Fig. 1 All systems are vulnerable to backflow attacks – intentional or accidental.
Backflows occur via accident on a regular basis and are of great concern to the water industry. Accidental backflow events have been found to be responsible for many incidents of water borne illness and even death in the United States. According to the USEPA, backflow events caused 57 disease outbreaks and 9734 cases of water borne disease between 1981 and 1998.6
To prevent such accidental backflows many systems have been equipped with backflow prevention devices. These physical devices are installed to prevent accidental backflows and can be removed or disabled quite easily, rendering them ineffective in preventing deliberate attempts at contamination.
Intentional dissemination of contaminants through a backflow event is in fact a very critical vulnerability. Studies conducted by the U.S. Air Force and Colorado State University have shown this to be a highly effective means of contaminating a system.7 A few gallons of highly toxic material was enough, if injected at a strategic location via the proper method, to contaminate an entire system supplying a population of 100,000 people in a matter of a few hours. Material and significant contamination was not relegated to only the areas surrounding the introduction point, but was found in each neighborhood thus permeating the entire system. Using computer simulations, when a military nerve agent material was used over 20% of the population was determined to have received a dose adequate to result in death and when a common chemical was used in place of the warfare agent the result was a casualty rate of over 10%. Thousands of deaths could result from this very inexpensive and low-tech method of attack. These characteristics meet all of the terrorist''s criteria for an attack: inexpensive, would cause mass casualties, and actually offer the terrorists a good chance of avoiding apprehension. Unfortunately, the first indications of such an attack are likely to be casualties showing up at local hospitals because monitoring for contamination in the distribution system typically is limited to infrequent grab samples. A terrorist could launch this type of attack and be on a plane out of the country before the first casualty is reported.
Backflow attacks can occur from any access point to the water system. Wherever water can be drawn out, material can be forced back into the system. Some areas, however, are more vulnerable than others. Access points near high flow areas and larger pipes would be favored because they would disseminate the material to a wider area more quickly.
Recent breakthroughs in the online detection of contaminants have made the deployment of a cost effective early warning system capable of detecting and categorizing such events a reality. For information on these innovative and award-winning solutions for distribution monitoring, please contact Hach Company or visit www.hachhst.com.
Bibliography:
- Kroll, Dan. 2006. Securing Our Water Supply: Protecting a Vulnerable Resource. PennWell Publishers. Tulsa, Oklahoma.
- Hickman, Donald C. 1999. A chemical and biological warfare threat: USAF water systems at risk. Counter Proliferation paper No. 3. USAF Counter Proliferation Center, Air War College.
- Kroll, Dan. 2003. Mass Casualties on a Budget. Confidential Briefing Paper. Hach HST.
- U.S. Army Corps of Engineers. n.d. Calculations on threat agents and requirements and logistics for mounting a successful backflow attack.
- Allman, T.P. 2003. Drinking water distribution system modeling for predicting the impact and detection of intentional contamination. Master’s Thesis. Department of Civil Engineering. Colorado State University.
- USEPA 2002. Potential Contamination Due to Cross-Connections and backflow and the associated health risks: An Issue Paper.
http://water.epa.gov/lawsregs/rulesregs/sdwa/tcr/upload/2007_
05_18_disinfection_tcr_issuepaper_tcr_crossconnection-backflow.pdf
- Allman, Timothy and Kenneth Carlson. 2005. Modeling Intentional Distribution System Contamination and Detection. Journal of the American Water Works Association. January. Note: that the executive summary of this article is still available but the full text has been pulled from the AWWA website for security reasons as it was determined that the details could be helpful to would be terrorists.
- EPA. Water Security and You. http://cfpub.epa.gov/safewater/watersecurity/pubs/water-security-article.pdf