Computer Fraud & Security Bulletin
March 1992
decided not to appeal. The Government, with the support of the Opposition, has said that it is most
don’t know if they will scare the enemy, but by hell they terrify me”.
likely to use a ministerial order to extend the Civil Evidence Act to magistrates courts immediately.
Belden Menkus & Tina Monk
However, this would concede that the nearly 7 million liability orders obtained so far should not have
been
granted.
Such
a move
would
inevitably prompt appeals, applications for judicial reviews and compensation claims for false imprisonment.
US army continues virus research The US Army Center For Signal Warfare is continuing
to explore
the
possible
use
computer viruses and worms to incapacitate computer
networks
of potential
enemies.
of the The
Center has already identified the desired effects of such a use as including
data disruption,
denial
of use and impacting the operation of processors and the management
of data storage. At least
$500 000 in additional
funds has been allocated
to the next phase of the study. This would involve contractors to the Center devising particular viruses, demonstrating them and designing possible defences against their use. This research
has caused concern
security professionals
around the world, not least
in Europe where an American has recently
among
been screened.
The documentary for
shipment to Iraq. The infected chip is said to have brought down the Iraqi Air-force network at the Gulf
War,
mentioned as the source technology.
and
which makes use of ISDN technology. The project will enable member police forces in nearly 160 countries to consult Interpol’s central database interactively. The system will also enable the transmission of high quality images such as fingerprints and photographs. The organization itself enjoys no police powers and employs no detectives or other agents to intervene directly in cases. Exclusive national control of police action is still vigorously maintained as a linchpin of national sovereignty. Interpol’s role is to provide seminars and conferences, arrange meetings and agreements and, most importantly, to coordinate the exchange of information. For the new ISDN facility,
included in a
printer chip given to a French manufacturer
of the
When computer crimes are an ever increasing worry, its nice to know that the good guys are making use of the technology as well. Interpol, the International Criminal Police Organization based in Lyon, France, is a case in point. With the aid of France T&corn and Wang, Interpol is setting up a new telecomms network
TV documentary
claims that a virus was deliberately
start
Interpol spreads its networks
Fort
Meade
of this unusual
is chip
The story has been widely reported in the newspapers, which all quote the TV programme as its origin. However, sources in the USA point out that the earliest version of this story appeared in the American periodical InfoWorldthe April Fool’s Day issue. This, however, is a fact which has escaped notice in Europe where the whole concept is viewed with misgiving. As the Duke of Wellington once commented of his own army, “I
an automated
search facility (ASF) host computer is being set up at the general secretariat in Lyon. It will transmit information to the various national centres using France Telecom’s Numeris ISDN network and Wang’s electronic document management system. In the case of countries that are not yet connected to Numeris, access to the ASF is possible through telephone lines and X.25 networks. Under an agreement with the French government, Interpol enjoys the extra-territorial status of an international organization in the same way as the United Nations, the European Community and the OECD. This means that French legislation passed in 1978 on individual liberties and information technology does not
01992
Elsevier Science Publishers
Ltd