home *** CD-ROM | disk | FTP | other *** search
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 26
- Release Date: February 20, 1988
-
- Tolmes News Service Issue #26 will deal with computer viruses;the Trojan Horse.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- TITLE: COMPUTER TERRORISM!
- FROM: The Chicago Sun-Times
- DATE: January 17, 1988
-
- By Jim Ritter
-
-
- Malicious hackers have discovered a new weapns for disabling computers:
- an electronic "virus" that bears similarities to the AIDS virus.
- An electronic virus is a set of instruction hidden within a computer
- that destroys programs, wipes out data and does other mischief. Worst of all,
- it reproduces itself like a biological viruse, and "infects" other computers
- it contacts.
- "It might do to computers what AIDS has done to sex," said Shai Bushinsky,
- an Israeli computer expert. "The current free flow of information will stop.
- Everyone will be careful who they come into contact and with whom they share
- their information."
- In Jerusalem, a virus infecting Hebrew University computers threatens to
- destroy thousands of electronic files and wipe out years of research. Whoever
- introduced it "wanted to wield power over others and didn't care how he did
- it," said programmer Yisrael Radan.
- Last November, a virus spread through personal computers at Lehigh
- University in Bethlehem, Pa. Several hundred people lost data and programs,
- including term papers written on word processors and financial ledgers
- prepared for business classes.
- An before Christmas, some grinch infected computers in IBM corporate
- offices with a virus that brought the corporation's computer mail network to
- a virtual halt for a few hours.
- "The problem has really just surfaced," said Donn Parker, an expert on
- computer security for SRI International. "Once one of these things is done,
- it's like a break in the dam. Malicious hackers will pick up on the idea and
- try to do one better than the next guy."
- Computer viruses are the latest weapons to be used by the disgruntled
- employees, irresponsible hackers and teenage "twits" who have been terrorizing
- computer users throughout the 1980s.
- The saboteur begins by using a secret code to hide his virus in a
- seemingly legitimate program known as a Trojan Horse.
- At first, the virus lays dormant and the unsuspecting user doesn't notice
- anything wrong. The program continues to do its intended job, such as word
- processing or accounting functions.
- Meanwhile, the virus spreads to programs in other computers. The
- affliction can spread quickly because computer users swap programs all the
- time. One common method is putand lending it out.
- Another popular practice is hooking up to elec-
-
-
- -------------------------------------------------------------------------------
-
- Weapons of Computer Sabotage
-
-
- TROJAN HORSE: Program within a program, containing secret instructions. Attacks
- unsuspecting user by unleashing sinister activities known as viruses, time
- bombs, worms, and salami attacks.
-
-
- VIRUS: Destroys data or program instructions stored in a computer disc by
- writing over it. Reproduces itself so that it can "infect" and destroy other
- programs it contacts.
-
-
- TIME BOMB: Instructions that tell a virus when to attack. It may explode, for
- example, on Friday the 13th, or the moment a fired employee's I.D. number is
- removed from the payroll records.
-
-
- WORM: Destroys data as it wriggles through a program. For example, one type
- of worm makes thousands of copies of itself, wiping out everything else in
- the program's memory.
-
-
- SALAMI ATTACK: Instructs computer in a financial institution to divert small
- ammount of money from thousands of accounts into the user's accout. It's
- like stealing thin slices of salami from other people's sausages to make your
- own roll.
-
-
- -------------------------------------------------------------------------------
-
- tronic "bulletin boards," where users swap programs, games, and messages over
- telephone lines.
- The virus attacks at a predetermined time. At Hebrew University,
- for example, the virus was programmed to do damage every Friday and on the
- 13th day of each month.
- Not all viruses are destructive. Indeed, one computer game involves a
- viruse that reproduces itself within the computer without damaging anything.
- The object is to write instructions that search out and destroy the virus.
- The virus that infected IBM's computer mail network may have been
- meant more as a prank than a malicious act. The prankster's "letter" was a
- drawing of a Christmas tree. It appeared on the screen when the receiver
- opened his electronic mail.
- The virus spread rapidly, like a chain letter. It would go to every
- colleague on the user's mailing list, and then to every one on his colleagues'
- mailing lists. Before long, the network was as jammed as the Dan Ryan at rush
- hour. But no permanent damage was done.
- By contrast, a virulent virus is meant to destroy data or progrms stored
- in a computer, known as software. Such a virus doesn't harm the computer itself
- but the software is more valuable. Unleashing a virus is like destroying an
- authors 400 page manuscript but leaving his typewriter alone.
- Viruses can be killed by writing search-and-destroy programs. But
- because viruses can do great damage before their detected, it's best not to
- contact them in the first place.
- There are several defenses. One example is protective software, such as
- the program CHK4BOMB ("check for bomb"). CHK4BOMB screens programs for
- suspicious instructions that may contain a virus.
- Users also record backup copies of valuable software on floppy discs. They
- should be stored away from the computer where they can't be infected. Perhatant, users should swap programs only with people they trust.
- But none of these measures are foolproof. As with AIDS, the only
- completely safe strategy is abstinence: Never trade discs or swap programs on
- bulletin boards.
- But computer celibacy isn't likely to catch on, said Curtis Sahakian, a
- leading bulletin board operator. The Chicago area alone has at least 100
- bulletin boards, some receiving hundreds of calls a day.
- "People will not stop using them," Sahakian said. "Nor will they stop
- having sex."
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- I like the how they compared it with AIDS..... yeah.. right.
-
-
- Some things to not about the article:
-
- -------------------------------------------------------------------------------
-
- "malicious hackers"-
-
- Whenever they use the word hacker, they have the work malicious or perhaps
- irresponsible in front of it.
-
- -------------------------------------------------------------------------------
-
- "bears similarities to the AIDS virus"-
-
- It's nice that they could compare those things.
-
- -------------------------------------------------------------------------------
- "'The problem has really just surfaced,' said Donn Parker, an expert on
- computer security for SRI International. 'Once one of these things is done,
- it's like a break in the dam. Malicious hackers will pick up on the idea and
- try to do one better than the next guy.'-
-
- I know very little about Donn Parker but I do know that every time there is
- some news story about hackers they always consult him. It seems like they
- always have a quote from Donn Parker on computer security. You'll notice how he
- says "malicious" hackers.
-
- And doesn't everybody want to make the latest K-R/\D virus....d00d??
-
- Hackers aren't trying to create better and better viruses.
-
- -------------------------------------------------------------------------------
-
- "At first, the virus lays dormant and the unsuspecting user doesn't notice
- anything wrong."-
-
- Viruses can remain dormant. This is true. One example it the GIMME A COOKIE
- virus and the ARF! ARF! GOTCHA virus.
-
- -------------------------------------------------------------------------------
-
- "Computer viruses are the latest weapons to be used by the disgruntled
- employees, irresponsible hackers and teenage 'twits' who have been terrorizing
- computer users throughout the 1980s."-
-
- Actually computer viruses have been used for quite some time.. all the way
- back to the first hackers. Yes there have been some people who have terrorized
- computer users... but these people are... what's the word??...twits.
-
- -------------------------------------------------------------------------------
-
- ABOUT THE DEFINITIONS:
-
- My favorite definition is the "Salami Attack." Where did they get that one?
- hmm.... wasn't there something like that in Superman III or something like
- that... Anyway, I've never heard of that one before.
-
- -------------------------------------------------------------------------------
-
- "The virus that infected IBM's computwork may have been
- meant more as a prank than a malicious act. The prankster's 'letter' was a
- drawing of a Christmas tree. It appeared on the screen when the receiver
- opened his electronic mail."-
-
- I might have even heard of this. I know of a case very similar to this where
- the electronic mail service was all screwed up. It might be the same case..
- I'm not sure.
-
- -------------------------------------------------------------------------------
-
- EXTRA NOTES:
-
-
- Right below the title to the article is a drawing of a computer. On the screen
- is some guy holding an M-60 machine gun (some Ramboish guy)...; thereby giving
- a picture of the danger of computer terrorism.
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
-