Download Free A Review Of The Epa Water Security Research And Technical Support Action Plan Book in PDF and EPUB Free Download. You can read online A Review Of The Epa Water Security Research And Technical Support Action Plan and write the review.

The report examines a draft plan, prepared by the Environmental Protection Agency, that identifies critical security issues for drinking water and wastewater and outlines related research and technical support needs. This report recommends increased attention to interagency coordination and encourages additional consideration of current restrictions on secure information dissemination. It further suggests that EPA incorporate the results of their research activities into an integrated water security guidance document to improve support for water and wastewater utilities.
The report examines a draft plan, prepared by the Environmental Protection Agency, that identifies critical security issues for drinking water and wastewater and outlines related research and technical support needs. This report recommends increased attention to interagency coordination and encourages additional consideration of current restrictions on secure information dissemination. It further suggests that EPA incorporate the results of their research activities into an integrated water security guidance document to improve support for water and wastewater utilities.
Concern over terrorist attacks since 2001 has directed attention to potential vulnerabilities of the nation's water and wastewater systems. The Environmental Protection Agency (EPA), which leads federal efforts to protect the water sector, initiated a research program in 2002 to address immediate research and technical support needs. This report, conducted at EPA's request, evaluates research progress and provides a long-term vision for EPA's research program. The report recommends that EPA develop a strategic research plan, address gaps in expertise among EPA program managers and researchers, and improve its approaches to information dissemination. The report recommends several high-priority research topics for EPA, including conducting empirical research in behavioral science to better understand how to prepare people for water security incidents.
The 9/11 attacks have drawn attention to the security of many institutions, facilities, and systems in the U.S., incl. the nation¿s water supply and water quality infrastructure. These systems have long been recognized as being potentially vulnerable to terrorist attacks of various types, including physical disruption, bioterrorism/chem. contamination, and cyber attack. Damage or destruction by terrorist attack could disrupt the delivery of vital human services in this country, threatening public health and the environment, or possibly causing loss of life. This report presents an overview of this large and diverse sector, describes security-related actions by the government and private sector since 9/11, and discusses additional policy issues and responses. Illus.
The Klamath River basin, which spans parts of southern Oregon and northern California, has been the focus of a prominent conflict over competing uses for water. Management actions to protect threatened and endangered fish species in the basin have left less water available for irrigation in dry years and heightened tensions among farmers and other stakeholders including commercial fishermen, Native Americans, conservationists, hunters, anglers, and hydropower producers. This National Research Council book assesses two recent studies that evaluate various aspects of flows in the Klamath basin: (1) the Instream Flow Phase II study (IFS), conducted by Utah State University, and (2) the Natural Flow of the Upper Klamath Basin study (NFS), conducted by the U.S. Bureau of Reclamation (USBR). The book concludes that both studies offer important new information but do not provide enough information for detailed management of flows in the Klamath River, and it offers many suggestions for improving the studies. The report recommends that a comprehensive analysis of the many individual studies of the Klamath river basin be conducted so that a big picture perspective of the entire basin and research and management needs can emerge.
Following the events of 9/11, the Administrator of the US Environmental Protection Agency created the Water Protection Task Force (WPTF), which identified water and wastewater systems as a major area of vulnerability to deliberate attack. The WPTF suggested that there are steps that can be taken to reduce these vulnerabilities and to make it as difficult as possible for potential saboteurs to succeed. The WPTF recommended that be scrutinized with renewed vigor to secure water and wastewater systems against these possible threats. It also recommended that water and wastewater systems have a response plan in place in the event an act of terrorism occurs. The WPTF identified water distribution networks as an area of special vulnerability and highlighted the need for rapid on-line detection methods that are accurate and have a wide detection range. As a result of these recommendations novel technologies from various fields of science and engineering are now addressing water security issues and water and wastewater utilities are looking for innovative solutions. Once such technologies are available, there will be a rapid implementation process that will present many business opportunities for the private sector. However, in addition to terrorist threats water and wastewater systems are inherently vulnerable to natural disasters such as earthquakes and floods. This volume will address the problems associated with both intended terrorist attacks and natural disasters affecting water or wastewater systems. The book is divided into parts based on the kinds of threats facing water and wastewater systems: (1) a direct attack on water and wastewater infrastructure storage reservoirs, and distribution and collection networks; (2) a cyber attack disabling the functionality of the water and wastewater systems or taking over control of key components which might result in system failures; and (3) a deliberate chemical or biological contaminant injection at one of the water distribution system’s nodes. It will examine unique plans, technological and managerial innovations for protecting such systems, and includes descriptions of projects that were implemented to respond to natural disasters. Case studies are presented that discuss existing projects and evaluate their performance, with an emphasis on providing guidelines and techniques that can be implemented by water and wastewater planners and managers to deal with natural and manmade disasters should they occur.
America is a target; the homeland is under threat. While Americans have been targets of terrorist attacks for quite some time, September 11, 2001, awoke the nation to the reality that we are vulnerable in our homes, our places of work and worship, and our means of public transportation. And yet, we must continue to function as best we can as the world's most vibrant economic and political community. The current threat environment requires greater engagement with the public, as the necessary eyes and ears of the nation's homeland security infrastructure. However, to be effective, the public must be equipped with the knowledge of where and why specific locations and activities may be a terrorist target, what is being done to protect those targets, and how they can help. This three-volume set answers that need. The chapters of each volume of Homeland Security revolve around a core of central questions. Are we safer today than we were pre-9/11? What steps have been taken in all these areas to protect ourselves? What are the threats we face, and what new threats have developed since 9/11? Are we staying one step ahead of those who wish to do us harm? In 2002, more than 400 million people, 122 million cars, 11 million trucks, 2.4 million freight cars, and 8 million containers entered the United States. Nearly 60,000 vessels entered the United States at its 301 ports of entry. Clearly the amount of activity this represents will require a long-term commitment to innovation, organizational learning, and public vigilance to complement an already overstretched network of government agencies and security professionals.