home *** CD-ROM | disk | FTP | other *** search
- <text id=94HT0011>
- <title>
- Sep. 26, 1988:Invasion of the Data Snatchers
- </title>
- <history>Time-The Weekly Magazine-1980s Highlights</history>
- <article>
- <source>Time Magazine</source>
- <hdr>
- Invasion of the Data Snatchers
- September 26, 1988
- </hdr>
- <body>
- <p> A "Virus" epidemic strikes terror in the computer world.
- </p>
- <p>By Philip Elmer-DeWitt--Reported by Scott Brown/San Francisco
- and Thomas McCarroll/New York, with other bureaus.
- </p>
- <p> Froma Joselow was getting ready to bang out a newspaper
- story when the invisible intruder struck. Joselow, a financial
- reporter at the Providence Journal-Bulletin, had carefully
- slipped a disk holding six months' worth of notes and
- interviews into one of the newsroom computers when the
- machine's familiar whir was pierced by a sharp, high-pitched
- beep. Each time she tried to call a file to the screen the
- warning DISK ERROR flashed instead. It was as if the contents
- of her floppy disk had vanished. "I got that sinking feeling,"
- recalls Joselow. "Every writing project of mine was on that
- disk."
- </p>
- <p> In the Journal-Bulletin's computer center, where Joselow
- took her troubled floppy, the detective work began
- immediately. Using an binary editor--the computer equivalent
- of a high-powered magnifying glass--Systems Engineer Peter
- Scheidler examined the disk's contents line by line. "What I
- saw wasn't pretty." says Scheidler. "It was garbage, a real
- mess." Looking for a way to salvage at least part of Joselow's
- work, he began peering into each of the disk's 360 concentric
- rings of data.
- </p>
- <p> Suddenly he spotted something that gave him a chill.
- Buried near Sector 0, the disk's innermost circle, was
- evidence that the glitch that had swallowed six month's of
- Joselow's professional life was not a glitch at all but a
- deliberate act of sabotage. There, standing out amid a stream
- of random letters and numbers, was the name and phone number
- of a Pakistani computer store and a message that read, in
- part: WELCOME TO THE DUNGEON...CONTACT US FOR VACCINATION.
- </p>
- <p> Joselow had been stricken by a pernicious virus. Not the
- kind that caused measles, mumps or the Shanghai flu, but a
- special strain of software virus, small but deadly program
- that lurks in the darkest recesses of a computer waiting for
- an opportunity to spring to life. The computer virus that
- struck Joselow had been hiding in the memory of the
- newspaper's machine and had copied itself onto her data
- disk, scrambling its contents and turning the reporter's words
- and sentences into electronic confetti.
- </p>
- <p> What was the intruder doing in the newsroom computer? Who
- had unleashed it and to what purpose? This particular virus
- was ultimately traced to two brothers who run a computer store on,
- of all places, Lahore, Pakistan. The brothers later admitted
- that they had inserted the program into disks they sold to
- tourists attracted to their store by its cut-rate prices.
- Their motive: to "punish" computer users for buying and
- selling bootleg software and this depriving merchants of
- potential sales.
- </p>
- <p> The Pakistani virus is only one of a swarm of infectious
- programs that have descended on U.S. computer users this
- year. In the past nine months, an estimated 250,000 computers,
- from the smallest laptop machines to the most powerful
- workstations, have been hit with similar contagions. Nobody
- knows how far the rogue programs have spread, and the exact
- mechanism by which they select their innocent victims--resting
- harmlessly in some computers and striking destructively in
- others--is still a mystery.
- </p>
- <p> What is clear, however, is that a once rare electronic
- "disease" has suddenly reached epidemic proportions. Across
- the U.S., it is disrupting operations, destroying data and
- raising disturbing questions about the vulnerability of
- information systems everywhere. Forty years after the dawn of
- the computer era, when society has become dependent on high-
- speed information processing for everything from corner cash
- machines to military-defense systems, the computer world is
- being threatened by an enemy from within.
- </p>
- <p> Last week in Fort Worth, a jury heard evidence in what
- prosecutors describe as the epidemic's first criminal trial.
- A 40-year-old programmer named Donald Gene Burleson is accused
- of infecting a former employer's computer with a virus-like
- program that deleted more than 168,000 records of sales
- commissions. Burleson says he is innocent, but he was ordered
- to pay his former employer $12,000 in a civil case based on
- similar charges. If convicted, he could face ten years in
- prison.
- </p>
- <p> A virus, whether biological or electronic, is basically
- an information disorder. Biological viruses are tiny scraps
- of genetic code--DNA or RNA--that can take over the machinery
- of a living cell and trick it into making thousands of
- flawless duplicates of the original virus. Like its biological
- counterpart, a computer virus carries in its instructional
- code a recipe for making perfect copies of itself. Lodged in a
- host computer, the typical virus takes temporary control of
- the computer's disk operating system. Then, whenever the
- infected computer comes in contact with an uninfected piece
- of software, a fresh copy of the virus passes into the new
- program. Thus the infection can be spread from computer to
- computer by unsuspecting users who either swap disks or send
- programs to one another over telephone lines. In today's
- computer culture, in which everybody from video gamesters to
- businessmen trades computer disks like baseball cards, the
- potential for widespread contagion is enormous.
- </p>
- <p> Since viruses can travel from one place to another as
- fast as a phone call, a single strain can quickly turn up in
- computers hundreds of miles apart. The infection that struck
- Froma Joselow hit more than 100 other disks at the Journal-
- Bulletin as well as an estimated 100,000 IBM PC disks across
- the U.S.--including some 10,000 at George Washington
- University alone. Another virus, called SCORES for the name
- of the bogus computer file it creates, first appeared in Apple
- Macintosh computers owned by Dallas-based EDS, the giant
- computer services organization. But it spread rapidly to such
- forms as Boeing and Arco, and has since turned up in computers
- at NASA, the IRS and the U.S. House of Representatives.
- </p>
- <p> Many of America's 3,000 electronic bulletin-board
- systems have suffered some kind of infection, as have hundreds
- of user groups and thousands of businesses. "It is the topic
- of conversation within the computing society," says John
- McAfee, head of InterPath, a computer firm in Santa Clara,
- Calif.
- </p>
- <p> So far, real disaster has been avoided. No killer virus
- has penetrated the country's electronic funds-transfer system,
- which is essential to the operation of the nation's banks. No
- stock- or commodity-exchange computer centers have crashed.
- No insurance-company rolls have been wiped out. No pension
- funds have had their records scrambled. No air-traffic
- control systems have ground to a halt. And the U.S. military
- defense system remains largely uncompromised, although there
- have been published reports of virus attacks at both the FBI
- and the CIA.
- </p>
- <p> But most experts warn that the worst is yet to come. "The
- viruses we've seen so far are child's play," says Donn Parker,
- a computer-crime expert at SRI International in Menlo Park,
- Calif. Parker fears that the same viruses that are
- inconveniencing personal computer users today could, through
- the myriad links and entry points that connect large networks,
- eventually threaten the country's most vital computer
- systems. Agrees Harold Highland, editor of Computer & Security
- magazine: "We ain't seen nothing yet."
- </p>
- <p> At last count, more than 25 different viral strains had
- been isolated, and new ones are emerging nearly every week.
- Some are relatively benign, like the virus, spread through
- the CompuServe network that caused machines equipped with
- voice synthesizers to intone the words "Don't panic." Others
- are more of a nuisance, causing temporary malfunctions or
- making it difficult to run isolated programs. But some are
- bent on destroying valuable data. "your worst fear has come
- true," wrote a computer buff in a report he posted on an
- electronic bulletin board to warn other users about a new
- Macintosh virus. "Don't share disks. Don't copy software.
- Don't let anyone touch your machine. Just say no."
- </p>
- <p> Who are the perpetrators of this mischief? At first glance
- they seem an odd and varied lot. The Pakistani brothers are
- self-taught programmers isolated from the rest of the computer
- community. Two viruses exported to the U.S. from West Germany,
- by contrast, were bred in academia and spread by students.
- Other outbreaks seem to have come directly out of Silicon
- Valley. Rumor has it that the SCORES virus was written by a
- disgruntled Apple employee.
- </p>
- <p> But some observers see an emerging pattern, the virus
- writers tend to be men in their late teens or early 20s who
- have spent an inordinate portion of their youth bathed in the
- glow of a computer screen. Scientific American Columnist A.K.
- Dewdney, who published the first article on computer viruses,
- describes what he calls a "nerd syndrome" common among
- students of science and technology. Says Dewdney: "They live
- in a very protected world, both socially and emotionally. They
- leave school and carry with them their prankish bent."
- </p>
- <p> Thomas Lunzer, a consultant at SRI, believes the
- proliferation of microcomputers in schools and homes has
- exacerbated the problem. A powerful technology became widely
- available without the development of a code of ethics to keep
- that power in check. "We're harvesting our first crop of a
- computer-literate generation," says Lunzer. "The social
- responsibility hasn't caught up with them."
- </p>
- <p> A case in point is Drew Davidson, a 23-year-old
- programmer from Tucson, who has achieved some notoriety as the
- author of the so-called Peace virus, which flashed an
- innocuous greeting on thousands of computer screens last
- spring. A study on self-contradiction, Davidson rails against
- those who would create malignant viruses, calling them
- "copycats" and "attention seekers." Yet he cheerfully admits
- that he created his virus at least in part to draw attention
- to his programming skills. "In the beginning, I didn't think
- it would have this kind of impact," he says. "I just thought
- we'd release it and it would be kind of neat."
- </p>
- <p> On March 2, when several thousand Macintosh owners turned
- on their machines, they were greeted by a drawing of planet
- earth and a "universal message of peace" signed by Richard
- Brandow, a friend of Davidson's and the publisher of a
- Canadian computer magazine. The virus did no harm. It flashed its
- message on the screen and then erased its own instructions,
- disappearing without a trace.
- </p>
- <p> But what made this virus special was how it spread.
- Brandow, who collaborated with Davidson in creating it,
- inserted the virus into game disks that were distributed at
- meetings of a Montreal Macintosh users group. A speaker at one
- meeting was a Chicago software executive named Marc Canter,
- whose company was doing some contract work for Aldus Corp.,
- a Seattle-based software publisher. Cantor innocently picked
- up a copy of the infected disk, tried it out on his office
- computer and then proceeded, on the same machine, to review
- a piece of software being prepared for shipment to Aldus.
- Unaware that he had thereby passed on the hidden virus to the
- Aldus program. Canter sent an infected disk to Seattle.
- There the virus was unwittingly reproduced by Aldus employees,
- inserted in several thousand copies of a graphics program
- called Freehand, and shipped to computer stores around the
- country. It was the first case of a virus spreading to a
- commercial software product.
- </p>
- <p> The Peace virus capped a series of outbreaks that began
- last December when a seemingly harmless Christmas greeting
- appeared mysteriously on terminals connected to a worldwide
- network owned and operated by IBM. Users who followed the
- instructions on the screen and typed the word Christmas
- inadvertently triggered a virus-like self-replicating
- mechanism, sending an identical copy of the original program
- to every name on their personal electronic mailing lists. In
- a matter of days, clones of the tiny program had multiplied
- in such profusion that they clogged the 350,000-terminal
- network like so many hairs in a bathtub drain.
- </p>
- <p> Later that month, scientists at Jerusalem's Hebrew
- University reported that some of their desktop computers were
- growing lethargic, as if a hidden organism were sapping their
- strength. Once again, the problem was traced to a rapidly
- multiplying program that was consuming computer memory. This
- program carried out something else as well. Within its
- instructional code was a "time bomb" linked to each
- computer's internal clock and set to go off the second Friday
- in May--Friday the 13th, the 40th anniversary of the State of
- Israel. Any machine still infected on that date would suffer
- the instant loss of all its files. Fortunately, the virus was
- eradicated well before May 13, and the day passed without
- incident.
- </p>
- <p> The alarm caused by the appearance of these three viruses
- was amplified by two groups with a vested interest in making
- the threat sound as dramatic as possible. On one side are the
- computer-security specialists, a small group of consultants
- who make $100 an hour or more by telling corporate computer
- users how to protect their machines from catastrophic failure.
- On the other is the computer press, a collection of highly
- competitive weekly tabloids that have seized on the story like
- pit bulls, covering every outbreak with breathless copy and
- splashy headlines.
- </p>
- <p> Meanwhile, entrepreneurs eager to profit from the
- epidemic have rushed to market with all sorts of programs
- designed to protect against viruses. In advertising that
- frightens more than it informs, they flog products with names
- like Flu Shot, Vaccinate, Data Physician, Disk Defender,
- Antidote, Virus RX, Viru-Safe, and Retro-V. Do computer viruses really exist? You bet they do!" screams
- a press release for Disk Watcher 2.0, a product that
- supposedly prevents virus attacks. Another program, VirALARM,
- boasts a telling feature; it instructs an IBM PCs internal
- speaker to alert users to the presence of a viral intruder
- with a wail that sounds like a police siren.
- </p>
- <p> Comparisons with germ welfare and sexually transmitted
- diseases were perhaps inevitable. A virus that struck Lehigh
- University quickly got tagged "PC AIDS" That analogy is both
- overstated and insensitive, but it stems from a real concern
- that the computer revolution, like the sexual revolution, is
- threatened by viruses. At Apple, a company hit by at least
- three different viral strains, employees have been issued
- memos spelling out "safe computing practices" and reminded,
- as Product Manager Michael Holm puts it: "If you get a floppy
- disk from someone, remember that it's been in everyone else's
- computer too."
- </p>
- <p> The publicity has triggered a certain amount of hysteria.
- Systems managers have imposed elaborate quarantines on their
- companies' machines. Computer columnists have advised readers
- to put their PCs under lock and key and, in one radical
- proposal, to disconnect their machines permanently from all
- data networks and telephone lines. Data processing managers have
- rushed to stock up on antiviral programs. "We're seeing panic
- buying by those who have already been hit," says William Agne,
- president of ComNetco, which publishes Viru-Safe. When a
- virus showed up at the University of Delaware, the assistant
- manager of academic computing services immediately bought six
- different pieces of antiviral software. Then she began
- screening every floppy disk on campus--some 3,000 in all.
- </p>
- <p> In some cases, the threat of a virus is enough to spread
- panic. When scientists at the Lawrence Livermore National Lab
- were warned by a Government security center last May that a
- virus lurking in the lab's 450 computers was set to be
- activated that day, many users stopped work and began
- feverishly making backup copies of all their disks. The
- warning of a virus turned out to be a hoax, but in such an
- atmosphere says Chick Cole, Livermore's deputy computer-
- security manager, "a hoax can be as disruptive as the real
- thing."
- </p>
- <p> Industry experts are concerned that the publicity
- surrounding virus infections, like the attention given
- political kidnappings, could invite more attacks. "When we
- talk viruses, we create viruses," cautions Robert Courtney,
- a computer consultant from Kingston, N.Y. "We almost make it
- a self-fulfilling prophecy."
- </p>
- <p> But the ranks of those who would dismiss the virus
- threat as a Chicken Little scare are getting smaller with
- every outbreak Mitchell Kapor, founder of Lotus Development
- and now chairman of ON technology, became a believer when
- some of his associates were infected. "It isn't the fall of
- Western civilization," says Kapor, "but the problem is real
- and the threat is serious." Scientific American's Dewdney has
- had a similar change of heart. "At first I thought these new
- outbreaks were much ado about nothing," he says. "but I'm now
- convinced that they are a bigger threat than I imagined."
- </p>
- <p> The idea of an electronic virus was born in the earliest
- days of the computer era. In fact, it was computer Pioneer
- John von Neumann who laid out the basic blueprint in a 1949 paper
- titled,"Theory and Organization of Complicated Automata." If
- most of his colleagues found the idea that computer programs
- might multiply too fantastic to be taken seriously, they can
- be forgiven, for the paper predated the first commercial
- electronic computers by several years. But a handful of
- scientists quietly pursued Von Neumann's ideas, keeping them
- alive in the scientific literature until they sprang to life
- ten years later at AT&T's Bell Laboratories in the form of a
- bizarre after-hours recreation known as Core War.
- </p>
- <p> Core War was the brainstorm of three Bell Labs
- programmers then in their early 20s: H. Douglas McIlroy,
- Victor Vysottsky, and Robert Morris. Like Von Neumann, they
- recognized that computers were vulnerable to a peculiar kind
- of self-destruction. The machines employed the same "core"
- memory to store both the data used by programs and the
- instructions for running those programs. With subtle changes
- in its coding, a program designed to consume data could be
- made instead to consume programs.
- </p>
- <p> The researchers used this insight to stage the first Core
- War, a series of mock battles between opposing armies of
- computer programs. Two players would write a number of self-
- replicating programs, called "organisms," that would inhabit
- the memory of a computer. Then, at a given signal, each
- player's organisms did their best to kill the other player's
- generally by devouring their instructions. The winner was the
- player whose programs were the most abundant when time was
- called. At that point, the players erased the killer programs
- from the computer's memory, and that was that.
- </p>
- <p> These clandestine battles, which took place late at night
- when computer usage was low, were quietly sanctioned by Bell
- Labs' bemused managers, many of whim were senior scientists.
- The fun soon spread to other leading computer research
- facilities, including Xerox's Palo Alto Research Center and
- the artificial intelligence lab at M.I.T.
- </p>
- <p> In those early days, when each computer was a stand-
- alone device, there was no threat of a runway virus. Of things
- got out of control on a particular machine, its keepers could
- simply shut it down. But all that changed when computers
- began to be connected to one another. A self-replicating organism
- created in fun could be devastating if loosed upon the world
- of interconnected machines. For that reason, the Core War
- combatants observed an unspoken vow never to reveal to the
- public the details of their game.
- </p>
- <p> In 1983 the programmers code of honor was broken. The
- culprit was Ken Thompson, the gifted software engineer who
- wrote the original version of Unix, the computer operating
- system now coming into widespread use. Thompson was being
- presented the Association for Computing Machinery's
- prestigious A.M. Tutoring Award when he gave a speech that not
- only revealed the existence of the first computer virus, but
- showed the audience how to make them. "If you have never done
- this," he told them. "I urge you to try it on your own."
- </p>
- <p> His colleagues were aghast, but the e secret was out. And
- the revelation was further compounded by Dewdney's landmark
- article in the May 1984 issue of Scientific American, which
- described Core War and offered readers who sent $2 for
- postage a copy of the guidelines for creating their own viral
- battlefields.
- </p>
- <p> Soon software viruses began appearing in university
- computer systems and in the widely proliferating desktop
- computers. A rogue program that made the rounds of Ivy League
- schools featured a creature inspired by Sesame Street called
- the Cookie Monster. Students trying to do useful work would
- be interrupted by persistent messages saying "I want a
- cookie." In one variation, the message would be repeated with
- greater and greater frequency until users typed the letters
- C-O-O-K-I-E on their terminal keyboards.
- </p>
- <p> But not all viruses are so playful. One particularly
- vicious program deletes everything stored on the computer and
- prints the word GOTCHA! on the screen. Another takes the form
- of a game called "rck.video." It delights unsuspecting users
- with an animation featuring the singer Madonna before erasing
- the files on their disks. Then it chortles, "You're stupid to
- download a video about rock stars."
- </p>
- <p> Such pranks enrage the original Core War programmers.
- McIlroy and his friends took care that their high-tech high
- jinks did not put other people's programs and data at risk.
- "I'm amazed at how malicious some of today's players are,"
- says McIlroy, who is a senior member of the technical staff
- at Bell Labs. "What was once a friendly, harmless game has
- deteriorated into something that is neither friendly,
- harmless, nor a game.
- </p>
- <p> So far, the mainframe computers that do much of the most
- vital information processing in the U.S. remain relatively
- unscathed. "With mainframes, we've got a whole regimen of
- quality control and data integrity that we use," says Bill
- Wright, a spokesman for EDS. But with the rapid spread of PC-
- to-mainframe linkups, that safety could be compromised. "If
- the same sorts of standards aren't applied soon to the PC
- environment," says Wright, "it's going to be a real problem
- for the whole industry."
- </p>
- <p> In the past, companies that were hit by a virus generally
- kept it quiet. But the computer-sabotage trial in Fort Worth
- may be a sign that things are changing. Texas is one of 48
- states that have passed new laws against computer mischief,
- and four years ago President Reagan signed a federal law that
- spelled out harsh penalties for unauthorized tampering with
- Government computer data. But most statues were written before
- viruses surfaced as a major problem, and none mention them
- by name. In May, an organization of programmers called the
- Software Development Council met in Atlanta to launch a
- movement to plug that loophole in the law. Declares Michael
- Odawa, president of the council, "I say, release a virus, go
- to jail."
- </p>
- <p> Come computer users are not waiting for legal protection.
- Don Brown, a Macintosh enthusiast from Des Moines, responded
- to the Peace virus outbreak by writing an antiviral program
- and giving it away. Brown's Vaccine 1.0 is available free on
- most national computer networks, including CompuServe, the
- Source and GEnie. InterPath's McAfee fights viruses from a 27-
- ft. mobile home known as the Bugbuster. Carrying up to six
- different computers with him, he pays house calls on local
- firms and colleges that have been infected, dispensing advice
- and vaccines and, like a good epidemiologist, taking samples
- of each strain of virus. Lately he has been averaging more
- than 30 calls a day. Says he: "You're always trying to stay
- one step ahead or as close behind as possible."
- </p>
- <p> Like a biological vaccination, a vaccine program is a
- preventative measure--an attempt to protect an uninfected disk
- from invasion by an uninvited program. Most software vaccines
- take advantage of the fact that computer viruses usually hide
- themselves in one of a few locations within the machine's
- control software. A typical vaccine will surround those memory
- locations with the equivalent of a burglar alarm. If something
- tries to alter the contents of one of those cells, the vaccine
- program is supposed to stop everything and alert the operator.
- But because there were so many different viral strains out
- there, vaccines are often ineffective.
- </p>
- <p> Once a computer has been hot by a virus, the invader can
- sometimes be eradicated by a special program that searches out
- and erases each bit of foreign material, Generally, however,
- the simplest way to bring an infected computer back to health
- is to shut it down, purge its memory and all its disks, and
- rebuild its files from scratch. Programs should be loaded from
- the original manufacturer's copy, and new disks should be
- carefully screened for the presence of an unwanted intruder.
- There are any number of products that will do this, usually
- by searching for files that are suspiciously long and may be
- harboring a virus.
- </p>
- <p> But none of these antiviral programs are foolproof. Virus
- writers are constantly making end runs around the barricades
- erected against them. Even a total purge of a computer system
- us no guarantee against reinfection. McAfee reports that three
- out of four of the installations he visits suffer a relapse
- within a week, usually from disks missed on the first go-round
- or carried in from the outside. In recent months, a pesky new
- type of virus has emerged. So-called retroviruses are designed
- to reappear in systems after their memories have been wiped
- clean. Other viruses infect a computer's hardware, speeding
- up a disk drive, for example, so that it soon wears itself
- out. Particularly dangerous are bogus antiviral programs that
- are actually viruses in disguise and spread infection rather
- than stop it.
- </p>
- <p> Where will it end? The computer world hopes that the
- novelty of software viruses will pass along the way of letter
- bombs and poisoned Tylenol. But even if the epidemic
- eventually eases, the threat will remain. The uninhibited
- program swapping that made the early days of the computer
- revolution so exciting may be gone forever. Never again will
- computer buffs be able to accept a disk or plug into a network
- without being suspicious--and cautious.
- </p>
- </body>
- </article>
- </text>
-
-