No technology can eliminate all vulnerabilities, but prudent application of current knowledge and future research advances in science and technology remains a wise investment. The Office of Water also provides tools and training to help utilities plan for and practice responses to emergencies, offers technical and financial assistance to utilities to support security initiatives, develops outreach materials, and supports information sharing mechanisms EPA, a.
Additionally, the Office of Water works to develop laboratory capabilities and promote monitoring and detection capacities for drinking water systems under Homeland Security Presidential Directive HSPD 9 see Box Its mission is to:. Most of these research products are intended. The overall goal was to develop and provide useful tools and technologies to water system managers that would help them protect drinking water and wastewater systems. To achieve this broad goal, the EPA organized the Action Plan and its research projects around the following seven specific issues:.
- 35 For Two: Original Comedy Scenes.
- The Everyday Guide to Stress Management And Living More Relax Life;
- IN ADDITION TO READING ONLINE, THIS TITLE IS AVAILABLE IN THESE FORMATS:;
- Terrorism Threat to U.S. Water Infrastructure | tradganpnanriacrib.gq.
- The Resurrection of the Body.
In , the United States Policy on Counterterrorism required all federal agencies to plan for terrorist attacks and designated the EPA to provide environmental response support. The Public Health Security and Bioterrorism Preparedness and Response Act signed in required the EPA to review: 1 methods to prevent, detect, and respond to the intentional introduction of chemical, biological, or radiological contaminants into community water systems and their source waters and 2 methods by which terrorists or other individuals or groups might disrupt the supply of safe drinking water by interfering with conveyance, collection, treatment, and storage facilities or with cyber infrastructure.
It also required the EPA to provide community water systems those that serve over 3, people with baseline information needed to conduct vulnerability assessments and to provide general security guidance to smaller water systems. The National Strategy for Homeland Security sought to define the goals of homeland security and the roles of the federal executive branch, nonfederal governments, the privatesector, and citizens in achieving them.
About RAND Reports
Each critical infrastructure sector is assigned a lead federal agency primarily responsible for coordinating security efforts, and the strategy designated the EPA as the lead agency for the water sector. A Strategic Plan for Homeland Security EPA, was subsequently developed to ensure that the EPA met its traditional mission of protecting the environment and safeguarding human health while additionally addressing its new homeland security responsibilities. The EPA is accordingly responsible for establishing collaborations among federal departments and agencies, state and local governments, and the private sector.
The EPA was also tasked to facilitate the evaluation of vulnerabilities of water systems and to encourage risk management strategies to prevent or mitigate the effects of attacks against critical water infrastructure. HSPD assigns the EPA the responsibility of developing strategies, guidelines, and plans for decontamination, remediation, and cleanup of contamination events, including those involving the water system. The work identified in the Action Plan has been conducted in partnership with several water-related professional organizations in the private sector and with other federal agencies.
The Action Plan does not attempt to incorporate research and development efforts outside of those funded by the EPA, such as work conducted by private industry. The products of the Action Plan to date have largely focused upon making compilations of existing data available to water infrastructure customers through various media e. The NHSRC also conducts applied research to address data gaps and develop new methods and tools, but the practical needs of water infrastructure stakeholders remain the driving force behind all of these initiatives.
Herrmann, EPA, personal communication, The EPA was approaching the end of the planning time frames originally developed in the Action Plan, and this second NRC study was motivated in large part by the shift in status of the NHSRC from temporary to permanent and the accompanying need to address strategic planning for long-term research. To address its task, the committee held five meetings between January and May The committee examined relevant EPA documents both public and classified documents that had been published by May and related scientific literature.
Therefore, much of the review of progress was based on oral and written progress reports e.
The committee issued a letter report in November , highlighting immediate opportunities for water security research in the aftermath of Hurricane Katrina NRC, ; see Appendix A. The report is presented in six chapters. This report was obtained by Wikileaks staff from CRS computers accessible only from Congressional offices.
- Truckies: Life Behind The Wheel;
- A Pack of Pink Cosmos Seeds, the Wide Ocean, and Most of the Cars at Wal-Mart: Haiku and Haibun for Kindle?
- Boston: The Jewish Travel Guide.
- D. Pantusa!
- God, guns and government on the Central Australian frontier!
- Most Popular;
- The Gay Icon Classics Of The World.
- 0Meta Navigation.
- The private sector is the key to success for the Department of Homeland Security.
- Undesirable Elements: Real People, Real Lives, Real Theater.
- The iPad for Photographers: Master the Newest Tool in Your Camera Bag.
- The Twins (Uncle Walter and Other Ghosts Book 7)!
For press enquiries, consult our media kit. If you have other confidential material let us know! For previous editions of this report, try OpenCRS. How to contact WikiLeaks?
Protecting vital water infrastructure
What is Tor? Tips for Sources After Submitting.
Contact us if you have specific problems If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. What computer to use If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Do not talk about your submission to others If you have any issues talk to WikiLeaks. Act normal If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion.
The Hidden Dangers in Your Phone Number
Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used. If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. Submit documents to WikiLeaks.
Copy this address into your Tor browser. Advanced users, if they wish, can also add a further layer of encryption to their submission using our public PGP key.
Shop Donate Submit. Leaks News About Partners. Jump to: navigation , search. The fiscal downstream effect of a deliberate act of sabotage would be multidimensional, reverberating through other sectors of the economy and ultimately impacting the consumer. The mechanics of dealing with an attack — especially the potential need for mass animal slaughter to contain a major disease outbreak — could certainly generate public criticism as it did during the foot and mouth epidemic in the United Kingdom.
Beyond the immediate economic and political impact, such attacks could also elicit fear and anxiety among the public.go here
NSHS - Protect the American People, Critical Infrastructure, and Key Resources
This would be particularly true in the event of a public health scare resulting from foodborne outbreaks or the spread of animal pathogens contagious to humans. Terrorists can choose from a large menu of bio-agents, most of which are environmentally hardy, are not the focus of concerted livestock vaccination programs, and can be easily smuggled into the country. The food chain offers a low-tech mechanism for achieving human deaths. Many animal pathogens cannot be transmitted to humans, which makes them easier for terrorists to work with.