News 12 First at Five / Thursday, Feb. 28, 2013
NORTH AUGUSTA, S.C. (WRDW) -- Could Savannah River Site become the nation's nuclear waste dump?
"SRS is on the short list for interim storage of 70,000 tons of nuclear waste. Yeah, and that's a big elephant in the room," said Jesse Young of Aiken.
In 1987, in an amendment to the Nuclear Waste Policy Act of 1982, Yucca Mountain, a mountain in Nevada, was chosen as the location for a geological repository for the nation's nuclear waste.
The license application was filed with the Nuclear Regulatory Commission in 2008 by the Department of Energy. It was the NRC's goal to say whether the site was safe or not so construction could continue.
When President Barack Obama took office, the DOE under him moved to pull that license application in order to end Yucca Mountain. The NRC has yet to rule on President Obama's motion to withdraw that license.
A committee President Obama established, the Blue Ribbon Commission, was tasked with finding an alternative. In its report to Secretary of Energy Dr. Steven Chu in early 2012, the commission recommended finding a site for another deep geological repository, which will be a lengthy process. It also calls for "interim" storage sites in the meantime.
Now, some believe SRS could be a top candidate for interim storage.
"Interim storage is 50 to 100 years," said Young of the new group Don't Waste Aiken. "If the waste comes here, it's going to stay here, and it's going to stay here, probably, for generations."
Young founded the group to fight back against a possible designation of SRS as an interim storage site.
"We're not scientists. We're homeowners and grandparents and business owners," he said.
On Thursday, the organization, along with the Sierra Club, brought an expert to town. Bob Alvarez is former adviser to the Department of Energy. He served Secretary of Energy Bill Richardson, who was secretary under President Bill Clinton.
In a new report, released Thursday, Alvarez says radiation levels at SRS would double if waste is allowed here.
"I'm not questioning the ability of the people at Savannah River to handle this material," he said in a news conference. I'm really trying to give people an idea of what the implications are."
The report makes some recommendations but adds that reprocessing the waste at SRS isn't the answer.
As for Young, he just hopes it'll remain the nation's problem to fix.
"If they stick it here, it's going to be South Carolina's problem, and we are not powerful enough in the Congress or the Senate," he said.
Not all share those opinions. Clint Wolfe, executive director for the Citizens for Nuclear Technology Awareness in Aiken, says the report is nothing but "scare tactics" and "fear mongering." He adds that the workers at SRS are most suited to manage additional nuclear waste. He says that he has not seen or read the report, but he says he believes it serves to invoke an "emotional response from the public." He says any additional nuclear waste at SRS would not affect human health or the environment at all.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email email@example.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.