Hatch Protection forms an integral part of reservoir security. The security of water supply and the security of UK citizens are intertwined. Water has a vital role in daily life for people and the economy. Securing the water supply is governed in British legislature under section 208 of the Water Industry Act 1991 (“WIA 91”) and specifically the Security and Emergency Measures (Water Undertakers) Direction 2006.
As far back as 1941, J. Edgar Hoover, director of the FBI, said “Water supply facilities offer a particularly vulnerable point of attack to the foreign agent.” The cold war ending only heightened concerns for national critical infrastructure both in the states and the UK. Fast forward to today and the possible threat of terrorist attack is higher than ever.
Environmental terrorism is the unlawful use of force against national environmental resources. It targets natural resources as opposed to more traditional targets such as buildings, roads, and vehicles. As with all terrorism, the ultimate aim is to achieve psychological trauma on a country’s population.
This type terrorism is a concern to world governments as it could have even higher consequences than conventional terrorism and it can be achieved with minimal manpower and expense. The potential for disrupting society is very substantial. As environmental scarcities increase, the potential for an attack on natural resources is even greater.
Water supply is viewed as vulnerable to terrorist attack for a few different reasons: It is vital to everyday life and economic activity. If interrupted or lost, it would have a great effect on society and in turn get a great deal of publicity for the terrorist cause. Also water resources are typically very accessible, this is particularly true of boreholes, water towers and reservoirs. As water is obviously fluid it can be used as a delivery method to carry toxic chemicals throughout the supply route to large sections of the population. It is therefore imperative that reservoirs are secured and hatch protection plays a key role in the security strategy.
Book a demo now.