(File image: Yucca Mountain)
News 12 at 6 o'clock / Monday, March 28, 2011
COLUMBIA, S.C.---It's known as Yucca Mountain, and it's the facility in Nevada where highly-reactive nuclear waste was supposed to be stored from sites across the US, including Savannah River Site.
"If you've ever been to Yucca Mountain and you've visited that repository, there's no doubt in your mind when you leave that that was the right selection," said Chuck Smith.
He's a county councilman for Aiken County, and he's confident with the site, which was selected by the US Congress in the Nuclear Waste Policy Act of 1982.
"It's a piece of property that's been evaluated and analyzed by the most scientific minds in the world," he said.
Two years ago, President Barack Obama nixed the project, and the United States Department of Energy followed suit, but it wasn't for technical problems.
"They said it wasn't a workable option," said Tom Gottshall, who showed News 12 that exact language in a DOE document. He's a Columbia attorney filing suit against the DOE for Aiken County, where nuclear waste once destined for Yucca Mountain is now piling up.
"The Nuclear Waste Policy Act seems pretty clear what Congress has required," he said.
"The President undid a joint resolution of Congress," added South Carolina Attorney General Alan Wilson "He just completely undid an act of Congress without going through any of the processes of procedures there."
Wilson and the state of South Carolina are also filing suit against the DOE, and he has a special message to the President.
"Mr. President, if you're not going to give us Yucca Mountain, at least give us our money back. That's what the taxpayers and the rate-payers deserve," he said.
He's talking about the money that has already gone into the nearly 30-year-long project. With interest--about $30 Billion nationally--out of that, about $1.3 Billion from South Carolina. With all that money added to other government fees, Wilson says South Carolina citizens are the real losers.
"It's being felt in their pocketbook. They're paying higher utility bills because the federal government contractually obligated itself to take and store our nuclear waste. Now they've taken our money and left us with the waste," he told News 12.
Wilson also says energy rate-payers pay a tenth-of-a-cent for every kilowatt hour toward the Yucca Mountain Repository project, and he says taxpayers have fronted some huge bills as well.
Arguments were heard in the United States Court of Appeals for the District of Columbia Circuit last week, and Gottshall says the three judges should reach a decision in 60 to 90 days.
The United States Department of Energy did issue a written statement to News 12 on that matter, and it is as follows:
"As Secretary Chu has said consistently, Yucca Mountain is not an option and he looks forward to receiving the recommendations of the Blue Ribbon Commission for the long term management of our spent nuclear fuel and nuclear waste. As the Obama Administration takes action to restart the nuclear industry and create new clean energy jobs, we remain committed to ensuring that the federal government fulfills its long-term disposal obligations for nuclear waste."
Have information or an opinion about this story? Click here to contact the newsroom.
Copyright WRDW-TV News 12. All rights reserved. This material may not be republished without express written permission.
Kaspersky Lab warns users about the emergence online of a new version of the Gpcode ransomware program.
The program spreads via malicious websites and P2P networks.
Kaspersky Lab products detect the program as Trojan-Ransom.Win32.Gpcode.ax.
You can read more on our blog.
Kaspersky Lab is monitoring a new email worm which is currently spreading. Emails spreading the worm say “Here you have” in the subject line.
We detect the worm as Email-Worm.Win32.VBMania.
While the servers hosting related downloads have been taken down, we are keeping customers updated and protected against any new variants.
Net-Worm.Win32.Kido exploits a critical vulnerability (MS08-067) in Microsoft Windows to spread via local networks and removable storage media.
The worm disables system restore, blocks access to security websites, and downloads additional malware to infected machines.
Users are strongly recommended to ensure their antivirus databases are up to date. A patch for the vulnerability is available from Microsoft.
The new Gpcode variant encrypts files with extensions DOC, TXT, PDF, XLS, JPG, PNG, CPP, H etc. on hard drives using an RSA algorithm with a 1024-bit key.
After encrypting files, the virus leaves a text file in the folder next to the encrypted files with following message:
Currently, we detect the new variant, but we are unable to crack the 1024-bit key. Our analysts are continuing to work on both the key and the virus to resolve this issue.
Kaspersky Lab recommends that all Internet users enable maximum protection from malicious code and network attacks on their computers, refrain from executing suspicious programs received from untrustworthy sources and back up any important information on their computers.
Detection of Virus.Win32.Gpcode.ak was added to Kaspersky Anti-Virus signature databases yesterday, on June 4th, at 15:39 GMT. Please make sure to update if you haven’t already.
If you have fallen victim to Gpcode.ak, try to contact us using another computer connected to the Internet. DO NOT RESTART or POWER DOWN the potentially infected machine. Contact us by email email@example.com and tell us the exact date and time of infection, as well everything you did on the computer in the 5 minutes before the machine was infected: which programs you have executed, which websites you have visited, etc. We'll try and help you recover any data that has been encrypted.
For more information about the malicious program, please read our weblog.
A few hours before this point, there was a noticeable increase in mail traffic of an earlier modification of Warezov - Warezov.do which featured in the October 2006 Top 20.
If you are using Kaspersky Anti-Virus 6.0 or Kaspersky Internet Security 6.0 with Proactive Protection turned on, new variants will be detected without the need to update your antivirus databases.
A full description of Email-Worm.Win32.Warezov.nf is now available in the Virus Encyclopaedia.