Showing posts with label Yucca Mountain. Show all posts
Showing posts with label Yucca Mountain. Show all posts

Friday, March 27, 2009

Nuclear Reactor Waste...FORCED Community Hosting.

How many of us have heard President Obama speaking about shared responsibility, our duty as Americans to make sacrifices for America. Are we about to be FORCED into being Radioactive Waste HOST COMMUNITIES...an article from December 2008 leads me to pose this question to our readers.

The US nuclear waste issue – solved

Nuclear energy is a must. Disposal is within our reach.

President-elect Barack Obama supports nuclear power to increase US energy independence and fight global warming (Actually, he said we needed to look at, and be able to SAFELY store the waste...forced HOSTING is out of the question.) – but only if a path to safe nuclear waste disposal is opened. Yucca mountain is out of the question, and communities such as mine are being cheated when the NRC wants to leave waste insitu on site at Reactor Sites such as Indian Point...tell me, how much do you and President Obama feel my wife's breast cancer is worth? Reactors are nuclear abortion machines...how many stillborn birth are acceptable in your mind for the convenience of nuclear energy? Fortunately, there is a two-step plan that can open that path and lead to an effective waste solution within eight years. And it embraces citizen consent. (ALARM BELLS FOLKS...NEI comes in, spreads some money around, spoon feeds a CHOSEN COMMUNITY their Pro Nuclear Propaganda and Pablum....sign right here. Here is a clue...every reactor community agree to host our current reactors for a period of FORTY YEARS. Now through NRC rubber stamping of License Renewal Applications, we are being RAPED, forced to host unsafe reactors for 20 more years in the name of a Nuclear Renaissance, in the name of NATIONAL SECURITY. )

In 1987, Congress cut off comparative site evaluations and closed all discussion of permanent nuclear waste locations except Yucca Mountain, in Nevada. It taxed nuclear utilities to pay for it, racking up $26 billion to date. NOT EXACTLY...actually, it is US THE CITIZENS through a monthly surcharge that have put together than $26 Billion. In fact, if a Class Action Attorney is interested, I have a group of citizens that want to SUE to get that money back since DOE has broken its contract with us.

The Energy Department did what Congress required: It studied Yucca and recently submitted an application to the Nuclear Regulatory Commission to approve site construction. FALSIFIED REPORTS AND STUDIES, and your teams still had to admit that YUCCA MOUNTAIN WILL NOT WORK FOR LONG TERM STORAGE.

However, few informed observers believe that the facility can be completed without the cooperation of Nevada, which is dead set against it. As they well should be. Be honest...you folks cannot even guarantee safe storage for 20 years...look at Dry Cask storage, and the supposed SAFE Spent Fuel Pools where the waste is at currently ARE ALL LEAKING. Critics perceive the site as too risky and as a threat to tourism. They would be right, but since you and yours depend on the NUCLEAR INDUSTRY for your meal tickets, you tout the PARTY LINE. Let you live within three miles of a reactor (Indian Point) that is leaking tritium, strontium 90 and other radioactive contaminants into the environment, let your wife get breast cancer, or give birth to a stillborn child, and then TELL ME HOW SAFE NUCLEAR IS. On top of that, Nevadans seem to feel that the federal government is unfairly pushing the facility on the state. Decades of complex administrative delays and judicial battles loom. AGAIN, they would be right. DOE wanted to form compacts for the long term storage of LLRW...or so they said. Their real plan was to get two, if they were luck three LLRW sites up and running under the Compact bait and switch, and then after the fact turn them into NATIONAL storage facilities...how do I know this? I found Secretary HAzel O'Leary's Senate Sub Committee Testimony that was used to kill the Midwest Compact back in the early nineties.

So, half a century after we started generating nuclear power, used nuclear fuel continues to accumulate at more than 100 temporary storage facilities near nuclear power plants. It's a daily reminder of the unfulfilled federal promise to own and begin moving the material by 1998. CLASS ACTION ATTORNEYS...take note...1998! TWENTY SIX BILLION...Pro Bono? Email Me strikeforcenews@aol.com

Much of the problem stems from an anachronistic policy enacted in 1982. The policy essentially stipulated that used fuel should be disposed of in a geologic repository as soon as one becomes available. But, if used fuel is allowed to sit in safe storage for 90 years, much of the heat and radioactivity decays away. This reduces the size, complexity, and cost of underground disposal. It also buys time. During the cool-down period, used fuel could be transformed from waste into a major source of energy if we can satisfy the tough engineering, cost, and security challenges involved in reprocessing it. FOLKS, DO NOT BE FOOLED.

1. This is the SAME BAIT AND SWITCH they did with Depleted Uranium from the Gaseous Diffusion plants. With the stroke of a pen they turned HUNDREDS OF THOUSANDS OF BARRELS of CANCER CAUSING Depleted Uranium WASTE into potential future use resources because some sick twisted scientist figured out you could create Armor Piercing Munitions with it...what he failed to tell you, what the government failed to tell you was we have enough of this Depleted Uranium to last us about 100,000 years...unless we all kill ourselves first.

2. The above paragraph is a SALES PITCH FOR GNEP...an unproven, untested theory of reprocessing of waste that will A) Make the United States the WASTE DUMP for all the world's radioactive waste streams, and B) leave waste sitting unsafely in host communities for CENTURIES under the guise it was NO LONGER WASTE, but a potential future use resource with a value attached thereof.

To reverse the current outdated policy, we need to set up four regional used-fuel storage facilities to act as transfer stations. THIS IS THE SAME SCAM they tried to use in selling communities on Low Level Radioactive Waste Facilities...I sat in on DOZENS of meetings, and trust me...if your community is chosen, they will write laws and statutes in such a way as to FORCE YOU INTO BEING HOST, just as they tried to do with the State of Ohio. These would provide geographic equity and allow relocation of the backlog of used fuel to locations where it can be stored safely, securely, and efficiently for up to 90 years before reprocessing or permanent disposal. Indian Point Spent Fuel was supposed to be GONE by 1998...we are now being told it could be sitting here WELL BEYOND 2060! Do you want to believe a Pro Nuclear sales pitch, or the voice of people that have LIVED THE NUCLEAR INDUSTRY LIES? This can be done with existing revenue and provides the time to implement the second part of the plan: developing and demonstrating an acceptable approach for permanent geologic disposal. TRANSLATED...Senator Reid is OLD, and things are always in flux in Washington DC...we just need time to get in some new faces, do some more heavy handed lobbying and elbow twisting.

The key to making interim storage work is to make informed consent, equity, and fair compensation the basis for temporary storage. One possibility is to use a "reverse auction" to enable prospective host communities to win regional support for the sites: Under the president's leadership, the federal government would allot, say, a billion dollars, and request bids from interested communities detailing how they would spend it to address the local impacts of and statewide concerns about the proposed facility. Large-tract federal sites would be especially attractive. For starters, lets make this RETRO-ACTIVE...we have 104 ACTIVE NUCLEAR REACTORS....ONE BILLION EACH for each of those reactors is $104 Billion.

A) $104 Billion is over TEN TIMES the entire amount of liability the Commercial Nuclear Industry has in the case of a significant accident or terrorist attack. Scary when the nuclear industry's own reports say a serious accident at a site such as Indian Point would quickly see damages in excess of HALF A TRILLION DOLLARS.

B) Lets show you just how DISRESPECTFUL of host communities these two assHOLES and the nuclear industry are. The industry wants us the tax payer to give them 100 percent loan guarantees for a reactor that is estimated to cost $10-15 Billion dollars each...keep in mind, that the last ten projects had 300 percent COST OVER RUNS, and that extra $30 Billion a reactor would be AUTOMATICALLY PICKED UP by tax payers. They want two build 200 of these reactors which is a TOTAL COST OF NINE TRILLION DOLLARS two thirds of that sum paid for with Federal Tax Payer dollars, the other $3trillion paid for with our taxes. But in their GENEROSITY, they want to make FOUR COMMUNITIES fight over and DIVIDE between themselves ONE BILLION DOLLARS...in short, about $250 million each, less than the $400 million AIG will pay out in Bonus money with our taxes.

If such compensation is combined with a program that includes local representatives in facility oversight, and that accurately informs citizens of the safety systems and the crucial national interests served (TRANSLATED...we will play on the patriotism of some small rural communities, and make sure you give them a really BIG FLAG at city hall!), many communities and states are likely to welcome these facilities.

At the same time, the US needs to continue locating permanent disposal sites that the nation will eventually need. Why will we need ALL THESE ADDITIONAL SITES? Because if you read GNEP, it makes the entire world's nuclear waste streams the responsibility of the United States of America. The search should be modified to ensure that the facilities are both safe and welcomed by the host community and state.

And then there's the safety question. The best way to gain public acceptance of a repository is to design it with multiple layers of protection, adopted through a deliberate, step-by-step process that uses pilot projects to test out the designs as the facility evolves. (WARNING...go reread that sentence folks....we will start them off small, get them USED TO BEING SLOWLY POISONED by building A SMALL TEST PROJECT...here is the HOOK THEY FUCK YOU WITH FOLKS....to test out the designs AS THE FACILITY EVOLVES! GET IT? They will hook you by making you think in you are just hosting a SMALL TEST PROJECT, but look at the truth of the SMALL PRINT.) The standards we adopt should be protective, achievable, and credible. Once again, potential hosts must be convinced that all decisions about repository implementation will be fully transparent and made with their concurrence. Speak to ANY CITIZEN that has ever sat through an NRC Kangaroo Court Public Meeting!...They listen to you, tell you exactly how they are going to screw you, then against your wishes they do EXACTLY WHAT IT IS THEY WANT TO DO. Call up the NRC as ask them how many Generic Letters are active right now...a generic letter excuses ALL LICENSEES from the rules meant to protect us the General Public.The eventual success of the Waste Isolation Pilot Plant near Carlsbad, N.M., which handles military radioactive waste was achieved in this fashion. The SAME PLANT up for a five year license renewal that the citizens DO NOT WANT, but which they are being told they will ACCEPT? That Waste Isolation Pilot Plant?

If Nevada decides it wants some part in this process, the current Yucca Mountain license application could be amended since there will be time for pilot demonstration steps, appropriate compensation, more flexible transportation options, etc. READ THIS FOLKS...its carefully crafted BRIBERY and BLACKMAIL all rolled into one sentence. What is crucial though, and I BRING THIS TO THE ATTENTION OF SENATOR REID...they admit they cannot MOVE FORWARD without a license amendment...WHY YOU ASK...because DOE cannot MEET THE TERMS REQUIRED for their CURRENT APPLICATION, and they DESPERATELY DO NOT WANT TO HAVE TO START ALL OVER. They will PAY YOU BLOOD MONEY for those Indian SACRED GROUNDS...come on REID, they are only FUCKING INDIANS...yes folks, this is the WAY THE MILITARY/COMMERCIAL NUCLEAR INDUSTRY THINKS!

A new independent federal commission should handle the overall siting process and a public corporation (akin to the Tennessee Valley Authority) designed specifically for operating new facilities. WARNING...WARNING...WARNING!!! TVA is the most despicable and dishonest Authority ever envisioned, a beast that CANNOT BE KILLED. All American citizens should be VERY AFRAID.

For national, economic, and environmental security reasons, it is now time for presidential leadership to embrace informed consent, fairer burden sharing, and appropriate compensation to meet this critical national energy need. PLEASE READ THIS SENTENCE AGAIN...now, let me paint it RAW AND UGLY...as I write this post the NEI, DOE, DOD and the Military/Commercial Industry are in NEGOTIATIONS, ARE LOBBYING for a PRESIDENTIAL EXECUTIVE ORDER THAT WILL TAKE AWAY YOUR SAY, WILL DE FACTO MAKE WHAT IS CONTAINED IN THIS ARTICLE HAPPEN.

David S. Kosson and Charles W. Powers are professors of civil and environmental engineering at Vanderbilt University. They focus on development of multidisciplinary solutions to nuclear waste management issues.

Saturday, March 21, 2009

PRIMER-OPSEC (Operational Security) For Stake Holder Communities

The NRC is failing miserably in doing their job of protecting host communities from the potential risks of a successful terrorist attack on a nuclear reactor. Setting aside the WATERED DOWN DBT they are relying upon, their hiding of it from the public is putting us at risk. Their refusal to educate us about OPSEC, their refusal to speak to Host Communities about SECURITY RELATED issues puts us at risk...in short, they are perpetuating stupidity, ruining opportunity to have the public in stake holder communities as their allies. To help compensate for their ignorance through arrogance, GNU has scoured the web and came across some great things at a NASA OPSEC site on security, and what you as a person living in the circle of death around Indian Point should know...who knows, studying our primer, visiting the links might help you one day report suspicious activity that saves us all.

The NRC is failing miserably in doing their job of protecting host communities from the potential risks of a successful terrorist attack on a nuclear reactor. Setting aside the WATERED DOWN DBT they are relying upon, their hiding of it from the public is putting us at risk. Their refusal to educate us about OPSEC, their refusal to speak to Host Communities about SECURITY RELATED issues puts us at risk...in short, they are perpetuating stupidity, ruining opportunity to have the public in stake holder communities as their allies. To help compensate for their ignorance through arrogance, GNU has scoured the web and came across some great things at a NASA OPSEC site on security, and what you as a person living in the circle of death around Indian Point should know...who knows, staking our primer, visiting the links might help you one day report suspicious activity that saves us all.
imageProtecting
Sensitive

Protecting Sensitive Unclassified Information


Overview

The term sensitive unclassified information as used here is an informal designation applicable to all those types and forms of information that, by law or regulation, require some form of protection but are outside the formal system for classifying national security information.1 As a general rule, all such information may be exempt from release to the public under the Freedom of Information Act. This module reviews the most common types of sensitive unclassified information.2 Again, this is a designation being used far to frequently just because certain people want the general public kept in the dark...Transparancy is a good thing.

Department of Defense also uses the term Controlled Unclassified Information (CUI) to refer to certain types of sensitive information within DoD that require controls and protective measures. CUI includes For Official Use Only and information with comparable designations that is received from other agencies, DoD Unclassified Controlled Nuclear Information, "Sensitive Information" as defined in the Computer Security Act of 1987, and DoD technical data.3

Some information that is not formally designated as sensitive is nonetheless inappropriate for putting on a public Internet site. This is discussed in Pre-Publication Review of Public Web Site Content.

Most categories of sensitive unclassified information are defined by federal law, while others such as For Official Use Only are defined by organization policy and some government organizations use different names for this category of information. Most legislative authorities are very specific in identifying the protected category of information, while others are general and leave much discretion to the agency or company.

Procedures for safeguarding sensitive unclassified information depend upon the category of information and, in some cases, vary from one agency or company to another.

Personal Conduct and
Reporting Requirements

Standards of Personal Conduct
What is expected of me? Examples of behavior of potential security concern. Guidelines for adjudicating security clearances.

Self-Reporting on Your Personal Activities
Reporting foreign contacts, foreign travel, intent to marry or cohabitate, financial and substance abuse issues, certain outside activities, etc. Pre-publication review. Reporting foreign intelligence activities.

Reporting Improper, Unreliable, or Suspicious Behavior
Reporting responsibilities. Counterintelligence indicators. Security and suitability issues. Preventing violence. No good excuses for not reporting. Examples of how people like you made a difference. Hot line phone numbers.

U.S. Government Ethics Standards
Gifts. Frequent Flyer Benefits. Impartiality. Misuse of Position. Financial Interests. Outside Activities. Post-Employment Limitations.

Foreign Threats
To Protected Information

Who's Doing What to Whom?
Economic collection and industrial espionage. Illegal technology transfer. Computer crime. National Security Threat List. Militarily Critical Technologies List. Economic Espionage Act of 1996.

How Do I Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted.

Getting Information Out of Honest People Like Me
Elicitation. Unsolicited requests. False pretenses. Short-term foreign visitors. Long-term foreign visitors. Joint ventures/foreign acquisitions. Open source collection. Theft and dumpster diving.

Risks During Foreign Travel
Country threat updates. Security and safety recommendations. Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.

Antiterrorism and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package and letter bombs. Kidnapping and hostage survival guidelines. Hijacking survival guidelines. DOD Code of Conduct.

Computer and Other
Technical Vulnerabilities

Computer Vulnerabilities
Threats to computer security, how hackers work, and how we unintentionally make it easy for them. Passwords, "social engineering," case studies, using the Internet securely, e-mail, viruses, security of hard drives, theft of laptop computers.

Intercepting Your Communications
Telephones, fax machines, cell phones, cordless phones, answering machines, voice mail, intercoms and baby monitors, countermeasures.

Bugs and Other Eavesdropping Devices
Eavesdropping threat. Methods of eavesdropping. Detecting and Preventing Eavesdropping.

image
Reporting Improper, Unreliable, & Suspicious Behavior

bar

Reporting Responsibilities

If you are entrusted with safeguarding classified material, you are expected to report potentially significant, factual information that comes to your attention and that raises potential security concerns about a co-worker. You are also strongly encouraged to help co-workers who are having personal problems that may become a security issue if the problems are not addressed.

Presidential Executive Order 12968 on "Access to Classified Information" states: "Employees are encouraged and expected to report any information that raises doubts as to whether another employee's continued eligibility for access to classified information is clearly consistent with the national security." It states further that the head of each agency that grants access to classified information shall establish a program to educate employees with access to classified information about their individual responsibilities under this order.1 This security guide meets that requirement.

The information presented under Counterintelligence Indicators, Security and Suitability Issues, Preventing Violence, and Suicide Crisis Intervention is background information to help you judge whether a co-worker’s behavior raises concerns that merit reporting to an appropriate authority.

Related Topics: Exploring the Mind of the Spy, Treason 101, Spy Stories

Reference
1. Director of Central Intelligence Directive 6/4 also imposes an "obligation to report to proper authorities any information which could reflect on the trustworthiness of an individual who has access to SCI."

imageTreason 101

Treason 101

bar
Overview

Your short course in Treason is a series of articles on how spies are caught, the prevalence of espionage, and why people spy.

It starts with a short piece on How Spies Are Caught. That comes first, as it is so important for anyone who may be considering espionage to understand that they WILL be caught. Perhaps not right away, but eventually. The statute of limitations does not apply to the crime of espionage. Anyone who commits this crime will have to be looking over their shoulder for the rest of their life.

The Insider Espionage Threat identifies four conditions that must exist before espionage occurs – opportunity to commit the crime; motive; ability to overcome inhibitions such as moral values, fear of being caught, and loyalty to employer or co-workers; and a trigger that sets the betrayal in motion. The article then analyzes how these pre-conditions for betrayal are increasing as a result of changes in social and economic conditions in the United States, and in our relations with the rest of the world.

Explosive growth in information technology is increasing exponentially the amount of information that can be collected and compromised by a single, well-placed spy. Insider Threat to Information Systems examines some of the unique security issues associated with computer professionals.

Exploring the Mind of the Spy discusses what psychologists have learned by interviewing and testing arrested and convicted American spies. Motivations for espionage are far more complex than commonly believed. Selling secrets is usually the last act of a long-simmering emotional crisis. In many cases, the symptoms of this crisis have been observable, identifiable, and even treatable before the damage was done. Typically, however, the potential significance of the "at-risk" behavior has not been recognized or reported at the time by coworkers or supervisors.

Espionage by the Numbers describes an unclassified database on all Americans arrested for espionage since the start of the Cold War. Based on media reports, trial records and unclassified official documents, the data base records information characteristics of the spies, characteristics of the espionage activity, and prevalence among the spies of several behaviors that are commonly associated with security risk.

Counterintelligenceimage - fish
If a story smells fishy, it probably is fishy!

Counterintelligence Indicators

Counterintelligence indicators are signs that an individual may already be involved in espionage or other improper use of classified information. The record of past espionage cases shows that co-workers and supervisors often overlooked or failed to report counterintelligence indicators which, had they been reported, would have permitted earlier detection of the spy.

Some of the following indicators are clear evidence of improper behavior. Others may well have an innocent explanation but are sufficiently noteworthy that your security office should be informed. If you become aware that any of the following indicators apply to one of your co-workers, you are expected to report this information directly to your security office or a counterintelligence office, or by calling any one of the Hotline Numbers that various organizations have set up for this purpose.

The security office will evaluate the information in the context of all other information known about the individual. Depending upon the circumstances, action may range from simply making a note in the individual's security file to conducting a discrete investigation.

If your reporting helps stop a case of espionage, you may be eligible for a reward of up to $500,000. The reward is authorized by an amendment to Title 18, U.S.C., Section 3071, which authorizes the Attorney General to make payment for information on espionage activity in any country which leads to the arrest and conviction of any person(s):

  • For commission of an act of espionage against the United States.
  • For conspiring or attempting to commit an act of espionage against the United States
  • Or which leads to the prevention or frustration of an act of espionage against the United States.

Reportable Indicators

bullet Indicators of Potential Motivation

  • Disgruntlement with one's employer or the U.S. Government strong enough to make the individual desire revenge.
  • Any statement that, considering who made the statement and under what circumstances, suggests potential conflicting loyalties that may affect handling of classified or other protected information
  • Active attempt to encourage military or civilian personnel to violate laws, disobey lawful orders or regulations, or disrupt military activities.
  • Knowing membership in, or attempt to conceal membership in, any group which: 1) advocates the use of force or violence to cause political change within the U.S., 2) has been identified as a front group for foreign interests, or 3) advocates loyalty to a foreign interest.
  • Repeated statements or actions indicating an abnormal fascination with and strong desire to engage in "spy" work. Fantasies of oneself as a James Bond.

bullet Potential Indicators of Information Collection

  • Asking others to obtain or facilitate access to classified or unclassified but protected information to which one does not have authorized access.
  • Obtaining or attempting to obtain a witness signature on a classified document destruction record when the witness did not observe the destruction.
  • Offering extra income from an outside activity to a person with a sensitive job, in an apparent attempt to entice that person into some unspecified illegal activity.
  • Undue curiosity or requests for information about matters not within the scope of the individual’s job or need-to-know.
  • Unauthorized removal or attempts to remove classified, export-controlled, proprietary or other protected material from the work area.
  • Retention of classified, export-controlled, proprietary, or other sensitive information obtained at a previous employment without the authorization or the knowledge of that employer.
  • Extensive use of copy, facsimile, or computer equipment to reproduce or transmit classified, sensitive, or proprietary material which may exceed job requirements.

cartoon

  • Taking classified materials home or on trips, purportedly for work reasons, without proper authorization.
  • Working odd hours when others are not in the office without a logical reason, or visiting work areas after normal hours for no logical reason.
  • Bringing cameras or recording devices, without approval, into areas storing classified or other protected material.

bullet Potential Indicators of Information Transmittal

  • Storing classified material at home or any other unauthorized place.
  • Short trips to foreign countries, or within the U.S. to cities with foreign diplomatic facilities, for unusual or unexplained reasons, or that are inconsistent with one’s apparent interests and financial means.
  • Excessive and/or unexplained use of e-mail or fax.
  • Failure to comply with regulations for reporting foreign contacts or foreign travel. Any attempt to conceal foreign travel or to conceal close and continuing contact with a foreigner, particularly a foreign official.
  • Foreign travel not reflected in the individual’s passport to countries where entries would normally be stamped.
  • Maintaining ongoing personal contact, without prior approval, with diplomatic or other representatives from countries with which one has ethnic, religious, cultural or other emotional ties or obligations, or with employees of competing companies in those countries.

bullet Potential Indicators of Illegal Income

  • Unexplained affluence, or life-style inconsistent with known income. Includes sudden purchase of high-value items or unusually frequent personal travel which appears to be beyond known income. Sudden repayment of large debts or loans, indicating sudden reversal of financial difficulties.
  • Joking or bragging about working for a foreign intelligence service, or having a mysterious source of income.

bullet Other Potential Indicators

  • Behavior indicating concern that one is being investigated or watched, such as actions to detect physical surveillance, searching for listening devices or cameras, and leaving "traps" to detect search of the individual’s work area or home.
  • Any part-time employment or other outside activity that may create a conflict of interest with one's obligation to protect classified or other sensitive information, and that has not been approved by the security office.
  • Attempt to conceal any activity covered by one of these counterintelligence indicators.

Tuesday, March 17, 2009

Yucca Moutain Gone, NEI Wants To DUmp Rad Waste At Sea

Keith Johnson from the Wall Street Journal has made it official...the Nuclear Industry, not ready to admit defeat (they cannot SAFELY DISPOSE OF RADIATIVE WASTES) is floating around some new old ideas to deal with the ever growing pile of RADIATIVE WASTES that are unlawfully and illegally stacking up at sites such as Indian Point on the banks of the Hudson River.

Quick Question...we have been paying a surcharge for some time now to have the DOE REMOVE THOSE WASTES IN A TIMELY FASHION...is there a class action attorney out there willing to file a suit on this for the citizens? I already have enough citizen stakeholders for such a Class Action Case...email me at strikeforcenews if you are interested in this as a Pro Bono Case. (Several Utility Companies have already successfully SUED, and gotten MILLIONS, and it is not even THEIR MONEY in the fund.)

Back to the story...seems that the NRC, DOE and NEI are trying to force people to reconsider Yucca Mountain as the storage solution by floating the Disney "Under The Sea" option that has been around for a few decades now. Rather than rehash what is already included in a well linked story, lets share with you what Keith Johnson and the Wall Street Journal have to say on this explosive issue.

Quake Zone: A Really, Really Deep Storage Solution for Nuclear Waste

Now that Yucca Mountain, the proposed storage site for nuclear waste, is off the table, a host of alternative storage options are surfacing—or resurfacing.


Governments around the world have been struggling to find the best way to store spent nuclear fuel. For two decades, the U.S. was committed to burying it in Yucca Mountain, Nevada. France reprocesses its spent fuel. Other countries, such as Spain, have considered storing the stuff above-ground in sealed concrete containers. If nuclear power is to play a bigger part in the nation’s energy mix, the U.S. needs to find a solution to the long-term storage question.


One old idea making the rounds again is deep, deep geological storage. As in sticking nuclear waste inside the earth’s mantle. The idea is to put spent fuel on tectonic plates, and then send it on a one-way ride on the geological conveyor belt into the earth’s crust, where the waste will be sequestered by massive heat and pressure. Greentech Media takes a look at some of the idea’s latest proponents.


Using the earth’s subduction zones for nuclear storage isn’t a new idea—it’s been floating around for decades. The U.S. Department of Energy briefly had a research office dedicated to sub-sea storage solutions. The problems, though, are both technical and political.


Technically, no one has yet found a reliable way to stick the waste so far down. Fears that colliding continental plates could actually push up waste—rather than push it down—have also long dogged the idea. Additionally, international conventions against dumping any radioactive waste in the ocean is a big roadblock for subsea storage ideas.


Those are the main reasons the British government discarded the idea in 2006, along with other far-out ideas such as sticking nuclear waste in ice or in outer space. The Committee on Radioactive Waste Management found that there’s “no proof of concept” for subduction-zone storage, and there’s “no foreseable change” in international treaties limiting its application.


Still, only so much spent fuel can be stored on site at the country’s nuclear reactors. Sooner or later, the government needs to find a solution to the storage question, or nuclear power’s expansion will be physically constrained. Will the Jules Verne-style solution be the answer?