2020 Michigan Hazard Analysis (MHA)

Total Page:16

File Type:pdf, Size:1020Kb

2020 Michigan Hazard Analysis (MHA) EMHSD Publication 103 (2020 Supplement) November 2020 Emergency Management and Homeland Security Division Michigan Department of State Police Michigan Hazard Analysis Supplement to the 2019 Michigan Hazard Analysis Page 1 of 155 TABLE OF CONTENTS Introduction to the 2020 Supplement ................................................................................................................................. 3 I. NATURAL HAZARDS Natural Hazards: Weather Hazards ........................................................................................... Please see 2019 edition Natural Hazards: Hydrologic Hazards ...................................................................................... Please see 2019 edition Natural Hazards: Ecological Hazards ....................................................................................... Please see 2019 edition Natural Hazards: Geologic Hazards ......................................................................................... Please see 2019 edition II. TECHNOLOGICAL HAZARDS Technological Hazards: Industrial Hazards ................................................................................................................... 5 Hazardous Materials: Fixed Site Incidents ......................................................................................................................... 6 Nuclear Power Plant Emergencies ................................................................................................................................... 15 Hazardous Materials: Transportation Incidents ................................................................................................................ 21 Pipeline and Wellhead Incidents: Petroleum and Natural Gas ........................................................................................ 33 Structure Fires (residential, urban conflagration, scrap tires) .......................................................................................... 49 Technological Hazards: Infrastructure Hazards.......................................................................................................... 59 Built Infrastructure Failures (water, storm sewers, bridges, communications) ................................................................. 60 Major Transportation Incidents (air, highway, rail, marine) .............................................................................................. 72 Energy Failures and Shortages (electric, natural gas, petroleum) ................................................................................... 89 III.-HUMAN-RELATED HAZARDS ................................................................................................................................ 101 Terrorism and Similar Criminal Incidents ....................................................................................................................... 102 Cyberattacks and Major Network Disruptions ................................................................................................................ 115 Nuclear Attack (military, terrorist) ................................................................................................................................... 123 Public Health Emergencies (contagions, food and water contamination) ...................................................................... 129 Civil Disturbances ........................................................................................................................................................... 141 Afterword to the 2020 Supplement ................................................................................................................................. 155 Appendix A, Emergency Management Program Analysis .............................................................................................. 156 (excluded from publicly available versions of document for security reasons) Page 2 INTRODUCTION (2020 supplement) Emergency incidents can result from hazards as varied as epidemics, chemical spills, power outages, tornadoes, and forest fires. Michigan is vulnerable to a wide range of such hazards, categorized in this publication as natural hazards, technological hazards, and human-related hazards. Examples include the ongoing COVID-19 pandemic and Flint water crisis, the 2010 Enbridge oil spill, the Great Blackout of 2003, the 1987 crash of Northwest Airlines Flight 225, and the 1927 Bath school bombing. While not always leading to catastrophic disasters, hazards frequently cause incidents that result in the loss of life, property damage, environmental harm, and economic hardship. The Michigan Hazard Analysis (MHA) is the State’s hazard identification document. The MHA 2019 edition included updated chapters for the state’s natural hazards. This 2020 supplement to the 2019 MHA now does the same for both technological hazards and human-related hazards. Taken together, these chapters give local planners, emergency managers, and the general public a more complete view of the many risks and threats that are present in their communities. Such updates are necessary, as shifts in population, changes in climate, and technological advancement bring with them new, unintended consequences. Cybersecurity and nuclear terrorism did not need to be contemplated just a hundred years ago, but they are far from the last of the new hazards impacting our future. Many of today’s risks are also more interconnected. A computer hacker across the world may launch an attack against a utility on Thanksgiving Day, resulting in blackouts for several hospitals and gas stations in the midst of a pandemic and holiday travel. Without proper planning and mitigation efforts, such incidents can quickly cascade and spiral out of control into full-blown disasters. While a holistic overview of all state hazards is needed, local planners should also consider how events in other parts of the country may impact them here at home. When New Orleans was struck by hurricanes in 2005, Michigan used its resources to provide assistance and house evacuees. The terrorist events of September 11 led to subsequent anthrax attacks that affected the entire country. A major earthquake in California could still have significant impacts on Michigan’s economy. Today’s globalization means that even international events can affect our energy needs, supply of goods, and the wellbeing of our state’s residents. Managing these varied threats represents a great challenge for our communities. To meet it, emergency managers must first obtain a thorough understanding of the array of hazards they confront, especially at the local level. Through the process of conducting a detailed hazard analysis, communities can become aware of the nature, magnitude, and destructive potential of hazards that might impact their region. By pinpointing the locations where these hazards have occurred in the past, and by analyzing emerging risks, it is possible to estimate the relative probability of both recurring and new events. Coupled with local land use and demographic information, a hazard analysis becomes a powerful planning tool for setting resource allocation priorities, hazard mitigation goals, and overall emergency preparedness. The Michigan State Police, Emergency Management and Homeland Security Division (MSP/EMHSD) is the coordinating agency for all emergency management and homeland security activities in the state. In conjunction with other governmental agencies and private organizations, the EMHSD plays an active role in prevention, mitigation, protection, response, and recovery efforts due to local, state, and national emergencies. The EMHSD regularly updates the MHA and other relevant documents. These include the Michigan Emergency Management Plan (MEMP), which outlines federal, state, and local emergency management preparedness and response responsibilities within the state, and the Michigan Hazard Mitigation Plan (MHMP), which further analyzes risks and vulnerabilities in order to find ways to reduce them. These are coordinated with the MHA and may serve as a basis for the development of other state plans. Local emergency managers can also refer to the Local Emergency Planning Workbook (EMHSD PUB-201) and Local Hazard Mitigation Planning Workbook (EMHSD PUB-207) to help develop a comprehensive hazard analysis for their own unique communities. Page 3 CHAPTER ORGANIZATION: The chapters in this publication may be presented in slightly various formats due to the variability of different hazards. Each will still contain similar elements and be generally organized in the following manner: Hazard Definition An introductory definition of the hazard and its covered scope, as well as comments regarding hazard overlap and similar risks that are outlined in different chapters. Hazard Analysis A discussion on the topic and relevant statistics designed to give the reader a greater understanding of the vulnerabilities and risks associated with the hazard. Significant analysis may also be present in other parts of the chapter. Specific Impacts (Consequence Analysis) A summary of specific considerations and impacts regarding hazard risks as they pertain to: Impact on the Public, Property, Facilities, and Infrastructure Impact on the Economic Condition of the State Impact on Responders, Continuity of Operations, and Continued Delivery of Services Impact on the Environment Impact on Public Confidence in State Governance Hazard Mitigation Opportunities ➢ A non-comprehensive
Recommended publications
  • Module III – Fire Analysis Fire Fundamentals: Definitions
    Module III – Fire Analysis Fire Fundamentals: Definitions Joint EPRI/NRC-RES Fire PRA Workshop August 21-25, 2017 A Collaboration of the Electric Power Research Institute (EPRI) & U.S. NRC Office of Nuclear Regulatory Research (RES) What is a Fire? .Fire: – destructive burning as manifested by any or all of the following: light, flame, heat, smoke (ASTM E176) – the rapid oxidation of a material in the chemical process of combustion, releasing heat, light, and various reaction products. (National Wildfire Coordinating Group) – the phenomenon of combustion manifested in light, flame, and heat (Merriam-Webster) – Combustion is an exothermic, self-sustaining reaction involving a solid, liquid, and/or gas-phase fuel (NFPA FP Handbook) 2 What is a Fire? . Fire Triangle – hasn’t change much… . Fire requires presence of: – Material that can burn (fuel) – Oxygen (generally from air) – Energy (initial ignition source and sustaining thermal feedback) . Ignition source can be a spark, short in an electrical device, welder’s torch, cutting slag, hot pipe, hot manifold, cigarette, … 3 Materials that May Burn .Materials that can burn are generally categorized by: – Ease of ignition (ignition temperature or flash point) . Flammable materials are relatively easy to ignite, lower flash point (e.g., gasoline) . Combustible materials burn but are more difficult to ignite, higher flash point, more energy needed(e.g., wood, diesel fuel) . Non-Combustible materials will not burn under normal conditions (e.g., granite, silica…) – State of the fuel . Solid (wood, electrical cable insulation) . Liquid (diesel fuel) . Gaseous (hydrogen) 4 Combustion Process .Combustion process involves . – An ignition source comes into contact and heats up the material – Material vaporizes and mixes up with the oxygen in the air and ignites – Exothermic reaction generates additional energy that heats the material, that vaporizes more, that reacts with the air, etc.
    [Show full text]
  • MARITIME OFF-RAMP He 2,356’ Long "Maritime Off- Ramp” Is One of Seven Bridge Tcontracts in California’S I-880 Replacement Project
    Prize Bridge Award:Grade Seperation MARITIME OFF-RAMP he 2,356’ long "Maritime Off- Ramp” is one of seven bridge Tcontracts in California’s I-880 Replacement Project. The Maritime Off-Ramp replaced a concrete struc- ture on Cypress Street (now named the Nelson Mandela Parkway) in Oakland. The “Maritime Off-Ramp,” also known as the Horseshoe Line or “HS” Line because of its 250’ radius horseshoe shape, is an orthotropic steel bridge. The remainder of the bridges in the project are steel plate girder bridges with concrete decks or post-tensioned cast-in-place con- crete. The “HS” Line becomes California’s sixth orthotropic bridge.Loma Prieta Earthquake On October 17, 1989, the Loma Prieta earthquake (magnitude 7.1) occurred near Oakland and San Francisco, California. The I-880 Cypress Street Viaduct, a two-level reinforced concrete structure com- pleted in 1957 carried I-880 freeway traffic through downtown Oakland. The upper roadway collapsed result- ing in 41 deaths and 108 injuries. A portion of the roadway between 7th and 34th streets was removed due to the damage. I-880 is a critical interstate free- way connecting San Jose and the East Bay Area to San Francisco, Sacramento and the Sierra Nevada. The I-880 Freeway Viaduct was a section of I-880 that carried between 140,000 and 160,000 vehicles per day and provided for eight lanes of mixed-flow traffic. THE I-880 REPLACEMENT PROJECT The I-880 Replacement Project was designed and then built in seven separate construction contracts to avoid impacting traffic in this impor- tant transportation corridor.
    [Show full text]
  • Safety Data Sheet
    Coghlan’s Magnesium Fire Starter #7870 SAFETY DATA SHEET This Safety Data Sheet complies with the Canadian Hazardous Product Regulations, the United States Occupational Safety and Health Administration (OSHA) Hazard Communication Standard, 29 CFR 1910 (OSHA HCS), and the European Union Directives. 1. Product and Supplier Identification 1.1 Product: Magnesium Fire Starter 1.2 Other Means of Identification: Coghlan’s #7870 1.3 Product Use: Fire starter 1.4 Restrictions on Use: None known 1.5 Producer: Coghlan’s Ltd., 121 Irene Street, Winnipeg, Manitoba Canada, R3T 4C7 Telephone: +1(204) 284-9550 Facsimile: +1(204) 475-4127 Email: [email protected] Supplier: As above 1.6 Emergencies: +1(877) 264-4526 2. Hazards Identification 2.1 Classification of product or mixture This product is an untested preparation. GHS classification for this preparation is based upon its use as a fire starter by making shavings and small particulate from the metal block. As shipped in mass form, this preparation is not considered to be a hazardous product and is not classifiable under the requirements of GHS. GHS Classification: Flammable Solids, Category 1 2.2 GHS Label Elements, including precautionary statements Pictogram: Signal Word: Danger Page 1 of 11 October 18, 2016 Coghlan’s Magnesium Fire Starter #7870 GHS Hazard Statements: H228: Flammable Solid GHS Precautionary Statements: Prevention: P210: Keep away from heat, hot surfaces, sparks, open flames and other ignition sources. No smoking. P280: Wear protective gloves, eye and face protection Response: P370+P378: In case of fire use water as first choice. Sand, earth, dry chemical, foam or CO2 may be used to extinguish.
    [Show full text]
  • The Art of Reading Smoke for Rapid Decision Making
    The Art of Reading Smoke for Rapid Decision Making Dave Dodson teaches the art of reading smoke. This is an important skill since fighting fires in the year 2006 and beyond will be unlike the fires we fought in the 1900’s. Composites, lightweight construction, engineered structures, and unusual fuels will cause hostile fires to burn hotter, faster, and less predictable. Concept #1: “Smoke” is FUEL! Firefighters use the term “smoke” when addressing the solids, aerosols, and gases being produced by the hostile fire. Soot, dust, and fibers make up the solids. Aerosols are suspended liquids such as water, trace acids, and hydrocarbons (oil). Gases are numerous in smoke – mass quantities of Carbon Monoxide lead the list. Concept #2: The Fuels have changed: The contents and structural elements being burned are of LOWER MASS than previous decades. These materials are also more synthetic than ever. Concept #3: The Fuels have triggers There are “Triggers” for Hostile Fire Events. Flash point triggers a smoke explosion. Fire Point triggers rapid fire spread, ignition temperature triggers auto ignition, Backdraft, and Flashover. Hostile fire events (know the warning signs): Flashover: The classic American Version of a Flashover is the simultaneous ignition of fuels within a compartment due to reflective radiant heat – the “box” is heat saturated and can’t absorb any more. The British use the term Flashover to describe any ignition of the smoke cloud within a structure. Signs: Turbulent smoke, rollover, and auto-ignition outside the box. Backdraft: A “true” backdraft occurs when oxygen is introduced into an O2 deficient environment that is charged with gases (pressurized) at or above their ignition temperature.
    [Show full text]
  • Clinton County Comprehensive Plan
    Clinton County Comprehensive Plan 2016 UPDATE 2016 Clinton County Comprehensive Plan Update ACKNOWLEDGEMENTS Clinton County Staff Ryan Wood, County Administrator Alan Hoard, Building/Zoning Administrator Peter Preston, Community Planner Wendy Ward, Community Development Secretary Board of Commissioners Robert Showers, Chairperson David Pohl, Vice Chairperson Anne Hill Bruce DeLong Kenneth Mitchell Adam Stacey Kam Washburn Planning Commission Shannon Schlegel, Chairperson Mark Simon, Vice Chairperson Patti Jandernoa, Secretary Adam Stacey, Board of Commissioners Representative Roni Christmas Robert Kudwa Patti Jo Schafer i 2016 Clinton County Comprehensive Plan Update TABLE OF CONTENTS Acknowledgements ........................................................................................................................... i Table of Contents ............................................................................................................................. ii Resolutions of Adoption ................................................................................................................. iii Chapter 1- Introduction ................................................................................................................... 1 Chapter 2- Background Studies........................................................................................................ 4 Chapter 3- Vision, Goals, and Objectives ....................................................................................... 14 Chapter 4- Future Land Use
    [Show full text]
  • MHMP 2014 UPDATE PART 3 III Humanrelated
    III. HUMAN-RELATED HAZARDS The following list summarizes the significant human-related hazards covered in this section: 1. Catastrophic Incidents (National Emergencies) 2. Civil Disturbances 3. Nuclear Attack 4. Public Health Emergencies 5. Terrorism and Similar Criminal Activities These hazards all tie in with each other in various ways, and by placing them all in the same section of this document, this updated 2014 edition of the Michigan Hazard Mitigation Plan intends to make it easier for planners and emergency management personnel to learn about and consider the many aspects of these threats, risks, activities, conditions, and incidents. The new hazard section, Catastrophic Incidents (National Emergencies), was primarily inspired by some of the states of alert and response activities that Michigan had to adopt in the past decade for incidents that primarily took place outside of its own borders. The main examples were the 9/11/2001 terrorist attacks (and subsequent anthrax incidents and threats), and the Gulf Coast disaster involving Hurricanes Katrina and Rita in 2005. It makes sense to consider, in advance, these types of incidents as well as other types of large-scale disasters that could occur in the future, which require a large-scale national response even though the actual incident itself may occur only within the borders of a few states outside of Michigan’s immediate environment. Preparedness, planning, exercising, and mutual aid arrangements are the main “mitigation” activities proposed for this hazard during its initial phase of consideration in this 2014 edition of the Michigan Hazard Mitigation Plan. Some catastrophic incidents may involve other types of human-related hazards.
    [Show full text]
  • Terrorismterrorism
    U.S. FOREIGN POLICY AGENDA VOLUME 6 AN ELECTRONIC JOURNAL OF THE U.S. DEPARTMENT OF STATE NUMBER 3 TERRORISMTERRORISM Threat Assessment, Countermeasures and Policy November 2001 TERRORISM: THREAT ASSESSMENT, COUNTERMEASURES AND POLICY On September the 11th, enemies of freedom committed an act of war against our country. Americans have known wars — but for the past 136 years, they have been wars on foreign soil, except for one Sunday in 1941. Americans have known the casualties of war — but not at the center of a great city on a peaceful morning. Americans have known surprise attacks — but never before on thousands of civilians. All of this was brought upon us in a single day — and night fell on a different world, a world where freedom itself is under attack... This is not, however, just America’s fight. And what is at stake is not just America’s freedom. This is the world’s fight. This is civilization’s fight. This is the fight of all who believe in progress and pluralism, tolerance and freedom. We ask every nation to join us. We will ask, and we will need, the help of police forces, intelligence services, and banking systems around the world. The United States is grateful that many nations and many international organizations have already responded — with sympathy and with support. Nations from Latin America, to Asia, to Africa, to Europe, to the Islamic world. Perhaps the NATO Charter reflects best the attitude of the world: An attack on one is an attack on all. The civilized world is rallying to America’s side.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Environmental Justice in Detroit: a Comparison with the Civil Rights Movement
    Environmental Justice in Detroit: A Comparison with the Civil Rights Movement Mary Hennessey University of Michigan Program in the Environment Class of 2008 ii ii Table of Contents Table of Figures.................................................................................................... iv ABBREVIATIONS............................................................................................... v ACKNOWLEDGEMENTS ................................................................................ vi CHAPTER 1.......................................................................................................... 1 Introduction........................................................................................................... 1 Introduction............................................................................................................. 2 CHAPTER 2.......................................................................................................... 4 The Civil Rights Movement ................................................................................. 4 The Civil Rights Movement: History ..................................................................... 5 Civil Rights Timeline............................................................................................ 9 CHAPTER 3........................................................................................................ 11 Detroit Civil Rights Movement.......................................................................... 11 The History
    [Show full text]
  • Palestinian Women: Mothers, Martyrs and Agents of Political Change
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 1-1-2011 Palestinian Women: Mothers, Martyrs and Agents of Political Change Rebecca Ann Otis University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Gender and Sexuality Commons, Near and Middle Eastern Studies Commons, and the Politics and Social Change Commons Recommended Citation Otis, Rebecca Ann, "Palestinian Women: Mothers, Martyrs and Agents of Political Change" (2011). Electronic Theses and Dissertations. 491. https://digitalcommons.du.edu/etd/491 This Dissertation is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. Palestinian Women: Mothers, Martyrs and Agents of Political Change __________ A Dissertation Presented to the Faculty of the Josef Korbel School of International Studies University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy __________ by Rebecca A. Otis June 2011 Advisor: Dr. Martin Rhodes ©Copyright by Rebecca A. Otis 2011 All Rights Reserved Author: Rebecca A. Otis Title: PALESTINIAN WOMEN: MOTHERS, MARTYRS AND AGENTS OF POLITICAL CHANGE Advisor: Dr. Martin Rhodes Degree Date: June 2011 ABSTRACT This dissertation seeks to understand the role of women as political actors in the rise of Islamo-nationalist movement in Palestine. Using a historical and ethnographic approach, it examines the changing opportunity structures available to Palestinian women in the nationalist struggle between 1987 and 2007.
    [Show full text]
  • Changing Narratives in the Michigan Historical Marker Program
    Tracing the History of State History: Changing Narratives in the Michigan Historical Marker Program _______________________________________ A Thesis presented to the Faculty of the Graduate School at the University of Missouri-Columbia _______________________________________________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts _____________________________________________________ by MATTHEW TAYLOR ERBES Dr. Douglas Hurt, Thesis Adviser MAY 2016 The undersigned, appointed by the dean of the Graduate School, have examined the thesis entitled TRACING THE HISTORY OF STATE HISTORY: CHANGING NARRATIVES IN THE MICHIGAN HISTORICAL MARKER PROGRAM presented by Matthew Erbes, candidate for the degree of Master of Arts, and hereby certify that, in their opinion, it is worthy of acceptance. Dr. Douglas Hurt Dr. Mark Palmer Dr. Anna Ball DEDICATION I am happy to dedicate this work to my family, especially my beautiful fiancé Nikki. I could not have done it without her help and support, and I look forward to the next chapter in our lives together. We made it! My parents, both Annette and Mark Erbes and Jim and Kathy Keating, gave me important support during my time at Mizzou, including even finding some historical markers for me in the deepest, darkest corners of rural northern Michigan. I am very thankful for their help and emotional encouragement throughout my graduate career. I also want to thank my fellow graduate students in the Geography department. The advice, venting, laughter, and intellectual conversations (serious or otherwise) that took place in Room 2 were greatly needed at many times throughout the past two years, and my colleagues were always there to provide it.
    [Show full text]
  • Information Assurance Situation in Switzerland and Internationally
    Federal Strategy Unit for IT FSUIT Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Information Assurance Situation in Switzerland and Internationally Semi-annual report 2009/II (July – December) MELANI – Semi-annual report 2009/II Information Assurance – Situation in Switzerland and Internationally Contents 1 Focus Areas of Issue 2009/II .........................................................................................3 2 Introduction.....................................................................................................................4 3 Current National ICT Infrastructure Situation ..............................................................5 33.1.1 FDFA targeted by malware.................................................................................5 33.2.2 Website defacements after adoption of minaret ban initiative ............................5 33.3.3 DDoS attacks against Swisscom and Swisscom clients ....................................6 33.4.4 Fraud with fake domain registrations..................................................................7 33.5.5 Purported free offers against viruses, scareware, rogueware and ransomware 8 33.6.6 New top level domains (TLD) and high security zones in the Internet .............10 33.7.7 Revision of provisions implementing the Telecommunications Act ..................10 33.8.8 Skype wiretap published as source code .........................................................11 4 Current International ICT
    [Show full text]