Environmental Engineering Reference
In-Depth Information
3. Coordinate actions for an effective emergency response.
a. Review existing emergency response plans, and ensure they are
current and relevant.
b. Make sure employees have necessary training in emergency
operating procedures.
c. Develop clear protocols and chains of command for reporting
and responding to threats with relevant emergency, law enforce-
ment, environmental, public health officials, consumers, and the
media. Practice the emergency protocols regularly.
d. Be sure that key utility personnel (both on and off duty) have
access to crucial telephone numbers and contact information at
all times. Keep the call list up to date.
e. Develop close relationships with local law enforcement agen-
cies, and make sure they know where critical assets are located.
Request they add your facilities to their routine rounds.
f. Work with local industries to ensure that their pretreatment
facilities are secure.
4. Invest in security and infrastructure improvements.
a. Assess the vulnerability of distribution systems, major pumping
stations, water treatment plants, chemical and fuel storage areas,
outfall pipes, and other key infrastructure elements.
b. Assess the vulnerability of the stormwater collection system.
Determine where large pipes run near or beneath government
buildings, banks, commercial districts, or industrial facilities or
are contiguous with major communication and transportation
networks.
c. Move as quickly as possible to make the most obvious and cost-
effective physical improvements, such as perimeter fences, secu-
rity lighting, tamperproof manhole covers and valve boxes, etc.
d. Improve computer system and remote operational security.
e. Use local citizen watches.
f. Seek financing for more expensive and comprehensive system
improvements
Ideally, in a perfect world, water infrastructure would be secured in a
layered fashion (i.e., the multibarrier approach ). Layered security systems are
vital. Utilizing the protection-in-depth approach, which requires that adver-
saries defeat several protective barriers or security layers to accomplish their
goal, water infrastructure can be made more secure. Protection in depth is a
term commonly used by the military to describe security measures that rein-
force one another and mask the defense mechanisms from view of intruders,
thus allowing the defender time to respond to intrusion or attack.
Search WWH ::




Custom Search