A Ticking Time Bomb
A Ticking Time Bomb

A Ticking Time Bomb

January 1 st 1988

Companies and law enforcement agencies are encountering a new and growing area of computer crime, one which embarrassed companies often try to hush up. At a recent conference of the Probation Officers Association of Ontario, Sergeant Ted Green gave the following examples of how criminals are using computers for theft and sabotage:

  • An angry employee of a London-based company secretly programmed instructions into the company computers that would have knocked out the entire system and meant months of work. The plan was uncovered in time and disaster was averted.

  • A Toronto company's entire computer system was wiped out by the same kind of "logic bomb" on the day it processed a certain employee's termination notice.

  • An employee who had altered a computer access password demanded and got a $50,000.00 bribe to reveal the new key.

Many companies do not press charges, and if they do, find it difficult to succeed in court. They are reluctant to publicize this kind of crime, because they fear that the shareholders and customers will be concerned about the company's vulnerability. (The O.P.P. estimates that only five per cent of computer crime is reported.)

It does not take too much imagination or expert knowledge about modern computers to realize that if the kind of logic bombs described at this conference can be secretly programmed into computer systems, the potential for damage is simply beyond our imagination. Green speculated that if somebody were to interfere with the information in the computer systems of large financial institutions, "it could bring the country to its knees" (Globe and Mail, November 3, 1987).

A communications technician recently told me that a state-of-the-art computerized telephone system installed in certain government offices was mysteriously and repeatedly knocked out of service. Experts failed to discover the source of the problem. After a long time suspicion led to one disgruntled employee who had devised a way electronically to trigger the malfunction. The ominous potential of this kind of action is very clear.

What can be done to prevent the breakdown of an information system on which our society has come to depend? One thing is certain: if this kind of crime continues to be hushed up, we may someday have a very rude awakening indeed. Could this be an instance of our being made captive to our own technologies? Is it still possible to protect ourselves against the dangers lurking in the corridors of our increasingly powerful computer systems? It is obvious that not just technical expertise and cleverness but wisdom and courage are now needed.

Harry Antonides
Harry Antonides

Harry Antonides came to Canada in 1948, initially working as a farm hand and railway labourer. After over a decade working in a chemical plant in Sarnia, Ontario, Harry joined the newly forming Christian Labour Association of Canada (CLAC) in 1962 as a field representative. By 1970 Harry became director of research and education. In 1974, he was a founding member of the Work Research Foundation (now Cardus) and publisher of their sole publication, Comment magazine. A prolific writer and dynamic speaker, Harry delivered lectures all over North America and published numerous articles, reviews, and essays. He is author of several books on Christianity, labour, and economics, including Multinationals and the Peacable Kingdom (1978) and Stones for Bread: The Social Gospel and its Contemporary Legacy (1985). Harry is retired and lives with his wife Janet in Willowdale, Ontario.


Download and Share Articles From The Comment Reader

An introduction to Public Theology for the Common Good

Want more of the same fresh, thought-provoking content delivered right to your inbox once a week?