What's new

'Radioactive leakage' spreads panic in Delhi shop

^^^ but you can create a new thread on it right? why are you posting off topic on this thread?:hang2:
 
^^^ but you can create a new thread on it right? why are you posting off topic on this thread?:hang2:

ya thats sound good..... if i am off the topic then mod can fix it thanks...
 
india cannot hide the mysterious killing of its Nuclear Scientists from the eyes of world media? Further, the insecure and outdated Nuclear Installations are raising concerns about possible catastrophe like Chernobyl.

Source: IndiaDaily - Who killed Indian Nuclear power plant scientist, N Mahalingam?

“This was the second time Mr. Mahalingam went missing. Earlier, while working at Kalpakkam nuclear power plant in Tamil Nadu, he was reported missing for few days but had returned home later. This time he never returned. Someone killed him.

Ending the mystery over the disappearance of the Indian Nuclear power plant scientist, N Mahalingam, Naval divers on Saturday recovered his body from the Kali River, six days after he went missing.

But who killed the Indian nuclear scientists? This is not the first time Indian nuclear scientists are killed. Vikram Sarabhai was killed by two Christian woman spies sent to him in Kovalam palace in Thiruvananthapuram, Kerala by a foreign agency. Homi Bhabha was killed in a plane crash created by a foreign spy agency to stall India’s progress science and technology.

But the western foreign agencies are not after small fries in India these days. They buy the whole parliament and implant foreign agent at the very top these days. Then who killed the Indian nuclear scientists this time? Were the Islamic terrorists behind this heinous act?

Naval divers fished out the body of Mahalingam, the scientific officer at the plant, who was reported missing during a morning walk on June 8, from the river flowing near the Kaiga Township, police said. Police said they are investigating whether Mr. Mahalingam had drowned or there was any foul play.”

In my recent article I raised the issue of Naxal’s threat to Indian Nuclear Arsenal. Some of my critics thought that to be a baseless claim. But now things are showing signs of the intensity. It is the easiest thing for India to put garbage on Pakistan’s head this time also, but the situation cannot be publicized so easily. Presently it is the matter of India’s own and most important matter of weakness and lapses in internal security arrangements. One can ask that if Indian Scientists are so vulnerable prey to terrorists like Naxals and most probably Muslim extremists inside India, then how India can assure the world that it’s Nuclear Arsenal is safe and secure.

The possible take over of Indian Nuclear Arsenal by Naxal is an important issue and needs the attention of super powers of the world.

Recent American deal with India to provide Civil Nuclear Technology is a positive development. The reactors which India will build after this deal would definitely be safe and according to the international standards of safety and security. But the question arises, what will be the fate of those outdated Reactors which were built on the basis of obsolete Russian technology? Majority of those have been perished, ill maintained and alarmingly dangerous when nuclear contamination and leakages are expected.
Most recently Mr. Ashwin Kumar and Mr. M. V. Ramana posted a shocking report about the poor security and risks of contamination on the major Indian Nuclear Reactors. (Ashwin Kumar - A doctoral student in the Department of Engineering and Public Policy at Carnegie)

Understanding the seriousness the complete report is reflected here for better knowledge about the situation.

Source: Severe accident risk at India's fast breeder nuclear reactor - South Asia Citizens Web

“India's Department of Atomic Energy (DAE) is planning a large expansion of nuclear power, in which fast breeder reactors play an important role. Fast breeder reactors are attractive to the DAE because they produce (or "breed") more fissile material than they use. The breeder reactor is especially attractive in India, which hopes to develop a large domestic nuclear energy program even though it has primarily poor quality uranium ore that is expensive to mine.

Currently, only one fast reactor operates in the country--a small test reactor in Kalpakkam, a small township about 80 kilometers (almost 50 miles) south of Chennai. The construction of a larger prototype fast breeder reactor (PFBR) is underway at the same location. This reactor is expected to be completed in 2010 and will use mixed plutonium-uranium oxide as fuel in its core, with a blanket of depleted uranium oxide that will absorb neutrons and transmute into plutonium 239. Liquid sodium will be used to cool the core, which will produce 1,200 megawatts of thermal power and 500 megawatts of electricity. The reactor is to be the first of hundreds that the DAE envisions constructing throughout India by mid-century.

However, such an expansion of fast reactors, even if more modest than DAE projections, could adversely affect public health and safety. While all nuclear reactors are susceptible to catastrophic accidents, fast reactors pose a unique risk. In fast reactors, the core isn't in its most reactive--or energy producing-- configuration when operating normally. Therefore, an accident that rearranges the fuel in the core could lead to an increase in reaction rate and an increase in energy production. If this were to occur quickly, it could lead to a large, explosive energy release that might rupture the reactor vessel and disperse radioactive material into the environment.

Many of these reactors also have what is called a "positive coolant void coefficient," which means that if the coolant in the central part of the core were to heat up and form bubbles of sodium vapor, the reactivity a measure of the neutron balance within the core, which determines the reactor's tendency to change its power level (if it is positive, the power level rises)--would increase; therefore core melting could accelerate during an accident. (A positive coolant void coefficient, though not involving sodium, contributed to the runaway reaction increase during the April 1986 Chernobyl reactor accident.) In contrast, conventional light water reactors typically have a "negative coolant void coefficient" so that a loss of coolant reduces the core's reactivity. The existing Indian fast breeder test reactor, with its much smaller core, doesn't have a positive coolant void coefficient. Thus, the DAE doesn't have real-world experience in handling the safety challenges that a large prototype reactor will pose.

More largely, international experience shows that fast breeder reactors aren't ready for commercial use. Superphénix, the flagship of the French breeder program, remained inoperative for the majority of its 11-year lifetime until it was finally shuttered in 1996. Concerns about the adequacy of the design of the German fast breeder reactor led to it being contested by environmental groups and the local state government in the 1980s and ultimately to its cancellation in 1991. And the Japanese fast reactor Monju shut down in 1995 after a sodium coolant leak caused a fire and has yet to restart. Only China and Russia are still developing fast breeders. China, however, has yet to operate one, and the Russian BN-600 fast reactor has suffered repeated sodium leaks and fires.

When it comes to India's prototype fast breeder reactor, two distinct questions must be asked: (1) Is there confidence about how an accident would propagate inside the core and how much energy it might release?; and (2) have PFBR design efforts been as strict as necessary, given the possibility that an accident would be difficult to contain and potentially harmful to the surrounding population?

The simple answer to both is no.

The DAE, like other fast-reactor developers, has tried to study how severe a core-disruptive accident would be and how much energy it would release. In the case of the PFBR, the DAE has argued that the worst-case core disruptive accident would release an explosive energy of 100 megajoules. This is questionable.

The DAE's estimate is much smaller when compared with other fast reactors, especially when the much larger power capacity of the PFBR--and thus, the larger amount of fissile material used in the reactor--is taken into account. For example, it was estimated that the smaller German reactor (designed to produce 760 megawatts of thermal energy) would produce 370 megajoules in the event of a core-disruptive accident--much higher than the PFBR estimate. Other fast reactors around the world have similarly higher estimates for how much energy would be produced in such accidents.

The DAE's estimate is based on two main assumptions: (1) that only part of the core will melt down and contribute to the accident; and (2) that only about 1 percent of the thermal energy released during the accident would be converted into mechanical energy that can damage the containment building and cause ejection of radioactive materials into the atmosphere.

Neither of these assumptions is justifiable. Britain's Atomic Energy Authority has done experiments that suggest up to 4 percent of the thermal energy could be converted into mechanical energy. And the phenomena that might occur inside the reactor core during a severe accident are very complex, so there's no way to stage a full-scale experiment to compare with the theoretical accident models that the reactor's designers used in their estimates. In addition, important omissions in the DAE's own safety studies make their analysis inadequately conservative. (Our independent estimates of the energy produced in a hypothetical PFBR core disruptive accident are presented in the Science and Global Security article, "Compromising Safety: Design Choices and Severe Accident Possibilities in India's Prototype Fast Breeder Reactor" and these are much higher than the DAE's estimates.)

Turning to the second question: In terms of the stringency of the DAE's design effort, the record reveals inadequate safety precautions. One goal of any "defense-in-depth" design is to engineer barriers to withstand the most severe accident that's considered plausible. Important among these barriers is the reactor's containment building, the most visible structure from the outside of any nuclear plant. Compared to most other breeder reactors, and light water reactors for that matter, the design of the PFBR's containment is relatively weak and won't be able to contain an accident that releases a large amount of energy. The DAE knows how to build stronger containments--its newest heavy water reactor design has a containment building that is meant to withstand six times more pressure than the PFBR's containment--but has chosen not to do so for the PFBR.

The other unsafe design choice is that of the reactor core. As mentioned earlier, the destabilizing positive coolant void coefficient in fast reactors is a problem because it increases the possibility that reactivity will escalate inside the core during an accident. It's possible to decrease this effect by designing the reactor core so that fuel subassemblies are interspersed within the depleted uranium blanket, in what is termed a heterogeneous core. The U.S. Clinch River Breeder Reactor, which was eventually cancelled, was designed with a heterogeneous core, and Russia has considered a heterogeneous core for its planned BN-1600 reactor. The DAE hasn't made such an effort, and the person who directed India's fast breeder program during part of the design phase once argued that the emphasis on the coolant void coefficient was mistaken because a negative void coefficient could lead to dangerous situations in an accident as well. That might be true, but it misses the obvious point that the same potentially dangerous situations would be even more dangerous if the void coefficient within the core is positive.

Both of these design choices--a weak containment building and a reactor core with a large and positive void coefficient--are readily explainable: They lowered costs. Reducing the sodium coolant void coefficient would have increased the fissile material requirement of the reactor by 30-50 percent--an expensive component of the initial costs. Likewise, a stronger containment building would have cost more. All of this is motivated by the DAE's assessment that "the capital cost of [fast breeder reactors] will remain the most important hurdle" to their rapid deployment.

Lowered electricity costs would normally be most welcome, but not with the increased risk of catastrophic accidents caused by poorly designed fast breeder reactors.”

The report above has serious revelations and if not considered properly may result in a huge catastrophe many times higher than Chernobyl where people who lived around paid enormous price and facing the aftermath till now.

The world cannot ignore the fact that Indian Nuclear Program and security arrangements cannot meet the international standards they are extremely outdated and obsolete. Most importantly the kidnapping and killing of nuclear scientists and possible slippage of information to deadly forces like Naxals and other Islamic extremist groups operating inside India may take the world to even bigger loss than 9/11. The time has come when India should be asked questions about the security arrangements and proper assistance should be extended to India most importantly by USA under the new deal to refurbish and secure the Nuclear Assets of India.




WASHINGTON, June 5 - India's most sensitive nuclear weapons research facility was breached this week by computer hackers who tapped into servers to steal and erase atomic data, senior U.S. and Indian officials said Friday. The sophisticated attack on India's Bhabha Atomic Research Center in Bombay raised new alarms about the proliferation of nuclear weapons data and the security of nascent nuclear weapons programs like those in India, Pakistan and elsewhere.

The sprawling Bhabha research center houses several facilities, including a unit to extract the plutonium used in India's first nuclear test in 1974 and those which followed in April of this year at the Pokharan test site. Until Friday, the attack on the center had gone unacknowledged by officials in the United States or India. U.S. military officials told MSNBC that the incident, which began Monday night, may have originated from computers in Turkey. In response to the hack attack, the U.S. Army early Friday issued an advisory warning ordering Army information systems managers to monitor and/or block a series of internet provider (IP) addresses suspected of being involved in the hack.

"Turkey is the primary conduit for cyber attacks" the advisory noted.

Group did it to protest tests
Reports of the hack first appeared in Wired News, an Internet site specializing in online developments. The group suspected of being behind the attack claimed credit by e-mailing allegedly purloined data to a Wired News reporter, James Glave.

The hacker group, which calls itself "Milw0rm," also hacked a cryptic message on to a Web page along with a mushroom cloud.

"Don't think destruction is cool, coz its not," the hacked inscription reads in part.

Three members of the group, who go by the handles of SavecOre, JF and VeNoMouS, told Wired News that they began their efforts Monday and did it to protest the recent nuclear tests by India. Milw0rm members claim to have downloaded five megabytes of information, including e-mails between scientists and research papers. They also claim to have completely erased data on two of six servers at Indian facility.

A senior U.S. intelligence official says the Central Intelligence Agency has obtained the material hacked at the Bombay facility early Friday and is in the process of reviewing it.

A highly technical e-mail made publicly available by Wired News was analyzed by David Albright, director of the Institute for Security and International Studies for MSNBC. Albright says the e-mail shows evidence of civilian rather than military nuclear research. But that hardly mitigates the breach of India's security system.

India's low profile
India has not publicly commented on the attack, though Friday in the course of an MSNBC chat, Vasundhara Raje, India's minister of state for foreign affairs, refused to comment when asked about the alleged attack. "We have no information on this right now," she said.

However, the report was verified by a senior CIA official and independently by a senior civil servant in the Indian government. None of the sources would agree to be named.

The attack is bound to prove embarrassing for New Delhi, which only Thursday was denounced along with Pakistan by the five permanent members of the U.N. Security Council for unilaterally declaring themselves nuclear weapons states. India has argued that its decision was an effort to break what it sees as a damaging monopoly on nuclear weaponry held by the United States, China, Russia, Britain and France. Pakistan acted in response to its rival, India.

US learned of attack
A source with access to senior U.S. Defense Department officials in information systems says the Defense Intelligence Agency was aware of the hack as early as Thursday. The source also said the National Security Agency monitored the hack in real time.

This source says says the hackers apparently exploited a known security weakness in the Sendmail program, the software that routes e-mail from one computer to another. The source says that the Indians had known about the security hole but simply never bothered to fix it.

That information confirms Milw0rm's own claim as to how they accessed the Bhabha computers.

"They had certain things secured to the bone, and yet other things were completely obsolete," Milw0rm member Savec0re told Wired News.

According to a report on AntiOnline, a Web site that chronicles infamous computer intrusions, Milw0rm members are continuing their attacks on government computers inside India, though these attacks are on unclassified systems, according to the AntiOnline Web site.

The three Milw0rm members who carried out the attack claim to be teen-agers, located in England, New Zealand and Holland, according to profiles located on the AntiOnline site. The group hasn't spoken by phone to anyone, preferring to conduct its interviews via the real time Internet chatting system known as Internet Relay Chat where it is easy to hide one's identity and place of origin.

WASHINGTON, June 5 - India's most sensitive nuclear weapons research facility was breached this week by computer hackers who tapped into servers to steal and erase atomic data, senior U.S. and Indian officials said Friday. The sophisticated attack on India's Bhabha Atomic Research Center in Bombay raised new alarms about the proliferation of nuclear weapons data and the security of nascent nuclear weapons programs like those in India, Pakistan and elsewhere.

The sprawling Bhabha research center houses several facilities, including a unit to extract the plutonium used in India's first nuclear test in 1974 and those which followed in April of this year at the Pokharan test site. Until Friday, the attack on the center had gone unacknowledged by officials in the United States or India. U.S. military officials told MSNBC that the incident, which began Monday night, may have originated from computers in Turkey. In response to the hack attack, the U.S. Army early Friday issued an advisory warning ordering Army information systems managers to monitor and/or block a series of internet provider (IP) addresses suspected of being involved in the hack.

"Turkey is the primary conduit for cyber attacks" the advisory noted.

Group did it to protest tests
Reports of the hack first appeared in Wired News, an Internet site specializing in online developments. The group suspected of being behind the attack claimed credit by e-mailing allegedly purloined data to a Wired News reporter, James Glave.

The hacker group, which calls itself "Milw0rm," also hacked a cryptic message on to a Web page along with a mushroom cloud.

"Don't think destruction is cool, coz its not," the hacked inscription reads in part.

Three members of the group, who go by the handles of SavecOre, JF and VeNoMouS, told Wired News that they began their efforts Monday and did it to protest the recent nuclear tests by India. Milw0rm members claim to have downloaded five megabytes of information, including e-mails between scientists and research papers. They also claim to have completely erased data on two of six servers at Indian facility.

A senior U.S. intelligence official says the Central Intelligence Agency has obtained the material hacked at the Bombay facility early Friday and is in the process of reviewing it.

A highly technical e-mail made publicly available by Wired News was analyzed by David Albright, director of the Institute for Security and International Studies for MSNBC. Albright says the e-mail shows evidence of civilian rather than military nuclear research. But that hardly mitigates the breach of India's security system.

India's low profile
India has not publicly commented on the attack, though Friday in the course of an MSNBC chat, Vasundhara Raje, India's minister of state for foreign affairs, refused to comment when asked about the alleged attack. "We have no information on this right now," she said.

However, the report was verified by a senior CIA official and independently by a senior civil servant in the Indian government. None of the sources would agree to be named.

The attack is bound to prove embarrassing for New Delhi, which only Thursday was denounced along with Pakistan by the five permanent members of the U.N. Security Council for unilaterally declaring themselves nuclear weapons states. India has argued that its decision was an effort to break what it sees as a damaging monopoly on nuclear weaponry held by the United States, China, Russia, Britain and France. Pakistan acted in response to its rival, India.

US learned of attack
A source with access to senior U.S. Defense Department officials in information systems says the Defense Intelligence Agency was aware of the hack as early as Thursday. The source also said the National Security Agency monitored the hack in real time.

This source says says the hackers apparently exploited a known security weakness in the Sendmail program, the software that routes e-mail from one computer to another. The source says that the Indians had known about the security hole but simply never bothered to fix it.

That information confirms Milw0rm's own claim as to how they accessed the Bhabha computers.

"They had certain things secured to the bone, and yet other things were completely obsolete," Milw0rm member Savec0re told Wired News.

According to a report on AntiOnline, a Web site that chronicles infamous computer intrusions, Milw0rm members are continuing their attacks on government computers inside India, though these attacks are on unclassified systems, according to the AntiOnline Web site.

The three Milw0rm members who carried out the attack claim to be teen-agers, located in England, New Zealand and Holland, according to profiles located on the AntiOnline site. The group hasn't spoken by phone to anyone, preferring to conduct its interviews via the real time Internet chatting system known as Internet Relay Chat where it is easy to hide one's identity and place of origin.

India has scary nuke hack | Tech News on ZDNet

http://www.defence.pk/forums/strategic-geopolitical-issues/17300-stolen-indian-nuclear-material.html

Three nabbed with uranium in Navi Mumbai (Lead)

this is what your media has showed...


i think its better for you to do some reading with open eyes.... :hitwall::sniper:

plz dont try to derail the thread.

again and again offtopic posts:cheers:
 
@qadri,

Give these evidences to international community and get India black listed
 
Radio active leakage....... ROFL.... ROFL....

Yes ...sure....I got exposed to some XRAY radiation myself over last week end..... so IAEA should look into that as well.......

Thts why u have developed a serious brain disease.
 
Back
Top Bottom