Thursday, October 25, 2007

Not All Catastrophes Are Created Equal


In the U.S., there have been two defining events of the 21st century: 9/11 and Hurricane Katrina, both of which have exposed breathtaking incompetence on the part of the government, as well as the disturbing vulnerability of the world's sole superpower.

It didn't take long for comparisons to emerge between Hurricane Katrina and the fire storm in southern California. Mostly it had to do with the scale of social displacement in California - over 500,000 people were forced to evacuate their homes and communities. As numerous commentators have commented, this was the largest evacuation in California's history, and the largest in the country since Hurricane Katrina. Point taken. However, there are a number of important differences.

Insurance estimates for the fire damage to date hover around $2 billion. This would be about 1/20th of the insurance cost of Hurricane Katrina.

Fire and water are different. Amongst natural disasters, flooding is far and away the largest cause of death and property damage. Water tends to overstay its visit, turning stagnant, redistributing sewage and toxins, and generally creating an unholy nuisance. Drowning, disease, and property damage are the legacy of floods. Fire, by contrast, is dangerous and destructive, but relatively quick. All creatures know to get out of the way of fire - immediately. Water is deceptive. It's usually not apparent that there is a problem until there is a problem and then it's a little late.

Southern California is not the Gulf Coast. There is a wealth of difference, as well as a difference of wealth. For SoCal natives, the burning of coastal communities like Malibu and San Diego is familiar because it happens repeatedly and because these are not generally poor areas. Far from it. Everyone deserves sympathy for unexpected loss (even rich people), but we all know, or at least suspect, that many of these people have better than average material reserves to recover from such a loss (excluding life of course), as well as good auto and home insurance. Add to that the unparalleled efficiency of the response of first responders and emergency personnel. The President was quick to praise the handling of the fire storm and to attribute credit to lessons from Hurricane Katrina. However, the competency of the California response had less to do with federal improvement than with ample (and repeated) experience by state and local officials (see "A Firestorm, A Deluge, and A Sharp Political Dig," NYT 10/25/2007).

An oft repeated complaint in California and elsewhere is that people should not be allowed to build in areas that are repeatedly exposed to natural hazards like fire or flood. I heard this again on NPR as callers called in to comment. In particular, I recall a caller calling from the North Shore of Massachusetts who passionately derided rampant development speculation and overbuilding in California for the root cause of the problem, which in turn, he argued, simply imposed economic burdens on the rest of society. Unlike other forms of insurance, however, fire insurance is actually well calibrated with risk because it is one of the oldest forms of insurance and fire is a known quantity, especially in California (see "Fires' Cost to Insurers Is in Range of $1 Billion" NYT 10/25/2007). The certainty of fire insurance is in stark contrast to flood insurance. People in California with fire insurance (as well as private insurers) actually shoulder more of their fair share of the economic risk than, say, coastal residents of Massachusetts who are exposed to the risk of flooding. On Cape Cod, 44% of residents have to be covered by a government-run program because no private insurer with a sense of economic sanity would insure them (see "Hurricane Fears Cost Homeowners Coverage" NYT 10/16/2007). When the next major flood event happens in Massachusetts (and it will), it is likely that the government will be picking up most of the tab. On that score, if anyone should move, it should be coastal residents in Massachusetts and other areas along the eastern seaboard.

The irony of the Southern California fire storm of 2007, however, is that it will likely be followed by flash floods and mudslides when the rains come (see InciWeb for further explanation). Let's hope their flood insurance is adequate.

Wednesday, October 10, 2007

This Blur's For You

Since 9/11, security has become the watchword of the nation, though the initial hysteria has begun to abate somewhat. However, one of the ongoing casualties of the crusade for hyper-security has been access to once-public information. Maps and mappable information have been primary targets. The blurred image comes from Google Maps, and is an apparent attempt to hide the Salem Power Plant, a coal-fired power plant in Salem, Massachusetts. This is not unusual. In fact, one Wikipedia entry has managed to create a lengthy list of sites throughout the world that appear to have been censored by Google Maps - blurred or conspicuously missing imagery (see "Satellite map images with missing or unclear data"). Google has been largely silent about this practice in the U.S., though some governments (e.g., India) have been very public about asking Google to blur images of sensitive sites. At least one local politician in New York is also calling on Google to blur aerial imagery of sensitive military and government sites. There is also evidence that Google may be altering aerial imagery of sensitive commercial sites, such as areas where genetically modified crops are grown (see "What Google Won't Map," Gridskipper).

It's difficult if not impossible to know what kinds of geographic data have been censored or even deemed censor-worthy, either by government or other institutions. In July 2006, the federal Department of Homeland Security (DHS) released its National Infrastructure Protection Plan (NIPP),which provides the framework for how all levels of government and the private sector will manage the protection of the nation's critical infrastructure and key resources. An important part of this framework is the designation of what actually constitutes "critical infrastructure." In fact, it wasn't long before DHS came under withering criticism by its own Office of Inspector General, as well as Congress, for the NIPP's overly expansive definition of "critical infrastructure." As Senator Barbara Boxer of California put it, "I would love to provide protection for every activity in America, but the reality is that we need to set priorities" (see "DHS Officials Quarrel Over Internal Report," RCR Wireless News 07/24/2006).

The lack of a coherent national policy has not stopped government agencies from implementing their own ad hoc procedures. A recent report by NPR featured the struggle between a computer consultant and the state of Connecticut over access to GIS maps of water and sewer systems in the towns of Greenwich and Stamford (see "Security Officials Seek to Block Some Online Maps" NPR 10/8/ 2007). Connecticut's Freedom of Information Commission ruled that such data were too sensitive, and that the towns could only release maps without sewer and water systems, fire hydrants and man holes. Here in the Commonwealth of Massachusetts, the state's GIS dissemination agency MassGIS has implemented minimal security protocol around certain GIS data sets. Users wanting to download GIS data of large hazardous waste generators must first fill out a request, which includes detailed contact information, before being sent a link to enable download of the data.

MassGIS's approach is not too different from policies set in place by the Federal Energy Regulatory Commission (FERC) regarding Critical Energy Infrastructure Information (CEII), which FERC defines as "existing and proposed systems and assets, whether physical or virtual, the incapacity or destruction of which would negatively affect security, economic security, public health or safety, or any combination of those matters." That's about as specific as they get (see "FERC Tries to Strike a Fine Balance," Electric Utility Week 11/13/2006). Moreover, FERC allows utilities - whether private or publicly owned - to define for themselves what should be classified as CEII when those entities submit required documentation and information. This loose discretion, and the overzealous application of the CEII designation, actually worked against FERC and the energy industry in at least one case. California officials recently nixed a $700 million liquefied natural gas terminal proposed by Sound Energy Solutions (SES) because neither FERC nor SES were forthcoming with all of the information needed to complete the final Environmental Impact Report (see "Long Beach LNG terminal dead in water after officials end environmental review," Gas Market Report 01/26/2007).

It's worth remembering that there is social value, including safety and security, in public access to information about critical infrastructure and even hazardous or dangerous facilities. Some of the most important laws and traditions around public access in the U.S. were founded specifically on concerns about safety and security. In December 1984, a pesticide plant in Bhopal, India blew up, releasing a deadly cloud of methyl isocyanate gas that killed over 20,000 people in the surrounding community, and permanently maimed up to 100,000 others. It was (and still is) the worst industrial disaster in history. A host of factors were involved in the making of this catastrophe, but one of them was the complete ignorance of anyone outside of the plant about what was going on inside the plant (including local officials). A sister facility in Institute, West Virginia experienced a comparatively minor incident at about the same time (sending 134 people to the hospital), but the horror of Bhopal had already set the world on edge. In the U.S., the federal government and the public were still reeling from the drama at Love Canal and the discovery of previously uncounted and hidden sources of hazardous chemicals throughout the country. As a result, Congress passed the Emergency Planning and Community Right to Know Act (EPCRA) in 1986, which established requirements for emergency planning and reporting on hazardous and toxic chemicals. This legislation required facilities storing or handling potentially hazardous materials to report this information to State Emergency Response Commissions, Local Emergency Planning Committees, and local fire departments. In addition, it created a toxic release inventory (TRI) system that enabled the the tracking and monitoring of chemicals and facilities throughout the country. The TRI and other EPCRA provisions have been some of the most important tools for researchers as well as public health and safety officials. An enormous volume of environmental health and safety research and planning has relied on regular access to mappable TRI data. More importantly, this legislation recognized and institutionalized the right of communities and the public to have access to information about activities with health and safety implications.

On the 20th anniversary of the Bhopal tragedy in 2004, two EPA officials reflected on the evolution of incident prevention and response at chemical facilities over the last two decades. They argued that Bhopal and 9/11 were the transformative events, both of which highlighted the issue of safety and security, but with diametrically opposed results (see "The Post-Bhopal and Post-9/11 Transformations in Chemical Emergency Prevention and Response Policy in the United States"). It is an odd twist of circumstances that public disclosure, once touted as the mechanism to promote safety and security, could so quickly be relabeled as a threat to security.