UTC/DelDOT Infrastructure Security and Emergency Preparedness By Sue McNeil, Rachel Davidson, Earl Lee, Joseph Trainor, Tricia Wachtendorf, Laura Black, Sarah Dalton, Charles Mitchell, and Gabriela Wasileski A report submitted to the University of Delaware University Transportation Center (UD-UTC) August 7, 2009 DISCLAIMER: The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. This document is disseminated under the sponsorship of the Department of Transportation University Transportation Centers Program, in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof. UDUTC Final Report Page 1 Table of Contents 1. Introduction .............................................................................................................. 3 2. Evacuation Literature Review ................................................................................... 5 3. Social Science Literature ......................................................................................... 16 4. Background on Hurricane Evacuation & Nuclear Evacuation in Delaware ............ 20 5. Considering Emergent Groups in Emergency Management .................................. 27 6. Geographic Information Systems in Emergency Management .............................. 30 7. Identifying Vulnerable Populations in Delaware .................................................... 33 8. Vulnerability of Bridge Infrastructure ..................................................................... 36 9. Rail and Ferry Security ............................................................................................ 42 10. Conclusions ............................................................................................................. 47 11. Acknowledgments................................................................................................... 48 12. References .............................................................................................................. 49 UDUTC Final Report Page 2 1. Introduction a. Problem Statement Transportation Infrastructure security and emergency preparedness presents an enormous challenge for both the State of Delaware and for the major transportation corridors that run through the state. DelDOT and its extensive network of partner organizations have a strong coalition in place to plan, train, and run exercises related to regional evacuation issues. Most notably the state’s Transportation Management Team is charged with jointly making decisions on how an incident or an event that impacts the transportation system will be handled. Given the complexity of this task and the many intersecting areas of interest, it is vital that relevant engineering and social sciences be brought to bear on the planning processes already underway. The Disaster Research Center at University of Delaware has an extensive body of applied social science research experience that will be of great use for planners and emergency management personnel who deal with mitigation, preparedness, response, and recovery from natural disasters and terrorist events. For over forty years DRC has worked on related projects and in just the last five years has produced many state of the art scientific insights related to transportation and evacuation issues including projects that address: community based emergency planning and management, supply chain management, characteristics of warning systems, household evacuation decision-making, multi-organization networks, and a host of other issues. b. Objective The objective of this project is to review the current state of practice for Delaware, review external research and apply insights from state of the art social science and engineering, and develop a plan for integrating research insights into practice. c. Background The Department of Homeland Security considers the protection of our national infrastructure systems to be one of its main missions as set forth in Homeland Security Presidential Directive 7 (HSPD-7), Critical Infrastructural Identification, Prioritization, and Protection. The primary goal of the National Infrastructural Protection Plan (DHS 2006: 3)—which defines the specific federal responsibilities and strategies for implementing HSPD-7—is to build a safer, more resilient America by enhancing the nation’s civil infrastructural systems from terrorist attacks and natural or technological disasters through strengthening preparedness, improving response capabilities, and developing rapid recovery strategies. Of special relevance to this proposal is the joint responsibility of the Department of Transportation and DHS to collaborate on all matters pertaining to transportation security and transportation infrastructural protection1. This research also begins to address needs identified by DelDOT and FHWA including the need to 1) assess the vulnerability and risk of Delaware’s critical infrastructure (including bridges and tunnels); 2) develop possible countermeasures to detect and deter terrorist threats to such assets; 3) estimate the capital and operating costs of such countermeasures, and 4) improve security operational planning for better protection against terrorism. While not addressing these issues directly, this research provides background and context including the common area between infrastructure security and emergency preparedness for natural hazards. 1 DHS 2006.National Infrastructure Protection Plan. Washington, DC:DHS. UDUTC Final Report Page 3 This project recognizes the diversity of organizational structures that are involved – FHWA, DelDOT, DEMA, county and local government, volunteer organizations, social service organizations and emergency responders. Furthermore, emergency plans must recognize the needs and issues of freight and passenger transportation, the many modes involved, and the variety of events that can disrupt the transportation systems. d. Purpose and Outline of this Report This report is intended to document the relevant literature, understand the needs in Delaware and explore gaps. The following section summarizes the relevant evacuation literature, and the next section reviews the social science literature. The fourth section reviews existing evacuation plans for Delaware focusing on hurricane evacuation and nuclear incident evacuation. The next section explores the literature on emergent groups and the role of GIS in understanding risk and vulnerability. The next section reviews information on bridge vulnerability and then rail and ferry security. A concluding section summarizes observations and conclusions. UDUTC Final Report Page 4 2. Evacuation Literature Review To better understand the relevant literature, we organized the bibliography around the following topics: I. Variables predicting evacuation due to natural hazards. Need for coordinated interdisciplinary approach that incorporates qualitative and quantitative methods. Hurricane hazard modeling for evacuation planning. Mathematical modeling. Variables predicting evacuation during natural hazard A) The effect of family structure on household response to natural hazard warning. The residents’ decision to evacuate differs depending on structural characteristics of the household. Studies showed that the complete nuclear family appears to respond to evacuation based on its own perception and interpretation of warning information. On the other hand, single person and families without children rely on their prior perception of risk and their social contacts. Van Willigen et al. (2002) found that households with physically disabled members were less likely to evacuate than others. Reasons for not evacuating were directly attributable to a lack of or perceived lack of access to services and assistance. Households with a disabled member were more likely to have experienced damages to their homes in both seasons and to see their homes condemned after Floyd. Damage costs represented a greater proportion of the incomes of households with a disabled member. These data underscore the need for attention by emergency management personnel to three issues: communication and coordination of services, evacuation planning and assistance, and the provision of accessible shelter. Carter, M. T., Kendall, S. and Clark, J. P. (1983). “Household response to warnings.” Int. J. Mass Emergencies and Disasters, 1(1), 95–104. Gladwin, H. and Peacock, W. G. (1997). “Warning and evacuation: A night for hard houses.” In Hurricane Andrew: Gender, ethnicity and the sociology of disasters, eds., B. H. Morrow and H. Gladwin, Routledge, New York, 52–74. Baker, E.J. (1979). “Predicting response to hurricane warnings: A reanalysis of data from four studies.” Mass Emergencies, 4(1), 9–24. Van Willigen, M., Edwards, T., Edwards, B. and Hessee, S. (2002). “Riding out the storm: Experiences of the physically disabled during Hurricanes Bonnie, Dennis, and Floyd.” Natural Hazards Review, 3(3), 98-106. . UDUTC Final Report Page 5 B) Shelters and evacuation: As an option to evacuation, people take protective shelter to prevent harm during natural disasters. Most people evacuate to relatives, friends, or hotels. Using shelters as an alternative appears to be higher when the evacuating population is of low income and older and lower when the population is more affluent and young (Mileti et al. 1992). Among transient populations the homeless and migrants are much more likely to use public shelters during an evacuation than more affluent transients such as business travelers or vacationers (Drabek, 1996). Whitehead et al. (2000) examine the social, economic, and risk factors that affect the decisions to evacuate and whether to go to a shelter or motel/hotel relative to other destinations. When making the evacuation decision households are more likely to go someplace safer during a hurricane when given evacuation orders. Objective and subjective risk factors also play an important role when making evacuation decisions. Social and economic factors are the primary determinants of the destination decision. Drabek, T. (1996). Disaster evacuation behavior—Tourists and other transients. Institute of Behavioral Science, University of Colorado, Boulder, Colorado. Quarantelli, E. (1982). “General and particular observations on sheltering and housing after American disasters.” Disasters, 6, 277-281. Morrow, B. (1997). “Stretching the bonds: The families of hurricane Andrew.” In Hurricane Andrew: Ethnicity, gender, and the sociology of disasters, eds., W. Peacock, B. Morrow, and H. Gladwin. Routledge, New York, 141-170. Tierney, K.J., Lindell, M.K. and Perry, R.W. (2001). Facing the unexpected: Disaster preparedness and response in the United States. Joseph Henry Press, Washington, D.C. Mileti, D.S., Sorensen J.H. and O’Brien, P.W. (1992). “Toward an explanation of mass care shelter use in evacuations.” Int. J. Mass Emergencies and Disasters, 10(1), 25-42. Whitehead, J.C., Edwards, B., Van Willigen, M., Maiolo, J.R., Wilson, K. and Smith, K.T. (2000). “Heading for higher ground: Factors affecting real and hypothetical hurricane evacuation behavior.” Environmental Hazards, 2(4), 133–142. Lindell, R. and Perry, R. (1992). Behavioral foundations of community emergency management. Hemisphere Publishing Corp., Washington, DC. Ruch, C., Miller, H., Haflich, M., Farber, N., Berke, P. and Stubbs, N. (1991). “The Feasibility of Vertical Evacuation.” Monograph #52, Institute of Behavioral Science, University of Colorado, Boulder, CO. C) Socioeconomic status and low income families vulnerability to disasters: Studies show that pre-existing socio-economic conditions play a significant role in the ability for particular economic classes to respond immediately to the disaster and to cope with the disaster’s consequences. UDUTC Final Report Page 6 Drabek, T. and Boggs, K. (1968). “Families in disaster: Reactions and relatives.” J. Marriage Fam., 30(3), 443–451. Drabek, T. and Key, W. (1984). Conquering disaster: Family recovery and long-term consequences. Irvington, New York. Bolin, R. (1986). “The 1986 California floods.” Quick Response Research Rep. No. 02, Univ. of Colorado, Institute for Behavioral Research, Boulder, Colorado. Schaffer, R. and Cook, E. (1972). Human response to hurricane Celia. Environmental Quality Program, Texas A&M Univ., College Station, Tex. Sorensen, J.H., Vogt, B.M. and Mileti, D.S. (1987). “Evacuation: An assessment of planning and research.” ORNL-6376, Oak Ridge National Laboratory, Oak Ridge, Tenn. D) Factors that affect evacuation decisions after people hear hurricane forecasts involve warning and risk perception. Communication of forecast information and more accurate geographically focused prediction of evacuation rates would give emergency managers a better idea of where evacuation orders would be followed. Dash, N. and Gladwin, H. (2007). “Evacuation decision making and behavioral responses: individual and household.” Natural Hazards Rev., 8(3), 69-77. Tierney, K.J., Lindell, M.K. and Perry, R.W. (2001). Facing the unexpected: Disaster preparedness and response in the United States. Joseph Henry Press, Washington, D.C. Sorensen, J.H. and Vogt-Sorenson, B. (2006). “Community processes; warning and evacuation.” In Handbook of disaster research, eds., H. Rodriguez, E.L. Quarantelli, and R.R. Dynes, Springer, New York, 183–199. E) The presence of pets and previous experience with disaster: Most disaster relief shelters do not allow people to bring in pets or other animals. FEMA, however, recommends people evacuate with pets. Growing number of studies address issues whether people evacuate without their pets or other animals such as livestock or risk their lives by deciding to stay with their animals. Hutton, J. (1976). “The differential distribution of death in disaster: A test of theoretical propositions.” Mass Emergences, 1(4), 261–266. Baker, E.J. (1979). “Predicting response to hurricane warnings: A reanalysis of data from four studies.” Mass Emergencies, 4(1), 9–24. F) Geographical location (proximity to evacuation routes): UDUTC Final Report Page 7 Simpson, R.H. and Riehl, H. (1981). The hurricane and its impact, LSU Press, Baton Rouge, La. G) Evacuation of subpopulation such as tourists: Drabek, T. (1995). “Disaster responses within the tourist industry.” Int. J. Mass Emergencies and Disasters, 13(1), 7-23. Drabek, T. (1996). Disaster evacuation behavior—Tourists and other transients. Institute of Behavioral Science, University of Colorado, Boulder, Colorado. H) Age as a predictor for evacuation: Research on people decision why not to evacuate claim that elderly population is less likely to evacuate as a result of lack of access to resources, limited social network and risk perception of a disaster. Mileti, D. S., Drabek, T. E. and Haas, E. (1975). “Human systems in extreme environments: A sociological perspective.” Program on Technology, Environment and Man, Monograph No. 21, Institute of Behavioral Science, Univ. of Colorado, Boulder, Colorado. Gruntfest, E., Downing, T. and White, G. F. (1978). “Big Thompson Flood.” Working Paper No. 32, Institute of Behavioral Science, Univ. of Colorado, Boulder, Colorado. Perry, R.W. (1979). “Evacuation decision making in natural disasters.” Mass Emergencies, 4(1), 25–38. I) Need for developing community-based evacuation planning. Urgent evacuations can result in significant traffic congestion and a sharp increase in mean vehicle travel times, particularly if there are a lot of people at home during the evacuation and household vehicle use is relatively high. Study of Cova and Johnson (2003) presents a method for using microscopic traffic simulation to develop and test neighborhood evacuation plans in the urban wild-land interface. GIS was used to map the spatial effects of a proposed second access road on household evacuation times. Results indicate that the second road will reduce some household travel times much more than others, but all evacuation travel times will become more consistent. Dow and Cutter (2002) survey of coastal South Carolina residents addressed the role of household decisions in amplifying demand on transportation infrastructure during 1999’s Hurricane Floyd evacuation. Three major findings reveal that traffic problems are becoming a major consideration in whether people evacuate. How they evacuate is emerging as an issue for evacuation traffic planning. First, about 25% of households took two or more cars. Nearly 50% of evacuees left in one 6-h period. Second, while the majority of respondents carried road maps, only 51% of that group used them to determine their route. Many decided to stay on the Interstate despite the congestion. Finally, the majority of South Carolinian residents traveled distances greater than necessary for safe sheltering and more than in past hurricanes. Transportation issues will become more important in coastal evacuations as traffic problems impinge on peoples’ ability to get out of harm’s way and ultimately influence their decisions to evacuate. UDUTC Final Report Page 8 Cova, T.J. and Johnson, J.P. (2003). “A network flow model for lane-based evacuation routing.” Transportation Research, 37A(7), 579-604. Dow, K. and Cutter, S. L. (2002). “Emerging hurricane evacuation issues: Hurricane Floyd and south Carolina.” Natural Hazards Review, 3(1), 12–18. J) Race and Perception of natural hazard risk. Some researchers argue that membership in a minority group t isolates a person from information as a result of cultural or language barriers, and decreases the probability of responding to a disaster warnings. In addition, racial and ethnic communities in the U.S. face housing problems in disasters such as living in unsafe buildings. Therefore, these studies suggest for necessity of multilingual dissemination of warning information. Need for involvement of all members of community to be involved in the disasterreduction process and cooperation with neighborhood associations, churches and other community groups. Need for addressing the issue of housing. Other studies demonstrate that ethnicity has no significant effect on evacuation. Fothergill, A. (1996). “Gender, risk and disaster.” Int. J. Mass Emergencies and Disasters, 14(1), 33–56. Perry, R.W. and Greene, M.R. (1982). “The role of ethnicity in the emergency decision making process.” Sociological Inquiry, 52(4), 306–334. Drabek, T. and Boggs, K. (1968). “Families in disaster: Reactions and relatives.” J. Marriage Fam., 30(3), 443–451. K) Gender and evacuation: Studies of evacuation during natural disaster have often noted that women are more likely than men to evacuate. For example, Bateman and Edwards (2002) study indicates that women are more likely to evacuate than men because of socially constructed gender differences in caregiving roles, access to evacuation incentives, exposure to risk, and perceived risk. The authors found that women are most likely to evacuate because, compared to men, they live at greater exposure to risk and have a heightened perception of risk. Bolin, R., Jackson, M. and Crist, A. (1996). “Gender inequality, vulnerability, and disasters: Theoretical and empirical considerations.” In The gendered terrain of disasters, eds., E. Enarson and B. H. Morrow, Praeger, Westport, Conn. Fothergill, A. (1996). “Gender, risk and disaster.” Int. J. Mass Emergencies and Disasters, 14(1), 33–56. Bateman, J.M. and Edwards, B. (2002). “Gender and evacuation: A closer look at why women are more likely to evacuate for hurricanes.” Natural Hazards Review, 3(3), 107–117. L) Technical modeling of evacuation performance UDUTC Final Report Page 9 The Nuclear Regulatory Commission (NRC) requires that all electric utilities develop and update evacuation plans for the areas surrounding their nuclear power plants. The evacuation of people around these plants has certain peculiar transportation-related characteristics, such as the location of the incident is fixed, the evacuation area is predetermined by NRC, and all the inhabitants must be evacuated from the affected area. Hobeika et al. have developed a mass evacuation computer program (MASSVAC 3.0) that models the evacuation process and utilizes the traffic assignment of all-ornothing and Dial’s algorithm to simulate the traffic movements during evacuation. An evacuation management decision support system (EMDSS) is being used in experiments to assess different information about (1) hurricane behavior (e.g., track, FMS, intensity, size, and stability), (2) community characteristics (e.g., population size and distribution, ERS link capacity and geometry), (3) information displays (e.g., historical and forecast data on FMS and intensity, evacuation costs, survival probabilities), and (4) decision team characteristics (e.g., number and characteristics of team members) in order to identify the variables determining effective evacuation decision making. In addition, it will be used in training and actual hurricane operations. The computation of evacuation time estimates (ETEs) for communities threatened by hurricanes requires analysts to develop sophisticated models of evacuation flows and significant progress has been made in this area over the past 25 years. However, ETEs also require accurate assumptions about the behavior of the risk area population. Article of Lindell and Prater (2007b) lists the principal behavioral variables affecting hurricane ETEs such as size and distribution of the resident population, number of persons per household, size and distribution of the transit dependent resident population, number of evacuating vehicles per household, number of evacuating trailers per household, evacuation ultimate destination, destination/ route choices. Lindell (2008) describes a simple, rapid method for calculating evacuation time estimates (ETEs) that is compatible with research findings about evacuees’ behavior in hurricanes. The author study provides an example using EMDSS to calculate ETEs for San Patricio County Texas and discusses directions for further improvements of the model. Hobeika, A.G., Kim, S. and Beckwith, R.E. (1994). “A decision support system for developing evacuation plans around nuclear power stations.” Interfaces, 24(5), 22-35. Lindell, M.K. and Prater C.S. (2007a). “A hurricane evacuation management decision support system (EMDSS).” Natural Hazards, 40(3), 627-634. Lindell, M.K. and Prater, C.S. (2007b). “Critical behavioral assumptions in evacuation time estimate analysis for private vehicles: Examples from hurricane research and planning”, J. Urban Planning and Development, 133(1), 18-29. Lindell, M. K. (2008). “EMBLEM2: An empirically based large scale evacuation time estimate model.” Transportation Research Part A, 42 (1), 140–154. II. Need for a coordinated interdisciplinary approach that incorporates qualitative and quantitative methods UDUTC Final Report Page 10 Gladwin, H., Lazo, J., Morrow, B., Peacock, W. and Willoughby, H. (2007). “Social science research needs for the hurricane forecast and warning system.” Natural Hazards Review, 8(3), 8795. III. Hurricane hazard modeling for evacuation planning Modeling of hurricane storm surge effects is usually executed using a combination of models. In most models, wind fields are prescribed as a surface boundary condition. However, in order to capture the full extend of flooding, variety of other components need to be include into modeling such as astronomical tides, wave setup, wave run-up, and wind driven surge (Graber et al., 2006). Graber, H.C., Cardone, V.J., Jensen, R.E., Slinn, D.N., Hagen, S.C., Cox, A.T., Powell, M.D. and Grassl, C. (2006). “Coastal forecasts and storm surge predictions for tropical cyclones: A timely partnership program.” Oceanography, 19(1), 130-141. A) Storm surge and inundation maps: Jarvinen, B.R. and Lawrence, M.B. (1985). “An evaluation of the SLOSH storm surge model.” Bull. American Meteorological Society, 66, 1408–1411. Jelesnianski, C. P., Chen, J. and Shaffer, W.A. (1992). “SLOSH: Sea, lake, and overland surges from hurricanes.” NOAA Tech. Report NWS-48, p.71. National Oceanographic and Atmospheric Administration (NOAA) (1999). NOAA state-of-thecoast website. [Online] Available http://state-ofcoast.noaa.gov/bulletins/html/rtt_06/intro.html, November. B) Surge hazard modeling including physical models of the hurricane wind, coupled storm surge and wave fields: Luettich, R.A., Jr., Westerink, J.J. and Scheffner, N.W. (1992). “ADCIRC: an advanced threedimensional circulation model for shelves coasts and estuaries, report 1: theory and methodology of ADCIRC-2DDI and ADCIRC-3DL.” Dredging Research Program Technical Report DRP-92-6, U.S. Army Engineers Waterways Experiment Station, Vicksburg, MS, p.137. UDUTC Final Report Page 11 Booij, N., Ris, R.C. and Holthuijsen, L.H. (1999). “A third-generation wave model for coastal regions, Part I, Model description and validation”, J. Geophysical Research, C4, 104, 76497666. Holland, G.J. (1980). “An analytic model of the wind and pressure profiles in hurricanes.” Monthly Weather Review, 108(8), 1212-1218. Vickery, P, Skerlj, P., Steckley, A. and Twisdale, L. (2000). “Hurricane wind field model for use in hurricane simulations.” J. Structural Engineering, 126(10), 1203-1221. C) Developing long-term hazard maps using variety of methods such as peaks over threshold, empirical stimulation technique, Joint Probability Method, empirical track method, sample return period event method, and maximum likelihood estimation method : Resio, D.T. (2006). “White paper on estimating hurricane inundation probabilities.” Version January 29, U.S. Army Corps of Engineers (USACE), Vicksburg, MS. Scheffner, N., Borgman, L. and Mark, D. (1996). “Empirical simulation technique based storm surge frequency analysis.” J. Waterway, Port, Coastal, and Ocean Engineering, 93-101. Scheffner, N.W., Clausner, J.E., Militello, A., Borgman, L.E. and Edge, B.L. (1999). “Use and application of the empirical simulation technique: User’s guide.” U.S. Army Corps of Engineers (USACE) Technical Report ERDC/CHL-99-10. Ho, F.P and Myers, V.A. (1975). “Joint probability method of tide frequency analysis applied to Apalachicola Bay and St. George Sound, Florida.” NOAA Tech. Rep. NWS-18, p.43. Vickery, P., Skerlj, P. and Twisdale, L. (2000). “Simulation of hurricane risk in the U.S. using empirical track model.” J. Structural Engineering, 126(10), 1222-1237. Watson, Jr., C. and Johnson, M. (2004). “Hurricane loss estimation models: Opportunities for improving the state of the art.” Bull. American Meteorological Society, 1713–1726. Federal Emergency Management Agency (FEMA) (2003). “HAZUS-MH multi-hazard loss estimation methodology: hurricane model. User manual.” FEMA, Washington, D.C. D) Summaries of available long-term hazard methods: Federal Emergency Management Agency (FEMA) (2005). “Storm meteorology: FEMA coastal flood hazard analysis and mapping guidelines.” Focused Study Report. Nelson, M. (2007). “Optimizing the selection of hazard-consistent probabilistic scenarios for long-term regional hurricane loss estimation'', M.S. Thesis, Cornell University, Ithaca, NY. E) A new variation of the Joint Probability Method and the JPM-Optimal Sampling: UDUTC Final Report Page 12 Niedoroda, A., Resio, D., Toro, G., Divoky, D., Das, H. and Reed, C. (2007). “Evaluation of the storm surge hazard in coastal Mississippi.” Proc. 10th International Workshop on Wave Hindcasting and Forecasting and Coastal Hazards. Toro, G., Niedoroda, A. and Reed, C. (2007). “Approaches for the efficient probabilistic calculation of surge hazard.” Proc. 10th Int. Workshop on Wave Hindcasting and Forecasting and Coastal Hazards. IV. Mathematical Modeling: A) Simulation models for evacuation Pidd, M., de Silva, F., and Eglese, R. (1996). “A simulation model for emergency evacuation.” European J. Operational Research, 90(3), 413-419. Bower, J.C., Millard, W.D. and Matsumoto, S.W. (1990). “Integrated Emergency Management System (IEMS) User’s Manual.” Pacific Northwest Laboratory, Richland, WA. de Silva, F.N. and Eglese, R.W. (2000). “Integrating simulation modeling and GIS: spatial decision support systems for evacuation planning.” J. Operational Research Society, 51(4), 423-430. Federal Emergency Management Agency (FEMA) (1984). “Application of the I-DYNEV system to compute estimates of evacuation travel times at nuclear power stations.” FEMA Report 8, Washington, DC. Han, A.F. (1990). “TEVACS: Decision support system for evacuation planning in Taiwan.” J.Transportation Engineering, 116(6), 821-830. Hobeika, A.G. and Jamei, B. (1985). “MASSVAC: a model for calculating evacuation times under natural disasters.” Proc. Conference on Computer Simulation in Emergency Planning, La Jolla, CA, 15(1), 23-28. Hobeika, A.G., Kim, S. and Beckwith, R.E. (1994). “A decision support system for developing evacuation plans around nuclear power stations.” Interfaces, 24(5), 22-35. Lim, E. and Wolshon, B. (2005). “Modeling and performance assessment of contraflow evacuation termination points.” Transportation Research Record-1922, 118-128. Pidd, M., de Silva, F., and Eglese, R. (1996). “A simulation model for emergency evacuation.” European J. Operational Research, 90(3), 413-419. Pidd, M., Eglese, R.W. and de Silva, F.N. (1997). “CEMPS: A prototype spatial decision support system to aid in planning emergency evacuations.” Transactions in GIS, 1(4), 321-334. Rathi, A.K. and Solanki, R.S. (1993). “Simulation of traffic flow during emergency evacuations: a microcomputer based modeling system.” Proc. 1993 Winter Simulation Conference, Los Angeles, CA, 1250-1258. Sheffi, Y., Mahmassani, H. and Powell, W.B. (1981). “Evacuation studies for nuclear power plant sites: a new challenge for transportation engineers.” ITE Journal, 51(6), 25-28. UDUTC Final Report Page 13 Stern, E. and Sinuany-Stern, Z. (1989). “A behavioral-based simulation model for urban evacuation.” Papers of the Regional Science Association, 66(1), 87-103. Sheffi, Y., Mahmassani, H. and Powell, W.B. (1982). “A transportation network evacuation model.”Transportation Research, 16A(3), 209-218. Sinuany-Stern, Z. and Stern, E. (1993). “Simulating the evacuation of a small city: the effects of traffic factors.” Socio-Economic Planning Sciences, 27(2), 97-108. Theodoulou, G. and Wolshon, B. (2004). “Alternative methods to increase the effectiveness of freeway contraflow evacuation.” Transportation Research Record-1865, 48-56. Williams, B.M., Tagliaferri, A., Meinhold, S., Hummer, J. and Rouphail, N. (2007). “Simulation and analysis of freeway lane reversal for costal hurricane evacuation.” J. Urban Planning and Development, 133(1), 61-72. B) Optimization models for evacuation: Tufekci, S. and Kisko, T.M. (1991). “Regional evacuation modeling system (REMS): a decision support system for emergency area evacuation.” Computers and Industrial Engineering, 21(1), 8993. Dunn, C.E. and Newton, D. (1992). “Optimal routes in GIS and emergency planning applications.” Area, 24(3), 259-267. Cova, T.J. and Johnson, J.P. (2003). “A network flow model for lane-based evacuation routing.” Transportation Research, 37A(7), 579-604. Meng, Q. and Khoo, H.L. (2007). “Model and algorithm for the optimal contraflow scheduling problem.” Transportation Research Board 86th Annual Meeting, Washington, DC. Tuydes, H. and Ziliaskopoulos, A. (2004). “Network re-design to optimize evacuation contraflow.” Presented at the 83rd Transportation Research Board Annual Meeting, Washington, D.C. Tuydes, H. and Ziliaskopoulos (2006). “Tabu-based heuristic for optimization of network evacuation contraflow.” Transportation Research Record-1964, 157-168. C) Shelter models: Sherali, H.D., Carter, T.B. and Hobeika, A.G. (1991). “A location-allocation model and algorithm for evacuation planning under hurricane/flood conditions.” Transportation Research, 25B(6), 439-452. UDUTC Final Report Page 14 Yamada, T. (1996). “A network flow approach to a city emergency evacuation planning.” Int. J. Systems Science, 27(10), 931-936. D) Modeling for industrial capacity expansion, energy system design, aircfraft scheduling, health care services: Paraskevopoulos, D., Karakitsos, E. and Rustem, B. (1991). “Robust capacity planning under uncertainty.” Management Science, 37(7), 787-800. Malcolm, S.A. and Zenios, S.A. (1994). “Robust optimization for power systems capacity expansion under uncertainty”, J. Operational Research Society, 45(9), 1040-1049. Mulvey, J., Vanderbei, R.J. and Zenios, S.A. (1995). “Robust optimization of large-scale systems”, Operations Research, 43(2), 254-281. Soteriou, A.C. and Chase, R.B. (2000). “A robust optimization approach for improving service quality”, Manufacturing & Service Operations Management, 2(3), 264-286. Xu, N., Davidson, R., Nozick, L. and Dodo, A. (2007). “The risk-return tradeoff in optimizing regional earthquake mitigation investment.” J. Structure and Infrastructure Engineering, 3(2), 133-146. Dodo, A., Davidson, R., Xu, N., and Nozick, L. (2007). “Application of regional earthquake mitigation investment.” Computers in Operations Research, 34(8), 2478-2494. UDUTC Final Report Page 15 3. Social Science Literature In examining social science literature, a few topics surfaced as being directly relevant to infrastructure security and emergency preparedness. These topics include the following: 1. 2. 3. 4. Receiving Warning Message: Does the warning reach the receiver in some way? Understanding Warning: Is the warning message understood by the receiver? Message Credibility: Does the receiver believe the message is credible? Community Characteristics: What are community characteristics that affect the above how the message is received, understood, and trusted? Sources elaborating on these issues are presented below. 1. Receiving Warning Message A prominent topic in social science literature regarding emergency management is in exploring factors that affect how emergency messages are received by the community. These factors include the presence of formal and informal social networks, established credibility, specifics about escape routes, communication modes, etcetera. Sutton, Palen & Shklovski, 2008. Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires Details dynamics of social networks in disaster response. Also background on historical views about social networks as a credible means to address emergency management topics. Addresses the view of social networks causing panic within a community and spreading incorrect information. M.K. Lindell, C. Prater & R.W. Perry (2007). ‘Introduction to Emergency Management’ Noteworthy discussions about building credibility through performance in public hearings or meetings with neighborhood associations or civic organizations. Sources also claims that panics are not very common and occur when there are limited escape routes, closing escape routes, and lack of clear communication. Laysia Palen & Sophia Liu (2006) “Citizen Communications as a Form of Public Participation in Disaster”. Kirschenbaum, A. (1992). Warning and Evacuation during a Mass Disaster: A Multivariate Decision Making Model. International Journal of Mass Emergencies and Disasters 10: 91-114 Rogers and Nehnevajsa (1987). Crisis Conditions. Pittsburgh, PA: Center for Social and Urban research, University of Pittsburgh. Perry and Greene (1982) The role of ethnicity in the emergency decision-making process. Sociological Inquiry, 52(4), pp. 306-334 Sorenson and Gercmehl (1980). Volcanic Hazard Warning System: Persistence and Transferability. Environmental Management 4, pp. 125-136 Turner, R.H., Nigg, J.M., Paz, D.H. & Young, B.S. (1979). Earthquake Threat: The Human Response in Southern California. Los Angeles, CA: Institute for Social Science research, University of California, Los Angeles. UDUTC Final Report Page 16 Perry, Lindell and Greene (1981) Threat perception and public response to volcano hazard Journal Soc. Psych, 116(2), 199-204 Pfister, N. (2002). Community Response to Flood Warnings: The Case of an Evacuation from Grafton, March 2001. Australian Journal of Emergency Management, 17, pp. 1929. Lindell and Perry (1987) Communicating Environmental Risk in Multiethnic Communities. Thousand Oaks, CA: Sage. Authors talk about the role of information communication technology including cellular phones, internet, etcetera in improving warning and response activities. Arguments were made about first respondents and the need to address informal peer-to-peer communication. Communication activity addressed included provision of response and rescue data, relief assistance, emotive and evaluative expression. 2. Understanding warning An additional topic in social science research is in how the recipient understands the warning message. Some characteristics which social science literature investigates includes the source of the warning, the language used, inclusion of assistance information, prior understanding, and the effects of multiple warning sources. M.K. Lindell, C. Prater & R.W. Perry (2007). ‘Introduction to Emergency Management’ Ketteridge and Fordham (1998) Flood Evacuation in two communities in Scotland: lessons from European Research. International Journal of Mass Emergencies and Disasters 16: 119-143 Perry and Lindell (1986). Twentieth-Century Volcanicity at Mt. St. Helens: The Routinization of Life Near an Active Volcano. Tempe. AZ.: School of Public Affairs, Arizona State University. Haas, Cochrene and Eddy (1977) Consequences of a cyclone on a small city. Ekistics 44:45-50 Blanchard-Boehm (1998) Understanding Public Response to Increased Risk from Natural hazard: Appluication of the Hazard Risk Communication Framework. International Journal of Mass Emergencies and Disasters 16: 247-278 Quarantelli , E.L. (1980). Some Research Emphases for Studies on Mass Communication Systems and Disasters. In 239-299 in Proceedings of the Committee on Disaster and the Mass media Workshop. Washington, D.C.: National Academy of Sciences. Tierney, K. (1987). Chemical Emergencies, Offsite Exposures and Organizational Response. Quick Response Report No 21, Natural Hazards Research and Applications Center, Institute of Behavioral Science, University of Colorado, Boulder, CO. Lachman, Tatsuoka and Bonk (1961). Human Behavior during the Tsunami of 1960. Science 133: 1405-1409 Mileti and Darlington (1995). Societal Response to Revised Earthquake Probabilities in the San Francisco Bay Area. International Journal of Mass Emergencies and Disasters 13: 119-145 Aguirre (1988) The lack of Warning before the Saragosa Tornado. International Journ al of Mass Emergencies and Disasters 6:65-74 Perry (1987). Disaster Preparedness and Response among Minority Citizens pp. 135-151 in Sociology of Disasters, Edited by Dynes, DeMarchi and Pelamda, Milan Italy: Frnaco Angeli Libri. UDUTC Final Report Page 17 Mitchem J.D. (2003). An Analysis of the September 20, 2002, Indianapolis Tornado: Public response to a Tornado Warning and Damage Assessment Difficulties. Natural Hazard Research and Application Information Center. University of Colorado. Turner, R.H., Nigg, J.M., Paz, D.H. & Young, B.S. (1979). Earthquake Threat: The Human Response in Southern California. Los Angeles, CA: Institute for Social Science research, University of California, Los Angeles. Berry (1999) Cyclone Rona: Evacuation of Caravonica and Lake Placid report. James Cook University, Centre for Disasters Studies, Australia. Fundamental ideas in emergency management say that people must receive the information, they must pay attention to the information, and they must comprehend the information. Source highlights that fear, not panic, affects people’s reaction and how they understand the warning. Aquirre et al. 1987, “An Evaluation of the Warning System” Access to various information channels is unevenly spread among citizens in a community and the combination of channels like brochures, radio, TV, newspaper, etcetera is very important. Additionally, viewer preference of information channel has an impact on warning message dissemination. Language barriers also need to be addressed when considering the supply of information channels available in a given community. 3. Message Credibility Even when an emergency message is received by an individual and fully understood by the individual, there is potential that the recipient may not respond to the message because the individual does not believe the message. The issue of establishing credibility was touched on during the stage of receiving the message but it become important once the message has been understood as well. Characteristics such as legitimacy of sender, the race and age characteristics of the receiver, and the efficacy of local warning system shape belief in warning information. Atwood (1998) Exploring the “Cry Wolf’ Hypothesis International Journal of Mass Emergencies and Disasters 16:279-302 Cola (1996) Responses of Pampanga Households to Lahar Warnings: Lessons from two villages in the Pasig-Potrero River Watershed pp. 141-149 in Fire and Mud: Eruption and Lahars of Mount Pinatubo, Philippines, edited by C.G. Newhall and R.S. Punongbayan. Seattle, WA. 4. Community Characteristics Broad community characteristics such as an aging population or strongly tied ethnic groups can have effects on strategies needed for emergency preparedness messages. Sources suggest that the propensity to comply with evacuation warnings is lower in elderly populations putting this already vulnerable population group in dangerous situations. In another example of a community characteristic affecting planning, ethnic groups have different tendencies when it comes to warning confirmation behavior. Whites tend to confirm via mass media, whereas African Americans are more likely to confirm through a social network (M.K. Lindell, C. Prater & R.W. Perry (2007). ‘Emergency Planning’). Studies have showed that hazard adjustment and hazard awareness are higher for: 1. People with higher educational and higher income (Farley et. al., 1993. “Earthquake hysteria before and after: A survey and follow-up on public response to the Browning forecast.” International Journal of Mass Emergencies and Disasters 11, pp. 305-322. UDUTC Final Report Page 18 2. Those of female gender (Mileti & O’Brien, 1992. “Warnings during disasters.” Social Problems 39, pp. 40-57.; Zhang, 1994. “Environmental hazards in the Chinese public eye.” Risk Analysis 14, pp. 163-167) 3. Those of white ethnicity (Edwards, 1993. “Social location and self-protective behavior.” International Journal of Mass Emergencies and Disasters 11, pp. 293-304) 4. Those with high levels of social network contacts (Turner, Nigg & Heller-Paz, 1986. “Waiting for disaster.” Los Angeles: University of California Press.; see also Aguirre et al, 1998, “A test of the Emergent Norm Theory of Collective Behavior”) 5. Those in close proximity to hazard zones (Farley, 1998. “Earthquake fears, predictions and preparations in mid-America.” Carbondale: Southern Illinois University Press) UDUTC Final Report Page 19 4. Background on Hurricane Evacuation & Nuclear Evacuation in Delaware During the summer of 2008, Charles Mitchell and Sarah Dalton reviewed existing published evacuation plans for Delaware. Their research focused on hurricane evacuation and nuclear evacuation. This section begins with a brief summary of the plans reviewed and then presents a summary of hurricane evacuation and nuclear incident evacuation in Delaware. The complete reports are available at: Dalton, Sarah, Hurricane Evacuation in Delaware, Report, Summer Research Experience, Science and Engineering Scholars, University Transportation Center and Disaster Research Center, University of Delaware, August 2008 http://www.ce.udel.edu/UTC/Dalton_Summer08.pdf Mitchell, Charles W.W III, Delaware Emergency Evacuation for the Salem/Hope Creek Nuclear Power Generators, Report, Summer Research Experience, University Transportation Center and Disaster Research Center, University of Delaware, August 2008 http://www.ce.udel.edu/UTC/Mitchell_Summer08.pdf a. Demographics and Geography Delaware ranks 49th in the nation with a total area of 1,982 square miles. New Castle County is 438 square miles. Kent County is 594 square miles. Sussex County is 950 square miles. Delaware is 96 miles long and varies from 9 to 35 miles in width. The maximum elevation is 448 ft. Population is 873,092 (2008 Estimate), 45th among the states. Density is 401 persons per square mile. Products are: Agriculture -- broilers, soybeans, corn, milk. Fishing Industry -- crabs, clams Manufacturing -- chemicals, food products, paper products, rubber and plastics products, primary metals, printed materials. Mining -- sand and gravel, magnesium compounds. b. Hazards Potential hazards are: I—Natural Hazards A Atmospheric Hazards 1 Tropical Cyclones 2 Thunderstorms and Lightning 3 Tornadoes 4 Windstorms 5 Hailstorms 6 Snow Avalanches UDUTC Final Report Page 20 7 Severe Winterstorms 8 Extreme Summer Weather B Geologic Hazards 9 Landslides 10 Land Subsidence 11 Expansive Soils C Hydrologic Hazards 12 Floods 13 Storm Surges 14 Coastal Erosion 15 Droughts D Seismic Hazards 16 Earthquakes 17 Tsunami Events E Other Natural Hazards 18 Volcanic Hazards 19 Wildfire Hazards II—Technological Hazards 20 Dam Failures 21 Fires 22 Hazardous Materials Events 23 Nuclear Accidents Over 95% of the state has an elevation less than 150 feet. Perhaps more importantly, the economic base is dependent on tourism. For example, Dewey Beach, has a population of 350 in the winter, and 30,000 on summer weekends, and 17% of all of Delaware’s non-hotel or motel housing could be impacted by some kind of tidal inundation from a category 4 hurricane c. Evacuation Plans for Delaware Delaware is vulnerable to many natural hazards. Sussex County, the southernmost county in Delaware, is at risk for seventeen of the twenty-one hazards defined by the federal government, the most threatening of these being floods and hurricanes. Elaborate evacuation plans exist, but with limited experience we do not know how effective or efficient these plans are. The plans also pay little attention to the “special” populations in Delaware. These include tourists in the beach communities, the growing elderly population in southern Delaware, the Amish community and the Hispanic community. Local knowledge, access to information, mobility and places to go vary and to provide effective warning and information for evacuation, it is important to understand these “special” populations. This project will explore the demographics of these populations through census and other data. Geographic Information Systems tools will be used to convey the distribution and location of these populations groups. UDUTC Final Report Page 21 For one specific population group, we will then explore and build on relevant literature and experience to help develop an appropriate communication/ warning strategy to address the needs of that population group. Key documents are: Edwards and Kelcey (2004). “Transportation Incident & Management Plan”. State of Delaware Depat ment of Transportation. August 2004. Edwards and Kelcey. (2006). “All Hazards Evacuation Annex: Transportation Incident and Event Management Plan, Sussex County, Delaware.” Edwards and Kelcey. (2007a). “All Hazards Evacuation Annex: Transportation Incident and Event Management Plan, Kent County, Delaware.” Edwards and Kelcey. (2007b). “All Hazards Evacuation Annex: Transportation Incident and Event Management Plan, New Castle County, Delaware.” Jacobs Edwards and Kelcey (2007). Salem and Hope Creek Nuclear Generating Stations Emergency Ev acuation Traffic Operations Manual [DEMA Plan]. October 2007. JB/A, Inc. (1994). “Evacuation Time Estimates for Delaware Within The Plume Exposure Pathway Eme rgency Planning Zone For the Artificial Island Nuclear Generating Station.” Delaware Emergency Man agement Agency and Public Service Electric & Gas Company. January 1994. KLD Associates (2004). “Salem/Hope Creek Nuclear Generating Stations Evacuation Time Estimates Within the Plume Exposure Pathway.” Delaware Emergency Management Agency and PSEG Nuclear, LLC. February, 2004. State of Delaware (2008). Radiological Emergency Plan. Issued January 2008. d. Delaware Emergency Evacuation for the Salem/Hope Creek Nuclear Power Plant In reviewing the research and current practices related to evacuation planning in Delaware, several recommendations have become apparent. Evacuation plans need to be a process rather than a list of actions. In the existing plans there is a very detailed inclusion of where to put cones and personnel, but it would be beneficial to turn this list of actions into a process. This process would include formulating warning messages so that the vast majority of the population understands the situation, personalizes it, and knows how to take protective measures, and would also include a process in order to facilitate the evacuation and limit entrance into the emergency planning zones. Evacuation planning should plan, as best as possible, to facilitate this process. Additionally there is a need for consistency in both primary Delaware plans. In many cases the plans are very consistent with the access control points which describe plans for reception centers and the locations of barriers. However there are several areas in which improvements could be made. One clear area that could use improvement is the bus plan. The Radiological Emergency Plan states that busses should be used to evacuate only those without any other means of transportation, however in the Traffic Management Plan it is not as clear. It may also be worthy to note that, as seen from other evacuations, bus drivers and other personnel who may be directly affected by the radiological emergency may be unable or refuse to show up for work. In spite of that the busses could be beneficial to evacuate special needs populations who do not have transportation but are able to ambulate on their own. There is still the other portion of the population who will not be able to move themselves to busses. The plan mentions the use of ambulances and wheelchair vans to evacuate this portion of the UDUTC Final Report Page 22 population. However, there are limited numbers of ambulances to begin with, for example Delaware City only has two, and all these resources cannot simply be redirected in an emergency. This aspect of the emergency plan, along with the use of busses with the assistance from the National Guard should have the feasibility reviewed and perhaps have a contingency plan put in place, such as mutual aid from neighboring states. Part of the review of the Delaware plans should be a look at the time estimates. KLD Associates did a very good job at extensively researching the population that would have to be evacuated in a radiological emergency. They have very good data on who, how many, and where people will be located. However, there are certain aspects they did not take into account. Research shows that weather can play an important factor in the amount of time required for evacuation. The current time estimates only allow an additional 30 minutes for snow and no additional time for rain or heavy wind. They make the statement that weather will not have an effect on an evacuation and the additional 30 minutes is for people to clear the snow from their driveways (KLD Associates, 2006: p36). In reality weather can reduce road capacities by as much as 30% for snow and 10-20% for rain during an evacuation. This aspect of the plan and evacuation should be reviewed. KLD associates have many scenarios and magnitudes of emergencies, however, the report becomes almost too cumbersome with so many different possibilities. A streamlining of a few representative scenarios (Good Weather,Bad Weather, Summer, Winter, etc.) would be useful to emergency management in creating a processfor evacuation. In the KLD Associates report (2004) they mention that traffic should be facilitated and entry into the emergency planning zones should be discouraged (KLD Associates, 2004: p61). However, in the early stages of evacuation, people will want to enter the evacuated areas to gather belongings and meet up with family members. It will be important for the police to aid in the control of entry into the emergency planning zones. This could remedied in part by viewing the evacuation as a process rather than a list of definitive steps. Additionally, accommodation for evacuation traffic from shadow evacuations needs to occur. The current plans do not take into account that more people will be evacuating than requested to. DelDot and State Police will need to be able to accommodate this additional and unplanned traffic. Also, it may be worthwhile to mention the possibility of adding a Radiological Emergency signage plan. There are several evacuation routes with signs through the state of Delaware, however, none of them are specific to a nuclear emergency. If an evacuation is ordered people may not always follow instructions given by emergency management so it is important to make the evacuation as clear as possible. If there was a different sign for a radiological emergency that people could be told to follow, perhaps a different shape and color, people might be more inclined to follow the signs. If they follow the current evacuation signs there could be significant confusion amongst the evacuees because these signs really are not intended for a radiological evacuation. At the present time the plan calls for the use of sounding of sirens to alert the public so they can then tune into 93.7 FM and listen for further instructions. There are signs along some routes that explain this notion. However, many of the fire departments in Delaware have fire sirens that go off to call volunteers. Unless residents know the different pitches or sounds of the sirens, many might simply ignore the siren for a radiological hazard because they thought it was for the fire departments. Additionally some research (Mileti and Peek, 2000) states that sirens may not be a reliable method to notify the public, especially if they are indoors or near noisy equipment. As a final note on warning information, there is also a growing Hispanic population in Delaware and multi-language warnings should be issued so people who have trouble understanding the English language can still receive the warning. The signs and brochures currently available on the State of UDUTC Final Report Page 23 Delaware’s website are only in English. There is no specific direction for broadcasting warning messages in English and Spanish during an evacuation. This issue should be addressed to prevent having a portion of the population not hearing the warning information. e. Hurricane Evacuation for Delaware By reviewing the sociological literature and other state’s plans, some clear strengths and weaknesses have developed in Delaware’s evacuation plans. The fact that Delaware is a small state in this instance can actually be a strength. In the event of a hurricane, all of Delaware’s Counties will be affected. This means it is a state problem and not just individual counties like in most other hurricane prone states. Plans are then developed for each county, but compiled by the same people. This leads to a standard through each county’s plans. There is no need to worry if a county left out a certain part of the plan, because they are all set up exactly the same. Delaware is actually very up to date dealing with Intelligent Transportation Systems. DelDOT owns and operates their own radio station to keep evacuees up to date on traffic conditions. This also feeds into the idea of how being a small state helps. This one radio station can broadcast over the whole state rather than just one city or county. DelDOT also has cameras set up at intersections and main stretches of roadway feeding constant and near-real time information back to DelDOT. There is also a great deal of coordination among the various agencies and organizations that are likely to respond to an evacuation. They all know their tasks, and for the most part, in a prioritized fashion. Lastly, Delaware has all of its plans, studies, and maps posted on the DelDOT website for all of the public to access. This is a useful tool that all Delawareans should know about and be able to access. This leads me to the weaknesses. The fact that Delaware is a small state can also be a weakness. A hurricane would affect the whole state, and leave no area where resources could be pulled to help the devastated area recover. Since Delaware is so small, the only person who can order an evacuation is the governor. In all the other states I found this information for, local governments could order the evacuation. They have a better idea of when something is not right than the governor and could start an evacuation faster. Delaware’s biggest potential weakness that I can tell is its lack of communication with the public. They have plans on the website, but does the public know they are there and easily understand them. Most other states I have read about have hurricane awareness weeks, hand out hurricane guides every year, or have public safety announcements on TV. Delaware only has pamphlets on coastal storm preparedness and a brochure on the Delaware Emergency Notification System posted on the DEMA website. The state emergency management web pages for Massachusetts, Connecticut, New Jersey, North Carolina, and Florida, all have links on Hurricane preparedness on the UDUTC Final Report Page 24 homepage. DEMA only had a link for natural hazards, and even there the only hurricane related information was the coastal storms brochure and tips for pets and livestock in a hurricane. The internet is a great tool, but not every Delaware resident or especially tourists, have a computer hooked up to the internet in their home. Delaware should not rely solely on the internet as their way to disseminate information. The assumptions used for the models that created the evacuation time estimates are also a little broad. Free flow was one assumption that would probably not occur during an evacuation, but was assumed when running the model. Large amounts of vehicles will be entering the evacuation network which will increase the density and decrease the flow rate. There will be large queues and congestion not vehicles going the speed limit. Also, the idea that there will be constant traffic demand all day is basically ruled out by research done by social scientists. A large number of people will leave in the morning and then the evacuation rate will diminish as the day progresses. It is also not written in the plans if evacuation delay is incorporated into the 24 hours it is said would take to evacuate the vulnerable area. People do not drop everything and get right into their car. They pick up family, protect their house, drive home from work, among various other tasks. This also adds to the evacuation time estimates. Also, DelDOT used a behavioral study conducted for the Army Corps of Engineers to determine an estimate of the number of evacuating vehicles on the roadways. This is good, but some bias was possibly developed. They conducted phone interviews with a little less than 700 residents throughout the Delmarva Peninsula in November and December. This might not be an adequate sampling of those who would inhabit the beach in the summer, which is hurricane season. Finally, I wonder if those evacuating from elsewhere on the peninsula- Maryland and Virginia or shadow evacuees where considered. These two factors will greatly increase the total number of evacuating motorists. I also question how much interaction Delaware has with other states if an evacuation was ordered. It seems like they made a plan to get the evacuees to state borders and then developed no other plans with bordering states. Nothing was written in the Hazards Annex stating cooperation with Pennsylvania or New Jersey. The only part of Maryland mentioned was Ocean City. One of the recent innovations dealing with evacuation, contraflow, was not written into Delaware’s plans at all. The benefits of this practice were seen with the model DelDOT developed, but no written plans have been found. Contraflow has its downfalls, but as a last case scenario to get people out quickly, it can be a great tool. There should at least be a plan, even if it is never put into practice. UDUTC Final Report Page 25 Another area in which Delaware’s plans are somewhat lacking is in the evacuation of special needs populations. It is said that it needs to be done, but there are no concrete plans as to how the evacuation will be executed, using which resources. Delaware can use Texas as an example. This state plans to use contracted school buses, public transit, and even railways to evacuate those without personal vehicles and those who can not evacuate themselves. They set up evacuation hubs where these people can meet. Delaware can also improve plans to make the evacuation as smooth as possible for motorists. Comfort stations could be available like seen in Texas and Virginia where predetermined exits provide a place for evacuees to get off the highway and rest. A plan to monitor fuel could also be useful so motorists are not stranded on the roadway, blocking traffic flow. Lastly, some sort of sheltering plan should be included in the hazards annex. Shelters are tied to evacuation. They are possible destinations and should be incorporated into both the plans and the evacuation routes. Plans for pet owners who wish to go to shelters should also be considered. Red Cross shelters do not accept those who come with pets, and therefore, cause some in danger to stay home in order to be with their pet. Delaware has a strong background in planning for an evacuation, but somewhat lacks in keeping up with current practices. It should take the lessons learned by other states that have more experience with the natural hazard, and put them into practice in its plans. UDUTC Final Report Page 26 5. Considering Emergent Groups in Emergency Management In the 1960’s and 1970’s considerable amounts of research was performed in the area of organizational theory in disasters and specifically the tasks and structures of these tasks that organizations, both formal and informal, were undertaking after a disaster. The “DRC typology” that came out of Ohio State University’s Disaster Research Center under Quarantelli and Dynes included four types of organizations during disasters. The now popular diagram included to follow is based on the illustration presented in Organizational Behavior in Disaster (Dynes) which includes the categorization of the emergent group. Over thirty years later, many specifics about this group remain unclear but its strong presence and impact following a disaster make it a group that should be paid special attention by emergency management practitioners. This document will provide a basic outline on what is known about this group and then highlight why considering this group and their behaviors are important in emergency management. It will also go into the broader aspect of including the community aspect into emergency management as the emergent group is a subset of this concept. This document will not go into great depth about the reasoning behind why the emergent group exists but will focus on the practical implications of this group. a. Defining the Group Emergent organizations are newly formed groups which were not formalized prior to the disaster. They are most often informal and loosely organized and the group is most frequently comprised of residents of the disaster area. They rarely have experience in disaster recovery but sometimes bring expertise from their personal or professional life into their recovery work (Tierney, Lindell and Perry). For example, medical professionals may aid in providing emergency services to injured neighbors or carpentry professionals may aid in removing large debris from surrounding areas all while being under no municipal or governmental organization’s direction. Emergent groups should not be confused with extending groups which are organized prior to the disaster but in another role. These groups, such as religious organizations or community leagues, retain their structure during disaster recovery but take on tasks in which they may have little experience. They may have performed no preparedness activities for the disaster but they are extending their resources to aid in recovery. In many instances they are also involved in preparedness work but this is not a requirement. Emergent organizations, on the other hand, performed no prior preparation for the disaster as a group but may have done so individually. UDUTC Final Report Page 27 b. Relevance & Importance of the Emergent Group Members of emergent groups are often the residents being impacted by the disaster. They are immediately on site and have extensive knowledge of the events that directly impacted them. They also will likely have more knowledge about the surrounding community and infrastructure than outside emergency professionals if the disaster is of a scale that requires outside support. They can be the first respondents in search and rescue and if they are not able to able to provide physical support in this, when emergency rescue professionals arrive, they can aid in locating victims as they have knowledge that the professionals do not about neighbors, friends, or family members. There have been many instances where all victims after a disaster have been recovered by relatives, neighbors, and others at the site when the disaster happened prior to the arrival of any professional emergency response teams (Aguirre, Wenger and Glass). Had these emergent response groups not formed, it can be inferred that the injuries and casualties could have been worse. Additional activities might include responding to rising flood waters or growing fires but also simpler things like directing traffic and providing direction to masses. Their involvement is not limited to response activities but they have the potential to play a strong role in recovery as well. Their motivation and enthusiasm is unmatched because it is often their own, their relative’s, or their friend’s home or neighborhood. Emergent groups sometimes form after disasters in disadvantaged populations when they do not receive the amount of support from organized relief as other socioeconomic groups do (Gillespie, Mileti and Perry). Most importantly, these groups are a large resource of general knowledge, labor, and compassion that are going to form and work towards their individual goals regardless of institutional intervention or embracement. However, with a bit of forethought the effectiveness, efficiency, and overall community benefit of these emergent groups can be improved. c. Integrating the Emergent Group The basic idea behind including emergent groups in emergency management procedures is in enabling these groups to do more by providing some amount of organization and integration into formalized emergency management plans. This can be done at numerous stages of the emergency management process and starts by improving community involvement and considering individual community needs in the planning and preparedness steps. There is a large amount of literature about how to involve the community in emergency planning and preparedness however there seems to be a common weakness. It is difficult for emergency management professionals to motivate communities to get involved in the process when there is no eminent emergency and when no community interest is shown, the procedures often fall back to standard bureaucratic forms. It seems that one aspect should be to establish transparency of the process and trust in UDUTC Final Report Page 28 the community so that when these emerging groups do form, there is existing knowledge on the citizen’s part about emergency management. Utilizing internet databases and information technology to enhance community-based disaster preparedness has shown to have some promise but like many resources offered by emergency management, it typically only accessed after the disaster is eminent or after it has occurred (Troy, Carson and Vanderbeek). Collaboration between the community and emergency management agencies can provide a wealth of information about local area details, culture, and challenges that may not have been apparent to anyone outside of a specific neighborhood (Schafer, Carroll and Haynes) (Kapucu, Collaborative emergency management: better community organizing, better public preparednes and response). Emphasis on community involvement and community awareness during the planning stages is becoming a more commonly considered aspect of planning and with enough effort, may increase the abilities of emergent groups. Once a disaster has occurred and emergent organizations have formed, the acknowledgement of their existence by emergency management agencies and government officials is important in sustaining their activity. Additionally, these institutions can provide direction to the groups and integrate their activities into the overall response and recovery plan. It is a difficult task because while their efforts may be very real, there is the question of if they can be relied upon or if they are just a transient and unreliable service. Regardless of which it is, recognizing their efforts, providing them needed resources, and helping with their organization into the larger plan will benefit the community and the response and recovery efforts. UDUTC Final Report Page 29 6. Geographic Information Management Systems in Emergency A large part of emergency management focuses on the acquisition, management, and distribution of large sets of data. These databases might include property information, distribution sites, vulnerable populations, critical infrastructure, or evacuation zones but regardless of their nature, having this data immediately available and in an easy to access and understandable form is a crucial part of a successful disaster response and recovery. One tool which has become increasingly popular among state and local planners is geographic information software. It has the power to succinctly organize large sets of data, analyze this data as the information is needed, and in some instances simultaneously broadcast and update this information with the addition of network wide databases or internet based applications. While this tool has the potential to be extremely powerful and helpful during a disaster, there must be a certain amount of forethought to obtain the data necessary for many applications. Included in this document will be a series of GIS applications which may be useful for state and municipal agencies to consider. They are loosely divided into five broad emergency management phases and a few specific studies are mentioned throughout. The table to the right is a summarization of a more detailed table from “The Role of Geographic Information Systems/Remote Sensing in Disasters Management” and provides a succinct idea of the topics to be discussed below (Thomas, Ertugay and Kemec). This document is meant as an overview to possibly spark further interest which will require deeper research into one of the specific activities. a. Planning Planning in emergency management includes accessing the need for mitigation, gauging possible risks, and analyzing potential impacts on people, infrastructure, the environment, etcetera. A data rich GIS application can aid in locating areas of vulnerability or potential problem. Geospatial layouts of critical infrastructure lines like water, sewer, and electric as well as distribution facilities for each of these items become useful as they are combined with databases including households, buildings, emergency response sites, sheltering locations, etcetera. This information can be mapped along with potential hazard information about hurricanes, flooding, high winds, UDUTC Final Report Page 30 hazardous material sites, landslides, earthquakes, and even highly vulnerable sites for terrorism. GIS is frequently used to analyze vulnerability of transportation systems in response to an emergency. Studies have been used to reveal specific regions of transportation systems which are more prone to failure during evacuations (Shulman) but more commonly, areas in a municipality with high densities of vulnerable populations which may require specific transportation needs (Cova and Church). Some researchers suggest that vulnerable populations such as elderly, single parent households, the poor, and even new residents to the area be highlighted with the use of GIS to receive more specialized care throughout the emergency management process. In locating these individuals and communities, they may even be able to be incorporated into the planning process and received individualized education so that in the event that a disaster does occur, they are less likely to need additional attention (Morrow). One challenge with this is in locating the needy individuals but recent ideas in voluntary registries have provided some solution (Wait, Cromley and Garb). Work has been done in combining the information obtained through disaster simulation modeling with GIS and creating a “spatial decision-support system” for preparing for evacuations (de Silva) but GIS itself can even be used to simulate potential disaster situations and examine the areas affected. GIS has also been used in preparedness exercises during the actual test and then afterwards in examining how to improve the system. Areas of weakness can be plotted and other scenarios for evacuation or response can be evaluated (ArcNews). b. Preparedness With an adequate database of information about a community and potential events, GIS can be used to quite effectively to estimate and appropriate resources. It can aid in determining where to place fire and emergency services based on level of accessibility, locations for police barricades for lane closures, estimating the number of evacuation vehicles needed, and also where to place them for most efficient use. In knowing the population information and the designated evacuation facility, the specific amount of food, water, bedding, etcetera needed at each facility can be calculated with just a few clicks. While GIS is very often just considered a static mapping tool, it can become a powerful analysis tool when there is constantly updating input information. Quickly changing a few numbers related to wind speeds, flood levels, or plume sizes can simultaneously update an entire database of evacuation routes, evacuation service needs, and sheltering information. c. Response Recognizing that GIS can be used as a dynamic database is important in its use in emergency response. When paired with vehicle locating technologies or global positioning, it can be useful in routing and ultimately improve efficiency during an emergency. A detailed database can provide information about potential threats and difficulties at the site before the response vehicle arrives. The database can include information about the size and use of the structure or region and in the case of some UDUTC Final Report Page 31 hazards, it can aid in determining the size and location of the evacuation. In cities where the populations fluctuates drastically depending on the hour, GIS databases can respond to this and provide an estimate on the appropriate number of emergency personnel needed (Wait, Cromley and Garb). Public health emergencies also can benefit from GIS by assessing vulnerability, hazards, and risks but more commonly in response. It can aid in outbreak investigations and disease distribution patterns and can be used in distributing information to the public. Maps showing exposure can provide direction for professionals to research and also to look for patients needing treatment (Spiegel, Gerber and Henderson). d. Recovery An application that spans both response and recovery is in estimating damage and prioritizing utility response. GIS can be used to keep a database of damages, estimated monetary loss, and areas of high priority. Handheld devices can be used by field respondents to record the damage data and it can be fed back into the master database. From there, policy makers and emergency management personnel can makes decisions about resources allotment and areas needing special attention (Aziz, Pena-Mora and Chen). Additionally, formulas can be used to calculate damages using GIS immediately following an event. These numbers may not be the most accurate but they provide a baseline estimate (Bockarjova, Steenge and van der Veen). e. Other Uses In addition to using GIS to aid in agency and governmental planning, organization, preparedness, response, and recovery, GIS can be used as a tool to disseminate information to the public. Some research shows that clear maps, charts, and graphics can aid in promoting a message be it an evacuation warning or a public health announcement but it is important to gear the map to the literacy level of the population at hand (Zarcadoolas, Krishnaswami and Boyer). The underlying requirement for any of these GIS technologies to be effective is in having a solid foundation of data. It would be extremely difficult to nearly impossible to use some of these activities if the data was not on hand many months prior to the emergency. There is certainly some amount of investment required to create a strong GIS database but many municipalities have found it worthwhile and agencies like FEMA are embracing the technology as well (FEMA). There are a seemingly infinite number of potential uses for GIS technology in emergency management and its ability to be combined with other technologies makes it a powerful and versatile tool. UDUTC Final Report Page 32 7. Identifying Vulnerable Populations in Delaware a. Non-English Speaking Farm Workers Agriculture and poultry processing plants have always played an important role in the economy of Delaware and Delmarva Peninsula (Miller, Martin & Kee, 1997). In 2007, there were 2,546 farms in Delaware with 510,253 acres of farmland, and average of 200 acres per farm (Delaware State Agriculture Overview, 2007). According Miller et al. (1997,) the agricultural labor force on Delaware’s farms have changed significantly in the past century. While in the 1920’s the most seasonal work was performed by white women, currently the majority of seasonal workers in Delaware are Hispanic (50-60%), African-American (30-40%) and workers with Guatemalan, Jamaican and Haitian background (Miller, at al. 1997). However, work on farms is social stratified and unequal within race of migrant workers. Certain ethnic groups are prevalent in some crops but not others. In addition, the agricultural workers are paid just a little bit over minimum wage (Miler, et al., 1997). The number of migrant workers who are undocumented and unauthorized alien employment in seasonal agricultural work has probably increased in recent years (Miller et al, 1997). Growing problems with undocumented workers are mirrored in the apparent increase in INS and USDOL enforcement activity. For example, an INS audit done in late 1995 early 1996 of four poultry plants found that from 3,000 employees 460 did not have proper authorization to work in the US (Rural Migration News, 1996). As a result of their undocumented situation, illegal immigrants are more prone to live in insecure situations and, as a result, they are more vulnerable to human rights violations. Because of their illicit status, undocumented workers are left without formal work contracts, welfare services except of emergency and child medical treatment. Basok's (2002) research on Mexican workers in Canada, describes the migrant population as a workers without a social life as a result of the isolation of the work environment and housing arrangements. Furthermore, Basok's research records cases of racism and social exclusion among Mexican seasonal workers in Canada’s farms. In summary, besides class, race, gender and age another significant factors for vulnerability is immigration status, special needs population and occupation (Bolin and Stanford 1999; Morrow 1999; Cutter, Boruff and Shirley 2003). These factors might influence vulnerability of individuals and groups to natural hazards. In addition, migrant workers in agriculture field of Delaware regardless of their legal status are vulnerable to negative consequences of natural disasters as a result of language barrier, in many cases UDUTC Final Report Page 33 of their high levels of illiteracy (Caldwell, 2006), and social and physical isolation from other population. b. Amish Community Another group that might be highly vulnerable to disaster hazards because of different culture is Amish population in state of Delaware. The size of Amish population in Delaware is estimated of 1,215 people (Amish Studies, 2008). Even though some research of Amish communities suggests that gradual social change is occurring in their community (Savells, Jerry 1985), the Amish population is still organized around the extended family and the church. In addition, they try to avoid dependence on modern life and their social life lies in the local district without interaction with outside world. It needs to be taken into account that the rules of the church are observed by every member. These rules cover most aspects of life, so in order to prepare this population for natural hazards the communication needs to be taken through the church leader. In addition, Amish communities as a result of their specific characteristics of life have limited access to phones, transportation and even electricity. c. Horse Farms Research on natural disaster and pets show that people are more likely to stay with their pets especially if they lack options for their pet’s transportation. Animal evacuation should be one part of disasters planning. Consequently, it is necessary to prevent people from risking their lives and health on order to protect and save their pets. State of Delaware is known for a large number of stable companies and horse farms. Even though there is scare research in live stocks and disaster response, we can assume that owners of horse farms would not evacuate without their horses. As Allen & Linda Anderson (2006) point out, Katrina disaster revealed that ‘pets are part of people lives’ and it is was very common that people stayed with their pets, smuggled them into buses and experienced psychological disorders as result of loosing their pets. People even might risk their own lives to save their pets. In addition, animal rescuers trained in the concept of animals rescue needs to be implemented into preparedness and planning for disasters (Anderson, 2006; see also Irvine, 2006). Consequently, there is need to accept the premise that animals need to be moved with people especially if those animals are part of business and source of income. Some states such as Florida. Hawaii, Louisiana, Maine, New Hampshire, New Jersey and Vermont had passed legislation in 2006 on animal disaster planning and response. As response to need for shelters suitable for accommodating horses in time of disasters ‘Days end Farm Horse Rescue’ has established two first-responding rescue teams in states of Maryland, Virginia, and Delaware. UDUTC Final Report Page 34 d. Elderly As has been mentioned numerous times prior in this report, another factor which influences social vulnerability to disasters is age. Scholars point out that elderly populations usually lack the access to resources (information, knowledge) and access to political power and representation that might increase their vulnerability to disaster (Morrow, 1999). Elderly may have mobility constrains and lack of resilience (Cutter, Boruff, & Shirley, 2003; see also Ngo, 2001). Similarly, M.K. Lindell, C. Prater & R.W. Perry (2007) in their ‘Emergency Planning’ argue that the propensity to comply with an evacuation warning decreases as age increases. This leaves more elderly in vulnerable areas. Probable reason for this is that as age increases, levels of social activity decrease. More social isolation produces fewer chances of receiving a warning. UDUTC Final Report Page 35 8. Vulnerability of Bridge Infrastructure a. Background on Bridge Security Incidents that affect the security of our bridges are becoming increasingly important since September 11, 2001. Bridges present a unique threat because they are essential to our economic activity and pose serious risk for human casualties. However, transportation networks require unique protection, especially bridges, because they are design to be easily accessible and there are a limited number of alternate routes due to geographic conditions at the bridge site (Federal Highway Administration, 2003: p1). There are already many locations in the U.S. and Delaware where the transportation system is stressed to its maximum on a regular basis and a disaster or terrorist attack at one of these locations can have widespread consequences. Small and routine transportation incidents have caused major delays on vital routes (Roper, 2005). A Blue Ribbon Panel on Bridge and Tunnel Security formed by the Federal Highway Administration believes a loss of a major bridge or tunnel could result in a cost of approximately $10 Billion (FHWA, 2003: p2). Much of the preparedness on bridges will require federal assistance on funds which the Federal Highway Administration has begun to recommended methods for the distribution of funds based upon the need for a structure. One of the primary methods recommended to plan for loss is a risk based strategy to establish the critical nodes in the transportation infrastructure (Roper, 2005). These critical nodes are analyzed for how much of an impact destruction would cause on the transportation network. b. Federal Approach to Bridge Security The Federal Highway Administration and The American Association of State Highway and Transportation Officials (AASHTO) requested that a “Blue Ribbon Panel” of engineering experts establish recommendations for Bridge and Tunnel security. They issued a report titled “Recommendations for Bridge and Tunnel Security” in September 2003. This panel had several recommendations to reduce the threat to our bridge and tunnel infrastructure. Their recommendations fall into three areas: institutional, fiscal, and technical (FHWA, 2003: p4). Within the three areas there should be uniformity among states, especially if federal funds are to be awarded to aid with security upgrades. At present time there are very little codes written for prevention of damage to bridges from terrorist events. There is some assistance available from the Department of Defense, however there are not specific codes related to many of the technologies becoming available (FHWA, 2003 p12). The BRP suggests more academic research to better understand response and fill in existing gaps. The recommendation is to take information provided by the department of defense and other security standards and develop appropriate codes for uniform construction. UDUTC Final Report Page 36 The suggested method for uniformity begins with identifying “critical” bridges and specific threats to those structures. The development of a risk based strategy for security assessment allows prioritization of countermeasures and geospatial management of information to develop scenarios that can be used for planning and analysis (Roper, 2006: p4). This information should be communicated to larger security databases to facilitate communication between security agencies for assessment and decision making purposes (Roper, 2006: p6). Additionally countermeasures to each of these threats should be considered and priority assigned to the structure based upon importance, threat level and likelihood a terrorist attack will occur. These countermeasures can be divided into several categories: “technology to deter attack, deny access, detect presence, defend the facility or design structural hardening to minimize consequences to an acceptable level” (FHWA, 2003: p11). Some of the solutions are easy to implement and have minimal cost while others are long term solutions that will require significant financial assistance. For example, placing concrete jersey walls to keep people from driving up to the structure vs. adding protective shielding to a suspension bridge’s cables for blast protection. Prioritization of Structures Prioritization is required because funds are not unlimited for any jurisdiction, although some funding may be available from the federal government for security upgrades. This makes it necessary to prioritize structures to make the largest impact on the transportation network. AASHTO has developed a recommended procedure for this process. The AASHTO method uses critical factors so assess vulnerability based upon several categories. These include “target attractiveness, accessibility and expected damage” (FHWA, 2003: p19). This information can be then used for risk assessment to determine where funding will be most effective. In addition to the AASHTO method the FHWA Blue Ribbon Panel recommends following similar procedures to the Texas Department of Transportation by ranking bridges based upon a very specific criteria, much of which is available from the National Bridge inventory (FHWA, 2003: p20). Some of these criteria include (From FHWA, 2003:p20): Potential for mass causality based on Average Daily traffic (ADT) and peak capacities Criticality to emergency response and emergency evacuation Military or defense mobilization Alternate routes with available capacity Symbolic Value Mixed Use Bridge Potential for Collateral damage (land, marine, rail) Maximum Single Span Length Commercial Vehicle vs. Passenger Vehicle Mix Bridge Dimensions Significance of Revenue (From Toll Collection) UDUTC Final Report Page 37 Bridges at international border crossings It is also recommended that a risk factor be determined for structure based upon three factors: Figure 1 – FHWA, 2003 p. 21 Applicable Research The FHWA Blue Ribbon Panel recognizes that one of the primary concerns when mitigating against attack is blast loading on bridges. More research is needed to understand how bridges can be protected through retrofit and structural design. The panel considered key components of the bridge found in table 1. The recommendation is to develop research and methods to militate against threats to these structural components. UDUTC Final Report Page 38 Table 1: FHWA, 2003:p23 Design for threat prevention should be based upon the importance factor of the bridge (the R factor found by using figure 1) and the level of the threat to the bridge. Large Scale threats, such as a precision attack would cause catastrophic failure and should be prevented. The FHWA determined other threats and their magnitudes thought to be likely for design considerations. These values are shown in Table 2. Based upon these threats the owner of the structure must determine if they are acceptable and if not how they can be prevented. Mitigation can be either in the form of mitigating against the threat or mitigating against the consequences. Table 2: FHWA, 2003: p26 Examples for Mitigation against threats (FHWA, 2003: p27): Establish Secure Perimeters Inspection, Surveillance, detection and enforcement, CCTV Visible Security Presence Minimize Time on Target UDUTC Final Report Page 39 Examples for Mitigation against Consequences (FHWA, 2003: p27): Create Standoff Distances Add a design Redundancy Hardening/Strengthening the elements of the Structure Develop an Accelerated Response and Recovery Plan c. Applications for the State of Delaware State Departments of Transportation have much of the responsibility for bridges and their safety. The loss of a state’s bridge could be detrimental to the State’s economy and cause significant shifts of loads on a state’s (and neighboring state’s) transportation Networks. Planning for bridge security would likely be a cooperation with DelDOT, the Army Corps of Engineers and other agencies such as the Delaware River and Bay Authority who operate bridges within Delaware. Details of Bridges in Delaware At present time no policies concerning bridge security in Delaware have been found for this report. A press release by the Delaware River Bay Authority details some of their Traffic Management System put into place in 2002 for the Delaware Memorial Bridge. The security features of this plan include 26 High resolution cameras on the towers and 11 towers below the road surface. These cameras are monitored 24/7 by the Delaware River Bay Authority Police Operations Center (DRBA, 2002). A recommended method for application of bridge security is that practicing bridge engineers, owners and government officials make recommendations for the specific structures in the area of risk. This process can integrate Intelligent Transportation Systems (ITS) and other solutions and plan for specific times or situations where there is an increased vulnerability. Based upon recommendations the DOT, or other owner can begin specific security protection and monitoring of threats, generally starting with specific sites of high threat or impact (Roper, 2006: p5). It’s important to recognize that security for each type of structure will vary and the risk based assessment information can be used to recognize which structures should take priority. In each case the strengths and weaknesses of each application scenario should be considered (Roper, 2006: p5). Possible Security Opportunities for Delaware (Roper, 2006) Fixed /Pan/Tilt/Zoom Cameras Contact Sensors on doors and gates Motion Detectors Seismic Sensors Digital Video Recorders Fiber Optic Sensors Electronic Key Access Weather Monitoring Low Tech Devices: Lighting, Speakers, Microphones, Physical Barriers UDUTC Final Report Page 40 d. Conclusion In any application there should be a multi-tiered approach with overlapping security systems. For higher risk structures there will be a larger need for monitoring and active protection. In low risk situations low tech deterrents may be deemed “enough” protection, such as lighting and physical barriers. New Bridges and retrofits should be designed with a level of resiliency so that if a portion of the structure fails due to a natural disaster or a terrorist, the entire superstructure will not fail: this applies not only to the structure itself but the security and protection measures applied. Often infrastructure management systems are installed for monitoring of slow deterioration; however the probability of failure is increased for extreme events, such as a terrorist attack. This requires a new type of monitoring and protection not previously installed with most structures (Transportation Research Board, 2008: p354). If a bridge was damaged in Delaware the cost of repair and of impact on society could be substantial. Delaware would be able to benefit from the addition of security to many bridges that would have a high impact to society and mitigate against threats to the state’s transportation infrastructure. UDUTC Final Report Page 41 9. Rail and Ferry Security a. Rail Security Assessment Securing passenger and cargo rail lines presents a unique challenge due to the number of access points and numbers of riders. After the London bombings on July 7th, 2005 there has been a new, nationwide emphasis on improving rail security (Petterman, 2005: p1). Surface transportation presents a unique problem because it is so expansive it is hard to obtain the level of security of air travel. “There is a general consensus among security experts that passenger rail systems are inherently vulnerable and thus virtually impossible to defend against attack, due to the very nature of their design and operations” (Petterman, 2005: p3). “Passenger rail systems are open, have multiple access points, are hubs serving multiple carriers, and, in some cases have no barriers” (Rabkin, 2007: p5). The aviation industry has been able to have a very closed system with a minimal number of access points making it less difficult to secure. The TSA is ultimately responsible for securing all modes of transportation and state and local governments will have to coordinate protection measures with the TSA (Rabkin, 2007:p 7). The decision of what to secure and how to secure it will be made using risk based assessment looking at where the largest impact on the system can be made. With this taken into account transit experts focus on minimizing the effects of a terror attack and reducing the damage caused by natural disasters. The Government Accountability Office (GAO) and the 9/11 commission recommends the use of threat based risk management (Petterman, 2005: p5). This has been transformed into a numerical equation to categorize risk: Vulnerability + Threat + Criticality = Risk. Passenger rail is by its design hard to secure. The worldwide average of 30 rail attacks per year leave the likelihood for attack low, however the effects of an attack in lives and confidence of protection could be significant. There is much debate about where the funding for improvements should come from and if it should be federally funded or sate and locally funded. Much of the threat reduction is managed through vulnerability assessments, emergency response training and drills. This type or preparedness leads to analysis of potential threats and needs for equipment and further training. The details of physical security upgrades for rail transport have not been made public, however reports show increased security measures such as surveillance, increased police presence and random inspections (Petterman, 2005). The TSA has been working with rail and transit agencies to update threat assessments in an effort to allocate funding. Any methods to secure rail lines must find the right balance between a desired level of security and efficient operation. Specifically in Delaware there are three types of rail transit in use. Delaware has heavy rail for cargo transport of cargo throughout the state, passenger rail with Amtrak lines and stations in UDUTC Final Report Page 42 New Castle County, and commuter rail into Pennsylvania and Maryland. These lines have security in place and a police presence. The lines passing through New Castle County are essential to the overall rail system in the northeast corridor and important to the State of Delaware. b. Ferry Security Assessment Although ferries do not have status as a symbolic target, an attack on a ferry would attract significant media attention resulting in death and economic damage (Greenberg, 2006). Some scenarios threatening ferries are much more likely than others and would only require basic skills. Attacks for ferries range from relatively high for an onboard explosion to low threat os a USS Cole type of attack where the vessel is rammed with an IED. Ferries operate on a predictable schedule and have large numbers of people coming and going freely. Additionally ferries are not designed as robustly as cruise ships against attack (Greenberg, 2007). The facilities are designed with commerce in mind requiring minimal requirements for entry. The RAND Corporation (Greenberg, 2006) recommends the use of threat based risk assessment for maritime terrorism incidents and has developed their own assessment for use. Additionally in Maritime Homeland Security, the Unites States Coast Guard had has made an effort deter and mitigate against terrorist attacks. The Coast Guard recommends that maritime operators evaluate and document the security measures they have in place. In order to do the evaluation the Coast Guard has developed a risk based security assessment. “Risk-based decision-making is a systematic and analytical process to consider the likelihood that a security breach will endanger an asset, individual, or function and to identify actions to reduce the vulnerability and mitigate the consequences of a security breach” (USCG, 2004: p1). During the security assessment weaknesses in the existing security policies and protection systems should be identified. Additionally measures to prevent security breaches due to the weaknesses should be recommended. To do this the U.S. Coast Guard recommends a 5 step process (USCG, 2004). Step 1: Potential Threats The initial step in the threat assessment process is to consider scenarios which are realistic for the type and location of the vessel. The example used is a boat with explosives ramming a tanker would be a credible threat meanwhile a handheld missile sinking a tanker is not as likely. It is suggested that as a minimum the scenarios in Table 1 be considered. It is not necessary to evaluate variations on a theme and scenarios that have now consequences (USGS, 2004). UDUTC Final Report Page 43 Table 3 - U.S. Coast Guard, 2004 Step 2: Consequences The consequences of a potential attack should be assessed for death, injury, economic and environmental impact. Each consequence should be given a rating, based upon the component of the consequence that yields the highest rating. If a likely threat has a moderate (rating of 1) impact in death, injury and economic but a significant environmental impact (rating of 2) then the overall consequences would be rated as significant (rating of 2). Additionally events that are considered catastrophic receive a rating of 3. Descriptions of the rating levels can be found in Table 2. UDUTC Final Report Page 44 Table 4 – Consequence Score (Source: U.S. Coast Guard, 2004) Step 3: Vulnerability A vessel’s vulnerability to attack should be included in the assessment. The U.S. Coast Guard recommends giving a numerical score to the vulnerability of the vessel based upon accessibility and “organic security.” Accessibility is described as the physical barriers that deter attacks from occurring. Organic Security is the use of security personnel and systems to detect and prevent threats from occurring. The vulnerability rating is a similar rating to consequences on a one to three scale found in table 3. Table 5 - U.S. Coast Guard, 2004 Step 4: Mitigation Once the threat assessment has been conducted it is important for the owner to determine which scenarios require protection to be implemented. The owner should be aware of other scenarios but may find in the assessment that the current security measures provide an acceptable level of UDUTC Final Report Page 45 protection. The U.S. Coast Guard uses table 4 to determine what actions should be taken based upon the resulting score of each scenario. Mitigate is defines as: “mitigation strategies, such as security protective measures and/or procedures, may be developed to reduce risk for that scenario” (USCG, 2004). Consider is defined as: “the scenario should be considered and mitigation strategies should be developed on a case by case basis” (USCG, 2004). Document is defines as “the scenario may not need a mitigation measure at this time and therefore only needs to be documented” (USCG, 2004). Step 5: Implementation Once the assessment has been completed and the operator of the vessel determines the best steps for mitigation that will reduce risk they must be implemented. Its suggested that reducing the vulnerabilities is easier than reducing consequences or threats. Implementation of mitigation strategies should be evaluated based upon effectiveness and feasibility. If the strategy lowers the vulnerability score itself or in combination with other strategies it may be beneficial. It is likely to be feasible if it can be implemented without significantly affecting impact and within the budget. If a strategy is cost prohibitive or prevents operations it may not be feasible. Security measures put in place should be re evaluated periodically to ensure they have the desired affect because threats and vulnerabilities change over time. UDUTC Final Report Page 46 10. Conclusions Although Delaware is small infrastructure security and emergency preparedness are important in Delaware. First, the I-95 corridor and the Northeast rail corridor are key elements of the transportation system in the Northeast. Second, the geographical configuration of the Delmarva Peninsula means that evacuation requires some careful planning. Finally, there are many different agencies involved. While there appears to be many opportunities to explore security and emergency preparedness, transportation agencies indicate that they are confident that there current plans are effective. UDUTC Final Report Page 47 11. Acknowledgments The authors would like to thank University Transportation Center for sponsoring this research. UDUTC Final Report Page 48 12. References Aguirre, B., D. Wenger, T.A. Glass, M. Diaz-Murillo, and G Vigo. "The social organization of search and rescue: Evidence from the Guadalajara gasolene explosion." International Journal of Mass Emergencies and Disasters 13 (1995): 93-106. ArcNews. Disaster Preparedness Exercise Uses GIS. ESRI, 2006. Aziz, Zeeshan, Feniosky Pena-Mora, Albert Chen, and Timothy Lantz. "Supporting urban emergency response and recovery using RFID-based building assessment." Disaster Prevention and Management, 2009: 35-48. Bockarjova, Marija, Albert E Steenge, and Anne van der Veen. "On direct estimation of initial dmamage in the case of a major catastrophe." Disaster Prevention and Management, 2004: 330-336. Cova, Thomas J, and Richard L Church. "Modelling community evacuation vulnerability using GIS." International Journal of Geographical Information Science, 1997: 763-784. de Silva, F. Nisha. "Providing spatial decision support for evacuation planning: a challenge in integrating technologies." Disaster Prevention and Management, 2001: 11-20. Delaware River Bay Authority (DRBA). “Delaware Memorial Bridge’s Traffic Management System Featured at International Bridge Tunnel Turnpike Association Meeting.” Delaware River Bay Authority News Release. 13 May 2002. Drabek, Thomas E., and David A. McEntire. "Emergent phenomena and the sociology of disaster: lessons, trends, and opportunities from the research literature." Disaster Prevention and Management 12, no. 2 (2003): 97-112. Dynes, R. Organized Behavior in Disaster. Lexington, MA: Lexington Books, 1970. FEMA. FEMA Mapping and Analysis Center. 2004. http://www.gismaps.fema.gov/gis04.shtm. Federal Highway Administration (FHWA). “Recommendations for Bridge and Tunnel Security.” September 2003. Greenberg, Michael D, Peter Chalk, Henry H. Willis, Ivan Khilko and David S. Ortiz. “Maritime Terrorism Rick and Liability.” Rand Corporation, 2006. Gillespie, D.F., D.S. Mileti, and R. Perry. Organizational Response to Changing Community Systems. Kent, OH: Kent State University Press, 1976. Kapucu, Naim. Collaborative emergency management: better community organizing, better public preparednes and response. Oxford: Blackwell Publishing, 2008. UDUTC Final Report Page 49 Kapucu, Naim. "Culture of preparedness: household disaster preparedness." Disaster Prevention and Management 17, no. 4 (2008): 526-535. Majchrzak, Ann, Sirkka L. Jarvenpaa, and Andrea B. Hollingshead. "Coordinating Expertise Amount Emergent Groups Responding to Disasters." Organization Science 18, no. 1 (2007): 147-161. Morrow, Betty Hearn. "Identifying and Mapping Community Vulnerability." Disasters, 1999: 1-18. Newport, Jeyanth K, and Godfrey G. P. Jawahar. "Community participation and public awareness in disaster mitigation." Disaster Prevention and Management 12 (2003): 33-36. Paton, Douglas. "Preparing for natural hazards: role of community trust." Disaster Prevention and Management 16, no. 3 (2007): 370-379. Paton, Douglas, and David Johnson. "Disasters and communities: vulnerability, resilience and preparedness." Disaster Prevention and Management 10, no. 4 (2001): 270-277. Peterman, Randall. “Passenger Rail Security: Overview of Issues.” CRS Report for Congress. 29 July 2005. Rabkin, Norman J. “Passenger Rail Security”. Testimony before congressional subcommittees. GOA-07583T. 7 March 2007. Roper, William. “Strategies and Technology Choices for Bridge and Tunnel Monitoring, assessment and Protection.” 2006 Transportation Research Board Annual Meeting. TRB Paper 06-2948. 1 August 2005. Schafer, Wendy A., John M. Carroll, Steven R. Haynes, and Stephen Abrams. "Emergency Management Planning as Collaborative Community Work." Homeland Security and Emergency Management 5, no. 1 (2008). Shulman, Holly Miriam-Lea. "Estimating Evacuation Vulnerability of Urban Transportation Systems Using GIS." 2008. Spiegel, Paul B, Michael L Gerber, Alden K Henderson, and Reinhard Kaiser. "The Application of Geographic Information Systems and Global Positioning Systems in Humanitarian Emergencies: Lessons Learned, Programme Implications and Future Research." Disasters, 2003: 127-140. Thomas, Deborah S.K., Kivanc Ertugay, and Serkan Kemec. "The Role of Geographic Information Systems/Remote Sensing in Disaster Management." In Handbook of Disaster Research, by Havidan Rodriguez, Enrico L. Quarantelli and Russell R. Dynes, 83-96. New York: Springer, 2007. Tierney, Kathleen J., Michael K. Lindell, and Ronald W. Perry. Facing the Unexpected: Disaster Preparedness and Response in the United States. Washington, D.C.: Joseph Henry Press, 2001. Transportation Research Board. “International Bridge and Structure Management.” Transportation Research Circular, Number E-C128. October 2008. UDUTC Final Report Page 50 Trim, Peter R.J. "An integrative approach to disaster management and planning." Disaster Prevention and Management 13, no. 3 (2004): 218-225. Troy, Douglas A., Anne Carson, Jean Vanderbeek, and Anne Hutton. Enhancing community-based disaster preparedness with information technology. Oxford: Blackwell Publishing, 2007. United States Coast Guard (USCG, 2004). “Navigation and vessel inspection circular No. 10-02, Change 1”. 6 August 2004. Wait, Richard B, Robert G Cromley, and Jane L Garb. "Estimating Populations at Risk for Disaster Preparedness and Response." Journal of Homeland Security and Emergency Management, 2007. Zarcadoolas, Christina, Arthi Krishnaswami, Jennefer Boyer, and Andrea Rothenberg. "GIS Maps to Communicate Emergency Preparedness: How Usable Are They for Inner City Residents?" Journal of Homeland Security and Emergency Management, 2007. UDUTC Final Report Page 51
© Copyright 2026 Paperzz