Drinking water is one of the nation's key infrastructure assets that have been deemed vulnerable to deliberate terrorist attacks. While the threat to reservoir systems and water sources is deemed to be minimal, the vulnerability of the drinking water distribution systems to accidental or deliberate contamination due to a backflow event is becoming a well-recognized possibility. The myriad possible points of incursion into a distribution system and the ease of mounting a backflow event, combined with the fact that little or no quality monitoring occurs after the water has left the treatment plant, makes the danger of such an attack acute. This was clearly stated in a General Accounting Office (GAO) report to Congress that listed the vulnerability of the distribution system to attack as the largest security risk to water supplies. Prior to this there has not been a system capable of detecting such an event and alerting the system's managers so that effects of an attack or accident can be contained. The general scientific consensus is that no practical, available, or cost-effective real-time technology exists to detect and mitigate intentional attacks or accidental incursions in drinking water distribution systems. The rapid detection and identification of breaches of security in the water distribution system is crucial in initiating appropriate corrective action. The ability of a technology system to detect incursion on a real time basis and give indications as to the cause could dramatically reduce the impact of any such scenario. As the vulnerability of the distribution system becomes more widely recognized, the development of a system such as the one described will be an invaluable tool in maintaining the integrity of the nations drinking water supply.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.