15,737
Views
20
CrossRef citations to date
0
Altmetric
Research Article

Infrastructure Vulnerability Index of drinking water systems to terrorist attacks

ORCID Icon & ORCID Icon | (Reviewing Editor)
Article: 1456710 | Received 01 Jan 2018, Accepted 20 Mar 2018, Published online: 09 Apr 2018

Abstract

Drinking water supply systems are vulnerable targets for which counter-terrorism measures have been raised worldwide. The threat of terrorist attacks to these systems has led to the need for the international scientific community to deal with the vulnerability assessment related to such events. In this context, this paper proposes an Infrastructure Vulnerability Index for drinking water distribution system with the aim of providing managers with a tool to assess system vulnerability to possible terrorist acts and to support the investments choice aimed at increasing security. This index is obtained using a set of indicators with reference to the structural parts of the system and considers both intentional contamination and physical damage. The index uses a hierarchic structure and decomposes the system into components and uses the Analytic Hierarchy Process to compute the weights. An application of the index was carried out for three water schemes of the Province of Crotone (Southern Italy) and the results obtained allowed to highlight the characteristics of the index and its usefulness.

Public Interest Statement

This paper deals with the vulnerability of drinking water supply systems against possible terrorist attacks. Drinking water supply systems are, in fact, vulnerable targets for which counter-terrorism measures have been raised worldwide. This paper proposes an Infrastructure Vulnerability Index obtained using a set of indicators with reference to the various structural parts of the system. This index allows for the assessment of the vulnerability of water supply systems as a function of the presence and/or absence of elements designed to reduce the possibility of terrorist attacks and to detect the occurred terrorist act in a timely manner. This index can be used by the managers to compare different water schemes in relation to their degree of vulnerability, to identified the infrastructural elements that most affect the level of vulnerability of a single system, to support the investments choice and to assess the effects of the interventions aimed at increasing security.

1. Introduction

The first years of this new century were marked by several terrorist attacks such as those in New York, Madrid, London, Ankara, Paris, the Ivory Coast, Brussels, Nice, Berlin and Istanbul. These attacks have brought the issue of security back to the international spotlight especially in relation to the difficulty of preventing such acts.

Some terrorist threats regard possible attacks on water distribution systems; water resources, in fact, have always been used as a target and an instrument of war and terrorism (Gleick, Citation1993, Citation2006).

The problem, of course, has assumed considerable dimensions, with frequent revelations of risks and terrorist attacks on water distribution systems. Recently in an interview with The Sunday Times the British Home Secretary said that aqueducts, transportation, crowded places and high interchange communities, are among the possible targets of terrorist attacks (Il Giornale, Citation2017). In a “confidential” report of the Turkish secret services it was argued that Isis was planning to poison water sources in Turkey with the aim of spreading different bacteria including those that cause tularemia, the so-called “rabbit fever” (Tgcom24, Citation2016). In 2012, 140 Afghan students and their teachers were admitted to a local hospital after drinking contaminated water from the their school’s water tank (CNN, Citation2012). In the Kashmir region in India, Maoist cadres allegedly poisoned a pond near a field of Central Reserve Police Force (The Times of India, Citation2010). While a man in Varney, West Virginia, was accused of having plans to poison the local water system with cyanide, but police were able to reach him first (WSAZ News, Citation2008). In Greve, Denmark, Inspectors discovered strychnine in the water supply of a Danish town during a routine check (UPI, Citation2006). In Britain, a staff member of Thames Water discovered that a water tank in Dancers End, just outside Tring, had been sabotaged (HSPDsHemeltoday News, Citation2006). A spokesman for al Qaeda has told an Arabic-language newsmagazine that the terror group will try to use poisons to attack the United States, specifically threatening to contaminate the nation’s water supply (The Washington Times, Citation2003). Italian police say they have arrested four Moroccans who were planning a chemical attack in Rome, targeting buildings which included the United States embassy (BBC News, Citation2002).

The abovementioned events highlight the need for the scientific community to take an interest in the aspects of vulnerability and risk related to drinking water supply systems regarding intentional contamination and physical damage.

Recently vulnerability assessment has gained a dynamic and complex nature, and has become an active area of research in view of its growing strategic importance in various fields of application (Ilker, Ahmet, & Ahmet, Citation2010). Vulnerability tends to mean different things in different contexts and it is often described using various terms such as “weakness”, “lack of capacity”, “exposure to hazard”. In literature, in fact, there are different definitions of vulnerability. According to Ezell (Citation2007) vulnerability is defined as a measure of susceptibility to a scenario, and is therefore a condition of the system and should be evaluated in the context of a scenario. National Security Telecommunications Advisory Committee, NSTAC (Citation1997) states that vulnerability is a function of access and exposure, while in the National Infrastructure Protection Plan (Department of Homaland Security & NIPP, Citation2013) vulnerability is defines as physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard.

Regarding water systems they are vulnerable to both manmade and natural threats including, e.g. earthquakes, flood, droughts, terrorist attacks. Safe drinking water is central to the life of an individual and of society; a drinking water contamination incident or the denial of drinking water services would have far-reaching public health, economic, environmental, and psychological impacts. Other critical services such as fire protection, healthcare, and heating and cooling processes would also be disrupted by the interruption or cessation of drinking water service, resulting in significant consequences to the national or regional economies (Department of Homeland Security & US EPA, Citation2015). Therefore, the issue of the security and risk assessment of such systems is of increasing importance. In this context, numerous definitions exist for the variables of interest in a risk assessment study. These variables include: event or threat, outcome, scenario, exposure, vulnerability, consequences, risk.

Regarding vulnerability, Ezell (Citation2007) argues that a relationship emerges from the literature between vulnerability and risk. Vulnerability highlights the notion of susceptibility to a scenario whereas risk focuses on the severity of consequences to a scenario. As described in Thomas (Citation2006), the National Water Resource Association, NWRA (2002) defines a vulnerability assessment as the identification of weaknesses in security, focusing on defined threats that could compromise the ability to provide a service, while National Oceanic and Atmospheric Administration (2002), defines vulnerability as the susceptibility of resources/assets to negative impacts from threat events. Hence, a vulnerability assessment accounts for the assets that could deter or defray unwanted outcomes from an event and for their susceptibility to failure. Vulnerability is defined by Haimes and Horowitz (Citation2004) to be the manifestation of the inherent states of a system (e.g. physical, technical, organizational, and cultural) that can be exploited by an adversary to cause harm or damage. Copeland (Citation2010) identifies the most likely “vulnerable” water systems to be the relatively small number of water systems serving the largest populated cities in the country.

The terrorist events of recent years have increased the attention on the safety aspects of water infrastructure. In the United States, just after September 11, 2001, the United States Congress approved a series of acts pertaining to vulnerability assessments to assess potential threats to such systems and to identify corrective actions. Over the years various vulnerability assessment methodologies and tools were developed and several studies were conducted on this issue by various institutions not only in USA but worldwide (APWA, AMWA, NACWA, & WEF, Citation2007; Centre for European Reform [CER], Citation2005; HSPDs, Citation2002; Istituto Superiore di Sanità, Citation2005; US EPA, Citation2003, Citation2007, Citation2009, Citation2010).

Water systems are vulnerable to a range of intentional threats including contamination, damaged or sabotaged through physical destruction and cyber attack.

Consequences of a water contamination can be significant. A contamination event in a water system can adversely affect the people, the businesses, and the community it serves due to fear, loss of water service, significant economic costs for decontamination and recovery, and the magnitude of adverse public health effects (Clark & Hakim, Citation2014).

Physical damage has consequences mainly related to the interruption of service and may also cause large economic harms. Vulnerable characteristics of water systems include their physical attributes, e.g. reservoirs, tanks, and pump stations. In addition to physical attributes, a water utility’s SCADA could be vulnerable to cyber attack, for example, turning pumps on or off, filling or emptying tanks inappropriately, or causing water hammer events (Clark & Hakim, Citation2014).

In the last decades, the vulnerability of the water systems to possible terrorist attack was studied by several authors with reference to intentional physical damage, cyber attack and specially to intentional contamination aspects in relation to, e.g. types of contaminants, magnitude of potential consequences, influence of contaminant decay (Davis & Janke, Citation2011; Davis, Janke, & Magnuson, Citation2014; Di Nardo, Di Natale, Guida, & Musmarra, Citation2013; Di Nardo et al., Citation2015; Hickman, Citation1999; Murray, Janke, & Jim, Citation2004; Nilsson, Buchberqer, & Clark, Citation2005; Panguluri, Phillips, & Cusimano, Citation2011), and to the definition of an integral valuation framework of water system vulnerability (Ezell, Citation2007; Haimes, Matalas, Lambert, & Jackson, Citation1998; Tidwell, Cooper, & Silva, Citation2005).

In this context, the objective of the work described in this paper is the definition of an index of vulnerability of the drinking water supply systems with respect to possible terrorist acts, which can be used by the managers to compare different water schemes in relation to their degree of vulnerability, to identified the infrastructural elements that most affect the level of vulnerability of a single system, to support the investments choice and to assess the effects of the interventions aimed at increasing security.

In the definition of this index, the vulnerability refers to the system susceptibility to possible terrorist attacks in relation to the presence and/or absence of elements that can make the system more or less exposed to this threat. This index is a deterministic comparative type and is easily and immediately usable in management.

2. Materials and methods

Given the growing water demand, the sources pollution and the reduction of water availability due to climate change, all the aspects related to the correct system design, reliability assessment, operational efficiency, proper allocation of available water resources, remain scientific and engineering topics still of current interest (Carini, Maiolo, Pantusa, Chiaravalloti & Capano, Citation2017; Cunha & Sousa, Citation1999; Giustolisi, Laucelli, & Colombo, Citation2009; Maiolo & Pantusa, Citation2015, Citation2016, Citation2017a, Citation2017b; Maiolo, Mendicino, Pantusa, & Senatore, Citation2017; Samani & Mottaghi, Citation2006; Sun & Zeng, Citation2012). In recent years, however, growing is also the interest in the theme of threats to drinking water systems due to natural disasters and human-caused incidents. In particular, increasing concerns about the possibility of terrorist attacks towards drinking water systems have contributed to the need for new approaches to the vulnerability and security of these systems.

A terrorist attack on a water supply system can create greater damage the longer the delay with which it is discovered. In this type of terrorist attack, blatant actions are not accomplished, instead, the action is executed in secret, seeking to make surprise effect.

To guard against these types of attacks, it is possible to act trying to physically prevent access to water supply systems, and when the attack occurs, quickly detect the incident.

Needs and opportunities to reduce the vulnerability of public water systems to willful attack were reviewed by Haimes et al. (Citation1998). The terrorist threat were described, classifying potential physical, chemical-biological, and cyber attacks to water systems. A hierarchical holographic model was introduced for multiple perspectives on the hardening of water systems. Types of hardening were defined, including security, robustness, resilience, and redundancy.

An approach of threat assessment of water supply systems using Markov Latent Effect (MLE) modeling was proposed by Tidwell et al. (Citation2005). This method provides for the decomposition of a complex threat system into sub-systems or decision elements to track down a particular threat from its origin to the point of consequence. All decision elements are then aggregated and an assessment score was obtained which provided a measure of the credibility of a threat. The approach was applied to a real municipal water distribution system under two different attack: bomb and injection of a toxin; for each attack the level of system security has been evaluated.

Ezell (Citation2007) proposed an Infrastructure Vulnerability Assessment Model (I-VAM) based on MAUT (Multi Attribute Utility Theory) and applied it to a medium-sized clean water system. In this model, the system is presented in a hierarchical structure and clean water system model decomposition serves as the structure of the value model with deterrence, detection, delay, and response value functions used to measure protection for system components.

US EPA (Citation2015) developed the VSAT software tool to support water and wastewater utility in vulnerability assessments. VSAT is available, free of charge, for wastewater utilities, drinking water utilities, and for utilities providing both services. This tool was developed to help utilities in vulnerability assessment through identification of critical assets, threat, countermeasure, costs (Table ).

Table 1. Literature synthesis of vulnerability assessment of water systems to terrorist attacks

The work described in this paper fits into this context and proposes an infrastructure vulnerability index.

In comparison to the state of the art, the proposed index refers only to intentional attacks and does not refer, as in the case of the Haimes study and the US EPA tool, to attacks due to both man-made and natural hazards. Moreover, this index also refers not only to intentional contamination, which is the aspect most considered in the various studies conducted on this topic, but it also refers to intentional physical damage and cyber attack. The proposed index, in fact, allows for the quantitative assessment of the vulnerability of water supply systems as a function of the presence and/or absence of elements designed to reduce the possibility of the deliberate release of contaminants (bacteriological, chemical or nuclear) or the intentional physical damage, and to detect the occurred terrorist act in a timely manner. The index considers intentional contamination and physical damage/cyber attack separately and then makes an overall vulnerability assessment.

As the model proposed by Ezell, the index refers to the infrastructural vulnerability of the system, uses a hierarchic structure and decomposes the system into components. However, this index classifies the indicators in deterrence indicators and delay indicators and uses the Analytic Hierarchy Process (AHP) to compute the weights.

Finally, it should be noted that since the main addressees of this index are the water system managers, unlike other more complex models,this index was implemented so that it is an easy tool to use and require a low computational cost.

2.1. Infrastructural Vulnerability Index

The Infrastructural Vulnerability Index of the water system, IVI, is assessed through two sub-indices of vulnerability, one referring to intentional contamination, IVIIC, and the other to the physical damage of the system and cyber attack, IVIPD. The Infrastructural Vulnerability Index is calculated as follows:(1) IVI=wIC·IVIIC+wID·IVIPD(1)

where w IC is the weight assigned to the IVIIC sub-index and wPD is the weight assigned to the IVIPD sub-index.

The vulnerability is assessed through an index using a scores and weights methodology. The structure of each sub-index consists of pillars (Subsystem) that consider the different sub-systems components of the water scheme; each pillar is divided into a number of components, and each component is formed by a set of elementary indicators. The sub-index is obtained through a process that includes a first step of attribution of appropriate weights to the indicators, to the components and to the subsystems, and a subsequent phase of aggregation to switch to an index consisting of different levels. The indicators considered are passive and active; the passive indicators refer to elements determining a delay in the realization of the terrorist act, while the active type indicators refer to elements of deterrence and that allow the early detection of the terrorist act.

Regarding the structures of the two sub-indices, it is similar; there are small differences in the definition of some indicators and the sub-index referred to the physical damage, IVIPD, includes the subsystem referred to SCADA and related components.

The total number of subsystems, components and indicators for the two sub-indices is described below (Table ).

Table 2. Sub-indices structure—Number of subsystems, components and indicators for IVIIC and IVIPD

In literature, there are several techniques for the aggregation of the indicators and the choice of method which is best suited to characterize the phenomenon under examination depends on the data, in addition to the discretion and the analyst’s judgement. The most appropriate technique for the specific case under examination appears to be the one based on the distance from the target. The indicators taken as a reference for the vulnerability index are Boolean type, so the targets are related to the presence of devices capable of delaying or detecting the terrorist act, and it will assign the value of the unit. However, regarding the scores given to each indicator, they will have a value of 0 in the absence of active and passive elements, and a value of 1 in their presence.

The procedure for the sub-index construction includes a first aggregation at the indicator level, for each individual component, then a second aggregation at component level, and a third aggregation at subsystem level.

Considering for example the sub-index IVIIC, for each j the value of the distance from the target, D j , indicator is calculated such as:(2) Dj=Ijc/Tjc,(2)

in which I jc represents the Boolean value assigned to each indicator of the single component c (for c = 1,2, …, C).

The next step is the assignment of weights for each indicator of the c-th component. The aggregation is done through a weighted mean:(3) Sc=w1j×Dj/w1j,(3)

where w 1j is the weight of the indicator j of the component c.

At this point it is necessary to make a further aggregation in order to pass from single components, to subsystem. To each component will be assigned a weight, w 2C .(4) SS=w2c×Sc/w2c,(4)

Lastly, it is necessary to make a further aggregation to switch from single subsystem to the Sub-index. To each subsystem will be assigned a weight, w 3S .(5) IVIIC=w3S×Ss/w3s(5)

The same procedure is used to the IVIPD sub-index.

The information obtained from the acts made available by the Managers in the activities to develop the report on drinking water systems (Istituto Superiore di Sanità, Citation2005), and the information obtained from the activities public and those to which an adequate classification of secrecy is attributed for the development of the relevant Italian legislation (Legislative Decree 61, 2011; Decree of the President of the Council of Ministers, 24 January 2013) allowed to get a first framework to quantify the vulnerability of drinking water systems. Such information has also allowed to evaluated the weight of the indicators as a function of the ability to delay the terrorist act, the accessibility of the site and the ability to transport adequate material to the terrorist act, the susceptibility to being subject to terrorist acts, the unauthorized access attempts, the historical occurrence of similar attacks, on the basis of the bibliography and public available information and classified as confidential.

The criteria for weighting were therefore defined on the basis of the technical experience and the information produced by the Managers.

In general, as for the allocation of weights, they were assigned considering the time of access to the infrastructure and the easiness to carry out the terrorist act. For the subsystem and the components greater importance has therefore been given to those infrastructural elements that are more likely to be chosen as targets of terrorist attacks for the easier accessibility and possibility of execution of the act, also in relation to acts which occurred historically; for individual indicators lower importance has been given to that represent passive elements and may cause a delay in the execution of the terrorist act and greater importance for indicators that represent active elements.

As regards intentional contamination, tanks, reservoirs, or pump stations are vulnerable to both contaminant release and contaminant injection. Pressurized backflow could theoretically occur anywhere in the distribution system and simply requires a pump with the necessary power to overcome the distribution system line pressure where the injection is to occur (Clark & Hakim, Citation2014). Problematic is the protection of river and lake which by territorial extension and number of access points does not allow the implementation of systems and procedures that create on the one hand a greater deterrence towards harmful actions and on the other a desirable growth of continuous and periodic checks. The volumes at stake, however, determine a natural dilution effect that increases the margins of intervention and protection of the quality of the water then distributed. For works under pressure, greater safety derives instead from the difficult attachment of these networks (Istituto Superiore di Sanità, Citation2005). In particular, for weight attribution, a greater weight has been attributed to storage and distribution system that are considered the most vulnerable elements of a water system. In fact, as reported in Clark & Hakim (Citation2014) many studies cite post treatment storage facilities and the distribution system as being the most vulnerable components. Descending weight has been given to treatment, intake structure and conveyance, respectively.

As regards the sub-index IVIID elements that make the system particularly vulnerable are, e.g. pumping stations and valves. In fact, loss of water or a substantial loss of pressure could disable fire-fighting capability, interrupt service, and disrupt public confidence. Many of the major pumps and power sources in water systems have custom-designed equipment and in case of a physical attack it could take months or longer to replace them. Sabotaging pumps that maintain flow and pressure could cause long-term disruption. Breaks can be induced by a system-wide hammer effect, which could be caused by opening or closing major control valves too rapidly (Clark & Hakim, Citation2014). Therefore, greater weight has been assigned to conveyance and distribution for the presence of valves and pumping stations, while a lower weight has been given to storage, treatment and intake structure. Damage to the control system is considered less important.

In order to compute the weights, the Analytic Hierarchy Process (AHP), proposed by Saaty (Citation1980) was used.

The Analytic Hierarchy Process (AHP) is a useful tool for analyze complex decision-making and to set priorities and make the best decision, by reducing complex decisions to a series of pairwise comparisons, and then synthesizing the results. In addition, the AHP incorporates a useful technique for checking the consistency of the decision maker’s evaluations, thus reducing the bias in the decision-making process. The computations made by the AHP are always guided by the decision maker’s experience, and the AHP can thus be considered as a tool that is able to translate the evaluations, both qualitative and quantitative, made by the decision-maker into a multicriteria (Table ).

Table 3. The fundamental scale of AHP

In order to compute the weights for the different criteria, the AHP starts creating a pairwise comparison matrix A nxn where n is the number of criteria considered and a ij is the numeric value resulting from the comparison between the criteria i and j. The value a ij > 1 when the criterion i is more important than the criterion j, while a ij < 1, when the criterion i is less important than the criterion j. If two criteria have the same importance, then the value of a ij is equal to 1. The following constraints applies:(6) aij·aji=1(6)

and(7) aii=1foralli(7)

Paired comparison judgments in the AHP are applied to pairs of homogeneous elements. The fundamental scale of values to represent the intensities of judgments is shown in Table . This scale has been validated for effectiveness, not only in many applications by a number of people, but also through theoretical justification of what scale one must use in the comparison of homogeneous elements (Saaty & Vargas, Citation2012).

Table 4. Average random consistency index (R.I.)

Obtained the pairwise comparison matrix A, to calculate the criteria weighing vector it is necessary to determine the maximum eigenvalue λ max and its v λ eigenvector. Normalizing the eigenvector v λ so that the sum of its elements is equal to 1 it is possible to obtain the percentage weight.

The measure of inconsistency can be used to successively improve the consistency of judgments. The consistency index of a matrix of comparisons is given by C.I. = (λ max − n)/(n − 1). The consistency ratio (C.R.) is defines as:(8) C.R.=C.I.R.I.(8)

It is obtained by comparing the C.I. with the appropriate one of the following set (Table ). If it is not less than 0.10, it is necessary to revise the judgments. The AHP includes a consistency index for an entire hierarchy. An inconsistency of 10 percent or less implies that the adjustment is small compared to the actual values of the eigenvector entries (Saaty & Vargas, Citation2012).

Below Tables and with the assignment of weights, according to AHP approach.

Table 5. IVIIC structure and weights

Table 6. IVIPD structure and weights

It should be noted that:

with regard to alarm systems and video surveillance they refer to the perimeter alarm systems along fences and security doors at the entrance of the artifacts and video surveillance systems in the external and internal areas of the works;

regarding S.C.A.D.A. systems they will need to take:

o

probes with a continuous measurement of all or some of the following parameters: turbidity, conductivity, pH, residual chlorine, redox potential, TOC (Total Organic Carbon), UV absorbance (Istituto Superiore di, Citation2005);

o

electromechanical valves, on which both routine and emergency actions can be performed, in order to prevent contaminated water from reaching the consumer;

regarding S.C.A.D.A. systems in the distribution network they will adopt:

o

electromechanical valves to act on to perform both routine and emergency actions, in order to prevent contaminated water from reaching the user;

regarding the position and access of the intake structures and the distance from the shore, they are to be understood in relation to the difficulties of access and reachability;

regarding navigability, it is to be referred to lower accessibility, in case of a non-navigable lake;

with regard to the tanks of biological monitoring, in more important plants, it is to be referred to the presence of monitoring tanks that use fish of the salmonid family such as, for example, the rainbow trout (Istituto Superiore di Sanità, Citation2005);

as regards rapid tests, they refer to the possibility of performing in situ tests for the detection of numerous toxic agents that can be either biological or chemical agents (Istituto Superiore di Sanità, Citation2005).

It should be also noted that in a water system more components of the same type but with different characteristics corresponding to different values of the indicators may be present. A water system, in fact, can be constituted by a certain number n of springs, wells, tanks, etc. In this case, made the first aggregation at the elementary indicators level for each of the n components of the same type, the value to consider for the subsequent phase of aggregation is obtained by performing a weighted mean with respect to the value of a homogeneous element related to that type of component. In particular:

-

weighted average compared to the flow rates of each intake structure

-

weighted average compared to the percentage of length in the case of pipelines

-

weighted average, compared to the percentage of the number of works with the same characteristics in the case of valves and wells

-

weighted average compared to the percentage of raised flow/drinkable by each plant in the case of pump station and water treatment plant

-

weighted average compared to the percentage of water volumein the case of tanks and dividers.

The value of IVIIC and IVIPD varies between 0 and 1. The value of IVI is calculated as described in equation 1.

As regards the relative importance of the two sub-indices it is to be noted that contaminant threats are generally identified as the primary threat to water systems. While disruption of water service due to some type of physical destruction is often identified, most studies rank such denial of service or disruption-based attacks below those of contamination, both in terms of magnitude of impact (cost and public health) and the length in time of the disruption (Clark & Hakim, Citation2014).

On the basis of such consideration, the values assigned to w IC and w PD are:

(9) wIC=0.6;wPD=0.4(9)

The value of IVI varies between 0 and 1. The values of IVI have then been clustered in the following 3 categories:

High vulnerability (0 < IVI ≤ 0.33)

Medium vulnerability (0.33 < IVI ≤ 0.66)

Low vulnerability (0.66 < IVI ≤ 1)

3. Application of the infrastructure vulnerability index in the province of Crotone

With reference to the Infrastructure Vulnerability Index described above, a first application was made in the province of Crotone, region Calabria, Southern Italy. In particular three drinking water systems have been taken as a reference: one small, one medium and one large. The systems size refers to the complexity and territorial extension of the infrastructures. This application was carried out to validate the index and to demonstrate its usefulness in planning of management strategies to prevent and reduce the vulnerability of water systems against possible terrorist attacks.

The first water scheme is the “Neto” scheme that serves a total of approximately 68,000 inhabitants. This system consists of:

-

An intake structure on the river Neto

-

About 120 km of pipelines in hard materials such as prestressed concrete, steel, cast iron, and only 2 in HDPE (conveyance);

-

2 water treatment plant;

-

8 underground reinforced concrete dividers;

-

18 underground concrete tanks;

-

11 networks for a total length of about 184 km, of different materials (steel, cast iron and HDPE), 1 long network 10 km in asbestos-cement;

-

There are no SCADA systems;

The second water scheme is the scheme named “Pulitrea-Sila Badiale” serving a total of about 9300 inhabitants. This scheme comprises:

-

4 sources

-

about 60 km of steel conveyance

-

10 underground reinforced concrete dividers

-

12 underground concrete tanks

-

10 steel and cast iron networks.

-

There are no SCADA systems.

The third water system is the scheme named “Lese-Lipuda” serving approximately 52,000 inhabitants. This scheme comprises:

-

1 source, 1 well, 1 river intake structure

-

1 treatment plant

-

about 167 km of conveyance

-

43 dividers

-

27 underground concrete tanks

-

20 steel and cast iron networks.

There are no SCADA systems.

The following Tables , and synthetically show the obtained results for sub-index IVIIC and sub-index IVIPD for the three schemes.

Table 7. Results for “Neto” scheme

Table 8. Results for “Pulitrea—Sila Badiale” scheme

Table 9. Results for “Lese-Lipuda” scheme

By applying the above procedure to the three water schemes, the values of IVIIC and IVIPD obtained are the following (Table ):

Table 10. IVIIC and IVIPD for the three schemes

By applying Equation (1), the values of IVI obtained for the three schemes are (Table ):

Table 11. Infrastructure Vulnerability Index IVI for the three schemes

The results obtained reflect the condition of vulnerable water schemes as the systems are not provided with alarm systems nor with video surveillance, nor with SCADA systems, and are also vulnerable to the effect of absence of other elements such as reinforced doors and valves with self-locking bolts (Table ).

The application of the index to the three drinking water supply systems was conducted with the following objectives:

-

Test the index to assess its applicability, the degree of complexity of the phase of collection and organization of input data, the computational burden, and to bring out any critical issues;

-

Demonstrate the ability of managers to use this index to compare different water schemes in relation to their degree of vulnerability in order to identify the schemes that require intervention priority;

-

Demonstrate the usefulness of the index in the evaluation of the infrastructural elements of a single drinking water system that most affect the level of overall vulnerability in order to direct investments especially in conditions of budget constraints;

-

Demonstrate the ability to easily use this index to generate user-driven scenario, for example, to make assessments of the effects of possible interventions on the level of vulnerability.

Regarding the first point, the application made to the three water schemes has demonstrated the feasibility of the index and no critical issues have emerged; the collection of input data is obviously linked to the degree of complexity of the water scheme analyzed but the data are easily available, especially in case of managers having an adequate information system, and the computational burden were not excessive.

In the case of the province of Crotone the three water systems are managed by a single manager; this allowed to demonstrate the usefulness of the proposed index with respect to the possibility for manager to compare and classify the systems by vulnerability level and to make assessments on water schemes that need priority actions. The results obtained for the three systems analyzed show a particular situation as they have the same levels of vulnerability; in this case manager should program interventions on all three water systems or, depending on the financial availability, could make evaluations on the priority of interventions considering the hierarchy of values obtained (even if referring to the same category of vulnerabilities) or other elements as, for example, the population size served by the systems.

Regarding the third point, from the analysis of the results described above, it is possible to highlight the elements which have greater impact on the vulnerability of each systems. For the three systems analyzed these elements are similar; regarding the intentional contamination, for each of the three systems, the element which has greater impact is principally the storage due for the absence of reinforced doors, alarm and video surveillance systems, SCADA, rapid tests. Other elements are the absence of well plate with closure and self-locking bolts for valves (conveyance and distribution) and the absence of fence, alarm and video surveillance systems and Scada for pump station and finally the river intake and treat where present. Regarding IVIPD, distribution and conveyance are the elements which most influence the vulnerability value. Other elements of minor impact on the vulnerability of the system are storage, river intake and treat.

Finally, to demonstrate the ability to easily use this index to generate user-driven scenario, the variation of the Infrastructure Vulnerability Index was evaluated in relation to some possible corrective interventions for the “Neto” scheme. The considered interventions are:

-

insertion at the river intake structure of an alarm system and video surveillance

-

insertion at the pump station of a reinforced door, an alarm system and video surveillance

-

insertion at the water treatment plants of a reinforced door, an alarm system and video surveillance

-

insertion at tanks and dividers of reinforced doors.

By performing these actions, the sub-index IVIIC assumes the value of IVIIC = 0.332, the sub-index IVIDP assumes the value of IVIDp = 0.378. The Infrastructure Vulnerability Index assumes the value of IVI = 0.35, medium vulnerability. The cost needed for these interventions is approximately € 70,000. Considering the number of users served by this water scheme, it can be considered to be definitely convenient to carry out the interventions and increase the security level of the system.

4. Conclusion

Safety in drinking water distribution systems is increasingly important in relation to the increase of threats of possible terrorist attacks. The approach requires tools for assessing the vulnerability of systems with respect to terrorist actions in order to plan interventions of prevention.

This paper proposes an index of vulnerability, IVI, which analyzes the vulnerability of drinking water supply systems with reference to infrastructural aspects and in relation to the presence of elements that delay/deter a terrorist act, or allow rapid detection of the act. The proposed index intends to provide a framework of critical components of drinking water systems. The index developed is a deterministic-comparative type and allows to analyze the vulnerability levels of different water supply systems.

The proposed index allows to assess the infrastructural vulnerability of water systems to possible terrorist acts, considering both the aspect of intentional contamination and the aspect of physical damage to the works. The index presents a fast calculation procedure with low computational cost and does not require a large amount of information.

The application carried out for three water schemes made it possible to test the index and to evaluate its practical use. The results obtained have shown that this index can be considered a useful tool for the managers because it allowed to compare, without excessive computational burdens and difficulties in the collection of input data, the degree of vulnerability of different water systems. The application also made it possible to assess the structural elements of the individual systems that require priority actions to reduce the level of vulnerability. The application has also allowed to highlight how even the few and not prohibitively expensive structural interventions, in economic terms, can increase the security of existing systems. For the construction of new systems, however, it is important to take safety aspects into account in the design phase.

This index, therefore, can be used by the managers but also by all the stakeholders of the sectors, to make estimates and comparisons of the vulnerability of the various systems, to make rapid assessments of the effects, in terms of vulnerability, of possible interventions to be implemented on the systems, to guide technical and investment choices for enhancement of the infrastructure in order to lower vulnerability.

Funding

The research was supported by Italian Regional Project (POR CALABRIA FESR 2014–2020)—Innovation and Competitiveness (I&C)—project: origAMI – original Advanced Metering Infrastructure.

Additional information

Notes on contributors

M. Maiolo

M. Maiolo is associate professor at the Department of Environmental and Chemical Engineering, University of Calabria. His research interests are related to sustainable management of water resources, optimization of water resource management, hydraulic and maritime engineering, with specific experience in drinking water risk, drinking water consumption, drinking water supply systems. He is coordinator of Italian Regional Project (POR CALABRIA FESR 2014–2020)—Innovation and Competitiveness (I&C)—project: origAMI—original Advanced Metering Infrastructure.

D. Pantusa

D. Pantusa received the degree in Civil Engineering in 2002 from University of Calabria and her PhD degree from University of Calabria in 2007. She is currently Research Associate at the Department of Innovation Engineering, University of Salento. Her research activity is mainly focused on sustainable management of water resources, drinking water risk, drinking water supply systems, optimization of water resource management, drinking water consumption, hydraulic and maritime engineering.

References