Feeds

Greenland zinc mine warms to retreating ice

The economic benefits of global warming

High performance access to file storage

Pessimists convinced that global warming will eventually bring about the destruction of humanity should take note that there's one piece of cheering news to come from the inexorable retreat of the polar ice caps: we won't be short of top-quality zinc as we all go to hell in a handcart.

View from the entrance of the Black Angel mine. . Photo copyright Black Angel Mining LtdThat's according to mining company Angus & Ross, which yesterday said that Greenland's melting ice will allow it to reopen the Black Angel mine for eventual year-round exploitation of the four million tonnes of high grade lead and zinc reserves it still contains.

Black Angel mine closed in 1990, Reuters reports. The problems associated with extracting its resources included the fact that its entrance lies 600 metres above the sea in a cliff face, and its ore had to be transported by cable car across a fjord to the shipping area.

Then, of course, there was the weather. Angus & Ross's chief operating officer Andrew Zemek explained that while the shipping season used to be a mere four months, global warming meant "today it's eight months and it will soon be 12 months".

Further benefits of retreating ice include increased exposure of rock for perusal by mining geologists and the possibility of "a more direct northwest passage for shipping between Greenland and metal-hungry Asian countries", as Zemek put it. Eventually, if the Arctic ice disappears completely, an even shorter route across the pole might be possible.

Angus & Ross detailed its plan for Black Angel to a zinc seminar in Madrid yesterday. It's hoping to finalise $30m funding for phase one of the project this week, which will enable it to eventually "restore the mine's original cable car, fit a second one, and later on build a suspended conveyor belt to transport the ore".

The Black Angel mine's "proven reserves" contain 9.7 per cent zinc and 3.1 per cent lead, according to Angus & Ross's pre-feasibility study. Once they're gone, there's plenty of newly-uncovered Greenland to be exploited. Zemek told the seminar: "Greenland is grossly under explored." ®

Bootnote

There are more snaps of the Black Angel mine and its environs here.

High performance access to file storage

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.