US army continues virus research

US army continues virus research

Computer Fraud & Security Bulletin March 1992 decided not to appeal. The Government, with the support of the Opposition, has said that it is most d...

107KB Sizes 0 Downloads 204 Views

Computer Fraud & Security Bulletin

March 1992

decided not to appeal. The Government, with the support of the Opposition, has said that it is most

don’t know if they will scare the enemy, but by hell they terrify me”.

likely to use a ministerial order to extend the Civil Evidence Act to magistrates courts immediately.

Belden Menkus & Tina Monk

However, this would concede that the nearly 7 million liability orders obtained so far should not have

been

granted.

Such

a move

would

inevitably prompt appeals, applications for judicial reviews and compensation claims for false imprisonment.

US army continues virus research The US Army Center For Signal Warfare is continuing

to explore

the

possible

use

computer viruses and worms to incapacitate computer

networks

of potential

enemies.

of the The

Center has already identified the desired effects of such a use as including

data disruption,

denial

of use and impacting the operation of processors and the management

of data storage. At least

$500 000 in additional

funds has been allocated

to the next phase of the study. This would involve contractors to the Center devising particular viruses, demonstrating them and designing possible defences against their use. This research

has caused concern

security professionals

around the world, not least

in Europe where an American has recently

among

been screened.

The documentary for

shipment to Iraq. The infected chip is said to have brought down the Iraqi Air-force network at the Gulf

War,

mentioned as the source technology.

and

which makes use of ISDN technology. The project will enable member police forces in nearly 160 countries to consult Interpol’s central database interactively. The system will also enable the transmission of high quality images such as fingerprints and photographs. The organization itself enjoys no police powers and employs no detectives or other agents to intervene directly in cases. Exclusive national control of police action is still vigorously maintained as a linchpin of national sovereignty. Interpol’s role is to provide seminars and conferences, arrange meetings and agreements and, most importantly, to coordinate the exchange of information. For the new ISDN facility,

included in a

printer chip given to a French manufacturer

of the

When computer crimes are an ever increasing worry, its nice to know that the good guys are making use of the technology as well. Interpol, the International Criminal Police Organization based in Lyon, France, is a case in point. With the aid of France T&corn and Wang, Interpol is setting up a new telecomms network

TV documentary

claims that a virus was deliberately

start

Interpol spreads its networks

Fort

Meade

of this unusual

is chip

The story has been widely reported in the newspapers, which all quote the TV programme as its origin. However, sources in the USA point out that the earliest version of this story appeared in the American periodical InfoWorldthe April Fool’s Day issue. This, however, is a fact which has escaped notice in Europe where the whole concept is viewed with misgiving. As the Duke of Wellington once commented of his own army, “I

an automated

search facility (ASF) host computer is being set up at the general secretariat in Lyon. It will transmit information to the various national centres using France Telecom’s Numeris ISDN network and Wang’s electronic document management system. In the case of countries that are not yet connected to Numeris, access to the ASF is possible through telephone lines and X.25 networks. Under an agreement with the French government, Interpol enjoys the extra-territorial status of an international organization in the same way as the United Nations, the European Community and the OECD. This means that French legislation passed in 1978 on individual liberties and information technology does not

01992

Elsevier Science Publishers

Ltd