A SRR employee is using a manipulator located inside a shielded enclosure at the Defense Waste Processing Facility where the melter is pouring molten glass inside a canister. (Savannah River Remediation, LLC)
Wednesday, Jan. 25, 2012
AIKEN, S.C. -- The second melter ever in the 16-year history of the Savannah River Site’s Defense Waste Processing Facility poured its 2,000th canister of glassified hazardous waste, surpassing its two-year design life expectancy years ago while showing no signs of slowing down.
The melter is a 65-ton refractory lined melting vessel that receives a chemically balanced feed of treated high-level waste from the site’s underground waste tanks, mixed with borosilicate frit. When heated, these elements form a molten glass. The glassified waste is then poured from the melter into stainless steel canisters, which are being safely stored on site until a permanent storage facility is identified.
Keeping the melter hot and operating is vital to Savannah River Remediation’s mission to dispose of the site’s hazardous waste, according to Steve Wilkerson, DWPF treatment project director.
“The melter is the heart of the DWPF and keeping it safely operating is the key,” Wilkerson said. “Because of recent enhancements, such as the deployment of bubbler technology in the melter, we continue to surpass performance milestones.”
Melter 1 became operational when DWPF began hot operations in March 1996. It poured 1,339 canisters in its seven-year history. Melter 2 was placed into service in 2003. In total, 3,339 of the predicted 7,557 canisters needed to dispose of SRS’s hazardous waste have been poured.
Terrel Spears, assistant manager for Waste Disposition Project, U.S. Department of Energy Savannah River Operations, called canister production crucial in eliminating the site’s hazardous waste.
“Since beginning operations, DWPF has poured 13 million pounds of glass and has immobilized 40 million curies of radioactivity,” Spears said. “Every canister poured means there is less risk to people and the environment.”
DWPF continues to set production milestones. In December 2011, DWPF produced 37 canisters for the best production month ever. During calendar year 2011, 266 canisters were poured, another production record.
With liquid waste operations continuing well into the next decade, additional melters will be required. SRR has a third melter in storage, ready to be put into operation when necessary, and a fourth melter is under construction for future use.
Immobilizing some of the most hazardous waste in South Carolina’s is a focal point of liquid waste operations at SRS, according to Dave Olson, SRR president and project manager.
“By mixing the radioactive waste in a glass form, DWPF reduces the risks associated with liquid waste at SRS and is essential in SRR’s mission to clean and operationally close the Site’s waste tanks,” Olson said.
SRS is owned by DOE. The SRS Liquid Waste contract is managed by SRR, a team of companies led by URS Corp. with partners Bechtel National, CH2M Hill and Babcock & Wilcox. Critical subcontractors for the contract are AREVA, Energy Solutions and URS Safety Management Solutions.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email firstname.lastname@example.org and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.