This essay Are Good Computer Viruses Still a Bad Idea? has a total of 4595 words and 24 pages.
Are "Good" Computer Viruses Still a Bad Idea?
Virus Test Center
University of Hamburg
Vogt-Koelln-Str. 30, 22527 Hamburg, Germany
[email protected] [Editor\'s note: Vesselin\'s
current email address is [email protected]]
During the past six years, computer viruses have caused unaccountable amount of
damage - mostly due to loss of time and resources. For most users, the term
"computer virus" is a synonym of the worst nightmares that can happen on their
system. Yet some well-known researchers keep insisting that it is possible to
use the replication mechanism of the viral programs for some useful and
This paper is an attempt to summarize why exactly the general public appreciates
computer viruses as something inherently bad. It is also considering several of
the proposed models of "beneficial" viruses and points out the problems in them.
A set of conditions is listed, which every virus that claims to be beneficial
must conform to. At last, a realistic model using replication techniques for
beneficial purposes is proposed and directions are given in which this technique
can be improved further.
The paper also demonstrates that the main reason for the conflict between those
supporting the idea of a "beneficial virus" and those opposing it, is that the
two sides are assuming a different definition of what a computer virus is.
1. What Is a Computer Virus?
The general public usually associates the term "computer virus" with a small,
nasty program, which aims to destroy the information on their machines. As usual,
the general public\'s understanding of the term is incorrect. There are many
kinds of destructive or otherwise malicious computer programs and computer
viruses are only one of them. Such programs include backdoors, logic bombs,
trojan horses and so on [Bontchev94]. Furthermore, many computer viruses are not
intentionally destructive - they simply display a message, play a tune, or even
do nothing noticeable at all. The important thing, however, is that even those
not intentionally destructive viruses are not harmless - they are causing a lot
of damage in the sense of time, money and resources spent to remove them -
because they are generally unwanted and the user wishes to get rid of them.
A much more precise and scientific definition of the term "computer virus" has
been proposed by Dr. Fred Cohen in his paper [Cohen84]. This definition is
mathematical - it defines the computer virus as a sequence of symbols on the
tape of a Turing Machine. The definition is rather difficult to express exactly
in a human language, but an approximate interpretation is that a computer virus
is a "program that is able to infect other programs by modifying them to include
a possibly evolved copy of itself".
Unfortunately, there are several problems with this definition. One of them is
that it does not mention the possibility of a virus to infect a program without
modifying it - by inserting itself in the execution path. Some typical examples
are the boot sector viruses and the companion viruses [Bontchev94]. However,
this is a flaw only of the human-language expression of the definition - the
mathematical expression defines the terms "program" and "modify" in a way that
clearly includes the kinds of viruses mentioned above.
A second problem with the above definition is its lack of recursiveness. That is,
it does not specify that after infecting a program, a virus should be able to
replicate further, using the infected program as a host.
Another, much more serious problem with Dr. Cohen\'s definition is that it is too
broad to be useful for practical purposes. In fact, his definition classifies as
"computer viruses" even such cases as a compiler which is compiling its own
source, a file manager which is used to copy itself, and even the program
DISKCOPY when it is on diskette containing the operating system - because it can
be used to produce an exact copy of the programs on this diskette.
In order to understand the reason of the above problem, we should pay attention
to the goal for which Dr. Cohen\'s definition has been developed. His goal has
been to prove several interesting theorems about the computational aspects of
computer viruses [Cohen89]. In order to do this, he had to develop a
mathematical (formal) model of the computer virus. For this purpose, one needs a
mathematical model of the computer. One of the most commonly used models is the
Turing Machine (TM). Indeed, there are a few others (e.g., the Markoff chains,
the Post Machine, etc.), but they are not as convenient as the TM and all of
them are proven to
Topics Related to Are Good Computer Viruses Still a Bad Idea?
Computer virus, Internet security, University of Hamburg, Virus, Email spam, Email
Essays Related to Are Good Computer Viruses Still a Bad Idea?
Computer CommunicationsComputer Communications Communications. I could barely spell the word, much less comprehend its meaning. Yet when Mrs. Rubin made the announcement about the new club she was starting at the junior high school, it triggered something in my mind. Two weeks later, during the last month of my eighth grade year, I figured it out. I was rummaging through the basement, and I ran across the little blue box that my dad had brought home from work a year earlier. Could this be a modem? I asked Mrs. Rubin a
Revenge of the HackerRevenge of the Hacker REVENGE of the HACKER Richard was a normal looking kid, he did a lot of the same things that the other kids did, hung out with friends and talked his way out of the occasional trouble he got in, much like a lot of guys his age. Richard went to Dolton public high school and just about everyone knew him by name. He did a mediocre job and was often content with getting good grades on tests and paying no attention whatsoever to homework. Although everyone in school thought they
Some Times a Shining MomentSome Times a Shining Moment In the book Sometimes a Shining Moment: Eliot Wiginton had a student that talked about a teacher who takes time to recognize students as an individual and not just part of a group. The student went on to say “I had one particular teacher that I would never forget. Once when the teacher gave back an essay I found that she had complimented my essay, the topic, and even me.” I had a teacher that that was just like the teacher that one of the juniors or seniors had. The t
The Andromeda StrainThe Andromeda Strain The book I read was Michael Crichton’s Andromeda Strain. It is a science fiction story about an outbreak of a deadly airborne virus. The virus came from an experimental satellite named Scoop VII. The satellite landed in a small town in northwestern Arizona named Piedmont. There were only 2 survivors out of forty-eight, an old person and an infant. There are four main characters who study the virus. They are Jeremy Stone, Peter Levitt, Charles Burton, and Mark Hall. It all st
How to Maintain A Computer SystemHow to Maintain A Computer System Start a notebook that includes information on your system. This notebook should be a single source of information about your entire system, both hardware and software. Each time you make a change to your system, adding or removing hardware or software, record the change. Always include the serial numbers of all equipment, vendor support numbers, and print outs for key system files. Secondly periodically review disk directories and delete unneeded files. Files ha
Creative Writing: Utopia ZCreative Writing: Utopia Z Utopia Z: Recreation Besides being able to live comfortable and easily, the people also have a lot of recreation to do, with in Utopia Z. All of the recreation, is located in the recreation dome, which is located between the Construction Plant, and the Hospital Dome. The Recreation Dome is filled with different activities, such as artificial ski-mountains, a swimming pool, and amusement park, an ice arena, a playground, a football field/track, a bungee jumping station,
I.T Faliure And DependenceI.T Faliure And Dependence In Today’s Society we are so Dependent on I.T that the Consequences of its Failure May be Catastrophic. Discuss the Threats and Causes of Failure, and Steps Taken to Minimise it. In today’s world it is impossible to run a large organisation without the aid of computers. Businesses hold massive amounts of important data, hospitals hold large amounts of confidential patient information and large scientific research projects hold important codes, formulae, and equations.
Utopia Z: RecreationUtopia Z: Recreation Utopia Z: Recreation Besides being able to live comfortable and easily, the people also have a lot of recreation to do, with in Utopia Z. All of the recreation, is located in the recreation dome, which is located between the Construction Plant, and the Hospital Dome. The Recreation Dome is filled with different activities, such as artificial ski-mountains, a swimming pool, and amusement park, an ice arena, a playground, a football field/track, a bungee jumping station, and a
A Look Into The Computer VirusA Look Into The ComputerVirus by, Michael Ross Engineering 201.02 January 22, 1997 Most of us swap disks with friends and browse the Net looking for downloads. Rarely do we ever consider that we are also exchanging files with anyone and everyone who has ever handled them in the past. If that sounds like a warning about social diseases, it might as well be. Computer viruses are every bit as insidious and destructive, and come in a vast variety of strains. A computervirus tears up your hard driv
Is Your Information Safe?Is Your Information Safe? He doesn\'t wear a stocking mask over his face, and he doesn\'t break a window to get into your house. He doesn\'t hold a gun to your head, nor does he ransack your personal possessions. Just the same he\'s a thief. Although this thief is one you\'ll not only never see, but you may not even realize right away that he\'s robbed you. The thief is a computer hacker and he enters your home via your computer, accessing personal information -- such as credit card numbers --
Journalism on the InternetJournalism on the Internet The common forms of media in today\'s world each have both advantages and disadvantages. The Internet has been around for an almost equal amount of time as most of them, but only recently has it become a popular way of retrieving information. The Internet takes the best of all other medium and combines them into a very unique form. The Internet is the best way to retrieve information. This combination of paper publishing, TV, radio, telephones, and mail is the future o
Morality and Ethics and ComputersMorality and Ethics and Computers There are many different sides to the discussion on moral and ethical uses of computers. In many situations, the morality of a particular use of a computer is up to the individual to decide. For this reason, absolute laws about ethical computer usage is almost, but not entirely, impossible to define. The introduction of computers into the workplace has introduced many questions as well: Should employers make sure the workplace is designed to minimize health risk
THE IMPORTANCE OF ANIMAL RESEARCHTHE IMPORTANCE OF ANIMAL RESEARCH Research on animals is important in understanding diseases and developing ways to prevent them. The polio vaccine, kidney transplants, and heart surgery techniques have all been developed with the help of animal research. Through increased efforts by the scientific community, effective treatments for diabetes, diphtheria, and other diseases have been developed with animal testing. Animal research has brought a dramatic progress into medicine. With the help of an
Past, Present, and Future of ComputersPast, Present, and Future of Computers Imagine being able to do almost anything right from your own living room. You could order a pizza, watch cartoons, or play video games with people from around the entire world. All are possible today with your computer. The beginnings of the computer started off in a rather unique way. It was first used to produce intricate designs with silk, a task far to long a tedious for a human to do constantly. It\'s really unbelievable how the computers changed from
Polymorphic & Cloning Computer VirusesPolymorphic & Cloning Computer Viruses The generation of today is growing up in a fast-growing, high-tech world which allows us to do the impossibilities of yesterday. With the help of modern telecommunications and the rapid growth of the personal computer in the average household we are able to talk to and share information with people from all sides of the globe. However, this vast amount of information transport has opened the doors for the computervirus of the future to flourish. As time
The Communications Decency ActThe Communications Decency Act The U.S. Government should not attempt to place restrictions on the internet. The Internet does not belong to the United States and it is not our responsibility to save the world, so why are we attempting to regulate something that belongs to the world? The Telecommunications Reform Act has done exactly that, put regulations on the Internet. Edward Cavazos quotes William Gibson says, As described in Neuromancer, Cyberspace was a consensual hallucination that felt
The Power On Self TestThe Power On Self Test When the system is powered on, the BIOS will perform diagnostics and initialize system components, including the video system. (This is self-evident when the screen first flicks before the Video Card header is displayed). This is commonly referred as POST (Power-On Self Test). Afterwards, the computer will proceed its final boot-up stage by calling the operating system. Just before that, the user may interrupt to have access to SETUP. To allow the user to alter the CMOS se
Truth and Lies About the Computer VirusTruth and Lies About the ComputerVirus Walk into any computer store today and there will be at least twenty or thirty computervirus programs. From the looks of it computer viruses have gotten out of hand and so has the business of stopping it. The computer user must cut through the media hype of apocoliptic viruses and shareware programs and discover the real facts. Before we even start the journey of exploring the computervirus we must first eliminate all the fluff. The computer user needs
Genetic Engineering, History and Future: AlteringGenetic Engineering, History and Future: Altering the Face of Science Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from analytical engine, to calculator, to computer. But science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but never in history will science be able to so deeply a
Are Good Computer Viruses Still a Bad Idea?Are Good Computer Viruses Still a Bad Idea? Vesselin Bontchev Research Associate Virus Test Center University of Hamburg Vogt-Koelln-Str. 30, 22527 Hamburg, Germany [email protected] [Editor\'s note: Vesselin\'s current email address is [email protected]] During the past six years, computer viruses have caused unaccountable amount of damage - mostly due to loss of time and resources. For most users, the term computervirus is a synonym of the worst nightmares that ca
Computer VirusesComputer Viruses It is morning. You awaken to the sweet smell of flowers and the sound of birds chirping. You turn on your new I B M compatible computer only to find that every bit and byte of information has been erased. A computervirus has struck. Yes, these small bits of computer code have slowly overtaken the world of computing. A computervirus is a small program that attaches itself to disks and computer systems with instructions to do something abnormal. Sometimes the effects of a comput
William Gibson and The InternetWilliam Gibson and The Internet Introduction The words Internet and world wide web are becoming everyday use these days, it has exploded into the mass market of information and advertising. There are bad points about the net as well as good points, this relatively new medium is growing at such a rate that the media have to take it seriously. This new form of communication was mainly populated by small groups of communities, but now that it is getting much easier to access the web these gro
HackingHacking Jenna Gray p.1 Another one got caught today, it\'s all over the papers. Teenager Areested in Computer Crime Scandal, Hacker Arrested after Bank Tampering....Damn kids. They\'re all alike. But did you , in your three-piece psychology and 1950\'s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world...Mine is a world that begins with school... I\'m in junior hi
The InternetThe Internet BY ALNUR ISAMIL 8-6 Introduction w What is the internet? w Why you should have it? w I have it Body w Who sells the internet? w Equipment that\'s is needed? w Legal/illegal implications? w Accessibility- which browser? w Material w Protection w Upload/download Conclusion w Advantages? w What can it do for you? w New world Internet The internet is a service that is available on computer to subscribers. The internet opens up a whole new world of communication, information and entertai
Year 2000: Fiction, Fantasy, and FactYear 2000: Fiction, Fantasy, and Fact The Mad Scramble for the Elusive Silver Bullet . . . and the Clock Ticks Away. Wayne Anderson November 7, 1996 The year 2000 is practically around the corner, promising a new era of greatness and wonder . . . as long as you don\'t own a computer or work with one. The year 2000 is bringing a Pandora\'s Box of gifts to the computer world, and the latch is slowly coming undone. The year 2000 bug is not really a bug or virus, but is more a computer industr
Genetic Engineering, History And FutureAltering ThGenetic Engineering, History And FutureAltering The Face Of Science Science is a creature that continues to evolve at a much higher rate than the beings that gave it birth. The transformation time from tree-shrew, to ape, to human far exceeds the time from analytical engine, to calculator, to computer. But science, in the past, has always remained distant. It has allowed for advances in production, transportation, and even entertainment, but never in history will science be able to so deeply aff
Computer VirusComputerVirusCOMPUTER VIRUSES Cateye 1 WHAT IS A COMPUTERVIRUS: The term usually used to define a computervirus is: \' A computervirus is often malicious software which replicates itself\' [ Podell 1987 for similar definition ] - COMPUTER VIRUSES ARE BASICALLY PROGRAMS, LIKE A SPREADSHEET OR A WORD PROCESSOR. - PROGRAMS WHICH CAN INSERT EXECUTABLE COPIES OF ITSELF INTO OTHER PROGRAMS. - PROGRAMS THAT MANIPULATES PROGRAMS, MODIFIES OTHER PROGRAMS AND REPRODUCE ITSELF IN THE PROCESS. Comparin
Computer VirusesComputer Viruses A computervirus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors. A file infector attaches to ordinary programs usually affecting .COM and .EXE files. These two files are subject to infection though some can infect any program from which
THe World Of VirusesTHe World Of Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the Information Highway , as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauth
Information TechnologyInformation Technology Information technology is a rapidly growing part of today\'s society. It affects everyone\'s life in many aspects. Every human endeavor is influenced by information technology and the increasing rate at which what it can perform includes. One area of human endeavor that information technology has greatly influenced is the practice of medicine, specifically veterinary medicine. Not only has veterinary medicine been influenced by information technology, it has also been enha
The InternetThe Internet The Internet: its effects and its future written by Eva Kotsi Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie in a co
The internetThe internet The Internet: its effects and its future Essay written by Eva Kotsi Internet, its effects in our lives and the future of the Internet: The Internet is, quite literally, a network of networks. It is comprised of ten thousands of interconnected networks spanning the globe. The computers that form the Internet range from huge mainframes in research establishments to modest PCs in people\'s homes and offices. Despite the recent hype, the Internet is not a new phenomenon. Its roots lie i
Is Information On The Net Reliable?Is Information On The Net Reliable? Is Information on the Net Invalid? In his essay, “Picking Nits on the Net,” John Oughton reminds Internet users that information on the Net does not have a guarantee of authenticity, so it must be carefully evaluated. Oughton gives some examples and also provides some useful advice on evaluating information on the Internet. Oughton’s writing is well supported by reasonable arguments, informative and very useful, and the examples that he uses are commonly encou
Managing A PCManaging A PC Managing A Personal Computer 1.1 The AUTOEXEC.BAT file is one of files which loads every time the computer is booted. It contains command lines and procedures to run programs and load settings for the system’s hardware and software configuration. It also may contain command lines procedures to run programs which may clean your system’s hard drive of temporary files and viruses. An example of this file is shown below: @ECHO OFF PROMPT $P$G SET PATH=C:DOS LH C:SBCDDRVMSCDEX.EXE /S /D
Star Trek - The Next GenerationStar Trek - The Next Generation Star date: 41176.8 Captain\'s log. This is my (Captain Jean-Luc Picard of the U.S.S. Enterprise #NCC-17O1 D) account of the events leading up to and beyond the Federation and Romulan war (2380-2385 AD). Star date: 32851.2: The Enterprise received a distressed call from a fleeing scout ship. SOS... I am ... under ... attack!! request ... asylum ... Federation ... Space!!.. The ship was pushing the limits of its engines as it hurtled out of the neutral zone -- the v
Computer VirusesComputer Viruses A virus is a program that copies itself without the knowledge of the computer user. Typically, a virus spreads from one computer to another by adding itself to an existing piece of executable code so that it is executed when its host code is run. If a virus if found, you shouldn\'t panic or be in a hurry, and you should work systematically. Don\'t rush! A Viruse may be classified by it\'s method of concealment (hiding). Some are called stealth viruses because of the way that the
Information About VirusesInformation About Viruses A growing problem in using computers is computer viruses. Viruses are pesky little programs that some hacker with too much time on his hands wrote. Viruses have been known to create annoyances from displaying messages on the screen, such as Your PC is now stoned, to completely obliterating everything that is contained on the computer\'s hard disk. Viruses are transferred from computer to computer in a number of ways. The most common way that users receive viruses at h
Computer Viruses: Past, Present And FutureComputer Viruses: Past, Present And Future In our health-conscious society, viruses of any type are an enemy. Computer viruses are especially pernicious. They can and do strike any unprotected computer system, with results that range from merely annoying to the disastrous, time-consuming and expensive loss of software and data. And with corporations increasingly using computers for enterprise-wide, business-critical computing, the costs of virus-induced down-time are growing along with the threa
STAR TREK - THE NEXT GENERATIONSTAR TREK - THE NEXT GENERATION Star date: 41176.8 Captain\'s log. This is my (Captain Jean-Luc Picard of the U.S.S. Enterprise #NCC-17O1 D) account of the events leading up to and beyond the Federation and Romulan war (2380-2385 AD). Star date: 32851.2: The Enterprise received a distressed call from a fleeing scout ship. SOS... I am ... under ... attack!! request ... asylum ... Federation ... Space!!.. The ship was pushing the limits of its engines as it hurtled out of the neutral zone -- the v
Computers in EducationComputers in Education The typical school has 1 computer per 20 students, a ratio that computer educators feel is still not high enough to affect classroom learning as much as books and classroom conversation. Some critics see computer education as merely the latest in a series of unsuccessful attempts to revolutionise education through the use of audio- and visually-oriented non print media. For example, motion pictures, broadcast television, filmstrips, audio recorders, and videotapes were all
Animal Cruelty?Animal Cruelty? Animal Cruelty? How would you like it if you were used in an experiment to see if the mascara your girlfreind used was safe? And then when they were done with you, they disposed of you and killed you off as if you didn’t matter. Well that’s what is being done to animals. They are being tested on. Sometimes scientist give animals radioactive material to eat to see how fast they die. If you know that the animal is going to die, why would you do something so inhumane for no apperant
Computer CrimeComputer Crime Computer crimes need to be prevented and halted thought increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace: Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. All that is required is a personal computer, a modem, and a phone line. Increasing instances of white-collar crime involve computers as more businesses automate and information becomes an important asset
Computer Crime: The Crime of the FutureComputer Crime: The Crime of the Future English II 6 April 1996 Explosive growth in the computer industry over the last decade has made new technologies cheaper and simpler for the average person to own. As a result, computers play an intricate part in our daily lives. The areas in which computers affect life are infinite, ranging from entertainment to finances. If anything were to happen to these precious devices, the world would be chaotic. There is a type of person that thrives on chaos, that
Computer Fraud and CrimesComputer Fraud and Crimes In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the proper steps are not taken, safe computing may become a thing of the past. Many security measures are being implemented to protect
Computer CrimesComputer Crimes It\'s the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are:
Computer Crime Is IncreasingComputer Crime Is Increasing A report discussing the proposition that computer crime has increased dramatically over the last 10 years. Introduction Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their contents are damag
Electronic CrimeElectronic Crime Introduction In the past decade, computer and networking technology has seen enormous growth. It is now possible for people all over the world to communicate and share information from virtually anywhere. This growth however, has not come without a price. With the advent of the Information Highway , as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the rec
Computer VirusesComputer Viruses (anonymous) 1 WHAT IS A COMPUTERVIRUS: The term usually used to define a computervirus is: \' A computervirus is often malicious software which replicates itself\' [ Podell 1987 for similar definition ] - COMPUTER VIRUSES ARE BASICALLY PROGRAMS, LIKE A SPREADSHEET OR A WORD PROCESSOR. - PROGRAMS WHICH CAN INSERT EXECUTABLE COPIES OF ITSELF INTO OTHER PROGRAMS. - PROGRAMS THAT MANIPULATES PROGRAMS, MODIFIES OTHER PROGRAMS AND REPRODUCE ITSELF IN THE PROCESS. However, compute
Computer Viruses and their Effects on your PCComputer Viruses and their Effects on your PC Table of Contents What is a Virus? .............................................1 HOW A VIRUS INFECTS YOUR SYSTEM: .............................2 HOW DOES A VIRUS SPREAD? .....................................3 BIGGEST MYTH: I BUY ALL OF MY PROGRAMS ON CD ROM FROM THE STORE. STORE BOUGHT SOFTWARE NEVER CONTAINS VIRUSES.... 3 INFECTION (DAMAGES) ..........................................4 PROTECT YOUR COMPUTER, NOW!! ................................
Saddam Hussien WarSaddam Hussien War Persian Gulf War-the Feat of the Western Countries Essay submitted by Unknown On August 2nd, 1990 Iraqi military forces invaded and occupied the small Arab state of Kuwait. The order was given by Iraqi dictatorial president Saddam Hussein. His aim was apparently to take control Kuwait\'s oil reserves (despite its small size Kuwait is a huge oil producer; it has about 10 per cent of the world\'s oil reserves ). Iraq accused Kuwait, and also the United Arab Emirates, of breaking