The Aiken branch of BAE Systems was responsible for manufacturing the vehicle that took Saddam Hussein's statue down in 2003. (WRDW-TV / Aug. 12, 2011)
News 12 at 11 o'clock / Thursday, Aug. 11, 2011
AIKEN, S.C. -- The date was April 9, 2003. A group of Marines put a rope around the neck of Saddam Hussein's statue.
"That was a great event. Certainly for me, watching it on television," said Michael Eaton, the BAE Site Manager for the facility in Aiken.
Iraqis danced on the collapsed statue after the Marine M88 recovery vehicle backed up and tore it down.
"First thing I did was jump off the couch and say, 'Hey, we built that vehicle,'" he said.
He works for BAE Systems, a global defense company. They have an important branch in Aiken, where he's the site manager.
"We build, as you know, complex components that support primarily the Bradley Fighting Vehicle, the M88 Recovery Vehicle and the Vertical Launch System," he said.
The M88, the vehicle that ripped the statue down, is still being produced in Aiken. Eaton gave News 12 a tour of the facility where about 300 parts are manufactured to build the vehicle that literally serves as a tow-truck for tanks.
Just a little more than a week ago, the Aiken facility was one of two to receive about $108 million from the government to keep making them. It's part of the workload at the site that Eaton says benefits the whole area.
"As an Aiken site, there's about 120 different suppliers that we utilize throughout the state, and over the past couple of years, it's been anywhere from 10 to 12 million dollars worth of goods and services that we buy to support our operation here in Aiken," he said.
They employ about 110 people right now at the Aiken site, but he says that number could grow or shrink in the future as the demand for military technology increases or declines.
However, their main goal will never change, he says.
"Our phrase, within BAE, is we protect those who protect us," Eaton said.
They also build machines for the NAVY out at the Aiken facility. About 20 percent of their work is on what's known as a Vertical Launch System. It holds and fires missiles from ships and submarines.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email email@example.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.