Title: Existing technologies for deterring and defeating waterside attack of dams

Authors: Michael E. Kalinski; L. Sebastian Bryson; Alexander D. Krumenacher; Bryan T. Phillips; Zach Ethington; Benjamin T. Webster

Addresses: Department of Civil Engineering, University of Kentucky, 161 Raymond Bldg., Lexington, KY 40506-0281, USA ' Department of Civil Engineering, University of Kentucky, 161 Raymond Bldg., Lexington, KY 40506-0281, USA ' Terracon Associates, 5307 Industrial Oaks Blvd., Austin, TX 78735, USA ' Tampa Electric, 820 S. 78th St., Tampa, FL 33619, USA ' Vector Engineers, Inc., 26 Village Plaza, Shelbyville, KY 40065, USA ' Stantec Engineers, 400 E. Vine St. Ste. 300, Lexington, KY 40507, USA

Abstract: Protecting dams from waterside attack is a necessary provision in the current security landscape. Nevertheless, dams remain largely unprotected. Breach of a dam would result in loss of life, property loss, and disruption of water supply and electricity sources. Waterside dam security requires technologies for detecting, deterring, and defeating attacks. Herein, the results of research to evaluate existing technologies to deter and defeat water-side attacks and mitigate the effects of attacks are presented. These technologies include physical barriers, bubble curtains, and directed energy systems. These technologies can be integrated with detection technologies such as radar and video surveillance to provide comprehensive security systems. The information presented herein is part of an ongoing study with the ultimate goal of developing and implementing effective waterside security systems that protect dams while conforming to the local social and legal environment.

Keywords: dams; waterside attacks; physical barriers; directed energy systems; bubble curtains; waterside dam protection; critical infrastructures; dam security; attack deterrence; attack detection; radar surveillance; video surveillance.

DOI: 10.1504/IJCIS.2014.066341

International Journal of Critical Infrastructures, 2014 Vol.10 No.3/4, pp.247 - 266

Available online: 17 Dec 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article