News 12 at 6 o'clock / Wednesday, May 2, 2012
COLUMBIA, S.C. -- An Aiken County lawsuit against the federal government was heard in front of the U.S. Court of Appeals for the District of Columbia on Wednesday.
The case is aimed at reversing President Barack Obama's decision to end a nuclear waste repository in Nevada called Yucca Mountain.
"This case boils down to one simple premise, and it's what every third grader in America learns in their civics class: Congress makes laws and the executive branch enforces laws," said South Carolina Attorney General Alan Wilson.
News 12 sat down with Wilson in an exclusive interview.
"Two years ago, the administration withdrew its application to the Department of Energy, which was going to implement that law," Wilson said.
That law was the Nuclear Waste Policy Act. It was passed back in 1982 and approved again in 2002. Pre-construction began, but when President Obama took office, the Department of Energy removed its license application and construction stopped.
"Over 25 years, from about 1982 to 2008, we spent $33 billion into the Nuclear Waste Fund," Wilson said.
He says South Carolina rate-payers fronted about $1.4 billion of that. Now, waste at Savannah River Site and Plant Vogtle piles up and that's part of the reason why Aiken County filed suit.
"We've done something that's just unheard of, and I say that with a great deal of sarcasm, we have filed a mandamus action against the federal government requiring the Nuclear Regulatory Commission to do what they're supposed to do by statute," said the state attorney general.
If successful, Wednesday's hearing would force the Nuclear Regulatory Commission to determine whether the administration broke the law.
"If we don't succeed or prevail here in this case, then we're going to seriously consider another course of action -- that is to sue to recover the monies paid by rate-payers over the past two and a half decades," Wilson said to News 12.
So, if Aiken County's lawsuit fails, South Carolina will likely sue the federal government in an attempt to get the money back.
As for Wednesday's hearings, Wilson says he's cautiously optimistic. He says the facts are on his side but that's never stopped the federal government before.
Tomorrow on News 12 we'll see what the U.S. Congress is doing to re-spark Yucca Mountain, too, and we'll have an update on today's hearing.
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email firstname.lastname@example.org and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.