Navigation Links
National Research Council report on security at federally managed dams
Date:8/19/2008

WASHINGTON -- Since the terrorist attacks of 2001, the Bureau of Reclamation (BOR), which operates and manages dams that provide water and power to millions of people, has invested significant resources in security and is better able to protect its facilities and personnel, says a new report from the National Research Council. However, BOR needs better communication among security staff, regional and area office staff, and local law enforcement personnel; security plans that are designed to meet realistic, site-specific threats; and more consistent support within the organization. The bureau should take a more strategic approach to its security program and develop a long-term plan that addresses policy, programmatic, and resource issues, said the committee that wrote the report.

There are approximately 80,000 dams in the U.S. today, many of which would become significant hazards if they should fail. Of these, BOR operates and manages 479 dams and dikes in 17 states, including five national critical infrastructure facilities: Hoover, Grand Coulee, Folsom, Shasta, and Glen Canyon dams. Because of the wide geographical region serviced, BOR has a largely decentralized organizational structure and relies on partnerships with local contractors and regional and area office staff for day-to-day dam operations. In contrast, the security system put in place after Sept. 11, 2001, is centralized in the Security, Safety, and Law Enforcement Office, located in Denver. This difference in organizational structures has seriously impeded communications and working relationships between the Denver-based security staff and the regional and area BOR personnel (see findings 17-21).

The decentralized operations of BOR mean that the first responders to a security incident are local law enforcement, although Hoover Dam has an on-site police department and Grand Coulee Dam has a security force trained as first reponders. The chain of command during a security-related incident is unclear, says the report, and the proper procedures for security response are not well understood by BOR's regional and area office staff. In addition, the distinction between security and law enforcement is unclear, resulting in ambiguities regarding the use of deadly force during a security-related incident.

Since 2001, BOR has installed cameras, fences, and other design measures; hired security guards at some facilities; closed certain roads that cross dams; and formulated security and threat assessments. However, BOR security has evaluated only a limited number of standard threat scenarios to date. Because BOR's dams are in different settings, the types of threats that facilities can encounter are various. The report says that in the future, BOR should use intelligence-based information to develop site-specific and realistic scenarios for individual facilities.

BOR also has not adequately addressed the threat posed by insiders, including its own staff, facility operators, and contractors. The committee said that security defenses appear "brittle" and "lacking in depth" and could be overridden, allowing an intruder to take control of dam operations. To improve security, BOR needs to implement bureauwide policies regarding site access and the safeguarding of project plans and drawings. The agency also needs to streamline the identity verification process for employees and contractors; regional staff reported that identity checks can take as long as six to eight months.

To create an effective and sustainable security program at BOR, increased staff, expertise, and funding are needed. Folsom Dam, which sits outside of Sacramento, Calif., requires special consideration due to the level of devastation that would occur in the event of dam failure. The committee recognized, however, that increasing resources for security will need to be done in a way that does not compromise other activities that are critical to BOR's primary mission of providing water and power.

The report identifies an uneven commitment within BOR to the development of an effective security program (see finding 22). BOR senior management needs to communicate a consistent commitment to security by incorporating it into the organization's mission and vision statements, and by developing and communicating a plan for a sustainable security program with clear objectives and goals.


'/>"/>

Contact: Rebecca Alvania
news@nas.edu
202-334-2138
National Academy of Sciences
Source:Eurekalert

Related biology news :

1. Food, health get top billing at national chemistry meeting
2. Childrens national co-leads nationwide study of landmark sickle cell treatment
3. Story tips from the US Department of Energys Oak Ridge National Laboratory, August 2008
4. [video] Michael DePasquale, CEO of BIO-key International, Inc., Discusses Q2 2008 Revenue Growth on WallSt.nets 3-Minute Press Show
5. NYU Langone Medical Centers tip sheet to the International Conference on Alzheimers Disease 2008
6. New study spotlights National Institutes of Health grant outcomes for clinical research
7. International conference to release new findings on smell and taste
8. National Institutes of Health award Williams professor $217,710 research grant
9. Story tips from the Department of Energys Oak Ridge National Laboratory, July 2008
10. International team identifies 21 new genetic risk factors for Crohns disease
11. 2008 ASABE Annual International Meeting
Post Your Comments:
*Name:
*Comment:
*Email:
(Date:6/9/2016)... leader in attendance control systems is proud to announce the introduction of fingerprint attendance ... the right employees are actually signing in, and to even control the opening of ... ... ... Photo - ...
(Date:6/2/2016)... NEW YORK , June 2, 2016   The ... (Weather), is announcing Watson Ads, an industry-first capability in which ... advertising, by being able to ask questions via voice or ... Marketers have long ... with the consumer, that can be personal, relevant and valuable; ...
(Date:5/16/2016)... , May 16, 2016   EyeLock LLC , ... announced the opening of an IoT Center of Excellence ... and expand the development of embedded iris biometric applications. ... level of convenience and security with unmatched biometric accuracy, ... identity aside from DNA. EyeLock,s platform uses video technology ...
Breaking Biology News(10 mins):
(Date:6/23/2016)... , June 23, 2016  Blueprint Bio, a company ... to the medical community, has closed its Series A ... Nunez . "We have received a commitment ... capital we need to meet our current goals," stated ... us the runway to complete validation on the current ...
(Date:6/23/2016)... ... June 23, 2016 , ... Velocity Products, a ... designed, tuned and optimized exclusively for Okuma CNC machining centers at The International ... a collaboration among several companies with expertise in toolholding, cutting tools, machining dynamics ...
(Date:6/22/2016)...  According to Kalorama Information, the dominant trends ... include significant efforts in automation as well as ... affordable sequencers, say the healthcare market research firm, ... sample prep materials.  The healthcare market research company,s ... Next Generation Sequencing (NGS) , highlights major trends ...
(Date:6/22/2016)... ... June 22, 2016 , ... The Immigrant ... achievements and contributions to North Texas and the nation, recently held its annual ... community to the civic and economic vitality of North Texas. Proceeds from the ...
Breaking Biology Technology: