The following text is copyright (c) 1987-1990 CompuServe Magazine and may not be reproduced without the express written permission of CompuServe. CompuServe Magazine's Virus History Timeline CompuServe Magazine is published monthly by the CompuServe Information Service, the world's largest on-line information service with over 600,000 subscribers worldwide. If you would like to become a CompuServe subscriber, call 1-800-848-8199 to receive a copy of the CompuServe Information Service membership kit. - 1988 - COMPUTER VIRUS THREATENS HEBREW UNIVERSITY'S EXTENSIVE SYSTEM (Jan. 8) In Jerusalem, Hebrew University computer specialists are fighting a deadline to conquer a digital "virus" that threatens to wipe out the university's system on the first Friday the 13th of the year. That would be May 13. Associated Press writer Dan Izenberg says the experts are working on a two-step "immune" and "unvirus" program that could knock down the vandalized area of the system. "Viruses" are the latest in computer vandalism, carrying trojan horses and logic bombs to a new level, because the destructiveness is passed from one infected system to another. Izenberg quotes senior university programmer Yisrael Radai as saying that other institutions and individual computers in Israel already have been contaminated. "In fact," writes the wire service, "anyone using a contaminated computer disk in an IBM or IBM-compatible computer was a potential victim." Radai says the virus was devised and introduced several months ago by "an evidently mentally ill person who wanted to wield power over others and didn't care how he did it." AP describes the situation this way: "The saboteur inserted the virus into the computer's memory and the computer then infected all disk files exposed to it. Those disk files then contaminated healthy computers and disks in an electronic version of a contagious cold." Apparently, the intruder wanted to wipe out the files by Friday, May 13, ΁+haW:ѕimpatient, because he then had his virus order contaminated programs to slow down on Fridays and on the 13th day of each month. Radai thinks that was the culprit's first mistake, because it allowed researchers to notice the pattern and set about finding the reason why. "Another clue," says AP, "was derived from a flaw in the virus itself. Instead of infecting each program or data file once, the m!l`gnant orders copied themselves over and over, consuming increasing amounts of memory space. Last week, experts found the virus and developed an antidote to diagnose and treat it." Of viruses in general, computer expert Shai Bushinsky told AP, "It might do to computers what AIDS has done to sex. The current free flow of information will stop. Everyone will be very careful who they come into contact with and with whom they share their information." --Charles Bowen TAMPA COMPUTERISTS FIGHT VIRUS (Jan. 10) Tampa, Fla., computerists say they are fighting a digital "virus" that sounds as if it may be th}ame`ɽɅr݁ե ٕͥJRale[H ́reported earlier, Hebrew University computer specialists are contending with a virus program that threatens to wipe out the university's system on the first Friday the 13th of the year -- May 13. The Jerusalem team is working on a two-step "immune" and "unvirus" program that could knock down the vandalized area of the system. Meanwhile, members of the Tampa Amiga User's Group now tell United Press International that they, too, are fighting a computer virus, and UPI quotes one expert as saying a version of that vandalizing program also is designed to begin destroying files on May 13. Computer viruses are self-propagating programs that spread from one machine to another and from one disk to another, a sort of new generation of more destructive trojan horses and logic bombs. "It kinda creeps up on you," president Jeff White of the Amiga group told the wire service, adding that the group's membership was infiltrated by the program. UPI reports, "Experts don't yet know what, if any, damage the virus can cause to the disks or programs. Similar problems have erased programs and information. ... White said the program spread itself to more than 20 of his floppy disks before he discovered it. But by then, the program had spread to the disks of many of the club's members via its regular disk-of-the-month distribution." White said he doesn't know how the bug got to Tampa, but suspects it came from West Germany on a disk from an overseas user group. "White said the program works invisibly," says UPI. "When the computer is turned on, the program stores itself in the machine's main memory and then begins spreading copies of itself to new disks used in the machine." He added that the Tampa club members now use a "virus-checker" program to test disks to prevent another infection. --Charles Bowen VIRUS PROGRAMS COULD HAVE USEFUL APPLICATIONS, SAYS COLUMNIST (Jan. 11) Despite all the recent negative publicity about computer "viruses" -- self-propagating programs that spread from one machine to another in way that has been called the computer version of AIDS -- a California computer columnist says there could be a positive result. Writing in The San Francisco Examiner, John Markoff observes, "In the future, distributed computing systems harnessed by software programs that break tasks into smaller parts and then run portions simultaneously on multiple machines will be commonplace. In the mid-1970s computer researchers John Shoch and Jon Hupp at Xerox's Palo Alto Research Center wrote experimental virus programs designed to harness many computers together to work on a single task." Markoff points out that some of the programs in that work functioned as "'town criers' carrying messages through the Xerox networks; others were diagnostic programs that continuously monitored the health of the computers in the networks." Also the researchers called one of their programs a "vampire worm" because it hid in the network and came out only at night to take advantage of free computers. In the morning, it disappeared again, freeing the machines for human users. For now, nonetheless, most viruses -- particularly in the personal computing world -- are viewed as destructive higher forms of trojan horses and logic bombs. Markoff traces the first virus to the military ARPAnet in 1970. On that system, which links the university, military and corporate computers, someone let loose a program called "creeper." Notes the paper, "It crawled through the network, springing up on computer terminals with the message, 'I'm the creeper, catch me if you can!' In response, another programmer wrote a second virus, called 'reaper' which also jumped through the network detecting and 'killing' creepers." Markoff also pointed out that Bell Labs scientist Ken Thompson, winner of the prestigious Turing Award, recently discussed how he created a virus in the lab to imbed in AT&T's Unix operating system, which he and colleague Dennis Ritchie designed. In a paper, Thompson noted how he had embedded a hidden "trapdoor" in the Unix log-on module each time it created a new version of the operating system. The trapdoor altered the log-on mechanism so that Unix would recognize a password own only to Thompson. Thompson and Ritchie say the Unix virus never escaped Bell Labs. --Charles Bowen SUBSCRIBER, SYSOP BLOCK POSSIBLE "VIRUS" IN APPLE HYPERCARD FORUM (Feb. 8) Quick reactions by a subscriber and a veteran forum administrator have blocked a possible computer "virus" program that was uploaded over the weekend to CompuServe's new Hypercard Forum. The suspicious entry was an Apple Hypercard "stack" file called "NEWAPP.STK," which was uploaded Friday to the forum's Data Library 9, "HyperMagazines." It was online for about 24 hours before it was caught. Subscriber Glenn McPherson was the first to blow the whistle. Saturday night McPherson posted a message saying that when he ran the application, the file altered his Macintosh's systems file. "I don't know why it did this," he wrote, "but no stack should touch my system file." Neil Shapiro, chief forum administrator of the Micronetworked Apple Users Group (MAUG), quickly investigated and removed the suspicious file. In a bulletin to the membership, Shapiro warned those who already had downloaded NEWAPP.STK that the stack would alter the system files with unknown results. He also warned against using system files from any disk that was run while the NEWAPP.STK's modified system was in effect. Said Shapiro, "If you run NEWAPP.STK, it will modify the system on the disk it is on so that the system's INITs contain an INIT labeled 'DR.' Then, if you use another system with the DR-infected system as your boot system, the new system will also contain the self-propagating 'DR' INIT Resource. While it is possible to, apparently, 'cut' this resource from infected systems with the Resource Editor, the only sure course of action is to trash any system file that has come in contact with this stack." It was not immediately known if the system alternations were deliberately or accidentally programmed into NEWAPP.STK. Shapiro notes the file's uploader has been locked off the entire system and that "he will be contacted by CompuServe and/or myself." Computer "viruses" -- self- propagating programs that infect system files and then spread to other disks -- have been in the news for the past six months. To- date, most of their targets have been regional computer users groups, private and semi-public networks and stand-along bulletin board systems. This apparently is the first report of a virus-like program on a national consumer information service. Shapiro says in his bulletin that in eight years of the various Apple forums' operation, this is the only such occurrence. "While I, of course, cannot say it will be the last, I still have just as much confidence as always in the fact that 99.99999999% of the Mac community are quite trustworthy and that there is no real need to fear downloads," he wrote. Shapiro also urged his membership, "If you have not used (NEWAPP.STK) yet, do not! If you have uploaded it to other BBS or network systems, please immediately advise the sysops there of the problem. If you have placed it on a club disk, please be certain to remove it from that disk before distribution and -- if it has been run from the 'Master' disk already -- don't just remove it, but trash the system." Subscriber McPherson indicates the suspect file already has spread to other systems. His forum note says he found the same stack program also in a software library on the General Electric's GEnie network. --Charles Bowen DOD TRIES TO PROTECT ITS COMPUTERS FROM ELECTRONIC VIRU (Feb. 9) Just as a medical virus can spread rapidly, so does the deadly computer virus seem to be making the rounds. In an effort to inoculate itself against an outbreak, the Department of Defense has taken steps to prevent the electronic sabotage from affecting its computers, reports Government Computer News. The computer viruses are self- propagating programs that are designed to spread automatically from one computer to another and from one disk to another, totally disrupting normal operations. As reported in Online Today, such viruses have already struck computer systems at Hebrew University in Jerusalem and IBM Corp.'s regional offices in Tampa, Fla. "It can spread through computer networks in the same way it spreads through computers," said DOD spokeswoman Sherry Hanson. "The major problem areas are denial of service and compromising data integrity." In addition to basic security measures, computer scientists at the National Security Agency are installing programming tools and hardware devices to prevent the infiltration of virus programs. Hanson told GCN that DOD is also using specialized ROM devices and intrusion detectors. The virus only comprises a few lines of programming code and is easy to develop with few traces. After IBM was infiltrated last December with an innocent- looking Christmas message that kept duplicating itself many times over and substantially slowed the company's massive message system, specialists installed a filter program to monitor the system and protect against further intrusion. According to GCN, executable programs can't be traj3erred from one computer to another within IBM's networi YͽѕɁ͕́ ɕɥ́́BJ 5Rcomute.jumemory. For instance, almost the entire membership of a Florida Commodore Amiga users group was infected by a virus before it was discovered. The president of the group said he believed the virus originated in Europe on a disk of programs the group received from an overseas source. The club now has a checker program to check disks for viruses before they are used. Al Gengler, a member of the Amiga group, compared the virus to AIDS. "You've got to watch who you compute with now," he said. --Cathryn Conroy EXPERTS SEES TWO SCENARIOS FOR THE COMPUTER "VIRUS" PROBLEM (Feb. 9) Don Parker, who heads the information security program for the Menlo Park, Calif., SRI International, has been studying the problem of computer "viruses" and now says he see two possible directions in the future. Speaking with Pamela Nakaso of the Reuter Financial News Service, Parker said his scenarios are: -:- One, that viruses will be too difficult to design and use for infiltration, and that interest in using them as "weapons" will die away. -:- Or, two, viruses will increase in destructiveness as more sophisticated saboteurs use them to destroy the public domain software resources available. Nakaso also quotes editor Harold Highland of the magazine Computers and Security as saying that "hysteria" over the few documented incidents may fuel even more viruses, which are defined as self-propagating files that usually damage a computer's systems files and then spread to other disks. Highland pointed out that in a recent Australian virus case among Amiga computers, one tabloid newspaper reported the incident with a headline that sp`ned the entire cover, reading, "Terror Strikes in the DP Industry." Parker told Reuter, "The vulner`ility is growing at the same rate as the number of computers and number of communications with computers." Nakaso writes, "Parker estimates that of the 2,000 cases of documented computer crime he has compiled at SRI, about 20 to 30 have been virus attacks. There is no question, however, the reported incidents are rising, and they are expanding beyond personal computers to mainframes and other networks." --Charles Bowen COMPUTER VIRUS CALLED FRAUD (Feb. 10) Comp}dr viruses may be frauds. Although lots of people are talking about computerdoms latest illicit fad, to date, no one has produced a copy of a living breathing virus. Now, a University of Utah expert on urban legends thinks that the dreaded virus may be have become the high tech version of the bogey man. Professor Jan Harold Brunvand has written three books about urban legends and he seems to think that the virus is just the latest incarnation in a long line of legends. Brunvand, and others, have pointed out that there are striking similarאV =r˸Ḱof the virus and legends such as the cat in the microwave oven. For one thing, there are lots of reported sightings but no concrete evidence. And urban legends always seem to appear and affect those things about which urban dwellers are just coming to terms with: shopping malls and microwave ovens in the 70's, computers in the 80's. In doayg ͕ɭѕɁс"ɽ́J́zݹɝ"х5Rcrtaily qualifies as the stuff about which legends are made. Even the way in which the deed is accompli.HY6́mystical qualities: a computer wizard works strange magic with the secret programming codes of a computer operating system. Brunvand, a computer owner himself, says that although viruses could be created, he has found absolutely no evidence to support claims about their existence. --James Moran HYPERCARD VIRUS JUDGED "HARMLESS" (Feb. 12) Administrators of a CompuServe forum supporting the Apple Hypercard technology have confirmed that a file uploaded to their data libraries last weekend did indeed contain a so-called computer "virus." However, they also have determined the program apparently was harmless, meant only to display a surprise message from a Canadian computer magazine called MacMag. As reported earlier this week, forum administrator Neil Shapiro of the Micronetworked Apple Users Groups (MAUG) removed the suspicious entry, a Hypercard "stack" file called "NEWAPP.STK," after a forum member reported that the file apparently altered his Macintosh's system files. Computer "viruses," a hot topic in the general press these days, have been defined as self-propagating programs that alter system files and then spread themselves to other disks. Since removing the file last weekend, the Apple administrators have been examining the file and now Shapiro says it apparently was designed merely to display a message from MacMag on March 2. On the HyperForum message board G2APPHYPER), Shapiro reports, "Billy Steinberg was able to reverse engineer (disassemble) the INIT that the virus places into system files. The good news is that the virus is harmless. But it *is* a computer virus." Shapiro says that if the downloaded file remained in the user's system, then on March 2, the screen would display: "Richard Brandnow, publisher of MacMag, and its entire staff would like to take this opportunity to convey their universal message of peace to all Macintosh users around the world." Apparently the file is so designed that after March 2 it removes itself from the 떮.em\ Shapiro notes that, while this file apparently is harmless, it still raises the question of the propriety of database entries that quietly alter a user's system files. Shapiro said he has spoken to publisher Brandnow. "It was not his intention to place it in a HyperCard stack nor to have it on (CompuServe)," Shapiro writes. "What he did do was to develop the INIT in December and 'left' it on their (MacMag's) own machines with the hope that 'it would spread.'" Subsequently, someone else apparently captured the file, added it to his "stack" and uploaded to the CompuServe forum and other information services. While Brandnow maintains the system-altering INIT file was harmless, Shapiro says he's concerned about what the NEWAPP.STK incident could represent. "While the INIT itself is non-destructive," Shapiro wrote, "I believe it was at least irresponsible for MacMag to have perpetrated this type of problem and to have caused the confusion that they did. I also fear that this could give other people ideas on less peaceful uses of such a virus. "I belede that MacMag has opened here a Pandora's Box of problems which will haunt our community for years. I hope I am wrong." --Charles Bowen PUBLISHER DEFENDS HIS "VIRUS" PROGRAM AS "GOOD FOR COMMUNITY" (Feb. 13) The publisher of Canadian computer magazine MacMag contends the computer "virus" program his staff initiated recently was not only harmless but was "good for the Macintosh community." Says 24-year-old Richard Brandow, "If other people do nasty things (with virus programs), it is their responsibility. You can't blame Einstein for Hiroshima." Speaking by phone with reporter Don Clark of The San Francisco Chronicle, Brandow maintained his magazine's virus program, which spread through the Apple Macintosh community this week on this continent and apparently reached Europe, was intended to do nothing more than display a "peaceful" message on Mac screens on March 2, the first anniversary of the introduction of the Apple Mac II. Of the so-called "virus" technology, Brandow said, "This message is very good for the Macintosh community." The controversy centered around an Apple Hypercard "stack" file called "NEWAPP.STK" that was uploaded to various public domain databases around the country, including the data library of CompuServe's HyperForum (G APPHYPER). When subscribers discovered that the file quietly altered their Mac's system files when it was executed, a warning was posted and forum administrator Neil Shapiro immediately removed the data library entry. Only after the forum's sysops had disassembled the suspect file could it be determined that NEWAPP.STK's only apparent function was to display a March 2 greeting from Brandow and the MacMag staff. HyperForum members now have been informed that the file, while indeed a "virus," apparently is harmless. However, Shapiro contends MacMag staffers were "at least irresponsible ... to have perpetrated this type of problem and to have caused the confusion that they did." Shapiro is quoted in The Chronicle as adding, "This is very similar to someone breaking into your home and writing a message of good will in red lipstick on your wall. It is a violation of the right of private property... Our computers are machines that belong to us and other people should remain out of them." On the other side of the argument, Brandow told the paper, "The idea behind all this is to promote peaceful methods of communication between individuals using harmless ways." Montreal-based MacMag, with a circulation of 40,000, is Canada's only Macintosh magazine. Brandow also heads a 1,250-member Mac user group, which he says is Canada's largest. Brandow told Clark that programmers worked more than a year on the virus, adding that it was inspired by two groups, known as "The Neoists" and "The Church of!he SubGenius." (He said the latter was formed in Texas as a satire on fundamentalist religion and inspired a 1983 book.) As noted here earlier, the MacMag virus also reached beyond CompuServe to other information services and private bulletin board systems. For instance, The Chronicle quotes General Manager Bill Louden of General Electric's GEnie as saying that about 200 users downloaded the file from that information service before it was discovered and removed early Monday. Meanwhile, Shapiro told Clark that only about 40 of CompuServe's subscribers retrieved the file before it was removed early Sunday. The Chronicle says that Mac devotees in the Bay Area were "stunned" by news of the virus, but not all were upset. For example, Apple wizard Andy Hertzfeld, a co-designer of the original Mac, told the paper, "As far as I'm concerned, it doesn't have any malicious intent and is just some people having fun. I don't see why people are so uptight." Meanwhile, a spokeswoman for Apple at company headquarters in Cupertino, Calif., said the company is searching for details of the virus and could not comment on it at present. --Charles Bowen TWO FIRMS OFFER TO "INOCULATE" US AGAINST THE COMPUTER "VIRUSES" (March 4) The debate continues over whether computer "viruses" are real or just the latest urban legend, but at least two companies are hoping that we don't want to take any changes. Independent of each other, the firms this week both claimed to have the first commercial software to "inoculate" systems against those reported rogue programs that damage data and systems files. One of the companies, Lasertrieve Inc. of Metuchen, N.J., introduced its VirALARM product during Microsoft Corp.'s CD-ROM conference in Seattle. In addition, in Stockholm, a Swedish company called Secure Transmission AB (Sectra) today announced a similar anti-virus program called TCELL, after a counterpart in human biology. A Lasertrieve statement contends that previous anti-viral software utilities -- mostly offered in the public domain -- work by drawing attention to the virus's attempted alterations of system files, noting a change of file size, or monitoring the dates of program changes. However, the New Jersey firm contends, this approach makes such programs "easily fooled by sophisticated viruses." Lasertrieve says its VirALARM contains a program designed to protect another program, creating a software "barrier." According to the statement, before anyone can use the protected program, VirALARM checks to determine whether the program has been altered since it was inoculated. If there has been any change, the software then blocks use of the altered program, notifies the user and suggests a backup copy of the program be substituted. Meanwhile, Bo-Goran Arfwidsson, marketing director of the Swedish company, told Bengt Ljung of United Press International that its TCELL "vaccine" gives a database a partial outside protection, sounds an alarm if a computer virus appears inside a database and identifies the infected file so it can be isolated. The contaminated part then can be replaced with a backup file. Sectra spokesman Torben Kronander said that TCELL has been "tested for a year now and ther% `s no question that it works," adding that since early 1987 the software has functioned on computers of major Swedish manufacturing companies. Arfwidsson declined to name those companies for security purposes. Kronander said TCELL simply made the task of creating a virus so complicated that only vast computer systems would be able to carry it out. "We've effectively removed the hacker type of attack, and these have been the problem. It will take the resources of a major software producer or a country to produce a virus in the future." UPI says Sectra is a 10-year-old research company with 19 employees in Linkoping in central Sweden, closely tied to the city's Institute of Technology. --Charles Bowen "VIRUS" SPREADS TO COMMERCIAL PROGRAM; LEGAL ACTION CONSIDERED (March 16) That so-called "benign virus" that stirred the Apple Macintosh community earlier this year when it cropped up in a public domain file in forums on CompuServe and other information services now apparently has invaded a commercial program called FreeHand. The publisher, Seattle's Aldus Corp., says it had to recall or rework some 5,000 FreeHand packages once the virus was discovered and now is considering legal action against those who admitted writing the self- propagating program. Meanwhile, other major software companies reportedly are worried that the virus may have affected some of their products as well. At the heart of the controversy is a "peace message" that Canadian Richard Brandow, publisher of Montreal's MacMag magazine, acknowledged writing. As reported here earlier, that file was designed to simply pop up on Mac screens7round the world on March 2 to celebrate the first anniversary of the release of the Macintosh II. However, many Mac users reacted angrily when they learned that the file quietly had altered their systems files in order to make the surprise message possible. Now the virus has re-emerged, this time in FreeHand, a new Mac program Aldus developed. Aldus spokeswoman Laury Bryant told Associated Press writer George Tibbits that Brandow's message flashed when the program was loaded in the computer. Bryant added that, while it "was a very benign incident," Aldus officials are angry and "are talking with our attorneys to understand what our legal rights are in this instance.... We feel that Richard Brandow's actions deserve to be condemned by every member of the Macintosh community." This may be the first instance of a so-called "virus" infecting commercial software. Tibbits says the Brandow virus apparently inadvertently spread to the Aldus program through a Chicago subcontractor called MacroMind Inc. MacroMind President Marc Canter told AP that the virus appears to have been in software he obtained from Brandow which included a game program called "Mr. Potato Head," a version of the popular toy. Canter said that, unaware of the digital infection, he ran the game program once, then later used the same computer to work on a disk to teach Mac owners how to use FreeHand. That disk, eventually sent to Aldus, became infected. Then it inadvertently was copied onto disks sold to customers and infected their computers, Canter said. Upset with Brandow, Canter says he also is considering legal action. For his part, Brandow says he met Canter, but denied giving him the software. The whole incident apparently has some at other companies worried because they also use Canter's services. Tibbits says that among MacroMind's clients are Microsoft, Ashton-Tate, Lotus Development Corp. and Apple Computers. A-T has not commented, but officials at Microsoft, Apple and Lotus all told AP that none of their software was infected. Ma!while, Brandow told Tibbits that, besides calling for world peace, the virus message was meant to discourage software piracy and to encourage computer users to buy original copies. The full message read: "Richard Brandow, the publisher of MacMag, and its entire staff would like to take tZl.Htuniy o convey their universal message of peace to all Macintosh users around the world." Beneath that was a picture of a globe. BranKw`XZсzɥB*ѕjѡɥ镑́z5RɅ́zjձ ́Jjɕearea and possibly a few other areas of Canada and the United States. However, he said he was shocked later to find that, after the virus program began to appear in the databases of online information services, an estimated 350,000 people in North America and Europe saw the message pop up on their computers on March 2. --Charles Bowen THREAT OF "VIRUS" BLOWN OUT OF PROPORTION, NORTON AND SYSOPS SAY (April 10) The threat of so-called computer "viruses" has been vastly overrated, according to software guru Petr2Norton and two CompuServe forum administrators. "We're dealing with an urban myth," Norton told Insight magazine. "It's like the story of alligators in the sewers of New York. Everyone knows about them, but no one's ever seen them. Typically, these stories come up(wery three to five years." Don Watkins, administrator of CompuServe's IBM Users Network forums (GO IBMNET) also told the general interest magazine that he's more concerned about being hit by a meteor than a computer virus. "In five years," Watson said, "I've seen only one program that was designed to do intentional damage. That was about three yeaW`֋ Jс͹5Rѥѕj @""I@have never spoken to anyone who personally, firsthand, has ever seen or experienced a program like this," Watson added, "and my job keeps me itouchM Źźͅzj$ ComuS˹W2յadministrators check each piece of user-contributed software before posting it in data libraries for general distribution. The alleged virus problem received widespread attention in early March when an unauthorized message was placed onto Freehand, a commercial software product for the Apple Macintosh published by Aldus Corp. Earlier, the same message circulated in several information services and was uploaded to CompuServe's Hyper Forum, a forum devoted to the Hypertext technology that is part of the Micronetworked Apple Users Groups (GO MAUG). The message read "Richard Brandow, publisher of MacMag, would like to take this opportunity to convey a universal message of peace to all Macintosh users." It then erased itself without doing any harm. Of the situation, Neil Shapiro, MAUG's chief sysop, said, "The whole problem has been completely hyped out of proportion." --Daniel Janal COMPUTER VIRUS NEWSLETTER DEBUTS (April 13) If you want to follow all the latest news on insipid computer viruses, you might be interested in the debut of "Computer Virology," a newsletter devoted to identifying and analyzing those annoying computer diseases. Produced by Director Technologies Inc., the developers of Disk Defender, a hardware device that write protects PC hard disks, the newsletter will be published monthly. Topics will include developments for protection against the viruses, precautions and procedures to follow to insure that terrorists not let loose this rampant epidemic. "The latest strain of computer viruses presently causing serious damage at university labs, scientific research facilities, hospitals and business organizations worldwide, has created a very real concern for the future of having free access to the tremendous amounts of information that are now readily available for unlimited use," said Dennis Director, president of Director Technologies. "The potential dangers of such viruses is that they can be used not only as a means to facilitate malicious pranks in the home computer area, but also pose a real `terrorist' threat to academic computing labs, scientific research projects and business. Data loss can cost hundreds of thousands of dollars in real money, as well as in wasted man-hours." The newsletter is distributed free of charge. For information or to subscribe, contact Director Technologies Inc., 906 University Pl., Evanston, IL 60201. 312/491-2334. SIR-TECH UNVEILS ANTI-VIRUS (April 14) Sir-tech Software Inc., the Ogdensburg, N.Y., firm best known for its recreational programs such as the acclaimed "Wizardry" series of adventure games, now has released a free program called "Interferon, the Magic Bullet" that it says is meant to "halt the devastation of computer virus." A company statement reports that Robert Woodhead, 29-year-old director of Sir-tech's Ithaca, N.Y., development center, designed the Apple Macintosh program to "detect and destroy the highly-publicized computer virus which threatens the integrity of the world's computer systems." Sir-tech says the program will be offered free for downloading from related services o QompuServe and GEnie. In addition, it is available by mailing a diskette with a self-addressed, stamped envelope to Sir-tech, 10 Spruce Lane, Ithaca, N.Y. 14850. While the program itself is free, Woodhead asks for donations to a fund established to buy computer equipment for visually impaired users. A notice in the software gives details on the fund. Woodhead said he has worked since early this year to come up with Interferon, named for the antiviral treatment for cancer. "Just as a virus leaves clues in a human body, the computer virus is detectable if users know what to look for," Woodhead said. The Inter~on`Ʌ́́сѕɁ͕́j ́5RɕɁJѥ JѕсɕJ́ѡ ͱ5Rstatement`XZӷVѥcan be cured by deleting the diseased files," it added. "As new viruses are discovered, Interferon will be updated for instant detection." --Charles Bowen NEW VIRUS PLAGUES MACINTOSHES AT NASA AND APPLE (April 18) Apple Macintosh computers at the National Aeronautics and Space Administration and at Apple Computer as well as other business offices around the country have caught a new computer virus, reports0Nwsdayn @"Thebѕсhigh-tech plague is under investigation by Apple and federal autGities. During the past three weeks, Apple has been receiving reports of a virus called Scores. Although it has not been known to erase any data, it can cause malfunctions in printing and accessing files and can cause system crashes, Cynthia Macon of Apple Computer told Newsday. Two hundred of the 400 Macintosh computers at the Washington, D.C. offices of NASA have been infected. Many of them are connected to local area networks and are spreading the virus. "This particular virus does not attack data. We have no record indicating anyone lost anything important," said Charles Redmond, a NASA spokesman. Newsday notes that the Scores virus can be detected by the altered symbols that appear in Scrapbook and Note Pad, two Macintosh files. Instead of the Mac logo, users see a symbol that looks like a dog-eared piece of paper. Two days after the virus is transmitted, it is activated and begins to randomly infect applications, such as word processing and spreadsheet programs. EDS Corp. of Dallas, Texas was also infected with the Scores virus, but managed to stop its spread. -- Cathryn Conroy FRIDAY THE 13TH "VIRUS" FIZZLES (May 14) Good morning, computerdom! It's Saturday the 14th and we're all still here. At least, we all SEEM to still be here, though some are saying it's too early to tell for sure. Yesterday, the first Friday the 13th of the year, was widely reported to be the target date for the denotation of a computer virus called "Black Friday" which was first discovered in the computers of the Hebrew University in Jerusalem late last year. The virus, which was reported to have spread from Jerusalem to computers around the world, was said to be designed to destroy computer files on May 13. However, no early reports of damage have surfaced. Computer experts in Jerusalem told Associated Press writer Karin Laub that the so-called virus was undone because most computer users were alerted in time. Hebrew University researchers detected the virus on Dec. 24 because of a flaw in its design, according to senior programmer Yisrael Radai. Nonetheless, a few experts are saying that we aren't out of the woods yet. For instance, Donn Parker of the SRI International research firm in Menlo Park, Calif., told The Washington Post this morning that he hadn't heard of any virus-related damage, "but we have been holding our breath. I think it will be a dud, but we won't know until next week, and only then if people whose computers go down talk about it." Some software companies tackled the virus scare. AP reports that the Iris software publisher of Tel Aviv developed an anti-virus program for the Israeli computing community and sold 4,000 copies before yesterday. President Ofer Ahituv estimated that 30 percent of his 6,000 customers, most of them businesses, had been infected by the Black Friday virus. Meanwhile, some are saying the apparent fizzle of the virus is what they expected all along. "Viruses are like the bogyman," said Byron C. Howes, a computer systems manager at the University of North Carolina at Chapel Hill. Speaking with AP, he compared programmers who believe in viruses to "people who set little bowls of milk outside our doors to feed the dwarfs." Barry B. Cooper, owner of Commercial Software in Raleigh, N.C., agreed. "I just think that the whole thing is a joke," like the prediction by medieval seer Nostradamus of a major earthquake on May 8, 1988. "That didn't come true, and this won't come true." --Charles Bowen R.I. NEWSPAPER DISLODGES VIRUS (May 16) The Providence, R.I., Journal-Bulletin says it worked for the past week and a half to stamp out a "virus" that infected an in-house personal computer network used by reporters and editors, but not before the virus destroyed one reporter's data and infected scores of floppy disks. Writing in The Journal, Jeffrey L. Hiday said the virus was "a well-known, highly sophisticated variation called the 'brain' virus, which was created by two brothers who run a computer store in Lahore, Pakistan." Variations of the virus, he noted, have been discovered at companies and colleges across the country, including, last week, Bowie State College in Maryland, where it destroyed five students' disks. Online Today reported on April 23 that a similar Pakistan-based virus infected a student system used at Miami University in Ohio, threatening to wipe out term papers stored there. Apparently this is the first time a virus has invaded a US newspaper's system. Hiday said The Journal contacted one of the Pakistan brothers by phone, who said he created this particular virus merely to keep track of software he wrote and sold, adding that he did not know how it got to the United States. However, Hiday added, "US computer programming experts ... believe the Pakistanis developed the virus with malicious intent. The original version may be relatively harmless, they point out, but its elegance lends itself to alterations by other programmers that would make it more destructive." The newspaper says it discovered the virus on May 6 when a message popped up on computer screens reading, "Welcome to the Dungeon. ... Beware of this VIRUS. Contact us for vaccination." The message included a 1986 copyright date, two names (Basit and Amjad), a company (Brain Computer Services), an address (730 Nizam Block Allama Iqbal in Lahore, Pakistan) and three phone numbers. Journal-Bulletin systems engineer Peter Scheidler told Hiday, "I was sort of shocked. I never thought I'd see a virus. That's something you read about." The virus infected only the PC network; neither the paper's Atex news-editing system nor its IBM mainframe that supports other departments were affected. Hiday says the newspaper now is taking steps to protect itself against another virus attacks. It has tightened dissemination of new software and discussed installing "anti-virus" devices. In addition, computer users have been warned not to use "foreign" software, and reporters have been instructed to turn their computers off and then on again before inserting floppy disks. --Charles Bowen EPA MACINTOSHES RECOVER FROM VIRUS (May 18) Although Apple Macintosh computers at the Environmental Protection Agency were recently plagued with a virus, all of them seem to be on the mend now. According to Government Computer News, the computers were vaccinated with Virus Rx, a free program issued by Apple Computer Inc. to help users determine if their hard disks have been infected. Apple has begun an educational campaign to promote "safe computing practices," Apple spokeswoman Cynthia Macon told GCN. Virus Rx is available on CompuServe in the Apple Developers Forum (GO APPDEV) in Data Library 8 under the name VIRUS.SIT. Macon said the best long-term response to viruses "is to make users aware of steps they can take to protect themselves." These include backing up data files, knowing the source of programs and write-protecting master disks. Other steps include booting from a floppy disk and running all programs from floppies rather than installing and running them from the hard disk. EPA is having some trouble with reinfection. Since up to 20 people may use one Macintosh, someone may unknowingly insert a virus-plagued disk into a clean machine. "It's like mono. You just never get rid of it," said Leslie Blumenthal, a Unisys Corp. contract employee at EPA. FBI agents in Washington, D.C. and San Jose, Calif. are investigating the spread of the Macintosh virus, notes GCN. -- Cathryn Conroy CONGRESS CONSIDERS VIRUS PROBLEMS (May 19) Computer viruses have come to the attention of Congress and legislators would like to be assured that US defense computers are safe from the replicating little bugs. Although defense systems can't be reached simply by telephoning them, a virus could be contracted through an infected disk containing non-essential information. The Defense Authorization Bill for FY 1989 is likely to direct the Defense Department (DoD) to report on its methods for handling potential viral infections. Congress also wants to know what DoD has done about safeguarding military computers. They'd like some assurance that the Defense Department also has considered situations where a primary contractor's computer could be infected and subsequently endanger DoD's own computers. Anticipating future hearings, Congressional staffers are soliciting comments from knowledgeable users as to what the report to Congress should cover. Interested parties should forward their comments to Mr. Herb Lin, House Armed Services Committee, 2120 Rayburn House Office Building, Washington DC 20515. Further information is available by calling 202/225-7740. All comments will be kept in confidence. --James Moran TEXAN STANDS TRIAL FOR ALLEGEDLY INFECTING SYSTEM WITH "VIRUS" (May 24) In Fort Worth, Texas, a 39-year-old programmer is to stand trial July 11 on felony charges that he intentionally infected an ex-employer's system with a computer "virus." If convicted, he faces up to 10 years in prison. The man, Donald Gene Burleson, apparently will be the first person ever tried under the state's tougher computer sabotage law, which took effect Sept. 1, 1985. Dan Malone of the Dallas Morning News broke the story this morning, reporting on indictments that accuse Burleson of executing programs "designed to interfere with the normal use of the computer" and of acts "that resulted in records being deleted" from the systems of USPA and IRA Co., a Fort Worth-based national securities and brokerage. The paper quoted police as saying the electronic interference was a "massive deletion" of more than 168,000 records of sales commissions for employees of the company, where Burleson once worked as a computer security officer. Burleson currently is free on a $3,000 bonding pending the trial. Davis McCown, chief of the Tarrant County district attorney's economic crimes division, said of the alleged virus, "You can see it, but you can't see what it does -- just like a human virus. It had the ability to multiply and move around and was designed to change its name so it wouldn't be detected." McCown also told Malone he wanted to make sure "that this type of criminal understands that we have the ability to make these type of cases; that it's not so sophisticated or complicated that it's above the law." Company officials first noticed a problem on Sept. 21, 1985. Says the Dallas newspaper, "Further investigation revealed that an intruder had entered the building at night and used a 'back-door password' to gain access to the computer. ... Once inside, the saboteur covered his tracks by erasing computer logs that would have followed his activity, police said. With his access to the computer complete, the intruder manually deleted the records." Authorities say that only a few of the 200 workers in the USPA home office -- including Burleson -- had access and the knowledge needed to sabotage the system. Earlier USPA was awarded $12,000 by a jury in a civil lawsuit filed against Burleson. --Charles Bowen FBI CALLED TO PROBE VIRUS CASE (July 4) The FBI has been called in by NASA officials to investigate an alleged computer virus that has destroyed data on its personal computers and those of several other government agencies. The New York Times reported this morning that the rogue program -- apparently the so- called "Scores" virus that surfaced last April -- was designed to sabotage data at Dallas' Electronic Data Systems. The paper said the virus did little damage to the Texas company but did wreak havoc on thousands of PCs nationwide. The Times quoted NASA officials as saying the FBI was called in because, even though damage to government data was limited, files were destroyed, projects delayed and hundreds of hours were spent tracking the culprit at various government agencies, including NASA, the Environmental Protection Agency, the National Oceanic and Atmospheric Administration and the US Sentencing Commission. NASA says it doesn't know how the program, which damaged files from January to May, spread from the Texas EDS firm to PC networks nor whether the virus was deliberately or accidentally introduced at government agencies. Meanwhile, the Times quoted experts as saying that at least 40 so-called "viruses" now have been identified in the United States, defining a virus as a program that conceals its presence on a disk and replicates itself repeatedly onto other disks and into the memory of computers. As reported here in April, the Scores virus was blamed for infecting hundreds of Apple Macintosh computers at NASA and other facilities in Washington, Maryland and Florida. The Times says the spread of the virus was exacerbated when private contractors in Washington and North Carolina inadvertently sold dozens of computers carrying the virus to government agencies. The virus spread for as long as two months and infected networks of personal computers before it was discovered. --Charles Bowen NEW MEXICO BBS SUES OVER VIRUS (Aug. 17) The operator of a New Mexico computer bulletin board system has filed what may be the first federal suit against a person accused of uploading a computer "virus." William A. Christison, sysop of the Santa Fe Message BBS, alleges in his suit that a man named Michael Dagg visited his board in the early hours of last May 4 and "knowingly and intentionally" uploaded a digitally-infected file called "BBSMON.COM." The suit says Christison "checked the program before releasing it to the public and discovered that it was a 'Trojan Horse'; i.e., it appeared to be a normal program but it contained hidden commands which caused the program to vandalize Plaintiff's system, erasing the operating system and damaging the file allocation tables, making the files and programs stored in the computer unusable." Christison says that the defendant re-visited the BBS nine times between May 5 and May 12, sometimes logging in under a pseudonym. "Several of these times," the suit says, "he sent in messages and on May 7, 1988, he knowingly and intentionally sent in by modem a program of the same name, BBSMON.COM, as the original 'Trojan Horse' computer program." Through attorney Ann Yalman, Christison asks the court to grant $1,000 for each Trojan Horse violation and to enjoin the defendant "from sending 'Trojan Horses' or 'viruses' or other vandalizing programs to Plaintiff or anyone else." A copy of the Santa Fe Message's suit has been uploaded to CompuServe's IBM Communications Forum. To see it, visit the forum by entering GO IBMCOM at any prompt. The ASCII file is VIRUS.CHG in forum library 0. Also, you can reach Christison BBS directly with a modem call to 505/988-5867. --Charles Bowen VIRUS FIGHTERS FIGHT EACH OTHER (Aug. 31) Two groups that mean to protect us in the fight against so-called computer "viruses" seem to be spending rather a lot of their energies fighting each other. "I personally know most of the people in this industry and I have never seen this kind of animosity," Brian Camenker of the Boston Computer Society tells business writer Peter Coy. The bickering grew louder on Monday in page-one article in MIS Week trade newspaper in which each side accused the other of using sloppy techniques and manipulating the testing process for its own purposes. Says Coy, "The intensity of the debate has left some software developers disgusted with the whole business." The argument, which centers around fair evaluation anti-virus "vaccine" software, pits the 2- month-old Computer Virus Industry Association led by John McAfee, president of InterPath Corp. of Santa Clara, Calif., against what Coy terms "a loose collection of other computer experts" led by consultant Jon R. David of Tappan and editor Harold Highland of Computers & Security magazine. "Customers and producers agree on the need for an independent panel of experts to review the (vaccine) software," Coy comments. "The question splitting the industry is who should be in charge." CVIA is pulling together an independent university testing panel made up of representatives of Pace University, Adelphi University and Sarah Lawrence College and headed by John Cordani, who teaches computer science at Adelphi and Pace. However, David and Highland say these people don't have the necessary credentials and that McAfee's InterPath products will have an advantage in the testing because McAfee invented a virus simulator that will be used as a testing mechanism. Meanwhile, Highland says he's getting funding from his publisher, Elsevier Advanced Technology Publications, for his own review of anti-viral software, but adds he isn't interested in operating an ongoing review board. --Charles Bowen VIRUS TRIAL BEGINS IN FORT WORTH (Sept. 7) A 40-year-old Texas programmer has gone on trial this week, accused of using a "virus" to sabotage thousands of computer records at his former employer's business. If convicted in what is believed to be the nation's first virus-related criminal trial, Donald G. Burleson faces up to 10 years in jail and a $5,000 fine. Reporting from the state criminal district court in Fort Worth, Texas, The Associated Press notes Burleson was indicted on charges of burglary and harmful access to a computer in connection with damage to data at USPA & IRA Co. securities firm two days after he was fired. The trial is expected to last about two weeks. USPA, which earlier was awarded $12,000 in a civil suit against Burleson, alleges the defendant went into its offices one night and planted a virus in its computer records that, says AP, "would wipe out sales commissions records every month. The virus was discovered two days later, after it had eliminated 168,000 records." --Charles Bowen VIRUS ATTACKS JAPANESE NETWORK (Sept. 14) Japan's largest computer network -- NEC Corp.'s 45,000- subscriber PC-VAN service -- has been infected by a computer "virus." McGraw-Hill News quotes a NEC spokesman as saying that over the past two weeks 13 different PC- VAN users have reported virus incidents. Subscribers' user IDs and passwords "were apparently stolen by the virus planter when the members accessed one of the service's electronic bulletin boards," MH says. "The intruder then used the information to access other services of the system and charged the access fees to the password holders." NEC, which says it has not yet been able to identify the virus planter, gave the 13 subscribers new user IDs and passwords to check the proliferation of the virus. --Charles Bowen JURY CONVICTS PROGRAMMER OF VIRUS (Sept. 20) After deliberating six hours, a Fort Worth, Texas, jury late yesterday convicted a 40-year-old programmer of planting a "virus" to wipe out 168,000 computer records in revenge for being fired by an insurance firm. Donald Gene Burleson is believed to be the first person convicted under Texas's 3-year-old computer sabotage law. The trial, which started Sept. 6, also was among the first of its kind in the nation, Judge John Bradshaw told the Tarrant County jury after receiving its verdict. The Associated Press says jurors now are to return to State District Court to determine the sentence. Burleson, an Irving, Texas, resident, was found guilty of harmful access to a computer, a third-degree felony with a maximum penalty of 10 years in prison and a $5,000 fine. However, as a first-time offender, Burleson also is eligible for probation. As reported here earlier, Burleson was alleged to have planted a rogue program in computers used to store records at USPA and IRA Co., a Fort Worth insurance and brokerage firm. During the trial, prosecutor Davis McCown told the jury the virus was programmed like a time bomb and was activated Sept. 21, 1985, two days after Burleson was fired as a programmer at the firm because of alleged personality conflicts with other employees. AP quoted McCown as saying, "There were a series of programs built into the system as early as Labor Day (1985). Once he got fired, those programs went off." McCown added the virus was discovered two days later after it had eliminated 168,000 payroll records, holding up paychecks to employees for more than a month. Expert witnesses also testified in the three-week trial that the virus was entered in the system via Burleson's terminal by someone who used Burleson's personal access code. However, the defense said Burleson was set up by someone else using his terminal and code. Says AP, "Burleson's attorneys attempted to prove he was vacationing in another part of the state with his son on the dates in early September when the rogue programs were entered into the system. But prosecutors presented records showing that Burleson was at work and his son was attending school on those dates." The Fort Worth Star-Telegram reports that also during the trial, Duane Benson, a USPA & IRA senior programmer analyst, testified the automated virus series, which was designed to repeat itself periodically until it destroyed all the records in the system, never was automatically activated. Instead, Benson said, someone manually set one of the programs in motion Sept. 21, 1985, deleting the records, then covering his or her tracks by deleting the program. Prosecutor McCown says data damage in the system could have amounted to hundreds of thousands of dollars had the virus continued undetected. As reported here earlier, Burleson also has lost a civil case to USPA in connection with the incident. That jury ordered him to pay his former employers $12,000. Following the yesterday's verdict, McCown told Star-Telegram reporter Martha Deller, "This proves (virus damage) is not an unprosecutable offense. It may be hard to put a case together, but it's not impossible." --Charles Bowen UNIVERSITY PROFESSORS ATTACK COMPUTER VIRUSES (Sept. 30) Because they have not been given access to the National Security Agency's anti-virus research, several university- based computer experts are planning to begin their own testing and validating of software defenses against computer viruses, reports Government Computer News. Led by John Cordani, assistant professor of information systems at Adelphi University, the results will be made public, unlike those being researched by NSA. The work being done by the Department of Defense is too classified for use by the general computer community. GCN notes that computer viruses are hard-to-detect programs that secretly replicate themselves in computer systems, sometimes causing major damage. Cordani and five other academics will establish secure laboratories to study viruses in three New York colleges: Adelphi University, Pace University and Sarah Lawrence College. The lab will test anti-virus software developed by companies that are members of the Computer Virus Industry Association, a consortium of anti-virus defense developers. The group will then publish what it is calling "consumer reports" in the media and on electronic bulletin board systems. Once sufficient research is completed, more general grading systems will be applied, said Cordani. In addition, the lab will use viruses sent to them by the CVIA to develop classification algorithms to aid in describing a virus' actions and effects. -- Cathryn Conroy SECOND VIRUS FOUND AT ALDUS CORP. (Oct. 21) For the second time this year, a computer "virus" has been found in a commercial program produced by Seattle's Aldus Corp. The infection was found in the latest version of the FreeHand drawing software, the same software that was invaded by a different virus last March. An Aldus official told The Associated Press the company was able to prevent the virus's spread to programs for sale to the public, but that an entire computer network within Aldus' headquarters has been infected. The virus was found in a version of the Apple Macintosh software that was sent to specific users to be tested before going to market. One of the testers discovered the virus, dubbed "nVir," and two days later, Aldus realized the virus was in its own in-house network. Said Aldus spokeswoman Jane Dauber, "We don't know where it came from. That is the nature of the virus. You can't really track it." AP says Aldus officials said the new virus has remained dormant so far, a tiny program that merely attaches itself to other programs. "We don't know why," Dauber said. "We don't know what invokes this virus. With some of them, you have to launch the program a certain number of times," for the virus to activate. The company told the wire service that, while it does not know where the virus originated, reports are that it apparently has infected at least one unidentified East Coast university's computers. Another Aldus spokeswoman, Laury Bryant, added, "You just can't always stop these things from coming in the door. But what we have done is to set up systems which eliminate them before they are actually in full version, shrink-wrap software and stop them from going out the door." Last March, in what was apparently the first instance of an infection in commercial software, a virus called the "March 2 peace message" was found in some FreeHand programs. The invasion caused Aldus to recall or rework thousands of packages of the new software. --Charles Bowen MAN SENTENCED IN NATION'S FIRST VIRUS-RELATED CRIMINAL COURT CASE (Oct. 23) Donald Gene Burleson, the first person ever convicted of using a computer "virus" to sabotage data, has been sentenced to seven years' probation and ordered to pay back nearly $12,000 to his former employer. The 40-year-old Irving, Texas, man's attorney told United Press International he will appeal the sentenced handed down late Friday by District Judge John Bradshaw in Fort Worth, Texas. As reported earlier, Burleson was convicted Sept. 19 of the third-degree felony, the first conviction under the new Texas state computer sabotage law. He was accused of infecting the computers of USPA & IRA, a Fort Worth insurance and securities firm a few days after his firing Sept. 18, 1985. Burleson could have received two to 10 years in prison and a fine up to $5,000 under the 1985 law. As a first-time offender, however, he was eligible for probation. As reported during last month's trial, a few days after Burleson's firing in 1985, company officials discovered that 168,000 records of sales commissions had been deleted from their system. Burleson testified that he was more than 300 miles away from Fort Worth on Sept. 2 and Sept. 3 when the virus was created. However, UPI notes that evidence showed that his son was not traveling with him as he said but in school, and that a credit card receipt Burleson said proved he was in Rusk on Sept. 3 turned out to be from 1987. Associated Press writer Mark Godich quoted Burleson's lawyer, Jack Beech, as saying he had asked for five years' probation for his client, and restitution not to exceed $2,500. Godich also observed that the Burleson's conviction and sentencing "could pave the way for similar prosecutions of people who use viruses." Chairman John McAfee of the Computer Virus Industry Association in Santa, Clara, Calif., told AP the Texas case was precedent-setting and that it's rare that people who spread computer viruses are caught. He added his organization had documented about 250,000 cases of sabotage by computer virus. --Charles Bowen BRAIN VIRUS HITS HONG KONG (Oct. 30) According to Computing Australia, a major financial operation in Hong Kong was infected with a version of the "Brain" virus. This is the first reported infection of a commercial business in the East. Business International, a major financial consulting firm in Hong Kong, is believed not to have suffered any major damage. A company spokeswoman played down the appearance of the virus and said that no data had been lost. The "brain" virus has been reported as a highly sophisticated piece of programming that was created by two men in Lahore, Pakistan who run the Brain Computer Services company. It's last reported appearance in the US was during May when it popped up at the Providence, R.I., Journal- Bulletin newspaper. --James Moran 60 COMPUTER FIRMS SET VIRUS GOALS (Nov. 2) Some 60 computer companies have organized a group to set guidelines that they say should increase reliability of computers and protect the systems from so-called "viruses." The Reuter Financial News Service says that among firms taking part in the movement are Microsoft Corp., 3Com Inc., Banyan Systems and Novell Inc. At the same time, though, declining to join the efforts are such big guys as IBM and Digital Equipment Corp. Reuter reports, "The companies said the measures would promote competition while allowing them to cooperate in making computers more reliable and less vulnerable to viruses." However, the firms apparently have shied away from specific proposals, instead issuing broad recommendations that leave it up to each company to develop the technology needed to prevent the spread of viruses, Reuter said. --Charles Bowen THOUSANDS OF UNIVERSITY, RESEARCH COMPUTERS STUCK IN MAJOR ASSAULT (Nov. 4) Thousands of Unix-based computers at universities and research and military installations were slowed or shut down throughout the day yesterday as a rogue program ripped through international networks, an incident proclaimed by some to be the largest assault ever on the nation's computers. No permanent damage or security breaches appear to have occurred during the attack. This led some to say this morning that the intrusion was not actually a computer "virus" but rather was a "worm" program, in that it apparently was designed to reproduce itself, but not to destroy data. Science writer Celia Hooper of United Press International says the virus/worm penetrated the computers through a "security hole" in debugging software for electronic mail systems that connect Unix-based computers, evidently then moving primarily through ARPAnet (the Advanced Research Projects Agency Network) and NSFnet (network of the National Science Foundation) that link 2,000 computers worldwide. At other systems: -:- The virus/worm also apparently invaded the Science Internet network that serves many labs, including NASA's Jet Propulsion Laboratory in Pasadena, Calif. -:- NASA spokesman Charles Redmond said there were no reports of the space agency's network, Space Physics Analysis Network (SPAN), being affected by the attack, but he added that SPAN was linked to some of the infected networks. Meanwhile, The New York Times this morning reported an anonymous call from a person who said his associate was responsible for the attack and that the perpetrator had meant it to be harmless. The caller told the newspaper that his associate was a graduate student who made a programing error in designing the virus, causing the intruder to replicate much faster than expected. Said The Times, "The student realized his error shortly after letting the program loose and ... was now terrified of the consequences." UPI's Hooper says the virus/worm intrusion was detected about 9 p.m. Eastern Time Wednesday at San Francisco's Lawrence Livermore National Laboratory, one of two such labs where nuclear weapons are designed. Spokeswoman Bonnie Jean Barringer told UPI said the invasion "was detected and contained within two hours." The rogue program evidently spread through a flaw in the e- mail system of the networks. Hooper said it quickly penetrated Air Force systems at the NASA Ames Research Center in Mountain View, Calif., and systems at the Massachusetts Institute of Technology, the University of California at Berkeley, the University of Wisconsin, the University of Chicago, the University of Michigan, the University of Rochester, the University of Illinois and Rutgers, Boston, Stanford, Harvard, Princeton, Columbia, Cornell and Purdue universities. Charley Kline, senior research programmer with the Computing Services Office at the University of Illinois at Urbana-Champaign, Ill., told Associated Press writer Bernard Schoenburg, "This is the first time that I know of that (a virus infection) has happened on this scale to larger systems." Kline agreed the virus traveled between computer systems through e-mail and, once the messages were received, they linked up to command controls and told the local computers to make copies of the virus. Kline said the copies then sought out other connected devices. He also said that as far as he knows, only locations using Digital Equipment Corp.'s VAX computers or those systems made by Sun Microsystems Inc. were affected. He estimated about 75 percent of all national networks use such systems. Schoenburg also noted that all the affected computers use the BSD Unix operating system, written at University of California/Berkeley as a modified version AT&T's original Unix. Commenting on the situation, Chairman John McAfee of the new Computer Virus Industry Association in Santa Clara, Calif., told AP writer Paul A. Driscoll, "The developer was clearly a very high-order hacker (because) he used a flaw in the operating systems of these computers." Research director Todd Nugent of the University of Chicago's computing department told UPI computer operators across the country were tipped off to the invasion when they noticed their Unix-based systems running unusually slowly. Thmlachines turned out to be bogged down by loads of viral programs. Nugent said that in one machine he had disconnected, the virus appeared to have replicated itself 85 times. Today, in the morning-after, systems operators were fighting back on several fronts: -:- First, a software "patch" has been developed to fend off the virus/worm. Spokesman Bill Allen of the University of Illinois at Urbana-Champaign told UPI's Hooper, "The strategy is to shut off various (infected) computers from the network then sanitize them, purging the virus with a patch program." Hooper said the patches, which find and excise the virus/worm from the computer and then plug the hole through which it entered, now are circulating on campuses and have been posted nationally on computer bulletin board systems. -:- Secondly, the Defense Communications Agency has set up an emergency center to deal with the problem. However, The New York Times noted that no known criminal investigations are under way. NSFnet Program Manager Al Thaler told UPI he considered the virus/worm "a mean-spirited, vicious thing that interferes severely with the communications network our research computers live in. We are angry." Even though it will be hard to determine who started the virus/worm, Thaler said, "We are going to try." Finally, McAfee of the virus group told AP that this virus/worm was rare because it infested computers at major institutions, not just personal computers. "Any hacker in the world can infect personal computers," McAfee said, "but in this case, the person who did this would have had to have been physically at the site of one of the computers belonging to the network." He added, though, that chances of identifying that person were "extremely slim." --Charles Bowen REPORTS NAME 23-YEAR-OLD CORNELL STUDENT AS THE AUTHOR OF "VIRUS" (Nov. 5) A 23-year-old Cornell University student and the son of a government computer security expert now is said to be the person who planted that "virus" that stymied some 6,000 Unix- based computers across the nation for more than 36 hours this week. The New York Times this morning quoted two sources as identifying the suspect as Robert T. Morris Jr., a computer science graduate student. The paper says Cornell University authorities found that the young man possessed unauthorized computer codes. The young man's father, Robert Morris Sr., the Silver Springs, Md., chief scientist at the National Computer Security Center in Bethesda, Md., acknowledged this morning that "it's possible" his son was responsible for the rapidly-replicating virus that started crashing international networks late Wednesday night. However, Morris Sr., who is known for security programming in Unix systems, told science writer Celia Hooper of United Press International that he had "no direct information" on his son's involvement. He added he had not spoken to his son in several days and was unaware of his whereabouts. The elder Morris also told The Times that the virus "has raised the public awareness to a considerable degree. It is likely to make people more careful and more attentive to vulnerabilities in the future." As reported here yesterday (GO OLT-391), the incident, in which thousands of networked computers at universities and research and military installations were halted or slowed, is said to be the largest assault ever on the nation's computers. However, no permanent damage or security breaches appear to have occurred during the attack. Of Morris Jr.'s alleged involvement, Cornell Vice President M. Stuart Lynn released a statement late last night saying the Ithaca, N.Y., university has uncovered some evidence. For instance, "We are investigating the (computer files) to see if the virus was inserted in the system at Cornell. So far, we have determined that this particular student's account does hold files that appear to have passwords for some computers at Cornell and Stanford University to which he's not entitled. "We also found that his account contains a list of passwords substantially similar to those contained in the virus," said Lynn. He added that students' accounts show which computers they had accessed and what they had stored. The university is preserving all pertinent computer tapes and records to determine the history of the virus. Morris Jr. himself has not been reached for comment. Associated Press writer Douglas Rowe says the young man is believed to have flown to Washington, D.C., yesterday and plans to hire a lawyer and to meet with officials in charge of the infected computer networks to discuss the incident. Rowe also quotes computer scientists as saying the younger Morris worked in recent summers at the AT&T's Bell Laboratories, where one of his projects reportedly was rewriting the communications security software for most computers that run AT&T's Unix operating system. AP also notes that computer scientists who now are disassembling the virus to learn how it worked said they have been impressed with its power and cleverness. Of this, Morris' 56-year-old father told the Times that the virus may have been "the work of a bored graduate student." Rowe says that when this comment was heard back at Cornell, Dexter Kozen, graduate faculty representative in the computer science department, chuckled and said, "We try to keep them from getting bored. I guess we didn't try hard enough." Meanwhile, there already is talk of repercussions if Morris is determined to be responsible for the virus. Lynn said, "We certainly at Cornell deplore any action that disrupts computer networks and computer systems whether or not it was designed to do so. And certainly if we find a member of the Cornell community was involved, we will take appropriate disciplinary action." He declined to specify what the action would be. In addition, federal authorities may be calling. Speaking with reporter Joseph Verrengia of Denver's Rocky Mountain News late yesterday, FBI spokesman William Carter said a criminal investigation would be launched if it is determined federal law was violated. He said the bureau will review the Computer Fraud and Abuse Act, which deals with unauthorized access to government computers or computers in two or more states. Conviction carries a maximum penalty of 10 years in prison. --Charles Bowen ROBERT MORRIS' FRIENDS SAY NO MALICE MEANT WITH ALLEGED VIRUS (Nov. 7) Friends of a Cornell University graduate student suspected of creating a "virus" that jammed some 6,000 networked computers for 36 hours last week say they believe he intended no malice and that he also frantically tried to warn operators after he saw his programming experiment had gone terribly awry. Twenty-three-year-old Robert Tappen Morris Jr. is said to now be in contact with his father -- Robert T. Morris Sr., a computer security expert with the super secret National Security Agency - - and is expected to meet this week with FBI agents after hiring a lawyer. As reported earlier, the virus, which started Wednesday night, spread along several major networks and, for about 36 hours, created widespread disturbances in the unclassified branch of the military's defense data system, as well as in thousands of university and research computer systems. However, apparently no information was lost or damaged. Morris Sr. told Associated Press writer David Germain that he met with FBI agents for about an hour Saturday to explain why his son will not immediately comply with their request for more information. The elder Morris said the family has had preliminary discussions with an attorney and expects to hire one by today. He said his son won't be available for a comment until at least tomorrow or Wednesday. The New York Times yesterday quoted Morris' friends as saying he had spent weeks creating the virus. However, the paper said that by all accounts Morris meant no harm to the systems; instead, the virus, created as an intellectual challenge, was supposed to lie dormant in the systems. A friend alleges Morris discovered a flaw in the electronic mail section of the Unix 4.3 operating system, a modification of AT&T's original Unix produced by the University of California at Berkeley. When he saw the flaw allowed him to secretly enter the networked Unix computers, Morris literally jumped onto the friend's desk and paced around on top of it, the Times reported. Cornell instructor Dexter Kozen told AP the flaw was "a gaping hole in the system that I'm amazed no one exploited before." While the loophole was not evident before the virus was unleashed, "in retrospect it's really quite obvious," Kozen said. Incidentally, the programmer who designed Unix's e-mail program through which the virus apparently entered told the Times this weekend that he had forgotten to close a secret "back door." Eric Allman said he created the opening to make adjustments to the program, but forgot to remove the entry point before the program was widely distributed in 1985. He was working for a programming organization at the University of California/Berkeley at the time. Friends and others say Morris' original vision was to spread a tiny program throughout and have it secretly take up residence in the memory of each computer it entered, the Times said. Working virtually around the clock, Morris reportedly made a single programming error involving one number that ultimately jammed more than 6,000 computers by repeating messages time after time. AP's Germain said Morris reportedly went to dinner after setting the program loose Wednesday night and then checked it again before going to bed. Discovering his mistake, Morris desperately worked to find a way to stop the virus' spread. However, "his machines at Cornell were so badly clogged he couldn't get the message out," said Mark Friedell, an assistant professor of computer science at Harvard University, where Morris did his undergraduate studies. AP says that, panicked, Morris called Andrew Sudduth, systems manager at Harvard's Aiken Laboratory. He asked Sudduth to send urgent messages to a computer bulletin board system, explaining how to defeat the virus. Sudduth told The Washington Post, "The nets were like molasses. It took me more than an hour to get anything out at all." At a press conference this weekend, Cornell University officials said that, while the computer virus was traced to their institution, they actually had no evidence to positively identify Morris as the virus creator. Said Dean Krafft, Cornell's computer facilities manager, "We have no fingerprints. We have no eyewitness, but it was created on his computer account." Krafft added that Morris' computer account holds files that appear to have unauthorized passwords for computers at Cornell and Stanford University. In addition, Cornell Vice President M. Stuart Lynn said the origin of the program is hard to investigate, and it may be impossible to trace the virus back to Morris. "At this stage we're simply not in a position to determine if the allegations are true," Lynn said, adding he did not know how long the investigation would take. Curiously, in light of Krafft's statements, Lynn is quoted as saying, "It's quite conceivable we may not be able to say with any certainty" if the virus was created in Cornell's computer system. Lynn also said the university had been contacted by the FBI, but there was no indication any criminal charges would be filed. Officials said the school could discipline Morris if he was involved. By the way, one Cornell official, who spoke on condition of anonymity, told AP that it appeared there was an earlier version of the virus in Morris' computer files. Regarding possible penalties, United Press International this morning quoted an FBI spokesman as saying that the person responsible for the virus could face up to 20 years in prison and $250,000 in fines for the federal offense of unauthorized access to government computers. Finally, Harvard graduate student Paul Graham, a friend of Morris, told the Times he thought Morris' exploit was similar to that of Mathias Rust, the young West German who flew a light plane through Soviet air defenses in May 1987 and landed in Moscow. "It's as if Mathias Rust had not just flown into Red Square, but built himself a stealth bomber by hand and then flown into Red Square." --Charles Bowen NEW LAN LABORATORY GROUP OFFERS SUGGESTIONS FOR VIRUS PREVENTION (Nov. 7) Just a week or so before thousands of networked computers across the country were struck by a rapid virus, some 60 computer companies endorsed a set of virus-prevention guidelines drafted by the National LAN Laboratory. The Reston, Va., group, devoted to local area networks, hopes its tips can prevent and control future viruses and worm program intrusions. Speaking with business writer Peter Coy of The Associated Press, LAN Lab spokesman Delbert Jones said, "The key issue is that with proper precautions, one can continue to live a normal existence. ... "It's very much like the AIDS virus: The best solution is precaution." Here, according to AP, are the suggestions by the LAN Lab group: 1. All software should be purchased from known, reputable sources. 2. Purchased software should be in its original shrink wrap or sealed disk containers when received. 3. Back-up copies should be made as soon as the software package is opened. Back-ups should be stored off-site. 4. All software should be reviewed carefully by a system manager before it is installed on a network. 6. New software should be quarantined on an isolated computer. This testing will greatly reduce the risk of system virus contamination. 7. A back-up of all system software and data should be made at least once a month, with the back-up copy stored for at least one year before re-use. This will allow restoration of a system that has been contaminated by a "time-released" virus. A plan that includes "grandfathered" rotation of back-up copies will reduce risk even further. 8. System administrators should restrict access to system programs and data on "needmSkͥ͹a isolte!pKͱ protects critZX ѥͱ and aids problem diagnosis. 9. All programs on a system should be checked regularly for program length changes. Any program-length deviations could be evidence of tampering, or virus infiltration. 10. Many shared or free programs are invaluable. However, these are the prime entry point for viruses. Skeptical review of such programs is prudent. Also, extended quarantine is essential before these programs are introduced to a computer system. 11. Any software that exhibits symptoms of possible virus contamination should be removed immediately. System managers should develop plans for quick removal of all copies of a suspect program, and immediate backup of all related data. These plans should be made known to all users, and tested and reviewed periodicalQ#jjŹBowen FBI UPGRADES VIRUS PROBE TO A "FULL CRIMINAL INVESTIGATION" (Nov. 8) The young man alleged to have written the virus that stymied some 6,000 networked computers last week has hired a Washington, D.C., attorney. His selection apparently comes just in time, because the FBI reportedly is upgrading its probe of the matter to a full criminal investigation. Robert T. Morris Jr., 23-year- old Cornell University graduate student, has not been formally charged, but nonetheless is widely alleged to have created the virus that played havoc for 36 hours last week with Unix- based computers on the Pentagon-backed ARPANET network and other systems. Associated Press writer Anne Buckley this morning reported that lawyer Thomas Guidoboni of the Washington firm of Bonner & O'Connell has been retained to represent Morris. Guidoboni told Buckley, "We have notified the federal authorities of our representation and (Morris') whereabouts. We are in the process of investigating the facts and circumstances which have been reported by the press in order to determine our course of action." Meanwhile, The Washington Post this morning quoted law enforcement sources as confirming their inquiry has been expanded to a full field investigation by the FBI's Washington field office. That means the FBI has consulted with federal prosecutors, agreed that the bureau has jurisdiction and that there is reason to believe there may have been a violationot federal criminal law. "In a full-scale investigation," Buckley said, "the government has the power to subpoena records and documents and compel testimony through the authorization of immunity, two techniques which are not permitted through preliminary inquiries. The move indicate(s) the FBI (is) moving very quickly in the case because in many instances, preliminary inquiries take a month or more." AP also quoted a government source who spoke on condition of anonymity as saying investigators aren't sure whether any criminal activity actually occurred, as defined by a statute passed in 1984. Says Buckley, "A section of that law says it is unlawful to enter a government computer with the intent to disrupt its functions. The crime is punishable by up to 10 years in prison. The source said that in this case, there's no evidence that anything was taken from the computers, but rather that it was a question of disrupting computer systems. One section of law addresses sabotage, but the source said it (is) unclear whether the virus case would involve an intent to disrupt the computer." AP says its source believes the bureau is investigating the matter in view of the fact that there were breaches of security, and that the Justice Department will have to determine whether the matter involved criminal conduct. --Charles Bowen GOVERNMENT MAY SUBPOENA CORNELL (Nov. 9) Sources close to the investigation of last week's massive virus attack say the government may seek search warrants or subpoenas to get documents from Cornell University before trying to interview the virus's alleged author. AssoCiYYɕ́writer Pete Yost quotes Washington, D.C., lawyer Thomas Guidoboni as saying he hasn't been contacted by the FBI since informing the bureau that he was chosen on Monday to represent the suspect, 23-year-old Robert T. Morris Jr., a Cornell graduate student. Says Guidoboni, "The ball's in their court. We're waiting to hear from them." Yost notes that earlier the FBI had sought to question Morris, but that was before Guidoboni was retained. The lawyer told AP he didn't think "we'll have enough information by the end of this week" to determine whether to talk to the FBI. He says he wants to talk more with his client before deciding what course to take. Says the wire service, "The possibility of seeking grand jury subpoenas or a search warrant for data at Cornell that could shed light on the computer virus incident was considered (yesterday) within the FBI. It was discarded as being unnecessary and then revived in discussions with Justice Department lawyers, said the sources, speaking on condition of anonymity." Meanwhile, Cornell Vice President M. Stuart Lynn reiterated that the university will cooperate fully with the investigation. Morris, son of acclaimed computer security expert Robert Morris Sr. of Arnold, Va., has not been formally charged. Still, he is widely alleged to be the person who created the virus that paralyzed some 6,000 networked Unix-based computers on the Pentagon-backed ARPANET network and other systems for about 36 hours last week. --Charles Bowen "BRAIN VIRUS" APPEARS IN HOUSTON (Nov. 9) A version of the so-called "Brain virus," a rogue program believed to have originated in Pakistan, now has cropped up in computers used by University of Houston business students. Texas officials say that the virus, while a nuisance, has posed no real problem. University research director Michael Walters told The Associated Press, "It probably hasn't cost us much, except a few days of people-time to clean up these disks, but it probably cost the students a good bit of frustration." Some students report they have lost data, but Walters told the wire service he knows of no one who has lost an entire term paper or other large quantity of work. Nonetheless, reports still were coming in from students late yesterday. This version of the Brain virus, which last spring was traced to a computer store in Lahore, Pakistan, announced itself at the university early last week on the screen of one of the 150 PCs the business department has for students and faculty. Walters said the virus hasn't spread to the school's larger computers. AP quotes Walters as saying the virus flashed this message (with these misspellings) to students who tried to use infected programs: "Welcome to the dungeon. Copyright 1968 Brain & Amjads, PVT, LTD. Virus shoe record V9.0. Dedicated to the dynamic memory of millions of virus who are no longer with us today -- Thank Goodness. BEWARE OF THE VIRUS. This program is catching. Program follows after these messeges." The original "Brain" virus -- which appeared in May at colleges and businesses along the East Coast and in the computers of The Providence, R.I., Journal-Bulletin newspaper -- flashed the "Welcome to the Dungeon" message, but added "Contact us for vaccination." It also gave names, an address and a phone number of two brothers who run a Lahore, Pakistan, computer store. Walters said the Houston version of the virus says nothing about any vaccine, and the "V9.0" in its message suggests it may be a modified version. Before this, the most recent sighting of the "Brain" virus was at Business International, a Hong Kong financial operation. It was thought to be the first reported digital infection of a commercial business in the East. The firm is believed not to have suffered any major damage. --Charles Bowen UNIX EXPERT SAYS VIRUS "PANIC" UNNECESSARY, BLAMES BAD PLANNING (Nov. 10) An expert on the Unix operating system says that much of last week's "panic" over the virus that brought down some 6,000 networked computers was caused by poor management technique. In a statement from his Rescue, Calif., offices, newsletter editor Bruce Hunter said, "Most of the damage was done by the organizations themselves, not the virus." Hunter, who edits Root, a bimonthly Unix administration and management journal published by InfoPro Systems, observed that more than 50,000 users were reportedly cut off at a single site due to last week's virus, and that more than a million people are believed to have been directly affected. However, Hunter said, "By dropping network connections, administrators were ensuring that the virus was winning. Good communications and information sharing between administrators is what helped people on the network find and implement a solution to the virus quickly." Hunter, who also is an author and mainframe Unix system manager, said that one job of an administrator is to keep all system resources available to users, and another is to "go around searching for possible trouble." He said the most important lesson learned from last week's virus was that a definite plan is imperative to avoid inappropriate reactions. Hunter made these suggestions to managers: -:- Develop a set of scenarios and responses for future virus attacks as well as physical disasters. -:- Keep a printed list of system administrators at all company sites. -:- Establish a central point of information. -:- Coordinate an emergency response task force of key personnel. -:- Keep current off-site backups of all data. -:- Perform regular security audits. --Charles Bowen FBI LOOKING AT WIDE RANGE OF POSSIBLE VIOLATIONS IN VIRUS CASE (Nov. 10) The FBI now is looking at a wide range of possible federal violations in connection with last week's massive computer virus incident, ranging beyond the bureau's original focus on the provisions of the Computer Fraud and Abuse Act of 1986. That was the word today from FBI Director William Sessions, who told a news conference in Washington that the FBI is trying to determine whether statutes concerning wire fraud, malicious mischief or unlawful access to stored communications may have been broken. The Associated Press notes that earlier the FBI had said it was concentrating on the 1986 Computer Fraud and Abuse Act, which prohibits fraud or related activity in connection with computers. The FBI chief said, "We often look at intent as being knowing and intentional doing of an act which the law forbids and knowing that the law forbids it to be done. But we also have other statutes which deal simply with knowingly doing something." The wire service observed the following about two statutes to which Sessions referred: -:- The malicious mischief statute provides a maximum 10-year prison term for anyone who wilfully interferes with the use of any communications line controlled by the US government. -:- The unlawful access law makes it a crime to prevent authorized access to electronic communications while they are in electronic storage and carries a maximum six-month jail term absent malicious destruction or damage. Sessions also told reporters the preliminary phase of the bureau's criminal investigation probably will be completed in the next two weeks. As reported here earlier, authorities think 23-year-old Cornell University student Robert T. Morris created the virus that disrupted thousands of networked computers last week. However, Morris has not yet been charged with any crime. --Charles Bowen MICHIGAN WEIGHS ANTI-VIRUS LAW (Nov. 15) Michigan lawmakers soon will consider a proposed state law that would impose felony penalties against anyone convicted of creating or spreading computer "viruses." Sponsoring the bill, Republican Sen. Vern Ehlers told United Press International, "Because this is a new type of crime, it is essential we address it directly with a law that deals with the unique nature of computers." Citing this month's virus attack on military and research computers linked by ARPANET and other networks, Ehlers added, "The country recently saw how quickly a virus can spread through network users. The Defense Department and its contractors were extremely fortunate that the virus was relatively harmless." The senator said his bill, still being drafted, is expected to include provisions making it a felony for anyone to deliberately introduce a virus into a computer system. UPI notes Ehlers is a physicist with a Ph.D who has 30 years' experience with computers. --Charles Bowen VIRUS STRIKES CALIF. MACINTOSHES (Nov. 15) Students at Southern California universities were being warned today of a rapidly spreading West German virus that reportedly is disrupting functions of Apple Macintosh computers. "In general, this thing is spreading like mad," Chris Sales, computer center consultant at California State University at Northridge, told The Associated Press. "It originated in West Germany, found its way to UCLA and in a short time infected us here." AP quotes school officials as saying that at least a dozen Macs at the suburban San Fernando Valley campus have been infected since the virus first cropped up last week. Cal State says the virus apparently does not erase data, but that it does stall the computers and removal requires hours of reprogramming. The wire service said students' disks are "being tested for the virus" before they can rent a Mac0a the`+˕ͥ偽ѽɕj @"--CarlY.ݕ5 COMPUTER SECURITY EXPERT OFFERS TIPS (Nov. 15) The need to protect against computer viruses has heralded the end of the user-friendly computer era, says one security expert. According to Government Computer News, Sanford Sherizen, president of Data Security Systems Inc. of Natick, Mass. said the objective now is to make software bullet-proof, not accessible. He said that since the advent of computers in offices, managers have been faced with the conflicting needs of protecting the data versus producing it. Data must be accessible to those who need it and yet at the same time secure from those who can alter, delete, destroy, disclose or steal it or steal computm!hardware. Sherizen told GCN reporter Richard A. Danca that non- technical managers can contribute to computer security as advocates and facilitators. Users must learn that security is a part of their jobs. He predicted that security managers will soon use biometric security measures such as comparing retinal blood vessels or fingerprints. Needless to say, such techniques raise complicated issues of civil liberties and privacy. Sherizen said that all information deserves protection. --Cathryn Conroy VIRUS THREAT SAID EXAGGERATED (Nov. 16) Because of the latest reports of attacks by computer "viruses," some in the industry are ready to blame such rogue programs for anything that goes wrong. However, expert Charles Wood told a 15th annual computer security conference in Miami Beach, Fla., this week, "Out of over 1,400 complaints to the Software Service Bureau this year, in only 2 percent of the cases was an electronic virus the cause of the problem. People are jumping to the conclusion that whenever a system slows down, it's a virus that's responsible." The Associated Press reports that Wood and other panelists cautioned that computer-dependent companies should focus more on the day-to-day breakdowns caused by human error than on viruses. President Steve Irwin of LeeMah Datacom Security Corp. told the conference that this month's virus assault on networked computers on the ARPANET system "could be a cheap lesson." Said Irwin, "We were lucky because it was not a real malicious attempt ... If (the virus' author) had ordered the programs to be erased, the loss could have gone into billions, lots of zeroes." AP quoted Wood as adding, "The virus is the hot topic right now, but actually the real important subject is disaster recovery planning. But that's not as glamorous as the viruses." --Charles Bowen FBI SEIZES MORRIS RECORDS IN PROBE OF NATIONAL VIRUS CASE (Nov. 17) While young Robert T. Morris Jr. still has not been charged with anything in connection with the nation's largest computer virus case, the FBI now reveals that items it has seized so far in its probe include magnetic tapes from Morris' computer account at Cornell University. The Associated Press reports that documents released by the FBI late yesterday say investigators seized "two magnetic tapes labeled `files from Morris account including backups' and hard copy related thereto" from Dean Krafft, a research associate in computer science at Cornell, where the 23- year-old Morris is a graduate student. AP says the agents also obtained "two yellow legal pads with calculus and assorted notes." Associate university counsel Thomas Santoro had taken the legal pads from an office in Upson Hall, a campus building that contains computer science classrooms and offices, AP says. Even though Morris hasn't been charged, it has been widely reported that the young man told friends he created the virus tHa stymied an estimated 6,200 Unix- based computers on ARPANET and other networks for some 36 hours earlier this month. As reported, the FBI is conducting a criminal investigation to determine whether statutes concerning wire fraud, malicious mischief or unlawful access to stored communications may have been violated. AP quotes these latest FBI documents as saying that US District Judge Gustave J. DiBianco in the northern district of New York in Syracuse issued two warrants on Nov. 10 for the Cornell searches. The FBI searches were conducted that same afternoon. "The government had said earlier that it might try to obtain documents from the university before interviewing Morris," AP observes, "and Cornell's vice president for information technologies, M. Stuart Lynn, had said the university would cooperate fully with the investigation." --Charles Bowen SPA FORMS GROUP TO KNOCK DOWN RUMORS ABOUT COMPUTER VIRUSES (Nov. 17) Upset over wild rumors about the destructiveness of computer viruses, the Software Publisher Association has formed a special interest group to address computer security. In a statement released today at the Comdex trade show in Las Vegas, SPA says its new Software Security SIG will help distribute information and serve as liaison for software publishers, industry analysts and consultants. McGraw-Hill News quotes SPA member Ross Greenberg, president of Software Concepts Design, as saying, "Recent unsubstantiated statements regarding the actual damage caused by viruses...has caused more of XՉfervor than served as a public service." At the SIG's organizational meeting, several companies discussed setting standards on how to educate the public regarding viruses and various anti-viral products now being advertised. --Charles Bowen