Fusion at Lawrence Livermore National Laboratory

Source: The target chamber of LLNL’s National Ignition Facility, where 192 laser beams delivered more than 2 million joules of ultraviolet energy to a tiny fuel pellet to create fusion ignition. Lawrence Livermore National Laboratory.

Preface. Anyone who thought the recent headlines about a “Nuclear Fusion Breakthrough” were true, might be surprised to know that most media left out one or more of the following important information:

  • That the purpose of the Lawrence Livermore National Laboratory (LLNL) National Ignition Facility (NIF) is to test nuclear bombs to be sure they’ll explode and make better nuclear weapons in the future
  • There is no goal of generating electricity from fusion, only testing weapons at LLNL
  • That 100 times more energy was used to charge the lasers (300 MJ) than came out
  • The huge size of the facility required — three football fields containing 192 lasers to blast a sphere the size of a peppercorn that needs to be made of diamond and perfectly round and blasted at exactly the same time from all lasers
  • A power plant based on this method would need to make 10 shots per second on one million capsules a day that are made, filled, positioned, blasted, and cleared away (Clery 2022)
  • That attempts usually fail because the peppercorn sphere must be absolutely perfect plus the lasers must all fire together within 25 trillionths of a second
  • That most tests fail because of the perfection required
  • Each capsule costs hundreds of thousands of dollars paid for with $349 million a year of government money, $3.5 billion since 2010 (Hunt 2022).
  • It takes a day for the lasers to cool down after a single shot, but fusion electricity would require the lasers to fire 10 times a second

Continue reading

Posted in Fusion, Nuclear War | Tagged , , , , , | Comments Off on Fusion at Lawrence Livermore National Laboratory

Fusion: Tokamak Obstacles

Source: Sparkes M (2022) Korean nuclear fusion reactor achieves 100 million°C for 30 seconds. New Scientist.

Preface. Hope springs eternally for Fusion.  I’ve come to see press releases about fusion breakthroughs as mostly a way to get more startup investment or government funding.

The Buttery (2021) excerpt is mainly to show you how impossible it is to explain the technical challenges without a PhD in nuclear engineering.  Nate Hagens calls the future “The Great Simplification” when high levels of complexity, precision, supply chains, energy and more won’t make fusion, semiconductors, computers, or even toasters possible.

A post that better explains fusion and why it has failed so far (and probably forever) in plain language is Fusion: Book review of “Sun in a Bottle”

Continue reading

Posted in Fusion, Robert Hirsch | Tagged , , | 1 Comment

Opposition to mining will prevent a green transition to renewables

Source: Bare (2012) Environmentalists win review of two more plants near Rosemont copper mine. Arizona Capitol times.

I could overwhelm you with world-wide trillions of tons of mining waste and how China has rendered 20% of its farmland too toxic to grow crops (BBC 2014), but let’s just zoom in on one mine in Arizona. In 2022, 13 years after the Rosemont Copper Mine near Tuscon, AZ was proposed in 2009, was finally shut down after strong opposition.

Continue reading

Posted in Alternative Energy, An Index of Best Energyskeptic Posts, Energy Supply Chain, Mining, Peak Copper | Tagged , , , | Comments Off on Opposition to mining will prevent a green transition to renewables

President George W. Bush energy policy & hurricane Katrina

Preface. After Hurricane Katrina damaged oil and gas infrastructure, oil prices shot up. Below are excerpts from news stories in 2005 when President Bush, an oilman, openly discussed the U.S. energy dependence.

Continue reading

Posted in Energy Policy & Politicians, Hurricanes, U.S. Congress Energy Policy | Tagged , , , , | 1 Comment

The electric grid could be down for years if LPTs destroyed

Large Power Transformer Source: ABB Conversations (2013)

Preface. This post contains excerpts from two Department of Energy documents and one about large geomagnetic storms and how they would affect Large power transformers (LPT) and the U.S. electric grid. They are key essential critical infrastructure to keep the electric grid up, and enormous, up to 800,000 pounds making them expensive and hard to deliver. And vulnerable to supply chain failures because the largest ones are not made in the U.S.

If large power transformers are destroyed by a geomagnetic disturbance (GMD) electromagnetic pulse (EMP), cyber-attack, sabotage, severe weather, floods, or simply old age, parts or all of the electric grid could be down in a region for 6 months to 5 years.

Continue reading

Posted in An Index of Best Energyskeptic Posts, Electric Grid, Electricity Infrastructure, Infrastructure & Fast Crash, Interdependencies | Tagged , , , , , , , , | 1 Comment

550,000 abandoned mines, $50 billion to clean the worst ones

Aerial photo of waste water rushing out of the Gold King mine in Silverton, CO. Photo: Steve Garrison/The Daily Times

Aerial photo of waste water rushing out of the Gold King mine in Silverton, CO. Photo: Steve Garrison/The Daily Times

Preface. Below are excerpts of a US House 2010 congressional hearing on cleaning up abandoned mines.

Abandoned mines can cause soil erosion, heavy metal contamination (i.e., cyanide, lead, arsenic, mercury, uranium), and acid drainage that threatens thousands of streams and rivers. The EPA estimates it would cost $50 billion to reclaim abandoned and inactive mine sites. Cleanup funds don’t exist because mining companies, unlike gas and oil concerns, do not pay royalties to the federal government for what they extract from public lands.

The U.S. Bureau of Land Management began requiring funds from miners in 2001 to use for cleanup, though many doubt there is enough money.  Environmental groups are also trying to force the EPA to require mining companies to set aside cleanup money.

Continue reading

Posted in Chemical Pollution, Congressional Record U.S., Hazardous Waste, Mining, Pollution, Water Pollution | Tagged , , , , | 1 Comment

Cybersecurity supply chain deep dive assessment U.S. Department of Energy

Preface. I’ve been reading about cyber threats since 2007, and a problem still true today is that the government can do nothing except a few puny regulations here and there for the most part, since critical infrastructure like energy and finance are in PRIVATE hands.

Continue reading

Posted in CyberAttacks, Energy Supply Chain | Tagged , , , | Comments Off on Cybersecurity supply chain deep dive assessment U.S. Department of Energy

Uranium waste from 50+ sites contaminating groundwater

Preface. One of the top priorities of collapse from energy decline is to clean up nuclear (Superfund and other hazardous) wastes NOW, while we have the energy and technical ability to do so. Future generations will be thrown back into the 14th century (life before coal), we simply must clean up our mess to keep from harming thousands of future generations.

Summary. ProPublica writes about during the cold war the U.S. quickly mined and processed uranium at over 50 sites with no plan for cleaning up the 250 million tons of toxic & radioactive tailings left behind. Because of that over 84% of these sites have polluted groundwater. Most of them are out west where water is scarce and valuable. Cleanup is proceeding slowly for reasons such as too many bureaucracies and infighting among regulatory agencies.

Continue reading

Posted in Chemical Pollution, Hazardous Waste, Nuclear Waste, Peak Water | Tagged , , | Comments Off on Uranium waste from 50+ sites contaminating groundwater

Risks of cyber attack on Infrastructure

Delacourt TP (2022) Cyberattacks on Critical Infrastructure as the New WMD. Homeland Security.

Preface. What follows are several articles on how cyber attacks could harm our infrastructure across at least 16 systems we depend on.  Although it is the decline of fossil fuels that will cause the most suffering and deaths, we’ve allowed modern civilization to be almost as dependent on electricity across infrastructure (health, finance and more).  This issue is so widespread, of such magnitude that I have made many posts on this topic to try to convey the myriad complexities, which I continue to marvel at.  So there are other posts on this topic here too.

Continue reading

Posted in CyberAttacks, Electric Grid | Tagged , , | Comments Off on Risks of cyber attack on Infrastructure

Infrastructure interdependencies: an attack on one is an attack on all

EnergyInfra affects all other Infra

An Attack on Energy Infrastructure would affect all other Infrastructure

I should consolidate my many posts on cyber attacks, EMPs, and other ways the electric grid could come down, but our dependencies are just so widespread that I don’t want to bury gather the myriad ways our lives depend on electricity in a gigantic post no one will read. The grid will come down eventually though, because it is still nearly two-thirds powered by FINITE coal and natural gas power plants, and as I explain in posts in category Energy Storage, there is no way to store electricity long enough to keep the grid up.

Developments in digital information and telecommunications dramatically increased inter-dependencies among U.S. critical infrastructures. Each depends on others to function successfully. Disruptions in a single infrastructure can generate disturbances within others over long distances and amplify the effects of a disruption. The energy infrastructure provides essential fuel to all of the other critical infrastructures, and in turn depends on the Nation’s transportation, information technology (IT), communications, finance, and government infrastructures. Over time cyber/IT dependencies have increased.  Energy control systems and the information and communications technologies on which they rely play a key role in the North American energy infrastructure. They are essential in monitoring and controlling the production and distribution of energy. They have helped to create the highly reliable and flexible energy infrastructure in the U.S.

Alice Friedemann  www.energyskeptic.com  Author of Life After Fossil Fuels: A Reality Check on Alternative Energy; When Trucks Stop Running: Energy and the Future of Transportation”, Barriers to Making Algal Biofuels, & “Crunch! Whole Grain Artisan Chips and Crackers”.  Women in ecology  Podcasts: WGBH, Jore, Planet: Critical, Crazy Town, Collapse Chronicles, Derrick Jensen, Practical Prepping, Kunstler 253 &278, Peak Prosperity,  Index of best energyskeptic posts

***

Energy Infrastructure

Electric Grid – see “What would happen if the electric grid was cyberattacked?

Energy distribution, equipment, refineries, and so on rely on SCADA and other computer systems that could be cyber (and physically) attacked.   In fact, the entire oil refining process depends on computers, from computer operation stations with digital proximity switches and other devices to operate valves and switches, monitor critical parameters, and provide automatic shutdown procedures.

Without a stable energy supply, health and welfare are threatened and the U.S. economy cannot function.

Petroleum

  • 525,000 crude oil producing wells
  • 30,000 miles of oil gathering pipelines
  • 51,000 miles of crude oil pipeline
  • 116,000 miles of product pipeline
  • 150 petroleum refineries
  • 1,400 petroleum terminals

Natural Gas

  • 478,562 gas production and condensate wells
  • 20,215 miles of gathering pipes
  • 550 gas processing plants
  • 319,208 miles of interstate and intrastate distribution pipelines
  • 399 underground storage facilities
  • 1,200,000 miles of pipelines to distribute natural gas to homes and businesses

How hard would it be to attack (energy) infrastructure?

STATEMENT OF JAMES A. LEWIS, DIRECTOR AND SENIOR FELLOW, TECHNOLOGY AND PUBLIC POLICY PROGRAM, CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES

You can download the tools that will find critical infrastructure vulnerabilities easily off the internet. I did it last week and I toyed around with it and found 6,000 vulnerable networks  Combine these reconnaissance tools with the attack tools available in the cyber crime black market, and someone with good hacking skills—and there are many in these groups—could attack the poorly-defended critical infrastructures that are found in this country.

As cyber attack capabilities become commoditized, the temptation for these politically motivated groups to use them against vulnerable U.S. targets will increase.

The number of nations seeking to acquire cyber attack capabilities is growing rapidly— cyber attack is becoming a standard element in military planning. A more troubling development is that new classes of opponents are seeking the ability to launch cyber attacks. These new classes of opponents will not be as easily constrained. They are more likely to use cyber attack and all evidence suggests that we have nothing in the way of adequate defense. We simply do not take the threat of cyber attack seriously.

The area of greatest concern is in the diffusion of the ability to attack critical infrastructure, to less responsible and less deterrable actors who may calculate that it is in their interest to launch a cyber attack against the United States. Attack capabilities could spread if private hackers to independently discover the techniques currently possessed by governments. Some members of the hacker community have amazing capabilities. Another way attack capabilities could spread would be for hackers who are government proxies in Russia and China to ‘‘commercialize’’ the skills and tools they have been provided for official purposes. These proxies receive training and support from military and intelligence agencies. They also participate in the cyber crime black markets. The flow from government agencies to proxies to the black market is likely.

Unfortunately, even private hackers can exploit freely available information on vulnerabilities and penetration techniques to attack many commercial networks and the critical infrastructure connected to them. Why use an advanced attack like Stuxnet when a simple attack will work so well? There are tools that allow anyone to scan the internet to find unprotected digital devices at critical infrastructure facilities that connect control systems to the internet. You can scan for devices that are improperly configured, devices such as wireless routers that come from the manufacturer with the password set as ‘‘password.’’ It does not take a mastermind to break into such systems. These tools are widely available. Informal tests using these tools can find several thousand insecure connections in the United States on any given day. They provide a ‘‘consumer version’’ of the cyber reconnaissance an advanced power would carry out in planning an attack against the United States. Combine these publicly available reconnaissance tools with attack tools available on the cyber crime black market, and anyone with sufficiently advanced hacking skills will be able to attack poorly defended critical infrastructure or other commercial targets.

We must also consider motivation and intent, in addition to capability. The few nations that currently possess advanced cyber attack capabilities are deterred by American military force or they are our allies. Most cyber criminals only engage in actions that generate income. Attacking critical infrastructure does not generate income unless extortion is involved (by threatening to disrupt services if the criminal is not paid). Cyber criminals have no motive to launch a cyber attack unless they are acting as government proxies or unless they have been hired as mercenaries. This is where the nexus between the diffusion of attack capabilities and intent become important. There are countries and groups that would like to attack the United States and are not as deterrable as our current adversaries. As nations and hackers develop more sophisticated attack capabilities and as sophisticated attack tools become available on the cyber crime black market, the threat of attack is increasing.

We know that two countries hostile to the United States are developing cyber attack capabilities. North Korea has been pursuing cyber capabilities for more than a decade but the backwardness of its economy has so far limited its success. North Korea lacks easy access to advanced technologies. Its tightly controlled population is an unlikely source of hackers, as North Koreans do not have the independence and internet access hackers need to thrive. Technological backwardness and political culture are major obstacles to developing strong hacking capabilities, but, as with nuclear weapons, if North Korea is able to support sustained investment in cyber attack capabilities and find some outside support, it will eventually acquire them. North Korea’s erratic behavior suggests it will use cyber attacks against South Korea, Japan, or U.S. forces in Korea, should it succeed in its long quest to obtain a cyber attack capability.

Iran is a more troubling case. Iran has also been pursing the acquisition of cyber attack capabilities for several years. Iran has been for many years willing to attack U.S. forces and embassies in the region, and FBI Director Mueller stated in recent testimony that Iran is more willing to carry out attacks inside the United States. Statements by Iranian officials show that they believe that the United States, along with Israel, was responsible for the Stuxnet attacks and suggest that they believe they would be justified in retaliating in kind. Iran’s attack capabilities are still limited but they have probed Israeli networks in what appear to be tests. Iranian hackers have greater access to the internet and to the cyber black market than North Korea, suggesting that their development of cyber capabilities will be more rapid.

Iran, even more than North Korea, could miscalculate the costs of a cyber attack against the United States. Iran has groups that it sponsors, like Hezbollah, that it has used in the past to attack Americans. The Iranians may believe that these proxies will make it difficult for the United States to attribute an attack and this will reduce their perceptions of the risk of a cyber attack on American targets.

STATEMENT OF GREGORY C. WILSHUSEN, DIRECTOR, INFORMATION SECURITY ISSUES, GOVERNMENT ACCOUNTABILITY OFFICE

We have also identified vulnerabilities and industrial control systems that monitor and control sensitive processes and physical functions supporting the Nation’s critical infrastructures. Federal agencies continue to report an increasing number of cybersecurity incidents. Over the past 6 years, the number of incidents reported by Federal agencies to US–CERT has risen nearly 680 percent, to almost 42,900 in fiscal year 2011. These incidents include unauthorized access and improper use of computing resources and the installation of malicious software on systems. Reported attacks and unintentional incidents involving Federal, private, and critical infrastructure systems occur daily and demonstrate that their impact can be serious.

Other vulnerable infrastructure

These are all essential for the functioning of an economy. Destruction or compromise of any of these systems/services would be debilitating either directly or through cascading effects.

  • Agriculture
  • Banking and Finance
  • Chemical and Hazardous materials
  • Commercial assets
  • Dams
  • Defense industrial base
  • Emergency services
  • Energy
  • Information technology
  • National monuments and icons
  • Nuclear power
  • Organizations
  • Postal and shipping
  • Public Health
  • Telecommunications
  • Transportation
  • Water and water treatment systems

August 2, 2013. Tom Simonite. Chinese Hacking Team Caught Taking Over Decoy Water Plant. A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.  TechnologyReview

References

CYBERSECURITY. Threats Impacting the Nation. April 24, 2012. Subcommittee on Oversight, Investigations, and Management, Committee on Homeland Security, House of Representatives.

Energy Sector-Specific Plan. An annex to the National Infrastructure protection plan. 2010. United States Department of Energy & Homeland Security.

Spellman, Frank. 2010. Energy Infrastructure Protection and Homeland Security

Related articles (links to some of these may be broken but most of them are still here)

Electric Grid

Posted in CyberAttacks, Infrastructure & Collapse, Infrastructure & Fast Crash, Interdependencies, Natural Gas, Oil | Tagged , , , , | Comments Off on Infrastructure interdependencies: an attack on one is an attack on all