lastID = -289490
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2022-05-06 20:24:55 Adam Phillips
  • 2022-05-06 20:24:53 Adam Phillips
  • 2020-03-27 02:15:29 Adam Phillips
  • 2020-03-27 02:15:28 Adam Phillips
  • 2020-02-01 04:51:31 Administrator
  • 2020-02-01 04:51:30 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)

TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)

TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)
Abstract
One of the things we all shutter about in this industry is the possibility that a terrorist act will affect our water supply or our wastewater treatment facility. Water resources are a natural target of terrorists who want to bring a community to a standstill, affecting virtually everyone in the area. For this reason, water and wastewater utilities are key targets and must take every reasonable precaution to prevent such an occurrence.This is an unthinkable situation where somebody taints our supply, distribution, or treatment system, causing an illness or even death to our customers. Another possibility is someone tainting the treatment efficiency of a wastewater treatment plant, thereby tainting the environment—leading to drastic environmental effects.The keys to avoidance of terrorist acts are first, deterrence, and second, early detection of something happening—detection in real time.The best way to know what's happening is to integrate video, audio, and data information from your SCADA (Supervisory Control and Data Acquisition) system with automatic monitoring so that you will know that something out of the ordinary is happening or has just happened. By monitoring video, audio, and numeric data associated with every possible access point within your water or wastewater system, you can avoid terrorist acts before they occur.This technology is available today and is very affordable. Using a systematic approach, it is within reach of all public utilities. The key is to approach your facility and processes systematically, ensuring that you analyze the critical data—what is really needed to detect any incursion at a public utility. Then you will be able to respond immediately—avoiding a catastrophe.Of course, an inspection of your facilities and an assessment of their accessibility are integral to the technology we will examine, and employee safety is as important as physical security. This presentation and paper will outline a systematic process to design a system that allows early detection of any incursion and allows for early response to avoid any kind of catastrophic event. The paper will illustrate the process of developing a plan, including the cost and the technology available to avoid such occurrences. We will also demonstrate the methods to balance what's probable and what's possible.Even a threat of contamination can cause a widespread panic, so do yourself and your clients a favor, come and learn how to use technology to solve tomorrow's biggest problem today!
One of the things we all shutter about in this industry is the possibility that a terrorist act will affect our water supply or our wastewater treatment facility. Water resources are a natural target of terrorists who want to bring a community to a standstill, affecting virtually everyone in the area. For this reason, water and wastewater utilities are key targets and must take every reasonable...
Author(s)
Alan Manning
SourceProceedings of the Water Environment Federation
SubjectSession 15: Top Management Issues
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2002
ISSN1938-6478
SICI1938-6478(20020101)2002:4L.460;1-
DOI10.2175/193864702785301754
Volume / Issue2002 / 4
Content sourceUtility Management Conference
First / last page(s)460 - 465
Copyright2002
Word count402

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)
Pricing
Non-member price: $11.50
Member price:
-289490
Get access
-289490
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)
Abstract
One of the things we all shutter about in this industry is the possibility that a terrorist act will affect our water supply or our wastewater treatment facility. Water resources are a natural target of terrorists who want to bring a community to a standstill, affecting virtually everyone in the area. For this reason, water and wastewater utilities are key targets and must take every reasonable precaution to prevent such an occurrence.This is an unthinkable situation where somebody taints our supply, distribution, or treatment system, causing an illness or even death to our customers. Another possibility is someone tainting the treatment efficiency of a wastewater treatment plant, thereby tainting the environment—leading to drastic environmental effects.The keys to avoidance of terrorist acts are first, deterrence, and second, early detection of something happening—detection in real time.The best way to know what's happening is to integrate video, audio, and data information from your SCADA (Supervisory Control and Data Acquisition) system with automatic monitoring so that you will know that something out of the ordinary is happening or has just happened. By monitoring video, audio, and numeric data associated with every possible access point within your water or wastewater system, you can avoid terrorist acts before they occur.This technology is available today and is very affordable. Using a systematic approach, it is within reach of all public utilities. The key is to approach your facility and processes systematically, ensuring that you analyze the critical data—what is really needed to detect any incursion at a public utility. Then you will be able to respond immediately—avoiding a catastrophe.Of course, an inspection of your facilities and an assessment of their accessibility are integral to the technology we will examine, and employee safety is as important as physical security. This presentation and paper will outline a systematic process to design a system that allows early detection of any incursion and allows for early response to avoid any kind of catastrophic event. The paper will illustrate the process of developing a plan, including the cost and the technology available to avoid such occurrences. We will also demonstrate the methods to balance what's probable and what's possible.Even a threat of contamination can cause a widespread panic, so do yourself and your clients a favor, come and learn how to use technology to solve tomorrow's biggest problem today!
One of the things we all shutter about in this industry is the possibility that a terrorist act will affect our water supply or our wastewater treatment facility. Water resources are a natural target of terrorists who want to bring a community to a standstill, affecting virtually everyone in the area. For this reason, water and wastewater utilities are key targets and must take every reasonable...
Author(s)
Alan Manning
SourceProceedings of the Water Environment Federation
SubjectSession 15: Top Management Issues
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2002
ISSN1938-6478
SICI1938-6478(20020101)2002:4L.460;1-
DOI10.2175/193864702785301754
Volume / Issue2002 / 4
Content sourceUtility Management Conference
First / last page(s)460 - 465
Copyright2002
Word count402

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Alan Manning. TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D). Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 6 Jun. 2025. <https://www.accesswater.org?id=-289490CITANCHOR>.
Alan Manning. TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D). Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed June 6, 2025. https://www.accesswater.org/?id=-289490CITANCHOR.
Alan Manning
TERRORISM: HOW TO USE TECHNOLOGY TO DETER AND DETECT (D&D)
Access Water
Water Environment Federation
December 22, 2018
June 6, 2025
https://www.accesswater.org/?id=-289490CITANCHOR