Feeds

Tory minister: Let's exploit our rich resource of mud, er, wind

Energy MP's hot air is no good for economy nor environment

High performance access to file storage

Britain would be "mad" not to make strategic use of its rich natural resource of mud, a government minister has said.

"We can't afford not to exploit this," said Charles Hendry (Con, High Peak) who proposed that public infrastructure should exploit the naturally abundant material, and rediscover techniques that use it, such as wattle and daub for building walls.

Actually, he didn't...

But Hendry, who is the UK's energy minister, instead wrote this on the Department of Energy and Climate Change blog this week:

It would be madness not to harness the wind to create clean energy and jobs.

As an island nation, the UK is lucky to have some of the best wind resource in Europe – it would be madness for us not to use this natural, secure, sustainable and free resource!

The logic, in each case, is the same: the UK must use something because it is there. You can argue this equally applies to coal - which the UK can exploit for several hundred years using current technology. Indeed, calls to revive coal extraction were renewed last year.

There is no mention of costs. Wind turbines remain a uniquely inefficient, and therefore expensive, power generation technology. And that's before the true cost is included - which includes hooking up these remote bird-blenders to the national grid. (See Wind power: even worse than you thought and Stand by for more big, windfarm-driven 'leccy price rises for the numbers.)

Wattle and daub: Why Not?

And green jobs? Well, on balance they increase unemployment. Professor Gabriel Calzada Álvarez, at the University of Madrid, estimated that each green job had cost the country $774,000, in effect destroying 2.2 "real" jobs.

Writing in The Guardian last year, Simon Jenkins pointed out that the 550 corporate members of wind-power lobby group RenewableUK received £1bn in handouts in 2010. The renewable energy is prolonging Britain's economic doldrums.

Other than a wealth redistribution scheme from the poor to the rich - what exactly is the point? ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.