Call Our Firm:   605.385.0330

Commercial Transactions & Litigation, Environmental Law, Natural Resources Law, & Energy Law

Archive for the ‘Water Law; Environmental Law; Security Law’ Category

Does Eminent Domain Apply to Water Rights?

Posted on: February 7th, 2016
by David Ganje

Does Eminent Domain Apply to Water Rights?

Eminent domain is one of the toughest and most controversial legal powers available to a government. The doctrine of eminent domain allows a governmental body to convert privately owned land to another use, often over the objections of the current landowner. This process is commonly known as ‘condemning the land.’ There are rules, of course. A private landowner must be paid “just compensation” for the condemnation of their land. I have written several blog articles regarding the matter of just compensation. Further, the land that is to be taken must be taken to further a beneficial public use.

The ability to exercise eminent domain is so powerful that it almost always remains a final legal option left to state and government bodies. In North Dakota, a little-known law allows private citizens to exercise eminent domain. North Dakota law states that “The United States, or any person, corporation, limited liability company, or association [may] exercise the right of eminent domain to acquire for a public use any property or rights existing when found necessary for the application of water to beneficial uses.” Private citizens as well as corporations may exercise the immense power of eminent domain – but only when it comes to using water for a beneficial use.

North Dakota evaluates whether or not a citizen is able to put water to a beneficial use through a permit system. The law requires “any person, before…appropriating waters of the state…, shall first secure a water permit from the state engineer.” There are few sources of water (groundwater, surface water, river water, etc.) within the limits of the state that are not subject to such a water permit. The power of eminent domain can only be harnessed in order to put water to a beneficial use. For this reason, a citizen cannot successfully exercise eminent domain without first having a water permit.

The right of eminent domain may come into play when a private citizen or corporation wants to use water for a beneficial use, but needs access to land they don’t own in order to access water. What is a beneficial use? North Dakota law is intentionally vague on this subject. It says beneficial use is the use of water for “a purpose consistent with the best interest of the people of the state.”

Traditionally the landowner who desires the use of a water source, having first secured a state permit, will negotiate an easement with the landowner who owns the land on which the water sits. But this does not always work out. Such was the case in Mougey Farms v. Kaspari, a 1998 North Dakota Supreme Court case. The plaintiff, Mougey, owned farmland neighboring the defendant Kaspari’s land. Kaspari’s land also bordered the Sheyenne River. Mougey wanted to use the Sheyenne River as a water supply to irrigate his land. To that purpose Mougey approached Kaspari to negotiate a lease of his land in order to build a water transport system connecting Mougey’s irrigation system to the Sheyenne River. Kaspari agreed, the two signed a lease, and the irrigation system was built across Kaspari’s land without incident. The lease began in 1979 and continued for almost seventeen years.

In 1996 Kaspari informed Mougey that the lease would not be renewed, and Mougey would no longer be allowed to transport water from the Sheyenne River to Mougey’s farmland. This left Mougey without a source of water for irrigation. Mougey brought suit with an eminent domain claim against Kaspari’s land – in other words, he brought a suit to condemn the part of Kaspari’s land on which the water pipeline stood, asking for the right to continue piping water from the river to his irrigation system. Though this argument was rejected in the lower court, the North Dakota Supreme Court held that “irrigation of farmland under a perfected water permit issued by the State Engineer is a beneficial use of water consistent with the best interests of the people of North Dakota, which we conclude satisfies the ‘public use’ requirement.” The Supreme Court of North Dakota held that a private citizen could exercise the power of eminent domain in order to condemn part of his neighbor’s land, so long as the condemnation was in support of an approved public use of water.

The law lays out what public uses trigger the right of eminent domain. It states, “oil, gas, coal, and carbon dioxide pipelines and works” and the plants for supplying the above, together with “lands, buildings, and all other improvements” needed to for the purpose of “generating, refining, regulating, compressing, transmitting, or…development and control” are all public uses capable of triggering eminent domain.

The question is whether or not use of water fits a category. Is the use one that supports “generating, refining, regulating, compressing, transmitting,” or “development and control” of oil and/or natural gas? This issue may be considered regarding one of the most important uses of water in the oil and gas industry, hydraulic fracturing. There are parallels that can be drawn between the use of water for irrigation seen in Mougey Farms and the use of water for hydraulic fracturing.

Energy developers and landowners should be aware of this eminent domain statute and the possibility of its use. Both parties need to remember that when water rights are involved in a public use, the prospect of eminent domain is conceivable. The North Dakota Supreme Court teaches us that the ‘eminent domain of water statute’ allows individuals or companies to acquire for public use property when found necessary for using water for beneficial purposes.

David Ganje. David Ganje of Ganje Law Offices practices in the area of natural resources, environmental and commercial law in South Dakota and North Dakota. The website is Lexenergy.net

Water Systems: A Twofold Look into Physical Security & Cyber Security

Posted on: July 6th, 2014
by David Ganje

Water Systems: A Twofold Look into Physical Security & Cyber Security WEBINAR IEPA# 0000—Illinois Section, American Water Works Association

12/12/14 Water Systems: A Twofold Look into Physical Security & Cyber Security WEBINAR IEPA# 0000

When: Thursday September 4th, 2014

From 12:00 -1:00 PM CDT

Where: Your home or office computer

Presenter: David Ganje

Contact: Marianne Perino

mperino@isawwa.org

Phone: 866-521-3595

 

Registration Information: Online registration is available until: 12/12/2014

 

Details

 

Water Systems: A Twofold Look into Physical Security & Cyber Security

CEU TYPE: Technical

WEBINAR TYPE: Technical

IEPA#: 0000

Summary: A security threat to a water system may include the deliberate elimination/destruction of the safe water supply or the disruption of the delivery of the safe water supply for residential, commercial, industrial and agricultural purposes. System threats can come from within a water systems organization or from the outside. External threats include terrorist activities and civil disobedience. Threats may range from trespassing, tampering and vandalism to sabotage, theft and terrorism; these threats may be of a physical nature or they could be non-physical such as a cyber attack. Terrorist threats have been made against water systems. In most instances, the specifics of such attacks are unknown to most systems operators. Hazards from these threats include loss of power and communications, SCADA (supervisory control and data) cyber attack, explosions, intentional fires, chlorine release, broken water mains, chemical or biological contamination, pump failure, dam failure or storage tower failure. The focus of this presentation will address: conducting an on-site security audit using recommended national systems as well as local public and private resources.

http://www.isawwa.org/resource/resmgr/headshots-people/ganje.jpgPresenter: David Ganje, Ganje Law Offices

REGISTRATION & HOURS: This webinar will begin at 12:00pm and conclude by 1:00pm CST. Earn up to 1 PDH or RTC hour. After registering with Illinois Section AWWA, attendees will be furnished via email with all materials and links needed to participate in the webinar. Questions? Call 866-521-3595 Ext. 3

Midwest Water Technology Conference

Posted on: May 29th, 2014
by David Ganje

 Midwest Water & Wastewater Technology Conference

 

                       

 

6/5/2014

When: Thursday,   June 5, 2014
Visit Exhibitors from 7:30 to 8:30 AM
Where: Map this event »
College of Lake County, C-Building
19351 West Washington Street
Grayslake, Illinois  60030
United States
Contact: Lisa   Hoffhines
lisa@isawwa.org
Phone:      866-521-3595 ext. 2

 

 

 

Details

 

T-CON:   Midwest Water & Wastewater Technology ConferenceABOUT   THE CONFERENCE:The   Midwest Water & Wastewater Technology Conference is the new and improved   technology conference for industry professionals sponsored by the Illinois   Section AWWA, Central States Water Environment Association, Illinois Water   Environment Association and the College of Lake County. The Technology   Conference incorporates multiple learning tracks related to the planning,   design, implementation, and operation of water and wastewater-based   technologies. The multi-track approach makes the conference ideal for utility   managers, IT professionals, as well as operations and field staff. If you can   only attend one technology conference this year, this is the one to attend!

T-CON   GENERAL SCHEDULE

TIME ROOM AGENDA    
7:00-7:30am C006 Exhibitor     Set-up
7:30-8:15am C006 Breakfast     | Registration | Visit Exhibit Booths
8:15-8:30am C005 T-CON     Welcome and Opening Remarks
8:30-9:30am C002,     C003, C005 Technical     Sessions
9:30-10:00am C006 Morning     Break | Visit Exhibit Booths
10:00-12:00pm C002,     C003, C005 Technical     Sessions
12:00-1:00pm C002,     C003, C006 Lunch     | Visit Exhibit Booths
1:00-2:00pm C002,     C003, C005 Technical     Sessions
2:00-2:30pm C006 Afternoon     Break | Visit Exhibit Booths
2:30-3:15pm C005 Keynote     Speaker
3:15-3:30pm C005 Raffle     for iPad Air and MORE! | Closing Remarks

 

Presentation Title
Can You Recover After A Disaster With     Your Control System?
Comparison of Ammonia And DO Aeration     Control Strategies To Optimize Energy And Process At Low Capital Cost: A     Case Study
Drawing The Curtains On Windows XP –     What Does The End Of Win XP Mean For SCADA Systems?
Geocentric Web Mapping Solutions In     GIS
Going Beyond The Meter: Expanding     Traditional Data Collection Methodology To Increase Revenues
How GIS Has Helped The City Of     Chicago And The Department Of Water Management (DWM) Embark On A Very     Aggressive Plan To Replace 880 Mile Of Water Main In 10 Years!
How To Select An Economical And     Secure Remote Terminal Unit (RTU) Delivery System For WWTPs And Pump     Stations
Identifying And Locating Existing     Backflow Prevention Devices Inside A Building Using Bluetooth Smart     Technology
Increasing The Resiliency: Standby     Power Generation
Integrating SCADA with Other Plant     Systems
Internet of Things – Enabling A New     Level Of Control, Reporting And Efficiency
Making Your Water Department     Paperless With Laserfiche ECM
Master Metering Using A SCADA System
Mobile Data Collection, Visualization     And Execution
Mobile Interfacing Within     Water/Wastewater
Quick Tour Of ArcGIS Online And     Practical Uses For Water / Wastewater
SharePoint 2013 – Technical Overview
Speaking Their Language: Public     Engagement Through Social Media For Public Works
Understanding Pressure, Temperature,     And Flow Instrumentation
Using SCADA To Reduce Energy     Consumption And Operate More Efficiently
Water Systems: A Twofold Look Into     Physical Security And Cyber Security
Water/Wastewater Tablet Success For     Less Than $1000

 

 

 

Water Systems Security

by David Ganje

WATER SYSTEMS SECURITY

INTRODUCTION……………………………………………………………………………………………………….. 1

BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1

WATER SECURITY……………………………………………………………………………………………………. 2

  1. Physical Security …………………………………………………………………………………………..      3
    1. i.              Milwaukee & Cryptosporidium…………………………………………………………….. 4
    2. ii.            WaterWorks: Physcial Security…………………………………………………………….. 6
  2. Cyber-Security……………………………………………………………………………………………….      9
    1. i.              WaterWorks: Cyber-Security………………………………………………………………… 11

RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12

VIRTUAL ATTACHMENT:

Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.

 

 

Presentation to the Illinois Chapter of the American Water Works Association.

 

© 2014. All Rights Reserved. David L. Ganje.

 

I. Introduction

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.