Drinking Water
Experts' Views on How Future Federal Funding Can Best Be Spent to Improve Security
Gao ID: GAO-04-29 October 31, 2003
After the events of September 11, 2001, Congress appropriated over $100 million to help drinking water systems assess their vulnerabilities to terrorist threats and develop response plans. As the Environmental Protection Agency has suggested, however, significant additional funds may be needed to support the implementation of security upgrades. Therefore, GAO sought experts' views on (1) the key security-related vulnerabilities of drinking water systems; (2) the criteria for determining how federal funds should be allocated among drinking water systems to improve their security, and the methods for distributing those funds; and (3) specific activities the federal government should support to improve drinking water security. GAO conducted a systematic Webbased survey of 43 nationally recognized experts to seek consensus on these key drinking water security issues.
GAO's expert panel cited distribution systems as among the most vulnerable physical components of a drinking water utility, a conclusion also reached by key research organizations. Also cited were the computer systems that manage critical utility functions, treatment chemicals stored on site, and source water supplies. Experts further identified two overarching vulnerabilities: (1) a lack of information individual utilities need to identify their most serious threats; and (2) a lack of redundancy in vital system components, which increases the likelihood that an attack could render an entire utility inoperable. According to over 90 percent of the experts, utilities serving high-density areas deserve at least a high priority for federal funding. Also warranting priority are utilities serving critical assets, such as military bases, national icons, and key academic institutions. Direct federal grants were clearly the most preferred funding mechanism, with over half the experts indicating that such grants would be very effective in distributing funds to recipients. Substantially fewer experts recommended using the Drinking Water State Revolving Fund for security upgrades. When experts were asked to identify specific security-enhancing activities most deserving of federal support, their responses generally fell into three categories: (1) physical and technological upgrades to improve security and research to develop technologies to prevent, detect, or respond to an attack (experts most strongly supported developing near realtime monitoring technologies to quickly detect contaminants in treated drinking water on its way to consumers); (2) education and training to support, among other things, simulation exercises to provide responders with experience in carrying out emergency response plans; specialized training of utility security staff; and multidisciplinary consulting teams to assess utilities' security preparedness and recommend improvements; and (3) strengthening key relationships between water utilities and other agencies that may have key roles in an emergency response, such as public health agencies, law enforcement agencies, and neighboring drinking water systems; this category also includes developing protocols to encourage consistent approaches to detecting and diagnosing threats.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-04-29, Drinking Water: Experts' Views on How Future Federal Funding Can Best Be Spent to Improve Security
This is the accessible text file for GAO report number GAO-04-29
entitled 'Drinking Water: Experts' Views on How Future Federal Funding
Can Best Be Spent to Improve Security' which was released on December
01, 2003.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Committee on Environment and Public Works, U.S. Senate:
October 2003:
DRINKING WATER:
Experts' Views on How Future Federal Funding Can Best Be Spent to
Improve Security:
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-29] GAO-04-29:
GAO Highlights:
Highlights of GAO-04-29, a report to the Committee on Environment and
Public Works, U.S. Senate
Why GAO Did This Study:
After the events of September 11, 2001, Congress appropriated over
$100 million to help drinking water systems assess their
vulnerabilities to terrorist threats and develop response plans. As
the Environmental Protection Agency has suggested, however,
significant additional funds may be needed to support the
implementation of security upgrades. Therefore, GAO sought experts‘
views on (1) the key security-related vulnerabilities of drinking
water systems; (2) the criteria for determining how federal funds
should be allocated among drinking water systems to improve their
security, and the methods for distributing those funds; and (3)
specific activities the federal government should support to improve
drinking water security.
GAO conducted a systematic Web-based survey of 43 nationally
recognized experts to seek consensus on these key drinking water
security issues.
What GAO Found:
GAO‘s expert panel cited distribution systems as among the most
vulnerable physical components of a drinking water utility, a
conclusion also reached by key research organizations. Also cited were
the computer systems that manage critical utility functions, treatment
chemicals stored on site, and source water supplies. Experts further
identified two overarching vulnerabilities: (1) a lack of information
individual utilities need to identify their most serious threats; and
(2) a lack of redundancy in vital system components, which increases
the likelihood that an attack could render an entire utility
inoperable.
According to over 90 percent of the experts, utilities serving high-
density areas deserve at least a high priority for federal funding.
Also warranting priority are utilities serving critical assets, such
as military bases, national icons, and key academic institutions.
Direct federal grants were clearly the most preferred funding
mechanism, with over half the experts indicating that such grants
would be very effective in distributing funds to recipients.
Substantially fewer experts recommended using the Drinking Water State
Revolving Fund for security upgrades.
When experts were asked to identify specific security-enhancing
activities most deserving of federal support, their responses
generally fell into three categories:
* physical and technological upgrades to improve security and research
to develop technologies to prevent, detect, or respond to an attack
(experts most strongly supported developing near real-time monitoring
technologies to quickly detect contaminants in treated drinking water
on its way to consumers);
* education and training to support, among other things, simulation
exercises to provide responders with experience in carrying out
emergency response plans; specialized training of utility security
staff; and multidisciplinary consulting teams to assess utilities‘
security preparedness and recommend improvements; and
strengthening key relationships between water utilities and other
agencies that may have key roles in an emergency response, such as
public health agencies, law enforcement agencies, and neighboring
drinking water systems; this category also includes developing
protocols to encourage consistent approaches to detecting and
diagnosing threats.
What GAO Recommends:
GAO recommends that as EPA refines its efforts to help drinking water
utilities reduce their vulnerability to terrorist attacks, the agency
consider the information in this report to help determine: how best to
allocate security-related federal funds among drinking water
utilities; which methods should be used to distribute the funds; and
what specific security-enhancing activities should be supported.
[End of section]
Contents:
Letter:
Executive Summary:
Purpose:
Background:
Results in Brief:
Principal Findings:
Recommendation for Executive Action:
Agency Comments:
Chapter 1:
Key Components of a Typical Drinking Water System:
The Nation's Drinking Water Systems and the Populations They Serve:
Government and Industry Have Recently Sought to Improve Security:
Efforts to Further Improve Security after the September 11 Attacks:
Potentially Larger Federal Financial Commitment Sought in Future Years:
Objectives, Scope, and Methodology:
Chapter 2:
Vulnerability of Physical Assets:
Overarching Issues Affecting Drinking Water Systems' Security:
Chapter 3:
Strong Agreement That Allocation Decisions Should Consider a Utility's
Vulnerability Assessment:
Key Criteria to Help Determine Which Utilities Should Receive Funding
Priority:
Funding Mechanisms Recommended for Distributing Federal Funds:
Chapter 4:
Activities to Enhance Physical Security and Support Technological
Improvements:
Activities to Improve Education and Training:
Activities to Strengthen Relationships between Agencies and Utilities:
Conclusions:
Recommendation for Executive Action:
Appendixes:
Appendix I: Participating Experts on Drinking Water Security Panel:
Appendix II: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
Acknowledgments:
Table:
Table 1: Vulnerability Assessment Completion Deadlines:
Figures:
Figure 1: Key Components of a Typical Drinking Water System:
Figure 2: Key Components of a Typical Drinking Water System:
Figure 3: Number of Drinking Water Systems That Serve Various
Populations:
Figure 4: Key Vulnerabilities Identified As Compromising Drinking Water
Systems' Security:
Figure 5: Experts' Views on Whether Federal Funds Should Be Allocated
Based on Vulnerability Assessment Information:
Figure 6: Experts' Views on Which Types of Water Utilities Should
Receive Priority for Federal Funds:
Figure 7: Recommended Approaches for Distributing Federal Funds:
Figure 8: Activities Identified by Expert Panel to Enhance Physical
Security and Support Technological Improvements:
Figure 9: Activities Identified by Experts to Improve Education and
Training:
Figure 10: Activities Identified by Experts to Strengthen Relationships
between Agencies and Utilities:
Abbreviations:
AMSA: Association of Metropolitan Sewerage Agencies:
AMWA: Association of Metropolitan Water Agencies:
AWWA: American Water Works Association:
BASIC: Bay Area Security Information Collaborative:
CDC: Centers for Disease Control and Prevention:
DWSRF: Drinking Water State Revolving Fund:
EPA: Environmental Protection Agency:
ETV: Environmental Technology Verification:
FBI: Federal Bureau of Investigation:
ICMA: International City/County Management Association:
ISAC: Information Sharing and Analysis Center:
MADIRT: Mutual Aid Disaster and Intervention and Response Teams:
NRWA: National Rural Water Association:
NRDC: Natural Resources Defense Council:
PDD: Presidential Decision Directive:
SCADA: Supervisory Control and Data Acquisition:
VA: vulnerability assessment:
VSAT: Vulnerability Self Assessment Tool:
WEF: Water Environment Federation:
Letter October 31, 2003:
The Honorable James Inhofe:
Chairman:
The Honorable James Jeffords:
Ranking Minority Member Committee on Environment and Public Works:
United States Senate:
As requested, this report discusses the views of nationally recognized
experts on key issues concerning drinking water security, including
serious vulnerabilities of drinking water systems, criteria for
allocating federal funds among systems, and activities that most
warrant federal support to mitigate the risk of terrorism.
As agreed in discussions with your offices, unless you publicly
announce its contents earlier, we plan no further distribution of this
report until 30 days from the date of this letter. We will then send
copies to other appropriate congressional committees, and to the
Administrator of the Environmental Protection Agency. We will also make
copies available to others upon request. In addition, the report will
be available at no charge on the GAO Web site at [Hyperlink, http://
www.gao.gov.]
If you or your staffs have any questions concerning this report, please
call me at (202) 512-3841 or my Assistant Director, Steve Elstein, at
(202) 512-6515. Major contributors to this report are listed in
appendix II.
Signed by;
John B. Stephenson:
Director, Natural Resources and Environment:
[End of section]
Executive Summary:
Purpose:
Drinking water utilities across the country have long been recognized
as potentially vulnerable to terrorist attacks of various types,
including physical disruption, bioterrorism, chemical contamination,
and cyber attack. Damage or destruction by terrorists could disrupt not
only the availability of safe drinking water, but also the delivery of
vital services that depend on these water supplies, such as fire
suppression. Such concerns were greatly amplified by the September 11,
2001, attacks on the World Trade Center and the Pentagon and then by
the discovery of training manuals in Afghanistan detailing how
terrorist trainees could support attacks on drinking water systems.
Congress has since committed significant federal funding to assist
drinking water utilities, with over $100 million appropriated through
fiscal year 2004 to help systems assess their vulnerabilities to
terrorist threats and develop response plans. As significant as these
funds are, it is likely that drinking water utilities will ask the
federal government to provide larger sums to go beyond the planning for
upgrading drinking water security to the actual implementation of
security upgrades. Consequently, as agreed with the Chairman and
Ranking Minority Member of the Senate Committee on Environment and
Public Works, this report identifies (1) the key security-related
vulnerabilities affecting the nation's drinking water systems; (2) the
criteria that should be used to determine how federal funds are
allocated among recipients to improve their security, and the methods
that should be used to distribute these funds; and (3) specific
activities the federal government should support to improve drinking
water security.
To address these issues, GAO conducted a Web-based Delphi survey
process involving 43 nationally recognized experts. The Delphi method
is a systematic process for obtaining individuals' views on a question
or problem of interest and seeking consensus, if possible. In selecting
members for the expert panel, GAO sought individuals who were widely
recognized as possessing expertise on one or more key aspects of
drinking water security. GAO also sought to achieve balance in
representation from key federal agencies, key state or local agencies,
key industry and nonprofit organizations, and water utilities of
varying sizes. A detailed description of GAO's methodology is presented
in chapter 1.
Background:
Drinking water systems vary by size and other factors, but as
illustrated in figure 1, they most typically include a supply source,
treatment facility, and distribution system. A water system's supply
source may be a reservoir, aquifer, or well, or a combination of these
sources. Some systems may also include a dam to help maintain a stable
water level, and aqueducts and transmission pipelines to deliver the
water to a distant treatment plant. The treatment process generally
uses filtration, sedimentation, and other processes to remove
impurities and harmful agents, and disinfection processes such as
chlorination to eliminate biological contaminants. Chemicals used in
these processes, most notably chlorine, are often stored on site at the
treatment plant. Distribution systems comprise water towers, piping
grids, pumps, and other components to deliver treated water from
treatment systems to consumers. Particularly among larger utilities,
distribution systems may contain thousands of miles of pipes and
numerous access points.
Figure 1: Key Components of a Typical Drinking Water System:
[See PDF for image]
[End of figure]
Until the 1990s, emergency planning at drinking water utilities
generally focused on responding to natural disasters and, in some
cases, domestic threats such as vandalism. In the 1990s, however, both
government and industry officials broadened the process to account for
terrorist threats. Among the most significant actions taken was the
issuance in 1998 of Presidential Decision Directive 63 to protect the
nation's critical infrastructure against criminal and terrorist
attacks. The directive designated the Environmental Protection Agency
(EPA) as the lead federal agency to address the water infrastructure
and to work with both public and private organizations to develop
emergency preparedness strategies. EPA, in turn, appointed the
Association of Metropolitan Water Agencies to coordinate the water
industry's role in emergency preparedness. During this time, this
public-private partnership focused primarily on cyber security threats
for the several hundred community water systems that each served over
100,000 persons. The partnership was broadened in 2001 to include both
the drinking water and wastewater sectors, and focused on systems
serving more than 3,300 people.
Efforts to better protect drinking water infrastructure were
accelerated dramatically after the September 11 attacks. EPA and the
drinking water industry launched efforts to share information on
terrorist threats and response strategies. They also undertook
initiatives to develop guidance and training programs to assist
utilities in identifying their systems' vulnerabilities. As a major
step in this regard, EPA supported the development, by American Water
Works Association Research Foundation and Sandia National Laboratories,
of a vulnerability assessment methodology for larger drinking water
utilities. The push for vulnerability assessments was then augmented by
the Public Health Security and Bioterrorism Preparedness and Response
Act of 2002 (Bioterrorism Act). Among other things, the act required
each community water system serving more than 3,300 individuals to
conduct a detailed vulnerability assessment by specified dates in 2003
or 2004, depending on their size.
Results in Brief:
GAO's expert panel identified several key physical assets as the most
seriously vulnerable to terrorist attacks. In general, their
observations were similar to those of major public and private
organizations that have assessed the vulnerability of these systems to
terrorist attacks, including the National Academy of Sciences, Sandia
National Laboratories, and key industry associations. In particular,
when asked to identify what they believed to be among the top
vulnerabilities of drinking water utilities, nearly 75 percent of the
experts (32 of 43) identified the distribution system (one or more
components). More experts identified the distribution system as the top
vulnerability (12 of 43) among the components of the drinking water
system. The other physical assets most frequently cited were source
water supplies, critical information systems, and chemicals stored on
site that are used in the treatment process. Importantly, the experts
also identified overarching vulnerability issues that may involve
multiple system components, or even an entire drinking water system.
Chief among these issues were (1) a lack of redundancy in vital
systems, which increases the likelihood that an attack could render a
system inoperable; and (2) the difficulty many systems face due to a
lack of information on the most serious threats to which they are
exposed.
Key criteria experts cited for determining how federal funds to improve
drinking water security should be allocated included (1) the extent to
which information on utilities' vulnerabilities should be considered in
making allocation decisions; and (2) characteristics of the utilities
themselves, such as size and proximity to population centers.
* About 90 percent of the panelists strongly agreed or somewhat agreed
that allocation decisions should be based on vulnerability assessment
information. Several factors, however, complicate the government's
ability to use utilities' vulnerability assessments for this purpose.
* Panelists favored funding priority for utilities serving high-density
populations, with over 90 percent indicating that they deserve at least
a high priority and over 50 percent indicating they deserve highest
priority. Utilities serving critical assets (such as military bases and
other sensitive government facilities, national icons, and key cultural
or academic institutions) were also recommended as high-priority
recipients, while relatively few experts recommended priority for
utilities serving rural or isolated populations.
When asked to identify the most effective mechanisms of distributing
federal drinking water security funds to recipients, over half the
experts indicated that direct federal grants would be very effective in
doing so. Many also favored including a requirement for matching funds
as a grant condition. Fewer experts recommended using the Drinking
Water State Revolving Fund (DWSRF) for this purpose, particularly to
support upgrades that need to be implemented quickly.
When asked to identify and set priorities for security-enhancing
activities most deserving of federal support, the experts most
frequently identified activities that generally fell into three broad
categories:
* Physical and technological improvements includes both physical
alterations to improve the security of drinking water systems and the
development of technologies to prevent, detect, or respond to an
attack. The need to develop near real-time monitoring technologies,
which would be particularly useful in quickly detecting contaminants in
water that has already left the treatment plant for the consumer, had
by far the strongest support.
* Education and training would be used for both utility and nonutility
personnel responsible for preventing, responding to, and recovering
from an attack. These activities include, among other things, support
for simulation exercises to provide responders with experience in
carrying out utilities' emergency response plans; specialized training
of utility personnel responsible for security; general training of
utility personnel to augment security awareness among all staff; and
multidisciplinary consulting teams to independently analyze utilities'
security preparedness and recommend security-related improvements.
* Strengthening relationships is seen as critical between water
utilities and other agencies (public health agencies, enforcement
agencies, and neighboring utilities, among others) that may have key
roles in an emergency response. This category also includes developing
common protocols to engender a consistent approach among utilities in
detecting and diagnosing threats, and the testing of local emergency
response systems to ensure that participating agencies coordinate their
actions effectively.
Principal Findings:
Key Vulnerabilities:
Nearly 75 percent of the experts on GAO's panel (32 of 43) named the
distribution system (one or more components) as among the top
vulnerabilities of drinking water systems. In fact, 12 of the 32
experts identified the distribution system as the single most important
vulnerability, a considerably greater number than any other element of
the drinking water system. Their explanations most often related to the
accessibility of distribution systems at numerous points. One expert,
for example, cited the difficulty of preventing the introduction of a
contaminant into a distribution system from inside a public building.
Another expert noted that since the water in a distribution system has
already been treated and is in the final stages of being transferred to
consumers, the distribution of a chemical, biological, or radiological
agent in such a manner could be difficult to detect until it is too
late to reverse any harm done.[Footnote 1]
Several other components, though not considered as critical as the
distribution system, were still the subject of concern. Nearly half the
experts (20 of 43) identified source water as among drinking water
systems' top vulnerabilities. One expert noted, for example, that
"because of the vast areas covered by watersheds and reservoirs, it is
difficult to maintain security and prevent intentional or accidental
releases of materials that could have an adverse impact on water
quality." Yet some experts cited factors that mitigate the risks
associated with source water, including (1) that source water typically
involves a large volume of water, which in many cases could dilute the
potency of contaminants; (2) the length of time (days or even weeks)
that it typically takes for source water to reach consumers; and (3)
that source water will go through a treatment process in which many
contaminants are removed. In addition, EPA pointed out that as source
water goes through the treatment process, many contaminants are
removed.
Also cited as a vulnerability were the sophisticated computer systems
that drinking water utilities have come to rely upon to manage key
functions. These Supervisory Control and Data Acquisition (SCADA)
systems allow operators to monitor and control processes throughout
their drinking water systems. Although SCADA systems have improved
water utilities' efficiency and reduced costs, almost half of the
experts on GAO's panel (19 of 43) identified them as among these
utilities' top vulnerabilities. Finally, 13 of the 43 experts
identified treatment chemicals, particularly chlorine used for
disinfection, as among utilities' top vulnerabilities. Experts cited
the inherent danger of storing large cylinders of a chemical on site,
noting that their destruction could release toxic gases in densely
populated areas. Some noted, however, that this risk has been
alleviated by utilities that have chosen to use the more stable liquid
form of chlorine instead of the more vulnerable compressed gas
canisters that have traditionally been used.
Experts also identified overarching issues that compromise the
integrity of multiple physical assets, or even the entire drinking
water system. Among these is the lack of redundancy among vital
systems. Many drinking water systems are "linear"--that is, they have
single transmission lines leading into the treatment facility, single
pumping stations along the system, and often employ a single computer
operating system. They also depend on the electric grid, transportation
systems, and single sources of raw materials (e.g., treatment
chemicals). Many experts expressed concern that problems at any of
these "single points of failure" could render a system inoperable
unless redundant systems are in place. Experts also cited the lack of
sufficient information to understand the most significant threats
confronting individual utilities. According to the American Water Works
Association, assessments of the most credible threats facing a utility
should be based on knowledge of the "threat profile" in its specific
area, including information about past events that could shed light on
future risks. Experts noted, however, that such information has been
difficult for utilities to obtain. One expert suggested that the
intelligence community needs to develop better threat information and
share it with the water sector.
Allocation and Distribution of Federal Funds:
Many drinking water utilities have been financing at least some of
their security upgrades by passing along the costs to their customers
through rate increases. Given the cost of these upgrades, however,
drinking water industry representatives have also sought federal
assistance. GAO asked its expert panel to comment on the factors that
should be considered in allocating federal funds. Specifically, GAO
asked the experts to comment on the following:
* Appropriate use of vulnerability assessment information. About 90
percent of the experts (39 of 43) strongly agreed or somewhat agreed
that funds should be allocated on the basis of vulnerability assessment
information, with some citing the vulnerability assessments (VA)
required by the Bioterrorism Act as the best available source of this
information. Several experts, however, pointed to a number of
complicating factors. Perhaps the most significant constraint is the
Bioterrorism Act's provision precluding the disclosure of any
information that is "derived" from vulnerability assessments submitted
to EPA. It is important to protect sensitive information about each
utility's vulnerabilities from individuals who may then use the
information to harm the utility. The law specifies that only
individuals designated by the EPA Administrator may have access to the
assessments and related information. Yet even those individuals would
face constraints in using the information. They would have difficulty,
for example, in citing vulnerability assessments to support decisions
on allocating security-related funds among utilities, as well as
decisions concerning research priorities and guidance documents. Others
cited an inherent dilemma affecting any effort to set priorities for
funding decisions based on the greatest risk--whatever does not receive
attention becomes the best target.
* Criteria to help determine which utilities should receive funding
priority. According to 93 percent of the experts (40 of 43), utilities
serving high-density population areas should receive a high or highest
priority in funding (55 percent deemed this criterion as the highest
priority). Most shared the view of one expert, who noted that directing
limited resources to protect the greatest number of people is a common
factor when prioritizing funding. Experts also assigned high priority
to utilities serving critical assets, such as national icons
representing the American image, military bases, and key government,
academic, and cultural institutions. At the other end of the spectrum,
only about 5 percent of the experts (2 of 43) stated that utilities
serving rural or isolated populations should receive a high or highest
priority for federal funding. Generally, these panelists commented that
such facilities are least able to afford security enhancements and are
therefore in greatest need of federal support. Importantly, the
relatively small percentage of experts advocating priority for smaller
systems may not fully reflect the concern among many of the experts for
the safety of these utilities. For example, several who supported
higher priority for utilities serving high-density populations
cautioned that while problems at a large utility will put more people
at risk, utilities serving small population areas may be more
vulnerable because of weaker treatment capabilities, fewer highly
trained operators, and more limited resources.
As for effective mechanisms for distributing federal funds, the expert
panelists viewed direct federal grants as most effective, with 86
percent of the experts (37 of 43) indicating that this mechanism would
be somewhat or very effective in allocating federal funds. One expert
cited EPA's recent distribution of direct security-related grant funds
to larger systems to perform their VAs as a successful initiative.
Also, 74 percent cited a matching requirement for such grants as
somewhat or very effective. One expert pointed out that such a
requirement would effectively leverage limited federal dollars, thereby
providing greater incentive to participate. The Drinking Water State
Revolving Fund received somewhat less support, with a number of the
experts cautioning that as a funding mechanism, it is suited more for
longer-term improvements than for those requiring more immediate
attention.
Security-Enhancing Activities That Most Warrant Federal Support:
When experts were asked to identify and set priorities for the
security-enhancing activities most deserving of federal support, their
responses generally fell into three broad categories:
* Enhancing Physical Security and Supporting Technological
Improvements. These activities fell into nine subcategories. Of these,
the development of "near real-time monitoring technologies," capable of
providing near real-time data for a wide array of potentially harmful
water constituents, received far more support for federal funding than
any other subcategory--over 93 percent of the experts (40 of 43) rated
this subcategory as deserving at least a high priority for federal
funding. More significantly, almost 70 percent (30 of 43) rated it
highest priority. These technologies were cited as critical in efforts
to quickly detect contamination events, minimize their impact, and
restore systems after an event has passed. The experts also voiced
strong support for (1) increasing laboratories' capacity to deal with
spikes in demand caused by chemical, biological, or radiological
contamination of water supplies, and (2) "hardening" the physical
assets of drinking water facilities through improvements such as adding
or repairing fences, locks, lighting systems, and cameras and other
surveillance equipment. Some experts, however, cited the limitations
inherent in attempts to comprehensively harden a drinking water
facility's assets. They noted in particular that, unlike nuclear power
or chemical plants, a drinking water system's assets are spread over
large geographic areas, particularly the source water and distribution
systems.
* Improving Education and Training. Over 90 percent of the experts (39
of 43) indicated that improved technical training for security-related
personnel warrants at least a high priority for federal funding, with
over 55 percent (24 of 43) indicating that it deserved highest
priority. To a lesser extent, experts supported general training for
other utility personnel to increase their awareness of security issues.
The panelists also underscored the importance of conducting regional
simulation exercises to test emergency response plans, with more than
88 percent (38 of 43) rating this as a high or highest priority for
federal funding. Such exercises are intended to provide utility and
other personnel with the training and experience needed both to perform
their individual roles in an emergency, and to coordinate these roles
with other responders. Finally, about half the experts assigned at
least a high priority to supporting multidisciplinary consulting teams
("Red Teams"), comprising individuals with a wide array of backgrounds,
to provide independent analyses of utilities' vulnerabilities.
* Strengthening Relationships between Utilities and Other Key
Organizations. Experts cited the need to improve cooperation and
coordination between drinking water utilities and certain other
organizations as key to improving utilities' security. Among the
organizations most often identified as critical to this effort are
public health and law enforcement agencies, which have data that can
help utilities better understand their vulnerabilities and respond to
emergencies. In addition, the experts reported it is valuable for
utilities to develop mutual aid arrangements with neighboring
utilities. Such arrangements sometimes include, for example, the
sharing of back-up power systems or other critical equipment. One
expert described an arrangement in the San Francisco Bay Area--the Bay
Area Security Information Collaborative (BASIC). The collaborative's
eight utilities meet regularly to address security-related topics.
Finally, over 90 percent of the experts (39 of 43) rated the
development of common protocols among drinking water utilities to
monitor drinking water threats as warranting a high or highest priority
for federal funding. Drinking water utilities vary widely in how they
perceive threats and detect contamination, in large part because few
common protocols exist that would help promote a more consistent
approach toward these critical functions. Some experts noted in
particular the need for protocols to guide the identification,
sampling, and analysis of contaminants.
Making Key Security Decisions in the Face of Great Uncertainty:
EPA has identified improved drinking water security as an important
national goal, and has stated in its Strategic Plan on Homeland
Security that as funds are appropriated, federal resources will be
available to help achieve this goal. Yet key judgments about who should
receive priority for federal resources, and how those funds should be
spent, will have to be made in the face of great uncertainty about the
likely target of an attack, the nature of an attack (whether physical,
cyber, chemical, biological, or radiological), and its timing. The
experts on GAO's panel have had to consider these uncertainties in
deriving their own judgments about these issues. Their judgments, while
not unanimous on all matters, suggested a high degree of consensus on a
number of key issues.
GAO recognizes that sensitive funding decisions ultimately must take
into account political, equity, and other considerations. It also
believes such decisions should consider the judgments of the nation's
most experienced individuals on these matters, such as those included
on its panel. It is in this context that GAO offers the results
presented in this report as information for Congress and the
Administration to consider as they seek the best way to use limited
financial resources to reduce the threat to the nation's drinking water
supply.
Recommendation for Executive Action:
GAO recommends that, as EPA refines its efforts to help drinking water
utilities reduce their vulnerability to terrorist attacks, the EPA
Administrator consider the information in this report to help
determine: how best to allocate security-related federal funds among
drinking water utilities, which methods should be used to distribute
the funds, and what specific security-enhancing activities should be
supported.
Agency Comments:
We provided EPA with a draft of this report for review and comment. EPA
did not submit a formal letter but did provide comments from officials
in its Office of Water and its Office of Homeland Security. The
comments from the Office of Water said that the report's results were
"useful and well thought out." EPA's Office of Homeland Security said
that the report "demonstrates a well conceived and executed project,"
and that "a number of the issues raised in the document will be useful
to the agency as it moves forward in the drinking water security
program." Both offices also offered specific technical comments and
suggestions, which have been incorporated.
[End of section]
Chapter 1: Introduction:
Drinking water utilities across the country have long been recognized
as being potentially vulnerable to terrorism of various types,
including physical disruption, bioterrorism, chemical contamination,
and cyber attacks. Damage or destruction by such a terrorist attack
could disrupt not only the availability of safe drinking water to
consumers, but also the delivery of vital services that depend on these
water supplies, such as fire suppression.
These concerns were greatly amplified by the September 11, 2001,
attacks on the World Trade Center and the Pentagon. They were further
amplified in ensuing months when training manuals were discovered in
Afghanistan detailing how terrorist trainees could support attacks on
drinking water systems.
Key Components of a Typical Drinking Water System:
Drinking water systems vary by size and other factors but, as
illustrated in figure 2, most typically include a supply source,
treatment facility, and distribution system.
Figure 2: Key Components of a Typical Drinking Water System:
[See PDF for image]
[End of figure]
As the figure shows, a water system's supply source may include a
reservoir, aquifer, or well, or a combination of these sources. The
supply source may also include a dam as well as aqueducts and
transmission pipelines to deliver the water to a distant treatment
plant. Many water systems rely on groundwater as their primary water
source, but most systems, particularly larger systems, rely on surface
water such as lakes, rivers, and streams.
Water treatment generally uses filtration, flocculation,
sedimentation, and other processes to remove impurities and harmful
agents, and disinfection processes (such as chlorination) to eliminate
biological contaminants. Chemicals used in these processes, most
notably chlorine, are often stored on site.
The distribution system comprises several components, such as water
towers, piping grids, and pumps that deliver treated water from
treatment systems to consumers. A key feature of most distribution
systems is their size: Particularly among larger utilities,
distribution systems may have many thousands of miles of pipes.
The Nation's Drinking Water Systems and the Populations They Serve:
Nationwide, there are more than 160,000 public water systems that
individually serve from as few as 25 people to 1 million people or
more. As figure 3 illustrates, nearly 133,000 of these water systems
serve 500 or fewer people. Only 466 systems serve more than 100,000
people each, but these systems, located primarily in urban areas,
account for nearly half of the total population served.
Figure 3: Number of Drinking Water Systems That Serve Various
Populations:
[See PDF for image]
[End of figure]
Government and Industry Have Recently Sought to Improve Security:
Most drinking water systems long ago developed and maintained emergency
preparedness plans that specified how to notify the public in cases of
emergency, and how to coordinate an emergency response with law
enforcement and other emergency response officials. These plans,
however, paid little attention to the kinds of threats posed by
international terrorist organizations. Rather, they were generally
oriented toward responding to natural disasters and, in some cases,
domestic threats such as vandalism.
Both government and industry officials took a number of steps to
broaden emergency planning in the 1990s. In 1996, the President issued
Executive Order 13010, which listed water supply as one of eight
national infrastructures vital to the security of the United States. In
1997, the President's Commission on Critical Infrastructure Protection,
also established by executive order, issued a report on the
vulnerabilities of the eight categories of infrastructure and
strategies for protecting them. The report identified three attributes
crucial to water supply users: Water must be available on demand, it
must be delivered at sufficient pressure, and it must be safe for
use.[Footnote 2] It warned that susceptibility to contamination and the
loss of flow or pressure can be caused by extensive water main breaks,
the destruction of pumps, or the disruption of power supplies, and
cited these as major vulnerabilities to the nation's water supply
systems.
In response to the report's findings, the President issued Presidential
Decision Directive (PDD) 63 on critical infrastructure protection in
1998. This directive established a public-private partnership to put in
place prevention, response, and recovery measures that would augment
the security of the nation's critical infrastructure components against
criminal or terrorist attacks. The directive designated the
Environmental Protection Agency (EPA) as the lead federal agency to
work with both public and private organizations to protect the nation's
water infrastructure through the development of emergency preparedness
strategies. The agency, in turn, appointed the Association of
Metropolitan Water Agencies, a nonprofit organization representing the
nation's largest utilities, to coordinate the water industry's role in
emergency preparedness.
Initially, this public-private partnership focused on the several
hundred community water systems that each served more than 100,000
persons; the partnership was broadened in 2001 to include systems
serving more than 3,300 people. Moreover, as was the case with other
infrastructure sectors, PDD-63 focused primarily on threats to cyber
security. Specifically, the directive established a goal to develop,
within five years, a Water Information Sharing and Analysis Center
(Water ISAC). The intent of the Water ISAC is, among other things, to
facilitate the dissemination of alerts to drinking water and wastewater
utilities about threats to their systems, to analyze incident
information, and to serve as a secure source of sensitive information.
Efforts to Further Improve Security after the September 11 Attacks:
Efforts to improve protection of drinking water infrastructure were
broadened and accelerated after the September 11 attacks. In
particular, the partnership accelerated efforts to develop the Water
ISAC, which became operational in December 2002. EPA and the drinking
water industry also launched efforts to develop guidance, tools, and
training programs to assist utilities in identifying their systems'
vulnerabilities. As a major step in this regard, EPA supported the
American Water Works Association Research Foundation and the Sandia
National Laboratories to develop a vulnerability assessment (VA)
methodology and training primarily for the largest water systems. EPA
awarded approximately $51 million in fiscal year 2002 for water
security grants to help these water systems complete vulnerability
assessments.
These efforts to better understand drinking water systems'
vulnerabilities were given a significant boost when the President
signed the Public Health Security and Bioterrorism Preparedness and
Response Act in June 2002.[Footnote 3] Among other things, title IV of
the Bioterrorism Act amended the Safe Drinking Water Act to require
each community water system serving more than 3,300 individuals to
conduct "an assessment of the vulnerability of its system to a
terrorist attack or other intentional acts intended to substantially
disrupt the ability of the system to provide a safe and reliable supply
of drinking water." As illustrated in table 1, the act phased in this
requirement according to system size, requiring vulnerability
assessments for all systems serving populations greater than 3,300 to
be completed by June 30, 2004.
Table 1: Vulnerability Assessment Completion Deadlines:
System size (based on population served): 100,000 or more;
Vulnerability assessment completion deadline: March 31, 2003.
System size (based on population served): 50,000 to 99,999;
Vulnerability assessment completion deadline: December 31, 2003.
System size (based on population served): 3,301 to 49,999;
Vulnerability assessment completion deadline: June 30, 2004.
Source: Bioterrorism Act, S 401(a)(2).
[End of table]
EPA guidance calls for these assessments to include: a characterization
of the water system; the identification of possible consequences of
malevolent acts; the critical assets subject to malevolent acts; an
assessment of the threat of malevolent acts; an evaluation of
countermeasures; and a plan for risk reduction. The Bioterrorism Act
also requires each community water system serving more than 3,300
individuals to prepare or revise an emergency response plan
incorporating the results of the VA no later than 6 months after
completing the assessment. In addition, it directed EPA to provide
guidance to smaller systems on how to conduct vulnerability
assessments, prepare emergency response plans, and address threats.
Potentially Larger Federal Financial Commitment Sought in Future Years:
While significant federal funds have been committed to assist utilities
in developing vulnerability assessments and emergency response plans,
the likelihood exists that Congress and the Administration will be
asked to provide much larger sums to go beyond planning for upgrading
drinking water security to the actual implementation of security
upgrades. By most accounts, it will cost billions of dollars to upgrade
security for drinking water utilities. The American Water Works
Association, for example, estimates that it will cost $1.6 billion for
initial security upgrades at all drinking water utilities.
Objectives, Scope, and Methodology:
As requested in a June 9, 2003, letter to the Comptroller General from
the Chairman and Ranking Minority Member of the Senate Committee on
Environment and Public Works, this report identifies experts' views on
the following questions:
* What are the key security-related vulnerabilities affecting the
nation's drinking water systems?
* What are the criteria that should be used to determine how federal
funds are allocated among recipients to improve drinking water
security, and how should the funds be distributed?
* What specific activities should the federal government support to
improve drinking water security?
To obtain information on these three questions, we conducted a three-
phase Web-based survey of 43 experts on drinking water security. We
identified these experts from a list of more than 50 widely recognized
experts in one or more key aspects of drinking water security. In
compiling this initial list, we also sought to achieve balance in terms
of area of expertise (i.e., state and local emergency response,
engineering, epidemiology, public policy, security and defense,
drinking water treatment, risk assessment and modeling, law
enforcement, water infrastructure, resource economics, bioterrorism,
public health, and emergency and crisis management).
In addition, we attempted to achieve participation by experts from (1)
key federal organizations (e.g., Argonne National Laboratory, Centers
for Disease Control and Prevention, Department of Defense, Department
of the Interior's Bureau of Reclamation, Environmental Protection
Agency, and Federal Bureau of Investigation; (2) key state and local
agencies, including health departments and environmental protection
departments; and (3) key industry and nonprofit organizations such as
the American Water Works Association (AWWA), RAND Corporation, Natural
Resources Defense Council (NRDC), and National Rural Water Association
(NRWA); and (4) water utilities serving populations of varying sizes.
Of the 50 experts we contacted, 43 agreed to participate and complete
all three phases of our survey. A list of the 43 participants in this
study is included in appendix I.
To obtain information from the expert panel, we employed a modified
version of the Delphi method. The Delphi method is a systematic process
for obtaining individuals' views and seeking consensus among them, if
possible, on a question or problem of interest. Since first developed
by the RAND Corporation in the 1950s, the Delphi method has generally
been implemented using face-to-face group discussions. For this study,
however, we administered the method through the Internet. We used this
approach, in part, to eliminate the potential bias associated with
group discussions. These biasing effects include the dominance of
individuals and group pressure for conformity. Moreover, by creating a
virtual panel, we were able to include many more experts than possible
with a live panel, which allowed us to obtain a broad range of
opinions.
For each phase in the Delphi method, we posted a questionnaire on GAO's
survey Web site addressing the issues of our study. Panel members were
notified of the availability of the questionnaire with an e-mail
message. The e-mail message contained a unique user name and password
that allowed each respondent to log on and fill out a questionnaire but
did not allow respondents access to the questionnaires of others.
In the first questionnaire, we asked several broad questions, such as,
"What strategies or methods should the federal government consider for
allocating funds to water utilities (or other relevant entities) so as
to ensure that allocation achieves the greatest mitigation of risk per
dollar?" We pretested these questions with officials from the water
utility industry, a nonprofit research group, and academe. Participants
were invited to provide detailed narrative explanations for their
responses.
In the case of two key questions, we sought to identify both additional
detail and the degree to which consensus could be achieved among the
experts on our panel. We used experts' responses to phase 1 questions
to develop more detailed questions for phase 2 about specific actions
or strategies regarding two overall issues: how federal funds could
best be allocated among potential recipients to achieve the most
security improvements per dollar, and which specific activities are
most deserving of federal support. This second questionnaire included
closed-ended questions that allowed panelists to rate the relative
priority or effectiveness of these activities. It also provided experts
with the opportunity to comment on their ratings.
During the third phase of the Delphi process, we provided the
aggregated results from the ratings made in the second questionnaire.
We also provided panel members with the individual ratings they had
made in response to each question. We then invited panel members to use
this information as a basis for changing their answers if they desired.
In addition to the information obtained from our expert panel, we
obtained documentation from representatives of professional
organizations, such as the National Academy of Sciences, RAND
Corporation, American Water Works Association Research Foundation, and
Association of Metropolitan Water Agencies. We also held several
interviews with officials at EPA on the agency's drinking water
security programs. During our interviews, we asked officials to provide
information on program operations, policies, guidance, and funding
levels. We also received training on the Vulnerability Self Assessment
Tool supported by the Association of Metropolitan Sewerage Agencies,
and attended specialized conferences addressing drinking water security
by the Water Environment Federation and other organizations.
We conducted our work from July 2002 through August 2003 in accordance
with generally accepted government auditing standards.
[End of section]
Chapter 2: Experts Identified Key Vulnerabilities That Could Compromise
Drinking Water Systems' Security:
Our panel of experts identified several key physical assets of drinking
water systems as the most vulnerable to intentional attack. In general,
their observations were similar to those of public and private
organizations that have assessed the vulnerability of these systems to
terrorist attacks, including the National Academy of Sciences, Sandia
National Laboratories, and key industry associations. In particular,
nearly 75 percent of the experts (32 of 43) identified the distribution
system or its components as among the top vulnerabilities of drinking
water systems.
In addition to identifying systems' physical assets, experts also
identified overarching issues compromising how well these assets are
protected. Chief among these issues are (1) a lack of redundancy in
vital systems, which increases the likelihood that an attack could
render a system inoperable; and (2) the difficulty many systems face in
understanding the nature of the threats to which they are exposed.
Vulnerability of Physical Assets:
As illustrated in figure 4, when asked to identify what they believed
to be the top vulnerabilities of drinking water utilities, the four
physical assets most frequently identified by the panel were: (1) the
distribution system, (2) source water supplies, (3) Supervisory Control
and Data Acquisition (SCADA) and other information systems, and (4)
chemicals stored on site that are used to treat source water.
Figure 4: Key Vulnerabilities Identified As Compromising Drinking Water
Systems' Security:
[See PDF for image]
[End of figure]
Experts Identified Distribution Systems as Most Vulnerable:
The distribution system delivers drinking water primarily through a
network of underground pipes to homes, businesses, and other customers.
While the distribution systems of small drinking water utilities may be
relatively simple, larger systems serving major metropolitan areas can
be extremely complex. One such system, for example, measures water use
through 670,000 metered service connections, and distributes treated
water through nearly 7,100 miles of water mains that range from 2
inches to 10 feet in diameter. In addition to these pipelines and
connections, other key distribution system components typically include
numerous pumping stations, treated water storage tanks, and fire
hydrants.
Nearly 75 percent, or 32 of 43 of the experts on our panel, named one
or more components of the distribution system as among the top
vulnerabilities of drinking water systems. In fact, 12 of the 32
experts identified distribution systems as the most critical
vulnerability, a considerably greater number than any other system
component. The explanations they offered most often related to the
accessibility of distribution systems at numerous points. One expert,
for example, cited the difficulty in preventing the introduction of a
contaminant into the distribution system from inside a building
"regardless of how much time, money, or effort we spend protecting
public facilities." Experts also noted that since the water in the
distribution system has already been treated and is in the final stages
of being transferred to the consumer, the distribution of a chemical,
biological, or radiological agent in such a manner would be virtually
undetectable until it has affected consumers. An EPA official added,
however, that distribution systems generally carry disinfectant
residuals that can counteract the potentially harmful effects of
contaminants. This official further stated that routine monitoring
performed in drinking water systems might provide some advance warning.
While research on the fate and transport of contaminants within water
treatment plants and distribution systems is under way, according to
one expert, limited technologies are readily available that can detect
a wide range of contaminants once treated water is released through the
distribution system for public use.
Source Water:
Nearly half the experts (20 of 43) identified source water as among
drinking water systems' top vulnerabilities. Drinking water may come
from surface water, groundwater, or both. The water cycle begins with
rainwater and snowmelt that collect in lakes and rivers and that, in
many cases, interact with groundwater. Large urban water supply systems
tend to rely on surface water sources (rivers, lakes, and reservoirs),
while smaller systems tend to rely more heavily on groundwater.
One expert raised concerns about the inherent challenge in protecting
source waters, noting, "Because of the vast areas covered by watersheds
and reservoirs, it is difficult to maintain security and prevent
intentional or accidental releases of materials that could have an
adverse impact on water quality." Other experts raised additional
concerns about the vulnerability of water intake transmission lines,
which regulate the transfer of water supplies to the systems' treatment
plants.
Panel experts and others, however, have stated that concerns over
source water contamination are mitigated somewhat by a number of
factors. First, a large volume of water generally exists at the source,
which in many cases can dilute the potency of agents introduced at this
stage of the drinking water production process. Second, unlike treated
water in the distribution system, it generally takes many days before
source water reaches the consumer, making it more likely that a
contamination problem at this early stage of the drinking water
production process can be detected or treated before consumers are
affected. One utility official noted, for example, that his water
system's surface water supplies travel hundreds of miles before
reaching the treatment plant. Water that was contaminated at the source
would take between 10 days and 6 months to reach the treatment plant,
depending on the source, providing ample opportunity for detection and
adjustments to protect public health.
SCADA Systems:
To improve their efficiency and reduce operating costs, drinking water
utilities (particularly larger utilities) have come to rely
increasingly on sophisticated computer systems to manage their
facilities' key functions. These Supervisory Control and Data
Acquisition (SCADA) systems allow utility operators to monitor and
control processes throughout their systems, even at remote facilities.
SCADA systems communicate with other control facilities and provide the
necessary data to ensure that the right chemicals are mixed in the
right amounts for treatment processes, and that water pressure and flow
are at proper levels. SCADA systems may also monitor activity along
water transmission pipelines, detecting breaks or pressure loss.
While SCADA systems help utilities manage their operations, they can
create an additional opportunity for sabotage. Almost half of the
experts on our panel (19 of 43) identified SCADA and other information
systems as being among the top vulnerabilities of drinking water
systems (although only one expert ranked it as the top vulnerability).
Experts' concerns include cyber attacks on SCADA systems from a remote
location, which could, for example, release harmful amounts of water
treatment chemicals (such as chlorine) into treated water.
Treatment Chemicals:
The types and amounts of treatment chemicals applied by a drinking
water facility to its influent varies, depending on the type of source
water (for example, surface water or groundwater) as well as its
quality. Because surface water systems are exposed to direct wet-
weather runoff and to atmospheric forces, they generally require more
treatment under federal and state regulations than do groundwater
systems.[Footnote 4]
Water suppliers use a variety of treatment processes to remove
contaminants from drinking water. The most commonly used treatment
processes for surface water include filtration to remove particles such
as clays, silts, and microorganisms; flocculation and sedimentation to
consolidate small particles into larger particles that can be more
easily removed from the water; and disinfection to eliminate bacteria
and other microbiological contaminants.
Treatment chemicals are used in some of these processes. The
disinfection process is particularly noteworthy in this regard;
chlorine, chloramines, or chlorine dioxide not only are used at the
treatment plant, but also are frequently present in some form in the
pipes that distribute water to homes and businesses.
Thirteen of the 43 experts identified treatment chemicals as among the
top vulnerabilities of drinking water systems, second only to the
distribution system. Experts commented that it was inherently dangerous
to use and store large cylinders of gaseous chlorine, noting that the
destruction of these storage containers could release toxic chlorine
gas in densely populated areas. Some of these experts noted, however,
that this risk is being alleviated as utilities increasingly use the
more stable liquid form of chlorine instead of the more vulnerable
large compressed-gas chlorine canisters that have traditionally been
used. In addition to the risks of chemical sabotage at the treatment
facility, one expert cited the risk of using tainted treatment
chemicals at the facility. According to another expert, "If these
treatment chemicals have been purposely contaminated . . . prior to
delivery, every precautionary measure taken by the water system has
been bypassed.":
Overarching Issues Affecting Drinking Water Systems' Security:
In addition to the vulnerabilities associated with specific water
system components, experts identified several overarching issues that
compromise the integrity of physical assets and the drinking water
system in its entirety. Chief among these issues are (1) the lack of
redundancy among vital systems, and (2) the difficulty many operators
face due to a lack of information on the most serious threats to which
their systems might be exposed.
Lack of Redundancy among Vital Systems:
Drinking water systems are generally "linear" in nature in that they
have single transmission lines leading into the treatment facility,
single pumping stations along the system, and a single computer
operating system. Furthermore, drinking water systems may rely on
outside sources of power and communications, and depend on the
transportation sector for the delivery of supplies, often from a
limited number of suppliers. If any of these external sources were
impaired or destroyed, the entire system could be compromised. Under
these circumstances, any "single point of failure" could render a
system inoperable unless there are redundant systems in place.
Several experts reflected concerns relating to a single point of
failure as a vulnerability. For example, according to one expert, the
destruction of a single physical component of the system, such as a
single water transmission line into the treatment facility, could
render the entire system inoperable. Moreover, she noted, a system that
depends on pumps can be completely put out of service if its electrical
supply were interrupted. Echoing this point, another expert commented,
"Experience with Y2K planning efforts revealed one of the critical
interdependencies nearly all water utilities have is with the
electrical power supply system. Disruption of power supply could have
significant impacts on source, treatment and distribution
systems."[Footnote 5]
According to one expert, efforts are needed to add redundancy to
drinking water systems and to mitigate systems' near-total reliance on
power suppliers, communications systems, and the transportation sector.
However, such efforts to duplicate major system components would be
expensive and could conflict with the systems' goals of controlling
rate increases. To address the problem, some experts advocated the
creation of utility consortia, such as the Bay Area Security
Information Collaborative (BASIC) and the Mutual Aid Disaster
Intervention Response Teams (MADIRT), through which regional utilities
share resources in the event of a disaster.
Insufficient Information to Understand the Most Significant Threats:
A number of experts commented that it is impossible to accurately
identify a utility's most significant vulnerabilities unless the
utility has reliable intelligence regarding its most significant
threats. Threats include the type of adversary (a casual vandal, an
anonymous hacker, a disgruntled employee, or a dedicated terrorist) as
well as the mode of attack (physical, psychological, chemical,
biological, or radiological). According to the American Water Works
Association, a utility's assessment of its most credible threats should
be based on knowledge of the threat profile in its specific area,
including such information as past events, that could shed light on
future risks. These assessments often require information from outside
sources, such as local law enforcement officials.
Many experts on our panel noted, however, that such information has not
been easy for utilities to obtain. The following examples illustrate
some of the difficulties utilities have regarding threats:
* According to one expert, "The utility community has very little
specific and useful information on the threat posed to this industry.
This represents a real vulnerability since it makes it harder to judge
where resources might do the most good." Furthermore, "an ongoing
working relationship with groups (mostly federal) that do this type of
analysis could prove extremely valuable in determining how to allocate
the limited resources available.":
* Utilities may be preoccupied with unsubstantiated threats, according
to another expert. She noted, "There are many very vulnerable areas,
but the terrorists may not be technically able to target them, or they
may not be interested.":
* Another expert stated that utilities need to better understand "how
the threats may . . . exploit utility operations and infrastructure,"
through such things as simulation exercises.
* One expert suggested that the intelligence community provide better
threat information and share it with the water sector through the Water
ISAC.
Since the consequences associated with various potential threats are
markedly different, EPA guidance suggests that the threats be analyzed
in the system's vulnerability assessments.[Footnote 6] Some
vulnerability assessment methodologies refer to the threats selected
for consideration as a Design Basis Threat. Because there is no single
Design Basis Threat[Footnote 7] for all water systems in the United
States, water systems often have a difficult time identifying their
unique threat profile. As a result, EPA developed a Baseline Threat
Information document for systems serving populations greater than 3,300
to help assess the most likely threats to their systems.
[End of section]
Chapter 3: Experts' Views on the Allocation and Distribution of Federal
Funds:
Many drinking water utilities have been financing at least some of
their security upgrades by passing along the costs to their customers
through rate increases. Given the cost of these upgrades, however, the
utility industry is also asking that the taxpayer shoulder some of the
burden through the congressional appropriations process. Should
Congress and the Administration agree to this request, they will need
to address key issues concerning who should receive the funds and how
they should be distributed. With this in mind, we asked our panel of
experts to focus on several key questions: (1) To what extent should
utilities' vulnerability and risk assessment information be considered
in making allocation decisions? (2) What types of utilities should
receive funding priority? and (3) What are the most effective
mechanisms for directing these funds to recipients? Overall, we found a
high degree of consensus on the following:
* Vulnerability assessment information should have a substantial
bearing on which utilities receive priority for federal funds to
improve security. Several factors, however, complicate the government's
ability to use a primary source of this information--the vulnerability
assessments (VA) required of utilities under the Bioterrorism Act. The
major complication is the law's prohibition against disclosing
information derived from these assessments submitted to EPA.
* Almost all of the experts gave utilities serving high-density
populations a high or highest funding priority. Utilities serving
critical assets (such as military bases and other sensitive government
facilities, national icons, and key cultural or academic institutions)
were also recommended as high-priority recipients, while relatively few
experts recommended a high or highest priority for utilities serving
rural or isolated populations.
* Direct federal grants are the most favored funding mechanism, with
many experts indicating that such grants should include a requirement
for matching funds from the recipient. Relatively fewer experts
recommended the use of the Drinking Water State Revolving Fund,
particularly for upgrades to be implemented in the near term.
Strong Agreement That Allocation Decisions Should Consider a Utility's
Vulnerability Assessment:
As noted in chapter 1, the Bioterrorism Act requires that vulnerability
assessments be prepared by all community water systems serving more
than 3,300 individuals. EPA guidance on preparing these assessments
states that the assessments should (1) characterize the water system,
including its mission and objectives; (2) identify and rank the
possible consequences of malevolent acts; (3) determine the critical
assets subject to malevolent acts; (4) assess the threat of malevolent
acts; (5) evaluate existing countermeasures; and (6) analyze risk and
develop a plan for reducing risk and addressing critical priorities
first.
In considering whether it is appropriate to use vulnerability and risk
assessment information when making federal funding decisions, about 90
percent of the experts on our panel (39 of 43) strongly agreed or
somewhat agreed that funds should be allocated on the basis of VA
information. Some experts cited the vulnerability assessments required
by the Bioterrorism Act as the best available information about the
current condition of our security infrastructure for drinking water
(see fig. 5).
Figure 5: Experts' Views on Whether Federal Funds Should Be Allocated
Based on Vulnerability Assessment Information:
[See PDF for image]
[End of figure]
It may not be a straightforward matter, however, to use this
information in making such decisions. Several experts pointed to a
number of complicating factors. One pointed out that "vulnerability
assessment (VA) tools were not set up for the purpose of identifying
and prioritizing capital improvement needs for EPA or other federal
agencies." He added, "Using the VAs would require a high degree of
interpretation and judgment on someone's part . . ., using a tool that
was not designed to clearly delineate capital construction needs."
Another expert noted similarly that "since there is no written guidance
for threat analysis, there will have to be some method to rank relative
threats among different areas." In addition, one expert pointed out an
inherent dilemma affecting any effort to prioritize
funding decisions based on the greatest risk--whatever does not receive
attention becomes the best target.[Footnote 8]
In addition, a provision of the Bioterrorism Act precludes disclosing
all information "derived" from the vulnerability assessments submitted
to EPA. The provision's intent was to protect sensitive information
about utilities' vulnerabilities from falling into the hands of
individuals who seek to harm the utility. The act therefore specifies
that only individuals designated by the EPA Administrator may have
access to the copies of the VA and information contained in or derived
from it. It further specifies that the information must remain
protected at all times.
Thus, while some EPA officials may have access to the information, the
requirement limits how the agency may use that information. EPA would
have difficulty, for example, in citing vulnerability assessment
findings to support decisions or recommendations on allocating
security-related funds among utilities, as well as decisions concerning
research priorities or guidance documents.
To compensate somewhat for these limitations, the American Water Works
Association Research Foundation has initiated a project in which
consultants and trainers, who have conducted multiple assessments, are
seeking to identify lessons learned from the vulnerability assessments
done to date. According to EPA's draft Water Security Research and
Technical Support Implementation Plan, this project is designed to
obtain a more accurate picture of the major vulnerabilities that are
generally facing the nation's drinking water systems and to share that
understanding with interested parties.[Footnote 9] EPA and the Research
Foundation plan to use the results of this project to identify high
priority needs and concerns that could likely be best addressed by EPA,
the research community, or both. This project is scheduled for
completion in mid-2004.
Key Criteria to Help Determine Which Utilities Should Receive Funding
Priority:
The experts identified several characteristics of utilities that should
be used to set funding priorities. The most frequently identified were
utilities (1) serving high-density populations; (2) serving sensitive
or critical assets, such as military bases, academic institutions or
icons of American culture; (3) in proximity to population centers
(whether they serve these population centers or serve outlying areas);
and (4) serving rural or isolated populations, such as small systems
with less sophisticated water systems (see fig. 6).
Figure 6: Experts' Views on Which Types of Water Utilities Should
Receive Priority for Federal Funds:
[See PDF for image]
[End of figure]
Utilities Serving High-Density Populations. Approximately 93 percent of
the experts (40 of 43) gave high or highest priority to funding
utilities serving high-density populations. As one expert commented,
directing limited resources to protect the greatest number of people is
a common strategy when setting priorities. Most experts shared this
view, including one who noted the "population served would probably
lead to economies of scale--you can protect the most people by spending
monies at the large systems." This expert and others, however, though
supportive of funding priority for utilities serving high-density
populations, cautioned that while targeting high-density populations
may be the most equitable to the entire country, it might not allocate
enough to small systems.
Utilities Serving Sensitive or Critical Assets. Seventy-seven percent
of the experts (33 of 43) indicated that utilities serving sensitive or
critical assets should receive a high or highest priority for federal
funding. Experts identified such utilities as those servicing national
icons that represent the American image, those serving military bases,
or those serving sensitive government, academic and cultural
institutions. In addition, according to one expert, utilities in areas
typically receiving extensive media coverage, or that serve venues
where large groups gather, may be of interest to terrorists.
Utilities in Proximity to Population Centers. Twenty-eight percent of
the experts (12 of 43) cited the proximity of a given utility to a
major population center as at least a high funding priority. While most
utilities close to population centers would be expected to serve the
population center in which they are located (hence, this third
criterion would overlap with the first criterion above--utilities
serving high-density populations), some experts pointed out that this
is not always the case. Exceptions cited include suburban utilities
that may serve communities or their major metropolitan areas. Several
particularly noted that the risks associated with an airborne release
of chlorine gas elevated their funding priority for this criterion.
Utilities Serving Rural or Isolated Populations. About 5 percent of the
experts (2 of 43) identified utilities serving rural or isolated
populations as at least a high priority for federal funding. Generally,
these panelists commented that such facilities are least able to afford
security enhancements, and therefore most need federal support. One
expert, for example, stated that in light of their financial
constraints, "smaller utilities do the cheapest thing possible, which
means you do a quick checklist and then forget about it." He added that
because these smaller systems do not have enough staff to do a
comprehensive assessment, they need funding to either hire additional
staff or to contract for outside expertise.
Importantly, the relatively small percentage of experts supporting
funding for rural utilities may not fully reflect the concern many
panel experts have for the safety of these utilities. For example,
several who supported higher priority for utilities serving high-
density populations cautioned that, while problems at a large utility
will put more people at risk, utilities serving small population areas
may be more vulnerable because of weaker treatment capabilities, fewer
highly trained operators, and more limited resources. Another expert
added that most waterborne disease outbreaks have occurred in the
systems of smaller utilities.
Funding Mechanisms Recommended for Distributing Federal Funds:
We also asked the expert panel to comment on how federal funds should
be distributed to recipients. Nearly 90 percent said that direct
federal grants to utilities would be a somewhat or very effective means
of distributing funds to support security improvements. The experts
also showed strong support for grants in which some type of match is
required of recipients. Figure 7 shows their views on these and other
funding mechanisms.
Figure 7: Recommended Approaches for Distributing Federal Funds:
[See PDF for image]
[End of figure]
Direct Federal Grants:
Eighty-six percent of the experts (37 of 43) indicated that direct
federal grants to the utility would be somewhat or very effective in
allocating federal funds. Federal grants typically provide funding for
fixed or known periods for specific projects and often have associated
terms and conditions. One expert cited EPA's recent efforts to quickly
distribute security-related grant funds to systems serving over 100,000
people (mentioned earlier in this chapter), noting, "By far the most
successful funding program I have seen to date was the large water
system Vulnerability Assessment Grant program directed through the
EPA."[Footnote 10]
Many experts commented that direct grants could be particularly useful
in quickly addressing lower-cost and more obvious fixes, such as adding
gates and security cameras. Two others said that with some of these
shorter-term items addressed, it may then be appropriate to deal with
more complex issues that require longer-term fixes, such as new
buildings and security-oriented building design. Another expert added
that the use of direct EPA grants could help ensure proper use of the
funds, noting, "Direct EPA grants to water systems should be made
available and should carry a requirement to use Sandia-like
methodologies and concepts," and that "the use of [these tools] will
lead water systems to develop cost-effective risk reduction through
effective physical systems, better policies, procedures and training
and through creative consequence mitigation.":
Matching Grants:
Many favoring direct grants were among those who said that a matching
requirement for such a grant would be desirable for distributing future
federal funds. Specifically, 74 percent of the experts (32 of 43) said
that federal grants with a matching requirement would be somewhat or
very effective in distributing federal funds. One expert pointed out
that such a requirement would effectively leverage limited federal
dollars. Another agreed, noting that such a cost-sharing approach would
offer "a big incentive" in getting utilities to devote their own funds
to enhance their security. The expert cautioned, however, that the
required match would have to be low enough to make the grant
attractive, suggesting a maximum of 50 percent.
Another suggested a strategy to get the most out of a matching grant
program. One, for example, said that participating utilities should be
provided with some initial matching funds to get started, and that
additional funds would then be contingent upon how effective or
creative they were in using the first round of funding.
Funds Distributed by an Independent Agency:
Sixty-five percent of the experts (28 of 43) indicated that it would be
somewhat or very effective to have federal funds distributed through an
independent agency. Experts generally characterized an independent
agency as, among other things, being independent of regulatory decision
making, and not bound by traditional points of view.
Several experts elaborated on the desirability of such an independent
entity to allocate security-related funds. One expert, for example,
favored moving the responsibility for allocating funds to a
disinterested third party--one with no infrastructure to support or
hidden agenda but instead with strong decision analysis and consensus
building expertise. Another expert suggested that federal funding be
"leveraged with industry funding through an organization like [the
American Water Works Association Research Foundation.]" The expert
further stated that the use of an organization like the Research
Foundation is important because it has a demonstrably effective two-way
communication with the end users, namely the U.S. water utility
industries; the Research Foundation can adequately represent the needs
of industry to the research community as well as inform the industry of
important national-level research findings that will influence their
day-to-day operations. He indicated that communication between the
water utilities and such an independent agency would be superior to
communication between the utilities and EPA, noting, "Although [EPA] is
legitimately engaged in research, [it] is also perceived as an agency
with regulatory authority and is thus viewed somewhat circumspectly by
industry as a whole.":
Drinking Water State Revolving Fund:
About 51 percent of the experts (22 of 43) indicated that the Drinking
Water State Revolving Fund (DWSRF) would be somewhat or very effective
in distributing federal funds. The DWSRF program provides federal grant
funds to states, which in turn allow the states to help public water
systems in their efforts to protect public health and ensure their
compliance with the Safe Drinking Water Act. States may use DWSRF funds
to provide loans to public water systems, and may reserve a portion of
their grants to finance other projects that protect sources of drinking
water and enhance the technical, financial, and managerial capacity of
public water systems. In particular, under EPA's November 2001
guidance, states may use DWSRF assistance to help systems complete both
vulnerability assessments, and contingency and emergency response
plans.[Footnote 11] Many types of security-related infrastructure
improvements to ensure security are also eligible for DWSRF funding, as
specified in the EPA guidance.
According to one expert who favored existing grant and loan programs
like the DWSRF for enhancing security, continuing to support the
training and assistance efforts of lead state agencies "is the most
beneficial activity the federal government could play to encourage
water utilities across the country to address security related issues
in a comprehensive and cost-effective manner." Another shared this
view, explaining that states are well-positioned to help manage the
process, and that they "must approve system upgrades anyway." This
expert also suggested that by using the state-administered DWSRF,
"states could track this information and report it on a regular basis
to EPA and Congress," thereby documenting what has been accomplished
and what still needs to be done.
One expert cautioned, however, that the DWSRF would be effective only
if a process were established that separated funding for security-
related needs from other infrastructure needs. Reflecting the concern
expressed by many others about the timeliness of distributing funds
through the DWSRF, this individual commented that the current DWSRF
process is too bureaucratic and requires too many hurdles for it to be
an expeditious means for providing funds.
Tax-Based Incentives:
About 28 percent of the experts (12 of 43) reported that tax-based
incentives would be somewhat effective in encouraging water utilities-
-specifically privately owned utilities--to invest in security
improvements. The inducements offered in these programs may include tax
credits, property tax exemptions or abatements, and sales and use tax
exemptions.
According to one expert, tax incentives could increase the efficiency
of dollars spent on water security, generating new ideas and
approaches. Furthermore, by offering additional funds for creative and
cost-effective solutions, these ideas could become best practices and
shared with others. Finally, he commented, "If allocations were phased
and secondary funds were based upon how well the first funds were
spent, there would be incentive to spend the first funds wisely."
Another expert suggested that the provision of financial or other tax
incentives to utilities should be contingent upon evidence that they
have improved their security as defined by a standard set of
measurements.
[End of section]
Chapter 4: Activities Experts Identified As Most Deserving of Federal
Support:
When experts were asked to identify and rate the specific security-
enhancing activities most deserving of federal support, the activities
experts most frequently identified fell into three broad categories:
* Physical and technological improvements. These improvements include
altering drinking water systems to improve physical security, and
conducting research and development on technologies to prevent, detect,
or respond to an attack. Experts most strongly supported near real-time
monitoring technologies, which they considered particularly useful in
quickly detecting contaminants in water that has left the treatment
plant for consumers.
* Education and training. This category includes, among other things,
supporting simulation exercises to provide responders with experience
in carrying out utilities' emergency response plans; specialized
training of utility personnel charged with security and general
training to improve the security awareness of their staffs; and
multidisciplinary teams that can provide independent analysis of
utilities' security preparedness and recommend security-related
improvements.
* Strengthening working relationships between utilities and other
public agencies. This category includes strengthening relationships
between water utilities and other entities that may have key roles in
an emergency response (such as public health agencies, enforcement
agencies, and neighboring utilities). It also includes developing
common protocols to engender a consistent approach among utilities in
detecting and properly diagnosing threats, and testing local emergency
response systems to ensure that participating agencies coordinate their
actions effectively.
We found that EPA has a number of initiatives that address many of
these activities, some of which are required by the Bioterrorism Act.
In most cases, however, the activities are in the planning stages, are
limited in scope, or are dependent on the availability of future
appropriations.
Activities to Enhance Physical Security and Support Technological
Improvements:
Our panel of experts most frequently recommended nine types of
activities to improve physical security and support technological
improvements, as figure 8 shows. Of the nine types, the development and
implementation of near real-time monitoring technologies was rated by
far the most important activity warranting federal support, with many
experts stating that this critical activity would probably not be
implemented by many utilities without some degree of federal support.
Figure 8: Activities Identified by Expert Panel to Enhance Physical
Security and Support Technological Improvements:
[See PDF for image]
[End of figure]
Developing Near Real-Time Monitoring Technologies Viewed As Highest
Priority:
Approximately 93 percent of the panel experts (40 of 43) rated the
expansion of research and development of near real-time monitoring
technologies as having at least a high priority. These technologies
were cited as critical to helping drinking water systems detect and
respond quickly to threats or actual contamination events, to minimize
the impact of any contamination by facilitating a quick response, and
to help in restoring systems after an event. Significantly, almost 70
percent of the experts (30 of 43) rated this activity as warranting the
highest priority for federal funding--far surpassing the rating of any
other category. Most of these experts indicated that smaller utilities
would be unable to use these technologies without federal support.
A wide variety of monitoring technologies can be used in drinking water
systems and, depending on their specific functions, may be deployed at
locations upstream from, within, or downstream from drinking water
treatment plants. Conventional monitors typically measure things such
as pH (acidity and alkalinity), turbidity, conductivity, temperature,
organic compounds and other contaminants. Biomonitors employ living
organisms, such as fish or algae, to provide information on other water
constituents that may impair human health or the environment.
Emerging monitoring technologies are capable of providing near real-
time results for a wider array of potentially harmful water
constituents. According to some experts, near real-time monitors may be
strategically placed at points within the distribution system, where
they may be able to quickly detect potentially dangerous backflows that
may enter the system. They may also be used to augment a system's
conventional monitoring system. As some experts suggested, for example,
pressure sensor systems and biodetector networks could benefit the
utility in its security preparedness as well as its regular operations
by describing breaches or leaks in water mains, or by observing
microbial contamination in a nonterrorist event. Some monitors based on
emerging technologies capable of providing near real-time results may
also be placed at the "point of service," where they can alert the
consumer or utility about the potential for contaminated water entering
a home or business.
These views are substantiated by a 2002 report by the National
Academies of Science, which also highlighted the need for improved
monitoring technologies as one of the four highest-priority areas for
drinking water research and development. The report noted that such
technologies differ significantly from those currently used for
conventional water quality monitoring, stating further that sensors are
needed for "better, cheaper, and faster sensing of chemical or
biological contaminants."[Footnote 12]
The need for near real-time monitoring technologies was also recognized
in the Bioterrorism Act, which directed EPA to review analytical
methodologies and detection techniques that can quickly and accurately
provide information on contaminants.[Footnote 13] As an initial step in
meeting this requirement, the agency is reviewing such early warning
systems, including those designed to monitor levels of chemical,
biological, and radiological contaminants or indicators of
contaminants.
EPA is also planning to launch a number of projects through its Office
of Water and Office of Research and Development. For example, one
project, planned for November 2003 through May 2004, would entail a
detailed examination of commercially available real-time monitors.
According to EPA, the information derived from this project would be
placed in a compendium for manufacturers and vendors of monitoring
technology, allowing them to better focus technology development
efforts.[Footnote 14] Another project aims to evaluate how well many
currently used water monitoring technologies would deal with the
introduction of various contaminants.[Footnote 15] Among other efforts,
EPA also hopes to begin a project in November 2003 to test and evaluate
the applicability of other industries' monitoring technologies to the
security-related monitoring needs of drinking water systems. EPA's
preliminary cost estimates for monitoring-related projects are about $5
million, and their initiation or completion will depend on the
availability of fiscal year 2004 and 2005 funds.
Increasing Laboratories' Capacity to Deal with Terrorist Attacks:
Over two-thirds of the experts (29 of 43) rated increasing laboratory
capacity as a high or highest priority for federal funding. Many
experts on our panel commented that laboratories are being challenged
just to keep up with their normal responsibilities to collect, test,
and analyze large volumes of water samples for water utilities and
other clients. Consequently, they expressed reservations about the
ability of laboratories to handle these responsibilities in the event
of "surge" events caused by the chemical, biological, or radiological
contamination of water supplies.
As one expert explained, few laboratories can test for a full range of
contaminants, and these limitations would be amplified if the
laboratories had to respond to a terror-related emergency. Another
expert believed that in the event of an emergency, many utilities would
be confused about which labs to use for testing samples of suspect
water, and that a network of labs needs to be established so that quick
results of tests could be obtained. The National Academies of Science
report raised similar concerns, adding that legal concerns over the
accuracy of laboratories' tests may make them reluctant to participate
in testing under such severe conditions. The report concludes that a
"dearth of laboratory capacity poses a serious limitation to our
ability to respond to a contamination attack on the water
system."[Footnote 16]
One panelist suggested that state health departments need additional
federal funds to better develop the regional capacity to sample water,
and to improve analytical techniques used to detect contaminants. He
further noted that state laboratories can and would serve as a
component of an emergency response team, and that it would be effective
for state laboratory programs to integrate these new or increased
responsibilities with their existing responsibilities under grants from
the Centers for Disease Control and Prevention.[Footnote 17]
EPA is actively supporting research in order to improve laboratory
capacity nationwide, and has identified a series of ongoing and future
projects toward that end. One project, which was due for completion in
September 2003, would result in a water-specific compendium of
laboratories that may be able to assist water utilities if
contamination occurs. A related project would assess existing
laboratory capacity to analyze drinking water samples in emergency
situations. Another project, initiated in June 2003, is intended to
analyze resource limitations at laboratories, such as personnel,
equipment, training, and methods, and to provide recommendations to
address these limitations.
According to EPA water officials, the agency may spend approximately
$2.4 million starting in fiscal year 2003 to carry out these and other
projects to assess and address the capacity of the nation's
laboratories to deal with emergency situations. However, the experts'
views on this matter suggest that given the magnitude of this long-
standing problem--even under normal circumstances--it will be difficult
enough to accurately characterize the challenge of laboratory analysis
during a drinking water emergency, much less address the problem
effectively.
"Hardening" Assets and Completing Other Physical Improvements:
Over two-thirds of the experts (29 of 43) rated activities that would
improve (or "harden") the basic physical security of drinking water
systems as warranting either a high or highest priority for federal
funding. These activities include, among others, adding or repairing
fences, locks, lighting systems, and cameras and other surveillance
equipment. The National Academies of Science report reached similar
conclusions about the need to harden certain facilities. It describes
how many parts of the drinking water infrastructure remain highly
accessible, and notes that access controls need to be improved. The
report further noted that improved technologies are needed to protect
against explosives delivered by motor vehicle or rail.[Footnote 18]
However, the experts' support for hardening activities came with some
notable caveats. For example, one expert said that many utility
operators are reluctant to invest in physical upgrades because of
fiscal shortfalls and other competing Safe Drinking Water Act
requirements, despite the potential for such upgrades to be relatively
cheap (many costing less than $5,000 per system). According to this
expert, if "an effective and adequate grant program could be developed
and managed," small amounts of funding could address the problems of
many small drinking water systems.
Some experts also cited the limitations inherent in efforts to
comprehensively harden the physical drinking water facility. For
example, unlike nuclear power or chemical plants, drinking water system
assets are not concentrated in a geographically secure area that can be
hardened against all types of contamination or attack. Rather, they are
spread over large geographic areas, particularly the source water and
distribution systems. Thus, these panelists noted, while some degree of
physical security enhancement at drinking water facilities is
appropriate, efforts to construct physical barriers to comprehensively
thwart attacks would be of limited effectiveness. Several said that
efforts might be better directed at intruder detection, or adding
security guards or electronic equipment.
The American Water Works Association Research Foundation is designing a
project that will collect information on vulnerabilities, threats,
potential security improvements, and innovative solutions to certain
physical vulnerabilities. This project began in June 2003 and is
scheduled for completion in July 2004. EPA also noted that utilities
may be eligible to use a portion of the Drinking Water State Revolving
Fund for this purpose.[Footnote 19]
Establishing Engineering Building Standards:
Approximately 49 percent of the experts (21 of 43) rated the
establishment of engineering and building standards for drinking water
systems, which integrate security concepts into building design, as
having either a high or highest priority for federal funding. Some
noted that improved standards could yield multiple benefits by
improving upon the design and functionality of a drinking water system
while augmenting security to guard against attack.
Others wrote that new drinking water systems, which are being
constructed and designed regularly, provide opportunities for
incorporating security measures. One expert noted specifically that new
design measures "may include increased physical security, elimination
of 'single points of failure,' the inclusion of redundancy into the
overall design," or the creation of multiple pathways from source to
tap. Another noted that the development and implementation of new or
upgraded systems with better layouts can reduce unauthorized access,
improve detection, and assist in isolating problems at the water
facility.
According to another expert, standardization is needed across local
jurisdictions so that neighboring providers may assist one another in a
crisis. This view was echoed in the National Academies of Science
report, which concluded that the lack of standardization impedes the
introduction of new processes and technology."[Footnote 20]
According to the EPA Action Plan, the agency is also considering the
development of information on building standards that could enhance
security of drinking water facilities, while improving operations and
better protecting water quality. The plan noted that such standards
would be modeled after those developed by the Department of Defense,
which found that "dual use" aspects of improved design features are
desirable because many security enhancements are not cost effective
without some form of multiple benefit.[Footnote 21] Specifically, the
proposed EPA plan includes working with standards-setting organizations
to develop voluntary design standards and recommendations for new
construction, reconstruction, and retrofitting of drinking water
facilities with a focus on integrating security with ongoing
operations.
Requiring Backflow Protections in Water Distribution Systems:
Inappropriate use of piping systems, whether intended or not, could
result in a backflow of contaminated water into distribution systems,
where it could then find its way to other consumers. Backflow
protection devices are one way to potentially mitigate this threat when
installed either at access points to buildings or homes, or at cross
connections in the distribution system.
Approximately 47 percent of the experts in our study (20 of 43) said
research and implementation of such backflow protection warranted a
high or highest priority for federal funding. These backflow protection
devices could be coupled closely with monitoring and metering
technologies that can sense contaminant concentrations in drinking
water systems. Another noted further that automated meter reading is
already being used, but the ability to get real-time readings is
essential in order to rapidly notify technicians or officials if a
backflow is detected. This could help reduce or eliminate threats to
the distribution system.[Footnote 22]
Testing and Further Protecting SCADA and Cyber Systems:
Section 402 of the Bioterrorism Act requires a review of "methods and
means by which information systems, including process controls and
Supervisory Control and Data Acquisition (SCADA) and cyber systems at
community water systems, could be disrupted by terrorists or other
groups." Slightly more than one-third (15 of 43) of the experts on our
panel rated federal funding to test and further protect SCADA systems
as warranting a high or highest priority. Information provided at the
2003 American Water Works Association (AWWA) Water Security Congress
highlighted the limited security features inherent in many SCADA
systems, citing few security protocols, lack of firewalls, and SCADA
data being routed outside of a facility. Other SCADA systems are placed
in networks that are accessible through the Internet and, therefore,
are exposed to additional vulnerabilities. One expert added that
because the majority of the SCADA software is created outside the
United States, the expert favored establishing and enforcing security
standards for the software, as well as testing the software before
installation at water utilities. This expert believed that federal
activities should include working with vendors of SCADA systems and
related software in order to ensure that security concerns are
appropriately incorporated into the design of these systems.
According to EPA, to meet its responsibilities under the Bioterrorism
Act, the agency is planning to pursue research in a number of areas to
reduce the risks of attacks on drinking water SCADA systems and to
better understand their potential consequences, starting with an
identification of the possible threats posed to such systems. Starting
in fiscal year 2004, EPA also intends to (1) develop models that can
simulate the consequences of physical and cyber attacks, emphasizing
the distribution system and eventually cascading or interrelated
consequences; (2) assess the consequences of a loss of pressurized
water on other critical infrastructure sectors such as power,
transportation, chemical supplies, and communications; (3) compile
technical information and informational tools that can help in
analyzing the consequences of potential physical and cyber threats; and
(4) establish minimum security standards for the protection of SCADA
systems.
Developing Computer Models of Terrorist Events in Water Systems:
Computer modeling can be an important tool in understanding how to
prevent or mitigate contamination episodes. Specifically, modeling can
be used to simulate contamination events, which in turn can enhance the
development of emergency response plans, help select critical locations
in distribution systems for positioning and placing monitoring devices,
and guide the actions of first responders.
About 30 percent of the experts (13 of 43) rated the development of
computer models of terrorist events as deserving a high or highest
priority for federal funding. A number of experts noted the relevance
of this work for understanding the characteristics of distribution
systems. One expert, for example, advocated a "model-based distribution
system flow simulator that can be easily tailored to a specific water
system such that 'what-if' contamination scenarios can be posed to the
system through simulation in order to explore weaknesses in the
system." The expert further stated that such a modeling system would
also have to take into account the fate and transport of the candidate
contaminants throughout the system, and that the approach "would be a
fusion of information from both threat assessment and system modeling
research efforts.":
According to EPA officials, the agency is evaluating distribution
system and source water hydraulic models, such as EPANET, PipelineNet,
and Riverspill, that can be used to follow water movements and tracer
chemicals through distribution systems. EPA notes that several large
utilities are currently using such models, but that medium and small
utilities face challenges in applying them to their systems. EPA was
also planning to initiate a project in September 2003 that will attempt
to improve these models by incorporating health-related data, data
concerning consumer complaints, Geographic Information System data, and
information from SCADA systems. Overall, EPA's preliminary cost
estimates are $2.8 million for modeling projects to develop more
effective protection of distribution systems.
Establishing Baseline Values for Water Constituents:
About 23 percent of the experts (10 of 43) rated the importance of
establishing baseline values (e.g., concentrations of certain chemicals
typically found in a drinking water system) for drinking water system
constituents as a high or highest priority warranting federal support.
One expert noted that developing and understanding the basic
characteristics and typical monitoring results of a distribution system
are essential to understand if and when a drinking water system is
subject to contamination. According to other experts, because
distribution systems may be the most vulnerable portion of a system,
and the most complex in terms of understanding appropriate response
actions, baseline data available from pre-emergency studies could be
helpful.
In addition to providing utility operators with information on normal
operating conditions within their systems, understanding baseline
levels of water constituents is often needed to develop certain
monitoring technologies. For example, monitoring devices that measure
the light given off during certain organic reactions can be indicative
of possible water contaminants, but only if baseline luminescence
levels are known and can be incorporated into measurements and
calibrations.
In March 2004, EPA plans to launch a project to survey available
information on background levels of certain contaminants of concern
that are known or suspected to occur in source or treated drinking
water. The initiation of this project depends on the progress of
another planned project to develop an improved understanding of the
biological, physical, chemical, and toxicological properties of
contaminants.
Improving Treatment Technologies:
About 23 percent of the experts (10 of 43) rated the improvement of
technologies that can better treat the kind of chemical or biological
agents likely to be used in attacking a drinking water system as
warranting a high or highest priority for federal funding. While water
treatment technologies have advanced, as indicated in EPA's research
and implementation action plans, treatment capabilities still need to
be evaluated and improved for a wide array of microbial and other
contaminants. One expert noted that research on membranes (filters that
can remove small particulates or microorganisms) and other advanced
treatment techniques is producing promising results, and that further
progress in this area may be important in making "water an unattractive
target."[Footnote 23] Specifically, treatment technologies needing
further development include ultraviolet systems and improved reverse
osmosis techniques. Finally, other experts believed that there should
be more research and development of point-of-use treatment devices
(possibly installed at the meter), and that a distributed treatment
process--one that involves the treatment of water at multiple locations
within a drinking water system or uses a variety of methods--would
provide additional security against contamination.
According to EPA officials, the agency hopes to initiate a series of
projects to address drinking water treatment issues. Among these are
efforts to (1) identify alternative treatment options by reviewing
literature on contaminants most likely to be used in attacking drinking
water systems; (2) prepare systematic methods to evaluate treatment
technologies for likely contaminants; (3) perform bench-scale studies
(those performed in a laboratory under controlled conditions) to
determine the effectiveness of typical disinfection and contaminant
removal technologies; (4) identify alternative treatment options at the
point of use or point of entry; and (5) develop guidance for
discharging contaminated water that had been used to clean contaminated
substances or equipment.
Activities to Improve Education and Training:
Experts strongly supported improved training and education to help
ensure that utility personnel can detect and respond to malevolent acts
affecting their facilities. As shown in figure 9, the education and
training activities most frequently recommended for federal support
generally fell into four categories: (1) specialized training of
utility personnel with security-related responsibilities, (2) support
for regional simulation exercises to test emergency response plans, (3)
general security awareness training for utility personnel not
specifically charged with security-related responsibilities, and (4)
use of multidisciplinary consulting teams ("Red Teams") to
independently evaluate drinking water utilities and their security
concerns.
Figure 9: Activities Identified by Experts to Improve Education and
Training:
[See PDF for image]
[End of figure]
Required Training of Key Utility Personnel:
Many experts underscored the importance of training drinking water
personnel with security-related responsibilities in techniques to
prevent, detect, and, if necessary, respond to an attack on their
system. This training would include, for example, training for
laboratory technicians who test for potential contaminants; for utility
operators who perform day-to-day duties or who are uniquely positioned
to monitor and respond to potential contaminants at a treatment
facility; and for mechanical, civil, and environmental engineers who
design, repair, and maintain drinking water systems.
Overall, over 90 percent of the experts (39 of 43) indicated that
required training for security-related personnel warrants at least a
high priority for federal funding, with approximately 56 percent (24 of
43) indicating that it deserved highest priority. One expert said that
there should be mandatory federal training for employees at drinking
water systems serving 10,000 people or more.
To date, EPA has launched at least three programs that emphasize
technical training, one directed to states and another to utility
employees and officials. Through one program, beginning in fiscal year
2002, EPA has made grants available to states and territories that, in
part, are intended to support security-related training and
education.[Footnote 24] Also, EPA has developed two train-the-trainer
programs. One of these, begun in fiscal year 2003 to provide assistance
to drinking water systems serving fewer than 50,000 people, awarded
$1.5 million in grants to five nonprofit training and technical
assistance organizations.[Footnote 25] Another program makes available
"no cost" security training for drinking water systems that serve
populations of 50,000 to 100,000.[Footnote 26] This program, which also
provides assistance to develop vulnerability assessments and emergency
response plans, includes provisions for follow-up technical assistance
and training.
Regional Simulation Exercises to Test Emergency Response Plans:
Regional simulation exercises to test emergency response plans are
intended to provide utility and other personnel with the training and
experience needed both to perform their individual roles in an
emergency and to coordinate these roles with other responders within
and outside the utility. A successful emergency response plan can help
these staff members more quickly identify and respond to an emergency
and more quickly restore services and public confidence.
The experts on our panel underscored the importance of conducting such
exercises, with more than 88 percent (38 of 43) rating these exercises
as warranting a high or highest priority for federal funding. Exercises
not only give individuals invaluable practice, but also allow officials
to better determine what kind of coordinated response is best for a
given adverse event. Other experts described the need to identify
responsible agencies that will make difficult decisions during an
emergency, such as whether to restrict use of the drinking water
supplies. And if water supplies were disrupted, subsequent issues would
also need to be anticipated, such as how to fight fires, mobilize
resources (such as the distribution of bottled water), and communicate
among the emergency responders and to the public.
EPA's Water Protection Task Force has developed a program to support
training exercises across the United States at systems serving over
100,000 people. In 2003, the agency intends to conduct workshops at
approximately 30 to 45 locations across the United States to provide
guidance on emergency response plans and on the Bioterrorism Act's
requirements; to present an overview on protocols for responding to
contamination events; and to provide information on environmental
laboratory capabilities.[Footnote 27]
General Awareness Training on Security Issues:
In addition to supporting the specialized training recommended for
responders "on the front lines" of an emergency, experts strongly
endorsed a more general level of training for all utility personnel.
The need to emphasize culture change at utilities, as well as among law
enforcement staff, was summarized by an AWWA official who commented at
a recent security conference about how multimillion-dollar investments
in security technology can be undermined by an employee using a brick
to prop open a usually locked door.
About 79 percent of the experts (34 of 43) rated such "general
awareness" training as warranting at least a high priority for federal
funding. One expert noted that such training is needed because the
water sector has traditionally been slow to respond to new challenges
(such as new regulations), and that such training could therefore be
particularly important in raising the consciousness of staff to
security-related issues.
During fiscal year 2002, EPA completed general security training, in
collaboration with the American Water Works Association and the Water
Environment Federation, to educate water utility managers and operators
about the "entire spectrum of security issues," including vulnerability
assessments, development of emergency response plans, and risk
communication. The organizations convened workshops, conducted
webcasts, and offered online courses. More recently, EPA's Office of
Research and Development has developed a draft Water Security Research
and Technical Support Implementation Plan for key research-related
projects, some of which involve developing training modules and related
guidance documents that will address monitoring, threat evaluation, and
analytical protocols. This training would address the specialized needs
of field and laboratory personnel. However, according to EPA officials,
some of these efforts would also support the general awareness training
needs of the larger universe of utility personnel.
Multidisciplinary Consulting Teams to Analyze Utilities' Risks and
Vulnerabilities:
Multidisciplinary consulting teams, often called "Red Teams," consist
of experts in a wide variety of security-and drinking water-related
disciplines. Red Teams could be used to provide independent analyses of
utilities' vulnerabilities, and to assess their emergency response
preparedness, as well as to educate law enforcement and public health
agencies. Approximately half of the experts (22 of the 43) rated
support for certified Red Teams as warranting either a high or highest
priority for federal funding.
According to one expert, an effective Red Team would consist of "at
least six people with widely varying areas of expertise (physical,
water quality, SCADA, policies and procedures, emergency response,
etc.), and are able to work together and sort through various concerns
and priorities to develop a unified understanding of the security
issues at a given utility." He noted further that the team would visit
utilities, and recommend changes or upgrades to security standards,
procedures, and facilities, based on their best professional judgment.
Another expert noted that Red Teams could make client utilities aware
of threat assessment information, and may be able to review
vulnerability assessments independently.
Activities to Strengthen Relationships between Agencies and Utilities:
Experts also cited enhanced cooperation and coordination among
government organizations and utilities as a key component in drinking
water utilities' efforts to improve their security. Our analysis of
experts' responses identified six types of activities in this category
as most deserving of federal support.[Footnote 28] These activities, in
figure 10, include (1) developing common protocols for monitoring
drinking water threats, (2) improving relationships between drinking
water utilities and public health agencies, (3) improving relationships
between utilities and law enforcement agencies, (4) testing local
emergency response systems, (5) sharing resources among utilities, and
(6) establishing physical interconnections between drinking water
facilities and distribution systems.
Figure 10: Activities Identified by Experts to Strengthen Relationships
between Agencies and Utilities:
[See PDF for image]
[End of figure]
Developing Common Protocols to Monitor Drinking Water Threats:
According to EPA, drinking water utilities vary widely in how they
perceive threats and detect contamination. These differences often
occur because utilities have few common protocols to help promote a
more consistent approach in performing activities such as assessing or
monitoring threats.
The experts in our study also identified this lack of consistency, with
over 90 percent (39 of 43) rating the development of common protocols
to monitor drinking water threats as warranting a high or highest
priority for federal funding. Some experts described the need for a
nationally consistent and uniform analytical response to contamination
threats, noting in particular the need to have protocols in place for
identifying, sampling, and analyzing contaminants. Some also cautioned
that older methodologies need to be reexamined in the context of
terrorism, and that new protocols need to be reviewed as they are
developed. For example, any standard process developed for detecting
potentially harmful microorganisms in drinking water needs first to be
validated, and then implemented appropriately for different sizes and
types of utilities.
EPA officials cited a number of projects under way to develop or
improve protocols that address a variety of activities highlighted in
other sections of this chapter. They noted that guidance documents in
development will include a "toolbox" with information on how to respond
to threats and attacks. EPA also intends to develop guidance to assist
law enforcement officers and utility officials in assessing the
credibility of threats, and guidance on sampling and performing
recovery and remediation work at the sites of potential or real
contamination.
Improving Relationships between Utilities and Public Health Agencies:
Drinking water utilities and public health agencies would appear to be
natural allies in a common health-related enterprise--delivering safe,
sanitary water supplies to the vast majority of the nation's
population. Their relationship is seemingly reinforced further in many
states where the state's drinking water office is located within its
health department.
Nonetheless, about 86 percent of the experts in our study (37 of 43)
recommended a high or highest funding priority for activities devoted
to improving working relationships between drinking water utilities and
health agencies. Such activities may include:
* characterizing and studying potential biological, chemical, and
radiological contaminants and getting this information to all levels of
public health departments and officials;
* clarifying and testing the effectiveness of disinfectants or other
approaches to neutralize such contaminants; and:
* standardizing effective public notification processes in the event of
potential or real contamination of drinking water systems.
For example, one expert described an array of potentially valuable
information that should be developed and made available to utilities--
information typically held by public health agencies. Examples cited
include (1) epidemiological data on diseases or other health incidents
in communities, and (2) data on infections in subgroups of the
population (such as nursing homes) and on hospital laboratory
diagnoses, absenteeism from schools, and pharmacy sales of certain
medications such as antidiarrheal medications. Because state health
agencies often regulate public water utilities and therefore are highly
knowledgeable about them, these agencies should serve an enhanced role
in the security of water systems by, for example, disseminating timely
information to utilities and the public about possible contamination.
EPA has devoted funds to address drinking water security issues as they
relate to public health concerns. For example, the agency's Office of
Water is developing contaminant lists that officials say will better
guide future research and identify information needs. Other planned
work includes determining the infectious or toxic doses of potential
contaminants, and providing information (including restricted
information) to utility operators, public officials, and other security
stakeholders.
Strengthening Relationships between Drinking Water Utilities and Law
Enforcement Agencies:
More than 80 percent of the experts (36 of 43) rated establishing or
strengthening relationships between drinking water utilities and law
enforcement as having either a high or highest priority for federal
funding. Several experts noted that a close working relationship
between these organizations could help to prevent incidents, through
increased police patrols and the sharing of intelligence information.
One expert noted also that improving these relationships might result
in a more rapid and comprehensive response to adverse or malevolent
acts. Another expert, however, pointed to an underlying problem that
often characterizes this relationship: "There are very few people that
currently have a good understanding of utility operations as well as
security issues and approaches. The lack of understanding of utility
operations by law enforcement and even regulatory agencies is
detrimental, as is the lack of law enforcement and security
understanding at utilities. Development of people that understand both
types of knowledge would be highly valuable in addressing water
security." He said that the development of such people is currently
being done by chance.
To date, EPA has largely facilitated security-related training programs
intended for utility officials, although it has recently initiated
programs involving outreach to law enforcement organizations. One
program involves developing outreach materials such as a "top 10" list
of tips on water security for law enforcement officials, a "citizens
brochure," and law enforcement training workbooks. EPA has also
contacted the National Chiefs of Police and the National Sheriffs'
Association to improve awareness about drinking water security.
Testing Local Emergency Response Systems:
It has long been accepted that in light of the critical function they
serve in local communities, drinking water utilities should have
effective emergency response plans to deal with emergencies. This
imperative was further reinforced by the Bioterrorism Act's recent
requirement for such plans. However, the execution of these plans
requires staff to perform functions beyond their day-to-day
responsibilities, as well as coordinate with personnel from different
organizations that may have little to do with each other except in
emergency situations.
Further, an emergency response plan can only be considered reliable if
it is tested periodically. About 60 percent of the experts (26 of 43)
in our study indicated that testing of local emergency response systems
warrants a high or highest priority for federal funding. One expert
stated that funds should be made available to ensure that plans are
updated, perhaps annually. Another noted, "Everyone has been
concentrating on assessment and addressing vulnerabilities [to drinking
water systems]. What is even more important to public safety are the
correct response actions to any emergency situation.":
In September 2003, EPA conducted a study to evaluate the performance of
a group of laboratories in a simulated emergency situation involving a
chemical contamination threat to drinking water. This study also
assessed the effectiveness of draft guidance provided by EPA to
laboratories for developing their own response protocols. EPA plans to
deliver a series of workshops in early 2004 that will involve tabletop
exercises and drills for various emergency responders, such as public
health and law enforcement officials, laboratory staff, and selected
utility employees.
Sharing Resources among Utilities:
Experts cited mutual aid arrangements among neighboring drinking water
utilities as activities that may result in a more efficient use of
resources during a terrorist action. Over half of the experts (23 of
43) said that a high or highest priority should be assigned to federal
funding of activities that facilitate the sharing among utilities of
such resources as common back-up power systems and other critical
equipment. One expert described a collaborative in the San Francisco
Bay Area, the Bay Area Security Information Collaborative (BASIC), in
which eight utilities meet regularly to address a wide range of
security-related topics. Topics have included the development of a
database of chemical and biological contaminants and response
protocols, regional exercises to prepare for an event, regional
training, information sharing on preparing vulnerability assessments,
and public information messages. Such mutual aid arrangements might be
designed in coordination with state water agencies and their related
water security programs.
Another expert cited standardized Mutual Aid Disaster and Intervention
Response Teams (MADIRT) established by the North Carolina League of
Municipalities, the North Carolina Urban Water Consortium, and North
Carolina's Disaster Preparedness Committee. This cooperative approach
is intended to allow municipalities a means to share personnel,
equipment, materials, and emergency assistance with other communities.
MADIRT allows communities to identify their capabilities in advance of
an event, increase standardization to save time and reduce costs, and
simplify communications. One key effort of this cooperative has been to
draft specifications for water pipe repair, although other repair
actions (e.g., for generators or SCADA systems) are being considered.
The cooperative also establishes mutual aid coordinators--volunteers
across the state who are trained in the types of aid that utilities may
need during emergencies. At present, municipalities that sign a
statewide mutual aid agreement, and in turn use the teams, would be
able to fully qualify for reimbursement from the Federal Emergency
Management Agency, the state, or both.
Establishing Physical Interconnections between Drinking Water
Facilities and Distribution Systems:
Physical interconnections--the linkages and junctions between pipes
both within and between utilities--can be useful in mitigating
intentional contamination. Once contamination has occurred and has been
identified, interconnections might allow a utility operator or
emergency response official to continue to provide service from another
source, and aid in isolating contaminated water from reaching the
population at large. They can also allow fresh, clean water to be
pumped in from another part of the system or from an entirely different
system.
Approximately 51 percent of the experts (22 of 43) indicated the
establishment of such interconnections deserves either a high or
highest priority for federal funding. The overarching idea is to have a
higher degree of redundancy in a drinking water system, with
distributed sources of water (e.g., water from both wells and surface
water); a wider and more redundant distribution of treated water (e.g.,
more than one pipeline of treated water at a critical location); and
increased controls over the flow of such water. According to one
expert, system interconnections have been used for some time, but that
more recently, efforts have focused increasingly on developing them to
handle emergency situations. Another expert commented on the need for
remote-controlled valves, and on the need to be able to connect or
bypass pipelines to access alternative sources of water. Finally, one
expert suggested that water could be shared across interconnected
utility systems if one system experienced a suspension of service. This
individual stated that there is so much excess capacity in the systems
that many utilities could supply their own needs and another system of
a similar size.
EPA's preliminary cost estimate for interconnectivity research, such as
contingency planning for alternative sources of water, is about $2.6
million. Among other things, the agency intends to develop case studies
that describe how utilities and populations can share water, how truck-
mounted and portable water facilities can be designed and implemented
during crises, and how redundancy in water systems can better ensure
sustained and consistent water supplies. The agency's work in this area
has been complemented by other projects that use computer modeling to
simulate water flows in distribution systems.
Conclusions:
EPA's Strategic Plan on Homeland Security sets forth the goal that "by
2005, unacceptable security risks at water utilities across the country
will be significantly reduced through completion of appropriate
vulnerability assessments; design of security enhancement plans;
development of emergency response plans; and implementation of security
enhancements." The plan further commits to providing federal resources
to help accomplish these goals as funds are appropriated.
Key judgments about which recipients should get funding priority, and
how those funds should be spent, will have to be made in the face of
great uncertainty about the likely targets of attacks, the nature of
attacks (whether physical, cyber, chemical, biological, or
radiological), and the timing of attacks. The experts on our panel have
had to consider these uncertainties in deriving their own judgments
about these issues. These judgments, while not unanimous on all
matters, suggested a high degree of consensus on a number of key
issues.
We recognize that such sensitive decisions must ultimately take into
account political, equity, and other considerations. But we believe
they should also consider the judgments of the nation's most
experienced individuals regarding these matters, such as those included
on our panel. It is in this context that we offer the results presented
in this report as information for Congress and the Administration to
consider as they seek the best way to use limited financial resources
to reduce threats to the nation's drinking water supply.
Recommendation for Executive Action:
We recommend that, as EPA refines its efforts to help drinking water
utilities reduce their vulnerability to terrorist attacks, the
Administrator of the EPA consider the information in this report to
help determine: how best to allocate security-related federal funds
among drinking water utilities; which methods should be used to
distribute the funds; and what specific security-enhancing activities
should be supported.
[End of section]
Appendixes:
Appendix I: Participating Experts on Drinking Water Security Panel:
Gregory Baecher; University of Maryland.
Pete Baxter; Jane's Information Group.
Kevin Bennett; Federal Bureau of Investigation, National Infrastructure
Protection Center.
Paul Bennett; New York City Department of Environmental Protection.
Frank Blaha; American Water Works Association Research Foundation.
Jennifer Brower; RAND.
Liz Casman; Carnegie Mellon University.
Jeff Danneels; Sandia National Laboratories.
Rolf Deininger; University of Michigan.
John Ditmars; Argonne National Laboratory.
David Dobbins; Black & Veatch Company.
Jane Downing; U.S. Environmental Protection Agency.
Wayne Einfeld; Sandia National Laboratories.
James H. Fetzer; Tennessee Valley Authority.
Tim Gablehouse; Gablehouse and Eppel.
Gregg Grunenfelder; Washington State Department of Health.
Eugene Habiger; San Antonio Water System.
Todd Humphrey; Portland Water Bureau.
Gerald Iwan; Connecticut Department of Public Health.
Steve Jackson; U.S. Department of the Interior, Bureau of Reclamation.
Brian Jenkins; RAND.
Janet Jensen; U.S. Department of Defense, U.S. Army, Aberdeen Proving
Grounds.
Dennis Juranek; U.S. Department of Health and Human Services, Centers
for Disease Control and Prevention.
Michael Keegan; National Rural Water Association.
Dave Lawrence; Wisconsin Rural Water Assocation.
Vanessa Leiby; Association of State Drinking Water Administrators.
Carrie Lewis; Milwaukee Water Department.
John McLaughlin; Brown and Caldwell.
Christine L. Moe; Emory University.
Erik Olson; National Resources Defense Council.
Julian Palmore; University of Illinois.
Janet Pawlukiewicz; U.S. Environmental Protection Agency.
E.L. Quarantelli; University of Delaware.
Brian Ramaley; Newport News Waterworks.
Alan Roberson; American Water Works Association.
Ken Rubin; PA Consultants.
Leonard Shabman; Resources for the Future.
Jim Shell; Metropolitan Washington Council of Governments.
Kimberly Shoaf; University of California at Los Angeles.
David Spath; California Department of Health Services.
Mic Stewart; Metropolitan Water District of Southern California.
Billy Turner; Columbus Water Works.
Ray Yep; Santa Clara Valley Water District.
[End of section]
Appendix II: GAO Contacts and Staff Acknowledgments:
GAO Contacts:
John Stephenson, (202) 512-3841 Steve Elstein, (202) 512-6515:
Acknowledgments:
In addition to the individuals named above, important contributions
were made by Don Cowan, Lynn Musser, Diane Raynes, and Aaron Shiffrin.
Charles Bausell, Brandon Haller, Katherine M. Raheb, and Carol Shulman
also made key contributions.
:
(360364):
:
FOOTNOTES
[1] An EPA official noted, however, that distribution systems generally
carry disinfectant residuals that can counteract the potentially
harmful effects of contaminants.
[2] The President's Commission on Critical Infrastructure Protection,
Critical Foundations: Protecting America's Infrastructures, October
1997.
[3] Pub. L. No. 107-188, 116 Stat. 594 (2002) ("Bioterrorism Act").
[4] A discussion of the influence of these factors on treatment is
available in the preamble in both the Surface Water Treatment Rule and
the Stage I Disinfectants/Disinfection Byproducts Rule.
[5] These comments, made prior to the electric supply disruption of
August 2003, were vividly illustrated when that power outage severely
disrupted the water supplies of several cities.
[6] Environmental Protection Agency, Vulnerability Assessment Fact
Sheet, EPA 816-F-02-025, November 2002, available on the Web at http:/
/www.epa.gov/ogwdw000/security/va_fact_sheet_12-19.pdf.
[7] Design Basis Threat: The threat serves as the basis for the design
of countermeasures as well as the benchmark against which
vulnerabilities are assessed.
[8] Citing this reason, one expert suggested the addition of a "dual
use" criterion in which the funds spent would also fix some existing
utility deficiency, such as noncompliance with a drinking water
standard.
[9] Environmental Protection Agency, Office of Water, Office of
Research and Development, Water Security Research and Technical Support
Implementation Plan, Preliminary Working Draft, July 2003.
[10] As noted earlier in this report, these grants supported VAs,
remediation planning, and emergency plan development through August
2002. EPA issued grant awards to over 400 publicly owned and privately
owned community water systems that regularly serve populations over
100,000. This program was noncompetitive, and all eligible utilities
that submitted completed grant applications received awards. The value
of each grant did not exceed $115,000. An EPA official pointed out that
higher dollar grant programs might have additional administrative
requirements.
[11] Environmental Protection Agency, Office of Water, Use of the
Drinking Water State Revolving Fund (DWSRF) to Implement Security
Measures at Public Water Systems, EPA 816-F-02-040, November 2001,
available on the Web from http://www.epa.gov/ogwdw000/dwsrf/security-
fs.pdf.
[12] The National Research Council of the National Academies, Making
the Nation Safer: The Role of Science and Technology in Countering
Terrorism (Washington, D.C.: The National Academies Press, 2002).
[13] Bioterrorism Act, S 402.
[14] In addition, since August 2002, EPA has augmented its
Environmental Technology Verification (ETV) Program to include water
security issues. The ETV Program can be used to test, evaluate, and
eventually bring promising technologies (e.g., detection and "point of
use" treatment technologies) to the marketplace. EPA has spent
approximately $2 million of fiscal year 2002 supplemental funds on the
ETV Program and its related projects, and estimates the total costs for
the ETV projects at $8.1 million. Once technologies are verified, EPA
believes the technology can be tested in pilot-scale studies and
potentially used at drinking water systems.
[15] This work is planned to review both large and small treatment
system monitoring capabilities, distribution systems, and remote
telemetry monitoring research, and will be conducted in controlled
conditions at the Office of Research and Development's Water Awareness
Technology Evaluation Research and Security Center, located at EPA's
Test & Evaluation Facility. The work is projected to end around
December 2005.
[16] The National Research Council of the National Academies, Making
the Nation Safer: The Role of Science and Technology in Countering
Terrorism (Washington, D.C.: The National Academies Press, 2002).
[17] The Centers for Disease Control and Prevention (CDC) currently
supports programs directed to states in order to improve laboratory
capacity and to ensure public health preparedness, such as the Emerging
Infections Program, the infectious disease Epidemiology and Laboratory
Capacity Program, and the National Electronic Disease Surveillance
System. For fiscal year 2003, CDC made approximately $870 million
available to applicants.
[18] The National Research Council of the National Academies, Making
the Nation Safer: The Role of Science and Technology in Countering
Terrorism (Washington, D.C.: The National Academies Press, 2002).
[19] Environmental Protection Agency, Office of Water, Use of the
Drinking Water State Revolving Fund (DWSRF) to Implement Security
Measures at Public Water Systems, EPA 816-F-02-040, November 2001,
available on the Web at http://www.epa.gov/ogwdw000/dwsrf/security-
fs.pdf.
[20] The National Research Council of the National Academies, Making
the Nation Safer: The Role of Science and Technology in Countering
Terrorism (Washington, D.C.: The National Academies Press, 2002).
[21] Department of Defense, Unified Facilities Criteria (UFC):
Department of Defense Minimum Antiterrorism Standards for Buildings,
UFC 4-010-01, July 2002, available on the Web at http://
www.acq.osd.mil/ie/irm/irm_library/UFC%204_010_01%20-%2031JUL2002.pdf.
[22] The Bioterrorism Act recognized the importance of dealing with
this potentially serious source of contamination. Specifically, section
402 of the Bioterrorism Act calls for a review of "methods and means by
which pipes, constructed conveyances, collection, pretreatment,
treatment, storage and distribution systems that are utilized in
connection with public water systems could be altered or affected so as
to be subject to cross-contamination of drinking water supplies." In
addition, section 402 requires the review of "procedures and equipment
necessary to prevent the flow of contaminated drinking water to
individuals served by public water systems."
[23] For general information on membrane treatment options or examples,
refer to EPA's proposed draft Membrane Filtration Guidance Manual, EPA
815-D-03-008, Office of Water, June 2003.
[24] The additional monies are for coordination within the state or
territory on homeland security issues, developing or enhancing
vulnerability assessments and emergency response plans, and setting up
a communications strategy for states and utilities.
[25] The grants (up to $300,000 per entity) were intended to build
staff expertise in drinking water security, after which these
individuals would train state, tribal and local agencies at no cost on
security and technical issues. Grant recipients included the Maryland
Center for Environmental Training, the National Environmental Services
Center, the National Rural Water Association, the Rural Community
Assistance Program, and the Water Environment Federation.
[26] This is a program implemented by the International City/County
Management Association (ICMA), an organization representing local
government leaders, and the Water Environment Federation (WEF), a not-
for-profit technical and educational organization.
[27] In addition to these workshops, EPA published a guidance document
for utilities to provide for uniform response, recovery and remediation
processes. (See Guidance for Water Utility Response, Recovery &
Remediation Actions for Man-Made and/or Technological Emergencies, EPA
810-R-02-001, April 2002).
[28] More than 50 percent of the experts rated these activities as
deserving a high or highest priority for federal funding relative to
the other activities. Experts also identified three other activities
scoring under 50 percent, including the formation of better
relationships between water associations and federal agencies (about 26
percent), developing public education programs (about 19 percent), and
forming a tracking system to monitor security funding (about 12
percent).
GAO's Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: