Feeds

Fukushima powerplant owner forced to cough teleconference vids

Claims missing audio due to 'full hard drive'

Build a business case: developing custom apps

Japan’s troubled Tokyo Electric Power Co, Tepco, the operator of the Fukushima nuclear plant, will be forced to release hundreds of hours of in-house teleconference video footage revealing executive briefings to staff during the unfolding events of the nuclear disaster.

The footage will include Japanese Prime Minister at the time, Naoto Kan, challenging Tepco officials at its headquarters in a broadcast that was viewed by over 200 staff during the early stages of the disaster. Tepco has claimed however that this crucial part of the footage does not have audio. In one of the lamest grab-the-nearest-excuses exercises in history, company officials blame a “full hard drive” for the technical fault.

In an exclusive interview with ABC news, former PM Kan claims that the company is “trying to hide something inconvenient.”

He has made a public call for the release of all the footage as the investigation into the disaster continues. Kan said that the footage “is like the black box flight recorder on an airplane, these recordings are crucial to finding out what really happened,” he said.

The footage shows an angry Kan lashing out at Tepco officials over what he believed was a request by the utility to pull out all personnel from the stricken plant in March last year, a senior Tepco official said.

Tepco has been extremely reluctant to release the footage, citing privacy concerns, but is now bowing to government pressure.

Earlier in the month a damning report from the Fukushima Nuclear Accident Independent Investigation Commission (at http://naiic.go.jp/en/) claimed that the "the direct causes of the accident were all foreseeable prior to March 11, 2011."

It added that the operator of the plant Tepco, regulators and the government "failed to correctly develop the most basic safety requirements” this includes assessing the probability of damage, preparing for containing collateral damage from such a disaster, and developing evacuation plans.

The report offered recommendations and actively encouraged the nation's parliament to "thoroughly debate and deliberate" the suggestions. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Famous 'Dish' radio telescope to be emptied in budget crisis: CSIRO
Radio astronomy suffering to protect Square Kilometre Array
Asteroid's SHOCK DINO MURDER SPREE just bad luck - boffins
Sauricide WASN'T inevitable, reckon scientists
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Jurassic squawk: Dinos were Earth's early FEATHERED friends
Boffins research: Ancient dinos may all have had 'potential' fluff
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.