water system security...for and responding to drinking water contamination threats and incidents...
Post on 21-Jan-2021
2 Views
Preview:
TRANSCRIPT
Water System Security
Drinking Water Advisory CommitteeSeptember 11, 2017
Gregory B. McKnight IIEmergency Response Planner
1
Office of Drinking Water’s Mission
We work with others to protect the health of the people of Washington State by ensuring safe and reliable drinking water.
2
3
What is Suspicious Behavior?
• Occasionally, summer is a time for some school-age youth to engage in mischief
• How do you tell if it is
– Misguided youth?
– A group or individuals intent on harming your water customers?
4
• Are they
– Not normal to the area?
– Overly interested in things most people don’t care about?
• What equipment do they have?
– Camera, bolt cutters, ladders, maps, diagrams.
• Repeat visits?
What is Suspicious Behavior? (Continued)
5
Have You Used These?
• EPA Response Protocol Toolbox: Planning for and Responding to Drinking Water Contamination Threats and Incidents
• Threat Evaluation Worksheet
• Website link: Planning for and Responding to Drinking Water Contamination Threats and Incidents
6
Have You Seen Me?
7
Question?
• What makes you less of a target?
8
9
Security Tips
• A plan for addressing physical security.
10
Physical Security Elements
• Access control
• Closed Circuit TV
• SCADA security
• Building elements
• Hatches and vents
• Online monitoring
• Operator devices
• Fill-line locks
• Hydrants
• Manholes
• Fencing
• Gates
• Site areas
• Facility entrances
• Vehicle barriers
• Exterior surfaces
• Security lighting
• Signage
• Electronic security
11
What About Staff?
• Your best course of action is to recognize anything out of place.
• Employees should practice awareness.
– Unusual site changes (vegetation, abandoned vehicles).
– Out-of-place damage.
12
• Always contact your local law enforcement for all breaches to your water system.
• Cameras could help expedite the clearing of the water asset.
– It gives a better comparison of vandals versus those intent on harming your customers.
• Prioritize those areas of your watershed that need additional fencing or barriers.
13
• Perform a “paper” review of interties, MOUs and other alternate water asset.
– An intrusion may require taking a water asset “off line” or isolation, until cleared by laboratory analysis. This could require getting water from another source.
– Be prepared to know what is needed to “activate” those alternate resources.
– This also helps prepare for water loss incidents, such as those from natural hazards such as drought, flood, etc.
14
• Develop and use normal operations and maintenance sampling to develop seasonal or quarterly characterization/profiles of your water system.
• This creates a background characterization of your water system. Having this to compare your results could expedite bringing your water resource back online quicker.
top related