2020 Michigan Hazard Analysis (MHA)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Module III – Fire Analysis Fire Fundamentals: Definitions
Module III – Fire Analysis Fire Fundamentals: Definitions Joint EPRI/NRC-RES Fire PRA Workshop August 21-25, 2017 A Collaboration of the Electric Power Research Institute (EPRI) & U.S. NRC Office of Nuclear Regulatory Research (RES) What is a Fire? .Fire: – destructive burning as manifested by any or all of the following: light, flame, heat, smoke (ASTM E176) – the rapid oxidation of a material in the chemical process of combustion, releasing heat, light, and various reaction products. (National Wildfire Coordinating Group) – the phenomenon of combustion manifested in light, flame, and heat (Merriam-Webster) – Combustion is an exothermic, self-sustaining reaction involving a solid, liquid, and/or gas-phase fuel (NFPA FP Handbook) 2 What is a Fire? . Fire Triangle – hasn’t change much… . Fire requires presence of: – Material that can burn (fuel) – Oxygen (generally from air) – Energy (initial ignition source and sustaining thermal feedback) . Ignition source can be a spark, short in an electrical device, welder’s torch, cutting slag, hot pipe, hot manifold, cigarette, … 3 Materials that May Burn .Materials that can burn are generally categorized by: – Ease of ignition (ignition temperature or flash point) . Flammable materials are relatively easy to ignite, lower flash point (e.g., gasoline) . Combustible materials burn but are more difficult to ignite, higher flash point, more energy needed(e.g., wood, diesel fuel) . Non-Combustible materials will not burn under normal conditions (e.g., granite, silica…) – State of the fuel . Solid (wood, electrical cable insulation) . Liquid (diesel fuel) . Gaseous (hydrogen) 4 Combustion Process .Combustion process involves . – An ignition source comes into contact and heats up the material – Material vaporizes and mixes up with the oxygen in the air and ignites – Exothermic reaction generates additional energy that heats the material, that vaporizes more, that reacts with the air, etc. -
MARITIME OFF-RAMP He 2,356’ Long "Maritime Off- Ramp” Is One of Seven Bridge Tcontracts in California’S I-880 Replacement Project
Prize Bridge Award:Grade Seperation MARITIME OFF-RAMP he 2,356’ long "Maritime Off- Ramp” is one of seven bridge Tcontracts in California’s I-880 Replacement Project. The Maritime Off-Ramp replaced a concrete struc- ture on Cypress Street (now named the Nelson Mandela Parkway) in Oakland. The “Maritime Off-Ramp,” also known as the Horseshoe Line or “HS” Line because of its 250’ radius horseshoe shape, is an orthotropic steel bridge. The remainder of the bridges in the project are steel plate girder bridges with concrete decks or post-tensioned cast-in-place con- crete. The “HS” Line becomes California’s sixth orthotropic bridge.Loma Prieta Earthquake On October 17, 1989, the Loma Prieta earthquake (magnitude 7.1) occurred near Oakland and San Francisco, California. The I-880 Cypress Street Viaduct, a two-level reinforced concrete structure com- pleted in 1957 carried I-880 freeway traffic through downtown Oakland. The upper roadway collapsed result- ing in 41 deaths and 108 injuries. A portion of the roadway between 7th and 34th streets was removed due to the damage. I-880 is a critical interstate free- way connecting San Jose and the East Bay Area to San Francisco, Sacramento and the Sierra Nevada. The I-880 Freeway Viaduct was a section of I-880 that carried between 140,000 and 160,000 vehicles per day and provided for eight lanes of mixed-flow traffic. THE I-880 REPLACEMENT PROJECT The I-880 Replacement Project was designed and then built in seven separate construction contracts to avoid impacting traffic in this impor- tant transportation corridor. -
Safety Data Sheet
Coghlan’s Magnesium Fire Starter #7870 SAFETY DATA SHEET This Safety Data Sheet complies with the Canadian Hazardous Product Regulations, the United States Occupational Safety and Health Administration (OSHA) Hazard Communication Standard, 29 CFR 1910 (OSHA HCS), and the European Union Directives. 1. Product and Supplier Identification 1.1 Product: Magnesium Fire Starter 1.2 Other Means of Identification: Coghlan’s #7870 1.3 Product Use: Fire starter 1.4 Restrictions on Use: None known 1.5 Producer: Coghlan’s Ltd., 121 Irene Street, Winnipeg, Manitoba Canada, R3T 4C7 Telephone: +1(204) 284-9550 Facsimile: +1(204) 475-4127 Email: [email protected] Supplier: As above 1.6 Emergencies: +1(877) 264-4526 2. Hazards Identification 2.1 Classification of product or mixture This product is an untested preparation. GHS classification for this preparation is based upon its use as a fire starter by making shavings and small particulate from the metal block. As shipped in mass form, this preparation is not considered to be a hazardous product and is not classifiable under the requirements of GHS. GHS Classification: Flammable Solids, Category 1 2.2 GHS Label Elements, including precautionary statements Pictogram: Signal Word: Danger Page 1 of 11 October 18, 2016 Coghlan’s Magnesium Fire Starter #7870 GHS Hazard Statements: H228: Flammable Solid GHS Precautionary Statements: Prevention: P210: Keep away from heat, hot surfaces, sparks, open flames and other ignition sources. No smoking. P280: Wear protective gloves, eye and face protection Response: P370+P378: In case of fire use water as first choice. Sand, earth, dry chemical, foam or CO2 may be used to extinguish. -
The Art of Reading Smoke for Rapid Decision Making
The Art of Reading Smoke for Rapid Decision Making Dave Dodson teaches the art of reading smoke. This is an important skill since fighting fires in the year 2006 and beyond will be unlike the fires we fought in the 1900’s. Composites, lightweight construction, engineered structures, and unusual fuels will cause hostile fires to burn hotter, faster, and less predictable. Concept #1: “Smoke” is FUEL! Firefighters use the term “smoke” when addressing the solids, aerosols, and gases being produced by the hostile fire. Soot, dust, and fibers make up the solids. Aerosols are suspended liquids such as water, trace acids, and hydrocarbons (oil). Gases are numerous in smoke – mass quantities of Carbon Monoxide lead the list. Concept #2: The Fuels have changed: The contents and structural elements being burned are of LOWER MASS than previous decades. These materials are also more synthetic than ever. Concept #3: The Fuels have triggers There are “Triggers” for Hostile Fire Events. Flash point triggers a smoke explosion. Fire Point triggers rapid fire spread, ignition temperature triggers auto ignition, Backdraft, and Flashover. Hostile fire events (know the warning signs): Flashover: The classic American Version of a Flashover is the simultaneous ignition of fuels within a compartment due to reflective radiant heat – the “box” is heat saturated and can’t absorb any more. The British use the term Flashover to describe any ignition of the smoke cloud within a structure. Signs: Turbulent smoke, rollover, and auto-ignition outside the box. Backdraft: A “true” backdraft occurs when oxygen is introduced into an O2 deficient environment that is charged with gases (pressurized) at or above their ignition temperature. -
Clinton County Comprehensive Plan
Clinton County Comprehensive Plan 2016 UPDATE 2016 Clinton County Comprehensive Plan Update ACKNOWLEDGEMENTS Clinton County Staff Ryan Wood, County Administrator Alan Hoard, Building/Zoning Administrator Peter Preston, Community Planner Wendy Ward, Community Development Secretary Board of Commissioners Robert Showers, Chairperson David Pohl, Vice Chairperson Anne Hill Bruce DeLong Kenneth Mitchell Adam Stacey Kam Washburn Planning Commission Shannon Schlegel, Chairperson Mark Simon, Vice Chairperson Patti Jandernoa, Secretary Adam Stacey, Board of Commissioners Representative Roni Christmas Robert Kudwa Patti Jo Schafer i 2016 Clinton County Comprehensive Plan Update TABLE OF CONTENTS Acknowledgements ........................................................................................................................... i Table of Contents ............................................................................................................................. ii Resolutions of Adoption ................................................................................................................. iii Chapter 1- Introduction ................................................................................................................... 1 Chapter 2- Background Studies........................................................................................................ 4 Chapter 3- Vision, Goals, and Objectives ....................................................................................... 14 Chapter 4- Future Land Use -
MHMP 2014 UPDATE PART 3 III Humanrelated
III. HUMAN-RELATED HAZARDS The following list summarizes the significant human-related hazards covered in this section: 1. Catastrophic Incidents (National Emergencies) 2. Civil Disturbances 3. Nuclear Attack 4. Public Health Emergencies 5. Terrorism and Similar Criminal Activities These hazards all tie in with each other in various ways, and by placing them all in the same section of this document, this updated 2014 edition of the Michigan Hazard Mitigation Plan intends to make it easier for planners and emergency management personnel to learn about and consider the many aspects of these threats, risks, activities, conditions, and incidents. The new hazard section, Catastrophic Incidents (National Emergencies), was primarily inspired by some of the states of alert and response activities that Michigan had to adopt in the past decade for incidents that primarily took place outside of its own borders. The main examples were the 9/11/2001 terrorist attacks (and subsequent anthrax incidents and threats), and the Gulf Coast disaster involving Hurricanes Katrina and Rita in 2005. It makes sense to consider, in advance, these types of incidents as well as other types of large-scale disasters that could occur in the future, which require a large-scale national response even though the actual incident itself may occur only within the borders of a few states outside of Michigan’s immediate environment. Preparedness, planning, exercising, and mutual aid arrangements are the main “mitigation” activities proposed for this hazard during its initial phase of consideration in this 2014 edition of the Michigan Hazard Mitigation Plan. Some catastrophic incidents may involve other types of human-related hazards. -
Terrorismterrorism
U.S. FOREIGN POLICY AGENDA VOLUME 6 AN ELECTRONIC JOURNAL OF THE U.S. DEPARTMENT OF STATE NUMBER 3 TERRORISMTERRORISM Threat Assessment, Countermeasures and Policy November 2001 TERRORISM: THREAT ASSESSMENT, COUNTERMEASURES AND POLICY On September the 11th, enemies of freedom committed an act of war against our country. Americans have known wars — but for the past 136 years, they have been wars on foreign soil, except for one Sunday in 1941. Americans have known the casualties of war — but not at the center of a great city on a peaceful morning. Americans have known surprise attacks — but never before on thousands of civilians. All of this was brought upon us in a single day — and night fell on a different world, a world where freedom itself is under attack... This is not, however, just America’s fight. And what is at stake is not just America’s freedom. This is the world’s fight. This is civilization’s fight. This is the fight of all who believe in progress and pluralism, tolerance and freedom. We ask every nation to join us. We will ask, and we will need, the help of police forces, intelligence services, and banking systems around the world. The United States is grateful that many nations and many international organizations have already responded — with sympathy and with support. Nations from Latin America, to Asia, to Africa, to Europe, to the Islamic world. Perhaps the NATO Charter reflects best the attitude of the world: An attack on one is an attack on all. The civilized world is rallying to America’s side. -
A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi. -
Environmental Justice in Detroit: a Comparison with the Civil Rights Movement
Environmental Justice in Detroit: A Comparison with the Civil Rights Movement Mary Hennessey University of Michigan Program in the Environment Class of 2008 ii ii Table of Contents Table of Figures.................................................................................................... iv ABBREVIATIONS............................................................................................... v ACKNOWLEDGEMENTS ................................................................................ vi CHAPTER 1.......................................................................................................... 1 Introduction........................................................................................................... 1 Introduction............................................................................................................. 2 CHAPTER 2.......................................................................................................... 4 The Civil Rights Movement ................................................................................. 4 The Civil Rights Movement: History ..................................................................... 5 Civil Rights Timeline............................................................................................ 9 CHAPTER 3........................................................................................................ 11 Detroit Civil Rights Movement.......................................................................... 11 The History -
Palestinian Women: Mothers, Martyrs and Agents of Political Change
University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2011 Palestinian Women: Mothers, Martyrs and Agents of Political Change Rebecca Ann Otis University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Gender and Sexuality Commons, Near and Middle Eastern Studies Commons, and the Politics and Social Change Commons Recommended Citation Otis, Rebecca Ann, "Palestinian Women: Mothers, Martyrs and Agents of Political Change" (2011). Electronic Theses and Dissertations. 491. https://digitalcommons.du.edu/etd/491 This Dissertation is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. Palestinian Women: Mothers, Martyrs and Agents of Political Change __________ A Dissertation Presented to the Faculty of the Josef Korbel School of International Studies University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy __________ by Rebecca A. Otis June 2011 Advisor: Dr. Martin Rhodes ©Copyright by Rebecca A. Otis 2011 All Rights Reserved Author: Rebecca A. Otis Title: PALESTINIAN WOMEN: MOTHERS, MARTYRS AND AGENTS OF POLITICAL CHANGE Advisor: Dr. Martin Rhodes Degree Date: June 2011 ABSTRACT This dissertation seeks to understand the role of women as political actors in the rise of Islamo-nationalist movement in Palestine. Using a historical and ethnographic approach, it examines the changing opportunity structures available to Palestinian women in the nationalist struggle between 1987 and 2007. -
Changing Narratives in the Michigan Historical Marker Program
Tracing the History of State History: Changing Narratives in the Michigan Historical Marker Program _______________________________________ A Thesis presented to the Faculty of the Graduate School at the University of Missouri-Columbia _______________________________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts _____________________________________________________ by MATTHEW TAYLOR ERBES Dr. Douglas Hurt, Thesis Adviser MAY 2016 The undersigned, appointed by the dean of the Graduate School, have examined the thesis entitled TRACING THE HISTORY OF STATE HISTORY: CHANGING NARRATIVES IN THE MICHIGAN HISTORICAL MARKER PROGRAM presented by Matthew Erbes, candidate for the degree of Master of Arts, and hereby certify that, in their opinion, it is worthy of acceptance. Dr. Douglas Hurt Dr. Mark Palmer Dr. Anna Ball DEDICATION I am happy to dedicate this work to my family, especially my beautiful fiancé Nikki. I could not have done it without her help and support, and I look forward to the next chapter in our lives together. We made it! My parents, both Annette and Mark Erbes and Jim and Kathy Keating, gave me important support during my time at Mizzou, including even finding some historical markers for me in the deepest, darkest corners of rural northern Michigan. I am very thankful for their help and emotional encouragement throughout my graduate career. I also want to thank my fellow graduate students in the Geography department. The advice, venting, laughter, and intellectual conversations (serious or otherwise) that took place in Room 2 were greatly needed at many times throughout the past two years, and my colleagues were always there to provide it. -
Information Assurance Situation in Switzerland and Internationally
Federal Strategy Unit for IT FSUIT Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Information Assurance Situation in Switzerland and Internationally Semi-annual report 2009/II (July – December) MELANI – Semi-annual report 2009/II Information Assurance – Situation in Switzerland and Internationally Contents 1 Focus Areas of Issue 2009/II .........................................................................................3 2 Introduction.....................................................................................................................4 3 Current National ICT Infrastructure Situation ..............................................................5 33.1.1 FDFA targeted by malware.................................................................................5 33.2.2 Website defacements after adoption of minaret ban initiative ............................5 33.3.3 DDoS attacks against Swisscom and Swisscom clients ....................................6 33.4.4 Fraud with fake domain registrations..................................................................7 33.5.5 Purported free offers against viruses, scareware, rogueware and ransomware 8 33.6.6 New top level domains (TLD) and high security zones in the Internet .............10 33.7.7 Revision of provisions implementing the Telecommunications Act ..................10 33.8.8 Skype wiretap published as source code .........................................................11 4 Current International ICT