Hach_TipBanner_600x160.jpg

Dan Kroll and Katy Craig
Hach Homeland Security Technologies

Introduction:

The vulnerability of our distribution systems to disruption and contamination by potential terrorist or malicious acts has been well documented.1,2 These potential attack scenarios have the ability, if orchestrated successfully, to produce casualties on a massive scale. Studies conducted by personnel at Hach Homeland Security Technologies, Colorado State University and the U.S. Army Corps of Engineers among others have shown that attacks on drinking water supplies could amass casualties in the thousands over a period of hours.3,4,5

The most likely scenario for such an attack, in which the goal is to inflict mass casualties, is to orchestrate a simple backflow contamination event. A backflow attack occurs when a pump is used to overcome the pressure gradient that is present in the distribution system''s pipes. This is usually around 80 lbs/in2 and can be easily achieved by using pumps available for rent or purchase at most home improvement stores. After the pressure gradient present in the system has been overcome and a contaminant introduced, siphoning effects act to pull the contaminant into the flowing system. Once the contaminant is present in the pipes, the normal movement of water in the system acts to disseminate the contaminant throughout the network effecting areas surrounding the introduction point. The introduction point can be anywhere in the system such as a fire hydrant, commercial building or residence. See figure 1.


Fig. 1 All systems are vulnerable to backflow attacks – intentional or accidental.

Backflows occur via accident on a regular basis and are of great concern to the water industry. Accidental backflow events have been found to be responsible for many incidents of water borne illness and even death in the United States. According to the USEPA, backflow events caused 57 disease outbreaks and 9734 cases of water borne disease between 1981 and 1998.6

To prevent such accidental backflows many systems have been equipped with backflow prevention devices. These physical devices are installed to prevent accidental backflows and can be removed or disabled quite easily, rendering them ineffective in preventing deliberate attempts at contamination.

Intentional dissemination of contaminants through a backflow event is in fact a very critical vulnerability. Studies conducted by the U.S. Air Force and Colorado State University have shown this to be a highly effective means of contaminating a system.7 A few gallons of highly toxic material was enough, if injected at a strategic location via the proper method, to contaminate an entire system supplying a population of 100,000 people in a matter of a few hours. Material and significant contamination was not relegated to only the areas surrounding the introduction point, but was found in each neighborhood thus permeating the entire system. Using computer simulations, when a military nerve agent material was used over 20% of the population was determined to have received a dose adequate to result in death and when a common chemical was used in place of the warfare agent the result was a casualty rate of over 10%. Thousands of deaths could result from this very inexpensive and low-tech method of attack. These characteristics meet all of the terrorist''s criteria for an attack: inexpensive, would cause mass casualties, and actually offer the terrorists a good chance of avoiding apprehension. Unfortunately, the first indications of such an attack are likely to be casualties showing up at local hospitals because monitoring for contamination in the distribution system typically is limited to infrequent grab samples. A terrorist could launch this type of attack and be on a plane out of the country before the first casualty is reported.

Backflow attacks can occur from any access point to the water system. Wherever water can be drawn out, material can be forced back into the system. Some areas, however, are more vulnerable than others. Access points near high flow areas and larger pipes would be favored because they would disseminate the material to a wider area more quickly.

Recent breakthroughs in the online detection of contaminants have made the deployment of a cost effective early warning system capable of detecting and categorizing such events a reality. For information on these innovative and award-winning solutions for distribution monitoring, please contact Hach Company or visit www.hachhst.com.


Bibliography:

  1. Kroll, Dan. 2006. Securing Our Water Supply: Protecting a Vulnerable Resource. PennWell Publishers. Tulsa, Oklahoma.
     
  2. Hickman, Donald C. 1999. A chemical and biological warfare threat: USAF water systems at risk. Counter Proliferation paper No. 3. USAF Counter Proliferation Center, Air War College.
     
  3. Kroll, Dan. 2003. Mass Casualties on a Budget. Confidential Briefing Paper. Hach HST.
     
  4. U.S. Army Corps of Engineers. n.d. Calculations on threat agents and requirements and logistics for mounting a successful backflow attack.
     
  5. Allman, T.P. 2003. Drinking water distribution system modeling for predicting the impact and detection of intentional contamination. Master’s Thesis. Department of Civil Engineering. Colorado State University.
     
  6. USEPA 2002. Potential Contamination Due to Cross-Connections and backflow and the associated health risks: An Issue Paper.
    http://water.epa.gov/lawsregs/rulesregs/sdwa/tcr/upload/2007_
    05_18_disinfection_tcr_issuepaper_tcr_crossconnection-backflow.pdf

     
  7. Allman, Timothy and Kenneth Carlson. 2005. Modeling Intentional Distribution System Contamination and Detection. Journal of the American Water Works Association. January. Note: that the executive summary of this article is still available but the full text has been pulled from the AWWA website for security reasons as it was determined that the details could be helpful to would be terrorists.
     
  8. EPA. Water Security and You. http://cfpub.epa.gov/safewater/watersecurity/pubs/water-security-article.pdf