recommended reading

New Mexico Lets Nuclear Waste Remain Above Ground After Radioactive Leak

Thomas Herbert/AP file photo

New Mexico has extended the time allowed for keeping atomic waste above ground after last month’s radioactive release at an underground repository.

The federally run Waste Isolation Pilot Plant remains closed following the February release of a small quantity of radiation from the subterranean dump. In the meantime, dozens of atomic waste-filled containers sent from other federal sites to the New Mexico repository for disposal are being left in the site's parking area and waste-handling facility, the Associated Press reported.

The WIPP facility, under its permit with the New Mexico government, is allowed to keep radioactive waste in the parking area for no more than a month and in the handling facility for no more than two months. However, since the repository remains closed, state environment officials are extending the two deadlines to give the U.S. Energy Department time to devise a plan for handling the nuclear waste in the future. The new thinking is based on the possibility that the underground portion of the facility might stay closed for more than three months, according to an administrative decision released on Monday.

Officials last week hinted it could be weeks before workers are allowed to return to the subterranean part of the Waste Isolation Pilot Plant, where at least 13 personnel were exposed to radioactive contaminants last month.

The New Mexico Environment Department is getting weekly updates regarding the status of the site, and has demanded that an inspection be carried out before operations at the nuclear facility are re-launched.

"To require them to begin to systematically ship particular waste units back to points of origin or back to particular locations in a rather expedited fashion was not the best thing as far as environmental health or human health in this instance," said Jeff Kendall, attorney for the Environment Department, explaining the department’s thinking in a phone interview with the wire service.

Officials have not yet ascertained what caused the leak of radioactive elements.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.