MARKET
NEWS
Clinton combats corporate espionage
Heat your cash card to reveal the code cientists at Bell Communications Research in the United States have S discovered that electronic cash cards can be counterfeited by simply
Clinton has signed into law p resident The Economic Espionage Act of
heating them. According to PC Week the scientists have issued a warning to companies such as Mondex and Visa that their complex encryption techniques could be rendered useless by Iow-tech thieves equipped with a domestic oven or electric fire. Temperature increases create a wide enough hole in the encryption layer to give cyber criminals access to sufficient material to enable them to crack the code that protects the data held on the card.
1996 in an attempt to provide more resources for corporations to combat the g r o w i n g e c o n o m i c / c o r p o r a t e espionage problem. The law is designed to p r o t e c t p r o p r i e t a r y e c o n o m i c information and enhance the ability to prosecute and punish those actively participating in economic espionage. The American Society for Industrial Security (ASIS) reveals in a report, the
In-depth knowledge of encryption techniques would still be necessary to decrypt the code, but this is potentially another example of the huge problems which companies face in ensuring the safety of the ecash environment. Visa International said that it understood that Bellcore's findings were based on theory and that there was no practical examples. Another factor in the Bellcore test was the use of public key encryption technology. Visacash uses private key encryption.
1995 Intellectual Proper O, Loss Special Report, that economic espionage has increased more than 300% since 1992.
UK initiatives to protect personal health information 1996 a group comprised of D uring m e m b e r s f r o m the B r i t i s h M e d i c a l A s s o c i a t i o n and the D e p a r t m e n t of Health has been working to resolve a number of issues surrounding the privacy of personal health information and the phased introduction of networking of IT s y s t e m s t h r o u g h o u t the U K ' s National Health Service. The group has reviewed and clarified existing guidance to ensure that responsibility for the security and privacy of
d a t a b a s e s of p e r s o n a l h e a l t h information in practices, Trusts and health authorities resides with an appropriate medical practitioner. In response to the p r o f e s s i o n ' s concern over the security of the NHS-wide Clearing Service, the D e p a r t m e n t has a c c e p t e d more stringent wording for the contract with AT&T to ensure that data is not sold. A committee has been set up to advise on matters relating to security and privacy of data passing through
Editor: HELEN MEYER American Editor: CHARLES CRESSON WOOD Information Integrity Investments, SausaUto, California, USA Australasian Editor: BILL J. CAELLI Queensland University of Technology, Australia European Editor: KEN WONG Insight Consulting, London. UK
the c l e a r i n g service or held on database. Health Authorities and Trusts seeking to connect to the NHS Network are required to satisfy a code of connection which will enhance the security of the Network itself. Where an organization cannot guarantee security, access to the Network will be restricted. It has been estimated that encryption of the Network will cost £15-20 million and a number of options are being discussed as to the form that encryption should take.
Editorial Advisors: Chris Amery, UK: Hans Gliss, Germany; David Herson, CEC, DGXIII: Les Lawrence, New South Wales. Australia: P.Kraaibeek, Germany; Wayne Madsen, Virgmra. USA Belden Menkus, Tennessee USA: Bill Murray, Connecticut. USA: Silvano Ongetta, Italy; Donn B. Parker, California. USA; Peter Sommer, UK: MarkTantam. UK: Peter Thingsted, Denmark: Hank Wolfe, Hew Zealand. Correspondents: Frank Rees, Melbourne Australia: John Sterlicchi. California, USA; Paul GannOn, Brussels. Belgium.
1996 Elsevier Science Ltd., England/96/US$15.00 per article No part of this publication may be reproduced, storedin a retrieval system, or transmitted by any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior tbermission of the publishers. (Readers in the USA - - please see special regulations listed on back cover.)
Computer Fraud & Security November 1996 © 1996 Elsevier Science Ltd