&EPA
United States
Environmental Protection
Agency
Water Security Initiative: Evaluation of the Enhanced
Security Monitoring Component of the Cincinnati
Contamination Warning System Pilot
Monitoring and Surveillance
Water Quality Monitoring
Enhanced Security Monitoring
Cus
Customer Complaint Surveillance
ublic Health Surveillance
Possible Contamination
i
Consequence Management
Sampling and Analysis
Response
Office of Water (MC-140)
EPA-817-R-14-001C
April 2014
-------
-------
Disclaimer
The Water Security Division of the Office of Ground Water and Drinking Water has reviewed and
approved this document for publication. This document does not impose legally binding requirements on
any party. The findings in this report are intended solely to recommend or suggest and do not imply any
requirements. Neither the U.S. Government nor any of its employees, contractors or their employees
make any warranty, expressed or implied, or assumes any legal liability or responsibility for any third
party's use of or the results of such use of any information, apparatus, product, or process discussed in
this report or represents that its use by such party would not infringe on privately owned rights. Mention
of trade names or commercial products does not constitute endorsement or recommendation for use.
Questions concerning this document should be addressed to:
Nelson Mix, PE, CHMM
U.S. EPA Water Security Division
1200 Pennsylvania Ave, NW
Mail Code 4608T
Washington, DC 20460
(202)564-7951
Mix.Nelson(g),epa. gov
or
Steve Allgeier
U.S. EPA Water Security Division
26 West Martin Luther King Drive
Mail Code 140
Cincinnati, OH 45268
(513)569-7131
Allgeier.Steve@epa.gov
-------
Acknowledgements
The Water Security Division of the Office of Ground Water and Drinking Water would like to recognize
the following individuals and organizations for their assistance, contributions, and review during the
development of this document.
Jim Holly, Greater Cincinnati Water Works
Yeongho Lee, Greater Cincinnati Water Works
Jeff Swertfeger, Greater Cincinnati Water Works
Jim Golembeski, Philadelphia Water Department
Kyle Parks, Dallas Public Works
Curt Baranowski, U.S. Environmental Protection Agency
David Harvey, U.S. Environmental Protection Agency
-------
Executive Summary
The goal of the Water Security Initiative (WSI) is to design and demonstrate an effective multi-
component warning system for timely detection and response to drinking water contamination threats and
incidents. A contamination warning system (CWS) integrates information from multiple monitoring and
surveillance components to alert the water utility to possible contamination, and uses a consequence
management plan to guide response actions.
System design objectives for an effective CWS are: spatial coverage, contaminant coverage, alert
occurrence, timeliness of detection and response, operational reliability and sustainability. Metrics for the
enhanced security monitoring (ESM) component were defined relative to the system metrics common to
all components in the CWS, but the component metric definitions provide an additional level of detail
relevant to the ESM component. Evaluation techniques used to quantitatively or qualitatively evaluate
each of the metrics include analysis of empirical data from routine operations, drills and exercises,
modeling and simulations, forums, and an analysis of lifecycle costs. This report describes the evaluation
of data collected from the ESM component from the period of January 2008 - June 2010.
The major outputs from the evaluation of the Cincinnati pilot include:
1. Cincinnati Pilot System Status, which describes the post-implementation status of the Cincinnati
pilot following the installation of all monitoring and surveillance components.
2. Component Evaluations, which include analysis of performance metrics for each component of
the Cincinnati pilot.
3. System Evaluation, which integrates the results of the component evaluations, the simulation
study, and the benefit-cost analysis.
The reports that present the results from the evaluation of the system and each of its six components are
available in an Adobe portfolio, Water Security Initiative: Comprehensive Evaluation of the Cincinnati
Contamination Warning System Pilot (USEPA 2014a).
Enhanced Security Monitoring Component Design
Unlike traditional hardening practices, ESM includes systems, equipment and procedures to detect
intrusions at high risk facilities in real time and respond promptly to prevent, interrupt, or reduce the
impact of an attempted contamination incident.
ESM includes intrusion sensors and video monitoring equipment to detect intrusions that could precede a
potential contamination incident. Intrusion alerts and video are transmitted to the Greater Cincinnati
Waterworks (GCWW) Control Center, where alerts are continuously monitored by utility personnel.
After an incident is detected, assessment procedures include the use of video cameras to view the
intrusion at video-monitored sites, and onsite investigation methods to determine whether contamination
is Possible. Additionally, video evidence can be used to minimize unnecessary site investigations when
invalid alerts are observed. Under the contamination warning system model, ESM is designed to help
discern between intrusions that may be related to a contamination incident and those resulting from
benign causes (e.g., an employee forgetting to call in).
The ESM design also includes procedures for responding to intrusions reported by eyewitnesses and
threat notifications from perpetrators.
-------
For more information on ESM design, see Section 2.0. A summary of the results used to evaluate
whether the ESM met each of the design objectives relevant to this component is provided below.
IV
-------
Methodology
Several methods were used to evaluate ESM performance. Data was tracked over time to illustrate the
change in performance as the component evolved during the evaluation period. Statistical methods were
also used to summarize large volumes of data collected over either the entire or various segments of the
evaluation period. Data was also evaluated and summarized for each reporting period over the evaluation
period. In this evaluation, the term reporting period is used to refer to one month of data that spans from
the 16th of the indicated month to the 15th of the following month. Thus, the January 2008 reporting
period refers to the data collected between January 16th 2008 and February 15th 2008. Additionally, four
drills designed around mock contamination incidents were used to practice and evaluate the full range of
procedures, from initial detection through response.
Because there were no contamination incidents during the evaluation period, there is no empirical data to
fully evaluate the detection capabilities of the component. To fill this gap, a computer model of the
Cincinnati CWS was developed and challenged with a large ensemble of simulated contamination
incidents in a simulation study. An ensemble of 2,015 contamination scenarios representing a broad range
of contaminants and injection locations throughout the distribution system was used to evaluate the
effectiveness of the CWS in minimizing public health and utility infrastructure consequences. The
simulations were also used for a benefit-cost analysis, which compares the monetized value of costs and
benefits and calculates the net present value of the CWS. Costs include implementation costs and routine
operation and maintenance labor and expenses, which were assumed over a 20 year lifecycle of the CWS.
Benefits included reduction in consequences (illness, fatalities and infrastructure damage) and dual-use
benefits from routine operations.
Design Objective: Spatial Coverage
ESM was limited in its ability to detect contamination incidents throughout the distribution system since
only specific utility locations are monitored for intrusions that may lead to contamination. However, the
sites that were monitored by ESM have the potential to impact a large portion of the distribution system
and general population, indicating the importance of monitoring these locations. Overall, the simulation
model indicated that the ESM sites covered water supplied to 99 percent of the retail population and 96
percent of the retail service area. The model also showed that the three ESM pump station sites supplied
water to 81 to 93 percent of the retail service population and 70 to 80 percent of the retail service area.
These relatively large populations and wide service areas supported the design decision to install video
monitoring equipment at these three high-risk sites. For more information on spatial coverage and the
simulation model see Sections 3.3 and 6.2.
Design Objective: Contaminant Coverage
ESM was primarily concerned with detecting and responding to the physical intrusions which could have
led to a potential contamination incident. As a result, the identification of a specific contaminant and
recognition of a contaminant's class were not significant considerations during the design of the
component's monitoring equipment. However, a contaminant's volume and method of injection were
considered when designing ESM enhancements and when developing scenarios to challenge the ESM
component of the CWS simulation model. For more information on contaminant coverage see Sections
4.3 and 5.3.
-------
Design Objective: Alert Occurrence
Alert occurrence tracks the frequency of alerts to determine how well the security equipment and
procedures discriminate between real intrusions and invalid alerts caused by environmental factors (wind,
etc) or utility employees/contractors not following security procedures. Metrics for this design objective
include both invalid and valid alert rates, and were characterized using empirical data gathered during the
real-time monitoring phase. Invalid alerts occurred frequently at the beginning of the evaluation period
due primarily to communication-related errors. The invalid alerts caused by utility employees or
contractors not following security procedures resulted in average invalid alert rates of 0.42 door/hatch
props per 100 valid entries per door, 1.4 no call-in incidents per 100 valid entries at video sites, and 0.23
no call-in incidents per 100 entries at non-video sites. All ESM intrusion detection devices performed
better than the industry standard minimum of 90 days between invalid alerts (Guideline for the Physical
Security of Water Utilities, ASCE/AWWA, 2006). Area motion sensors were the most prone to invalid
alerts at 136 days between alerts, and door/hatch sensors were the least prone at 1,168 days between
invalid alerts. For more information on alert occurrence see Sections 4.4, 5.4 and 6.4.
Design Objective: Timeliness of Detection
For ESM, the timeliness of detection metrics measured the amount of time required to perform key steps
in the investigation to determine a Possible contamination incident. Factors that impact this objective
include: time for alert transmission, time to recognize alerts and time to investigate alerts. These metrics
were characterized for invalid alerts using empirical data. Average times for ESM investigation steps
included five seconds for intrusion alert transmission, 3.2 minutes for video clip viewing and 26 minutes
for validation of Possible contamination. The average times for video clip transmission were one to three
minutes using digital cellular communications and 37 seconds using T-carrier 1 (Tl) or digital subscriber
line (DSL) connections.
Data from ESM drills was used to evaluate the time required to investigate valid alerts. Figure ES-1
summarizes the average times for the investigation steps during the four ESM drills that were conducted.
The average total time to investigate an ESM alert was 40 minutes, with a range of 35 to 50 minutes.
00:00
ESM Alert
< 00:01
Operator Recognizes Alert
Operator Notifies
GCWW Security: 00:02
Law Enforcement: 00:03
Plant Supervisor: 00:04
00:04
Video Clip Arrives at
Control Center
00:40
Investigators Determine
Contamination is Possible
00:00
01:00
Figure ES-1. Timeline Progression of Alert Investigations during ESM Drills
Data from the ESM drills were used to develop input parameters for the simulation model, specifically the
time to validate Possible contamination, the time to interrupt an injection and duration of an uninterrupted
injection values. The model results demonstrated two critical benefits of installing video at a site: earlier
VI
-------
determination that contamination is Possible and quicker potential interruption of an injection. For more
information on timeliness of detection see Sections 4.5, 5.5 and 6.5.
Design Objective: Operational Reliability
Operational reliability metrics quantify the percent of time that the ESM component is working as
designed. Availability, data completeness, and invalid alert metrics were used to evaluate the reliability
of the ESM system, as measured by the analysis of empirical data. The ESM component exhibited
excellent operational reliability during the evaluation period. Intrusion alert and video communications
systems, intrusion detection equipment and video equipment had availabilities above 99 percent. The
only exceptions were for outages caused by the digital cellular provider and the pan-tilt-zoom cameras
failing as they approached the end of their design life. For more information on operational reliability see
Sections 4.6, 5.6 and 6.6.
Design Objective: Sustainability
Sustainability is a key objective in the design of a CWS and each of its components, which for the
purpose of this evaluation is defined in terms of the cost-benefit trade-off. Costs are estimated over the
20-year life cycle of the system to provide an estimate of the total cost of ownership and include the
implementation costs, enhancement costs, operation and maintenance costs, renewal and replacement
costs, and the salvage value. The benefits derived from the system are defined in terms of primary and
dual-use benefits. Metrics that were evaluated under this design objective include: costs, benefits and
acceptability. The costs used in the calculation of the 20-year lifecycle costs for the ESM component are
presented in Table ES-1. These costs were tracked as empirical data during the design and
implementation phase of project design, and were analyzed through a benefit-cost analysis. It is
important to note that the Cincinnati CWS was a research effort, and as such incurred higher costs
than would be expected for a typical large utility installation.
Table ES-1. Cost Elements used in the Calculation of the 20-Year Lifecycle Cost
Parameter
Implementation Costs
Annual O&M Costs
Renewal and Replacement Costs1
Salvage Value1
Value
$1,388,869
$38,002
$257,332
($19,124)
Calculated using major pieces of equipment.
To calculate the total 20-year lifecycle cost of the ESM component, all costs and monetized benefits were
adjusted to 2007 dollars using the change in the Consumer Price Index between 2007 and the year that the
cost or benefit was realized. Subsequently, the implementation costs, renewal and replacement costs, and
annual O&M costs were combined to determine the total lifecycle cost:
ESM Total Lifecycle Cost: $2,195,081
A similar ESM implementation at another utility should be less expensive when compared to the
Cincinnati pilot as it could benefit from lessons learned and would not incur research-related costs.
Dual-use benefits and user acceptability were evaluated through documentation of qualitative data during
drills and exercises, and during forums with the utility including lessons learned workshops. Dual-use
benefits identified included: 1) more efficient investigations, staff utilization and education; 2) deterrent
to trespassing, vandalism and theft; 3) improved integration with law enforcement; and 4) increased
employee safety. User acceptability was demonstrated through 100% utility participation in drills and
VII
-------
exercises, which required substantially more effort than routine investigations. GCWW personnel
reported that they were able to better appreciate and understand standard operating procedures (SOPs)
through responding to simulated water contamination incidents. Finally, the GCWW has maintained the
ESM equipment since the conclusion of the Cooperative Research and Development Agreement in June
2009, and has instructed employees to implement the Cincinnati Pilot Operational Strategy for suspected
intrusions at all sites within the GCWW service area. For more information on sustainability, see Section
6.7.
VIII
-------
Table of Contents
LIST OF FIGURES xi
LIST OF TABLES xin
SECTION 1.0: INTRODUCTION 1
1.1 CWS DESIGN OBJECTIVES 1
1.2 ROLE OF ESM IN THE CINCINNATI CWS 2
1.3 OBJECTIVES 2
1.4 DOCUMENT ORGANIZATION 2
SECTION 2.0: OVERVIEW OF THE ESM COMPONENT 4
2.1 PHYSICAL SECURITY EQUIPMENT 4
2.2 DATA MANAGEMENT AND COMMUNICATIONS 5
2.3 COMPONENT RESPONSE PROCEDURES 6
2.4 SUMMARY OF SIGNIFICANT ESM COMPONENT MODIFICATIONS 8
2.5 TIMELINE OF ESM DEVELOPMENT PHASES AND EVALUATION-RELATED ACTIVITIES 10
SECTION 3.0: METHODOLOGY 11
3.1 ANALYSIS OF EMPIRICAL DATA FROM ROUTINE OPERATIONS 11
3.2 DRILLS AND EXERCISES 11
3.2.1 CWS Full Scale Exercise 2 (October 1, 2008) 12
3.2.2 CWS Full Scale Exercise 3 (October 21,2009) 12
3.2.3 ESM Drills (1-4) 12
3.3 SIMULATION STUDY 13
3.4 FORUMS 15
3.5 ANALYSIS OF LIFECYCLE COSTS 15
SECTION 4.0: VIDEO MONITORED SITES 17
4.1 DESCRIPTION 17
4.2 DESIGN OBJECTIVE: SPATIAL COVERAGE 17
4.3 DESIGN OBJECTIVE: CONTAMINANT COVERAGE 17
4.4 DESIGN OBJECTIVE: ALERT OCCURRENCE 17
4.4.1 Invalid Alerts 17
4.4.2 Summary 29
4.5 DESIGN OBJECTIVE: TIMELINESS OF DETECTION 30
4.5.1 Time for Video Clip Transmission 30
4.5.2 Time for Video Clip Viewing 33
4.5.3 Summary 34
4.6 DESIGN OBJECTIVE: OPERATIONAL RELIABILITY 35
4.6.1 Availability of Intrusion Alert Communication Systems 35
4.6.2 Availability of Video Communication Systems 37
4.6.3 Availability of Intrusion Detection Equipment 38
4.6.4 Availability of Video Equipment 40
4.6.5 Data Completeness 43
4.6.6 Summary 44
SECTION 5.0: NON-VIDEO MONITORED SITES 46
5.1 DESCRIPTION 46
5.2 DESIGN OBJECTIVE: SPATIAL COVERAGE 46
5.3 DESIGN OBJECTIVE: CONTAMINANT COVERAGE 46
5.4 DESIGN OBJECTIVE: ALERT OCCURRENCE 47
5.4.1 Invalid Alerts 47
5.4.2 Summary 56
IX
-------
5.5 DESIGN OBJECTIVE: TIMELINESS OF DETECTION 57
5.6 DESIGN OBJECTIVE: OPERATIONAL RELIABILITY 57
5.6.1 Availability of Intrusion Alert Communication System 57
5.6.2 Availability of Intrusion Detection Equipment 58
5.6.3 Data Completeness 59
5.6.4 Summary 60
SECTION 6.0: PERFORMANCE OF THE INTEGRATED COMPONENT 61
6.1 DESCRIPTION 61
6.2 DESIGN OBJECTIVE: SPATIAL COVERAGE 61
6.3 DESIGN OBJECTIVE: CONTAMINANT COVERAGE 62
6.4 DESIGN OBJECTIVE: ALERT OCCURRENCE 62
6.4.1 Invalid Alerts 62
6.4.2 Summary 65
6.5 DESIGN OBJECTIVE: TIMELINESS OF DETECTION 65
6.5.1 Time for Intrusion Alert Transmission 65
6.5.2 Time to Initiate an Investigation 65
6.5.3 Time to Validate Possible Contamination 66
6.5.4 Summary 73
6.6 DESIGN OBJECTIVE: OPERATIONAL RELIABILITY 74
6.6.1 System Availability 74
6.7 DESIGN OBJECTIVE: SUSTAINABILITY 75
6.7.1 Costs 75
6.7.2 Benefits 78
6.7.3 Acceptability - Investigation Checklist Usage 80
6.7.4 Summary 81
SECTION 7.0: SUMMARY AND CONCLUSIONS 83
7.1 DESIGN OBJECTIVE: SPATIAL COVERAGE 83
7.2 DESIGN OBJECTIVE: CONTAMINANT COVERAGE 83
7.3 DESIGN OBJECTIVE: ALERT OCCURRENCE 83
7.4 DESIGN OBJECTIVE: TIMELINESS OF DETECTION 84
7.5 DESIGN OBJECTIVE: OPERATIONAL RELIABILITY 85
7.6 DESIGN OBJECTIVE: SUSTAINABILITY 85
SECTION 8.0: REFERENCES 87
SECTION 9.0: ABBREVIATIONS 88
SECTION 10.0: GLOSSARY 89
-------
List of Figures
FIGURE 2-1. ESM COMMUNICATION NETWORKS 5
FIGURE 2-2. TIMELINE OF ESM COMPONENT ACTIVITIES 10
FIGURE 4-1. PUMP STATION A (UNSTAFFED, INFREQUENTLY VISITED): DOOR PROPS 19
FIGURE 4-2. PUMPSTATIONB (STAFFED): DOOR PROPS 20
FIGURE 4-3. PUMP STATION C (UNSTAFFED, FREQUENTLY VISITED): DOOR PROPS 21
FIGURE 4-4. PUMP STATIONS: DOOR PROPS/IOO VALID ENTRIES/DOOR 22
FIGURE 4-5. PUMP STATION A (UNSTAFFED, INFREQUENTLY VISITED): No CALL-INS 24
FIGURE 4-6. PUMPSTATIONB (STAFFED): No CALL-INS 25
FIGURE 4-7. PUMP STATION C (UNSTAFFED, FREQUENTLY VISITED): No CALL-INS 25
FIGURE 4-8. PUMP STATIONS: No CALL-INS/IOO VALID ENTRIES 26
FIGURE 4-9. AREA MOTION SENSORS INVALID ALERT RATE 28
FIGURE 4-10. DOOR/HATCH SENSORS INVALID ALERT RATE AT VIDEO SITES 28
FIGURE 4-11. PUMP STATIONS: TIME FOR VIDEO CLIP TRANSMISSION 32
FIGURE 4-12. PUMP STATIONS : COMMUNICATIONS SYSTEM AVAILABILITY INTRUSION ALERTS 36
FIGURE 4-13. PUMP STATIONS: AVAILABILITY OF VIDEO COMMUNICATION SYSTEMS 38
FIGURE 4-14. INTRUSION DETECTION EQUIPMENT AVAILABILITY 39
FIGURE 4-15. VIDEO EQUIPMENT AVAILABILITY 41
FIGURE 4-16. DATA COMPLETENESS: PUMP STATIONS 43
FIGURE 5-1. LADDER SITES: No CALL-INS 48
FIGURE 5-2. LADDER SITES: No CALL-INS/VALID ENTRIES 49
FIGURE 5-3. RESERVOIR SITES: No CALL-INS 49
FIGURE 5-4. RESERVOIR SITES: No CALL-INS/VALID ENTRIES 50
FIGURE 5-5. LADDER SENSOR INVALID ALERTS CAUSED BY SENSOR FAULTS 52
FIGURE 5-6. LADDER SENSOR INVALID ALERTS CAUSED BY RADIO FAULTS 54
FIGURES-?. NON-VIDEO SITE INVALID ALERTS BY TYPE 55
FIGURE 5-8. COMMUNICATIONS SYSTEM AVAILABILITY: NON-VIDEO SITES 58
FIGURE 5-9. INTRUSION DETECTION EQUIPMENT AVAILABILITY - NON-VIDEO SITES 59
FIGURE 5-10. DATA COMPLETENESS FOR NON-VIDEO SITES 60
FIGURE 6-1. PERCENT POPULATION AND AREA OF ZONE OF INFLUENCE AT ESM SITES 62
FIGURE 6-2. ESM INVALID ALERTS 63
FIGURE 6-3. INVALID ALERTS BY TYPE 64
FIGURE 6-4. INVALID ALERTS BY SITE TYPE 64
FIGURE 6-5. TIME TO VALIDATE IF CONTAMINATION is POSSIBLE AT VIDEO MONITORED SITES 67
FIGURE 6-6. TIME TO VALIDATE IF CONTAMINATION is POSSIBLE AT NON-VIDEO MONITORED SITES 67
FIGURE 6-7. TIMELINE PROGRESSION FOR ESM ALERT INVESTIGATION - ESM DRILL 1 69
XI
-------
FIGURE 6-8. TIMELINE PROGRESSION FOR ESM ALERT INVESTIGATION - ESM DRILL 2 70
FIGURE 6-9. TIMELINE PROGRESSION FOR ESM ALERT INVESTIGATION - ESM AFTER-HOURS DRILL 3 70
FIGURE 6-10. TIMELINE PROGRESSION FOR ESM ALERT INVESTIGATION - ESM DRILL 4 71
FIGURE 6-11. SIMULATED TIME TO VALIDATE POSSIBLE CONTAMINATION 72
FIGURE 6-12. SIMULATED TIME TO INTERRUPT AN INJECTION 72
FIGURE 6-13. ESM COMPONENT AVAILABILITY 75
FIGURE 6-14. DETECTED ENTRIES BY CATEGORY 80
XII
-------
List of Tables
TABLE 2-1. ENHANCED SECURITY MONITORING DESIGN ELEMENT 4
TABLE 2-2. ROLES AND RESPONSIBILITIES FOR ROUTINE OPERATION OF THE ESM COMPONENT 7
TABLE 2-3. INVALID ALERT INDICATORS 8
TABLE 2-4. ESM COMPONENT MODIFICATIONS 8
TABLE 3-1. ESM DRILL VARIATIONS 13
TABLE 4-1. SUMMARY OF PUMP STATION DOOR PROP DATA 22
TABLE 4-2. SUMMARY OF PUMP STATION No CALL-IN DATA 27
TABLE 4-3. EQUIPMENT CAUSED INVALID ALERTS: AVERAGE TIMES BETWEEN ALERTS 29
TABLE 4-4. PUMP STATION INVALID ALERTS BY TYPE 30
TABLE 4-5. TIMELINE OF EVENTS AFFECTING VIDEO DATA TRANSMISSION TIME 31
TABLE 4-6. VIDEO CLIP TRANSMISSION DURING PERIODS OF STABLE COMMUNICATIONS 33
TABLE 4-7. NORMALIZED VIDEO CLIP TRANSMISSION - PERIODS OF STABLE COMMUNICATIONS 33
TABLE 4-8. COMMUNICATIONS AVAILABILITY FOR INTRUSION ALERT DATA 36
TABLE 4-9. INCIDENTS THAT REDUCED INTRUSION ALERT COMMUNICATIONS AVAILABILITY 37
TABLE 4-10. COMMUNICATIONS AVAILABILITY FOR VIDEO DATA 38
TABLE 4-11. INTRUSION DETECTION EQUIPMENT AVAILABILITY 40
TABLE 4-12. INCIDENTS THAT REDUCED INTRUSION DETECTION EQUIPMENT AVAILABILITY 40
TABLE 4-13. INTRUSION DETECTION EQUIPMENT AVAILABILITY 42
TABLE 4-14. INCIDENTS THAT REDUCED VIDEO EQUIPMENT AVAILABILITY 42
TABLE 4-15. DATA COMPLETENESS: PUMP STATIONS 43
TABLE 4-16. INTRUSION DETECTION DEVICE DOWNTIME EFFECTS 44
TABLE 5-1. SUMMARY OF NON-VIDEO SITE No CALL-IN DATA 51
TABLE 5-2. SENSOR CAUSED INVALID ALERTS: AVERAGE TIMES BETWEEN INVALID ALERTS 53
TABLE 5-3. EQUIPMENT CAUSED INVALID ALERTS: AVERAGE TIMES BETWEEN INVALID ALERTS 55
TABLE 5-4. NON-VIDEO SITE INVALID ALERTS BY LOCATION 56
TABLE 6-1. TIME TO VALIDATE POSSIBLE CONTAMINATION 68
TABLE 6-2. TIME TO IMPLEMENT KEY ACTIVITIES DURING DRILL ESM ALERT INVESTIGATIONS 71
TABLE 6-3. COST ELEMENTS USED IN THE CALCULATION OF 20 YEAR LIFECYCLE COST 76
TABLE 6-4. IMPLEMENTATION COSTS 76
TABLE 6-5. ANNUAL O&M COSTS 77
TABLE 6-6. INVESTIGATION LABOR HOURS PER REPORTING PERIOD AND INVESTIGATION 78
TABLE 6-7. EQUIPMENT COSTS 78
TABLE 6-8. INVESTIGATION CHECKLISTS SUBMITTED FOR SUSPECTED INTRUSIONS 81
TABLE 7-1. EVALUATION OF ALERT OCCURRENCE METRICS 83
TABLE 7-2. EVALUATION OF TIMELINESS OF DETECTION METRICS 84
XIII
-------
TABLE 7-3. EVALUATION OF RELIABILITY METRICS 85
TABLE 7-4. SUMMARY OF SUSTAINABILITY METRICS 85
XIV
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 1.0: Introduction
The purpose of this document is to describe the evaluation of the enhanced security monitoring (ESM)
component of the Cincinnati pilot, the first such pilot deployed by the US Environmental Protection
Agency's (EPA) Water Security Initiative (WSI). This evaluation was implemented by examining the
performance of the ESM component relative to the design objectives established for the contamination
warning system (CWS).
1.1 CWS Design Objectives
The Cincinnati CWS was designed to meet six overarching objectives, which are described in detail in
WaterSentinel System Architecture (USEPA, 2005) and are presented briefly below:
Spatial Coverage. The objective for spatial coverage is to monitor the entire population served
by the drinking water utility. It depends on the location and density of monitoring points in the
distribution system, and the hydraulic connectivity of each monitoring location to downstream
regions and populations.
Contaminant Coverage. The objective for contaminant coverage is to provide detection
capabilities for all priority contaminants. This design objective is further defined by binning the
priority contaminants into 12 classes according to the means by which they might be detected
(USEPA, 2005). Use of these detection classes to inform design provides more comprehensive
coverage of contaminants of concern than would be achieved by designing the system around a
handful of specific contaminants. Contaminant coverage depends on the specific data streams
analyzed by each monitoring and surveillance component, as well as the specific attributes of
each component.
Alert Occurrence. The objective of this aspect of system design is to minimize the rate of
invalid alerts (alerts unrelated to contamination or other anomalous conditions) while maintaining
the ability of the system to detect real incidents. It depends on the quality of the underlying data
as well as the event detection systems that continuously analyze that data for anomalies.
Timeliness of Detection and Response. The objective of this aspect of system design is to
provide initial detection of a contamination incident in atimeframe that allows for the
implementation of response actions that result in significant consequences reduction. For
monitoring and surveillance components, such as ESM, this design objective addresses only
detection of an anomaly and investigation of the subsequent alert. Timeliness of response is
addressed under consequence management and sampling and analysis.
Operational Reliability. The objective for operational reliability is to achieve a sufficiently high
degree of system availability, data completeness and data accuracy such that the probability of
missing a contamination incident becomes exceedingly low. It depends on the redundancies built
into the CWS and each of its components.
Sustainability. The objective of this aspect of system design is to develop a CWS that provides
benefits to the utility and partner organizations while minimizing the costs. This can be achieved
through leveraging existing systems and resources that can be readily integrated into the design of
the CWS. Furthermore, a design that results in dual-use applications that benefit the utility in
day-to-day operations, while also providing the capability to detect intentional or accidental
contamination incidents, will also improve Sustainability.
The design objectives provide a basis for evaluation of each component, in this case ESM, as well as the
entire integrated system. Because the deployment of a drinking water CWS is a new concept, design
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
standards or benchmarks are unavailable. Thus, it is necessary to evaluate the performance of the pilot
CWS in Cincinnati against the design objectives relative to the baseline state of the utility prior to CWS
deployment.
1.2 Role of ESM in the Cincinnati CWS
Under the WSI, a multi-component design was developed to meet the above design objectives.
Specifically, the WSI CWS architecture utilizes four monitoring and surveillance components common to
the drinking water industry and public health sector: ESM, water quality monitoring, customer complaint
surveillance, and public health surveillance. Information from these four components are integrated
under a consequence management plan, which is supported by sampling and analysis activities, to
establish the credibility of Possible contamination incidents and to initiate response actions intended to
mitigate consequences.
As one of the four monitoring and surveillance components, ESM includes systems, equipment and
procedures to detect intrusions at high risk facilities in real time and respond promptly to prevent,
interrupt, or reduce the impact of an attempted contamination incident. If an intrusion is detected, an alert
is generated and assessment procedures, such as video footage review and onsite investigations, are used
to determine whether the alert can be explained by a benign cause (e.g., an employee forgetting to call in).
If it cannot, contamination is considered Possible, and the consequence management plan is activated to
determine the credibility of the incident and respond appropriately.
1.3 Objectives
The overall objective of this report is to demonstrate how well the ESM component functioned as part of
the CWS deployed in Cincinnati (i.e., how effectively the component achieved the design objectives).
This evaluation will describe how the deployed ESM component could reliably detect a possible drinking
water contamination incident based on the operational strategy established for the Cincinnati pilot.
Although no known contamination incidents occurred during the pilot period, data collection during
routine operation, drills and exercises, and computer simulations yielded sufficient data to evaluate the
performance of the ESM component against each of the stated design objectives. In summary, this
document will discuss the approach used for analysis of this information and present the results that
characterize the overall operation, performance and sustainability of the ESM component of the
Cincinnati CWS.
1.4 Document Organization
This document contains the following sections:
Section 2: Overview of the ESM Component. This section introduces the ESM component of
the Cincinnati CWS and describes each of the major design elements that make up the
component. A summary of significant modifications to the component that had a demonstrable
impact on performance is presented at the end of this section.
Section3: Methodology. This section describes the data sources and techniques used to
evaluate the ESM component.
Sections 4 through 6: Evaluation of ESM Performance against the Design Objectives. Each
of these sections addresses one of the design objectives listed in Section 1.1. Each section
introduces the metrics that was used to evaluate the ESM component against that design
objective. Each supporting evaluation metric is discussed in a dedicated subsection, including an
overview of the analysis methodology employed for that metric followed by presentation and
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
discussion of the results. Each section concludes with a summary of ESM component
performance relative to the design objective.
Section 7: Summary and Conclusions. This section provides an assessment of how well the
ESM component of the Cincinnati CWS met the design objectives.
Section 8: References. This section lists all sources and documents cited throughout this report.
Section 9: Abbreviations. This section lists all acronyms approved for use in the ESM
component evaluation.
Section 10: Glossary. This section defines terms used throughout the ESM component
evaluation.
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 2.0: Overview of the ESM Component
The Cincinnati CWS added security equipment at selected facility locations in the distribution system and
modified existing security practices. Prior to the implementation of the CWS, the physical security
systems and processes in place for the Greater Cincinnati Water Works (GCWW) distribution facilities
were primarily intended to delay entry of unauthorized individuals and detect intrusion. Major
enhancements included the placement of intrusion detection equipment at areas with access to the finished
drinking water (e.g. hatches and ladders), the addition of video at high-risk pump station locations, and
the development of the Cincinnati Pilot Operational Strategy to streamline the processes of alert
investigation. The Cincinnati Pilot Operational Strategy for ESM describes the roles and responsibilities
of various job functions as well as the standard operating procedures for the employees involved in its
operation.
The ESM component of the Cincinnati CWS was fully deployed and operational by May 2007 and a
detailed description of the system at this point in the project can be found in Water Security Initiative:
Cincinnati Pilot Post-Implementation System Status (USEPA, 2008). During the next phase of the
Cincinnati Pilot, from February 2008 through June 2010, the system was evaluated and modified in an
effort to improve performance. Sections 2.1 through 2.3 provide an overview of the three ESM design
elements, with an emphasis on changes to the component during the evaluation period. Section 2.4
summarizes all significant modifications to the ESM component that are relevant to the interpretation of
the evaluation results presented in this report. The three main ESM design elements for the Cincinnati
Pilot are described in greater detail in Table 2-1.
Table 2-1. Enhanced Security Monitoring Design Element
Design Element
1. Physical Security
Equipment
2. Data Management
and Communications
3. Component
Response Procedures
Description
Door/hatch sensors, motion sensors and cameras designed and installed to detect
intrusion and help discriminate between potential contamination threats and routine
access to facilities.
Communication technology which would allow video of sufficiently good quality to
be transmitted in a time frame which could assist in determining if a contamination
incident occurred.
Written standard operating procedures exist for every step in responding to a
security monitoring alert. These procedures outline effective and timely
communications, including clear guidance on appropriate response actions for
stopping or limiting the spread of a contamination incident.
2.1 Physical Security Equipment
Monitoring equipment was installed at three pumping stations, four finished water reservoirs (one
underground and three above-ground) and five elevated or ground storage tanks. The pumping stations
were equipped with door/hatch sensors, motion sensors, video cameras and a video monitoring system to
supplement the existing door sensors. Hardening the security of the vents was performed at reservoir
sites in addition to the installation of monitoring equipment. The hardened vents were equipped with
intrusion sensors on the access hatches and a level switch to detect an attempt at flooding the enclosure to
introduce contamination into the finished water. The ESM improvements were in addition to the existing
door/hatch sensors at the pumping stations, reservoirs, and elevated and ground storage tanks.
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
2.2 Data Management and Communications
Data management systems and communications were installed to transmit intrusion alert and video data
from the remote ESM sites to the utility control center. Figure 2-1 contrasts the Pre-Existing GCWW
Supervisory Control and Data Acquisition (SCADA) Protected Network with Post-ESM enhancements
that resulted in all video monitored ESM locations using the Water Security Parallel SCADA Protected
Network. This was specifically designed for the CWS and was isolated from the GCWW SCADA
Protected Network. The video monitored ESM sites initially used a secure digital cellular network to
transmit intrusion alert and video data from the remote sites to operator workstations at the utility control
center. The digital cellular network was later replaced by T carrier 1 (Tl) and digital subscriber lines
(DSL) due to issues encountered regarding video data transmission. (See Section 2.4 regarding this
modification.) All non-video monitored ESM locations used the existing GCWW network for
transmitting intrusion alert data from the remote sites to operator workstations in the utility control center.
PRE-EXISTING GCWW SCADA
PROTECTED NETWORK
GCWW PLCs at non-
video monitored ESM
sites
Communications
Servers (2)
(See Note 1)
GCWW SCADA
Workstations (6)
WATER SECURITY PARALLEL SCADA
PROTECTED NETWORK
ws
Communications
Servers (2)
(See Note 1)
WS SCADA
Workstation
ESM PLCs and Video System
Controllers at video monitored
ESM sites
LEGEND
- Alert Data
Video Data
Programmable
logic controller
(PLC)
Video system
controller
Figure 2-1. ESM Communication Networks
Note 1: Only the ESM portions of the GCWW SCADA Protected Network and Water Security Parallel SCADA
Protected Network are shown.
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The GCWW and Water Security SCADA communications servers host Human Machine Interface (HMI)
software to monitor and control the ESM systems via their respective SCADA workstations located in the
utility control center. There is also a Water Security SCADA workstation in the security control center
for security staff use. The Water Security System SCADA HMI application provides user interfaces that
allow operators and security staff to view intrusion alerts, video clips of intrusions and current camera
images; select the refresh rate of the current camera images, select a camera preset for pan-tilt-zoom
(PTZ) cameras, and arm/disarm the intrusion alert system at each ESM site. The GCWW SCADA HMI
provides user interfaces that allow operators to view intrusion alerts at non-video monitored ESM sites in
addition to their primary function of monitoring and controlling the water treatment and distribution
systems. The communications servers are also referred to as input/output (I/O) servers.
2.3 Component Response Procedures
When an intrusion is detected at an ESM site, GCWW implements the Cincinnati Pilot Operational
Strategy that guides the initial investigation into potential causes of the alert. This Operational Strategy
establishes procedures, roles, responsibilities, information flow paths, and checklists to provide a
systematic process for reviewing relevant information to rule out benign causes of the alert. Many
GCWW employees with various job functions are involved in the continued operation and maintenance of
the ESM component. Table 2-2 describes the role of various job functions, and corresponding GCWW
users, in the routine operation of the ESM component of the Cincinnati CWS.
Specifically the following steps are performed:
Determine whether the intrusion is a valid entry based on employee call-in logs.
Determine whether the intrusion is an invalid alert caused by GCWW activity based on video
data, when available, or observations of concurrent alerts, if any. Table 2-3 shows the different
indicators of an invalid alert. A detected entry that is not categorized as a valid entry or invalid
alert is considered a suspected intrusion.
GCWW Distribution Division and Security personnel and local law enforcement are dispatched
to the site of all suspected intrusions and an investigation checklist is filled out by the control
center operator and utility security guard. Each checklist is based on the Cincinnati Pilot
Operational Strategy and guides the user through the steps of an investigation. The checklist
provides fields for recording incident and event times.
The operator reviews available video data to assess the nature of the intrusion and potential for
tampering or contamination. Any findings are communicated to the on-site investigators.
Once onsite, the investigators verify site safety, look for signs of intrusion and determine if
contamination of the water supply is Possible.
If investigators determine that contamination is Possible, the Water Utility Emergency Response
Manager (WUERM) is contacted.
If the initial investigation does not reveal an obvious cause for the alert, contamination is considered
Possible and the investigation is turned over to the WUERM, who will take additional steps to determine
whether or not contamination is Credible.
While no major changes were made in the Cincinnati Pilot Operational Strategy during the evaluation
period, the process underwent several minor revisions based on the results of drills and exercises and
experience with routine operation of the system. Most of the modifications to the operational strategy
were clarifications of roles and responsibilities and streamlined the investigation process.
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 2-2. Roles and Responsibilities for Routine Operation of the ESM Component
GCWW User
Role in Routine Operation of ESM
Control Center Operator
Receive intrusion alerts.
Make the initial determination regarding whether or not the intrusion alert has
detected an apparent intruder.
Notify GCWW Security if there is an apparent intruder.
Notify Plant Supervisor if there is an apparent intruder.
Notify local law enforcement if there is an apparent intruder.
Notify the WEURM if investigators determine that contamination is Possible.
Plant Supervisor
Investigate, or identify an employee from Distribution Division to investigate, the
facility with the intrusion alert for signs of intrusion/contamination along with
security personnel (if available) and local law enforcement.
Provide access to the facility for law enforcement officials.
Determine if an intrusion has occurred if the GCWW security guard is not available.
Determine if an intruder had access to the water supply.
Request the GCWW control center operator to contact the WUERM of a Possible
contamination incident.
GCWW Security
Personnel
Receive witness accounts of possible intrusion.
Determine if public witness accounts of possible intrusion are legitimate.
Notify the Control Center Operator of a possible intruder due to a witness account.
Investigate the facility with the intrusion alert for an apparent intruder, along with
Distribution Division personnel and local law enforcement agency.
Provide access to facility for law enforcement officials.
Log the incident if the investigation determines that either intrusion or access to the
water supply did not occur.
Determine if an intrusion has occurred.
Determine if an intrusion has provided access to the water supply if the plant
supervisor is not available.
Local law enforcement
Conduct the onsite investigation of the intrusion alert with GCWW Security,
Distribution Division, or both, if warranted.
All GCWW employees
Notify GCWW Security after witnessing possible intruders.
WUERM
Assume the lead in the credibility determination process, as outlined in the
Cincinnati Pilot Consequence Management Plan, once the Possible contamination
incident has been reported.
Implement the Cincinnati Pilot Consequence Management Plan as necessary.
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 2-3. Invalid Alert Indicators
Intrusion Alert
Type
All Alerts at Video-
monitored Sites
Door or hatch
Area motion sensor
Ladder
Ladder
Invalid Alert Indicator
Employee is seen in the video clip.
A door intrusion alert or alerts are generated immediately after
the system was armed.
Video clip showed nothing in the area monitored by the motion
sensor.
A radio fault or tank water level alert accompanies a ladder
intrusion alert.1
A door alert does not precede a ladder intrusion alert.2
Invalid Alert Type
No call-in
Door prop
Equipment-caused
Radio fault caused ladder
Equipment-caused
Notes:
1. There were two indications of problems with the radio signal at ladder sites. One was a radio fault from the wireless module, and
the other was a tank water level alert that occurred within a few seconds of the ladder intrusion alert. When either of these
conditions occurred, the alert was considered false and caused by radio issues.
2. The only way for an intruder to gain access to the ladder was to first enter the facility through the door. There were no windows at
the ladder facilities. If a door alert did not precede the ladder alert, the alert was considered false, and caused by an issue with the
ladder sensor.
2.4 Summary of Significant ESM Component Modifications
The modifications discussed in the previous subsections were implemented to improve the performance
of the ESM component. The impact of these component modifications on performance can be observed
in the metrics used to evaluate the degree to which the ESM component met the design objectives
described in Section 1.1. Table 2-4 summarizes these modifications and will serve as a reference when
discussing the results of the evaluation presented in Sections 4 through 7.
Table 2-4. ESM Component Modifications
ID
1
2
Design Element
Physical Security
Equipment
Physical Security
Equipment
Component Modification
Modification
Cause
Modification
Cause
The ladder motion sensor power supplies were rewired
to the GCWW SCADA uninterruptible power supply
(UPS) or replaced by 12 volt direct current UPS units.
The ladder motion sensors were powered by non-UPS
power supplies and the sensors would reboot after
loss of power, resulting in invalid alerts.
The ladder motion sensors were removed and ladder
hatches with contact sensors were installed at
elevated storage tanks.
The Hamilton County Sherriff requested this
modification during the ESM Drill 1 debriefing, so law
enforcement and emergency responders could have a
better idea of potential onsite threats. The ladder
hatch provided responders with a more conclusive
means of knowing whether an intruder had climbed the
ladder and could still be in the upper level of a storage
tank.
Date
March 2008
December 5,
2008
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
ID
3
4
5
6
7
8
Design Element
Physical Security
Equipment
Physical Security
Equipment
Physical Security
Equipment
Data
Management and
Communications
Data
Management and
Communications
Data
Management and
Communications
Component Modification
Modification
Cause
Modification
Cause
Modification
Cause
Modification
Cause
Modification
Cause
Modification
Cause
A contact switch was installed at a hatch at Pump
Station C.
CWS Full Scale Exercise (FSE) 2 featured a point of
contamination at Pump Station C that was not known
to the ESM team during the design phase and was
therefore left unmonitored. Adding a contact switch to
the hatch that allowed access to this point of
contamination addressed this vulnerability.
The video system server software was upgraded to
version 4.0.
The video system's automatic video clip deletion
feature was not available in version 3.0. Upgrading to
version 4 allowed video clips stored for a
predetermined time to be automatically deleted. This
functionality allows for improved disk space
management.
The data transmission packet size was adjusted in the
video monitoring system from 20,000 bytes to 1,400
bytes.
The video clip packets were not successfully
transmitted by the Cincinnati Bell network.
The GCWW instrument shop raised its SCADA
communications antenna from the side to the top of a
storage tank.
GCWW suspected that trees between the storage tank
antenna and pump station antenna were interfering
with the radio signal, causing radio faults. The GCWW
SCADA equipment often sent a false ladder alert when
a radio fault occurred.
Reprogrammed remote telemetry units to wait five
seconds after a ladder alert before transmission of
ladder alert to the GCWW HMI. If a radio alert
occurred during the waiting period, the ladder alert
was not transmitted.
Local radio interference between the storage tank
antenna and the pump station antenna caused radio
faults. The GCWW SCADA equipment often sent an
invalid ladder alert when a radio fault occurred.
All video system traffic was rerouted through an
existing GCWW WAN (Wide Area Network) T1
connection or a newly installed DSL connection.
Digital cellular connections from these pump station
locations were discontinued.
There was a digital cellular network issue that caused
all digital cellular video traffic from the video monitored
sites to be blocked.
Date
March 5,
2009
June 2008
January 6,
2009
October 2008
December
2008
PSC:
September
24, 2009
PSB:
December
29, 2009
PSA:
January 25,
2010
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
2.5 Timeline of ESM Development Phases and Evaluation-related Activities
Figure 2-2 presents a summary timeline for deployment of the ESM component, including milestone
dates indicating the occurrence of significant component modifications and drills and exercises. The
timeline also shows the completion date for design and implementation activities, along with the
subsequent real-time monitoring phases of deployment.
Jun-08
Video Software Upgraded
to Version 4.0
Dec-08
Ladder Motion
Jan-08 x Sensors Removed
Dec-08
5-second Telemetry
Delay Initiated
Dec-09
Video Switched from Digital
Cellular to T1 or DSL Connections
Jun-10
Optimization
Jan-08 - Jan-09
Windstorm FSE 2
Sep-08 Oct-08
Drill 2
Mar-09
Design &
Implementation
Complete
Jan-08
Figure 2-2. Timeline of ESM Component Activities
V
Real-time Monitoring
Jan-09 -Jun-10
End of Data
Collection
Jun-10
10
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 3.0: Methodology
The following section describes the evaluation techniques for the ESM component. The analysis of the
ESM component was conducted using five evaluation techniques: empirical data from routine operations,
results from drills and exercises, results from the simulation study, findings from ESM feedback forums,
and analysis of lifecycle costs.
3.1 Analysis of Empirical Data from Routine Operations
Data from ESM routine operations was collected monthly from February 16, 2008, to June 10, 2010. In
this evaluation, the term "reporting period" is used to refer to a month of data which spans from the 16th
of one month to the 15th of the next month. For example, the February 2008 reporting period refers to the
data collected between February 16, 2008 and March 15, 2008. Where applicable, results are summarized
by reporting period to illustrate temporal trends in the data.
Investigation data and timelines were collected through ESM investigation checklists. To facilitate and
document ESM intrusion alert investigations, lead investigators were required to fill out a checklist
indicating completion of procedures, summarizing findings and detailing the investigation time. Since
full deployment of the ESM system in February 2008, investigators have been expected to respond to
intrusion alerts from ESM sites in real time and then to complete checklists.
Empirical data from routine operations were collected by querying electronic logs from the CWS
SCADA, ESM video and GCWW SCADA systems throughout the evaluation period. The electronic log
data included intrusion alert start and end times, communication system downtimes and equipment
downtimes. Data were also obtained from paper call-in logs to document the number of valid entries at
each ESM location.
Intrusion alerts were categorized as either valid, indicating an actual intrusion incident, or invalid,
indicating no actual intrusion had occurred, or that the intrusion was authorized. An example of an
invalid alert would be if a GCWW employee triggered an intrusion alert while performing normal duties
but forgot to call the utility control center to verify entry into a facility. Under the same circumstances, if
the employee had called in to the control room upon entry, the incident would have been considered an
authorized entry into a facility, not an intrusion alert. For analysis, invalid alerts were grouped by root
cause: security procedure violations, equipment issues and environmental causes.
3.2 Drills and Exercises
During the evaluation period, drills were conducted to give the GCWW opportunities to practice standard
operating procedures for recognizing and responding to ESM intrusion alerts, and to coordinate with
external response partners, such as local law enforcement. Post-drill discussions provided the opportunity
to refine ESM standard operating procedures that needed further clarification or detail.
Three FSEs were also conducted to allow GCWW and its response partners to practice procedures and
coordinating at a multi-component, multi-organizational level. In total, four component drills and two
FSEs, which included ESM involvement, were conducted for the purpose of component evaluation.
These are discussed below and include:
ESM Drill 1 (June 26, 2008)
CWS FSE 2 (October 1, 2008)
ESM Drill 2 (March 11,2009)
11
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
ESM Drill 3 (April 30, 2009)
CWS FSE 3 (October 21, 2009)
ESM Drill 4 (April 13, 2010)
3.2.1 CWS Full Scale Exercise 2 (October 1, 2008)
Description: A FSE was conducted on October 1, 2008, to test all Cincinnati Pilot CWS components,
except ESM. The ESM component played a minor role during FSE 2. GCWW Security personnel were
instructed to contact local law enforcement and the Cincinnati Fire Department's Hazardous Materials
Removal Team (HazMat) to request assistance in securing the site and conducting the onsite
investigation. There was no ESM intrusion during the exercise.
The FSE 2 simulated contamination at an access point at an ESM facility that was not known to the ESM
team during the design phase and was therefore left unmonitored. Following this exercise, the ESM team
installed equipment to monitor this point of access to the distribution system, as mentioned in Table 2-4.
Relevant Participants: FSE 2 involved only one person from GCWW Security for ESM.
3.2.2 CIVS Full Scale Exercise 3 (October 21, 2009)
Description: The FSE 3 scenario involved the injection of a contaminant into the GCWW drinking water
system through a fire hydrant. The ESM component played a minor role during FSE 3, and involved one
member of GCWW Security conducting a security sweep of the impacted area, checking the status of the
Water Information Sharing and Analysis Center (WaterlSAC) website, and reporting his findings to the
WUERM. This player's actions were not anticipated and were viewed as positive. There was no ESM
intrusion planned for this exercise.
Relevant Participants: FSE 3 involved only one person from GCWW Security for ESM.
3.2.3 ESM Drills (1-4)
Description: The objectives of the ESM drills were to evaluate the investigation procedures and the
interactions among local law enforcement and GCWW Security and Distribution Division personnel.
Drill responders investigated an ESM intrusion alert to determine if drinking water contamination was
Possible. For Drills 1 through 3, these objectives were evaluated by initiating an intrusion alert at an
ESM facility and observing how GCWW and local law enforcement detected and responded. For ESM
Drill 4, these objectives were evaluated by simulating a witness account and verbal threat of a possible
intrusion at a GCWW facility. In addition to evaluating procedures and observing interactions, the
elapsed times between actions were also recorded. Section 6.5.3 discusses ESM drill results.
Variations among drills included whether the site had video monitoring, whether the intrusion occurred
during business or non-business hours, the local law enforcement agency involved and the number of
GCWW and law enforcement participants. Table 3-1 summarizes the variations among drills.
Relevant Participants: ESM relevant participants are listed in Table 3-1.
12
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 3-1. ESM Drill Variations
Variations
Time of Drill (N = Normal business hours, A = After hours)
Site has video monitoring?
Local Law Enforcement Agency
(C = Cincinnati Police, H = Hamilton County Sherriff's Dept,
S = Simulated by Drill Observer)
Drill 1
6/26/08
N
N
H2
Drill 2
3/11/09
N
Y
C
DNII3
4/30/09
N
Y
S
Drill 4
4/13/10
A
Y1
S
Drill Participants
GCWW Control Center Operator
GCWW Plant Supervisor
GCWW Security Guard
Law Enforcement
1
1
1
1
1
1
1
2
1
1
1
O3
1
1
2
0
Notes:
1. The site of ESM Drill 4 had video monitoring, but for the drill scenario, the video monitoring was assumed to be out-of-service.
2. Members of the Anderson Township Fire Department and HazMat and Cincinnati Fire Department/HazMat were drill observers
and participated in the post-drill discussion and debriefing.
3. The GCWW Head of Security, a 20+ year veteran of the Cincinnati Police Department, simulated the role of law enforcement.
3.3 Simulation Study
Evaluation of certain design objectives relies on the occurrence of contamination incidents with known
and varied characteristics. Because contamination incidents are extremely rare, there is insufficient
empirical data to fully evaluate the detection capabilities of the Cincinnati CWS. To fill this gap, a
computer model of the Cincinnati CWS was developed and challenged with a large ensemble of
simulated contamination incidents in a simulation study. For the ESM component, simulation study data
was used to evaluate the following design objectives:
Spatial Coverage: ESM was limited in its ability to detect contamination incidents throughout
the distribution system since only specific utility locations are monitored for intrusions that may
lead to contamination in the ESM component. However, the consequences if a contamination
incident did occur at an ESM site may be widespread. Thus, the CWS model was used to
evaluate the population and area impacted if a simulated contamination incident were to occur at
each of the ESM-monitored sites. The results were used to analyze the importance of installing
ESM equipment at the monitored sites, especially the ones chosen for video monitoring.
Timeliness of Detection: Analyses conducted to evaluate this design objective quantified the
time between the start of contaminant injection and when investigators determined that
contamination was Possible. Analyses was also conducted to determine if the response times of
GCWW and law enforcement personnel to an ESM alert were short enough to prevent or
interrupt an intentional contamination incident.
A broad range of contaminant types, producing a range of symptoms, was utilized in the simulation study
to characterize the detection capabilities of the monitoring and surveillance components of a CWS. For
the purpose of the simulation study, a representative set of 17 contaminants was selected from the
comprehensive contaminant list that formed the basis for CWS design. These contaminants are grouped
into the broad categories listed below (the number in parentheses indicates the number of contaminants
from that category that were simulated during the study).
13
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Nuisance Chemicals (2): these chemical contaminants have a relatively low toxicity and thus
generally do not pose an immediate threat to public health. However, contamination with these
chemicals can make the drinking water supply unusable.
Toxic Chemicals (8): these chemicals are highly toxic and pose an acute risk to public health at
relatively low concentrations.
Biological Agents (7): these contaminants of biological origin include pathogens and toxins that
pose a risk to public health at relatively low concentrations.
Development of a detailed CWS model required extensive data collection and documentation of
assumptions regarding component and system operations. To the extent possible, model decision logic
and parameter values were developed from data generated through operation of the Cincinnati CWS,
although input from subject matter experts and available research was utilized as well.
The simulation study used several interrelated models, three of which were relevant to the evaluation of
ESM: EPANET, Health Impacts and Human Behavior (HI/HB) and the ESM component model. Each
model was further broken down into modules that simulated a particular process or attribute of the model.
The function of each of these models, and their relevance to the evaluation of ESM, is discussed below.
EPANET
EPANET is a common hydraulic and water quality modeling application widely used in the water
industry to simulate contaminant transport through a drinking water distribution system. In the simulation
study, it was used to produce contaminant concentration profiles at every node in the GCWW distribution
system model, based on the characteristics of each contamination scenario in the ensemble. The
concentration profiles were used to determine the number of miles of pipe contaminated during each
scenario, which is one measure of the consequences of that contamination scenario.
Health Impacts and Human Behavior Model
The HI/HB model used the concentration profiles generated by EPANET to simulate exposure of
customers in the GCWW service area to contaminated drinking water. Depending on the type of
contaminant, exposures occurred during one showering event in the morning (for the inhalation exposure
route), or during five consumption events spread throughout the day (for the ingestion exposure route).
The HI/HB model used the dose received during exposure events to predict infections, onset of
symptoms, health-seeking behaviors of symptomatic customers and fatalities.
The primary output from the HI/HB model was a case table of affected customers. This captured the time
at which each affected customer transitioned to mild, moderate and severe symptom categories.
Additionally, the HI/HB model outputted the times at which exposed individuals would pursue various
health-seeking behaviors, such as visiting their doctor or calling the poison control center. The case table
was used to determine the public health consequences of each scenario, specifically the total number of
illnesses and fatalities. Furthermore, EPANET and the HI/HB model were run twice for each scenario;
once without the CWS in operation and once with the CWS in operation. The paired results from these
runs were used to calculate the reduction in consequences due to CWS operations for each simulated
contamination scenario.
Enhanced Security Monitoring Component Model
The ESM model consists of two modules: Event Detection and Alert Validation. The Event Detection
module was based on the component as deployed and currently operating in the Cincinnati CWS. Site-
specific contamination scenarios were developed for each utility facility with ESM capabilities. The
simulation study was designed such that scenarios originating at ESM facilities could potentially be
interrupted prior to contaminant injection, thus achieving 100% reduction in consequences.
14
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Outputs of the ESM Event Detection module provided inputs to the ESM Alert Validation module. The
primary outputs from the ESM Event Detection module were time of alert, location of alert and type of
alert (video or non-video sites). This information was used by the ESM Alert Validation module to
determine whether contamination was Possible. The procedures included in this module were
representative of the alert investigation process that response partners and GCWW utilize in the
Cincinnati CWS.
The following assumptions used in the design of the ESM model are important to consider when
evaluating the simulation study results presented in this report:
All contamination scenarios were modeled as "pump and run" incidents. Specifically, it was
assumed that the perpetrator would set up the contaminant injection, turn on the pump and then
leave. Thus, the first responders (utility/police) eventually discovered the equipment, which
quickly established that contamination was Credible or Confirmed.
ESM always detected scenarios with an injection location at an ESM facility, regardless of the
contaminant used in the scenario.
No benign causes for ESM alerts were found during investigations. The practical implication of
this assumption is that in the simulations, the investigation was not prematurely terminated.
3.4 Forums
Throughout implementation and optimization of the ESM system, the EPA, GCWW, and contract support
personnel met monthly to review data and component operation, and to discuss modifications. The
monthly meetings provided regular, timely feedback on the ESM component. In addition, two lessons
learned workshops and an exit interview were conducted as follows:
Lessons Learned Workshop, June 17, 2008, was limited to nine EPA and contractor support
personnel responsible for the design and implementation of the ESM. The object of the workshop
was to revisit key decisions made during the process and solicit specific feedback on successes
and challenges encountered.
Lessons Learned Workshop, August 12, 2009, included 15 EPA, GCWW, and contract support
personnel involved in the design, implementation, and daily operation of the ESM system. The
object of the workshop was to elicit specific lessons learned information from the Cincinnati Pilot
utility through discussions and to gather feedback concerning how lessons learned may be shared
with the drinking water sector.
Exit Interviews, June 2010, was limited to key GCWW members of the ESM evaluation team to
provide a final opportunity to learn and document GCWW's perceptions and experiences with
ESM since assuming full ownership in June 2009.
3.5 Analysis of Lifecycle Costs
A systematic process was used to evaluate the overall cost of the ESM component over the 20-year life
cycle of the Cincinnati CWS. The analysis includes implementation costs, component modification costs,
annual operations and maintenance (O&M) costs, renewal and replacement costs, and the salvage value of
major pieces of equipment at the end of the life cycle.
Implementation costs include labor and other expenditures (equipment, supplies and purchased services)
for installing the ESM component. Implementation costs were summarized in Water Security Initiative:
Cincinnati Pilot Post-Implementation System Status (USEPA, 2008), which was used as a primary data
15
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
source for this analysis. In that report, overarching project management costs incurred during the
implementation process were captured as a separate line item. However, in this analysis, the project
management costs were equally distributed among the six components of the CWS, and are presented as a
separate line item for each component. Component modification costs include all labor and expenditures
incurred after the completion of major implementation activities in December 2007 that were not
attributable to O&M costs. These modification costs were tracked on a monthly basis, summed at the end
of the evaluation period and added to the overall implementation costs.
It should be noted that implementation costs for the Cincinnati CWS may be higher than those for other
utilities given that this project was the first comprehensive, large-scale CWS of its kind and had no
experience base to draw from. Costs that would not likely apply to future implementers (but which were
incurred for the Cincinnati CWS) include overhead for EPA and its contractors, cost associated with
deploying alternative designs and additional data collection and reporting requirements. Other utilities
planning for a similar large-scale CWS installation would have the benefit of lessons learned and an
experience base developed through implementation of the Cincinnati CWS.
Annual O&M costs include labor and other expenditures (supplies and purchased services) necessary to
operate and maintain the component and investigate alerts. O&M costs were obtained from procurement
records, maintenance logs, investigation checklists and training logs. Procurement records provided the
cost of supplies, repairs and replacement parts, while maintenance logs tracked the staff time spent
maintaining the ESM component. To account for the maintenance of documents, the cost incurred to
update documented procedures following drills and exercises conducted during the evaluation phase of
the pilot was used to estimate the annualized cost. Investigation checklists and training logs tracked the
staff hours spent on investigating alerts and training, respectively. The total O&M costs were annualized
by calculating the sum of labor and other expenditures incurred over the course of a year.
Labor hours for both implementation and O&M were tracked over the entire evaluation period. Labor
hours were converted to dollars using estimated local labor rates for the different institutions involved in
the implementation or O&M of the ESM component.
The renewal and replacement costs are based on the cost of replacing major pieces of equipment at the
end of their useful life. The useful life of ESM equipment was estimated using field experience,
manufacturer-provided data, and input from subject matter experts. Equipment was assumed to be
replaced at the end of its useful life over the 20-year life cycle of the Cincinnati CWS. The salvage value
is based on the estimated value of each major piece of equipment at the end of the life cycle of the
Cincinnati CWS. The salvage value was estimated for all equipment with an initial value greater than
~$1,000. Straight line depreciation was used to estimate the salvage value for all major pieces of ESM
equipment based on the lifespan of each item.
All of the cost parameters described above (implementation costs, component modification costs, O&M
costs, renewal and replacement costs, and salvage value) were used to calculate the total 20-year lifecycle
cost for the ESM component, as presented in Section 6.7.
16
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 4.0: Video Monitored Sites
The following section provides a description of the video monitored sites followed by the results of the
evaluation of this data stream. This analysis includes an evaluation of metrics that characterize how these
sites achieve the design objectives described in Section 1.1. Specific metrics are described for each of the
design objectives.
4.1 Description
The introduction of video monitoring equipment was a significant security enhancement at selected
facilities. An event-based video system was chosen over the continuously streaming video system
typically found in conventional closed circuit television systems because of its ability to function on low
bandwidth communication networks. The system transmitted only short duration video clips in response
to a detected security incident, thus imposing only a brief data load on the communications system.
Incident detection at the selected locations was provided by contact switches on external doors and by
area motion detectors along interior walls that have windows or ventilation louvers. Once a switch or
motion detector was triggered, video clips were transmitted to the control center for assessment by
operations personnel. Video may provide personnel with visual evidence to validate whether an intrusion
or contamination incident is actually occurring without having to conduct an onsite investigation.
4.2 Design Objective: Spatial Coverage
While the ESM video sites each covered only one access point to the distribution system, limiting their
detection capability and spatial coverage, the consequences of a contamination incident at these sites
would be widespread. Sites that had the highest number of theoretical fatalities from simulated attacks
using the Threat Ensemble Vulnerability Assessment (TEVA) analytical framework were chosen for
video monitoring ESM enhancements. Using this methodology, three pump stations were selected for
ESM video monitoring enhancements. Intrusion detection devices and video monitoring were installed at
all points of entry that could allow an intruder access to the water supply at these locations. Pump
stations provided an opportunity for testing the limits of the video technology due to their relatively large
areas and multiple points of intrusion, which in some cases included long banks of windows.
4.3 Design Objective: Contaminant Coverage
The ESM component did not consider specific contaminants or detection classes of contaminants;
however, the volume of contaminants and method of contaminant injection were considered during the
ESM design of the video monitored sites. All video monitored sites were pump stations, and the design
assumed that a perpetrator would need to gain access to a pressurized line and use an injection pump to
overcome the system pressure. In assuming the use of an injection pump, the design also assumed a
perpetrator would inject a liquid or slurry from a 55-gallon drum or tank truck. As a result, all points of
entry that could allow access for such equipment were monitored.
4.4 Design Objective: Alert Occurrence
4.4.1 Invalid Alerts
For the Cincinnati pilot evaluation, intrusion alerts are categorized as either a valid alert, indicating an
actual contamination incident, or an invalid alert. A valid alert is an observed deviation from the base
state of a monitored data stream that is not a result of a contamination incident. Invalid alerts are results
17
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
from a component that indicate an anomaly is present when there is no contamination or valid alert.
Invalid alerts are of great concern to any security system, as they are one of the most significant
impediments to system effectiveness. A large number of invalid alerts erodes a utility's confidence in an
intrusion alert system and significantly increase the labor hours associated with intrusion alert
investigations.
For the ESM component, an invalid alert specifically refers to an intrusion that has been detected, but no
actual intrusion has occurred. An example of an invalid alert would be if a GCWW employee triggered
an intrusion alert while performing normal duties but forgot to call the utility control center to verify entry
into a facility. Under the same circumstances, if the employee had called in to the control room upon
entry, the incident would have been considered a valid entry into a facility, not an intrusion alert. For
analysis, invalid alerts were grouped by root cause: security procedure violations, equipment issues and
environmental causes.
Invalid alerts caused by security procedure violations were categorized as either "no call-in" or "door
prop." These security procedure categories were also divided by type of facility, including staffed pump
station, frequently visited unstaffed pump station, and infrequently visited unstaffed pump station.
Invalid alerts caused by equipment issues were categorized by equipment type, including "door/hatch
sensors" and "area motion sensors." Ladder motion sensors at video-monitored sites are discussed in
Section 5.4 along with the ladder motion sensors installed at non-video monitored sites. Environmental
causes were the third category of invalid alert causes. Because only a handful of invalid alerts were
attributed to environmental factors, this category was omitted from the analysis. Only two devices were
installed at outdoor locations at video monitored sites.
To generalize the invalid alert data, the security procedure violation metrics were normalized by number
of valid entries and, where applicable, number of doors. Invalid alerts due to equipment issues were
normalized by the number of sensors.
To implement the above categorizations of invalid alerts, Section 4.4.1 is organized as follows:
Security Procedure Violations - Door Props
o Unstaffed and infrequently visited pump station
o Staffed pump station
o Unstaffed and frequently visited pump station
Security Procedure Violations - No Call-Ins
o Unstaffed and infrequently visited pump station
o Staffed pump station
o Unstaffed and frequently visited pump station
Equipment-Caused Invalid Alert
o Area Motion Sensors
Door/Hatch Sensors
Security Procedure Violations-Door Props
Definition: A security procedure violation occurred when an employee did not follow security
procedures and an invalid alert was generated. A door prop was a type of security procedure invalid alert
that occurred when authorized personnel left a door propped open that should have been closed when
personnel left the facility.
Standard operating procedures require that the utility control center operator arm the ESM system at a
facility after being notified by personnel that they had left the premises. A door prop invalid alert was
generated when the ESM system was armed and detected that a secure door was left open. All intrusion
detection devices at video sites use the ESM system for displaying intrusion alerts at the utility control
18
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
center. The ESM system can be enabled by the utility control center operator using their HMI. If the
utility control center operator is not notified, the ESM systems at all video-monitored sites are
programmed to arm automatically at a preset time.
Analysis Methodology: This metric was segregated by the site types listed in Section 4.4.1. Each pump
station was associated with one of the following categories of facilities:
Unstaffed and infrequently visited: Pump Station A
Staffed: Pump Station B
Unstaffed and frequently visited: Pump Station C
The segregation by site type allowed for individual analysis, as well as comparison among site types.
Furthermore, the door prop data was normalized by the number of monitored doors and the number of
valid entries to each facility. Facilities with many doors may have a higher probability of door prop
instances, just as a frequently visited facility may be more likely to have a door propped open.
Results: Figure 4-1 shows the door prop metrics for Pump Station A, an unstaffed and infrequently
visited pump station where all employees must call the utility control center to announce arrival,
regardless of time of day. In general, Pump Station A is visited less often than Pump Stations B and C.
18 -
to 14
Q.
O
O
O
5
0) p
E
2 _
0 -
^
» Door Props
Average Door Props
Valid Entries
Average Valid Entries
H Avg = 47 valid entries
'
^ B
Avg = 0.9 door props ^ ^ A. A. A.
V//MS&/S&S/SSSS&&&S/?
Start Date of Monthly Reporting Period
-180
z
1
<
0)
m
3
ss'
- 20
- 0
Note: The average number of door props was 0.9, the average number of valid entries 47 per reporting period.
Figure 4-1. Pump Station A (Unstaffed, Infrequently Visited): Door Props
There were, on average, 0.9 door props per reporting period at Pump Station A. There was a relationship
between the door props and valid entries. Of the six reporting periods that had an above average number
of door props, four reporting periods also had a higher than average number of valid entries.
The number of invalid alerts due to door props did not decrease over the course of the evaluation period,
likely because ESM did not implement any significant changes to the security procedures and because of
a door that was prone to propping throughout the evaluation period. There was a minimal learning curve
associated with training the utility staff on the ESM procedures at this unstaffed facility. The pre-ESM
standard operating procedures required that personnel shut all doors at the facility except one seldom-used
interior door which had a problem with alignment and only closed when excessive force was applied.
19
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
This condition existed before installation of the ESM system at Pump Station A and continued throughout
the evaluation period.
There was an increase in door props during the August 2009 to November 2009 reporting periods.
Contractors and utility personnel were working on a project that required frequent use of the misaligned
door that required excessive force to close. The door was repeatedly left ajar inadvertently, resulting in
multiple invalid alerts.
Figure 4-2 shows the door prop metrics for Pump Station B, a staffed pump station. The valid entries
shown in Figure 4-2 are the number of after-hours visits that were called in to the utility control center.
Since the Pump Station B is normally staffed, employees did not call in during business hours.
There were, on average, more door props and valid entries at the staffed facility compared to the
unstaffed, infrequently visited facility. The door props and valid entries for Pump Station B were 3.6 and
63 compared to 0.9 and 47 for Pump Station A.
There was a slight relationship between door props and valid entries at Pump Station B. Of the ten
reporting periods that had an above average number of door props, four reporting periods also had a
higher than average number of valid entries.
The number of invalid alerts due to door props decreased over the course of the evaluation period for
Pump Station B. Training and familiarizing utility and contractor personnel of the new practice of closing
all ESM-monitored interior and exterior doors reduced invalid alerts at this staffed facility. With ESM,
interior doors that led to the pump floor or anywhere an intruder could access the water were monitored.
18
16
14
12
10
Door Props
Average Door Props
Valid Entries
Average Valid Entries
180
4- 160
-- 140
Avg = 63 valid entries
Avg = 3.6 door props
120
100 o
80 g
m
60 I
40
20
Start Date of Monthly Reporting Period
Figure 4-2. Pump Station B (Staffed): Door Props
Figure 4-3 shows the door prop metrics for Pump Station C, an unstaffed and frequently visited pump
station where all employees must call the utility control center to announce arrival, regardless of time of
day. Although Pump Station C is no longer staffed, utility employees and contractors visit the site often
for capital improvements, maintenance work and training.
20
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
18 -
14 -
to
2 19
£
Q
14-
o
b
E
i
0 -
^
,
* *
«.
Avg- 4.1 door props
^ ^ ^ ^
^ ^
^^^^^^^^^^^5^^^^^
Start Date of Monthly Reporting Period
1
Avg = 127 valid entries I
» Door Props
Average Door Props
Valid Entries
Average Valid Entries
W
> w +
/vvvvvv
w
>
-180
- 140
0)
m
- fiO |-|-
(I)'
- 0
Note: There was a noticeable downward trend in door props over the evaluation period.
Figure 4-3. Pump Station C (Unstaffed, Frequently Visited): Door Props
There were, on average, more valid entries and more door props at the unstaffed, frequently visited
facility (4.1 and 127) compared to the unstaffed, infrequently visited facility (0.9 and 47) and staffed
facility (3.6 and 63). There was no relationship between door props and valid entries at Pump Station C.
Of the nine reporting periods that had an above average number of door props, none had a higher than
average number of valid entries.
Similar to Pump Station B, the number of invalid alerts due to door props for Pump Station C decreased
over the course of the evaluation period. Training and familiarizing utility and contractor personnel of the
new practice of closing all ESM-monitored interior and exterior doors reduced invalid alerts at this staffed
facility. Before ESM, only exterior doors to a pump station were monitored. With ESM, interior doors
that led to the pump floor or anywhere an intruder could access the water were monitored.
Figure 4-4 shows the door prop metrics normalized by number of valid entries and monitored doors at
each pump station. The normalization factors were chosen because a larger number of valid entries and
monitored doors could increase the probability of door prop occurrence. Furthermore, each pump station
had different numbers of valid entries and monitored doors. Table 4-1 summarizes the data shown in
Figure 4-4.
21
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
5 _
o
O A ^ _
Q
to
.a. 4
UJ oc
5 3
0
0
T- 25
to
d.
° 2 -
£ i
0 1 £7
Q
0 1
Ji
u.o
3
z
o/
1
1
ii
1
1
1 1
I E
&<<<*X
Pump Station A
Pump Station C
III. i i
1 1 1 iL. g_S gj-i
1 II.M H^H il.i.
«?" vC?* vC?> «?> «? *? «?«?«? .C? vC? vC?> ^ ^ ^ ^ ^
^%?\N*\S^^
Start Date of Monthly Reporting Period
Note: Employee education reduced the number of door props over time, except at Pump Station A where there were no new
standard practices as a result of ESM.
Figure 4-4. Pump Stations: Door Props/100 Valid Entries/Door
Table 4-1. Summary of Pump Station Door Prop Data
Location
Pump Station A (unstaffed,
infrequently visited)
Pump Station B (staffed)
Pump Station C (unstaffed,
frequently visited)
All Stations, Combined
Average
Average Door Props per
Reporting Period
0.9
3.6
4.1
2.9
Normalized Average
Door Props per 100 Valid
Entries per Door
0.44
0.49
0.34
0.42
Average Valid Entries
per Reporting Period
47
63
127
79
Pump Station C had the highest average door props per reporting period at 4.1, but after normalization,
Pump Station B had the highest average per reporting period per 100 valid entries per door, at
0.49/100 valid entries/door.
The number of normalized door props for Pump Stations B and C tended to decrease over the evaluation
period. Training and familiarizing utility and contractor personnel of the new practice of closing all
ESM-monitored interior and exterior doors reduced door prop invalid alerts at the facilities. See the
discussion following Figures 4-2 and 4-3 for details.
The number of normalized door props for Pump Station A did not decrease over the evaluation period,
likely because ESM did not implement any significant changes to the security procedures at Pump
Station A. There were above average values of normalized door props at Pump Station A during the
August 2009 to November 2009 reporting periods because of project work. The project required frequent
use of a door that was prone to propping. See the discussion following Figure 4-1 for details.
22
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The average normalized door props for the Pump Stations ranged from 0.34 to 0.49 door props/100 valid
entries/door. When averaging all pump stations, there were 2.9 door props and 79 valid entries per
reporting period.
Security Procedure Violations - No Call-Ins
Definition: A no call-in security procedure violation occurred when GCWW personnel did not follow
established procedures for calling in to the utility control center within a designated time span of entering
a facility. An intrusion alert was generated automatically when anyone entered a facility, but an entry
was considered valid if an employee called in within a designated time span. Personnel at the utility
control center could observe a no call-in incident when the video clip showed an employee entering the
facility. If video data were not available, a no call-in incident could be verified when onsite investigators
or local law enforcement arrived at the facility and witnessed the employees at the site.
Analysis Methodology: This metric was segregated by the site types listed in Section 4.4.1. The site
types include the following categories of facilities:
Unstaffed and infrequently visited
Unstaffed and frequently visited
Staffed
Segregation by site type allowed analysis of each type individually and also comparison among types.
Furthermore, the no call-in data were normalized by the number of valid entries to a pump station, since a
frequently visited facility would have a higher probability of an employee not calling in.
Results: Figure 4-5 shows the no call-in metrics for Pump Station A, an unstaffed and infrequently
visited pump station where all employees must call the utility control center to announce arrival,
regardless of time of day. In general, Pump Station A is visited less often than Pump Stations B and C.
23
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
18
c
re if -
O
° 10
S P
5
= 6 -
. ipn
No Call-Ins
Average No Call-Ins
Valid Entries
Average Valid Entries
, B Avg = 47 valid entries
g g
* Avg =1.1 no^call-ins
Start Date of Monthly Reporting Period
..' '
z
c
0)
m
- 60 -
en
- d.n
t& rS> »5^ i^ »5^ »^ »5^
Figure 4-5. Pump Station A (Unstaffed, Infrequently Visited): No Call-Ins
The average number of no call-ins per reporting period was 1.1. There was no relationship between the
no call-ins and valid entries. Of the nine reporting periods that had an above average number of no call-
ins, only three also had a higher than average number of valid entries. The number of invalid alerts due to
no call-ins did not decrease over the course of the evaluation period, likely due to ESM not implementing
any significant changes to the utility's call-in procedures.
Figure 4-6 shows the no call-in metrics for Pump Station B, a staffed pump station. The valid entries
shown are the number of after-hours visits called in to the utility control center. Since Pump Station B is
normally staffed, employees did not call in during business hours.
There were, on average, more no call-ins and valid entries at the staffed facility compared to the
unstaffed, infrequently visited facility. The no call-ins and valid entries per reporting period for Pump
Station B were 1.6 and 63, compared to 1.1 and 47 for Pump Station A.
There was no relationship between the no call-ins and valid entries at Pump Station B. Of the nine
reporting periods that had an above average number of no call-ins, only one reporting period also had a
higher than average number of valid entries.
There were a higher number of no call-ins during the first seven reporting periods of the evaluation period
compared to the last 21 reporting periods. There were no significant changes to the utility's call-in policy
during the evaluation that could have affected the frequency of no call-ins. However, the utility's efforts
to reiterate the call-in policy to employees was an ongoing process.
24
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
18 -
ifi -
to
c
TO
O
*O
E
-3 e
2
2 -
0 -
= g
£ * ' ' "
Avg = 1 .6 no call-ins
A A A A A
Start Date of Monthly Reporting Period
No Call-Ins
Average No Call-Ins
Valid Entries
Average Valid Entries
Avg = 63 valid entries H
*
* * *
c^ c9* i*S^ i^ i^ i^ i^
180
ifin
0)
m
fin 3-
8'
Af\
20
0
Figure 4-6. Pump Station B (Staffed): No Call-Ins
Figure 4-7 shows the no call-in metrics for Pump Station C, an unstaffed and frequently visited station
where all employees must call the utility control center to announce arrival, regardless of time of day.
Although Pump Station C is no longer staffed, utility employees and contractors visit the site often for
capital improvements, maintenance work, and training.
18 -
to
O
1
1
E
3 fi -
z
^
.
1 _
A
4
Avg = 1 .4 no call-ins + ^ ^4
****** * *
^y^v^v^
Start Date of Monthly Reporting Period
vg= 127 valid entries I
* No Call-Ins
Average No Call-Ins
Valid Entries
Average Valid Entries
* * *
^AVVV
180
z
- mn n
m
-fin |-|-
Figure 4-7. Pump Station C (Unstaffed, Frequently Visited): No Call-Ins
There were, on average, more no call-ins and valid entries at the unstaffed and frequently visited facility
(1.4 and 127) compared to the unstaffed, infrequently visited facility (1.1 and 47) but not compared to the
staffed facility (1.6 and 63). There was no relationship between the no call-ins and valid entries at Pump
25
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Station C. Of the nine reporting periods that had an above average number of no call-ins, only two also
had a higher than average number of valid entries.
Except for the March 2008 reporting period, which had seven no call-ins, the number of invalid alerts due
to no call-ins did not decrease over the course of the evaluation period, likely because ESM did not
implement any significant changes to the utility's call-in procedures at Pump Station C. The decrease in
the March 2008 reporting period in no call-ins was a random occurrence rather than a systemic trend.
Figure 4-8 shows the no call-in metrics normalized by number of valid entries at each pump station. The
normalization factor was chosen, because having a larger number of valid entries could increase the
probability of no call-in occurrence. Furthermore, each pump station had different amounts of valid
entries. Table 4-2 summarizes the data shown in Figure 4-8, and includes the average no call-in metrics
for comparison among the pump stations.
Pump Station B had the highest non-normalized and normalized average no call-ins per reporting period
at 1.6 and 2.99/100 valid entries.
The number of normalized no call-ins for Pump Stations A and C did not decrease over the evaluation
period. This was likely because ESM did not implement any significant changes to the utility's call-in
procedures. However, the number of normalized no call-ins for Pump Station B decreased over the
evaluation period. The utility's efforts to reiterate the call-in policy to employees was an ongoing
process.
The average normalized no call-ins for the Pump Stations ranged from 1.19 to 2.37 no call-ins/100 valid
entries. When averaging all pump stations there were 1.4 no call-ins and 79 valid entries per reporting
period.
30
to
0)
B 1C
ns 7 100 Valid Er
^ N) h
n o i
nberof No Call-l
r\ o c
3
Z
J
I
\
ft
III
Pump Station A
Pump Station B
Pump Station C
^fnrrTfr^
P ?
in. in .
Start Date of Monthly Reporting Period
Note: There was a reduction in the number of normalized no call-in incidents over time at Pump Station B, but not for the other
pump stations.
Figure 4-8. Pump Stations: No Call-ins/100 Valid Entries
26
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 4-2. Summary of Pump Station No Call-in Data
Location
Pump Station A (unstaffed,
infrequently visited)
Pump Station B (staffed)
Pump Station C (unstaffed,
frequently visited)
All Stations, Combined
Average
Average Number of No
Call-Ins per Reporting
Period
1.1
1.6
1.4
1.4
Normalized Average
Number of No Call-ins
per 100 Valid Entries
2.37
2.99
1.19
2.18
Average Number of Valid
Entries per Reporting
Period
47
63
127
79
Equipment-Caused Invalid Alerts
Definition: An equipment-caused invalid alert occurred when an equipment issue caused an intrusion
detection device to trigger an alert when there was no intrusion. The following section will discuss
invalid alerts caused by equipment issues with the door/hatch and area motion sensors. The analysis for
the ladder motion sensors installed at the pump stations will be included in the ladder motion sensor
discussion for the non-video monitored sites in Section 5.4.
Analysis Methodology: This metric was segregated by the site types listed in Section 4.4.1. The site
types include area motion sensors and door/hatch sensors.
The segregation of equipment by type allowed for an analysis of each type individually, and for
comparison among types. The number of equipment-caused invalid alerts was normalized by the number
of sensors for each type, since a higher number of installed sensors increased the probability of having an
invalid alert. The analysis for equipment caused invalid alerts was not divided by site, since the cause of
these invalid alerts were equipment specific rather than site-dependent.
Results: Figure 4-9 shows the normalized equipment-caused alert metrics for area motion sensors. The
end of the Cooperative Research and Development Agreement (CRADA) on June 15, 2009, is noted on
the graph since this was the point at which all maintenance activity was turned over from EPA to the
utility. EPA addressed all known equipment issues before the end of the CRADA to minimize the initial
maintenance burden on utility staff.
Equipment-caused area motion sensor invalid alerts decreased over the course of the evaluation period.
Area motion sensor range and sensitivity configuration during sensor installation was lacking. Improper
configuration led to high invalid alert rates early in the evaluation period. Over the course of the
CRADA, sensors with high invalid alert rates had their ranges and sensitivities adjusted. Final range and
sensitivity adjustments were completed during May 2009 reporting period, prior to the end of the
CRADA.
Two post-CRADA reporting periods, June 2009 and October 2009, showed equipment-caused area
motion sensor invalid alerts. The invalid alert during the June 2009 reporting period was likely due to a
warm air mass moving through an open window. An area motion sensor generates an alert only when its
infrared detector senses a warm moving object at the same time that its microwave detector senses a
moving object, regardless of temperature. If an area motion sensor is overly sensitive, the minute motion
of objects caused by wind combined by motion of a warm air mass could generate an invalid alert. The
invalid alert during the October 2009 reporting period appears to have been caused by an issue with the
CWS SCADA system.
27
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
fe
0
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
percent of the door/hatch sensor invalid alerts. The door sensor's target mounting bracket bent with use,
causing the sensor to produce invalid alerts. The remedy for the problem was to bend the bracket back
into shape. The hatch sensor at Pump Station A was also prone to invalid alerts. The hatch sensor was a
reed type switch that was not an industrial grade device.
New sensors accounted for the remaining 26 percent of the door/hatch sensor invalid alerts. A new sensor
on a door at Pump Station A caused an alert during the February 2008 reporting period. This was an
isolated incident for this sensor. A new sensor on a door at Pump Station B caused alerts during the
January 2010 reporting period and required adjustment.
Table 4-3 shows the average times between invalid alerts and the invalid alerts per sensor per year for
area motion and door/hatch sensors. Industry standards from the Guidelines for the Physical Security of
Water Utilities (ASCE/AWWA, 2006), and also device costs, are provided in Table 4-3.
Table 4-3. Equipment Caused Invalid Alerts: Average Times Between Alerts
Days between Invalid Alerts per Sensor
Invalid Alerts per Sensor per Year
Cost per Device (2007 list prices)
Area Motion
Sensors
136
2.7
$450
Door/Hatch
Sensors
1,168
0.31
$260
ASCE/AWWA
Guideline
90 (minimum)
4 (maximum)
n/a
The door/hatch sensors had more than eight times the number of days between invalid alerts per sensor
for about 60 percent of the cost of a motion sensor. The area motion sensors and door/hatch sensors
installed at video sites both satisfied the American Society of Civil Engineers (ASCE) and American
Water Works Association (AWWA) guidelines for invalid alert rates. Although the door/hatch sensors
have a significantly lower invalid alert rate and are a fraction of the cost of an area motion sensor, the
door/hatch sensor can detect an intrusion only through a single door or hatch, but an area motion sensor
can detect intrusions over a large area.
4.4.2 Summary
The alert occurrence design objective was evaluated by examining the invalid alert metrics, which
measure a security system's effectiveness. The invalid alerts were categorized into security procedure
violations and equipment caused invalid alerts. Security procedure violations were further categorized
into door prop and no call-in incidents.
The analysis of the security procedure violations caused by door props showed the non-normalized and
normalized averages per reporting period were three door props and 0.42 door props/100 valid
entries/doors. Sites that had new ESM procedures for securing doors showed a decrease in the number of
door props over the course of the evaluation period. This was due to the time required to train and
familiarize utility and contractor personnel of the new practice of closing all ESM-monitored interior and
exterior doors.
The analysis of the security procedure violations caused by employees not calling in when arriving at a
facility showed the non-normalized and normalized averages per reporting period for no call-in invalid
alerts were 1.4 no call-ins and 2.18 no call-ins/100 valid entries. The utility's call-in procedure has
always been in place, so the decreasing trend observed with the door props was not observed for no call-
ins at two of the three video sites. The decreasing no call-in trend at the other video site indicated that the
utility's efforts to reiterate the call-in policy to employees was an ongoing process.
29
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
For equipment-caused invalid alerts, the area motion sensors had the highest average invalid alert rate per
reporting period at 0.22 invalid alerts per sensor, which equated to 136 days between invalid alerts per
sensor. Comparatively, for door/hatch sensors the rates were 0.023 invalid alerts per sensor and 1,186
days between invalid alerts per sensor. Both sensors met the ASCE/AWWA (2006) guideline of a
minimum of 90 days between invalid alerts per sensor. The area motion sensors invalid alerts trended
downward over the course of the evaluation period. Sensors that received inadequate sensitivity and
range configuration during installation were adjusted over the course of the evaluation as the sensors that
were prone to invalid alerts were identified. The door/hatch sensors had more than eight times the
number of days between invalid alerts than the area motion sensors, and cost only 60 percent as much as
the motion sensors.
Table 4-4 presents the percentage of each type of invalid alert at the video monitored sites. Security
procedure and equipment caused invalid alerts are both shown for comparison.
Table 4-4. Pump Station Invalid Alerts by Type
Invalid Alert Type
Door Prop (Security Procedure)
No Call-in (Security Procedure)
Area Motion (Equipment Caused)
Door Switch (Equipment Caused)
TOTAL
Percentage (%)
56%
26%
14%
4%
100%
Most invalid alerts were caused by door props. Equipment (door switch and area motion detectors)
caused 18 percent and security procedure violations caused 82 percent of all invalid alerts at pump
stations. Ladder motion sensor invalid alerts installed at pump stations are discussed in the non-video site
ladder motion sensor section in Section 5.4.
4.5 Design Objective: Timeliness of Detection
Timeliness of detection refers to the time for video to be transmitted and reviewed during an intrusion or
Possible contamination incident. Factors that affect this objective include time for a video clip to arrive at
the utility control center, time for the clip to be viewed by utility personnel, and time for determination of
Possible contamination to be made. Installation of cameras allowed GCWW staff to view intrusion alert
locations remotely and to determine quickly the validity of the alert. Video also allowed staff to more
confidently confirm a contamination attempt and to take response actions that normally would not be
completed, such as turning off pumps to prevent the spread of contamination. Without video, the
response time may be longer. Intrusion alert data collected at the pump stations is discussed in Section
6.4.1.
4.5.1 Time for Video Clip Transmission
Definition: Time for video clip transmission is the time required for a video clip to be transmitted from
the pump station site to the utility control center. This metric measured how effectively the video system
provided video information to utility personnel. Timely video clip transmission may provide utility staff
with evidence of a Possible contamination incident before dispatching investigators to the site.
Analysis Methodology: The time to transmit a video clip and the time to transmit a video clip
normalized by file size for each pump station per reporting period are shown.
30
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Results: Video system performance varied greatly over the evaluation period because of
communications and software issues. These issues are shown in Table 4-5, which documents the
timeline of events that affected video performance. Table 4-5 also discusses the modifications that were
implemented to work around or resolve these issues.
Table 4-5. Timeline of Events Affecting Video Data Transmission Time
Date
February -
June 2008
June 2008
June 2008-
January 2009
January 2009
January -
June 2009
June 2009
July-
August2009
September 2009
Video Transmission Event
Video System Version 3 was
running with video clip
transmission times of about
1 minute.
Upgraded to Video System
Version 4.
Video clip transmission times
increased significantly, especially
at Pump Station C.
The video data transmission
packet size was decreased from
20,000 bytes to 1,400 bytes to
remedy the signal strength effect
on clip transmission times.
Video clip transmission times
stabilized.
The digital cellular provider
blocked user datagram protocol
(UDP) traffic on the port used by
the video system.
To work around the UDP
blockage, the video system was
reconfigured to use the
transmission control protocol
(TCP).
Pump Station C communications
were successfully switched to a
T1 line.
Event Details
Version 3 could not automatically delete video clips that
were stored for a predetermined time. As a result, video
clips accumulated until either manually deleted or the
hard drive ran out of space.
Video system was configured to automatically delete
video clips older than six months.
Minor usability issues were also addressed in the Version
4 upgrade.
Signal strength problems occurred at Pump Station C,
likely because of adjacent structures and large nearby
trees obstructing the signal path to the cell tower.
Engineers were unable to determine whether increased
transmission time was due to the system software
upgrade or to the digital cellular provider imposing
restrictions on the utility's "unlimited" data plan.
Reducing packet size increased the likelihood a data
packet would be transmitted successfully, which was
critical for locations with low signal strength.
Reducing packet size also increased the time required to
transmit a video clip. Each successfully transmitted
packet contained less information, requiring transmittal of
more packets to deliver the video clip file, taking longer.
The slight increase in the video clip transmission time for
Pump Stations A and B can be attributed to this
phenomenon.
Video clip transmission times were roughly three
minutes, two minutes longer than during the pre-June
2008 period of stability.
Video clip transmission times increased significantly for
Pump Stations A and C, and increased slightly the
transmission time for Pump Station B.
Performance was erratic under the TCP configuration.
Under low signal strength conditions, the TCP protocol
performed poorly compared to UDP. This was an issue
at Pump Station C.
GCWW was reluctant to continue relying on the digital
cellular provider for video traffic and initiated plans to
switch the video sites to T1 and DSL landline
connections.
There was an existing T1 line at Pump Station C.
31
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Date
Video Transmission Event
Event Details
December 2009
Pump Station B communications
were successfully switched to a
T1 line.
There was an existing T1 line at Pump Station B.
January 2010
Communications at the pump
station A were successfully
switched to the new line.
There was not an existing T1 line at Pump Station A, but
there was an existing phone line. A new DSL connection
was installed at Pump Station A.
January-
June 2010
The video clip duration doubled.
The landline connections improved video data
performance. All three pump stations had the lowest
video clip transmission times over the entire evaluation
period. Because of improved performance and stability
of the communications system for video traffic, GCWW
doubled the video clip duration so that the point of
intrusion could be monitored for a longer period after the
intrusion.
Figure 4-11 shows the time for a video clip to be transmitted from each video monitored site to the utility
control center, and calls out significant video system events discussed in Table 4-5.
Q.
0
>
b
Pump Station C
Pump Station B
Pump Station A
Start Date of Monthly Reporting Period
Note: There were only two periods of instability: July 16, 2008-January 15, 2009, and July 16, 2009-October 15, 2009.
Figure 4-11. Pump Stations: Time for Video Clip Transmission
All three pump stations used digital cellular communications until they were switched to a Tl or DSL
connection. While using digital cellular communications, Pump Station C generally had a longer video
clip transmission time than the two other sites. Signal strength problems occurred at Pump Station C,
likely because of adjacent structures and large nearby trees obstructing the signal path to the cell tower.
The start of the first period of video instability coincided with a version upgrade to the video system
software, which was during the July 2008 reporting period. The first period of video instability
concluded after the packet size parameter was adjusted on the video system, which was during the
January 2009 reporting period. Smaller packet sizes are less prone to radio interference, but take longer
to transmit a large amount of data. This workaround solution reduced the video transmission time, but the
32
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
root cause behind the first period of instability was not determined. The likely causes were changes to the
video system software as a result of the version upgrade or restrictions from the digital cellular provider.
The video sites were switched to Tl or DSL connections after the digital cellular provider started
blocking video traffic during the June 2009 reporting period. Table 4-6 summarizes the average video
clip transmission times during the periods of stability.
Table 4-6. Video Clip Transmission during Periods of Stable Communications
Date
February-June 2008
January-June 2009
January-June 2010
Average Video Clip Transmission Time (seconds)
59
177
37
During the second period of stability, the video clip transmission time was three times longer than that of
the first period of stability. The data packet size was reduced to restore system stability. Smaller packet
sizes require more time to transmit a large amount of data. During the third period of stability, the video
clip transmission time was 38 percent less than that of the first period of stability and 79 percent less than
that of the second period. The video clip transmission time data for the third period of stability was
skewed by the fact that the utility doubled the video clip duration during the January 2010 reporting
period.
As noted, the video clip duration was doubled during the January 2010 reporting period. Initially, the
video clip was about 240 kilobytes, and after the January 2010 reporting period, about 380 kilobytes.
Thus, to give an accurate comparison of video transmission times before and after January 2010, the
video transmission times were normalized by video clip file size. Table 4-7 lists the normalized video
clip transmission times during the periods of stable communications.
Table 4-7. Normalized Video Clip Transmission - Periods of Stable Communications
Date
February-June 2008
January-June 2009
January-June 2010
Normalized Average
Video Clip Transmission Time
(seconds per 100 kilobytes)
24
74
10
During the third period of stability, the video clip transmission time normalized by clip file size is 58
percent less than that of the first period of stability and 86 percent less than that of the second period of
stability. When the video clip transmission time is not normalized, the improved performance using the
Tl and DSL lines is understated. As noted, the non-normalized reductions in transmission time during
the third period of stability are 38 percent less than the first period of stability and 79 percent less than the
second.
4.5.2 Time for Video Clip Viewing
Definition: Video clip view time is the time between an intrusion and the time utility personnel start
viewing the accompanying video clip. This metric measured how effectively the utility staff used the
video system to support investigations.
33
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Analysis Methodology: The view time of video clips used to support an onsite investigation or to verify
an invalid alert were analyzed. The view times of video clips that were not part of an investigation were
not considered to avoid skewing this analysis, because such clips were typically viewed multiple days
after intrusion when an operator inadvertently clicked on the clip or when viewed for training purposes.
Video clips that were not part of an investigation were usually generated when an employee called into
the utility control center, but the operator did not disarm the ESM system. When the ESM system was
armed, video clips were generated of all entries. A video clip that was part of an investigation was
typically viewed within 30 minutes after an intrusion. View times from the ESM drills at video-
monitored sites also were analyzed.
Results: The video clips that supported an onsite investigation or were used to verify an invalid alert
during the evaluation period were viewed an average of 3 minutes 14 seconds after the intrusion
(excluding two outliers). The outlier clips were viewed hours after the investigation had concluded and
were likely used for debriefs.
Twelve video clips were used as part of onsite investigations or to verify invalid alerts, including the two
outliers noted. Thirty-one onsite investigations were performed at the video-monitored sites. The use of
video to support investigations was reduced by the utility control center operators' lack of confidence in
the video system following the periods of video instability discussed in Section 4.5.1. After the issues
with video clip transmission were resolved following the transition to Tl and DSL connections, there
were no recorded onsite investigations at the video-monitored sites, so empirical data after the transition
were not available.
Data on the video clip view times were also collected during the ESM drills at video-monitored sites. The
utility control center operator viewed the video clips as soon as they were completely downloaded, six
minutes after the intrusion in ESM Drill 2 and two minutes after the intrusion in Drill 3. Drills 2 and 3
occurred before the Tl/DSL transition. During Drill 4, the utility control center operator switched the
video system to "live" mode after receiving the alert but before the video clip fully downloaded. Live
mode allowed the operator to view the inside of the facility with only a few seconds of delay, as a result
of the DSL connection at the drill site. The delay would be longer and the imagery more sporadic with a
slower connection. During the Drill 4 debriefing, the utility security and operations staff mentioned their
high level of confidence in the video system since the Tl/DSL transition. The Drill 4 events showed that
live video can be useful tool for responding to an intrusion, although the live mode requires a
communications link that can support the bandwidth demand. The live video also requires immediate
operator attention, which may be challenging if the operator is involved in a critical task. Event-based
video clips are still an essential response tool since the clip captures the actual intrusion at the point of
entry, has less bandwidth demand, and does not require immediate operator attention.
4.5.3 Summary
The timeliness of detection design objective was evaluated by examining the video data transmission
times and video clip view times.
The time for video clip transmission varied greatly over the course of the evaluation period because of
complex data transmission problems caused by software issues, localized signal strength problems and
digital cellular provider interruptions. After the digital cellular provider blocked video traffic during the
June 2009 reporting period, the utility transitioned the video monitored sites to Tl and DSL connections.
The transition began during the September 2009 reporting period and concluded during the January 2010
reporting period. By the end of the evaluation period, transmission time was consistently at the lowest
level, and the utility no longer reported major issues with the system. Engineers were able to double
video clip transmission time with the landline connections, which was not possible with the slower digital
cellular network.
34
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The video clip transmission metric was characterized by three extended periods of stability: February 16
through June 15, 2008, January 16 through June 15, 2009, and January 16, 2010 through the end of the
evaluation period. The first two periods used digital cellular communications, and the third, Tl and DSL
connections. Video clip transmission times were one minute for the first period, three minutes for the
second and 37 seconds for the third. When normalized by video clip file size, the transmission times were
24, 74 and 10 seconds per 100 kilobytes. During the third period of stability until the end of the
evaluation, the clip duration was doubled in length because of improved video system performance and a
desire expressed by the utility to view the point of intrusion for a longer duration.
The view times for video clips that supported an onsite investigation or were used to verify an invalid
alert averaged 3 minutes and 14 seconds after the intrusion.
Data on the video clip view times also were collected during the ESM drills at video-monitored sites. The
utility control center operator viewed the video clips as soon as they were completely downloaded, six
minutes after the intrusion during Drill 2 and two minutes after the intrusion during Drill 3. During Drill
4, the utility control center operator switched the video system to "live" mode during the drill to view the
inside of the facility which is near-real-time with a few second delay, rather than waiting for the video
clip to download. The utility security and operations staff mentioned their high level of confidence in the
video system since the Tl/DSL transition during the Drill 4 debriefing.
4.6 Design Objective: Operational Reliability
Analysis of the reliability of the ESM considers both operation and performance metrics. Operation
metrics measured the system's ability to continuously monitor for intrusions, and included availability
and data completeness. Performance metrics measured the accuracy of ESM equipment and procedures
in discriminating between an actual intrusion incident and normal variability in underlying data (i.e.,
invalid alerts).
4.6.1 A vailability of Intrusion Alert Communication Systems
Definition: Availability of intrusion alert communication system is the percentage of time that intrusion
alert data are successfully transmitted.
Analysis Methodology: The availability of the communications system for intrusion alert data
transmission for each pump station per reporting period is shown. The calculation for each pump station
is:
(Potential Alarm Communication Hours Available - Alert Communication Hours Unavailable)
X 1UU
Potential Alarm Communication Hours Available
Potential number of intrusion alert communication hours available is the number of hours in a given
reporting period. Intrusion alert communication hours unavailable are the number of hours that the
intrusion alert communications system was not working properly at each pump station per reporting
period and included downtime due to communications system failure as well as for maintenance.
Results: Figure 4-12 shows the communications system availability for intrusion alert data at the three
pump station locations with digital cellular, Tl or DSL communications. Table 4-8 summarizes the data
depicted in Figure 4-12. When intrusion alert data and video data are transmitted over the same
communications link, the two data types use different protocols, ports and data packet sizes. Thus, the
issues that caused unavailability and slow responsiveness with video communications may not have
necessarily affected intrusion alert communications. The availability of intrusion alert data
35
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
communications exceeded 95 percent and the difference between digital cellular and Tl/DSL
communications was minimal.
100% -rp
Pump Station A
Pump Station B
Pump Station C
All Pump Stations
TransitionedtoTI or DSL
o^ ^ <£> <&N /VX & ^ T> °> ^ 4
Start Date of Monthly Reporting Period
Note: The availability of intrusion alert data communications exceeded 95% and the difference between digital cellular and T1/DSL
communications was minimal.
Figure 4-12. Pump Stations: Communications System Availability Intrusion Alerts
Table 4-8. Communications Availability for Intrusion Alert Data
Pump Station
Pump Station A
Pump Station B
Pump Station C
All Pump Stations
Digital Cellular
(February 2008-
December2010)
99.32%
99.87%
99.92%
99.70%
T1 or DSL
(January-June 2010)
99.02%
100%
99.90%
99.64%
Entire Evaluation Period
(February 2008-
June2010)
99.26%
99.89%
99.91%
99.69%
All three pump stations had an average intrusion alert data communications availability of greater than
99 percent regardless of communications method. There were three reasons for the high levels of
availability: (1) Intrusion alert data consist of relatively small data packets compared to video data; (2)
Smaller packets are less prone to interference; and (3) Smaller packets are less likely to be noticed by a
communications provider that may be looking for ways to manage the amount of bandwidth allotted per
user.
The Tl/DSL transition increased the average availability by 0.13 percent at Pump Station B but reduced
the average availability at Pump Station A by 0.3 percent and at Pump Station C by 0.02 percent.
Sporadic DSL and Tl outages at Pump Stations A and C were the causes.
There were reporting periods that experienced deviations from the otherwise high level of availability, as
explained by Table 4-9.
36
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 4-9. Incidents That Reduced Intrusion Alert Communications Availability
Reporting Period
August 2008
August 2009
October 2009
November 2009-
April2010
Pump Stations
A, B, C
A
A
A
Description
A severe windstorm occurred on September 14, 2008.
Prolonged power outages exceeded the battery charge
duration of the UPS in the ESM control panels.
The prolonged power outages may have also caused
downtime with the digital cellular network.
Two 8-hour (approximate) cellular network outages.
Not caused by a power failure at the Pump Station.
May have been due to troubleshooting attempts by the digital
cellular provider or the utility to remedy the video port blocking
issue described in Section 4.4.1.
Multiple cellular network outages, each lasting about 50 minutes.
Sporadic cellular network outages until the end of the evaluation
period, regardless of digital cellular or DSL communications.
4.6.2 Availability of Video Communication Systems
Definition: Availability of video communication systems is the percentage of time that video data are
successfully transmitted.
Analysis Methodology: The communications system availability for video transmission for each pump
station per reporting period is shown. The calculation for percent availability for each pump station is:
(Potential Video Communication Hours Available - Video Communication Hours Unavailable)
Potential Video Communication Hours Available
:100
Potential number of video communication hours available is the number of hours in the reporting period.
Video communication hours unavailable is the number of hours that the video communications was not
working properly at each pump station per reporting period.
Results: Figure 4-13 shows the communications system availability for video data at the three locations
with digital cellular, Tl or DSL communications. Table 4-10 summarizes the data shown in Figure 4-13.
37
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
100%
95%
90%
85%
80%
75%
nPump Station A
Pump Station B
Start Date of Monthly Reporting Period
Note: There were three extended periods of stability: February 16, 2008 to June 16, 2008, January 16, 2009 to June 16, 2009, and
January 16, 2010 to the end of the evaluation period.
Figure 4-13. Pump Stations: Availability of Video Communication Systems
Table 4-10. Communications Availability for Video Data
Pump Station
Pump Station A
Pump Station B
Pump Station C
All Pump Stations
February 16-June
15, 2008
Percent Available
99.87%
99.72%
99.87%
99.82%
January 16-June
15, 2009
Percent Available
99.60%
99.32%
99.44%
99.45%
January 16, 2010-
End of Evaluation
Percent Available
94.75%
99.96%
99.24%
97.98%
Total Evaluation
Percent Available
96.66%
98.76%
97.51%
97.64%
The pump stations had average availabilities above 99 percent during the first two periods of stability,
when digital cellular service was used. During the third period of stability, there was a reduction in
availability for Pump Stations A and C and an increase in availability for Pump Station B. There were
sporadic outages with the DSL connection at Pump Station A. There were sporadic outages with the Tl
connection at Pump Station C, but fewer than those experienced by Pump Station A.
Reporting periods that experienced long video clip transmission times also had lesser-than-average levels
of video communications availability. See Section 4.5.1 for more discussion on the suspected causes
behind periods of video system instability and how the issues were addressed.
4.6.3 A vailability of Intrusion Detection Equipment
Definition: Availability of intrusion detection equipment is the percentage of time that door sensors, area
motion sensors and ladder motion sensors are functioning properly.
The availability of the PLC and I/O servers also was analyzed because those devices played important
roles in delivering intrusion alert data to the utility staff at the control center. PLCs transmitted intrusion
alerts from intrusion detection devices to the I/O servers, which provided data to the utility staffs HMI.
38
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
There was one PLC per pump station and a redundant pair of I/O servers (primary and secondary) that
communicated with all three PLCs. Intrusion detection device downtime caused by a PLC or I/O server
outage was only recorded under the PLC or I/O server category and not recorded as downtime for the
attached detection devices.
Analysis Methodology: The equipment availability for the different types of intrusion detection devices
at video sites for each reporting period is shown. The calculation for percent available for each type of
intrusion detection device is:
(Potential Equipment Hours Available - Equipment Hours Unavailable)
Potential Equipment Hours Available
xlOO
Potential equipment hours available is the number of hours in the reporting period multiplied by the
number of equipment of that type installed at the pump stations. Equipment hours unavailable is the
number of hours that the equipment was not working for each type of equipment per reporting period.
Results: Figure 4-14 shows the availability for the intrusion detection devices used at pump stations
overtime, and Table 4-11 summarizes the data.
100%
p 90%
88% 4
86%
84%
Door Sensors
Area Motion Sensors
Ladder MotionSensors
PLC
I/O Server
I. II Illl.II I
Start Date of Monthly Reporting Period
Note: The intrusion detection devices were 100% available for most of the entire evaluation period. PLC outages toward the end of
the evaluation period caused the most significant downtime.
Figure 4-14. Intrusion Detection Equipment Availability
39
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 4-11. Intrusion Detection Equipment Availability
Intrusion Detection Equipment
Door Sensors
Area Motion Sensors
Ladder Motion Sensors
PLC
I/O Server
Average Percent Availability
99.55%
100%
100%
99.25%
99.81%
The area and ladder motion sensors at the pump stations were 100 percent available throughout the
evaluation. Despite occasional periods of downtime for door sensors, PLCs and I/O server had average
availabilities above 99 percent. These periods of downtime are further explained in Table 4-12.
Table 4-12. Incidents That Reduced Intrusion Detection Equipment Availability
Reporting Period
August 2008
September 2008
September 2009-
January 2010
January 2010
January 2010
March 2010
Intrusion Detection
Equipment
PLCs
I/O Server
Door Sensor
Door Sensor
PLC
PLC
Description
A severe windstorm occurred on September 14, 2008.
Prolonged power outages exceeded the battery charge
duration of the UPS in the ESM control panels.
The PLC at each pump station is enclosed in and
powered from that site's ESM control panel.
Compatibility issues with a PLC firmware upgrade caused the
I/O server computers to stop running.
A door alert at Pump Station A was not triggered when the
door was opened.
Likely caused by utility personnel inadvertently disabling
the door alert while employees were at the site and not
re-enabling it when work was completed.
New operators were being trained at this time.
The intrusion alert log does not track if an alert is
disabled, so the exact cause of unavailability is unknown.
A motion detector monitored the door entryway, so intrusions
at Pump Station A were still detected during the period of
unavailability.
The door sensor unavailability went unnoticed for multiple
reporting periods, because intrusions were still detected.
A door alert at Pump Station B was triggered even when the
door was not being opened.
The utility's instrument shop adjusted the sensor.
Suspected power issues at Pump Stations A and B.
Suspected power and PLC hardware issues at Pump Station
B.
At the end of the CRADA, June 15, 2009, ESM equipment was turned over from the EPA to the utility
and was incorporated into the utility's maintenance program and emergency procedures for minimizing
the impact of power and communications outages.
4.6.4 A vailability of Video Equipment
Definition: Availability of video equipment is the percentage of time that the fixed and PTZ cameras
were functioning properly. Video devices were not categorized as intrusion detection devices since the
40
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
devices are not used to detect intrusions, but to confirm whether the intruder is a legitimate threat and also
if contamination may be Possible.
The availability of the video server also was analyzed because the server gathered video data transmitted
from the remote sites and delivered the video clips to the utility staffs HMI. Video server downtime
caused by a video server outage was recorded under the video server category and not as downtime for
the attached cameras. The video server application runs on the secondary I/O server. See Section 4.5.3
for a discussion of the I/O servers.
Analysis Methodology: The availability for each type of camera and for the overall video system is
shown per reporting period. The calculation for percent available for each type of equipment is:
(Potential Equipment Hours Available - Equipment Hours Unavailable)
Potential Equipment Hours Available
:100
Potential equipment hours available is the number of hours in the reporting period multiplied by the
number of pieces of equipment installed at the pump station. Equipment hours unavailable is the number
of hours that the equipment was not working properly for each type of equipment per reporting period.
Six fixed cameras, five PTZ cameras and one video server served all the pump stations.
Results: Figure 4-15 shows the availability for the video equipment used at pump stations over time,
and Table 4-13 summarizes the data. The availability of the video server also is shown because it gathers
video data transmitted from the remote sites and delivers the video clips to the utility staffs HMI. Video
server downtime caused by a video server outage was recorded under the video server category, not as
downtime for the attached cameras.
Start Date of Monthly Reporting Period
Note: PTZ cameras experienced numerous outages from the reporting period beginning September 16, 2009 until the end of the
evaluation.
Figure 4-15. Video Equipment Availability
41
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 4-13. Intrusion Detection Equipment Availability
Intrusion Detection Equipment
Fixed Cameras
PTZ Cameras
Video Server
Percent Available
99.96%
92.03%
99.23%
Fixed cameras and the video server had average availabilities above 99 percent. PTZ cameras had
numerous outages, causing the average availability to be about 92 percent. The PTZ cameras were
commissioned between January and April 2007 and were approaching three years in service when the
cameras started experiencing issues during the September 2009 reporting period. The utility's experience
with this type of PTZ camera at non-ESM facilities indicated that the design life typically ended after
three to five years of service. Table 4-14 explains the periods of downtime for video equipment.
Table 4-14. Incidents that Reduced Video Equipment Availability
Reporting Periods
March 2008
May 2008
August 2008
September 2008
November 2008
January 2009
September 2009 - January
2010
March 2010
Equipment
PTZ cameras at
Pump Station B
Video Server
Fixed and PTZ
cameras at all
locations
Video Server
Video Server
Fixed camera at
Pump station A
PTZ camera at
Pump Station B
PTZ camera at
Pump station C
Description
Two cameras at Pump Station B displayed as gray screens.
A video system version upgrade required stopping the video
server application.
A severe windstorm occurred on September 14, 2008.
Prolonged power outages exceeded the battery charge
duration of the UPS in the ESM control panels.
The cameras at the pump stations are powered from
each site's ESM control panel.
Compatibility issues with a PLC firmware upgrade caused the
secondary I/O server computer to stop running.
The video server application runs on the secondary I/O server
computer.
Scheduled CWS SCADA programming updates were
implemented on the secondary I/O server, requiring the video
server application to be stopped.
The camera at Pump Station A was taken out of service
temporarily to re-pressurize the camera enclosure.
Two cameras at Pump Station B were not zooming to the
appropriate points of intrusion.
The cameras were also out of focus.
The cameras sent video clips at times when there were no
intrusions.
A camera at Pump Station C displayed as a black screen.
42
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
4.6.5 Data Completeness
Definition: Data completeness is the amount of data hours that can be used to support component
operations, expressed as a percentage of all data generated by the component.
Analysis Methodology: The data completeness for intrusion detection equipment and video equipment
is shown. The calculation for data completeness is:
(Potential Data Hours Available - Data Hours Unavailable)
Potential Data Hours Available
xlOO
Potential data hours available is calculated using the number of intrusion detection or video data streams
multiplied by the number of hours in the reporting period. Data hours unavailable is the number of hours
the data stream was not working properly for each type of equipment per reporting period.
Results: Figure 4-16 shows the completeness for all intrusion and video data streams over time, and
Table 4-15 summarizes the data.
100%
95%
0)
Si
o.
o
O
90%
85%
80%
75%
70%
vC?' £?> «?> .£?> >£?> *9 %C?> & «? «?> vC? «? «? ^ ^ v»£ »£
- - N N N N - N N - - N N N
Start Date of Monthly Reporting Period
Note: Data completeness for video data fell to 72% after the digital cellular provider blocked video traffic after the June 2009
reporting period. PTZ camera failures kept video data completeness low after the T1/DSL transition in January 16, 2010.
Figure 4-16. Data Completeness: Pump Stations
Table 4-15. Data Completeness: Pump Stations
Data Stream
Intrusion Detection
Video
Percent Available
98.59%
93.23%
Data completeness includes downtime from communications and equipment faults. Each data stream
represents the output from an individual intrusion detection device or camera. For equipment connected
to multiple intrusion detection devices or cameras, any PLC, I/O server, or video server equipment
43
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
downtime would cause a loss of data from all of the intrusion detection devices or cameras data streams
connected to them. For example, if a PLC, I/O server, or video server were to experience downtime, the
following systems shown in Table 4-16 would also be affected.
Table 4-16. Intrusion Detection Device Downtime Effects
Equipment
PLC: Pump Station A
PLC: Pump Station B
PLC: Pump Station C
I/O Server
Video Server
Number of Connected Devices
9 intrusion detection devices
23 intrusion detection devices
18 intrusion detection devices
50 pump station intrusion detection devices
1 1 cameras
Video data completeness values combine the trends shown in Figures 4-13 and 4-15, which show the
video communications availability and video equipment availability. Figures 4-12 and 4-14 are the
equivalent graphs for intrusion detection communications and equipment availability, respectively. The
lowest data completeness was 72 percent. This was observed during the October 2009 reporting period,
which had a 76 percent video communications availability that was compounded by a 55 percent PTZ
camera availability.
The data completeness for intrusion detection data streams was 98.59 percent. The intrusion detection
data streams had fewer communications and hardware issues compared to the video data streams. Power
outages, PLC hardware and firmware issues, communications outages and possible operator error caused
reductions in intrusion detection data completeness. See Tables 4-9 and 4-12 for discussions on the
incidents that reduced intrusion alert communications and intrusion detection equipment availability.
The data completeness for video data streams was 93.23 percent. Communications outages, power
outages, software and CWS SCADA updates, and camera hardware issues caused reductions in video data
completeness. See Tables 4-5 and 4-14 for discussions on the incidents that reduced video
communications and video equipment availability.
4.6.6 Summary
The operational reliability design objective was evaluated by examining the video and intrusion alert
communications availability, equipment availability and data completeness.
As discussed in Section 4.5.1, the three periods of video system stability experienced high levels of video
communications availability. When digital cellular communications were used, average video
communications availabilities were 99.82 percent in the first period of stability and 99.45 percent in the
second. The third period, which used Tl and DSL connections, displayed a lower overall average
availability of 97.98 percent, primarily because of sporadic DSL and Tl outages at Pump Stations A and
C. The slight decrease in availability and increase in video data transmission performance after the
Tl/DSL transition, which was discussed in Section 4.5.1, underscores the independence of the availability
and performance metrics. System improvements that improve performance may also cause more system
downtime. The reduction in system availability after the Tl/DSL transition was minimal.
The intrusion alert data transmission was relatively stable and experienced a high level of performance.
Whether using digital cellular Tl or DSL connections, the average intrusion alert data communications
availability was above 99 percent. Although the intrusion alert data used the same communications
systems as the video data, the intrusion alert data used smaller packets and different protocols. The
44
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
smaller packets were less prone to interference and were less likely to be noticed by a communications
provider that may be looking for ways to manage the amount of bandwidth allotted per user.
The intrusion detection equipment, which included area and ladder motion sensors, door/hatch sensors,
PLCs and an I/O server, all had average availabilities above 99 percent. For the video equipment, the
fixed cameras and video server had average availabilities above 99 percent, but the PTZ cameras
experienced numerous outages during the last nine reporting periods of the evaluation, resulting in an
average availability of 92 percent. This observation of the PTZ camera outages for ESM was in-line with
the utility's previous experience with this type of PTZ camera, where similar cameras at non-ESM
facilities were found to last about three to five years before failing.
The data completeness metric considers communications and equipment availability. The high level of
intrusion detection equipment availability led to an average data completeness of 98.6 percent, but the
communications and PTZ camera issues and caused the video equipment data completeness to average 93
percent.
45
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 5.0: Non-Video Monitored Sites
The following section provides a description of the non-video monitored sites followed by the results of
the evaluation of this data stream. This analysis includes an evaluation of metrics that characterize how
these sites achieve the design objectives described in Section 1.1. Specific metrics are described for each
of the design objectives.
5.1 Description
Non-video sites that received ESM equipment included four reservoirs (one underground and three
above-ground), four elevated storage tank, and one ground-level storage tank. For reservoirs, rectangular
fabricated aluminum structures were added over the existing vents to eliminate direct access to the vents.
The structures were fitted with sidewalk style hatches to provide access to the vents for inspection and
cleaning. Two types of intrusion detection devices were installed at each vent enclosure. One was a
contact switch on the hatch that sends an intrusion alert when the hatch is opened. The other was a liquid-
level switch installed at the base of the enclosure sidewall. The liquid-level switches were provided to
detect a situation in which a liquid contaminant would be introduced by plugging the drain holes and the
louvers of the enclosure. The liquid level switch inside the enclosure would send an intrusion alert to the
control center if the fluid level in the structure rises to the detection level. The existing access hatches on
the reservoirs were previously fitted with contact switches. The intrusion alert contacts at the vent
enclosure were wired in series with the existing access hatch alert contacts.
Each elevated and ground-level storage tank provides access to finished (treated) water at the top of the
storage bowl via a ladder in either the center column or a side column (in the case of the ground level
storage tank). The entrance doors to the tank were protected by existing contact switches, so motion
sensors were installed on the ladders to indicate if an intruder was attempting to access the water at the
top of the storage bowl. The tanks' bottom areas typically contain equipment in addition to the ladder, so
the motion sensors were installed at least 30 feet up the ladder to reduce invalid alerts from movement by
personnel at floor-level (i.e., only an intruder climbing the ladder would be sensed). Both the door
contact switch and the ladder motion sensor alerts would be transmitted to the operators at the utility
control center. This approach provided two sources of alerts, which helped to screen out invalid alerts
arising from motion sensor oversensitivity and from utility personnel who enter the tank base and forget
to call the control center.
5.2 Design Objective: Spatial Coverage
As with video monitored sites, ESM non-video monitored sites each covered only one access point to the
distribution system, thus limiting their detection capability and system-wide spatial coverage. However,
the consequences if a contamination incident did occur at an ESM site may be widespread. To protect
against contamination incidents, non-video monitored sites were equipped with intrusion detection
devices at all points of entry that could allow an intruder access to the water supply. This supplemented
their existing intrusion detection devices, which were primarily intended to detect theft and vandalism
incidents.
5.3 Design Objective: Contaminant Coverage
ESM did not consider specific contaminants or detection classes of contaminants, but the volume of
contaminants and method of contaminant injection were considered during ESM design of the non-video
monitored sites. For elevated and ground storage tanks, the design assumed a contaminant volume that
46
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
could fit into an intruder's backpack for ease of ladder climbing. A pumped contaminant is possible but
less convenient, since the perpetrator would need to climb the ladder while transporting a hose to the
upper level of the tank. For reservoir vents, the design assumed that a perpetrator would use a hose to
pump the contaminant into the vent, since pouring liquid directly into the vent would be prevented by the
shrouds over them. For pump-injected contaminations, a 55-gallon drum or tank truck was assumed.
Based on these assumptions, all applicable points of contamination at the non-video sites were monitored.
5.4 Design Objective: Alert Occurrence
See Section 4.4.1 for a general discussion of invalid alerts.
5.4.1 In valid A lerts
Invalid alerts caused by security procedure violations were segregated into "no call-in" and "hatch left
propped open (hatch prop)" categories. Each security procedure category was divided by type of facility,
including ladder and reservoir sites. Invalid alerts caused by equipment issues were categorized by
equipment type including "hatch sensors" and "ladder motion sensors." The ladder motion sensors
installed at video sites are discussed below with the ladder motion sensors installed at non-video
monitored sites. Environmental causes were the third category of invalid alert causes, but since only a
handful of invalid alerts were attributed to environmental factors, this category was not included in the
analysis. None of the intrusion sensors at non-video sites were outdoors.
To generalize the invalid alert data, the security procedure violation metrics were normalized by the
number of valid entries and where applicable, the number of hatches. Invalid alerts due to equipment
issues were normalized by the number of sensors.
To implement the above categorizations of invalid alerts, this section is organized as follows:
Security Procedure Violations - Hatch Props
o Ladder sites
o Reservoir sites
Security Procedure Violations - No Call-Ins
o Ladder sites
o Reservoir sites
Equipment-Caused Invalid Alert
o Ladder Motion Sensors
o Ladder Hatch Sensors
Reservoir Hatch Sensors
Security Procedure Violations: Hatch Props
Definition: A security procedure violation occurred when an employee did not follow security
procedures and an invalid alert was generated. A hatch prop was a type of security procedure invalid alert
that occurred when authorized personnel left a hatch propped open that should have been closed when
they left the facility.
Standard operating procedures require that the utility control center operator enable the intrusion alerts at
a facility after personnel notify the operator that they have left the premises. A hatch prop invalid alert
occurred when the intrusion alert on the GCWW SCADA system was enabled, and the system detected
that a secure hatch was left open. All intrusion detection devices at non-video monitored sites use the
GCWW SCADA system for displaying intrusion alerts at the utility control center. The intrusion alert on
the GCWW SCADA system can be enabled by the utility control center operator using an HMI.
47
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Analysis Methodology and Results: No hatch props were observed at non-video sites during the entire
evaluation period.
Security Procedure Violations: No Call-Ins
Definition: A no call-in security procedure violation occurred when GCWW personnel did not follow
established procedures for calling the utility control center within a designated time span of entering a
facility. An intrusion alert is generated automatically when anyone enters a facility, but the alert is
considered a valid entry if an employee called in a designated time span. For non-video monitored sites, a
no call-in incident could be verified when onsite investigators or local law enforcement arrived at the
facility and witnessed the employees at the site.
Analysis Methodology: This metric was segregated by ladder sites and reservoir sites. Segregation by
site type allowed the analysis of each type individually and also comparison among types. The no call-in
data were normalized by the number of valid entries to a site, since a frequently visited facility would
have a higher probability of an employee not calling in.
Results: Figure 5-1 shows the "no call-in" metrics for the ladder sites. Since all ladder sites are
unstaffed, all employees must call the utility control center to announce arrival, regardless of time of day.
25-
W)
c
TO
O
0
1
05-
/
» No Call-Ins
Average No Call-Ins
.
Average Valid Entries
. .
Avg = 71 valid entries
g
m m m *
"
"
Avg= 0.11 no call-ins
Start Date of Monthly Reporting Period
r 250
z
3
u-
o
<
10.
ai
=T
a>
en
50
Note: There were only three no call-in incidents at ladder sites.
Figure 5-1. Ladder Sites: No Call-Ins
Reporting periods with a no call-in incident did not usually have an above average number of valid
entries. One of three reporting periods that had a no call-in incident also had an above average number of
valid entries.
The number of invalid alerts due to no call-ins did not decrease over the course of the evaluation period,
likely because ESM did not implement significant changes to the utility's call-in procedures.
Figure 5-2 shows the no call-in metrics that are normalized by the number of valid entries at the ladder
sites. This normalization factor was chosen because having a larger number of valid entries could
increase the probability of no call-in occurrence.
48
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
1
c
LU
o
re
o
o
to
c
re
O
o
fe
J2
E
3
1.8 -
1.6 -
06-
0.4 -
n -
No Call Ins Pe
r 100 Valid Entries
*
»
Avg= 0.14 no call-ins per 100 valid entries
/VVtN^^^^^
Start Date of Monthly Reporting Period
Figure 5-2. Ladder Sites: No Call-ins/Valid Entries
The ladder sites had significantly less normalized no call-ins compared to the pump stations (previously
discussed in Section 4.4.1). The pump station with the lowest average normalized no call-ins had 1.19 no
call-ins/100 valid entries compared to 0.14 for the ladder sites.
Figure 5-3 shows the "no call-in" metrics for the reservoir sites. Since all reservoir sites are unstaffed, all
employees must call the utility control center to announce arrival, regardless of time of day.
35-
W)
-T 25 -
"re
O
o
o
fe
3
z
^
Average No Call-Ins
Average Valid Entries
1 *
i
" ' "
M Avg= 152 valid entries
Avg = 0.36 no call-ins
Number of No Call Ins
350
2*?n 2
3
^
o
SL
m
3_
Note: There were only ten no call-in incidents at reservoir sites.
Figure 5-3. Reservoir Sites: No Call-Ins
49
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Reporting periods with a no call-in incident usually did not have an above average number of valid
entries. Three of six reporting periods had a no call-in incident and also an above average number of
valid entries.
The number of invalid alerts due to no call-ins did not decrease over the course of the evaluation period,
likely because ESM did not implement any significant changes to the utility's call-in procedures. The
utility's efforts to reiterate the call-in policy to employees was an ongoing process.
Figure 5-4 shows the no call-in metrics normalized by the number of valid entries at the reservoir sites.
A normalization factor was chosen, because having a larger number of valid entries could increase the
probability of no call-in occurrence.
o
o
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
No Call Ins per 100 Valid Entries
-Average
Avg= 0.22 no call-ins per 100 valid entries
» i » i »
» i »
» i »
Start Date of Monthly Reporting Period
Figure 5-4. Reservoir Sites: No Call-ins/Valid Entries
Invalid alerts due to no call-ins at reservoir sites only occurred during the Spring and Summer months at a
frequency of approximately one per 100 valid entries. Similar to the non-normalized no call-ins, the
normalized number of invalid alerts due to no call-ins did not decrease over the course of the evaluation
period. This was likely because ESM did not implement any significant changes to the utility's call-in
procedures. The utility's efforts to reiterate the call-in policy to employees was an ongoing process.
The reservoir sites had significantly less normalized no call-ins compared to the pump stations and more
normalized no call-ins compared to the ladder sites. The pump station with the lowest average
normalized no call-ins had 1.19 no call-ins/100 valid entries compared to 0.22 for the reservoir sites. The
ladder sites had 0.14 no call-ins/100 valid entries.
Table 5-1 compares the non-normalized and normalized no call-in metrics for the ladder and reservoir
sites. Pump Station A and C metrics from the video monitored sites are also shown in the table for
comparison with the ladder and reservoir metrics. Pump Station A had the lowest average non-
normalized no call-ins, while the Pump Station C video monitored site had the lowest average normalized
no call-ins.
50
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The ladder sites had fewer non-normalized and normalized average no call-ins than did the reservoir and
pump station sites. The ladder sites were visited less frequently than the pump stations and reservoirs.
Table 5-1. Summary of Non-Video Site No Call-in Data
Location
Ladder Sites
Reservoir Sites
Non-Video Sites,
Combined Average
Pump Station A
Pump Station C
Average Number of No
Call-ins per Reporting
Period
0.11
0.36
0.23
1.1
1.4
Normalized Average
Number of No Call-ins
per 100 Valid Entries
0.14
0.22
0.18
2.37
1.19
Average Valid Entries
71 (14)1
151 (38)1
112
47
127
1. For ladder and reservoir sites, the average valid entries per site are shown in parentheses. The lowest pump station averages
are shown for comparison.
Equipment-Caused Invalid Alerts
Definition: An equipment-caused invalid alert occurs when an equipment issue caused an intrusion
detection device to trigger an alert when there was no intrusion. The following section discusses invalid
alerts at non-video sites caused by equipment issues with ladder motion, ladder hatch, and reservoir hatch
sensors. The discussion on ladder motion sensors includes the two ladder motion sensors installed at
video monitored sites.
The ladder sensors at non-video sites have a unique equipment-caused invalid alert, the radio fault. The
radio fault is a feature of the GCWW SCADA network. The non-video sites used the existing GCWW
SCADA network for transmitting the ESM intrusion alerts to the utility control center. Certain GCWW
remote sites used wireless I/O modules to transmit data to a facility with a hardwired connection to the
GCWW SCADA network. Three of the five ladder sites at non-video locations used wireless I/O
modules. An invalid ladder alert was triggered when the wireless I/O module experienced a loss in signal
strength, which could result from signal path blockage or radio interference. Usually a radio fault was
transmitted to the GCWW SCADA network with the ladder alert following loss in signal strength, but
there were also occasions where a radio fault was not generated but a false tank level alert accompanied
the false ladder alert. Both conditions were used to determine when a ladder alert was caused by a radio
issue.
The four other ladder sites were not subject to radio fault invalid alerts. Two of the five ladder sites at
non-video locations were at a facility with a hardwired connection to the GCWW SCADA network and
did not use wireless I/O modules. The two ladder sites at video locations were connected to the ESM
system, which was not part of the GCWW SCADA network.
Analysis Methodology: This metric was segregated by the site types listed in Section 4.4.1. The site
types include the following types of equipment:
Ladder motion sensors
Ladder hatch sensors
Reservoir hatch sensors
There were no equipment-caused invalid alerts at the reservoir sites, and subsequently no analysis for
reservoir hatch sensors was performed.
51
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The segregation of equipment by type allowed for an analysis of each type individually and also allowed
for comparison among types. The number of equipment-caused invalid alerts was normalized by the
number of sensors for each type, since a higher number of installed sensors increased the probability of
having an invalid alert. The analysis for equipment-caused invalid alerts was not divided by site, since
the causes of these invalid alerts were equipment-specific, rather than site-dependent.
These equipment-caused invalid alerts for ladder sensors were categorized as wirelessly connected to
GCWW SCADA, wired to GCWW SCADA, and wired to ESM PLC. Because there were ladder sensor
invalid alerts caused by the wireless connection on the GCWW communications network, the radio fault
generated alerts also were analyzed.
Data for ladder motion sensors at non-video sites were not available over the entire evaluation period, as
the ladder motion sensors were removed in December 2008. Discussion following Drill 1 indicated that
interior motion sensors did not provide enough information about the intrusion, including whether an
intruder had actually climbed the ladder to get access to the water. Therefore, the ladder motion sensors
were replaced with ladder hatches and ladder guards that were monitored by hatch sensors, which would
more definitively indicate whether the ladder was climbed to gain access to the drinking water. The
exterior ladder motion sensors, however, remained in service. After December 2008, the ladder hatch
sensors invalid alerts were analyzed in place of the ladder motion alerts at the non-video sites.
Results: Figure 5-5 shows the normalized equipment-caused invalid alert metrics for ladder motion and
ladder hatch sensors. The reporting period when the ladder motion sensors at non-video sites were
replaced by ladder hatch sensors (December 2008) is noted on the graph. Table 5-2 summarizes the data
on Figure 5-5. For comparison purposes, Table 5-2 also includes equipment-caused invalid alert data for
area motion sensors and door/hatch sensors from the video sites. Table 5-2 also presents industry
standards for invalid alert rates from the Guidelines for the Physical Security of Water Utilities
(ASCE/AWWA, 2006).
r
"
to to
g o
v> «
"- d)
w
Hatch sensortault- Hardwired to GCVWVSCADA
Hatch senso r fault - Wirelessly connected to GCWW SCADA
'J Motion sensor hardware fault-Hardwired to ESM PLC
Motion sen sor hardwarefault- Hardwired to GCWW SCADA
Motion sensor hardware fault-Wirelessly connected to GCWW
SCADA
Ladder motion sensors connected to GCWW
SCADA were replaced by ladder hatches
and hatch sensors.
Start Date of Monthly Reporting Period
Note: Replacing the ladder motion sensors at non-video sites with ladder hatches reduced the number of ladder invalid alerts. The
ladder motion sensors connected to the ESM PLC were not replaced with ladder hatches.
Figure 5-5. Ladder Sensor Invalid Alerts Caused By Sensor Faults
52
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 5-2. Sensor Caused Invalid Alerts: Average Times Between Invalid Alerts
Sensor
Ladder Motion Sensors Wirelessly connected to GCWW SCADA
Ladder Motion Sensors Hardwired to GCWW SCADA
Indoor Ladder Motion Sensors (Average of all motion sensors
connected to GCWW SCADA)
Ladder Motion Sensors Hardwired to ESM PLC (CWS SCADA)
(Outdoors)
Ladder Motion Sensors Total
Ladder Hatch Sensors Wirelessly connected to GCWW SCADA
Ladder Hatch Sensors Hardwired to GCWW SCADA
Ladder Hatch Sensors Total
Reservoir Hatch Sensors
Area Motion Sensors Video Sites
Door/Hatch Sensors Video Sites
ASCE/AWWA (2006) Guideline
Days Between
Invalid Alerts per
Sensor
65
608
101
338
160
203
541
271
Motel
136
1,168
90 (minimum)
Invalid Alerts per
Sensor per Year
5.6
0.6
3.6
1.1
2.3
1.8
0.67
1.3
Motel
2.7
0.31
4 (maximum)
1. There were no invalid alerts for this equipment type over the evaluation period, so the value of this metric could not be calculated.
Overall the ladder hatch sensors were less prone to equipment-caused invalid alerts than ladder motion
sensors. The ladder hatch sensors averaged 271 days between invalid alerts while the ladder motion
sensors averaged 160 days between invalid alerts.
The ladder hatch sensors were more prone to equipment-caused invalid alerts than the door/hatch sensors
installed at video sites. The ladder hatch sensor was the same physical sensor as the door/hatch sensor,
but installation on a ladder hatch was more complex than installation on a door and required post-
installation repositioning at some locations. Utility staff required training on the new ladder hatches to
ensure that the hatches were completely closed. There was a slight decreasing trend in the ladder hatch
alerts as training was provided to utility staff on the new procedures.
The outdoor ladder motion sensors at video sites (hardwired to ESM PLC) did not have a higher invalid
alert rate compared to the indoor ladder motion sensors. Most of the indoor ladder motion sensors were
connected wirelessly to the GCWW SCADA system. GCWW suspected that many of the equipment-
caused sensor invalid alerts may have actually been caused by wireless communications errors that were
undetected by the wireless I/O module's radio fault. The inconsistent nature of the radio fault function on
GCWW wireless communication equipment is discussed above under "Definition."
Most ladder motion sensor and ladder hatch sensor equipment-caused invalid alerts met the
ASCE/AWWA (2006) guidelines. The exception was the ladder motion sensors that were wirelessly
connected to the GCWW SCADA system. These devices averaged 65 days between invalid alerts
compared to the ASCE/AWWA (2006) minimum of 90 days. Issues with the radio fault function on the
wireless I/O modules were suspected as discussed in the previous paragraph. The average sensor-caused
invalid alert rate for all indoor motion sensors was 101 days between invalid alerts, which met the
ASCE/AWWA (2006) guidelines. For ladder motion and ladder hatch sensors, the hardwired sensors had
53
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
significantly less invalid alerts than wirelessly connected counterparts. Issues with the radio fault
function on the wireless I/O modules were suspected. See the above paragraphs for a discussion.
Figure 5-6 shows the normalized radio fault caused invalid alert metrics for ladder motion and ladder
hatch sensors. The reporting period when the GCWW SCADA programming was modified (December
2008) is noted on the graph.
The number of radio-caused invalid alerts was much greater than the equipment-caused invalid alerts at
ladder sites. There was less than one equipment-caused invalid alert per ladder site per reporting period,
compared to five radio-caused invalid alerts per ladder site per reporting period.
The GCWW SCADA programming changes reprogrammed the utility's remote telemetry unit to wait five
seconds after a ladder alert before transmission of the ladder alert to the utility's HMI. If a radio fault
occurred during the five second waiting period, the ladder alert was not transmitted. This change reduced
invalid alerts while not impacting the system's ability to detect real intrusion incidents.
^
to
3
0
"8 o
« 'I
"C
^s> jj> ^» g & g g & g g g g g g g & g g ^> # ^ j
V ^VVVVVVVV -^W ^VVVVVVVV -^V
Start Date of Monthly Reporting Period
» Radio fault
^^ Average
radio faults
±
a^S>^^5>
^ ^ ^
Figure 5-6. Ladder Sensor Invalid Alerts Caused By Radio Faults
Table 5-3 shows the invalid alert rates and costs for ladder motion and ladder hatch sensors. For
comparison purposes, Table 5-3 also includes the invalid alert rates and costs for the area motion sensors
and door/hatch sensors in addition to the industry standards from the Guidelines for the Physical Security
of Water Utilities (ASCE/AWWA, 2006).
54
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 5-3. Equipment Caused Invalid Alerts: Average Times between Invalid Alerts
Days Between Invalid Alerts
per Sensor
Invalid Alerts per Sensor per
Year
Cost per Device
(2007 list prices)
Area Motion
Sensors
136
2.7
$450
Door/Hatch
Sensors
1,168
0.31
$260
Ladder Motion
Sensors
160
2.3
$1,660
Ladder Hatch
Sensor
271
1.3
$260
ASCE/AWWA
Guideline
90 (minimum)
4 (maximum)
n/a
The ladder motion sensors were costly and appeared to be relatively prone to invalid alerts. Undetected
radio faults may have caused an overestimation of equipment-caused invalid alerts for the ladder motion
sensors. This topic is discussed under "Definition" and in the analysis following Figure 5-8.
Figure 5-7 presents the percentage of each type of invalid alert at the non-video monitored sites, which
included security procedure (no call-in) and equipment caused (ladder motion sensor, hatch sensor and
radio fault) invalid alerts.
1.8%
0.9%
No Call-in
Ladder Motion
Ladder Hatch
Radio Fault
Note: Most invalid alerts were radio faults.
Figure 5-7. Non-Video Site Invalid Alerts by Type
Radio faults caused 96 percent of all invalid alerts at non-video sites. There were no security procedure
violations caused by door or hatch props at non-video sites. There were no equipment invalid alerts from
hatches at non-video sites. The ladder sensors installed at pump stations were included in this analysis.
Table 5-4 presents the percentage of invalid alerts from each non-video monitored site.
55
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 5-4. Non-Video Site Invalid Alerts by Location
Invalid Alert Type
Elevated Tank A
Elevated Tank B
Elevated Tank C
Ground Tank D
Elevated Tank E
Reservoir A
Reservoir B
Reservoir C
Reservoir D
Ladder Motion Alerts at Pump Stations
Total
Percentage
20.71%
51.70%
0.27%
0.09%
25.89%
0.36%
0%
0.09%
0.45%
0.45%
100.00%
Note: Most invalid alerts were at Elevated Tanks with wireless I/O modules.
The elevated tanks that used wireless I/O modules to connect to the GCWW SCADA system were
Elevated Tanks A, B, and E, which accounted for 98 percent of all invalid alerts at non-video sites.
Wireless I/O modules experienced frequent invalid alerts caused by radio faults. See the definition
discussion of Section 5.5.4 and the discussions following Figures 5-5 and 5-6 for details on the wireless
I/O modules and radio faults.
5.4.2 Summary
The alert occurrence design objective was evaluated by examining the invalid alert rates, which measure a
security system's effectiveness. The invalid alerts were categorized into security procedure violations and
equipment caused invalid alerts.
For the security procedure violation invalid alerts, data showed the non-normalized and normalized
averages per reporting period were 0.11 no call-ins and 0.14 no call-ins/100 valid entries at ladder sites,
and 0.36 no call-ins and 0.22 no call-ins/100 valid entries at reservoir sites. These no call-in amounts
were an order of magnitude lower than the lowest pump station average no call-in values, which are
shown in Table 5-1. Despite the utility's ongoing efforts to reiterate the call-in policy to employees, there
was a slight increasing trend in no call-ins at the reservoir sites. The other type of security procedure
violation invalid alert was the hatch prop. There were no hatch props at the non-video sites during the
evaluation.
For equipment-caused invalid alerts, the reservoir hatch sensors had no invalid alerts during the
evaluation. Ladders at non-video sites originally were monitored by ladder motion sensors. The ladder
motion sensors at non-video sites were replaced by ladder hatch sensors during the December 2008
reporting period as a result of recommendations from ESM Drill 1. See Table 2-4 in Section 2.3 for a
discussion on this component modification. Overall the ladder hatch sensors had a lower equipment-
caused invalid alert rate than the ladder motion sensors, averaging 271 days between invalid alerts per
sensor compared to 169 days per sensor for the ladder motion sensors. Both sensors met the ASCE/
AWWA (2006) guideline of a minimum of 90 days between invalid alerts per sensor. Ladder sites that
used a wireless connection to the GCWW SCADA system also experienced a significant number of radio-
caused invalid alerts. Initially there were about 27 radio-caused invalid alerts per sensor, which was
56
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
reduced to five radio-caused invalid alerts per sensor after GCWW SCADA programming changes were
implemented. The equipment-caused (non-radio related) invalid alert rate was less than one invalid alert
per sensor. Radio faults caused 96 percent of all invalid alerts at non-video sites. Most of invalid alerts at
non-video sites occurred at the locations that used wireless equipment that were prone to radio faults.
5.5 Design Objective: Timeliness of Detection
For non-video monitored sites, timeliness of detection is the time to determine Possible contamination.
The timely determination by utility personnel is vital to ensuring a potential contamination incident is
addressed as quickly as possible once the intrusion detection equipment has alerted. Intrusion alert data
was collected at non-video monitored sites, and is discussed in Section 6.4.1 where these metrics are
compared with those from video monitored sites.
5.6 Design Objective: Operational Reliability
See Section 4.6 for the definition of the operational reliability design objective.
5.6.1 A vailability of Intrusion Alert Communication System
Definition: Availability of intrusion alert communication system is the percentage of time that intrusion
alert data were successfully transmitted.
Analysis Methodology: The communications system availability for all non-video sites per reporting
period is shown. The calculation for percent available is:
(Potential Communication Hours Available - Communication Hours Unavailable)
X 1UU
Potential Communication Hours Available
Potential communication hours available for all non-video sites is the number of hours in the reporting
period multiplied by the number of non-video sites. Communication hours unavailable is the number of
hours the communications was not working properly at each non-video site per reporting period.
Results: Figure 5-8 shows the communications system availability for intrusion alert data at the non-
video monitored sites. Each non-video site had only one ESM intrusion alert, so the ESM alerts were
added to the existing GCWW SCADA communications network without adversely affecting
communications of the existing GCWW data. Since non-video sites used the existing GCWW SCADA
system, the digital cellular issues that hampered the video-monitored sites did not affect intrusion alert
communications.
57
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
0)
.Q
'(5
<
1
u
baa jot
Q_
98 8%
> ^ + ^
^
Avg= 99.91% available
^
» Av
Av
ailability
erage
Start Date of Monthly Reporting Period
Figure 5-8. Communications System Availability: Non-Video Sites
All reporting periods had availability greater than 99.3 percent. Twenty of 28 reporting periods were
above the average availability of 99.91 percent. Only one reporting period, which had an availability of
99.3 percent, was less than 99.7 percent.
5.6.2 A vailability of Intrusion Detection Equipment
Definition: Availability of intrusion detection equipment was defined as the percentage of time that the
hatch sensors, level sensors and ladder motion sensors were functioning properly. The hatch and level
sensors were wired in series, so the sensors were treated as one device for this report.
Analysis Methodology: The equipment availability for the different types of intrusion detection devices
at non-video sites for each reporting period is shown. The calculation for percent available for each type
of intrusion detection device is:
(Potential Equipment Hours Available- Equipment Hours Unavailable)
Potential Equipment Hours Available
xlOO
Potential equipment hours available is the number of hours in the reporting period multiplied by the
number of equipment of that type installed at the non-video sites. Equipment hours unavailable is the
number of hours that the equipment was not working for each type of equipment per reporting period.
Results: Figure 5-9 shows the availability for the intrusion detection devices used at non-video sites,
including ladder motion sensors and hatch sensors.
58
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
100%
90%
3
HI
Ladder motion sensors replaced
by hatches and hatch sensors
- N
Start Date of Monthly Reporting Period
Note: Hatch contact sensors and ladder motion sensors were always available.
Figure 5-9. Intrusion Detection Equipment Availability - Non-Video Sites
No intrusion detection equipment failures occurred during the evaluation period. During the December
2008 reporting period, hatch sensors replaced ladder motion sensors at the non-video sites, based on
feedback from ESM Drill 1 (see Table 2-4).
5.6.3 Data Completeness
Definition: Data completeness is the number of data hours that can be used to support component
operations, expressed as a percentage of all data generated by the component.
Analysis Methodology: The data completeness for intrusion detection equipment at non-video sites is
shown. The calculation for data completeness is:
(Potential Data Hours Available - Data Hours Unavailable)
Potential Data Hours Available
xlOO
Potential number of data hours available is calculated using the number of intrusion detection data
streams multiplied by the number of hours in the reporting period. Data hours unavailable is the number
of hours that the data stream was not working properly per reporting period. Each data stream represents
the output from an individual intrusion detection device. Additionally, downtime due to communications
outages caused all the intrusion alert data streams from that location to be considered invalid.
Results: Figure 5-10 shows the completeness for all non-video intrusion alert data streams. The data
completeness metric includes downtime from communications and equipment faults. Each data stream
represents the output from an individual intrusion detection device.
59
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
100.0%
99.8%
99.6%
0)
a>
a.
o 99.4%
99.2%
99.0%
98.8%
Avg= 99.91% completeness
Start Date of Monthly Reporting Period
Note: The data completeness was equal to the communications availability, because the equipment availability at non-video sites
was 100%.
Figure 5-10. Data Completeness for Non-Video Sites
The data completeness values combined the trends shown in Figures 5-8 and 5-9, which show the
communications availability and intrusion equipment availability. The data completeness was equal to
the communications availability shown on Figure 5-8, because the equipment availability at non-video
sites was 100 percent.
5.6.4 Summary
The operational reliability design objective was evaluated by examining the intrusion alert
communications availability, equipment availability, and data completeness. At the non-video monitored
sites, intrusion alert data transmission availability averaged 99.91 percent per reporting period, with the
lowest reporting period averaging 99.3 percent. The intrusion detection equipment availability was 100
percent over the evaluation period, so the data completeness was the same as the intrusion alert data
transmission availability. Intrusion alert data transmission at the non-video sites was not subject to the
digital cellular issues that affected video data communications because the non-video sites used the
GCWW SCADA network to transmit data.
60
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 6.0: Performance of the Integrated Component
The previous two sections provided a description of metrics and results related to aspects unique to video
monitored and non-video monitored sites. The analysis in the section includes an evaluation of metrics
that pertain to the integrated component and how it achieves the design objectives described in Section
1.1. Specific metrics are described for each of the design objectives.
6.1 Description
Proper integration of all ESM security processes is crucial to implementing a comprehensive CWS which
will provide an effective defense against a contamination incident in a utility's distribution system. Refer
to Sections 4.1 and 5.1 for more detailed discussions of each security system that form the integrated
ESM component.
6.2 Design Objective: Spatial Coverage
Definition: Each ESM site covered only one access point to the distribution system, thus limiting their
detection capability and spatial coverage. However, the consequences if a contamination incident did
occur at an ESM site may be widespread. This analysis considered each ESM site and estimated the
service area impacted should each site experience a contamination incident.
Analysis Methodology: The CWS simulation model was used to estimate the service area protected by
an ESM-equipped site by determining the area and population that would be impacted by an uninterrupted
contaminant injection at the ESM site. The model calculates the contaminant spread from an injection
location until the contaminant concentration is not detectable or harmful, and the area affected by the
incident is called the Zone of Influence (ZOI). The area of and population within the ZOI for each
scenario originating at an ESM site were tabulated, and the percentile values for individual sites were
calculated to examine the distribution of data. Additionally, a non-overlapping superset of the ZOIs from
each ESM scenario was developed to determine the overall population and area coverage for the ESM
component.
Results: There were 170 scenarios that involved ESM locations, and the statistics for the population and
area for each ESM location are presented below in Figure 6-1. Variations in ZOI were due to differences
in hydraulics and contaminant toxicity. Overall, the model indicated that the ESM component covered 99
percent of the retail population and 96 percent of the retail service area.
61
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
100%
J3 90%
<
5 80%
I 70%
f 60%
I 50%
> 40%
HI
!2 30%
o
I 20%
o
£ 10%
0%
Population (Left)
Area (Right)
Notes:
Elevated Storage Tanks A and D: 10th, 25th, 50th and 75th percentiles are the lower bar, 90th is the upper bar
Reservoir D: 10th percentile is the lower bar, 25th, 50th, 75th and 90th percentiles are the upper bar.
The simulated contamination scenarios at Reservoirs A, B and C did not result in detectable or harmful levels of contaminant
introduced into the system.
Figure 6-1. Percent Population and Area of Zone of Influence at ESM Sites
Figure 6-1 shows that the Pump Stations B and C, and Reservoir at Pump Station A had the largest ZOIs,
with median values of 81 to 93 percent population and 70 to 80 percent area of the retail service area
impacted, thus supporting the design decision to install a higher level of surveillance capability (video
monitoring equipment) at these sites. Pump Station A, Elevated Storage Tank E and Reservoir D had
smaller ZOIs with medians of 12 to 33 percent population and 22 to 33 percent area. Lastly, the Elevated
Storage Tanks A, B, C and D had the smallest ZOIs with medians of two to nine percent population and
five to ten percent area. Some sites with lesser ZOIs were chosen for ESM improvements so all site types
were represented in the Cincinnati pilot, even if the estimated consequences of contamination were not as
high as that of other sites.
6.3 Design Objective: Contaminant Coverage
See Sections 4.3 and 5.3 for the contaminant coverage considerations of video and non-video monitored
sites. ESM focuses on detection of physical intrusions, and is therefore independent of contaminant type;
therefore contaminant coverage was not considered.
6.4 Design Objective: Alert Occurrence
6.4.1 Invalid Alerts
Definitions: See Sections 4.4.1 and5.4.1 for definitions of invalid alerts at the video and non-video
monitored sites.
Analysis Methodology: For an integrated evaluation of invalid alerts video and non-video monitored
sites, invalid alert data was analyzed on a time-series basis and also by overall percentages averaged over
the evaluation period.
62
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Results: Figure 6-2 shows the number of invalid alerts at all ESM sites over the evaluation period. The
invalid alerts were categorized by overall root causes: procedural, equipment and environmental.
Equipment-caused invalid alerts dropped significantly starting with the November 2008 reporting period.
SCADA programming changes implemented during the December 2008 reporting period reduced the
number of invalid alerts caused by radio faults at ladder sites. Replacement of ladder motion sensors with
ladder hatch sensors during December 2008 reporting period reduced the number of equipment-caused
invalid alerts.
Procedure-caused invalid alerts had a decreasing trend over time. Training of staff on new ESM
procedures reduced this type of invalid alert.
250
200
in
r 150
100 -
50
Procedural
i Equipment
Environmental
[BiiihiiiJHmiiB
Start Date of Monthly Performance Period
Note: Employee training and security equipment adjustment reduced invalid alerts.
Figure 6-2. ESM Invalid Alerts
Figure 6-3 shows the percentages of invalid alerts at all ESM sites over the evaluation period. The
invalid alerts were categorized by detailed root causes: door prop, no call-in, motion sensor, door/hatch
sensor and radio fault.
63
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
1.3%
_0.6%
Door Prop
No Call-in
'A Ladder Motion Sensor
Ladder Hatch Sensor
Area Motion Sensor
Door/Hatch Switch
Radio Fault
Note: Most invalid alerts were caused by radio faults.
Figure 6-3. Invalid Alerts by Type
After radio faults, door props were the next highest percentage of invalid alerts. Many doors monitored
by the ESM system were not previously required to be closed. Training of staff on ESM procedures
reduced this type of invalid alert overtime.
Figure 6-4 shows the percentages of invalid alerts at all ESM site types over the evaluation period. The
invalid alerts were categorized by locations: pump station, reservoir and elevated/ground storage tanks.
Pump Station
Reservoir
Elevated/Ground Storage Tanks
Note: Invalid alerts from elevated/ground storage tank sites were mostly from radio faults.
Figure 6-4. Invalid Alerts by Site Type
64
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The elevated/ground storage tank sites had the highest percentage of invalid alerts due to the high number
of radio faults. The pump stations had the next highest percentage of invalid alerts. The pump stations
had a high number of door props and no call-in incidents.
6.4.2 Summary
The alert occurrence design objective was evaluated by examining the invalid alert rates for video and
non-video monitored sites. The overall number of invalid alerts had a decreasing trend over the
evaluation period, as employee training and equipment adjustment reduced the number of procedural and
equipment-caused invalid alerts. Radio faults were the most common type of invalid alert, accounting for
69.2% of alerts received over the course of the evaluation period. Door props represented the next
highest percentage of alerts received at 15.5%. Most invalid alerts were received from elevated/ground
storage tank (71%) and pump station (28%) locations; only 1% of invalid alerts were received from
reservoir locations.
6.5 Design Objective: Timeliness of Detection
For all ESM sites, the timeliness of detection evaluation metrics include the time for an alert to arrive at
the utility control center, the time for the alert to be observed by utility personnel, the time for the alert to
be investigated by utility personnel and the level of usage of the investigation checklists. The time for
video clip transmission and viewing was specific to video sites and was discussed in Section 4.5.1 and
4.5.2. The timely transmission of alerts, the subsequent viewing of information by utility personnel, and a
rapid investigation of the site are vital to ensure that a potential contamination incident is validated as
quickly as possible after intrusion detection equipment has generated an alert. Proper use of the
investigation checklists ensures that the utility personnel follow the response procedures as stated in the
Cincinnati Pilot Operational Strategy.
6.5.1 Time for Intrusion Alert Transmission
Definition: Time for intrusion alert transmission is the time required for an alert to be transmitted from
an ESM site to the utility control center and be available for utility personnel review.
Analysis Methodology: Reported transmission times by ESM site per reporting period were analyzed.
Results: The average time for alert transmission from non-video sites to the utility control center was
about five seconds over the entire evaluation period. Non-video sites used the GCWW SCADA system
for transmitting alerts. The video sites used digital cellular communications until transitioned to Tl and
DSL connections during the January 2010 reporting period. Alert transmission time for video sites was
about five seconds using digital cellular communications, decreasing to 4.5 seconds after the Tl and DSL
transition.
Summary: Transmission time for alerts from the ESM sites to the utility control center was about five
seconds for the entire evaluation. The transition from digital cellular to Tl and DSL connections at video
sites improved alert transmission time only slightly.
6.5.2 Time to Initiate an Investigation
Definition: Time to initiate an investigation is the time between when an alert is received at the utility
control center and when the investigation by utility personnel begins.
Analysis Methodology: The times to initiate an investigation per reporting period were analyzed. Data
from investigation checklists were used to calculate investigation initiation times.
Results: Overall, the investigation process was initiated as per utility policy.
65
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
6.5.3 Time to Validate Possible Contamination
Definition: Time to validate Possible contamination is the time between when an alert investigation
begins and when utility personnel have determined whether contamination is Possible. ESM is unique
because it is the only component theoretically capable of preventing intentional contamination, if a timely
response ensues. The CWS simulation model also captured two contaminant injection-related timeliness
metrics: the time to interrupt an injection, which is the time between when an injection started and when
on-site investigators could interrupt the injection, and the duration of an uninterrupted injection.
Time to validate Possible contamination metrics were obtained through three separate methodsobtained
empirically during routine operations, observed during ESM drills, and simulated through the CWS
model. As such, the Analysis Methodology and Results for each method is described separately below.
Routine Operations
Analysis Methodology: Average, minimum and maximum times to complete alert investigations per
reporting period were evaluated for the video monitored and non-video monitored facilities. Data from
investigation checklists were used to calculate alert validation times.
Results: The times to validate Possible contamination for video and non-video monitored sites during
routine operation are shown in Figures 6-5 and 6-6, respectively. None of the routine operation alert
investigations reached the Possible stage, so the investigation time to reach a Possible determination
could not be captured empirically. Alert response investigation times observed during ESM drills, all of
which did reach the Possible stage, are discussed in the next results section.
During the design phase, the video monitoring was intended to reduce the amount of time to validate an
alert, since operators and security personnel could use video clips to verify if an invalid alert was caused
by an employee or a potential contamination incident. In the case of an invalid alert, a video clip could
prevent an unnecessary field investigation of a site. Table 6-1 summarizes the data from the figures.
66
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
on
0)
.Q
'« 7n
o
0_
to
c 60
o
j=
re
c en
l₯
5 = 4n
o| 40
4-> C
TO
£ -an
3
- 20
5
o
K
0
£/&f
ty $ & 4s .
Avg= 27 minutes
Start Date of Monthly Reporting Period
Note: The error bars represent the maximum and minimum validation times per reporting period. The average alert validation time
was 27 minutes during the evaluation period and 37 minutes during drills at video monitored sites. There were no investigations at
video monitored ESM sites after July 16, 2009.
Figure 6-5. Time to Validate if Contamination is Possible at Video Monitored Sites
100
HI
si
'« 90 -
to
o
Q_
c
1
Jj
O -|
4-1
a
-5
> on
2
E 10-
i-
0
» Average Time to Validate per Reporting
Period
T
>
4
After May 2008, oper
investigation checklis
alerts.
r^^-
i
4
-
ators did not fill out an 1 Average Time to Validate for Evaluation
LC -i- -i r-i Period
t for radio-caused invalid
Drill at Non- Video Site
T T
tt ° o ^ Avg= 25 minutes
^
-I- }
^
M
Start Date of Monthly Reporting Period
A/ote: The error bars represent the maximum and minimum validation times per reporting period. The average alert validation time
was 25 minutes during the evaluation period. The validation time was estimated at 35 minutes during the drill at a non-video
monitored site.
Figure 6-6. Time to Validate if Contamination is Possible at Non-Video Monitored Sites
67
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 6-1. Time to Validate Possible Contamination
ESM Site Type
Video Monitored Sites
Non-Video Monitored Sites
Average
27 minutes
25 minutes
Minimum
4 minutes
1 minutes
Maximum
70 minutes
95 minutes
Contrary to the design intent, the video sites had a longer average time to validate if contamination was
Possible compared to the non-video sites by an average of about two minutes. Potential causes include:
The non-video validation time data from the May 2008 reporting period may have caused the
non-video validation time to be underestimated. The reporting period included 32 investigations
of 85 total non-video site investigations over the entire evaluation period. There were multiple
investigations during this reporting period that were only a few minutes long, causing the average
for this reporting period to be only 8.4 minutes. These short investigations at non-video sites
were caused by the operator observing a ladder sensor alert followed by a radio alert, and then
concluding that the ladder alert was caused by the radio alert. An onsite investigation was not
conducted, but the operator filled out an investigation checklist anyway. Data from investigation
checklists were included in calculating alert investigation and validation times. After the May
2008 reporting period, operators did not fill out an investigation checklist when a radio alert
caused an invalid ladder alert. If the average for non-video monitored sites was recalculated
without the May 2008 reporting period, the average validation time at non-video would increase
to 34.7 minutes, instead of 25 minutes.
Extended periods of video communications downtime increased validation time at video sites.
When video clips were not being transmitted to the utility control center in a timely manner,
onsite investigations for all suspected intrusions were required.
The video sites are significantly larger facilities than the non-video sites, and require more time to
conduct a thorough investigation. For example, video sites were large multi-level pump stations
while non-video sites included smaller structures associated with elevated storage tanks and
reservoirs. During Drill 1, which was at a non-video site, the time for site investigators to
validate if contamination was Possible was ten minutes less than that of Drill 2, which was at a
large pump station.
For video monitored sites, the minimum and maximum validation times were four minutes and 70
minutes, respectively. The validation times included approximately two minutes to download the video
clip. The minimum occurred when the video clip showed that an employee caused the alert, so an onsite
investigation was not needed. The maximum time occurred when an onsite investigation was needed.
For non-video monitored sites, the minimum and maximum validation times were one minute and 95
minutes, respectively. The minimum occurred when a ladder alert was accompanied by a radio alert,
indicating that the invalid alert was caused by radio problems so an onsite investigation was not needed.
The radio alert usually arrived within a few seconds of the ladder alert. The maximum validation time
was higher for non-video monitored sites, because the sites are farther than the video monitored sites,
from where the plant supervisor and security guard are normally stationed.
ESM Drills
Analysis Methodology: Average, minimum and maximum times for each investigation step that was
performed during the four ESM drills were evaluated using checklists from drill observers. This data was
used to develop time to validate Possible contamination metrics, which were not available empirically
from routine operations.
68
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Results: This section covers alert response investigation times observed during four ESM drills, all of
which reached the Possible stage. Each of the drills is described below.
ESM Drill 1 was conducted on June 26, 2008, during business hours at an elevated tank equipped with
intrusion sensors only (no video equipment). Two scenarios were presented. During the first scenario,
responders arrived and saw an open gate and door. During the second scenario, the door accessing the
elevated tank was closed. Safety discussions ensued among the responding personnel pertaining to the
possibility of an intruder still being at an advantageous position, high on the tank, with the capability and
intent to deter response. One of the major outcomes of the drill was replacing motion sensors on the
ladders with ladder guards equipped with intrusion contact switches. This change provided responders
with the knowledge of whether or not an intruder had actually climbed the ladder to access the top of the
tank. Figure 6-7 shows the timeline progression of the key activities completed during the ESM alert
investigation for ESM Drill 1. Note that the timeline was normalized so the start of the investigation
occurs at time 0. The time to fully investigate the alert during the first scenario was 35 minutes.
00:00
ESM Alert 00:35
Investigators Determine
Contamination is Possible
< 00:01 &WUERM Notified
Operator
Recognizes Alert
00:03
Operator Notifies
Security, Law
Enforcement and
Plant Supervisor
00:00 01:00
Figure 6-7. Timeline Progression for ESM Alert Investigation - ESM Drill 1
ESM Drill 2 was conducted on March 11, 2009 to evaluate alert recognition and investigative procedures
associated with the component during the business hours of the utility, at a pump house which was
equipped with video equipment. Video showed two individuals, appearing to be employees or
maintenance workers, entering the site with a 55-gallon drum and a garden hose. Two scenarios were
discussed with the responders. In the first scenario, video conclusively showed the intrusion. In the
second scenario, the video was unavailable or garbled. The 'inconclusive video' scenario prompted
discussion about safety and procedures that differed from the 'conclusive video' scenario. Figure 6-8
shows the timeline progression of the key activities completed during the ESM alert investigation for
ESM Drill 2. Note that the timeline was normalized so the start of the investigation occurs at time 0. The
time to fully investigate the alert was 38 minutes.
69
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
00:00
ESM Alert
< 00:01 00;05
Operator Operator Notifies
Recognizes Alert p|ant Supervisor
Operator Notifies/
00:38
Investigators Determine
Contamination is Possible
&WUERM Notified
Security and Law
Enforcement'
I
00:00
01:00
Figure 6-8. Timeline Progression for ESM Alert Investigation - ESM Drill 2
The ESM After-Hours Drill was conducted April 30, 2009 to May 1, 2009 at a reservoir which was
equipped with video. The video conclusively showed intrusion, and one of the drill observers played the
role of a local law enforcement responder. Figure 6-9 shows the timeline progression of the key
activities completed during the ESM alert investigation for ESM Drill 3. Note that the timeline was
normalized so the start of the investigation occurs at time 0. The time to fully investigate the alert was 36
minutes.
00:00
ESM Alert
< 00:01
Operator
Recognizes Alert
00:02
Operator Notifies Security, Law
Enforcement and Plant Supervisor;
Video Clip Arrives at Control Center
00:36
Investigators Determine
Contamination is Possible &
WUERM Notified
00:00 01:00
Figure 6-9. Timeline Progression for ESM Alert Investigation - ESM After-Hours Drill 3
ESM Drill 4 was conducted on April 13, 2010 to evaluate GCWW's response to an ESM incident
stemming from a witness account, corroborated with a threat. The drill was at the same video monitored
reservoir site as Drill 3. The scenario was a contractor (who was part of a cleaning crew) witnessing an
individual tampering with the door, and then fleeing. No intrusion alerts were triggered, nor video
captured. During the investigation, as responders were about to enter the facility, drill evaluators injected
that the GCWW contact center received a threat that the water had been contaminated at that location.
Figure 6-10 shows the timeline progression of the key activities completed during the ESM alert
investigation for ESM Drill 4. Note that the timeline was normalized so the start of the investigation
occurs at time 0. The time to fully investigate the alert was 50 minutes.
70
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
00:00
ESM Alert
00:04
Security Interviews
Witness
00:50
Investigators Determine
Contamination is Possible &
WUERM Notified
00:37
Security Receives
Verbal Threat
00:06
Control Center Operator,
Law Enforcement and
Plant Supervisor Notified
, !
. =
00:00
01:00
Figure 6-10. Timeline Progression for ESM Alert Investigation - ESM Drill 4
Table 6-2 provides a summary of the average time spent on each alert investigation activity and range
(MIN to MAX). The average time to investigate an ESM alert was 40 minutes with a range of 35 to 50
minutes. Information on each drill scenario is also presented in Section 3.2.3.
Table 6-2. Time to Implement Key Activities During Drill ESM Alert Investigations
Activity
Time to Investigate ESM Alert
Time elapsed between start of ESM alert and
operator recognition of alert
Time for video clip to arrive at control center
Time for operator to notify local law
enforcement
Time for operator to notify GCWW Security
Time for operator to notify Plant Supervisor
Average
(minutes)
40
<1
4
3
2
4
MIN to MAX
35 to 50
-
2 to 6
2 to 6
2 to 3
2 to 6
CWS Simulation Model
Analysis Methodology: The CWS simulation model was used to further compare the time to validate
Possible contamination metric between video and non-video sites. The time to interrupt an injection
metric was generated by the CWS simulation model for video and non-video sites, and the duration of an
uninterrupted injection metric was also presented for comparison.
Results: The CWS simulation model was used to simulate the time to validate Possible contamination
metric to supplement the empirical findings from routine operations and drills. The time to interrupt an
injection and duration of an uninterrupted injection metrics were also modeled since empirical data was
not available for these metrics. The CWS model metrics for time to validate Possible contamination and
time to interrupt an injection are shown in Figures 6-11 and 6-12, respectively.
71
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
60
c
.2 50
c
E
ro
£ 40
o
o
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The time to validate contamination at non-video sites varied with 25th, 50th and 75th percentile values at
28, 39, and 45 minutes, respectively. Non-video sites required an on-site investigation to determine that
contamination was Possible, and the variability was due to differences in travel time and the necessary
time to investigate the site for different ESM facility types.
Thus, contamination was deemed Possible approximately 30 minutes sooner at video sites compared to
non-video sites, which underscores the benefit of installing video monitoring systems.
Figure 6-12 indicates that a few of the scenarios at video sites had uninterrupted injection durations of
more than 60 minutes, which was due to facility characteristics at video sites that allowed for longer
injection times. CWS simulation model developers determined that an uninterrupted injection duration
shorter than 60 minutes would likely result in a contaminant slug that was too small to impact a large
number of people because there would be only a very small window of time when the contaminant would
be at a node for potential exposure.
The differences in the investigation procedures between video and non-video sites led to a more timely
injection interruption at the video sites. For non-video sites, the on-site investigation begins after the
plant supervisor and local law enforcement are both on-site, with law enforcement arriving ten minutes
after being notified and the supervisor arriving within 20-30 minutes, depending on the distance of the
site from the assumed starting point. However, for video sites, the law enforcement officer does not wait
for the supervisor to arrive and initiates the on-site investigation immediately since there is video
confirmation of an actual intrusion, thus shortening the time to interrupt the injection by approximately
10-20 minutes.
These model results demonstrate two critical benefits of installing video at a site: earlier determination
that contamination is possible and sooner interruption of an injection. Early determination of potential
contamination could initiate operational changes (such as isolation or hydraulic grade changes) to
minimize contaminant spread, and timely injection interruption reduces the amount of contaminant
introduced into the system.
6.5.4 Summary
The timeliness of detection design objective was evaluated by examining alert transmission time and time
to validate Possible contamination. Transmission time for alerts from the ESM sites to the utility control
center was about five seconds for the entire evaluation. The transition of communication type from
digital cellular to Tl and DSL connections at video sites improved alert transmission time only slightly,
from 5 to 4.5 seconds.
The average time to validate whether contamination was Possible took 27 minutes at video monitored
sites and 25 minutes at the non-video monitored sites. This was contrary to the design intent of video
monitoring, which was to reduce validation time since the operations and security personnel could use the
video clips to determine an invalid alert or Possible contamination incident without having to conduct an
onsite investigation. Possible reasons for this result include inconsistencies in the way operators were
filling out investigation checklists, video communication issues and the additional time required to
investigate the larger areas of the video-monitored sites.
The average validation times from routine operations were slightly less than the validation times from the
ESM drills that simulated an intrusion. The drills at non-video site had a validation time of about 35
minutes, while the drill at a video site averaged 37 minutes. The average validation times from routine
operations were shorter because they included alerts where onsite investigation was not required.
73
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
CWS simulation model results showed that investigators would determine that contamination was
Possible approximately 30 minutes sooner for alerts at video sites when compared to that of non-video
sites. This simulation finding underscores the benefit of installing video monitoring systems, given that
the majority of uninterrupted injection durations were on the order of 60 minutes.
6.6 Design Objective: Operational Reliability
See Section 4.6 for a discussion on the operational reliability design objective.
6.6.1 System A vailability
Definition: The ESM component is considered available when the physical security equipment,
communications equipment, and the data management design elements are all operational concurrently.
If any of the design elements is unavailable, then the ESM component is considered unavailable during
that time period.
Analysis Methodology: Any period of downtime greater than one hour for the ESM component was
considered unavailable. ESM availability is the total number of hours available divided by the total
possible hours available. The downtime criteria for the ESM design elements were defined as follows:
Physical Security Equipment: Less than 75% of intrusion detection devices are producing a valid
data stream.
Communications Equipment: Less than 75% of ESM data streams are successfully transmitted.
Data Management: Less than 75% of ESM data streams are successfully displayed on the
human-machine interface application in the GCWW control center.
Results: Figure 6-13 below shows the ESM component availability for each reporting period. Overall,
the ESM component was available 97% of the time, with 99% or greater availability during 23 out of the
28 reporting periods. Reporting periods with less than 99% availability resulted from downtime due to
PLC failure and I/O server downtime caused by programming updates and hardware issues.
74
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
100%
90%
80%
1 60%
- 50%
§
o 40%
E
<3 30%
S
"2 20%
10%
0%
Start Date of Monthly Reporting Period
Note: The average ESM component availability during the evaluation period was 97 percent.
Figure 6-13. ESM Component Availability
6.7 Design Objective: Sustainability
Sustainability is a key objective in the design of a CWS and each of its components, which for the
purpose of this evaluation is defined in terms of the cost-benefit trade-off. Costs are estimated over the
20 year life cycle of the CWS and include the capital cost to implement the CWS and the cost to operate
and maintain the CWS. The benefits derived from the CWS are defined in terms of primary and dual-use
benefits. The primary benefit of a CWS is the potential reduction in consequences in the event of a
contamination incident; however, such a benefit may be rarely, if ever, realized. Thus, dual-use benefits
that provide value to routine utility operations are an important driver for Sustainability. Ultimately,
Sustainability can be demonstrated through utility and partner acceptability with the protocols and
procedures necessary to operate and maintain the CWS. The three metrics that will be evaluated to assess
how well the Cincinnati CWS met the design objective of Sustainability are: Costs, Benefits, and
Acceptability. The following subsections define each metric, describe how it was evaluated, and present
the results.
6.7.1 Costs
Definition: Costs are evaluated over the 20 year life cycle of the Cincinnati CWS, and comprise costs
incurred to design, deploy, operate, and maintain the ESM component since its inception.
Analysis Methodology: Parameters used to quantify the implementation cost of the ESM component
were extracted from the Water Security Initiative: Cincinnati Pilot Post-Implementation System Status
(USEPA, 2008). The cost of modifications to the ESM component made after the completion of
implementation activities were tracked as they were incurred. O&M costs were tracked on a monthly
basis over the duration of the evaluation period. Renewal and replacement costs, along with the salvage
value at the end of the Cincinnati CWS life cycle were estimated using vendor supplied data, field
experience and expert judgment. Note that all costs reported in this section are rounded to the nearest
dollar. Section 3.5 provides additional details regarding the methodology used to estimate each of these
cost elements.
75
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Results: The methodology described in Section 3.5, was applied to determine the value of the major cost
elements used to calculate the total lifecycle cost of the ESM component for 20 years, which are
presented in Table 6-3. It is important to note that the Cincinnati CWS was a research effort, and as
such incurred higher costs than would be expected for a typical large utility installation. A similar
ESM component implementation at another utility should be less expensive as it could benefit from
lessons learned and would not incur research-related costs. Additional information regarding the data
used to determine the value of each cost element is presented below.
Table 6-3. Cost Elements used in the Calculation of 20 Year Lifecycle Cost
Parameter
Implementation Costs
Annual O&M Costs
Renewal and Replacement Costs
Salvage Value
Value
$1,388,869
$38,002
$257,332
($19,124)
Table 6-4 below presents the implementation cost for each ESM design element, with labor costs
presented separately from the cost of equipment, supplies, and purchased services.
Table 6-4. Implementation Costs
Design Element
Project Management
Physical Security
Equipment
Data Management and
Communication
Procedures
TOTAL:
Labor
$102,749
$617,156
$85,886
$168,846
$974,636
Equipment, Supplies,
Purchased Services1
-
$405,617
-
-
$405,617
Component
Modifications1
(deletions in
parentheses)
-
$27,121
($18,505)
-
-
$8,616
Total
Implementation
Costs1
$102,749
$1,031,389
$85,886
$168,846
$1,388,869
Project management costs incurred during implementation were distributed evenly among the CWS components.
The first design element, project management, includes overhead activities necessary to design and
implement the component. The physical security equipment design element includes the cost of
conducting a vulnerability assessment on all pump stations, ground level tanks and elevated storage tanks
at GCWW. Enhancements were identified during the assessment, and consisted of door/hatch sensors,
motion sensors, ladder hatch gates and cameras for identified facilities. The third design element, data
management and communication, includes the cost of implementing a parallel SCADA system for
transmitting digital video recordings to the utility control system for viewing when an alert is received.
The final design element, procedures, includes the cost of developing procedures that guide the routine
operation of the component and alert investigations, along with training on those procedures.
Overall, the physical security equipment design element had the highest implementation cost (74 percent).
Implementation costs for project management, data management and collection and for development of
the procedures for routine operation and training on those procedures were significantly lower at 7, 6 and
12 percent, respectively.
76
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
The component modification costs represent the labor, equipment, supplies and purchased services
associated with enhancements to the ESM component after completion of major implementation activities
in December 2007. The modification costs include additional expenses incurred to install 24 volt dc UPS
and batteries for ladder motion sensors; fabricate and install ladder hatches and ladder guards; install an
additional hatch sensor; and implement communications and control system improvements. The cost of
four ladder motion sensors and their installation was subtracted from the total implementation costs as
these items were removed from utility facilities based on recommendations from ESM Drill 1. The ladder
motion sensors were replaced with hatch sensors.
The annual labor hours and costs of operating and maintaining the ESM component, broken out by design
element, are shown in Table 6-5.
Table 6-5. Annual O&M Costs
Design Element1
Physical Security
Equipment
Data Management
and Communication2
Procedures
TOTAL:
Total Labor
(hours/year)
201
-
210
411
Total Labor
Cost
($/year)
$9,359
-
$10,902
$20,261
Supplies and
Purchased
Services
($/year)
$1,901
$15,840
-
$17,741
Total O&M
Cost
($/year)
$11,260
$15,840
$10,902
$38,002
Overarching project management costs were only incurred during implementation of the ESM component and are not applicable
for annual O&M costs.
Recurring communication cost is split between Water Quality Monitoring and ESM.
O&M for the physical security equipment involves routine maintenance and troubleshooting of any
equipment problems. Most of the O&M labor hours reported under "Procedures" are spent on the routine
investigation of ESM alerts. Table 6-6 shows the investigation labor hours, representing the amount of
effort that utility control center operator and field investigators spend when responding to intrusion alerts
at ESM sites. The utility control center operator receives the alert and then notifies the personnel
assigned to conduct the onsite investigation.
The field investigators had 24 percent more labor than the utility control center operators. In many cases,
the plant supervisor and guard both investigated a site, doubling the amount of field investigator labor.
There were only a few investigations at ESM sites from the start of the July 2009 reporting period
through the end of the evaluation. The utility's operators and security guards continued responding to
suspected intrusion alerts throughout the period. However, almost all suspected intrusions were at non-
ESM sites, so the investigations were not included in this evaluation.
Investigation labor hours per alert varied greatly because of the widespread geographic distribution of the
ESM monitored sites throughout the utility's service area.
77
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 6-6. Investigation Labor Hours per Reporting Period and Investigation
Personnel
Utility Control Center Operators
Field Investigators
Total
Average Labor
Hours per
Investigation
0.40
0.49
0.89
Average Labor Hours per
Period
1.64
2.05
3.69
Total Labor Hours
46
57
103
Two of the major cost elements presented in Table 6-3, the renewal and replacement costs and salvage
value, were based on costs associated with major pieces of equipment installed for the ESM component.
The useful life of these items was estimated at 3, 5, 7, 10, or 15 years based on field experience,
manufacturer-provided data and input from subject matter experts. For the items with a useful life of
three years, it was assumed that the equipment would need to be replaced six times during the 20-year life
cycle of the CWS, items with a useful life of five years were assumed to be replaced three times, and
items with a useful life of seven years were assumed to be replaced twice. The equipment with a useful
life of 10 or 15 years would only be replaced once. These items and their total costs are presented in
Table 6-7.
Table 6-7. Equipment Costs
Equipment Item
Security Lighting
Door/Hatch Sensors
Ladder Sensors
Area Motion Sensors
Cameras - PTZ
Cameras - Fixed
Video System (Longwatch, RVE hardware and
VCC)
Useful Life
(years)
15
15
10
10
3
7
5
Unit Capital
Costs
$311
$260
$1,660
$450
$4,026
$1,037
$11,000
Quantity
(# of Units)
28
33
2
10
5
6
3
TOTAL:
Total Cost
$8,708
$8,580
$3,320
$4,500
$20,130
$6,222
$33,000
$84,460
To calculate the total 20 year lifecycle cost of the ESM component, all costs and monetized benefits were
adjusted to 2007 dollars using the change in the Consumer Price Index between 2007 and the year that the
cost or benefit was realized. Subsequently, the implementation costs, renewal and replacement costs, and
annual O&M costs were combined, and the salvage value was subtracted to determine the total 20-year
lifecycle cost:
ESM Total Lifecycle Cost: $2,195,081
Note that in this calculation, the implementation costs and salvage value were treated as one-time balance
adjustments, the O&M costs recurred annually, and the renewal and replacement costs for major
equipment items were incurred at regular intervals based on the useful life of each item.
6.7.2 Benefits
Definition: The benefits of CWS deployment can be considered in two broad categories: primary and
dual-use. Primary benefits relate to the application of the CWS to detect contamination incidents, and can
be quantified in terms of a reduction in consequences. Primary benefits are evaluated at the system and
are thus discussed in the system evaluation report Water Security Initiative: Evaluation of the Cincinnati
78
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Contamination Warning System Pilot (USEPA, 2014b). Dual-use benefits are derived through
application of the CWS to any purpose other than detection of intentional and unintentional drinking
water contamination incidents. Dual-use benefits realized by the ESM component are presented in this
section.
Analysis Methodology: Information collected from forums, such as data review meetings, lessons
learned workshops, and interviews were used to identify dual-use applications of the ESM component of
the CWS.
Results: Operation of the ESM component of the CWS has resulted in benefits beyond the detection of
intentional and unintentional contamination incidents. These key dual-use benefits and examples
identified by the utility include:
1. More efficient investigations/staff utilization and education:
ESM assists operational staff in determining whether a facility has been restored and
secured to proper conditions after maintenance activities. For example, after work is
performed inside a storage tank, it is imperative that all access hatches be closed to
ensure the quality of the water. An examination of the facility ESM conditions, including
monitored hatches, by operational staff ensures that the facility is restored to proper
conditions.
Through ESM, operational staff gain familiarity and proficiency with security-related
SOPs, reducing the number of invalid alerts caused by procedural errors.
As camera technology and cost improve, camera use in conducting security checks of
facilities in place of staff visits can reduce field time, thereby making security staff
available for higher priority activities.
Implementation of an optimally defined ESM system at remote utility facilities, areas
subject to frequent power outages, or locations that serve as a single connection to a
major area such as a wholesale customer, allow for remote site investigations and provide
police responders better information. Remote site investigations provide faster
investigations and reduce or eliminate staff visits to the site. An optimally defined ESM
system includes perimeter fencing, access alerts, motion sensors, alert-activated cameras
(both external and internal) and an uninterruptible power supply.
2. Deterrent effect:
Additional intrusion detection devices such as video cameras could serve as a deterrent to
and allow detection of vandalism or theft incidents. Vandals are less likely to target a site
with a video camera, and thieves are more likely to target sites without as much security.
3. Integration with law enforcement:
ESM can assist police conducting investigations in the vicinity of utility facilities
equipped with external video cameras. The cameras can be used to identify people of
interest, time frames, activities and other conditions that support the collection of forensic
evidence for crimes not related to the water utility. For example, a utility video camera
could capture on video a thief who has robbed a nearby business.
In high-crime areas, access to ESM information including cameras could be provided to
police (e.g., in a local Fusion Center). This would enable police to closely monitor
criminal activities in the area.
79
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
4. Increased employee safety:
ESM can allow utility staff to know the location of employees. If an employee is at a
location for an unusually long amount of time, it could be an indication that an employee
is injured or impaired.
6.7.3 Acceptability - Investigation Checklist Usage
Definition: Investigation checklist usage is the number of investigation checklists submitted for
suspected intrusion incidents. The Operational Strategy for the Cincinnati CWS required that the utility
control center operator complete an investigation checklist for all suspected intrusion incidents and that
the security guard complete a checklist for all suspected intrusion incidents that the guard investigated.
The investigation checklist guides the user through the steps of an investigation and provides fields for
recording incident and event times.
Analysis Methodology: The number of suspected intrusions and the number of investigation checklists
provided for suspected intrusions was evaluated.
Results: Figure 6-14 and Table 6-8 show the investigation checklist usage and the number of suspected
intrusions.
I
o
S
I
16
14
12
10
Suspected Intrusions
ChecklistsSubmitted for Suspected
Intrusions
E
i
Utility reinforces the
importance of logging
allemployeecall-ins
inSeptember2009
illBI VH HI II.
'^^fS1'*?'^^^^*?^*?^^*?^*?*?*?^^^ >.£>$*
^ ^ ^ ^ \N^ vN^ ^ ^ ^ vN^ ^ ^ vN«^ ^ ^ ^ \N^ v\^ sN^ ^ v^ ^ ^
> <^ ^ ^ N>y ^> Ny (jp- n^ ^ ^ ^ /^ <^ o>^ ^ NKy ^jr ^y <£ ^ «^ <>
'A*W
Start Date of Monthly Reporting Period
Note: Investigation checklists were submitted for 39% of all suspected intrusions.
Figure 6-14. Detected Entries by Category
80
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Table 6-8. Investigation Checklists Submitted for Suspected Intrusions
Detected Entry Category
Investigation Checklist Submitted for Suspected
Intrusions
No Investigation Checklist Submitted for Suspected
Intrusion
Total Suspected Intrusions
Valid Entries at ESM sites
Amount Over Evaluation Period
25
39
64
12,905
Note: There was an average of 460 valid entries at ESM sites per reporting period.
Investigation checklists were submitted for 39 percent of all suspected intrusions. It is likely that many, if
not all, of the 39 suspected intrusions without a corresponding investigation checklist were due to the
utility control center not logging a valid entry, especially given that there were 12,905 valid entries at
ESM sites during the 28-month evaluation period. It should be noted that suspected intrusions without an
investigation checklist began decreasing, eventually to zero after utility management re-emphasized the
importance of logging all entries in September 2009.
The months of June, July and August tended to have the most suspected intrusions. Two factors
increased the likelihood of an operator not logging an employee call-in during the summer months. First,
high water demand required the utility control center operator to perform more operational tasks than
during other months of the year. Second, increased construction and maintenance activities elevated the
number of valid entries to be logged.
At the conclusion of the CRADA, the utility personnel were instructed to continue to complete
investigation checklists for all suspected intrusions at ESM and non-ESM sites, indicating system-wide
adoption of the Cincinnati Pilot Operational Strategy.
6.7.4 Summary
The sustainability design objective was evaluated by examining costs, benefits and acceptability. Total
lifecycle costs for 20 years were calculated by adding the cost of implementing the system, annual
operations and maintenance, renewal and replacement costs, and then subtracting the estimated salvage
value. The total 20 year lifecycle cost was $2,195,081. The cost to develop, design, procure, install, and
modify the ESM hardware/software for video monitored and non-video monitored sites was a total
implementation cost of $1,388,869. The annual O&M cost of the ESM component was $38,002. The
renewal and replacement cost was $257,332.
Implementation costs were derived from a matrix that analyzed labor, procured goods and services and
modification costs segregated by project management, equipment, communications, and the cost to
develop investigative procedures. The O&M costs were mostly labor hours spent on the routine
investigation of ESM alerts. The renewal and replacement costs and salvage value were based on costs
associated with major pieces of equipment installed for the ESM component. The useful life of each
piece of equipment was estimated to be between three and 15 years and varied based on field experience,
manufacturer-provided data, and input from subject matter experts.
Investigation labor hours per alert varied greatly due to the widespread geographic distribution of the
ESM monitored sites throughout the utility's service area. The average labor for investigations per
reporting period was 3.69 hours, and the average per investigation was 0.89 hour. The average labor
hours for field investigators was slightly greater than that of the utility control center operators mainly
81
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
because of occasions when there was more than one field investigator participating in the onsite
investigation.
The benefits described are based on qualitative information, and related to increased efficiency,
deterrence and integration. Quantifiable consequences are discussed in the report Water Security
Initiative: Evaluation of the Cincinnati Contamination Warning System Pilot (USEPA, 2013).
To evaluate the acceptability of the ESM component, analysis of the investigation checklist usage showed
25 suspected intrusions at ESM sites that resulted in an investigation and completion of an investigation
checklist, although not all suspected intrusions resulted in completion of an investigation and
corresponding checklist. The most likely explanation for the suspected intrusions without an
investigation checklist was that an employee called into the utility control center, but the operator
overlooked entering the call into the log book. Those entries should have been counted as valid. After
the conclusion of the CRADA, utility personnel were instructed to complete investigation checklists for
all suspected intrusions at ESM and non-ESM sites, indicating system-wide adoption of the Cincinnati
Pilot Operational Strategy.
82
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 7.0: Summary and Conclusions
As described earlier, this document serves to provide a comprehensive evaluation of how effectively the
ESM component of the Cincinnati pilot achieved the five applicable CWS design objectives used to
characterize performance: spatial coverage, contaminant coverage, timeliness of contaminant detection,
operational reliability and sustainability. To conduct the evaluation, data sources including empirical
data, drill and exercise data, simulation study results, forums (including monthly staff interviews and a
lessons-learned workshop), and cost data were utilized.
7.1 Design Objective: Spatial Coverage
ESM was limited in its ability to detect contamination incidents throughout the distribution system since
only specific utility locations are monitored for intrusions that may lead to contamination. However, the
sites that were monitored by ESM impacted a very large portion of the population and service area,
indicating the importance of monitoring these locations. Overall, the simulation study model indicated
that the ESM sites covered water supplied to 99 percent of the retail population and 96 percent of the
retail service area. The model also showed that the three ESM pump station sites supplied water to 81 to
93 percent of the retail service population and 70 to 80 percent of the retail service area. These relatively
large populations and wide service areas supported the design decision to install video monitoring
equipment at these three sites.
7.2 Design Objective: Contaminant Coverage
Although the ESM component did not consider specific contaminants or detection classes of
contaminants, the volume of contaminants, general levels of contaminant toxicity, and method of
contaminant injection were considered during the ESM design of the video and non-video monitored
sites.
7.3 Design Objective: Alert Occurrence
Table 7-1 summarizes the alert occurrence metrics.
Door prop invalid alerts diminished as utility staff and contractors were trained on new ESM procedures
for securing doors at the facilities.
The ladder and area motion invalid alerts were found to have a higher frequency of invalid alerts
compared to door/hatch sensors. Ladder and area motion invalid alerts diminished as sensors with high
invalid alert rates were identified and adjusted. Ladder motion sensors were replaced by ladder hatches
and ladder hatch sensors based on recommendations from ESM Drill 1.
The intrusion detection devices met the Guidelines for the Physical Security of Water Utilities
(ASCE/AWWA, 2006) guideline of at least 90 days between invalid alerts per sensor.
Table 7-1. Evaluation of Alert Occurrence Metrics
Description
Invalid Alerts Door/Hatch Props
Invalid Alerts No Call-Ins
Video Sites
0.42 per 1 00 valid entries per door
1 .4 per 1 00 valid entries
Non-Video Sites
None
0.23 per 100 valid entries
83
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Description
Invalid Alerts Door/Hatch Sensors
Invalid Alerts Area Motion Sensors
Invalid Alerts Ladder Motion Sensors
Invalid Alerts Ladder Hatch Sensors
Video Sites
Non-Video Sites
1,168 days between invalid alerts per sensor
136 sensor days between invalid
alerts per sensor
N/A
160 days between invalid alerts per sensor
271 days between invalid alerts per sensor
7.4 Design Objective: Timeliness of Detection
Table 7-2 summarizes the timeliness of detection metrics.
Table 7-2. Evaluation of Timeliness of Detection Metrics
Description
Time for Alert Transmission
Time to Initiate an Investigation
Investigation Checklist Usage
Time for Video Clip Transmission
Time to View Video Clip
Time to Validate Contamination is
Possible
Video Sites
Non-Video Sites
5 seconds
2 minutes
25 investigation checklists were submitted for suspected intrusions at ESM
sites. The utility has adopted use of investigation checklists at all sites.1
One to three minutes (using digital
cellular communications)
37 seconds (using T1 and DSL
communications and video clip is
doubled in duration)
3.23 minutes
27 minutes
N/A
N/A
25 minutes
1 - There were 39 out of 64 suspected intrusions during the evaluation period that did not have an investigation checklist. The most
likely explanation for the suspected intrusions without an investigation checklist was that an employee called into the utility control
center, but the operator overlooked entering the call into the log book. Those entries should have been counted as valid. There
were 12,905 valid entries at ESM sites during the evaluation period.
The alert transmission times were relatively constant throughout the evaluation. The video clip
transmission time varied because of communications issues. The digital cellular communication system
initially used to transmit the alert and video data from video sites eventually was replaced by Tl and DSL
connections.
The video clips that supported an onsite investigation or were used to verify an invalid alert were viewed
an average of 3 minutes and 14 seconds after the intrusion.
Utility staff took longer to investigate video sites than non-video sites. This was contrary to the design
intent of the video monitored sites. Possible reasons included inconsistencies in the way operators filled
out investigation checklists, communications issues delaying transmission of the video clip and video
monitored sites being larger than non-video sites and requiring more time to investigate thoroughly.
Data from the CWS simulation model simulated the time to validate possible contamination, the time to
interrupt an injection and duration of an uninterrupted injection for ESM sites with and without video.
The model results showed that contamination was determined to be possible 30 minutes sooner and
injections were interrupted 10-20 minutes earlier at video sites when compared to that of non-video sites.
84
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
7.5 Design Objective: Operational Reliability
Table 7-3 summarizes the operational reliability metrics.
Communications system availability typically was above 99 percent for alert data transmission but varied
greatly for video data transmission. There were issues with video communications throughout the
evaluation, including the blocking of video traffic by the digital cellular provider. Communications from
video monitored sites were transitioned to Tl and DSL connections after video traffic was blocked.
Table 7-3. Evaluation of Reliability Metrics
Description
Communications System Availability Alerts
Communications System Availability Video
Intrusion Detection Equipment Availability
Video Equipment Availability
Data Completeness Intrusion Detection
Data Completeness Video
Video Sites
96-100%
Avg. = 99.69%
77-100%
Avg. = 97.64%
88-1 00%1
60-1 00%1
87-100%
Avg. = 98.59%
71-100%
Avg. = 93.23%
Non-Video Sites
99.3-100%
Avg. =99.91%
N/A
100%
Avg. = 100%
N/A
99.3-100%
Avg. =99.91%
N/A
1 - Average varied by equipment.
The availability of intrusion detection equipment typically was greater than 99 percent, although PLC
outages caused downtime. Cameras started out with availability greater than 99 percent but experienced
extended periods of downtime toward the end of the evaluation period, as the PTZ cameras approached
the end of the design life.
7.6 Design Objective: Sustainability
The costs, benefits and acceptability associated with operating, maintaining, modifying and evaluating the
ESM system are summarized in Table 7-4.
After the conclusion of the CRADA, the utility staff was instructed to complete investigation checklists
for all suspected intrusions at ESM and non-ESM sites, indicating system-wide adoption of the Cincinnati
Pilot Operational Strategy. A similar ESM implementation at another utility should be less expensive
when compared to the Cincinnati pilot as it could benefit from lessons learned and would not incur
research-related costs.
Table 7-4. Summary of Sustainability Metrics
Description
Costs
Implementation Costs
Annual O&M Costs
Renewal and Replacement Costs
Salvage Value
Labor Hours per Investigation
Average for Investigation Labor Hours per Reporting Period
Total Investigation Labor Hours
Total 20 Year Lifecycle Costs1
Value
$1,388,869
$38,002
$257,332
($19,124)
0.89 hours
3.69 hours
103 hours
$2,195,081
85
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Description
Benefits
More efficient investigations/ staff utilization and education
Deterrent effect
Integration with law enforcement
Increased employee safety
Acceptability
Investigation Checklist Usage
Value
Qualitative
Qualitative
Qualitative
Qualitative
0-100%
Avg. = 39%1
1 - Actual costs were adjusted to 2007 dollars to calculate the total 20 year lifecycle cost.
86
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 8.0: References
ASCE/AWWA. 2006. Guidelines for the Physical Security of Water Utilities. ASCE/AWWA Draft
American National Standard for Trial Use.
U.S. Environmental Protection Agency. 2008. Water Security Initiative: Cincinnati Pilot Post-
Implementation System Status. EPA 817-R-08-004.
U.S. Environmental Protection Agency. 2014a. Water Security Initiative: Comprehensive Evaluation of
the Cincinnati Contamination Warning System Pilot EPA 817-R-14-001.
U.S. Environmental Protection Agency. 2014b. Water Security Initiative: Evaluation of the Cincinnati
Contamination Warning System Pilot EPA 817-R-14-001A.
87
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 9.0: Abbreviations
The list below includes acronyms approved for use in the ESM component evaluation. Acronyms are
defined at first use in the document.
ASCE
AWWA
CRADA
CWS
DSL
EPA
ESM
FSE
GCWW
HazMat
HMI
I/O
O&M
PHS
PLC
PTZ
SCADA
SOP
Tl
TCP
TEVA
UDP
UPS
WAN
WaterlSAC
WUERM
ZOI
American Society of Civil Engineers
American Water Works Association
Cooperative Research and Development Agreement
Contamination Warning System
Digital Subscriber Line
United States Environmental Protection Agency
Enhanced Security Monitoring
Full Scale Exercise
Greater Cincinnati Water Works
Hazardous Materials Removal Team
Human Machine Interface
Input/Output
Operation and Maintenance
Public Health Surveillance
Programmable Logic Controller
Pan-Tilt-Zoom
Supervisory Control and Data Acquisition
Standard Operating Procedure
T-carrier 1
Transmission Control Protocol
Threat Ensemble Vulnerability Assessment
User Datagram Protocol
Uninterruptible Power Supply
Wide Area Network
Water Information Sharing and Analysis Center
Water Utility Emergency Response Manager
Zone of Influence
88
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Section 10.0: Glossary
Alert. Information from a monitoring and surveillance component indicating an anomaly in the system,
which warrants further investigation to determine if the alert is valid.
Alert Investigation. A systematic process, documented in a standard operating procedure, for
determining whether or not an alert is valid and identifying the cause of the alert. If an alert cause cannot
be identified, contamination is possible.
Anomaly. Deviations from an established baseline. For example, a water quality anomaly is a deviation
from typical water quality patterns observed over an extended period.
Baseline. Normal conditions that result from typical system operation. The baseline includes predictable
fluctuations in measured parameters that result from known changes to the system. For example, a water
quality baseline includes the effects of draining and filling tanks, pump operation and seasonal changes in
water demand, all of which may alter water quality in a somewhat predictable fashion.
Benefit. An outcome associated with the implementation and operation of a contamination warning
system that promotes the welfare of the utility and the community it serves. Benefits are classified as
either primary or dual-use.
Benefit-cost analysis. An evaluation of the benefits and costs of a project or program, such as a
contamination warning system, to assess whether the investment is justifiable considering both financial
and qualitative factors.
Component response procedures. Documentation of roles and responsibilities, process flows, and
procedural activities for a specified component of the contamination warning system, including the
investigation of alerts from the component. Standard operating procedures for each monitoring and
surveillance component are integrated into an operational strategy for the contamination warning system.
Confirmed. In the context of the threat level determination process, contamination is confirmed when
the analysis of all available information from the contamination warning system has provided definitive,
or nearly definitive, evidence of the presence of a specific contaminant or class of contaminant in the
distribution system. While positive results from laboratory analysis of a sample collected from the
distribution system can be a basis for confirming contamination, a preponderance of evidence, without the
benefit of laboratory results, can lead to this same determination.
Consequence management. Actions taken to plan for and respond to possible contamination incidents.
This includes the threat level determination process, which uses information from all monitoring and
surveillance components as well as sampling and analysis to determine if contamination is credible or
confirmed. Response actions, including operational changes, public notification and public health
response, are implemented to minimize public health and economic impacts, and ultimately return the
utility to normal operations.
Consequence management plan. Documentation that provides a decision-making framework to guide
investigative and response activities implemented in response to a possible contamination incident.
89
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Contamination incident. The introduction of a contaminant in the distribution system with the potential
to cause harm to the utility or the community served by the utility. A contamination incident may be
intentional or accidental.
Contamination scenario. Within the context of the simulation study, parameters that define a specific
contamination incident, including: injection location, injection rate, injection duration, time the injection
is initiated and the contaminant that is injected.
Contamination warning system. An integrated system of monitoring and surveillance components
designed to detect contamination in a drinking water distribution system. The system relies on integration
of information from these monitoring and surveillance activities along with timely investigative and
response actions during consequence management to minimize the consequences of a contamination
incident.
Costs, implementation. Installed cost of equipment, IT components and subsystems necessary to deploy
an operational system. Implementation costs include labor and other expenditures (equipment, supplies,
and purchased services).
Cost, life cycle. The total cost of a system, component or equipment over its useful or practical life. Life
cycle cost includes the cost of implementation, operation & maintenance and renewal & replacement.
Costs, operation & maintenance. Expenses incurred to sustain operation of a system at an acceptable
level of performance. Operational and maintenance costs are reported on an annual basis, and include
labor and other expenditures (supplies and purchased services).
Costs, renewal & replacement. Costs associated with refurbishing or replacing major pieces of
equipment (e.g., water quality sensors, laboratory instruments, IT hardware, etc.) that reach the end of
their useful life before the end of the contamination warning system lifecycle.
Coverage, contaminant. Specific contaminants that can potentially be detected by each monitoring and
surveillance component, including sampling & analysis, of a contamination warning system.
Coverage, spatial. The areas within the distribution system that are monitored by, or protected by, each
monitoring and surveillance component of a contamination warning system.
Credible. In the context of the threat level determination process, a water contamination threat is
characterized as credible if information collected during the investigation of possible contamination
corroborates information from the validated contamination warning system alert.
Data completeness. The amount of data that can be used to support system or component operations,
expressed as a percentage of all data generated by the system or component. Data may be lost due to QC
failures, data transmission errors and faulty equipment among other causes.
Distribution system model. A mathematical representation of a drinking water distribution system,
including pipes, junctions, valves, pumps, tanks, reservoirs, etc. The model characterizes flow and
pressure of water through the system. Distribution system models may include a water quality model that
can predict the fate and transport of a material throughout the distribution system.
Door/Hatch Prop. An occurrence when personnel left a door or hatch open that should have been
closed. An example of such an occurrence could be when utility staff used an object to prevent a door
90
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
from closing for ease of entry or exit during maintenance activities and left the facility without closing the
door.
Dual-use benefit. A positive application of a piece of equipment, procedure, or capability that was
deployed as part of the contamination warning system, in the normal operations of the utility.
Ensemble. The comprehensive set of contamination scenarios evaluated during the simulation study.
Event detection system. A system designed specifically to detect anomalies from the various monitoring
and surveillance components of a contamination warning system. An event detection system may take a
variety of forms, ranging from a complex set of computer algorithms to a simple set of heuristics that are
manually implemented.
Evaluation period. The period from January 16, 2008 to June 15, 2010 when data was actively collected
for the evaluation of the Cincinnati CWS.
Hydraulic connectivity. Points or areas within a distribution system that are on a common flow path.
Incident Commander. In the Incident Command System, the individual responsible for all aspects of an
emergency response; including quickly developing incident objectives, managing incident operations, and
allocating resources.
Incident timeline. The cumulative time from the beginning of a contamination incident until response
actions are effectively implemented. Elements of the incident timeline include: time for detection, time
for alert validation; time for threat level determination, and time to implement response actions.
Injection duration. The cumulative time over which the bulk volume of a contaminant is injected into
the distribution system at a specific location for a given scenario within the simulation study.
Injection location. The specific node in the distribution system model where the bulk contaminant is
injected into the distribution system for a given scenario within the simulation study.
Injection rate. The mass flow rate at which the bulk volume of a contaminant is injected into the
distribution system at a specific location for a given scenario within the simulation study.
Invalid alert. An alert from a monitoring and surveillance component that is not due to an anomaly and
is not associated with an incident or condition of interest to the utility.
Job function. A description of the duties and responsibilities of a specific job within an organization.
Metric. A standard or statistic for measuring or quantifying an attribute of the contamination warning
system or its components.
Model. A mathematical representation of a physical system.
Model parameters. Fixed values in a model that define important aspects of the physical system.
Module. A sub-component of a model that typically represents a specific function of the real-world
system being modeled.
91
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Monetizable. A cost or benefit whose monetary value can be reliably estimated from the available
information.
Monitoring & surveillance component. Element of a contamination warning system used to detect
unusual water quality conditions, potentially including contamination incidents. The four monitoring &
surveillance components of a contamination warning system include: 1) online water quality monitoring,
2) enhanced security monitoring, 3) customer complaint surveillance and 4) public health surveillance.
Net present value. The difference between the present value of benefits and costs, normalized to a
common year.
No call-in. An occurrence when GCWW personnel did not follow established procedures for calling in to
the utility control center within a designated time span of entering a facility. An intrusion alert was
generated automatically when anyone entered a facility, but an entry was considered valid if an employee
called in within a designated time span. Personnel at the utility control center could observe a no call-in
incident when the video clip showed an employee entering the facility. If video data were not available, a
no call-in incident could be verified when onsite investigators or local law enforcement arrived at the
facility and witnessed the employees at the site.
Node. A mathematical representation of a junction between two or more distribution system pipes, or a
terminal point in a pipe in a water distribution system model. Water may be withdrawn from the system
at nodes, representing a portion of the system demand.
Nuisance chemicals. Chemical contaminants with a relatively low toxicity, which thus generally do not
pose an immediate threat to public health. However, contamination with these chemicals can make the
drinking water supply unusable.
Operational strategy. Documentation that integrates the standard operating procedures that guide
routine operation of the monitoring and surveillance components of a drinking water contamination
warning system. The operational strategy establishes specific roles and responsibilities for the component
and procedures for investigating alerts.
Optimization phase. Period in the contamination warning system deployment timeline between the
completion of system installation and real-time monitoring. During this phase the system is operational,
but not expected to produce actionable alerts. Instead, this phase provides an opportunity to learn the
system and optimize performance (e.g., fix or replace malfunctioning equipment, eliminate software bugs,
test procedures and reduce occurrence of invalid alerts).
Pan-tilt-zoom camera. A camera that is capable of rotating 360 degrees horizontally and 90 degrees
vertically. Furthermore, the camera view can be zoomed-in or widened to the extent of the lens and
mechanism. Pan-tilt-zoom cameras installed for the Cincinnati pilot were programmed to focus on preset
locations when the associated door or motion sensor detected an intrusion.
Pathogens. Microorganisms that cause infections and subsequent illness and mortality in the exposed
population.
Possible. In the context of the threat level determination process, a water contamination threat is
characterized as possible if the cause of a validated contamination warning system alert is unknown.
Primary benefits. Benefits that are derived from the reduction in consequences associated with a
contamination incident due to deployment of a contamination warning system.
92
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
Priority contaminant. A contaminant that has been identified by the EPA for monitoring under the
Water Security Initiative. Priority contaminants may be initially detected through one of the monitoring
and surveillance components and confirmed through laboratory analysis of samples collected during the
investigation of a possible contamination incident.
Process flow. The central element of a standard operating procedure that guides routine monitoring and
surveillance activities in a contamination warning system. The process flow is represented in a flow
diagram that shows the step-by-step process for investigation alerts, identifying the potential cause of the
alert and determining whether contamination is possible.
Radio fault. The radio fault is a feature of the GCWW SCADA network. The non-video sites used the
existing GCWW SCADA network for transmitting the ESM intrusion alerts to the utility control center.
Certain GCWW remote sites used wireless I/O modules to transmit data to a facility with a hardwired
connection to the GCWW SCADA network. Three of the five ladder sites at non-video locations used
wireless I/O modules. An invalid ladder alert was triggered when the wireless I/O module experienced a
loss in signal strength, which could result from signal path blockage or radio interference. Usually a radio
fault was transmitted to the GCWW SCADA network with the ladder alert following loss in signal
strength, but there were also occasions where a radio fault was not generated but a false tank level alert
accompanied the false ladder alert. Both conditions were used to determine when a ladder alert was
caused by a radio issue.
Real-time monitoring phase. Period in the contamination warning system deployment timeline
following the optimization phase. During this phase, the system is fully operational and is producing
actionable alerts. Utility staff and partners now respond to alerts in real-time and in full accordance with
standard operating procedures documented in the operational strategy. Optimization of the system still
occurs as part of a continuous improvement process, however the system is no longer considered to be
developmental.
Routine operation. The day-to-day monitoring and surveillance activities of the contamination warning
system that are guided by the operational strategy. To the extent possible, routine operation of the
contamination warning system is integrated into the routine operations of the drinking water utility.
Salvage value. Estimated value of assets at the end of the useful life of the system.
Scenario subset. A group of scenarios that represent a portion of the full ensemble. Typically, scenario
subsets will be defined by specific values or ranges of values for scenario parameters.
Security breach. An unauthorized intrusion into a secured facility that may be discovered through direct
observation, an alert or signs of intrusion (e.g., cut locks, open doors, cut fences).
Simulation study. A study designed to systematically characterize the detection capabilities of the
Cincinnati drinking water contamination warning system. In this study, a computer model of the
contamination warning system is challenged with an ensemble of 2,023 simulated contamination
scenarios. The output from these simulations provides estimates of the consequences resulting from each
contamination scenario, including fatalities, illnesses and extent of distribution system contamination.
Consequences are estimated under two cases, with and without the contamination warning system in
operation. The difference provides an estimate of the reduction in consequences.
Time for confirmed determination. A portion of the incident timeline that begins with the
determination that contamination is credible and ends with contamination either being confirmed or ruled
93
-------
Water Security Initiative: Evaluation of the Enhanced Security Monitoring Component
of the Cincinnati Contamination Warning System Pilot
out. This includes the time required to perform lab analyses, collect additional information, and analyze
the collective information to determine if the preponderance of evidence confirms the incident.
Time for contaminant detection. A portion of the incident timeline that begins with the start of
contamination injection and ends with the generation and recognition of an alert. The time for
contaminant detection may be subdivided for specific components to capture important elements of this
portion of the incident timeline (e.g., sample processing time, data transmission time, event detection
time, etc.).
Time for credible determination. A portion of the incident timeline that begins with the recognition of
a possible contamination incident and ends with a determination regarding whether contamination is
credible. This includes the time required to perform multi-component investigation and data integration,
implement field investigations (such as site characterization and sampling), and collect additional
information to support the investigation.
Time for initial alert validation. A portion of the incident timeline that begins with the recognition of
an alert and ends with a determination regarding whether or not contamination is possible.
Toxic chemicals. Highly toxic chemicals that pose an acute risk to public health at relatively low
concentrations.
Valid Alert. Alerts due to water contamination, system events (i.e., work in the distribution system for
CCS or WQM), or public health incidents (for PHS), or an occurrence where an actual intrusion incident
happened (ESM).
Video Clip. A data file of video imagery of a preset duration and resolution. A video clip of each
detected intrusion was transmitted to the utility control center for assessment by operations personnel.
This minimized the load on the communications system while provide personnel with visual evidence to
validate whether an intrusion or contamination incident was actually occurring without having to conduct
an onsite investigation.
Water Utility Emergency Response Manager. A role within the Cincinnati contamination warning
system filled by a mid-level manager from the drinking water utility. Responsibilities of this position
include: receiving notification of validated alerts, verifying that a valid alert indicates possible
contamination, coordinating the threat level determination process, integrating information across the
different monitoring and surveillance components, and activating the consequence management plan. In
the early stages of responding to possible contamination, the Water Utility Emergency Response Manager
may serve as Incident Commander.
94
------- |