated during the vapor phase of boiling, which led the authors to conclude that boiling contaminated water may constitute a considerable risk of exposure via aerosol inhalation and deposition on surfaces.
It is also not clear under what conditions utilities could urge customers not to use contaminated water even for showering, as the risk of possible inhalational exposure is not understood. Although respiratory infections associated with inhalational water exposure are well documented for the bacterium Legionella pneumophila, it is unclear if other waterborne pathogens could be transmitted through inhalational exposure.
A very limited set of data suggests there is at least some risk of acquiring a respiratory infection from Cryptosporidiumspecies, though it is unknown to what extent drinking water plays a role in such cases.39–43 Although infections of this kind are rarely reported, it is unclear how infection would occur within a community if more people in the community were exposed to high doses of infectious agents. Without compelling scientific evidence to support the safety of the water, public perception may necessitate the provision of alternate water supplies following an attack. Experiences with natural disasters have demonstrated that it takes considerable planning and resources to be able to provide external sources of water to communities for more than a few days.

Recommendations for Future Actions

Develop a Comprehensive Research Agenda to Improve Knowledge of Water Threats
There is currently not enough of an evidence base to assess the true vulnerability of water supplies to biological attack. A national water security policy should include a research agenda to address critical knowledge gaps. The EPA’s National Homeland Security Research in this area must be publicly available so that water utilities and the public health and healthcare communities that are responsible for preventing or responding to biological attacks on the water supply have the appropriate information to develop preparedness and response plans and to communicate with the public should an event occur. Until the state of knowledge regarding water biothreats is improved, utilities and public health authorities may have very little evidence to guide their preparations to thwart an attack on the water systems or their response to actual attacks on these systems. This research would also help federal authorities assess national progress in preparing for biological attacks on water supplies.
Although there has been some federal activity in creating a national research agenda, recent analyses of these activities have revealed gaps. The EPA’s Water Security Research and Technical Support Action Plan identified critical research needs and created a plan for addressing those needs. However, a National Research Council (NRC) panel evaluation of EPA’s Plan identified critical gaps in the scope of the research plan and suggested alternative priorities for EPA to pursue. Furthermore, the NRC panel criticized the plan’s failure to address the financial resources required to complete the research and to implement needed countermeasures to improve water security.2,44 The EPA’s Office of Inspector General (OIG) also has been critical of the agency’s research activity, citing failure to use information from completed vulnerability assessments to identify water security research needs. The OIG report included the following quote from a member of the National Research Council panel that reviewed EPA’s research plan:
spacerThe vulnerability assessments provide information that could provide guidance. It will provide EPA an opportunity to address vulnerabilities instead of guessing what they are. It will provide assurance that all that needs to be considered have been considered or we risk leaving our self at risk. Access to the vulnerability assessments would strengthen whatever plan is developed.45spacer
Information contained in vulnerability assessments should be used to identify and prioritize research needs.
Improve Federal Guidance to Ensure Vulnerabilities Are Adequately Addressed by Individual Utilities
Although the water supply has been designated as a critical asset to the security of the nation, the responsibility for securing the sector rests with individual utilities, and there is limited opportunity for oversight by the federal government. This decentralized approach has made it difficult to assess whether increased activity has resulted in greater security across the nation, in part because there are no mechanisms for measuring progress across the water sector.
The EPA has limited authority to: (1) ensure that individual utilities have accurately characterized and prioritized their vulnerabilities commensurate with the threat, (2) identify specific areas where security improvements are needed, and (3) prioritize future program needs. This is because while EPA is the repository of more than 8,000 utility VAs, it is precluded by the Bioterrorism Act from disclosing any information derived from the VAs. Only individuals specifically designated by the EPA Administrator may have access to the assessments and related information. These individuals are precluded from using information gleaned from VAs to allocate funds to specific utilities for implementing security improvements and for issuing guidance documents for the water sector.
The EPA’s OIG has expressed concern over the lack of federal oversight over the completion of vulnerability assessments. In a 2003 report, the OIG reported that it was “important that EPA promptly analyze vulnerability assessments submitted by large utilities . . . to determine whether the assessments adequately and comprehensively address terrorist threats.”46 Of particular worry to the OIG was evidence from interviews with utilities and water security experts that suggests that “vulnerability assessments submitted may emphasize traditional, less consequential and less costly threats, such as vandalism and disgruntled employees . . . and may not necessarily address terrorist scenarios of the events of 9/11 that motivated passage of the Bioterrorism Act.”46 The OIG also expressed concern that neither the EPA nor the methodologies used by utilities to complete the vulnerability assessments provided threat guidance that identified the most vulnerable components unique to water systems. Specifically, the OIG report maintained that distribution system threats have not been adequately emphasized.
Critical decisions regarding how to prioritize and address the bioterrorist threat to water supplies should not be left solely up to water utilities. While water utilities may have the best understanding of the specific vulnerabilities and physical limitations of their systems, they do not have the analytical and institutional resources required to assess the relative likelihood and potential impacts of national security threats, particularly those without well-defined solutions. This is especially true with respect to the potential for a biological attack on the water supply, as it is a threat that is not well understood and something with which utilities have very little expertise.
Even in situations where clear guidance exists, some utilities find it difficult to address fairly straightforward public health threats, such as lead contamination of drinking water. A 2004 investigation by The Washington Post, which examined 65 large water systems across the country that had reported lead levels near or exceeding federal standards, found that dozens of utilities obscured the extent of lead contamination in their systems, ignored requirements to correct problems, and failed to report data to regulators.47 According to The Washington Post, some of the nation’s largest and arguably better-funded water systems did not report lead-level tests that showed high readings to regulators or their consumers. Furthermore, in their sampling, utilities may have avoided retesting homes that had previously demonstrated high lead levels.47 These utilities have maintained that these inconsistencies represent differences in interpretation of water regulations and were not attempts to deceive the government. At the least, this investigation illustrates that active and directive federal guidance in interpreting water security threats and implementing programs to appropriately address these threats is warranted.
Vulnerability assessments, which also are used to inform emergency response plans and to help identify (and, hopefully, implement) corrective actions to system vulnerabilities, are a fundamental basis of our current national approach to ensuring security of the water supply. Since the strength of water security programs rests on the quality of each utility’s VA, it is in the best interest of the nation to be sure that utilities have completed these assessments appropriately. Moreover, it will not be feasible to prioritize future program activities without a national assessment of how thoroughly individual utilities are addressing the threat and where additional improvements are needed. The U.S. government should develop a mechanism whereby the EPA can confidentially evaluate (i.e., protect from Freedom of Information Act requests) all vulnerability assessments and can report extracted information in aggregate to identify areas where additional commitment of federal financial resources and technical assistance can improve progress.
Increase Federal Funding for Security Improvements
To secure the nation’s water supply, the federal government must create a grant program specific to water sector security improvements. The financial state of the water sector is such that utilities will be unable to maintain comprehensive security programs for the long term.  As reported in a 2004 GAO report, drinking water and wastewater utilities will need to invest hundreds of billions over the next 20 years just to maintain their infrastructure for routine operations. The projected needs range from $485 billion to nearly $1.2 trillion.48 EPA estimates 20-year needs for drinking water transmission and distribution to be $83.2 billion, plus an additional $18.4 billion for storage facility infrastructure needs.39
In 2002, a survey of several thousand water utilities reported that 29% of drinking water and 41% of wastewater utilities were not generating enough revenue from user rates and other local sources to cover their full cost of service. As a result, roughly one-third of the utilities deferred maintenance because of insufficient funding, had 20% or more of their pipelines nearing the end of their useful life, and lacked basic plans for managing their capital assets.49
Although some federal funds have been made available for security activities at utilities, current funding levels are insignificant with respect to the sector-wide needs. In fiscal year 2002, EPA awarded approximately $51 million in grants to help the community water systems serving more than 100,000 customers complete vulnerability assessments. Since 2002, EPA has provided over $150 million in support for development of water security–related tools and for training and technical assistance. These funds, however, have not focused on making security improvements within systems.
Following September 11, the American Water Works Association (AWWA), a trade organization representing the water industry, estimated that it will cost $1.6 billion for initial security upgrades at all drinking water utilities.50 The extent of true costs of protecting the water supply from biological attack is not well defined, in part due to lack of understanding of the nature of the biological threat. However, as stated above, the water sector faces critical financial shortfalls just to maintain normal operations, without the added responsibility of making security improvements.
It has been suggested that EPA’s Drinking Water State Revolving Fund (DWSRF) program can be used to help states assist utilities in making security improvements. This program provides funding to states to allow them to help water systems to make infrastructure improvements to meet public health standards and reliably deliver safe drinking water. However, there are limitations to the use of these funds.
First, since the purpose of these funds is to help drinking water systems meet public health standards and reliably deliver safe drinking water, security improvement projects will have to demonstrate a direct relationship to these aims to be eligible for funding.
Second, the amount of monies available through these funds is limited and does not match the sector needs for meeting current public health standards, much less for addressing additional security-related needs. According to a 2003 report by the Association of State Drinking Water Administrators (ASDWA), a professional association serving state drinking water programs, the gap between the financial and personnel resources that state programs have to ensure protection of drinking water is growing. ASDWA’s 50-state survey found that funds available in 2002 covered only 78% of program needs, and it projected that, by 2006, available funding will meet only 62% of program needs.51This assessment did not consider the additional resource demand associated with water security programs.
Finally, there are additional requirements for using these funds that may make them difficult to use for maintaining security programs or making security-related system improvements, not the least of which involves public disclosure requirements for funded projects.
In addition to implementing security improvements, federal funds also are critically important for the development of molecular technologies for detecting and monitoring bioweapons agents in water supplies. An NRC report, which examined the barriers to the development and standardization of advanced monitoring technologies, found that the principal impediments to progress in this are the lengthy requirements for technical development, the cost of more sophisticated monitoring, and institutional resistance to change. The NRC panel concluded that government investment will be required to overcome these hurdles. In particular, government funding will be necessary to provide the impetus required for technical development and to ensure that the consumer cost of these technologies is low enough to facilitate the implementation.31 In funding research and development programs, the federal government must consider the needs and operational limitations of water utilities, to ensure that developed technologies will actually improve the sector’s capacity to respond to real or threatened contamination events. Many of the water utilities’ concerns about implementing monitoring technologies are documented in AWWA’s 2005 report, Contamination Warning Systems: An Approach to Providing Actionable Information to Decision-Makers.52

Conclusion

Although federal activity has designated the water supply as a critical infrastructure vital to the security of the United States, there has not yet been a strategic analysis on the national level of what it would actually take to achieve security in this area. Water security activities to date have largely centered on implementing physical security measures (such as security guards and fences).
Protecting water supplies from a deliberate biological attack on the distribution system has not been sufficiently addressed, partially due to a lack of scientific understanding of the true vulnerability of water supplies to intentional contamination with bioweapons. Although the current strategy to secure national water supplies places the bulk of the responsibility on individual utilities, much of what is needed to address the vulnerability of the national water supply falls out of the influence of individual utilities. This includes developing a national research agenda to appropriately identify and characterize waterborne threats and to improve methods for real-time detection of waterborne pathogens, developing biologically sound plans for responding to real and threatened contamination events, and making funds available to implement security improvements.
Given the limited funding available within the water sector, it is likely that significant progress toward securing national water supplies will not be made without greater federal involvement. The water sector needs both additional funding to maintain security programs and technical assistance to ensure that security improvement projects are appropriately identified and prioritized. Progress in this area will require substantial commitment of the federal government with substantive input from the utilities.

Notes

*The U.S. EPA defines community water systems as those systems that are connected to 15 year-round residences or serve 25 persons in a residential setting on a year-round basis. In this way, community water systems are a subset of public water systems, which include any water supply systems that deliver water for human consumption through a pipe or pipes.14

Acknowledgments

The author would like to thank Thomas V. Inglesby, Michael Mair, Beth Maldin, Ari Schuler, Molly D’Esopo, and Jaclyn Fox for their assistance in reviewing the article.

References

  1. National Drinking Water Advisory Council (NDWAC). Recommendations of the National Drinking Water Advisory Council to the U.S. Environmental Protection Agency on Water Security Practices, Incentives, and Measures. Washington, DC: National Drinking Water Advisory Council, Environmental Protection Agency; 2005. Available at: http://www.epa.gov/OGWDW/ndwac/pdfs/wswg/wswg_report_final_july2005.pdf. Accessed January 26, 2006.
  2. Copeland C, Cody B. Terrorism and Security Issues Facing the Water Infrastructure Sector. Washington, DC: Congressional Research Service; April 25, 2005. Available at:http://www.fas.org/sgp/crs/terror/RL32189.pdf. Accessed May 25, 2005.
  3. U.S. Environmental Protection Agency. Water Security Legislation and Directives. Washington, DC: U.S. Environmental Protection Agency; 2004. Available at:http://cfpub.epa.gov/safewater/watersecurity/legislation.cfm. Accessed May 15, 2005.
  4. U.S. Department of Homeland Security. Interim National Infrastructure Protection Plan. Washington, DC: U.S. Department of Homeland Security; 2005. Available at:http://www.newsecurityconcepts.com/DataFiles/interimnipp.pdf. Accessed March 29, 2006.
  5. U.S. Department of Homeland Security. Draft National Infrastructure Protection Plan. Washington, DC: U.S. Department of Homeland Security; November 2, 2005. Available at:http://www.fas.org/irp/agency/dhs/nipp110205.pdf. Accessed March 29, 2006.
  6. U.S. Environmental Protection Agency. Summary of Homeland Security Presidential Directives. Washington, DC: U.S. Environmental Protection Agency; undated. Available at:http://www.epa.gov/sab/pdf/homeland_security_presidential_directives.pdf. Accessed March 27, 2006.
  7. U.S. Environmental Protection Agency. Homeland Security Research Center News. Washington, DC: U.S. Environmental Protection Agency; June 20, 2005. Available at:http://www.epa.gov/NHSRC/news/news062005.htm. Accessed March 29, 2006.
  8. Association of Metropolitan Water Agencies (AMWA). Water Security Scan. Washington, DC: Association of Metropolitan Water Agencies; July/August 2005. Available at:http://www.amwa.net/wss/July_Aug_05/index.html. Accessed March 29, 2006.
  9. Jesperson K. Are water systems a terrorist target? On Tap Magazine [Morgantown, WV: National Drinking Water Clearing House (NDWC)]. Available at:http://www.nesc.wvu.edu/ndwc/articles/OT/WI02/WaterSys_TerrTarget.html. Accessed March 30, 2006.
  10. Cameron C. Feds arrest Al Qaeda suspects with plans to poison water supplies. Fox News July 30, 2002. Available at: http://www.foxnews.com/story/0,2933,59055,00.html. Accessed March 31, 2006.
  11. Meinhardt PL. Water and bioterrorism: preparing for the potential threat to U.S. water supplies and public health. Annu Rev Public Health 2005;26:213–237.
  12. Kalil JM, Berns D. Drinking supply: terrorists had eyes on water. Las Vegas Review-Journal August 12, 2004.
  13. American Water Works Association Research Foundation (AwwaRF). Actual and Threatened Security Events at Water Utilities. Project 2810. Denver: American Water Works Association Research Foundation; April 2003.
  14. U.S. Environmental Protection Agency. 2002 Factoids: Drinking Water and Ground Water Statistics for 2002. Washington, DC: U.S. Environmental Protection Agency; 2002.
  15. Khan AS, Swerdlow DL, Juranek DD. Precautions against biological and chemical terrorism directed at food and water supplies. Public Health Rep 2001;116(1):3–14.
  16. U.S. Environmental Protection Agency. Water on Tap: A Consumer’s Guide to the Nation’s Drinking Water. Washington, DC: U.S. Environmental Protection Agency; 2003.
  17. Luthy RG. Bioterrorism and water security. Environ Sci Technol 2002;36(7):123A.
  18. Burrows WD, Renner SE. Biological warfare agents as threats to potable water. Environ Health Perspect1999;107(12):975–984.
  19. MacKenzie WR, Schell WL, Blair KA, et al. Massive outbreak of waterborne cryptosporidium infection in Milwaukee, Wisconsin: recurrence of illness and risk of secondary transmission. Clin Infect Dis 1995;21(1):57–62.
  20. Hayes EB, Matte TD, O’Brien TR, et al. Large community outbreak of cryptosporidiosis due to contamination of a filtered public water supply. N Engl J Med 1989;320(21):1372–1376.
  21. Rose JB. Water quality security. Environ Sci Technol 2002;36(11):246A–250A.
  22. Terrorism: Are America’s Water Resources and Environment at Risk? Hearings Before the Subcommittee on Water Resources and Environment Committee on Transportation and Infrastructure, U.S. House of Representatives (testimony of JP Sullivan) (October 10, 2001). Available at:http://www.house.gov/transportation/water/10-10-01/sullivan.html. Accessed November 12, 2003.
  23. Krouse M. Backflow incident sparks improvements. Opflow 2001;27(2):1.
  24. U.S. Government Accountability Office. Drinking Water Experts’ Views on How Future Federal Funding Can Best Be Spent to Improve Security. Washington, DC: U.S. Government Accountability Office; 2003. Publication GAO-04-29.
  25. Corso PS, Kramer MH, Blair KA, Addiss DG, Davis JP, Haddix AC. Cost of illness in the 1993 waterborne Cryptosporidium outbreak, Milwaukee, Wisconsin. Emerg Infect Dis 2003;9(4):426–431.
  26. National Environmental Education & Training Foundation. The National Report Card on Safe Drinking Water Knowledge, Attitudes and Behaviors. Washington, DC: National Environmental Education & Training Foundation; 1999.
  27. O’Connor DR. A Summary Report of the Walkerton Inquiry: The Events of May 2000 and Related Issues (Part One). Ontari Ontario Ministry of the Attorney General; 2002. Available at:http://www.attorneygeneral.jU.S..gov.on.ca/english/about/pubs/walkerton/part1/WI_Chapter
    _01.pdf
    . Accessed December 16, 2005.
  28. CBC News. Indepth: Inside Walkerton, Canada’s Worstever E. coli Contamination. Available at:http://www.cbc. ca/news/background/walkerton/. Accessed December 21, 2005.
  29. Cook D. Orwell Village officials continue probe of water supply threat. Star Beacon November 27, 2004. Available at: http://www.starbeacon.com/index.asp?MC=NEWS&NID=1&AID=6695. Accessed December 21, 2005.
  30. National Research Council. Public Water Supply Distribution Systems: Assessing and Reducing Risks.Washington, DC: National Academies Press; 2005.
  31. National Research Council. Indicators for Waterborne Pathogens. Washington, DC: National Academies Press; 2004.
  32. National Research Council. Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. Washington, DC: National Academies Press; 2002.
  33. Proctor ME, Blair KA, Davis JP. Surveillance data for waterborne illness detection: an assessment following a massive waterborne outbreak of Cryptosporidium infection. Epidemiol Infect 1998;120:43–54.
  34. Nordin JD. Simulated anthrax attacks and syndromic surveillance. Emerg Infect Dis 2005;11(9):1396–1400.
  35. Christen K. Bioterrorism and waterborne pathogens: how big is the threat? Environ Sci Technol2001;35(19):396A–397A.
  36. Centers for Disease Control and Prevention. Notice: Guidance for Dialysis Care Providers. Atlanta: Centers for Disease Control and Prevention; 2004. Available at:http://www.cdc.gov/ncidod/hip/dialysis/boilwater_advisory.htm. Accessed May 25, 2005.
  37. Rice EW, Rose LJ, Johnson CH, Boczek LA, Arduino MJ, Reasoner DJ. Boiling and Bacillus spores [letter]. Emerg Infect Dis 2004;10(10):1887–1888.
  38. American Water Works Association (AWWA). Boil water orders: beneficial or hazardous? JAWWA 2003;Oct:40–45. Available at:http://www.awwa.org/communications/journal/2003/October/News/1003security.pdf. Accessed March 29, 2006.
  39. Hojlyng N, Holten-Andersen W, Jepsen S. Cryptosporidiosis: a case of airborne transmission. Lancet1987;2(8553):271–272.
  40. Meulbroek JA, Novilla MN, Current WL. An immunosuppressed rat model of respiratory cryptosporidiosis. J Protozool 1991;38(6):113S–115S.
  41. Hojlyng N, Jensen BN. Respiratory cryptosporidiosis in HIV-positive patients. Lancet 1988;1(8585):590–591.
  42. Meamar AR, Rezaian M, Rezaie S, et al. Cryptosporidium parvum bovine genotype oocysts in the respiratory samples of an AIDS patient: efficacy of treatment with a combination of azithromycin and paromomycin.Parasitol Res 2006 May;98(6):593–595.
  43. Clavel A, Arnal AC, Sanchez EC, et al. Respiratory cryptosporidiosis: case series and review of the literature.Infection 1996;24(5):341–346.
  44. National Research Council. A Review of the EPA Water Security Research and Technical Support Action Plans: Parts I and II. Washington, DC: National Academies Press; 2003.
  45. U.S. Environmental Protection Agency, Office of the Inspector General. EPA’s Final Water Security Research and Technical Support Action Plan May Be Strengthened Through Access to Vulnerability Assessments. Report No. 2004-P-00023. Washington, DC: U.S. Environmental Protection Agency; July 1, 2004. Available at:http://www.epa.gov/oig/reports/2004/20040701-2004-P-00023.pdf. Accessed May 25, 2005.
  46. U.S. Environmental Protection Agency, Office of the Inspector General. EPA Needs to Assess the Quality of Vulnerability Assessments Related to the Security of the Nation’s Water Supply. Report No. 2003-M-0013. Washington, DC: U.S. Environmental Protection Agency; September 24, 2003. Available at:http://www.epa.gov/oig/reports/2003/Report2003M000013.pdf. Accessed May 26, 2005.
  47. Leonnig CD, Becker J, Nakamura D. Lead levels in water misrepresented across U.S. Washington Post October 5, 2004:A01.
  48. U.S. Government Accountability Office. Water Infrastructure Comprehensive Asset Management Has Potential to Help Utilities Better Identify Needs and Plan Future Investment. Washington, DC: U.S. Government Accountability Office; 2004. Publication GAO-04-461.
  49. U.S. General Accounting Office. Water Infrastructure: Information on Financing, Capital Planning, and Privatization. Washington, DC: U.S. Government Accountability Office; 2002. Publication GAO-02-764.
  50. American Water Works Association. Protecting Our Water: Drinking Water Security in America After 9/11. Denver: American Water Works Association; July 2003. Available at:http://www.awwa.org/communications/journal/2003/July/news/0703security.pdf. Accessed March 27, 2006.
  51. Association of State Drinking Water Administrators. Public Health Protection Threatened by Inadequate Resources for State Drinking Water Programs: An Analysis of State Drinking Water Programs Resources, Needs, and Barriers. Washington, DC: Association of State Drinking Water Administrators; 2003. Available at:http://www.asdwa.org/.Accessed May 25, 2005.
  52. Roberson JA, Morley KM. Contamination Warning Systems for Water: An Approach for Providing Actionable Information to Decision-Makers. Denver: American Water Works Association; 2005. Available at:http://www.awwa.org/Advocacy/govtaff/documents/Contamination_Warning_Systems.pdf. Accessed April 3, 2006.



and....

http://www.defendyourh2o.com/threat/threat.html


Is The Nation's Water Supply Safe?
America’s Fire Hydrants Present the Next Great Threat to Homeland Security …
Are We Doing All We Can to Protect the Public?
Biological warfare, unprotected national borders, and threats at sea … all are on the hit list for those who seek to strike terror in the hearts of Americans. Even with the extraordinary security measures our government leaders are establishing, we live in an era of continual threat. Most citizens don’t realize that one of the most easily accessible and dangerous vulnerabilities that terrorists could exploit remains largely unchecked – America’s fire hydrants.A terrorist attack to the water supply could affect millions
It has been acknowledged by government security agencies – including the FBI and the White House – that our country’s water distribution system is most susceptible to terrorist attacks. In fact, when asked to identify serious vulnerabilities of our drinking water systems, more than 40 nationally recognized water experts identified our nation’s distribution system – and specifically referenced fire hydrants as a top vulnerability in the GAO report (please login to the secure section to view this report). The report, given to the Senate Committee on Environment and Public Works, states that “concerns were greatly amplified … by the discovery of training manuals in Afghanistan detailing how terrorist trainees could support attacks on drinking water systems.”

The Georgia Association Chiefs of Police issued a Resolution for the Protection of the Water Supply, supported by experts including the Federal Government's General Accounting Office, the American Water Works Association and the Georgia Rural Water Association, recognizing unprotected fire hydrants as an area of vulnerability to our drinking water systems. Click here to view the resolution.

The United States Office of Domestic Preparedness' Urban Area Security Initiative Program (UASI) recognizes geographic areas that have been deemed "at risk" to terrorism. The Fiscal Year 2006 UASI Program provides fiscal assistance to address the unique multi-disciplinary planning, operations, equipment, training, and exercise needs of high-threat, high-density urban areas.

The FY 2007 Homeland Security Grant Program just released in January 2007. Program guidance and application package is included.The Fiscal Year (FY) 2007 Homeland Security Grant Program (HSGP) contains significant improvements based upon extensive outreach to FY 2006 HSGP participants and stakeholders. In addition, the risk evaluation that forms the basis for eligibility under the HSGP has been simplified, refined, and considerably strengthened. The secure section of our web site offers information about many other funding opportunities. 


Should your city qualify as a grant candidate, we encourage you to contact a Homeland Security Products and Services representative to explore options for outfitting the hydrants in your area.

Tests Prove that the Infrastructure is Vulnerable to Accidental Backflow and Intentional Contamination
Our nation’s water infrastructure has three main elements: 1) the supply source (lake, river or well); 2) the treatment facilities; and, 3) the distribution system. Certainly, protecting supply and treatment facilities was critically important and every city in the country has rightfully spent millions of dollars on razor wire, increased security patrols and video surveillance of its supply sources and its water treatment plants. Yet thousands of unprotected points of entry to every city’s system – fire hydrants – sit accessible to accidental backflow or to anyone with a wrench wishing to do harm.
In a series of tests in Atlanta, Ga., water officials demonstrated that it only takes a couple of minutes to access a fire hydrant and insert toxins that could affect tens of thousands of people. A typical hydrant can hold up to 17 gallons of something – whether it be an exotic biological or chemical agent or rat poison found at your local hardware store. But it doesn't take large quantities of toxins to wreak havoc and death. As little as 1/20th of a quart of anthrax or ricin will make one million gallons of water toxic. It takes more than 100 miles of six-inch diameter distribution pipe to accommodate a million gallons. Very small amounts of a biological or chemical agent is necessary to permeate a large supply of water. Our secure section lists many of the various chemical and biological agents, as well as the toxicity levels in each.
Several incidents throughout the world provide a clear indication that water infrastructure networks are a prime target for terrorists. Consider the following breaches into the distribution systems that could have threatened the lives of millions, as reported by the US Army Corp of Engineers:
  • February 2002: Al-Qaida operatives arrested with plans to attack U.S. Embassy water system in Rome with cyanide;
  • December 2002: Al-Qaida operatives arrested with plans to attack water networks in neighborhoods surrounding the Eiffel Tower in Paris;
  • April 2003: Jordan foils Iraq's plot to poison water system from Zarqa feeding U.S. military bases in the Eastern Desert;
  • September 2003: FBI bulletin warns of Al-Qaida plans found in terrorist training camps in Afghanistan to poison water and food supplies in the U.S.;
  • Other reported incidents of planned terrorist attacked on water systems worldwide: U.S., France, Italy, Russia, South Africa, Philippines, Turkey, Singapore, Israel, Palestine, Iraq and Afghanistan.
In the United States, other instances have demonstrated to officials that our infrastructure is at risk:
  • June 2002: Janesville, Wis. Workers at the water utility found the barbed wire perimeter fence cut and the pad lock to a five million gallon storage tank cut. No direct evidence of contamination was found but the tank was drained and super chlorinated as a precaution;
  • July 2002: Federal officers arrested two Al-Qaida operatives in Denver with documents detailing plans to contaminate the country's water supplies;
  • January 2003: Someone jumped the barbed wire exterior fence at a water treatment plant in Debary, Fla., broke the lock on the entry gate and removed the screens on the aerators. No contaminants were found. This had the indications of an insider or professional attack. Introduction of contaminants at this point in the system would have affected the water quality of 4,000 homes. The water utility was assessed a fine because it did not immediately notify the Health Department as required by statute.
  • October 2003: A vial of highly concentrated ricin was found at the Greenville, S.C., post office along with a note saying the city's water system will be poisoned with ricin unless certain demands were met regarding the Federal policy as it pertained to the number of hours that overland truckers were allowed to drive without rest. Subsequent tests of the water system found no ricin in the water system.
  • In 2004: FBI and Homeland Security issue a bulletin warning that terrorists were trying to recruit workers at water utilities as part of a plan to poison our drinking water.
These breaches support the fact that the water distribution system is the most vulnerable, and offers those that would do us harm the ability to affect a large population in a minimal amount of time without leaving a traceable footprint. The ATV raises water security and hydrant security and addresses this weakness by acting as a physical barrier that prevents foreign objects; i.e., biological, radiological or chemical agents, from being introduced into our water supply at the distribution level via the fire hydrant. The cost of the device is negligible considering the price of inaction: possible fatalities and a public distrust in our nation’s water infrastructure.



No comments:

Post a Comment