Skip to content

Latest commit

 

History

History
85 lines (53 loc) · 9.12 KB

README.md

File metadata and controls

85 lines (53 loc) · 9.12 KB

Carceral EJ Mapper

About

The Carceral EJ Mapper is a tool for examining the proximity of carceral facilities in the United States to various environmental hazards. Within the context of a US state, users may apply filter conditions to determine which carceral facilities have at least a certain number of superfund sites, brownfields, and other sites of toxic pollution within a given proximity to the facility. The tool is useful for identifying carceral facilities and incarcerated people on the frontlines of environemntal injustice in the US.

Cite As

Deckard Barnes, Brittany Bates, Ben Millam, Priyanshi Nigam, Lindsay Poirier, Savannah Ramirez, Michelle Servin, & Nicholas Shapiro. (2021, March 31). Carceral EJ Mapper (Version 1.1.2). Zenodo. DOI

Contributors

Contributions Name (alpha order)
🔢 💻 🤔 Deckard Barnes
🔢 💻 🤔 Brittany Bates
💻 🚇 🤔 Ben Millam
🔢 🤔 Priyanshi Nigam
🔢 📋💻 🚇 🤔 Lindsay Poirier
🔢 📋 🐛 🤔 Savannah Ramirez
🔢 🤔 Michelle Servin
🔢 📋 🤔 Nick Shapiro

(For a key to the contribution emoji or more info on this format, check out “All Contributors.”)

How to Access

You can access a working version of this application here.

How to Provide Feedback

Questions, bug reports, and feature requests can be submitted to this repo's issue queue.

Copyrights

All code in this repo is licensed with a GNU General Public License 3.0. Please see the license file for details.

All written materials are licensed with a Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0). Please see this license for details.

Have Questions?

Contact hack-for-california@ucdavis.edu

Definitions and Data Sources

  • Airports: Airports were sourced from the Department of Homeland Security's HIFLD database in a dataset called Aircraft Landing Facilities. This data was filtered to those in which the fac_type was equal to "AIRPORT". It is up to date as of July 13, 2018.
  • Brownfields: Brownfields were sourced from the EPA's Facility Registry Service (FRS). We downloaded this dataset as a CSV file and then filtered it to those in which the SITE_TYPE_NAME was equal to "BROWNFIELDS SITE". We then performed a spatial join with the Census Bureau's 2019 Census Tract Shapefiles to append census tract information to the brownfields dataset.
  • Census Tracts: Census tracts were aggregated from the US Census Bureau's 2019 TIGER/Line Shapefiles.
  • Military Bases: Military bases were sourced from the Office of the Assistant Secretary of Defense's Defense Installations Spatial Data Infrastructure. This data represents point locations and boundaries of US Military Installations, Ranges, and Training Areas as of May 2019. (See file called Geospatial Information for U.S. Military Installations, Ranges, and Training Areas). 8 polygons in the boundaries file in this zip had self-intersecting polygons, which were fixed in QGIS using the Fix Geometries feature.
  • Carceral Facilities: Carceral facilities boundary data was sourced from the Department of Homeland Security's HIFLD database While this data was collected in 2018, it is more than a decade more up-to-date than the most recent DOJ prison survey. We then calculated the centroid of each prison boundary and performed a spatial join with the Census Bureau's 2019 Census Tract Shapefiles to append census tract information to the prisons dataset.
  • Superfund sites: Superfund sites are any EPA facilities in the Facility Registry System (FRS) that are associated with SEMS, Superfund's IT system. To gather these facilities, we downloaded the EPA's FRS dataset as a CSV file and then filtered it to those in which "SEMS" was detected in the PGM_SYS_ACRNMS variable. This currently includes both National Priorities List (NPL) and non-NPL sites.
  • TRI Facilities: TRI facilities include any facilities that reported emissions in the 2018 EPA Toxic Release Inventory. TRI facilities are US industrial facilities with 10 or more employees that emit above a certain threshold of TRI-regulated chemicals in a given year. For more specific information on how the EPA defines a TRI Facility, see: https://www.epa.gov/toxics-release-inventory-tri-program/basics-tri-reporting

Data Collection and Update Process

In the Fall of 2019, contributors to this project began identifying environmental hazards that, when sited in proximity to carceral facilities, may indicate high degrees of exposure to toxicants amongst incarcerated people. The team researched open government geospatial datasets indicating the location of these hazards, and the above listed data sources represent the results of that research.

In the coming months, we intend to add PFAS sites and glyphosate use to the map.

We intend to replace the map's source data files on at least a bi-annual basis, contingent on the data producer's update process.

Repo Architecture

The code for the proximity app is stored entirely in proximity-app/app.R of this repo. All code has been commented.

Original data files are stored in proximity-app/data-original, and the cleaned data files (the files used on the map) are stored in proximity-app/data-clean.

Scripts for cleaning each of the data files are stored in the proximity-app/cleaning-scripts directory. Anything ending in -data-load-and-clean.R is a file designed to load and filter a source dataset, add census tract information, and then output the cleaned data. Perhaps most importantly, the filter functions in app.R rely on a dataset produced by a file in cleaning-scripts called find_objects-proximate_prisons.R. This file calculates the distance of every carceral facility to every environmental hazard within 5000 meters of that facility and stores the results in a data file. This file outputs proximity-app/data-clean/prisons_with_facility_distances.csv, which app.R references when a user filters the map to carceral facilities with x number of x hazards within x meters of the facility.

How to Contribute

  1. File an issue via this repo's issue queue.

  2. Write code to fix issues or to create new features. When contributing code, please be sure to:

  • Review the Hack for California Documentation Guidelines.
  • Fork this repository, create a remote to this repo, and ensure your forked repo is constantly consistent with this repo.
  • Modify the code, following this project's coding style (using Ratliffe indentation style; snake_case for variable, function names, and file names; dash-case for directory names, and commenting above each function).
  • Commit code often and follow the recommendations in the Documentation Guidelines for formatting commit messages.
  • Test your code locally before issuing a pull request.
  • Issue a pull request for each change.