News 12 First at Five / Wednesday, Dec. 5, 2012
AIKEN COUNTY, S.C. -- Cpt. Nick Gallam has been administrator of the Aiken County Detention Center for almost a year. His new idea will shake things up with webcam visitations.
"I commonly refer to it as something like Skype or, you know, a video chat that you would, you know, sit down on your laptop and have a video chat with somebody," he told News 12.
Right now, Gallam says with a population of about 300, there are 200 visitors every week. It's a lot to manage for the jail staff, but computers make things easier.
"It's in a hardened, vandal-proof box that on one end the inmate would sit down in front of a monitor and then their family members would sit down on the other and have a video chat," he said.
All a visitor will have to do is make an account on the website Securus. They can chat with their inmate for free using computers in the jail's lobby. For only $20 for 20 minutes, visitors can even use the service at home with their own computer and webcam.
For those who argue the system is impersonal, Gallam says current visitations are similarly impersonal. Visitors see inmates face to face, but a layer of plexiglass is between them.
"One thing about inmate is if there's a system, they're going to try to circumvent that system. You know, their needs, or their necessity to get contraband into the facility, are big," Gallam said.
Prisoners test their luck, he says. He showed News 12 where they've had to re-caulk the seals of the glass barrier where visitors have tried to sneak contraband, like drugs and maybe weapons, inside.
Come next year, however, the old visitation rooms will be a thing of the past at no cost to the taxpayer. The private company will install the system for free. It makes its money through people who use the service at home.
The Aiken County Detention Center will look to implement the new system in the first quarter of next year.
Webcams are already used at the Webster Detention Center in Richmond County. The captain there tells News 12 they love it.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email firstname.lastname@example.org and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.