*<****•»*
           OFE'ICE OI:> INSPECTOR GENERAL
n/
    Evaluation Report
           Survey Results on
           Information Used by
           Water Utilities to Conduct
           Vulnerability Assessments
           Report No. 2004-M-0001
           January 20, 2004

-------
Abbreviations




AWWA




CDC




DHS




DWG




EPA




FBI




Water-ISAC




NRWA




SCADA
American Water Works Association




Centers for Disease Control and Prevention




Department of Homeland Security




Domestic Working Group




Environmental Protection Agency




Federal Bureau of Investigation




Water Information Sharing and Analysis Center




National Rural Water Association




Supervisory Control and Data Acquisition

-------
                      UNITED STATES ENVIRONMENTAL PROTECTION AGENCY
                                    WASHINGTON, D.C. 20460
                                                                            OFFICE OF
                                                                         INSPECTOR GENERAL
                                    Januaiy 20, 2004
MEMORANDUM

SUBJECT:   Survey Results on Information Used by Water Utilities to Conduct Vulnerability
             Assessments

FROM:      Jeffrey K. Harris  M
             Director for Program Evaluation, Cross-Media Issues

TO:          Benjamin Grumbles
             Acting Assistant Administrator for Office of Water
Recent terrorist activities and incidents such as the blackout in the midwest and northeast United
States have demonstrated the crucial role of water sector infrastructures in the health and
economic well-being of the Nation.  The Environmental Protection Agency (EPA) is the lead
Federal agency for safe drinking water and for protecting the infrastructure mat supplies water.
While EPA has made efforts to prepare water utilities for dealing with terrorist activities, the
goal of a secure water supply needs the participation and coordination of water utilities with
Federal, State, and local agencies.

Recognizing that Federal, State, and local levels of government have a vested interest in water
security,  we suggested that the Domestic Working Group (DWG)1, an informal group of Federal,
State, and local auditors, develop a survey focusing on the security needs and tools of their local
water systems. The objective of the survey was to gather feedback on the usefulness of water
security information provided to utilities by EPA and other sources. Specifically, the survey
helped determine the following:

4     Did EPA and other Federal, State, and local agencies provide useful threat and risk
       information to water utilities to conduct vulnerability assessments as required by the
       Public Health Security and Bioterrorism Preparedness and Response Act of 2002
       ("Bioterrorism Act")?
       Individual DWG members volunteer to work on issues of common interest Bach organization conducts
work individually that forms the foundation for specific organization audits that can be compiled to support a more
generalized assessment or benchmark.

-------
4      What are the needs of utilities with regard to financial assistance, training, and procedural
       changes to improve security?

^      What information can be collected and analyzed by EPA that would depict changes in
       security levels at water utilities?

This report contains details on what we found regarding these questions, and we included the
survey itself in Appendix A, We provided this report to the Agency for comment and the
Agency did not provide a response.

If you or your staff have any questions, please call me at (202) 566-0831 or Fred Light at (913)
551-7528.

-------
                     Table of Contents
Sections
     Introduction	   1

     Usefulness of Information Provided by EPA and Others to Water Utilities  	   5

     Additional Security Concerns of Water Utilities  	  11

     Performance Indicators that EPA Could Use to
     Measure Improvements in Water Security Levels	  15

     Suggestions 	  16
Appendices
     A     Survey of Water Security	  17

     B     Distribution 	  27
        :                          Figures


     1:   Number and Locations of Utilities Surveyed	  4
     2:   Satisfaction with Threat Information	  6
     3:   Satisfaction with Detection Information	  7
     4:   Satisfaction with Delay Information	  8
     5:   Satisfaction with Response and Consequence Information	  9
     6:   Satisfaction with Remote Access Information	10
     7:   Number of Utilities That Would Like Additional Information 	11
     8:   Amount of Money Water Utilities Expect to Spend in the
         Next 12 Months on Security Improvements	12
     9:   How Water Utilities Plan to Pay for Security Improvements	13

-------

-------
 Introduction                                    \                                :

Members of the DWG surveyed their local water utilities regarding (1) the usefulness of water
security information in conducting vulnerability assessments, (2) remaining security needs, and
(3) potential measures to track progress in water security. Though the results of the DWG
survey cannot be interpreted as representing conditions within the water industry or the Nation
due to limitations of the sample, agencies overseeing efforts to enhance the security of the
Nation's drinking water infrastructure, such as EPA, may benefit from the observations. For
example, the survey shows that, while EPA and groups such as the American Water Works
Association (AWWA) provided useful information, the survey respondents most frequently
listed consultants hired by water utilities as providing useful information. This suggests a
possible disadvantage to smaller utilities which are required to complete vulnerability
assessments by June 2004 but, unlike larger utilities, may not be able to afford a consultant2

In addition, each of the utilities surveyed had concerns for water security that included: the
information available to assess vulnerabilities; the financing of security improvements; the level
of training assistance; EPA's research agenda; and the need for procedural changes.  For
example, the Water Information Sharing and Analysis Center (Water-ISAC)3 can provide
utilities useful threat information, but water utilities can only access Water-ISAC through a
subscription fee. Survey respondents also stated that they needed financial assistance for
necessary security enhancements, training exercises to prepare for actual events, and research to
detect contaminants in the distribution system.

The survey found that EPA could use the following performance indicators to measure changes
in water security levels:

1.  Length of time a water utility could provide water during or after a security incident.
2.  Detection  and response times.
3.  Ability to  detect contaminants in the water system.
4,  Ability to  detect attempted intrusions into the remote access system, commonly known as the
    Supervisory Control and Data Acquisition (SCADA) system.
       2EPA provided $53 million in grants to over 400 large water utilities that primarily used the grant money to
hire water security consultants to assist in conducting vulnerability assessments. EPA also provided $21 million in
grants to provide drinking water security training to over 8,000 small and medium water utilities.

       3The Association of Metropolitan Water Agencies developed the Water-ISAC with funding from EPA as an
information service to provide the Nation's drinking water systems with a secure Web-based environment for early
warning of potential threats and a source of knowledge about water system security. Water-ISAC analysts produce
and disseminate physical and cyber security information to the water sector relying on information gathered from
Federal intelligence, law enforcement, public health and environment agencies, and utility security incident reports.
Utilities access the Water-ISAC on a subscription fee basis.

-------
Background

The Nation's water supply serves as one of our most vital natural resources. Potential threats to
this resource include contamination with biological, chemical, or radiological agents, or damage
and destruction of Hie water system.  Despite concerns from industry and Congress that the
Federal government should not require specific approaches for water security, and that local
water utilities should develop solutions themselves, EPA plays an important role in the security
of the Nation's water supply. Presidential Decision Directive 63, issued in May 1998,
designated EPA as the lead agency for assuring the protection of the Nation's water
infrastructure. Homeland Security Presidential Directive / HSPD-7, issued in December 2003,
confirms EPA's role as the lead agency for drinking water and water treatment systems. The
terrorist attacks on September 11,2001, resulted in passage of the Bioterrorism Act and its
requirement mat water utilities conduct vulnerability assessments.4

Vulnerability assessments help water systems evaluate susceptibility to potential threats and
design response plans and corrective actions to lessen the risk of serious consequences.
Vulnerability assessments help determine how well water systems detect security problems and
stop or delay undesired events, as well as measure response capabilities.

EPA developed a Strategic Plan for Homeland Security ("Plan"), dated September 2002, which
states that EPA will work with the States, tribes, drinking water utilities, and other partners to
enhance the security of water utilities. The Plan articulates tactics to execute the Plan which
include the provision of tools, training, and technical assistance to help water utilities' conduct
vulnerability assessments, implement security improvements, and effectively respond to terrorist
events.

Scope and Methodology

To  learn about the usefulness of information water utilities received from EPA and other Federal,
State, and local agencies, the DWG developed, pre-tested, and administered a Survey of Water
Security (see Appendix A). We conducted our review in accordance with Government Auditing
Standards, issued by the Comptroller General of the United States.  Each DWG auditor
administered the survey to their local water utility,5 and the EPA Office of Inspector General
compiled the individual surveys and summarized the results in this report. Due to concerns
about releasing sensitive water utility information under a Freedom of Information Act request,
the DWG participants made an overt choice not to inquire about specific sensitive vulnerability
       4The Bioterrorism Act required that water utilities serving a population greater than 3,300 persons conduct
vulnerability assessments according to a utility's size. Water utilities serving 100,000 or more users had to conduct
their assessments by March 31,2003; mid-sized utilities serving between 50,000 and 99,999 users had to conduct
their assessments by December 31, 2003; and small utilities serving between 3,300 and 49,999 users must conduct
their assessments by June 30,2004.

        Six separate auditors conducted surveys at six different water utilities; one auditor conducted the seven
New York surveys; one auditor conducted two of the California surveys; and one water utility volunteered to provide
survey information, for a total of 16 surveys.

-------
information.  Six of the 22 water utilities decided not to participate in the survey due to concerns
regarding the release of information to the public.

Water utilities have a number of information sources available to assist them in conducting
vulnerability assessments. We asked utilities to provide an assessment of the usefulness of the
information obtained from the following sources:
                  4- Environmental Protection Agency (EPA}
                  4 Federal Bureau of Investigation (FBI)
                  4 Department of Homeland Security (DNS)
                  4 Centers for Disease Contra! and Prevention (CDC)         ;
                  * Other Federal Agencies
                  4 State Agencies
                  • Local Law Enforcement
                  4 Water Information Sharing and Analysis Center (Water-iSAC)
                  4 infrsGard*
                  • National Rural Water Association (NRWA)
                  4 American waterworks Association {AWWA}
                  4 Water Consultant Hired by Utility
                  * Water Security Expert
The survey requested information from water utilities in the following areas:

•   Usefulness of information obtained from EPA and other Federal, State and local agencies to
    conduct vulnerability assessments. The survey asked respondents to rate their satisfaction on
    a scale of "1" (Not Very Useful) to "5" (Very Useful).

•   Resources and training needed by water utilities. The survey asked respondents to provide
    needed information and resources to better improve the security of their water systems from
    terrorist attack.

•   Data and performance measures that could track changes in water security levels.  The
    survey asked respondents to provide suggestions for these measures.

Limitations of the Survey

It is important to note that the survey results represent only the opinions of 16 water utilities,
including seven from the State of New York, and should not be generalized to represent all water
utilities nationally. We analyzed the survey data and did not find that the seven utilities from
New York State provided similar responses which would have disproportionately influenced the
results. In addition, the performance indicators suggested may not be comprehensive since they
       ^nftaGard is an information sharing and analysis effort led by the FBI and an association of businesses,
academic institutions, and State and local law enforcement agencies. InfraGard provides private sector infrastructure
owners and operators information about cyber intrusions, exploited vulnerabilities, and infrastructure threats.

-------
are based on a sample of utilities that may not have experience with performance measurement
and may have been influenced by Ihe examples in the survey.  While limited to 16 utilities, we
believe the survey results presented in this report could help EPA, other agencies, and water
utilities focus their efforts on the security issues identified. Also, State and local DWG auditors
may find the survey responses of particular interest given that they administered the survey and
may have oversight responsibilities for 1heir local water utilities.  It is not our intention to
critique the judgments of individual water utilities or sources who provided Ihe information.

Characteristics of the  Survey Population

The 16 water utilities surveyed in six States identified in Figure 1 represent various geographical
areas, size of populations served, and stages in the vulnerability and emergency response
process.

The utilities surveyed ranged in the size of populations served. Four utilities surveyed serve
small populations of 3,300 - 99,999 users, while 12 utilities surveyed serve large populations of
greater than 100,000 users.

Of the 16 utilities surveyed, 14 have completed the vulnerability assessment process, and 15
used consultants to assist in the preparation of vulnerability assessments. The remaining utility
represented the smallest survey respondent and the superintendent of its water plant conducted
their vulnerability assessment Six of the utilities have also completed their emergency response
plans. Only one of the utilities has completed implementing its security enhancements.
                    Figure 1: Number and Locations of Utilities Surveyed

-------
 Usefulness of information Provided fjy EPA and
The survey shows that a variety of sources provided useful information to help water utilities
prepare vulnerability assessments. Utilities cited consultants hired to assist in the preparation of
vulnerability assessments most frequently as sources that provided useful information. Small
utilities required to complete vulnerability assessments by June 30, 2004, may not be able to hire
consultants and could be disadvantaged.  Utilities also cited other sources - such as EPA,
AWWA, Water-ISAC, and local law enforcement - as providing useful information. However,
the survey results show mat utilities did not always obtain information from all possible sources.

As we reported in EPA Needs to Assess the Quality of Vulnerability Assessments Related to the
Security of the Nation's  Water Supply (Report No. 2003-M-00013), dated September 24, 2003,
vulnerability assessments follows a threat-driven process.  EPA was responsible for providing
adequate threat information to water utilities in order to prepare vulnerability assessments. EPA
did mis through a variety of methods. First, EPA provided $53 million toward grants to the
largest water utilities. Utilities primarily used the grants to hire water security consultants to
assist in conducting vulnerability assessments. EPA also provided $21 million in grants to
provide drinking water security  training to medium and small water utilities.  Further, EPA
utilized the Water-ISAC and the AWWA to provide threat information to water utilities.
According to the Bioterrorism Act, however, the responsibility for determining which threats to
protect against ultimately resides with each water utility.

We identified five key security activities or capabilities critiqued through the vulnerability
assessment process.
                           Threat Identification
                           Detection
                           Delay
                           Response and Consequence
                           Remote Access
Threat identification serves as the first step in the vulnerability assessment process. Threat
information is necessary to identify potential scenarios against which utilities should prepare,
For example, security preparations may differ for internal threats from disgruntled employees
versus external threats from vandals or terrorists. The next step in the vulnerability assessment
process determines how well a utility can detect a problem. This includes reviewing security and
monitoring features; for example, how quickly a utility discovered a contaminant in the
distribution system.  The third step measures the delay system. This involves an examination of
barriers such as gates, fences, locks, and walls. The next step measures response capabilities by
reviewing the capacity of the water utility in conjunction with Federal, State, and local
authorities to respond and neutralize the adversary. Another step for some utilities involves

-------
examining the remote access system, commonly known as the SCADA system. This involves
assessing the computer system to determine the ease at which someone could control the utility
remotely.

The following sections provide detailed information from the survey results on the usefulness of
the information provided to water utilities. Differences between the number of responses and
total number of utilities indicate that some utilities did not receive information from that source.
Two of the water utilities most frequently responded "not useful" or "not very useful" about the
information they obtained from EPA and other sources.

Many Sources  Provided Useful Threat Information

The survey shows that a variety  of sources provided useful threat information to help water
utilities prepare vulnerability assessments. The survey shows that respondents most frequently
cited consultants hired by water utilities and EPA as providing useful threat information.  Of the
16 water utilities surveyed, 13 responded favorably about information obtained from consultants
they hired, including five utilities that described the information they received as "very useful."
In addition, 12 of the 16 utilities responded that EPA provided useful threat information.
According to respondents, other sources of useful threat information included the Water-ISAC,
AWWA, water security experts, and local law enforcement agencies.
                       Figure 2: Satisfaction with Threat Information
D Not Very Useful
H Not Useful
El Neutral
M Useful
m Very Useful

-------
Consultants Provided Useful Detection Information
The survey responses show that, of the sources lhat provided detection information to water
utilities, respondents most frequently cited consultants hired by water utilities as providing
useful detection information.  Of the 16 water utilities, 13 responded favorably about information
obtained from consultants they hired, including five utilities lhat described the information they
received as "very useful." In addition to consultants, the AWWA, local law enforcement, Water-
ISAC, and EPA also provided useful detection information for five to seven of the utilities.
                      Figure 3; Satisfaction with Detection Information
                  D Not Very Useful Q Not Useful D Neutral D Usefulm Very Useful

-------
Consultants and the AWWA Provided Useful Delay Information

The survey responses show that, of the sources that provided delay information, respondents
most frequently cited consultants hired by water utilities and the AWWA as providing useful
delay information. Of the 16 surveys, 12 listed consultants hired by water utilities as having
useful information, including six utilities who ranked the information as "very useful."  In
addition to consultants, 10 utilities listed AWWA as having provided useful delay information.
Local law enforcement also provided useful delay information for six of the utilities.
                        Figure 4: Satisfaction with Delay Information
                  D Not Very Useful a Not Useful a Neutral D Useful m Very Useful

-------
Consultants and the AWWA Provided Useful Response and Consequence
Information

The survey responses show that, of the sources that provided response and consequence
information, respondents most frequently cited consultants hired by water utilities and the
AWWA as providing useful response and consequence information.  Of the 16 surveys, 11 listed
consultants hired by water utilities as having useful information, including five utilities who
ranked the information as "very useful." In addition to consultants, nine utilities listed AWWA
as providing useful response and consequence information.  State agencies also provided useful
response and consequence information for six of the utilities.
             Figure 5: Satisfaction with Response and Consequence Information
                 D Not Very Useful m Not Useful ji NeutralQ Useful^ Very Useful

-------
Consultants Provided Useful Remote Access Information

Many utilities use a remote access system, commonly known as SCAD A, to control operations.
The survey responses show that, of the sources that provided SCAD A information, respondents
most frequently cited consultants hired by water utilities as providing useful SCADA
information.  Of the 15 surveys,711 listed consultants hired by water utilities as having useful
information, including three utilities who ranked the information as "very useful."  In addition to
consultants, six utilities listed AWWA and five utilities listed Water-ISAC as providing useful
SCADA information.
                   Figure 6: Satisfaction with Remote Access Information
             Q Not Very Useful D Not Useful a Neutral D Useful H Very Useful
      7One utility did not have a SCADA system.
                                         10

-------
 Additional Security Concerns of Water Utilities                 v:

EPA's Strategic Plan for Homeland Security focuses on preparedness and prevention, assisting
those responsible for critical infrastructures in assessing and reducing vulnerabilities and
maximizing their response capabilities. EPA also intends to develop technologies to improve the
Nation's critical infrastructure and key responders' abilities to detect and monitor environmental
threats.  The survey asked questions to help determine utilities' technological needs. All of the
utilities surveyed had concerns for water security described in more detail below. The concerns
include:

•  additional information regarding vulnerabilities;
•  financing security improvements;
•  training assistance;
•  research; and
•  procedural changes.

Additional Information Needed by Utilities

The survey results show that water utilities still have a need for more information regarding
threats, detection assistance, delay, response and consequence mitigation, and SCADA (see
Figure 7).

             Figure 7: Number of Utilities That Would Like Additional Information
  t

  I-
  •5
  J> *
   E
                                  | B Some   BALot
        Threat Information   Detection Assistance
                                            Delay
Response
                                                                          SCADA
                                          11

-------
EPA fttnded the Water-ISAC to promote information sharing on water security. The Water-
ISAC claims to provide information to water utilities that serve 80 percent of all drinking water
customers.  Five of the utilities in our survey, however, responded that they want better access to
threat information, including access to the Water-ISAC database which is only available on a
subscription fee basis.  In addition, four utilities (including two medium sized utilities) did not
obtain threat information from the Water-ISAC. We do not know why the utilities did not obtain
threat information from the Water-ISAC.

Financial Assistance  Needed by Utilities

Utilities stated that they need financial assistance to make necessary security improvements. Of
the 16 utilities, 11 estimated that they would spend more than $100,000 during the next 12
months on water security improvements, including four utilities who plan to spend more than $1
million (see Figure 8).
        Figure 8: Amount of Money Water Utilities Expect to Spend in the Next 12 Months
                               on Security Improvements
                           10-49
                                         50-99
                                                     100-499
                                                                   500-999
                                                                                 >1,000
                                        H Dollars in Thousands
                                          12

-------
Of the 16 utilities, 11 stated that they may limit security improvements to those that they can
afford and/or budget as capital improvement projects. Several utilities stated that they would
issue bonds or raise water rates to cover the costs of security improvements (see Figure 9).
              Figure 9: How Water Utilities Plan to Pay for Security Improvements8
           Financial   EPA Drinking  State Financial  Increase Water   Issue Water      Limit     Future Capital
         Assistance from  Water State   Assistance     Rates     Utility Bonds   Improvements  Improvements
            EPA    Revolving Fund
                                                                                 Other
Seven of the 16 utilities responded that they needed financial assistance.  EPA has limited its
financial assistance to ensuring that drinking water utilities receive technical assistance and
training on vulnerability assessments and emergency response plans, but not funding for the
improvements themselves. Three utilities indicated that they plan to use EPA's Drinking Water
State Revolving Fund to help pay for security improvements. The survey results dp not indicate
whether the 13 utilities who do not plan on using the Drinking Water State Revolving Fund
realize that they can use the fund to provide assistance for implementing infrastructure-related
security measures.
        The survey allowed respondents to check more than one answer.
                                             13

-------
Training Needs

Of the 16 utilities, 14 described additional training that their employees needed to improve
security.  The training needs ranged from general seminars on security awareness to specific
training such as crime scene preservation.  Of the 16 utilities, 14 stated that they needed
additional training in emergency response, including identifying and detecting threats. Four of
the utilities stated that they wanted to conduct training exercises or drills to help them prepare
for actual security events.

Research Needs

Twelve utilities stated that they would like EPA to fund research on monitoring and detecting
contaminants.  The utilities stated that they would like to have real-time monitoring of water
systems to detect chemical and biological  agents, particularly in the distribution system, which
many experts view as the most susceptible to terrorist attack. One utility indicated that they
wanted EPA to provide rapid response lab analysis and sampling capabilities.

Procedural Changes Needed

Eight survey respondents stated that they would like to see specific procedural changes made to
improve security, while six stated that they did not want any changes.  Since no consensus
emerged about changes needed, the following list reflects the respondents' suggestions,
including those that would likely be addressed by State or local authorities:

•  Include security practices as part of water operations certification training.
•  Provide a time frame for renewing vulnerability assessments.
•  Change the rules governing the awarding and uses of Drinking Water State Revolving Fund
   loans and grants.
•  Establish security standards for water utilities.
•  Modify the Freedom of Information Act to protect sensitive information about water
   facilities.
•  Improve the ability to conduct background checks on employees.
•  Provide additional State police to respond to malevolent acts.
                                          14

-------
 Performance Indicators that EPA Could Use to Measure
 Improvements in Water Security Levels                          %;

In our report EPA Needs a Better Strategy to Measure Changes in the Security of the Nation's
Water Infrastructure (Report No. 2003-M-00016), dated September 11, 2003, we suggested that
EPA develop performance indicators to measure changes in water security. EPA stated that they
would welcome recommendations and assistance in this area.  In our survey, we asked water
utilities to respond to questions about performance indicators that could be used to measure
changes in water security. We used the input from the survey to develop the following
performance indicators which could be used to measure changes in water security levels.
    Length of time a water utility could provide water during or after a security incident

        Eleven of the utilities mentioned this type of performance indicator. This indicator would
        incorporate improvements made by water utilities such as adding storage facilities,
        interconnections, and emergency backup power sources.

    Detection and response times

        Twelve utilities mentioned this type of performance indicator. Water utilities could perform
        exercises with a variety of threat scenarios to determine the length of time to detect and
        respond to threats.  Utilities could atso use the driiis to determine whether employees utilized
        appropriate response procedures.

    Ability to detect contaminants in water system

        Ten utilities mentioned this type of performance indicator.  Detection is critical for a water utility
        to adequately respond to threats. Utilities afso suggested measuring the number of
        contaminants or the timeliness of detecting particular contaminants in the water system. Tests
        could also monitor the timeliness of the laboratory used by the utility to identify contaminants.

    Ability to detect attempted intrusions into the SCADA system

        Seven utilities mentioned this type of performance indicator. Water utilities could document
        the number of attempted intrusions into their SCADA systems to track the level of interest in
        the water system.
                                          15

-------
 Suggestions  .:..'^   ,,'   .     ,,'   ,     J   .. '<,  ;',  «   -, ..     ..    ,   ,

Based on the survey results and our observations, we offer the following suggestions:

       (1)    Ensure that small utilities have access to security information that large utilities
             received from consultants funded by EPA, possibly by fully funding the Water-
             ISAC, and provide lists of other agencies from which utilities could obtain
             information.

       (2)    Ensure that water utilities have access to information on funding security
             enhancements, including use of the Drinking Water State Revolving Fund.

       (3)    Consider using the performance indicators discussed above to set a baseline for
             water security and measure improvements over time, particularly through the use
             of exercises and drills to test the security of water utilities.
                                          16

-------
                               Survey of Water Security
Appendix A
The following series of questions deal with information or guidance the drinking water utility
received, and its usefulness in preparing for a vulnerability assessment.

1.   Threats - In order to conduct a vulnerability assessment, a utility needs to determine or
    evaluate potential threats, often referred to as a design basis threat.  The design basis threat is
    based on understanding the motives, intentions, and capabilities of the utility's adversaries.

    Below are a list of sources from which your drinking water utility may have received
    information or guidance on THREATS.  Please rate the usefulness of the information you
    received on a scale from one to five, where one is not at all useful and five is very useful. If
    you did not receive information from a listed source, please check that box.
Sources of Threat Information (check all that apply)
Environmental Protection Agency (EPA)
Federal Bureau of Investigation (FBI)
Department of Homeland Security
Centers for Disease Control (CDC)
Other Federal agency
Please soecifv
State agency
Please specify
Local law enforcement (Police, Sheriff)
Water Information Sharing and Analysis Center (Water-ISAC)
InfraGard
National Rural Water Association (NRWA)
American Water Works Association (AWWA)
Consultant hired to prepare vulnerability assessment
Water security expert
Other - Please specify
Not Very
useful useful
1*














2














3














4














5"














Did not
receive
information














* provide explanation for answers with either 1 (not at all useful) or 5 (very useful)
                                          17

-------
2.  Detection - Detection (1) senses an act of aggression, (2) assesses the validity of the
   detection, and (3) communicates the appropriate information to a response force. A detection
   system must provide all three of these capabilities to be effective. A detection system may
   consist of closed-circuit television, cameras, motion sensors, alarms, door or window
   sensors, and chemical and biological monitoring and detection technologies.

   Below are a list of sources from which your drinking water utility may have received
   information or guidance on DETECTION. Please rate the usefulness of the information you
   received on a scale from one to five, where  one is not at all useful and five is very useful. If
   you did not receive information from a listed source, please check that box.
Sources of Detection Information (check all that
apply)
Environmental Protection Agency (EPA)
Federal Bureau of Investigation (FBI)
Department of Homeland Security
Centers for Disease Control (CDC)
Other Federal agency
Please specify
State agency
Please specify
Local law enforcement (Police, Sheriff)
Water Information Sharing and Analysis Center (Water-ISAC)
InfraGard
National Rural Water Association (NRWA)
American Water Works Association (AWWA)
Consultant hired to prepare vulnerability assessment
Water security expert
Other - Please specify
Not Very
useful useful
1*














2














3














4














5"














Did not
receive
information














  provide explanation for answers with either 1 (not at all useful) or 5 (very useful)
                                           18

-------
3.  Delay - Delay is any mechanisms in place to delay the intruder, after detection, from
   damaging the utility or contaminating the water. Defensive measures protect an asset by
   delaying an adversary's movement toward the asset or by shielding the water from
   contamination.  Delay measures include such things as fencing, locks, and grates or bars on
   windows.

   Below are a list of sources from which your drinking water utility may have received
   information or guidance on DELAY. Please rate the usefulness of the information you
   received on a scale from one to five, where one is not at all useful and five is very useful.  If
   you did not receive information from a listed source, please check that box.
Sources of Delay Information (check all that apply)
Environmental Protection Agency (EPA)
Federal Bureau of Investigation (FBI)
Department of Homeland Security
Centers for Disease Control (CDC)
Other Federal agency
Please specify
State agency
Please specify
Local law enforcement (Police, Sheriff)
Water Information Sharing and Analysis Center (Water-ISAC)
InfraGard
National Rural Water Association (NRWA)
American Water Works Association (AWWA)
Consultant hired to prepare vulnerability assessment
Water security expert
Other - Please specify
Not Very
useful useful
1"














2














3














4














5*














Did not
receive
information














  provide explanation for answers with either 1 (not at all useful) or 5 (very useful)
                                          19

-------
4.  Response/Consequence Mitigation - Consequences are outcomes that can happen if an
   adversary successfully carries out a threat. Consequences of a threat carried out on a water
   supply can affect the quantity and/or quality of water supplied, as well as general sanitation
   and safety issues in a community.

   Below are a list of sources from which your drinking water utility may have received
   information or guidance on RESPONSE/CONSEQUENCE MITIGATION. Please rate
   the usefulness of the information you received on a scale from one to five, where one is not
   at all useful and five is very useful. If you did not receive information from a listed source,
   please check that box.
Sources of Response/Consequence Mitigation
Information (check all that apply)
Environmental Protection Agency (EPA)
Federal Bureau of Investigation (FBI)
Department of Homeland Security
Centers for Disease Control (CDC)
Other Federal agency
Please soecifv
State agency
Please specify
Local law enforcement (Police, Sheriff)
Water Information Sharing and Analysis Center (Water-ISAC)
InfraGard
National Rural Water Association (NRWA)
American Water Works Association (AW WA)
Consultant hired to prepare vulnerability assessment
Water security expert
Other - Please specify
No< Very
useful useful
1"














2














3














4














5*














Did not
receive
information














* provide explanation for answers with either 1 (not at all useful) or 5 (very useful)
                                         20

-------
5.  Cyber - Water utility components are often controlled remotely by computer systems called
   Supervisory Control and Data Acquisition (SCADA). These SCADA systems are
   susceptible to attack by computer hackers who could shut down critical assets within the
   water utility.

   Below are a list of sources from which your drinking water utility may have received
   information or guidance on SCADA SECURITY.  Please rate the usefulness of the
   information you received on a scale from one to five, where one is not at all useful and five is
   very useful. If you did not receive information from a listed source, please check that box.
Sources of SCADA Security Information (check all
that apply)
Environmental Protection Agency (EPA)
Federal Bureau of Investigation (FBI)
Department of Homeland Security
Centers for Disease Control (CDC)
Other Federal agency
Please specify
State agency
Please specify
Local law enforcement (Police, Sheriff)
Water Information Sharing and Analysis Center (Water-ISAC)
InfraGard
National Rural Water Association (NRWA)
American Water Works Association (AW WA)
Consultant hired to prepare vulnerability assessment
Water security expert
Other - Please specify
Not Very
useful useful
1"














2














3














4














5"














Did not
receive
information




i









  provide explanation for answers with either 1 (not at all useful) or 5 (very useful)
                                         21

-------
Performance Measurement Information

6.   What performance indicators would best measure changes in the overall level of water
     security? (Some examples may include: length of time your water utility could supply
     water in the event of a disaster, length of time your water utility could operate on
     emergency backup power sources, amount of water storage your utility has).
7.   Should there be separate performance indicators that would measure changes for each
     component of the water utility (source water, treatment, storage, distribution)? What
     performance indicators would best measure these changes?
8.   What performance indicators would best measure changes in threat detection? (Some
     examples may include: number of contaminants your water utility can detect in the
     distribution system, amount of time it takes to determine whether a detection event is a real
     threat or false alarm).
9.   What performance indicators would best measure changes in adversary delay? (An
     example may include: amount of time the utility can delay threats compared to response
     time).
                                         22

-------
10,   What performance indicators would best measure changes in response/consequence
     mitigation?  (An example may include: number of employees that follow the proper
     response to specific threat scenarios in practice exercises)?
11.   What performance indicators would best measure changes in SCAD A security systems?
     (An example may include: the number of attempts to hack into the system).
                                         23

-------
Resource/Training Needs
12.   How much money does your utility expect to spend on security enhancements over the next
     12 months?
     	<$ 10,000
     	$10,000-$50,000
     	 $50,000 - $100,000
     	$100,000 - $500,000
     	$500,000 - $1,000,000
     	$1,000,000+
     	Don't know

13.   By what means is your utility planning to pay for needed security enhancements?
14.
Don't
Yes No Know
a.
b.
c.
d.
e.
f.

g-
h.

In
Financial assistance from EPA 	
EPA State Revolving Fund 	
Financial assistance from the State 	
Increase water rates 	
Issue water utility bonds 	
Limit improvements to those which
the utility can afford 	
Budget for future Capitol Improvement projects .
Other 	
(Please specify )
	 1
	 1
	 1
	 1
	 1

	 1
	 1
	 1

which of the following areas do you need more assistance (check
2
2
2
2
2

2
2
2

all that
3
3
3
3
3

3
3
3

apply)?
Little Some A Lot
a.
b.
c.
d.
e.
Threat information 	 	
Detection assistance 	
Delay 	
Response 	
SCADA 	
	 1
	 1
	 1
. . 1 . . 1
	 1
2
2
2
2
2
3
3
3
3
3
15.   What specific assistance do you need (if any)?
                                         24

-------
16.   Please describe the kinds of training employees at your facility need to improve security or
     response?
17.   What kinds of regulatory changes (if any) does your utility need to help improve security?
18:   What types of research (if any) would be most beneficial to improve security?
19..  Do you have any additional comments or concerns regarding water security?
                                         25

-------
Background Information

Utility Name:
20.   What is the population served by your utility?

     	Less than 3,300
         3,300 - 50,000
         50,000 - 100,000
         100,000-1,000,000
        ~1,000,000-3,000,000
        _3,000,000+
21.   Who performed the vulnerability assessment at your utility (check all that apply)?

     	A consultant with expertise preparing a vulnerability assessment
         _A security expert employed by the utility
         _Other utility employee - please specify employee's title
         _Someone else - please specify	
          Don't know
22.   Please indicate your utility's current status in:
     a   Vulnerability assessment	
     b.   Emergency response plan  	
     c.   Implementing security improvements
Planning  Conducting  Completed
	1         2          3
	1         2          3
	1         2          3
23.  What tools and methods were used to conduct your drinking water utility's vulnerability
     assessment (check all that apply)?

          Risk Assessment Methodology-Water (RAM-W)
         Vulnerability Self Assessment Tool (VSAT) software
         JNational Rural Water Association (NRWA) checklist
         _Other - please specify	
          Don't know
     THANK YOU FOR YOUR ASSISTANCE IN COMPLETING THIS SURVEY.
                                        26

-------
                                                                         Appendix B

                                 Distribution
EPA Headquarters
     Acting Associate Administrator for Congressional and Intergovernmental Relations
     Acting Associate Administrator, Office of Public Affairs
     Acting Assistant Administrator, Office of Water
     Audit Followup Coordinator, Office of Water
     Director, Office of Ground Water and Drinking Water
     Acting Director, Water Security Division
     Acting General Counsel
     Director, Office of Homeland Security
EPA Office of Inspector General

     Inspector General (2410)
     Assistant Inspector General for Program Evaluation
     Assistant Inspector General for Audit
     Assistant Inspector General for Human Capital
     Assistant Inspector General for Planning, Analysis and Results
     Assistant Inspector General for Congressional and Public Liaison
     Counsel
                                         27

-------
         m
c\

-------