How​ ​a​ ​grad​ ​student​ ​trying​ ​to​ ​build​ ​the​ ​first botnet​ ​brought​ ​the​ ​Internet​ ​to​ ​its​ ​knees By​ ​Timothy​ ​B.​ ​Lee​ ​November​ ​1,​ ​2013

Robert​ ​Morris​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​)

Here​ ​is​ ​a​ ​ ​TOP​ ​10​ ​BOTNETS​ ​AND​ ​SCAMS​ ​running​ ​n​ ​2017: https://goo.gl/5k9Zyn https://goo.gl/7bT1cv https://goo.gl/4xkpz7 https://goo.gl/42be5a https://goo.gl/n4HNKk https://goo.gl/NVzNB7 https://goo.gl/prg5Vr https://goo.gl/UaXLLS https://goo.gl/hUYSgf https://goo.gl/tBqp5W https://goo.gl/W77UkL

On​ ​November​ ​3,​ ​1988,​ ​25​ ​years​ ​ago​ ​this​ ​Sunday,​ ​people​ ​woke​ ​up​ ​to​ ​find​ ​the​ ​Internet​ ​had changed​ ​forever.​ ​The​ ​night​ ​before,​ ​someone​ ​had​ ​released​ ​a​ ​malevolent​ ​computer​ ​program​ ​on the​ ​fledgling​ ​computer​ ​network.​ ​By​ ​morning,​ ​thousands​ ​of​ ​computers​ ​had​ ​become​ ​clogged​ ​with numerous​ ​copies​ ​of​ ​a​ ​computer​ ​"worm,"​ ​a​ ​program​ ​that​ ​spread​ ​from​ ​computer​ ​to​ ​computer much​ ​like​ ​a​ ​biological​ ​infection. It​ ​took​ ​days​ ​of​ ​effort​ ​by​ ​hundreds​ ​of​ ​systems​ ​administrators​ ​to​ ​clean​ ​up​ ​the​ ​mess,​ ​and​ ​the Internet​ ​community​ ​spent​ ​weeks​ ​analyzing​ ​what​ ​had​ ​happened​ ​and​ ​how​ ​to​ ​make​ ​sure​ ​it​ ​didn't happen​ ​again.​ ​A​ ​graduate​ ​student​ ​named​ ​Robert​ ​Morris​ ​was​ ​unmasked​ ​as​ ​the​ ​culprit​ ​behind the​ ​worm.​ ​A​ ​brilliant​ ​loner,​ ​he​ ​seemed​ ​to​ ​be​ ​motivated​ ​more​ ​by​ ​intellectual​ ​curiosity​ ​than​ ​malice. That​ ​didn't​ ​save​ ​him​ ​from​ ​becoming​ ​one​ ​of​ ​the​ ​first​ ​people​ ​prosecuted​ ​and​ ​convicted​ ​under​ ​an anti-hacking​ ​statute​ ​that​ ​Congress​ ​had​ ​passed​ ​a​ ​few​ ​years​ ​earlier. But​ ​the​ ​most​ ​significant​ ​effect​ ​of​ ​the​ ​worm​ ​was​ ​how​ ​it​ ​permanently​ ​changed​ ​the​ ​culture​ ​of​ ​the Internet.​ ​Before​ ​Morris​ ​unleashed​ ​his​ ​worm,​ ​the​ ​Internet​ ​was​ ​like​ ​a​ ​small​ ​town​ ​where​ ​people thought​ ​little​ ​of​ ​leaving​ ​their​ ​doors​ ​unlocked.​ ​Internet​ ​security​ ​was​ ​seen​ ​as​ ​a​ ​mostly​ ​theoretical problem,​ ​and​ ​software​ ​vendors​ ​treated​ ​security​ ​flaws​ ​as​ ​a​ ​low​ ​priority. The​ ​Switch​ ​newsletter The​ ​day's​ ​top​ ​stories​ ​on​ ​the​ ​world​ ​of​ ​tech. The​ ​Morris​ ​Worm​ ​destroyed​ ​that​ ​complacency.​ ​It​ ​forced​ ​software​ ​vendors​ ​to​ ​take​ ​security​ ​flaws in​ ​their​ ​products​ ​seriously.​ ​It​ ​invigorated​ ​the​ ​field​ ​of​ ​computer​ ​security,​ ​creating​ ​a​ ​demand​ ​for such​ ​experts​ ​in​ ​both​ ​academia​ ​and​ ​industry.​ ​Today,​ ​the​ ​Internet​ ​is​ ​infested​ ​with​ ​malware​ ​that

works​ ​a​ ​lot​ ​like​ ​the​ ​software​ ​Morris​ ​set​ ​out​ ​to​ ​build​ ​a​ ​quarter-century​ ​ago.​ ​And​ ​the​ ​community​ ​of Internet​ ​security​ ​professionals​ ​who​ ​fight​ ​these​ ​infections​ ​can​ ​trace​ ​the​ ​roots​ ​of​ ​their​ ​profession back​ ​to​ ​the​ ​events​ ​of​ ​November​ ​1988. Morris​ ​has​ ​gone​ ​on​ ​to​ ​a​ ​brilliant​ ​career​ ​as​ ​an​ ​entrepreneur,​ ​computer​ ​scientist,​ ​and​ ​investor. And​ ​the​ ​man​ ​who​ ​prosecuted​ ​him,​ ​Mark​ ​Rasch,​ ​now​ ​says​ ​that​ ​he​ ​would​ ​support​ ​pardoning​ ​him. Wednesday:​ ​A​ ​late​ ​night​ ​phone​ ​call Andrew​ ​Sudduth​ ​was​ ​best​ ​known​ ​as​ ​a​ ​world-class​ ​rower.​ ​In​ ​1984,​ ​he​ ​was​ ​part​ ​of​ ​an​ ​American team​ ​that​ ​won​ ​a​ ​silver​ ​medal​ ​in​ ​that​ ​summer's​ ​Olympic​ ​games.​ ​But​ ​he​ ​was​ ​also​ ​a​ ​talented computer​ ​hacker.​ ​In​ ​the​ ​fall​ ​of​ ​1988,​ ​he​ ​worked​ ​on​ ​the​ ​technical​ ​staff​ ​of​ ​Harvard​ ​University's Aiken​ ​Computational​ ​Laboratory. Sudduth​ ​had​ ​gotten​ ​to​ ​know​ ​Robert​ ​Morris​ ​while​ ​Morris​ ​was​ ​an​ ​undergraduate​ ​at​ ​Harvard. Morris​ ​had​ ​graduated​ ​from​ ​Harvard​ ​and​ ​began​ ​graduate​ ​studies​ ​at​ ​Cornell​ ​University​ ​in​ ​fall 1988.​ ​Around​ ​11​ ​p.m.​ ​on​ ​Wednesday,​ ​Nov.​ ​2,​ ​Sudduth​ ​was​ ​talking​ ​with​ ​Paul​ ​Graham,​ ​another Aiken​ ​Lab​ ​staffer​ ​and​ ​a​ ​friend​ ​of​ ​Morris,​ ​when​ ​Morris​ ​called.​ ​(The​ ​account​ ​that​ ​follows​ ​is​ ​drawn from​ ​Sudduth's​ ​testimony​ ​to​ ​a​ ​Cornell​ ​commission.​​ ​Sudduth​ ​died​ ​in​ ​2006,​ ​and​ ​Graham​ ​declined to​ ​be​ ​interviewed​ ​for​ ​this​ ​story.) Graham​ ​answered​ ​the​ ​phone.​ ​After​ ​the​ ​call,​ ​Graham​ ​reportedly​ ​told​ ​Sudduth​ ​that​ ​Morris​ ​had admitted​ ​releasing​ ​a​ ​worm​ ​that​ ​was​ ​then​ ​spreading​ ​across​ ​the​ ​Internet.​ ​Half​ ​an​ ​hour​ ​later, Morris​ ​called​ ​again.​ ​This​ ​time​ ​Sudduth​ ​answered​ ​the​ ​call,​ ​and​ ​Morris​ ​suggested​ ​steps​ ​that Harvard​ ​administrators​ ​could​ ​take​ ​to​ ​protect​ ​their​ ​computers​ ​from​ ​the​ ​worm. An​ ​increasingly​ ​panicked​ ​Morris​ ​called​ ​a​ ​third​ ​time,​ ​around​ ​2:30​ ​a.m.​ ​According​ ​to​ ​Sudduth, Morris​ ​"seemed​ ​preoccupied​ ​and​ ​appeared​ ​to​ ​believe​ ​that​ ​he​ ​had​ ​made​ ​a​ ​'colossal'​ ​mistake." Morris​ ​asked​ ​Sudduth​ ​to​ ​post​ ​an​ ​anonymous​ ​message​ ​on​ ​his​ ​behalf​ ​apologizing​ ​for​ ​the​ ​incident and​ ​explaining​ ​how​ ​to​ ​update​ ​computers​ ​to​ ​immunize​ ​them​ ​against​ ​the​ ​worm's​ ​spread. Sudduth​ ​complied​ ​with​ ​Morris's​ ​request​ ​an​ ​hour​ ​later,​ ​posting​ ​an​ ​anonymous​ ​message​ ​on​ ​the Usenet​ ​bulletin​ ​board​ ​system​ ​at​ ​3:34​ ​a.m.,​ ​Thursday,​ ​Nov​ ​3.​ ​"There​ ​may​ ​be​ ​a​ ​virus​ ​loose​ ​on​ ​the Internet,"​ ​the​ ​message​ ​said.​ ​"Here​ ​is​ ​the​ ​gist​ ​of​ ​a​ ​message​ ​I​ ​got:​ ​I'm​ ​sorry."​ ​The​ ​message​ ​then explained​ ​how​ ​to​ ​prevent​ ​the​ ​worm​ ​from​ ​spreading​ ​further. Unfortunately,​ ​Sudduth's​ ​message​ ​wasn't​ ​noticed​ ​until​ ​Saturday,​ ​long​ ​after​ ​it​ ​could​ ​do​ ​any​ ​good.

Eugene​ ​Spafford​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​) Thursday:​ ​Cleaning​ ​up​ ​the​ ​mess Eugene​ ​Spafford​ ​woke​ ​up​ ​early​ ​that​ ​morning,​ ​made​ ​himself​ ​a​ ​cup​ ​of​ ​coffee​ ​and​ ​sat​ ​down​ ​at​ ​his home​ ​computer​ ​to​ ​check​ ​his​ ​e-mail.​ ​In​ ​1988,​ ​most​ ​people​ ​had​ ​never​ ​even​ ​heard​ ​of​ ​the​ ​Internet or​ ​e-mail.​ ​But​ ​Spafford,​ ​an​ ​assistant​ ​professor​ ​of​ ​computer​ ​science​ ​at​ ​Purdue,​ ​was​ ​used​ ​to getting​ ​a​ ​steady​ ​stream​ ​of​ ​e-mails​ ​from​ ​friends​ ​and​ ​colleagues​ ​at​ ​research​ ​institutions​ ​across the​ ​country. So​ ​when​ ​he​ ​dialed​ ​into​ ​his​ ​workstation​ ​on​ ​the​ ​Purdue​ ​campus,​ ​he​ ​was​ ​surprised​ ​to​ ​discover​ ​that he​ ​hadn't​ ​received​ ​any​ ​e-mail​ ​since​ ​he​ ​logged​ ​on​ ​the​ ​night​ ​before.​ ​He​ ​tried​ ​to​ ​log​ ​into​ ​the​ ​mail server​ ​to​ ​figure​ ​out​ ​what​ ​the​ ​problem​ ​might​ ​be,​ ​but​ ​the​ ​server​ ​was​ ​too​ ​overloaded​ ​to​ ​respond. Spafford​ ​got​ ​dressed​ ​and​ ​drove​ ​to​ ​campus​ ​to​ ​investigate​ ​the​ ​problem.​ ​He​ ​discovered​ ​that​ ​"there were​ ​a​ ​lot​ ​of​ ​processes​ ​running​ ​in​ ​the​ ​background​ ​that​ ​shouldn't​ ​have​ ​been​ ​there"​ ​on​ ​the​ ​mail server.​ ​And​ ​he​ ​soon​ ​learned​ ​that​ ​the​ ​same​ ​mysterious​ ​malady​ ​had​ ​struck​ ​machines​ ​not​ ​only across​ ​Purdue's​ ​campus​ ​but​ ​also​ ​across​ ​the​ ​country. The​ ​professor​ ​quickly​ ​assembled​ ​a​ ​team​ ​of​ ​about​ ​eight​ ​people,​ ​who​ ​began​ ​analyzing​ ​the​ ​worm to​ ​figure​ ​out​ ​how​ ​to​ ​stop​ ​it.​ ​By​ ​the​ ​end​ ​of​ ​the​ ​day,​ ​they​ ​had​ ​mostly​ ​finished​ ​dissecting​ ​the

program​ ​to​ ​understand​ ​how​ ​it​ ​worked​ ​and​ ​had​ ​issued​ ​a​ ​recommendation​ ​on​ ​how​ ​to​ ​halt​ ​its spread. Similar​ ​efforts​ ​were​ ​underway​ ​at​ ​other​ ​universities.​ ​Some​ ​of​ ​the​ ​first​ ​people​ ​to​ ​notice​ ​the​ ​attack were​ ​students​ ​at​ ​the​ ​University​ ​of​ ​California,​ ​Berkeley.​ ​Because​ ​they​ ​were​ ​on​ ​the​ ​West​ ​Coast,​ ​it was​ ​early​ ​Wednesday​ ​evening​ ​when​ ​the​ ​worm​ ​began​ ​attacking​ ​their​ ​systems.​ ​A​ ​group​ ​of undergraduates​ ​returned​ ​from​ ​dinner​ ​to​ ​discover​ ​that​ ​an​ ​automated​ ​program​ ​had​ ​been repeatedly​ ​trying​ ​to​ ​log​ ​into​ ​a​ ​Berkeley​ ​computer.​ ​They​ ​alerted​ ​members​ ​of​ ​the​ ​Berkeley​ ​IT​ ​staff, some​ ​of​ ​whom​ ​worked​ ​late​ ​into​ ​the​ ​night​ ​to​ ​diagnose​ ​the​ ​problem. Coincidentally,​ ​the​ ​annual​ ​Berkeley​ ​Unix​ ​Workshop​ ​was​ ​scheduled​ ​to​ ​start​ ​on​ ​Thursday morning.​ ​The​ ​worm​ ​targeted​ ​machines​ ​running​ ​the​ ​Unix​ ​operating​ ​system,​ ​so​ ​some​ ​people skipped​ ​the​ ​formal​ ​conference​ ​proceedings​ ​and​ ​joined​ ​the​ ​worm-analysis​ ​effort.​ ​By​ ​the​ ​end​ ​of the​ ​day​ ​on​ ​Thursday,​ ​the​ ​Berkeley​ ​team​ ​also​ ​understood​ ​the​ ​program​ ​well​ ​enough​ ​to​ ​make recommendations​ ​on​ ​how​ ​to​ ​stop​ ​it. Then​ ​they​ ​ordered​ ​calzones​ ​for​ ​dinner​ ​and​ ​hunkered​ ​down​ ​for​ ​another​ ​all-nighter,​ ​as​ ​they prepared​ ​to​ ​take​ ​the​ ​worm​ ​apart​ ​bit​ ​by​ ​bit.​ ​The​ ​Berkeley​ ​hackers​ ​wanted​ ​to​ ​understand​ ​how​ ​the worm​ ​worked​ ​so​ ​they​ ​could​ ​verify​ ​that​ ​it​ ​hadn't​ ​done​ ​any​ ​permanent​ ​damage​ ​to​ ​the​ ​computers​ ​it had​ ​already​ ​infected​ ​and​ ​that​ ​it​ ​didn't​ ​have​ ​any​ ​more​ ​nasty​ ​surprises​ ​in​ ​store​ ​for​ ​computers​ ​that hadn't​ ​been​ ​cleaned​ ​up​ ​yet.​ ​By​ ​Friday​ ​afternoon,​ ​researchers​ ​had​ ​finished​ ​dissecting​ ​the​ ​worm, and​ ​they​ ​presented​ ​their​ ​findings​ ​at​ ​a​ ​closing​ ​session​ ​of​ ​the​ ​Unix​ ​workshop. Spafford​ ​emerged​ ​as​ ​a​ ​clearinghouse​ ​for​ ​information​ ​flowing​ ​among​ ​his​ ​own​ ​group,​ ​forensic teams​ ​at​ ​Berkeley,​ ​the​ ​Massachusetts​ ​Institute​ ​of​ ​Technology,​ ​the​ ​University​ ​of​ ​Utah​ ​and harried​ ​administrators​ ​across​ ​the​ ​country.​ ​By​ ​the​ ​end​ ​of​ ​the​ ​day,​ ​he​ ​had​ ​created​ ​a​ ​mailing​ ​list dedicated​ ​to​ ​the​ ​worm.​ ​He​ ​was​ ​also​ ​one​ ​of​ ​several​ ​people​ ​to​ ​write​ ​an​ ​in-depth​ ​analysis​ ​of​ ​the worm​ ​in​ ​the​ ​following​ ​weeks. Friday:​ ​"We​ ​don't​ ​have​ ​a​ ​medical​ ​school" The​ ​worm​ ​began​ ​to​ ​attract​ ​intense,​ ​and​ ​predictably​ ​clueless,​ ​media​ ​attention.​ ​For​ ​many reporters,​ ​the​ ​incident​ ​was​ ​the​ ​first​ ​time​ ​they​ ​had​ ​heard​ ​of​ ​either​ ​the​ ​Internet​ ​or​ ​malware. "There​ ​were​ ​some​ ​mainstream​ ​outlets​ ​with​ ​National​ ​Enquirer-type​ ​headlines​ ​of​ ​invasions​ ​of hackers​ ​or​ ​whatever,"​ ​Spafford​ ​says. By​ ​Friday​ ​morning,​ ​there​ ​were​ ​so​ ​many​ ​reporters​ ​calling​ ​MIT​ ​about​ ​the​ ​worm​ ​that​ ​the​ ​school held​ ​a​ ​press​ ​conference.​ ​"The​ ​media​ ​was​ ​uniformly​ ​disappointed​ ​that​ ​the​ ​virus​ ​did​ ​nothing​ ​even remotely​ ​visual,"​ ​recalled​ ​Mark​ ​Eichin​ ​and​ ​Jon​ ​Rochlis,​ ​two​ ​MIT​ ​researchers​ ​who​ ​helped​ ​to dissect​ ​the​ ​worm.​ ​"Several​ ​also​ ​seemed​ ​pained​ ​that​ ​we​ ​weren't​ ​moments​ ​away​ ​from​ ​World​ ​War III." "I​ ​got​ ​one​ ​call​ ​from​ ​a​ ​newspaper​ ​in​ ​Southern​ ​Indiana,"​ ​Spafford​ ​says.​ ​"The​ ​reporter​ ​asked​ ​me, in​ ​all​ ​earnestness,​ ​'Do​ ​our​ ​readers​ ​need​ ​to​ ​worry​ ​about​ ​catching​ ​this​ ​virus?'" "Gosh,​ ​I​ ​don't​ ​know,"​ ​Spafford​ ​deadpanned​ ​in​ ​response.​ ​"We​ ​don't​ ​have​ ​a​ ​medical​ ​school.​ ​You ought​ ​to​ ​call​ ​the​ ​folks​ ​at​ ​Indiana​ ​University." But​ ​the​ ​press​ ​did​ ​fill​ ​in​ ​one​ ​important​ ​piece​ ​of​ ​the​ ​puzzle.​ ​On​ ​Saturday​ ​morning,​ ​the​ ​New​ ​York Times​ ​broke​ ​the​ ​news​ ​that​ ​Robert​ ​Morris​ ​Jr.,​ ​a​ ​23-year-old​ ​computer​ ​science​ ​graduate​ ​student at​ ​Cornell,​ ​had​ ​created​ ​the​ ​worm.

Morris,​ ​reported​ ​Times​ ​reporter​ ​John​ ​Markoff,​ ​was​ ​the​ ​"brilliant"​ ​son​ ​of​ ​Robert​ ​Morris​ ​Sr.,​ ​"one of​ ​the​ ​Government's​ ​most​ ​respected​ ​computer​ ​security​ ​experts."​ ​The​ ​elder​ ​Morris​ ​told​ ​Markoff that​ ​the​ ​worm​ ​was​ ​"the​ ​work​ ​of​ ​a​ ​bored​ ​graduate​ ​student." A​ ​Cornell​ ​report​ ​would​ ​find​ ​that​ ​at​ ​Harvard,​ ​"Morris​ ​was​ ​the​ ​kind​ ​of​ ​student​ ​who​ ​was​ ​bright​ ​but bored​ ​by​ ​routine​ ​homework,​ ​and​ ​often​ ​devoted​ ​his​ ​main​ ​energies​ ​elsewhere.​ ​He​ ​apparently continued​ ​this​ ​pattern​ ​at​ ​Cornell,"​ ​where​ ​he​ ​"seemed​ ​to​ ​prefer​ ​to​ ​work​ ​alone"​ ​and​ ​"spent​ ​many hours​ ​programming​ ​at​ ​the​ ​computer."​ ​His​ ​Cornell​ ​peers​ ​said​ ​Morris​ ​didn't​ ​develop​ ​many​ ​friends in​ ​the​ ​two​ ​months​ ​between​ ​his​ ​arrival​ ​on​ ​campus​ ​and​ ​the​ ​release​ ​of​ ​the​ ​worm.​ ​Of​ ​course,​ ​this combination​ ​of​ ​traits​ ​was​ ​hardly​ ​unusual​ ​among​ ​computer​ ​science​ ​graduate​ ​students.

A​ ​floppy​ ​disk​ ​at​ ​the​ ​Computer​ ​History​ ​Museum​ ​in​ ​Silicon​ ​Valley​ ​contains​ ​a​ ​copy​ ​of​ ​the​ ​Morris Worm's​ ​source​ ​code.​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​) Anatomy​ ​of​ ​a​ ​worm A​ ​worm​ ​is​ ​a​ ​computer​ ​program​ ​that​ ​spreads​ ​from​ ​computer​ ​to​ ​computer​ ​by​ ​exploiting​ ​security vulnerabilities​ ​in​ ​target​ ​machines.​ ​Once​ ​released,​ ​it​ ​operates​ ​without​ ​human​ ​assistance​ ​or control,​ ​scanning​ ​the​ ​Internet​ ​for​ ​new​ ​hosts​ ​to​ ​infect,​ ​attacking​ ​them​ ​and​ ​then​ ​launching​ ​a​ ​new copy​ ​of​ ​the​ ​software​ ​on​ ​the​ ​new​ ​host.​ ​While​ ​experimental​ ​worms​ ​had​ ​been​ ​developed​ ​in​ ​the past,​ ​Morris's​ ​worm​ ​spread​ ​much​ ​further​ ​and​ ​faster​ ​than​ ​any​ ​previous​ ​worm. Forensic​ ​evidence​ ​would​ ​reveal​ ​that​ ​Morris​ ​started​ ​using​ ​Cornell​ ​computers​ ​to​ ​develop​ ​the worm​ ​around​ ​Oct.​ ​15,​ ​1988.​ ​The​ ​worm​ ​used​ ​several​ ​attacks​ ​to​ ​spread​ ​from​ ​computer​ ​to computer.​ ​One​ ​attack​ ​exploited​ ​a​ ​common​ ​Internet​ ​service​ ​known​ ​as​ ​"finger,"​ ​which​ ​was installed​ ​on​ ​most​ ​Unix​ ​machines.

Another​ ​attack​ ​took​ ​advantage​ ​of​ ​the​ ​fact​ ​that​ ​many​ ​users​ ​chose​ ​easy-to-guess​ ​passwords, such​ ​as​ ​their​ ​username​ ​spelled​ ​backwards​ ​or​ ​a​ ​common​ ​term​ ​from​ ​the​ ​dictionary.​ ​The​ ​worm obtained​ ​a​ ​computer's​ ​password​ ​file,​ ​which​ ​contained​ ​encrypted​ ​copies​ ​of​ ​every​ ​user's password.​ ​It​ ​then​ ​systematically​ ​guessed​ ​passwords​ ​using​ ​a​ ​dictionary​ ​of​ ​common​ ​words.​ ​If​ ​it discovered​ ​a​ ​user's​ ​password,​ ​it​ ​attempted​ ​to​ ​use​ ​that​ ​user's​ ​credentials​ ​to​ ​access​ ​other​ ​servers where​ ​that​ ​same​ ​user​ ​had​ ​an​ ​account. On​ ​Oct.​ ​20,​ ​Morris​ ​made​ ​the​ ​300-mile​ ​trek​ ​to​ ​visit​ ​friends​ ​at​ ​Harvard,​ ​staying​ ​for​ ​two​ ​days.​ ​Upon his​ ​return,​ ​Morris​ ​added​ ​code​ ​to​ ​exploit​ ​a​ ​third​ ​security​ ​vulnerability.​ ​The​ ​code​ ​targeted​ ​a​ ​flaw​ ​in "sendmail,"​ ​a​ ​ubiquitous​ ​utility​ ​that,​ ​as​ ​its​ ​name​ ​suggests,​ ​was​ ​used​ ​to​ ​send​ ​e-mail.​ ​It​ ​seems likely​ ​that​ ​Morris​ ​learned​ ​about​ ​this​ ​vulnerability​ ​during​ ​his​ ​Harvard​ ​trip.​ ​Graham,​ ​the​ ​Harvard friend​ ​Morris​ ​would​ ​call​ ​the​ ​night​ ​he​ ​released​ ​the​ ​worm,​ ​e-mailed​ ​Morris​ ​on​ ​Oct.​ ​26​ ​to​ ​ask,​ ​"any news​ ​on​ ​the​ ​brilliant​ ​project?" An​ ​early​ ​version​ ​of​ ​the​ ​worm​ ​recovered​ ​from​ ​an​ ​automatic​ ​backup​ ​of​ ​Morris's​ ​Cornell​ ​files included​ ​extensive​ ​comments​ ​describing​ ​Morris's​ ​vision​ ​for​ ​the​ ​project.​ ​Those​ ​comments suggest​ ​that​ ​Morris​ ​had​ ​even​ ​more​ ​ambitious​ ​goals​ ​than​ ​he​ ​eventually​ ​achieved.​ ​Morris​ ​didn't just​ ​want​ ​to​ ​create​ ​a​ ​worm​ ​that​ ​would​ ​silently​ ​replicate​ ​itself​ ​across​ ​the​ ​Internet.​ ​He​ ​hoped​ ​to build​ ​what​ ​we​ ​would​ ​now​ ​call​ ​a​ ​botnet:​ ​a​ ​network​ ​of​ ​thousands​ ​of​ ​computers​ ​coordinating​ ​with one​ ​another​ ​and​ ​available​ ​to​ ​carry​ ​out​ ​further​ ​instructions​ ​at​ ​the​ ​direction​ ​of​ ​their​ ​master. The​ ​worm,​ ​he​ ​wrote​ ​in​ ​comments​ ​on​ ​an​ ​early​ ​version​ ​of​ ​the​ ​worm,​ ​will​ ​need​ ​to​ ​"decide​ ​what​ ​to break​ ​into​ ​next"​ ​and​ ​will​ ​need​ ​"methods​ ​of​ ​breaking​ ​into​ ​other​ ​systems."​ ​He​ ​also​ ​wanted​ ​"some way​ ​for​ ​ME​ ​to​ ​send​ ​out​ ​commands,​ ​protected​ ​by​ ​an​ ​encoded​ ​password." Morris​ ​wanted​ ​to​ ​avoid​ ​infecting​ ​the​ ​same​ ​machine​ ​multiple​ ​times,​ ​which​ ​could​ ​slow​ ​infected machines​ ​down​ ​and​ ​draw​ ​unwanted​ ​attention.​ ​But​ ​the​ ​most​ ​obvious​ ​way​ ​to​ ​do​ ​that​ ​—​ ​have​ ​an infected​ ​machine​ ​publicly​ ​signal​ ​its​ ​infected​ ​status​ ​to​ ​other​ ​copies​ ​of​ ​the​ ​worm​ ​—​ ​could​ ​itself​ ​aid efforts​ ​to​ ​detect​ ​and​ ​eradicate​ ​the​ ​worm.​ ​To​ ​solve​ ​this​ ​dilemma,​ ​Morris​ ​thought​ ​he​ ​would​ ​need to​ ​build​ ​a​ ​"global​ ​database"​ ​of​ ​infected​ ​computers.​ ​However,​ ​he​ ​admitted,​ ​doing​ ​that​ ​could prove​ ​"really​ ​hard." By​ ​the​ ​time​ ​he​ ​released​ ​the​ ​worm​ ​two​ ​weeks​ ​later,​ ​he​ ​had​ ​only​ ​made​ ​small​ ​steps​ ​toward implementing​ ​these​ ​ideas.​ ​He​ ​never​ ​created​ ​a​ ​command-and-control​ ​system​ ​that​ ​would​ ​have allowed​ ​him​ ​to​ ​send​ ​instructions​ ​to​ ​infected​ ​machines.​ ​The​ ​worms​ ​did​ ​have​ ​code​ ​designed​ ​to send​ ​a​ ​homing​ ​beacon​ ​to​ ​a​ ​particular​ ​computer​ ​at​ ​Berkeley,​ ​which​ ​could​ ​have​ ​been​ ​part​ ​of​ ​a planned​ ​command-and-control​ ​system.​ ​But,​ ​thanks​ ​to​ ​a​ ​programming​ ​error,​ ​even​ ​that subroutine​ ​didn't​ ​work. Morris​ ​did​ ​implement​ ​a​ ​mechanism​ ​designed​ ​to​ ​prevent​ ​multiple​ ​copies​ ​of​ ​the​ ​worm​ ​from running​ ​on​ ​the​ ​same​ ​computer.​ ​If​ ​two​ ​worms​ ​found​ ​themselves​ ​on​ ​the​ ​same​ ​machine,​ ​they would​ ​flip​ ​a​ ​virtual​ ​coin,​ ​and​ ​then​ ​the​ ​losing​ ​copy​ ​of​ ​the​ ​worm​ ​would​ ​commit​ ​electronic​ ​seppuku. But​ ​Morris​ ​modified​ ​this​ ​scheme​ ​in​ ​a​ ​way​ ​that​ ​made​ ​it​ ​ineffective.​ ​One​ ​time​ ​out​ ​of​ ​seven, selected​ ​at​ ​random,​ ​the​ ​losing​ ​worm​ ​would​ ​make​ ​itself​ ​immortal​ ​rather​ ​than​ ​committing​ ​suicide. "This​ ​was​ ​probably​ ​done​ ​to​ ​defeat​ ​any​ ​attempt​ ​to​ ​put​ ​a​ ​fake​ ​worm​ ​process​ ​on​ ​the​ ​TCP​ ​port​ ​to kill​ ​existing​ ​worms,"​ ​Spafford​ ​wrote​ ​in​ ​his​ ​worm​ ​postmortem.​ ​But​ ​the​ ​move​ ​also​ ​undermined​ ​the original​ ​purpose​ ​of​ ​the​ ​self-destruct​ ​scheme:​ ​preventing​ ​multiple​ ​worms​ ​from​ ​infecting​ ​the​ ​same computer.​ ​As​ ​a​ ​result,​ ​on​ ​the​ ​morning​ ​of​ ​Nov.​ ​3​ ​the​ ​population​ ​of​ ​worms​ ​grew​ ​exponentially​ ​until computers'​ ​resources​ ​were​ ​exhausted​ ​from​ ​running​ ​so​ ​many​ ​copies.

Morris​ ​also​ ​took​ ​numerous​ ​precautions​ ​to​ ​make​ ​it​ ​more​ ​difficult​ ​to​ ​detect​ ​and​ ​remove​ ​copies​ ​of the​ ​worm.​ ​For​ ​example,​ ​as​ ​soon​ ​as​ ​a​ ​worm​ ​infected​ ​a​ ​new​ ​machine,​ ​it​ ​would​ ​encrypt​ ​the​ ​files​ ​it used​ ​to​ ​carry​ ​out​ ​the​ ​infection​ ​and​ ​remove​ ​references​ ​to​ ​them​ ​from​ ​the​ ​file​ ​system.​ ​It​ ​would​ ​also periodically​ ​kill​ ​and​ ​respawn​ ​itself​ ​so​ ​that​ ​it​ ​wouldn't​ ​show​ ​up​ ​in​ ​lists​ ​of​ ​long-running​ ​processes. Morris,​ ​Spafford​ ​concluded,​ ​"may​ ​have​ ​been​ ​a​ ​moderately​ ​experienced​ ​Unix​ ​programmer,​ ​but he​ ​was​ ​by​ ​no​ ​means​ ​the​ ​'Unix​ ​wizard'​ ​many​ ​have​ ​been​ ​claiming."​ ​Creating​ ​the​ ​worm​ ​required considerable​ ​effort,​ ​and​ ​a​ ​non-trivial​ ​amount​ ​of​ ​skill.​ ​Yet​ ​Morris​ ​made​ ​a​ ​number​ ​of​ ​rookie mistakes.​ ​"The​ ​worm​ ​could​ ​have​ ​been​ ​much​ ​more​ ​virulent​ ​had​ ​the​ ​author​ ​been​ ​more experienced​ ​or​ ​less​ ​rushed​ ​in​ ​his​ ​coding,"​ ​Spafford​ ​wrote.

(Photo​ ​by​​ ​Terry​ ​Ross​) The​ ​Internet​ ​loses​ ​its​ ​innocence Morris's​ ​worm​ ​rocked​ ​the​ ​young​ ​Internet,​ ​which​ ​had​ ​fewer​ ​than​ ​100,000​ ​computers​ ​on​ ​it​ ​at​ ​the time.​ ​"It​ ​was​ ​largely​ ​a​ ​North​ ​American​ ​network,"​ ​Spafford​ ​says.​ ​"The​ ​majority​ ​of​ ​people​ ​had some​ ​tie​ ​to​ ​computation​ ​for​ ​their​ ​jobs.​ ​I​ ​wouldn't​ ​say​ ​that​ ​we​ ​trusted​ ​each​ ​other,​ ​but​ ​there​ ​was more​ ​a​ ​community​ ​sense​ ​of​ ​caring​ ​for​ ​the​ ​stability​ ​and​ ​appropriate​ ​use​ ​of​ ​the​ ​computing systems." Network​ ​administrators​ ​in​ ​1988​ ​took​ ​few​ ​precautions​ ​against​ ​online​ ​attacks.​ ​"There​ ​was​ ​no​ ​such thing​ ​as​ ​a​ ​firewall​ ​back​ ​then,"​ ​Spafford​ ​says.​ ​"You​ ​didn't​ ​have​ ​people​ ​who​ ​were​ ​vandals​ ​or anarchists​ ​or​ ​criminals​ ​as​ ​much.​ ​There​ ​were​ ​many​ ​public​ ​servers​ ​because​ ​universities​ ​shared​ ​a lot​ ​of​ ​their​ ​data​ ​and​ ​resources." Shock​ ​over​ ​the​ ​worm​ ​provided​ ​a​ ​boost​ ​to​ ​Spafford's​ ​field​ ​of​ ​computer​ ​security.​ ​Before​ ​the​ ​worm, "I​ ​had​ ​no​ ​funding​ ​agency​ ​or​ ​academic​ ​interest​ ​in​ ​security​ ​mechanisms​ ​or​ ​the​ ​kind​ ​of​ ​things​ ​that​ ​I

was​ ​interested​ ​in​ ​doing,"​ ​Spafford​ ​says.​ ​Afterward,​ ​"work​ ​began​ ​on​ ​a​ ​number​ ​of​ ​different security​ ​programs.​ ​Intrusion​ ​detection​ ​and​ ​malware​ ​detection​ ​both​ ​kind​ ​of​ ​took​ ​off." It​ ​would​ ​be​ ​another​ ​decade​ ​before​ ​the​ ​Internet​ ​was​ ​attacked​ ​by​ ​new​ ​malware​ ​infections​ ​serious enough​ ​to​ ​again​ ​attract​ ​widespread​ ​public​ ​attention.​ ​And​ ​by​ ​then,​ ​the​ ​network​ ​had​ ​changed radically.​ ​It​ ​had​ ​millions​ ​of​ ​users,​ ​rather​ ​than​ ​thousands,​ ​and​ ​the​ ​average​ ​technical sophistication​ ​of​ ​these​ ​users​ ​was​ ​much​ ​lower. Unlike​ ​the​ ​Morris​ ​worm,​ ​the​ ​most​ ​significant​ ​malware​ ​outbreaks​ ​of​ ​the​ ​dot-com​ ​era​ ​--​ ​including "Melissa,"​​ ​"ILOVEYOU"​​ ​and​​ ​"SirCam"​​ ​--​ ​worked​ ​by​ ​tricking​ ​gullible​ ​users​ ​into​ ​clicking​ ​on executable​ ​files​ ​sent​ ​to​ ​them​ ​as​ ​e-mail​ ​attachments.​ ​Once​ ​activated​ ​by​ ​a​ ​user,​ ​these​ ​programs sent​ ​copies​ ​of​ ​themselves​ ​to​ ​people​ ​in​ ​the​ ​victim's​ ​Outlook​ ​address​ ​book. But​ ​starting​ ​in​ ​2001,​ ​the​ ​Internet​ ​saw​ ​a​ ​rash​ ​of​ ​potent​ ​malware​ ​infections​ ​that,​ ​like​ ​Morris's creation​ ​(and​ ​unlike​ ​most​ ​of​ ​the​ ​Outlook-based​ ​malware)​ ​could​ ​spread​ ​from​ ​computer​ ​to computer​ ​without​ ​human​ ​assistance.​ ​The​​ ​Code​ ​Red​​ ​worm​ ​exploited​ ​vulnerabilities​ ​in​ ​Microsoft's IIS​ ​Web​ ​server.​ ​Other​ ​high-profile​ ​worms​ ​included​​ ​Slammer​​ ​and​​ ​Blaster​,​ ​both​ ​of​ ​which appeared​ ​online​ ​in​ ​2003. In​ ​the​ ​last​ ​decade,​ ​malware​ ​authors​ ​have​ ​finally​ ​achieved​ ​something​ ​like​ ​Morris's​ ​original, unrealized​ ​vision​ ​of​ ​using​ ​a​ ​worm​ ​to​ ​create​ ​a​ ​vast​ ​network​ ​of​ ​computers​ ​operating​ ​under​ ​the control​ ​of​ ​the​ ​malware's​ ​author.​ ​Consider​ ​the​​ ​Conficker​​ ​worm,​ ​which​ ​first​ ​appeared​ ​online​ ​in 2008​ ​and​ ​has​ ​infected​ ​millions​ ​of​ ​Windows​ ​computers.​ ​Despite​ ​Microsoft's​ ​best​ ​efforts​ ​to eradicate​ ​it,​ ​the​ ​worm​ ​is​ ​still​ ​active​ ​today,​ ​its​ ​spread​ ​aided​ ​by​ ​the​ ​use​ ​of​ ​old,​ ​pirated​ ​copies​ ​of Windows​ ​in​ ​the​ ​developing​ ​world. Conficker​ ​doesn't​ ​just​ ​mindlessly​ ​copy​ ​itself​ ​across​ ​the​ ​Internet.​ ​Once​ ​it​ ​infects​ ​a​ ​computer,​ ​it opens​ ​a​ ​channel​ ​to​ ​the​ ​worm's​ ​creator​ ​and​ ​awaits​ ​further​ ​instructions.​ ​Such​ ​a​ ​network​ ​of​ ​zombie computers,​ ​known​ ​as​ ​a​ ​"botnet,"​ ​has​ ​become​ ​an​ ​important​ ​part​ ​of​ ​the​ ​Internet's​ ​underground economy.​ ​Today,​ ​there​ ​are​ ​many​ ​such​ ​botnets​ ​available​ ​for​ ​rental.​ ​Unscrupulous​ ​individuals use​ ​them​ ​to​ ​send​ ​spam​ ​e-mail​ ​messages,​ ​overwhelm​ ​Web​ ​sites​ ​with​ ​traffic,​ ​or​ ​perform​ ​other nefarious​ ​tasks. Morris​ ​stands​ ​trial As​ ​far​ ​as​ ​we​ ​can​ ​tell,​ ​Morris​ ​has​ ​never​ ​spoken​ ​to​ ​the​ ​press​ ​about​ ​the​ ​incident​ ​that​ ​made​ ​him famous.​ ​True​ ​to​ ​form,​ ​he​ ​didn't​ ​respond​ ​to​ ​our​ ​requests​ ​for​ ​an​ ​interview.​ ​But​ ​there's​ ​a​ ​broad consensus​ ​that​ ​that​ ​he​ ​didn't​ ​have​ ​the​ ​kind​ ​of​ ​malicious​ ​intentions​ ​that​ ​many​ ​modern​ ​worm authors​ ​do.​ ​His​ ​primary​ ​motive​ ​appears​ ​to​ ​have​ ​been​ ​intellectual​ ​curiosity,​ ​not​ ​a​ ​desire​ ​for​ ​profit or​ ​destruction.​ ​Morris​ ​could​ ​have​ ​had​ ​his​ ​worm​ ​destroy​ ​files​ ​or​ ​steal​ ​secrets​ ​on​ ​the​ ​machines​ ​it infected,​ ​but​ ​it​ ​did​ ​nothing​ ​of​ ​the​ ​sort. But​ ​this​ ​apparent​ ​lack​ ​of​ ​ill​ ​intent​ ​didn't​ ​save​ ​Morris​ ​from​ ​prosecution​ ​under​ ​the​ ​Computer​ ​Fraud and​ ​Abuse​ ​Act,​ ​which​ ​Congress​ ​passed​ ​in​ ​1986.​ ​ ​The​ ​attorney​ ​who​ ​prosecuted​ ​the​ ​case,​ ​Mark Rasch,​ ​says​ ​he​ ​and​ ​his​ ​colleagues​ ​at​ ​the​ ​Department​ ​of​ ​Justice​ ​carefully​ ​considered​ ​whether​ ​to charge​ ​Morris​ ​with​ ​a​ ​felony​ ​or​ ​a​ ​misdemeanor. "We​ ​didn't​ ​believe​ ​that​ ​Morris​ ​intended​ ​to​ ​cause​ ​harm​ ​or​ ​damage,"​ ​Rasch​ ​says.​ ​In​ ​his​ ​view, Morris​ ​was​ ​"motivated​ ​mainly​ ​by​ ​curiosity​ ​and​ ​by​ ​a​ ​desire​ ​to​ ​show​ ​that​ ​he​ ​could​ ​do​ ​it." On​ ​the​ ​other​ ​hand,​ ​the​ ​Justice​ ​Department​ ​worried​ ​that​ ​"if​ ​the​ ​government​ ​treated​ ​this​ ​as​ ​a misdemeanor,​ ​a​ ​trivial​ ​offense,​ ​that​ ​others​ ​would​ ​go​ ​out​ ​and​ ​do​ ​it,"​ ​Rasch​ ​said.​ ​"You​ ​had conduct​ ​that​ ​was​ ​planned,​ ​premeditated,​ ​that​ ​was​ ​deliberate,​ ​over​ ​periods​ ​of​ ​months,​ ​that

caused​ ​massive​ ​disruption​ ​and​ ​expense​ ​to​ ​a​ ​wide​ ​number​ ​of​ ​different​ ​individuals."​ ​That​ ​required a​ ​response,​ ​the​ ​government​ ​believed. So​ ​Morris​ ​was​ ​charged​ ​with​ ​a​ ​single​ ​felony​ ​count.​ ​Rasch​ ​says​ ​Morris​ ​could​ ​have​ ​been​ ​charged with​ ​a​ ​separate​ ​felony​ ​for​ ​each​ ​of​ ​the​ ​thousands​ ​of​ ​computers​ ​the​ ​worm​ ​infected.​ ​But​ ​the​ ​lawyer and​ ​his​ ​colleagues​ ​believed​ ​that​ ​would​ ​be​ ​overkill.​ ​"I​ ​don't​ ​believe​ ​that​ ​you​ ​over-prosecute someone​ ​to​ ​send​ ​a​ ​message,"​ ​Rasch​ ​says.​ ​"I​ ​don't​ ​believe​ ​in​ ​the​ ​head-on-a-stake​ ​theory​ ​of prosecution." But​ ​others​ ​viewed​ ​even​ ​a​ ​single​ ​felony​ ​count​ ​as​ ​excessive.​ ​Spafford,​ ​for​ ​example,​ ​believes​ ​that Morris's​ ​actions​ ​warranted​ ​some​ ​punishment,​ ​but​ ​he​ ​says​ ​"the​ ​felony​ ​prosecution​ ​was​ ​probably too​ ​extreme." There​ ​was​ ​plenty​ ​of​ ​evidence​ ​that​ ​Morris​ ​had​ ​created​ ​the​ ​worm.​ ​Backup​ ​tapes​ ​at​ ​Cornell showed​ ​that​ ​someone​ ​had​ ​used​ ​Morris's​ ​account​ ​to​ ​develop​ ​the​ ​worm​ ​in​ ​the​ ​weeks​ ​before​ ​it was​ ​released.​ ​And​ ​Rasch​ ​says​ ​he​ ​called​ ​both​ ​Sudduth​ ​and​ ​Graham​ ​to​ ​testify​ ​against​ ​their friend. Morris​ ​didn't​ ​try​ ​to​ ​deny​ ​being​ ​the​ ​worm's​ ​author.​ ​"He​ ​came​ ​in​ ​and​ ​testified:​ ​'I​ ​did​ ​it,​ ​and​ ​I'm sorry,'"​ ​Rasch​ ​says.​ ​When​ ​it​ ​came​ ​time​ ​for​ ​the​ ​government​ ​to​ ​cross-examine​ ​Morris,​ ​Rasch turned​ ​to​ ​one​ ​of​ ​his​ ​colleagues​ ​and​ ​quipped,​ ​"Should​ ​I​ ​prove​ ​he​ ​didn't​ ​do​ ​it​ ​or​ ​he's​ ​not​ ​sorry?" In​ ​1990,​ ​Morris​ ​was​ ​convicted​ ​by​ ​a​ ​jury.​ ​Sentencing​ ​guidelines​ ​recommended​ ​15​ ​to​ ​21​ ​months in​ ​prison.​ ​Instead,​ ​Judge​ ​Howard​ ​Munson​​ ​sentenced​ ​Morris​​ ​to​ ​serve​ ​three​ ​years​ ​of​ ​probation,​ ​to do​ ​400​ ​hours​ ​of​ ​community​ ​service​ ​and​ ​to​ ​pay​ ​a​ ​$10,000​ ​fine. Morris's​ ​lawyers​ ​tried​ ​to​ ​convince​ ​the​ ​courts​ ​that​ ​Morris's​ ​conduct​ ​didn't​ ​fall​ ​within​ ​the​ ​definition of​ ​the​ ​crime​ ​he​ ​was​ ​charged​ ​with.​ ​The​ ​CFAA​ ​made​ ​it​ ​a​ ​felony​ ​to​ ​intentionally​ ​gain​ ​unauthorized access​ ​to​ ​a​ ​"federal​ ​interest​ ​computer"​ ​and​ ​to​ ​cause​ ​damage​ ​as​ ​a​ ​result.​ ​Morris's​ ​legal​ ​team argued​ ​that​ ​the​ ​statute​ ​required​ ​the​ ​government​ ​to​ ​prove​ ​that​ ​both​ ​the​ ​access​ ​and​ ​the​ ​damage were​ ​intentional.​ ​The​ ​judge​ ​rejected​ ​that​ ​argument,​ ​holding​ ​that​ ​the​ ​government​ ​needed​ ​only​ ​to show​ ​that​ ​Morris​ ​intended​ ​to​ ​gain​ ​unauthorized​ ​access,​ ​not​ ​that​ ​he​ ​intended​ ​to​ ​cause​ ​harm. Morris's​ ​arguments​ ​were​​ ​rejected​ ​by​ ​an​ ​appeals​ ​court​​ ​in​ ​1991.

Paul​ ​Graham​ ​(Photo​ ​by​​ ​Gabor​ ​Cselle​) Pardon​ ​Robert​ ​Morris? By​ ​all​ ​accounts,​ ​Robert​ ​Morris​ ​has​ ​conducted​ ​himself​ ​admirably​ ​in​ ​the​ ​quarter-century​ ​since​ ​he created​ ​the​ ​worm.​ ​In​ ​1995,​ ​Morris​ ​joined​ ​his​ ​friend​ ​Paul​ ​Graham​ ​as​ ​a​ ​co-founder​ ​of​ ​Viaweb,​ ​one of​ ​the​ ​first​ ​e-commerce​ ​startups.​ ​According​ ​to​ ​Graham,​ ​Morris​ ​"was​​ ​so​ ​publicity​ ​averse​​ ​after​ ​the Worm​ ​that​ ​he​ ​didn't​ ​want​ ​his​ ​name​ ​on"​ ​Viaweb's​ ​site,​ ​so​ ​he​ ​was​ ​listed​ ​under​ ​the​ ​pseudonym "John​ ​McArtyem."​ ​Viaweb​ ​was​​ ​sold​ ​to​ ​Yahoo​​ ​for​ ​$49​ ​million​ ​in​ ​1998. Morris​ ​then​ ​returned​ ​to​ ​graduate​ ​school,​ ​earning​ ​a​ ​doctorate​ ​from​ ​Harvard​ ​in​ ​1999.​ ​He​ ​joined the​ ​faculty​ ​of​ ​MIT,​ ​conducting​ ​research​ ​on​ ​computer​ ​networks​ ​and​ ​getting​ ​tenure​ ​in​ ​2006.​ ​In 2005,​ ​Graham​ ​and​ ​Morris​ ​teamed​ ​up​ ​to​ ​found​ ​Y​ ​Combinator,​ ​a​ ​"startup​ ​accelerator"​ ​that​ ​has become​ ​legendary​ ​in​ ​Silicon​ ​Valley. Morris​ ​has​ ​"never​ ​tried​ ​to​ ​gain​ ​any​ ​notoriety​ ​or​ ​credit"​ ​for​ ​his​ ​work​ ​on​ ​the​ ​worm,​ ​Spafford​ ​says. "He​ ​has​ ​not​ ​tried​ ​to​ ​make​ ​any​ ​money​ ​or​ ​work​ ​in​ ​this​ ​area.​ ​His​ ​behavior​ ​has​ ​been​ ​consistent​ ​in supporting​ ​his​ ​defense:​ ​that​ ​it​ ​was​ ​an​ ​accident​ ​and​ ​he​ ​felt​ ​badly​ ​about​ ​it.​ ​I​ ​think​ ​it's​ ​very​ ​much​ ​to his​ ​credit​ ​that​ ​that​ ​has​ ​been​ ​his​ ​behavior​ ​ever​ ​since." Rasch​ ​agrees.​ ​"I​ ​would​ ​not​ ​object​ ​if​ ​Robert​ ​Morris​ ​was​ ​granted​ ​a​ ​pardon,"​ ​he​ ​says.​ ​"I​ ​would represent​ ​him​ ​if​ ​he​ ​wanted.​ ​He​ ​was​ ​not​ ​a​ ​bad​ ​person.​ ​I​ ​don't​ ​see​ ​any​ ​reason​ ​he​ ​should​ ​have​ ​to wear​ ​this​ ​as​ ​a​ ​mark​ ​of​ ​shame​ ​for​ ​the​ ​rest​ ​of​ ​his​ ​life." 32

Comments ● ​ ​Share​ ​on​ ​FacebookShare ● ​ ​ ​Share​ ​on​ ​TwitterTweet ● Share​ ​via​ ​Email The​ ​Post​ ​Recommends

Here’s​ ​what​ ​you​ ​need​ ​to​ ​know​ ​about​ ​the​ ​diversity​ ​visa​ ​lottery​ ​program

President​ ​Trump,​ ​others,​ ​call​ ​for​ ​an​ ​end​ ​to​ ​the​ ​27-year-old​ ​visa​ ​program​ ​that​ ​brought​ ​Sayfullo Saipov​ ​to​ ​the​ ​United​ ​States. 6​ ​hours​ ​ago

‘I’m​ ​the​ ​victim​ ​here’:​ ​Corey​ ​Feldman​ ​defends​ ​himself​ ​in​ ​contentious​ ​‘Today’​ ​interviews

The​ ​1980s​ ​child​ ​star​ ​discussed​ ​his​ ​campaign​ ​to​ ​raise​ ​$10​ ​million​ ​to​ ​reveal​ ​the​ ​names​ ​of​ ​alleged Hollywood​ ​pedophiles. 2​ ​days​ ​ago

JFK’s​ ​last​ ​birthday:​ ​Gifts,​ ​champagne​ ​and​ ​wandering​ ​hands​ ​on​ ​the​ ​presidential​ ​yacht

The​ ​party​ ​aboard​ ​the​ ​Sequoia​ ​included​ ​dinner,​ ​dancing​ ​and​ ​the​ ​president's​ ​pursuit​ ​of​ ​a legendary​ ​Washington​ ​journalist's​ ​wife. May​ ​26

PAID​ ​PROMOTED​ ​STORIES

● What​ ​Causes​ ​Psoriatic​ ​Arthritis?​ ​Yahoo!​ ​Search

● Here's​ ​What​ ​Dental​ ​Implants​ ​Should​ ​Cost​ ​In​ ​Los​ ​Angeles​ ​Dental​ ​Implants​ ​In​ ​Sponsored Ads

● Los​ ​Angeles,​ ​California:​ ​This​ ​Brilliant,​ ​New​ ​Company​ ​Is​ ​Disrupting​ ​a​ ​$200​ ​Billion Industry​ ​EverQuote

● Celebrity​ ​Halloween​ ​Costumes​ ​That​ ​Might​ ​Even​ ​Be​ ​a​ ​Little​ ​Too​ ​Striking​ ​TVGuide.com

● The​ ​Most​ ​Important​ ​Map​ ​of​ ​America​ ​You​ ​Will​ ​Ever​ ​See​ ​(See​ ​Map)​ ​Banyan​ ​Hill Publishing

● PhD​ ​Millionaire​ ​Warns:​ ​"Get​ ​Out​ ​Of​ ​Cash​ ​Now"​ ​The​ ​Crux Recommended​ ​by Discussion​ ​Policy 32​ ​Comments The​ ​comment​ ​section​ ​on​ ​this​ ​story​ ​is​ ​now​ ​closed.​ ​All​ ​comment​ ​sections​ ​close​ ​after​ ​14​ ​days. For​ ​more​ ​on​ ​how​ ​we​ ​manage​ ​comments​ ​and​ ​other​ ​feedback,​ ​please​ ​see​ ​our​​ ​discussion​ ​and submission​ ​guidelines ● All​ ​Comments ○ Newest​ ​First ● Pause​ ​live​ ​updates truthoutandunder 11/5/2013​ ​12:50​ ​PM​ ​PST You​ ​didn't​ ​even​ ​bother​ ​to​ ​mentioned​ ​that​ ​he​ ​was​ ​the​ ​son​ ​of​ ​the​ ​then​ ​director​ ​of​ ​the​ ​NSA?​ ​How does​ ​that​ ​slip​ ​by​ ​you?​ ​You​ ​clearly​ ​haven't​ ​done​ ​your​ ​research,​ ​or​ ​you're​ ​continuing​ ​to​ ​keep​ ​mum about​ ​the​ ​sealed​ ​testimony​ ​in​ ​this​ ​case.​ ​There​ ​was​ ​no​ ​justice​ ​served​ ​then,​ ​and​ ​I​ ​doubt​ ​a​ ​pardon would​ ​matter​ ​now.​ ​Is​ ​his​ ​coddled​ ​existence​ ​of​ ​being​ ​VC​ ​funder​ ​not​ ​good​ ​enough​ ​for​ ​him​ ​now​ ​for some​ ​reason?​ ​Get​ ​a​ ​real​ ​career,​ ​you​ ​are​ ​not​ ​a​ ​real​ ​journalist. LikeShare Robert​ ​Eckman 11/7/2013​ ​11:12​ ​AM​ ​PST What​ ​does​ ​his​ ​father​ ​being​ ​director​ ​of​ ​the​ ​NSA​ ​have​ ​to​ ​do​ ​with​ ​the​ ​story?​ ​Sure,​ ​considering​ ​our current​ ​NSA​ ​scandals,​ ​it's​ ​ironic,​ ​but​ ​that's​ ​not​ ​relevant​ ​to​ ​the​ ​story.​ ​This​ ​isn't​ ​a​ ​story​ ​about​ ​the

NSA​ ​snooping​ ​or​ ​hacking​ ​in​ ​1988;​ ​this​ ​is​ ​a​ ​story​ ​about​ ​an​ ​individual​ ​who​ ​worked​ ​on​ ​a​ ​self created​ ​project​ ​that​ ​blew​ ​up​ ​in​ ​his​ ​face​ ​and​ ​changed​ ​how​ ​we​ ​view​ ​computer​ ​security.​ ​You​ ​imply that​ ​there​ ​was​ ​more​ ​going​ ​on​ ​in​ ​this​ ​case,​ ​that​ ​the​ ​NSA​ ​must​ ​have​ ​something​ ​to​ ​do​ ​with​ ​it,​ ​but​ ​if that​ ​testimony​ ​is​ ​sealed,​ ​then​ ​it's​ ​not​ ​available. I​ ​think​ ​Tim​ ​Lee​ ​did​ ​a​ ​great​ ​job​ ​on​ ​this.​ ​I​ ​studied​ ​this​ ​incident​ ​a​ ​long​ ​time​ ​ago,​ ​and​ ​I​ ​think​ ​this​ ​was researched​ ​well,​ ​I​ ​am​ ​impressed​ ​that​ ​he​ ​reached​ ​out​ ​and​ ​interviewed​ ​individuals​ ​that​ ​were willing​ ​to​ ​contribute.​ ​Unless​ ​you​ ​have​ ​some​ ​real​ ​facts​ ​to​ ​present​ ​(and​ ​not​ ​just​ ​unfounded accusations​ ​or​ ​unsubstantiated​ ​paranoia​ ​rants),​ ​then​ ​I​ ​would​ ​shy​ ​away​ ​from​ ​attacking​ ​a reputable​ ​writer.​ ​This​ ​is​ ​a​ ​forum​ ​for​ ​discussion,​ ​not​ ​for​ ​bullying. Like 2 computeruser 11/3/2013​ ​8:33​ ​AM​ ​PST Christmas​ ​Tree​ ​EXEC​ ​was​ ​the​ ​first​ ​widely​ ​disruptive​ ​computer​ ​worm,​ ​which​ ​paralysed​ ​several international​ ​computer​ ​networks​ ​in​ ​December​ ​1987.​ ​Morris​ ​seems​ ​to​ ​be​ ​the​ ​first​ ​person​ ​to​ ​be caught. LikeShare 2 IndianaGreen 11/2/2013​ ​8:14​ ​AM​ ​PDT A​ ​key​ ​question​ ​we​ ​must​ ​always​ ​ask​ ​ourselves​ ​is​ ​not​ ​whether​ ​we​ ​can​ ​do​ ​something,​ ​but​ ​whether we​ ​should.​ ​Robert​ ​Morris​ ​was​ ​motivated​ ​by​ ​the​ ​same​ ​intellectual​ ​curiosity​ ​our​ ​atomic​ ​scientists at​ ​Los​ ​Alamos​ ​had.​ ​Whether​ ​it​ ​was​ ​a​ ​computer​ ​worm​ ​or​ ​an​ ​atomic​ ​bomb,​ ​it​ ​wasn't​ ​so​ ​much​ ​if​ ​it was​ ​possible​ ​to​ ​create​ ​such​ ​a​ ​thing,​ ​but​ ​whether​ ​they​ ​should​ ​create​ ​it.​ ​Scientists​ ​currently working​ ​on​ ​autonomous​ ​killer​ ​robots​ ​should​ ​ask​ ​themselves​ ​the​ ​same​ ​question. LikeShare 1 stevelaudig 11/1/2013​ ​5:39​ ​PM​ ​PDT "On​ ​the​ ​other​ ​hand,​ ​the​ ​Justice​ ​Department​ ​worried​ ​that​ ​"if​ ​the​ ​government​ ​treated​ ​this​ ​as​ ​a misdemeanor,​ ​a​ ​trivial​ ​offense,​ ​that​ ​others​ ​would​ ​go​ ​out​ ​and​ ​do​ ​it,"​ ​Rasch​ ​said.​ ​"You​ ​had conduct​ ​that​ ​was​ ​planned,​ ​premeditated,​ ​that​ ​was​ ​deliberate,​ ​over​ ​periods​ ​of​ ​months,​ ​that caused​ ​massive​ ​disruption​ ​and​ ​expense​ ​to​ ​a​ ​wide​ ​number​ ​of​ ​different​ ​individuals."​ ​That​ ​required a​ ​response,​ ​the​ ​government​ ​believed." Unethical​ ​to​ ​consider​ ​any​ ​matters​ ​outside​ ​the​ ​conduct​ ​to​ ​charge​ ​the​ ​conduct.​ ​The​ ​government officials​ ​involved​ ​knew​ ​and​ ​believed​ ​it​ ​was​ ​an​ ​accident​ ​and​ ​for​ ​other​ ​reasons​ ​connected​ ​with "governing"​ ​not​ ​justice​ ​made​ ​it​ ​a​ ​felony.​ ​Deeply​ ​offensive,​ ​yet​ ​typical.​ ​And​ ​all​ ​the​ ​while​ ​the​ ​same government​ ​did/does/will​ ​do​ ​nothing​ ​against​ ​large​ ​institutions,​ ​calling​ ​it​ ​the​ ​"Department​ ​of Justice"​ ​is​ ​false​ ​labelling. LikeShare 1

-C4PIO11/1/2013​ ​4:52​ ​PM​ ​PDT Good​ ​article,​ ​but​ ​no​ ​need​ ​for​ ​a​ ​pardon.​ ​He​ ​knew​ ​what​ ​he​ ​was​ ​doing​ ​when​ ​he​ ​opened​ ​Pandora's Box. LikeShare 2 truthoutandunder 11/5/2013​ ​12:52​ ​PM​ ​PST His​ ​father​ ​was​ ​the​ ​head​ ​of​ ​the​ ​NSA​ ​at​ ​the​ ​time,​ ​this​ ​whole​ ​thing​ ​could​ ​have​ ​been​ ​a​ ​false​ ​flag operation.​ ​But​ ​we'll​ ​never​ ​know.​ ​Particularly​ ​not​ ​with​ ​drivel​ ​like​ ​this​ ​being​ ​shoveled​ ​down purportedly​ ​reputable​ ​news​ ​sources.​ ​Educate​ ​yourself,​ ​this​ ​author​ ​isn't​ ​going​ ​to​ ​do​ ​it​ ​for​ ​you,​ ​but perhaps​ ​real​ ​old​ ​hackers​ ​may:​​ ​http://cm.bell-labs.com/who/dmr/crypt.html Like SoFedUp14 11/1/2013​ ​2:48​ ​PM​ ​PDT Great​ ​article. LikeShare 2 abrooklynite 11/1/2013​ ​2:04​ ​PM​ ​PDT White​ ​college​ ​kid​ ​causes,​ ​untold​ ​economic​ ​damage,​ ​a​ ​short​ ​prison​ ​sentence​ ​is​ ​still​ ​too​ ​much, give​ ​him​ ​community​ ​service​ ​and​ ​probation.​ ​'Oh​ ​he​ ​was​ ​young​ ​and​ ​didn't​ ​know​ ​any​ ​better,​ ​he was​ ​just​ ​experimenting.' Black​ ​kid​ ​with​ ​a​ ​bag​ ​of​ ​weed,​ ​"lock​ ​him​ ​up!"​ ​On​ ​his​ ​permanent​ ​record​ ​forever. Don't​ ​pardon​ ​him. LikeShare 3 Soudesuka 11/1/2013​ ​2:20​ ​PM​ ​PDT "White​ ​college​ ​kid​ ​causes,​ ​untold​ ​economic​ ​damage,​ ​a​ ​short​ ​prison​ ​sentence​ ​is​ ​still​ ​too​ ​much, give​ ​him​ ​community​ ​service​ ​and​ ​probation.​ ​'Oh​ ​he​ ​was​ ​young​ ​and​ ​didn't​ ​know​ ​any​ ​better,​ ​he was​ ​just​ ​experimenting.' Black​ ​kid​ ​with​ ​a​ ​bag​ ​of​ ​weed,​ ​"lock​ ​him​ ​up!"​ ​On​ ​his​ ​permanent​ ​record​ ​forever." So​ ​one​ ​overzealous​ ​prosecution​ ​shouldn't​ ​be​ ​overturned​ ​because​ ​overzealous​ ​prosecutions happen​ ​elsewhere? Like 1 SoFedUp14 11/1/2013​ ​2:48​ ​PM​ ​PDT

White​ ​banker​ ​causes​ ​untold​ ​economic​ ​damage,​ ​let's​ ​give​ ​him​ ​a​ ​bonus. Like 7 The​ ​Mystery​ ​Machine 11/3/2013​ ​2:59​ ​PM​ ​PST He​ ​also​ ​initiated​ ​a​ ​programming​ ​movement​ ​that​ ​prevented​ ​an​ ​untold​ ​amount​ ​of​ ​economic damage.​ ​Sure​ ​his​ ​method​ ​wasn't​ ​the​ ​correct​ ​way,​ ​but​ ​it​ ​showed​ ​how​ ​damaging​ ​insecure​ ​code can​ ​be. Like 2 View​ ​More​ ​Replies Coach_1 11/1/2013​ ​1:47​ ​PM​ ​PDT My​ ​firewall​ ​reports​ ​that​ ​I​ ​get​ ​about​ ​100,000​ ​unauthorized​ ​attempts​ ​per​ ​week​ ​to​ ​access​ ​my computer​ ​and​ ​it​ ​is​ ​turned​ ​off​ ​all​ ​night.​ ​When​ ​I​ ​turn​ ​on​ ​my​ ​computer​ ​it​ ​is​ ​basically​ ​useless​ ​for about​ ​10​ ​minutes​ ​while​ ​it​ ​goes​ ​through​ ​a​ ​bunch​ ​of​ ​code​ ​to​ ​protect​ ​me​ ​from​ ​malware.​ ​I​ ​have​ ​the latest​ ​version​ ​of​ ​Adobe​ ​Reader​ ​on​ ​my​ ​computer​ ​as​ ​I​ ​expect​ ​every​ ​other​ ​Windows​ ​based computer​ ​in​ ​the​ ​world​ ​has​ ​and​ ​at​ ​least​ ​once​ ​a​ ​day​ ​I​ ​get​ ​a​ ​request​ ​to​ ​update​ ​the​ ​Adobe​ ​Reader. Obviously​ ​some​ ​malware​ ​is​ ​attempting​ ​to​ ​piggy-back​ ​onto​ ​a​ ​non-Adobe​ ​version​ ​of​ ​the​ ​software in​ ​order​ ​to​ ​take​ ​over​ ​my​ ​computer. What​ ​a​ ​mess​ ​we've​ ​created. LikeShare SoloOwl 11/1/2013​ ​5:33​ ​PM​ ​PDT I​ ​don't​ ​have​ ​Adobe​ ​Reader​ ​nor​ ​do​ ​I​ ​install​ ​it​ ​on​ ​anybody​ ​else's​ ​machine​ ​(unless​ ​they​ ​have severe​ ​vision​ ​problems​ ​--​ ​Adobe​ ​has​ ​good​ ​assistive​ ​tech).​ ​Try​ ​Foxit​ ​Reader​ ​instead.​ ​It​ ​has​ ​a smaller​ ​footprint,​ ​and​ ​needs​ ​fewer​ ​updates.​ ​It​ ​works​ ​nicely. If​ ​it​ ​is​ ​really​ ​true​ ​that​ ​any​ ​piece​ ​of​ ​software​ ​updates​ ​itself​ ​daily,​ ​either​ ​you​ ​missed​ ​a​ ​crucial update​ ​(or​ ​an​ ​update​ ​was​ ​not​ ​properly​ ​recorded​ ​in​ ​the​ ​software's​ ​data)​ ​or​ ​you​ ​are​ ​indeed infected.​ ​I​ ​would​ ​uninstall​ ​the​ ​software,​ ​including​ ​all​ ​preferences,​ ​and​ ​clean​ ​the​ ​Registry.​ ​Wait two​ ​weeks​ ​or​ ​so.​ ​If​ ​it​ ​still​ ​wants​ ​to​ ​update​ ​itself,​ ​you​ ​are​ ​almost​ ​certainly​ ​infected.​ ​Save​ ​all​ ​your emails,​ ​bookmarks,​ ​music,​ ​videos,​ ​photos,​ ​and​ ​other​ ​documents​ ​to​ ​an​ ​external​ ​drive.​ ​Reinstall Windows,​ ​making​ ​sure​ ​to​ ​delete​ ​all​ ​partitions​ ​and​ ​re-create​ ​them​ ​when​ ​Windows​ ​Setup​ ​asks. Reinstall​ ​your​ ​software;​ ​use​ ​filehippo.com​ ​as​ ​a​ ​safe​ ​source.​ ​Copy​ ​back​ ​your​ ​documents​ ​as needed​ ​or​ ​all​ ​at​ ​once. "What​ ​a​ ​mess​ ​we​ ​created."​ ​How​ ​true.​ ​If​ ​you​ ​had​ ​to​ ​deal​ ​with​ ​customers​ ​who​ ​return​ ​their​ ​infected computers​ ​for​ ​repairs,​ ​you​ ​would​ ​feel​ ​the​ ​pain. Like Richard88 11/1/2013​ ​1:45​ ​PM​ ​PDT

Notice​ ​this:​ ​pseudonym​ ​"John​ ​McArtyem." If​ ​you​ ​pronounce​ ​"Artyem"​ ​it​ ​turns​ ​out​ ​to​ ​be​ ​Ar-Ty-em​ ​=​ ​RTM​ ​=​ ​Robert​ ​T.​ ​Morris.​ ​Clever. LikeShare 5 InfoSecGeek 11/4/2013​ ​1:56​ ​PM​ ​PST RTM​ ​is​ ​actually​ ​an​ ​accepted​ ​acronym​ ​as​ ​well​ ​as​ ​his​ ​initials.​ ​Although​ ​it​ ​is​ ​more​ ​commonly expressed​ ​using​ ​the​ ​variant​ ​RTFM.​ ​Read​ ​the​ ​manual. Like 1 USAconcerned 11/1/2013​ ​12:25​ ​PM​ ​PDT Beware​ ​of​ ​downloading​ ​programs​ ​such​ ​as​ ​Windows​ ​Explorer,​ ​there​ ​are​ ​sites​ ​in​ ​India masquerading​ ​as​ ​this​ ​and​ ​other​ ​downloads...I​ ​know​ ​from​ ​recent​ ​nightmare​ ​experience​ ​with​ ​off site​ ​advertising​ ​taking​ ​over​ ​Windows​ ​explorer​ ​9​ ​that​ ​I​ ​had​ ​downloaded,​ ​it​ ​was​ ​not​ ​from Microsoft...no​ ​one​ ​could​ ​get​ ​rid​ ​of​ ​it,​ ​not​ ​Microsoft,​ ​Norton​ ​or​ ​Geek​ ​squad​ ​techs...the​ ​program​ ​is still​ ​somewhere​ ​in​ ​my​ ​computer..​ ​I​ ​use​ ​Google...even​ ​downloaded​ ​Explorer​ ​10...and​ ​get​ ​this​ ​my wife​ ​got​ ​a​ ​call​ ​asking​ ​her​ ​if​ ​I​ ​was​ ​still​ ​having​ ​problems​ ​with​ ​Windows​ ​and​ ​why​ ​I​ ​was​ ​not​ ​using it...caller​ ​had​ ​a​ ​thick​ ​Indian​ ​accent,.also​ ​Norton​ ​and​ ​other​ ​anti​ ​virus​ ​and​ ​malwear​ ​protection programs​ ​that​ ​come​ ​with​ ​new​ ​computers​ ​are​ ​in​ ​my​ ​opinion​ ​virus​ ​and​ ​malewear​ ​themselves​ ​and cannot​ ​be​ ​gotten​ ​rid​ ​of... LikeShare Soudesuka 11/1/2013​ ​2:32​ ​PM​ ​PDT "Beware​ ​of​ ​downloading​ ​programs​ ​such​ ​as​ ​Windows​ ​Explorer" You​ ​should​ ​never​ ​download​ ​Windows​ ​Explorer,​ ​since​ ​it's​ ​installed​ ​by​ ​default​ ​on​ ​your​ ​computer.​ ​I think​ ​you're​ ​talking​ ​about​ ​Internet​ ​Explorer?​ ​If​ ​so,​ ​the​ ​only​ ​way​ ​that​ ​updates​ ​is​ ​through​ ​Windows Update,​ ​so​ ​yeah,​ ​don't​ ​ever​ ​download​ ​that​ ​either. "no​ ​one​ ​could​ ​get​ ​rid​ ​of​ ​it,​ ​not​ ​Microsoft,​ ​Norton​ ​or​ ​Geek​ ​squad​ ​techs...the​ ​program​ ​is​ ​still somewhere​ ​in​ ​my​ ​computer" NO​ ​NO​ ​NO.​ ​You​ ​need​ ​to​ ​FORMAT​ ​AND​ ​REINSTALL​ ​your​ ​machine,​ ​it's​ ​the​ ​only​ ​way​ ​to​ ​be​ ​sure. Back​ ​up​ ​your​ ​personal​ ​data​ ​(not​ ​applications,​ ​just​ ​documents​ ​and​ ​photos​ ​and​ ​such),​ ​then reinstall​ ​Windows​ ​from​ ​scratch. Like 1 Soudesuka 11/4/2013​ ​7:13​ ​AM​ ​PST "When​ ​you​ ​first​ ​activate​ ​Windows​ ​you​ ​are​ ​directed​ ​to​ ​a​ ​site​ ​where​ ​you​ ​choose​ ​your​ ​own browser.​ ​It​ ​would​ ​not​ ​surprise​ ​me​ ​if​ ​the​ ​bad​ ​guys​ ​spoofed​ ​that​ ​site.​ ​"

It​ ​would​ ​surprise​ ​me​ ​very​ ​much,​ ​because​ ​the​ ​bad​ ​guys​ ​would​ ​have​ ​to​ ​compromise​ ​either​ ​the default​ ​OEM​ ​Windows​ ​install​ ​image​ ​or​ ​the​ ​Internet's​ ​DNS​ ​system,​ ​neither​ ​of​ ​which​ ​is​ ​a​ ​simple task. Like 1 InfoSecGeek 11/4/2013​ ​2:03​ ​PM​ ​PST Gotta​ ​wonder​ ​if​ ​those​ ​are​ ​bootlegged​ ​copies​ ​of​ ​Windows.​ ​If​ ​so​ ​compromising​ ​the​ ​install​ ​image might​ ​not​ ​be​ ​that​ ​challenging​ ​a​ ​task.​ ​If​ ​nothing​ ​else​ ​it​ ​seems​ ​it​ ​would​ ​be​ ​simple​ ​to​ ​do​ ​an​ ​install, hack​ ​away​ ​on​ ​the​ ​resulting​ ​system,​ ​and​ ​then​ ​rebuild​ ​an​ ​install​ ​kit​ ​using​ ​whatever​ ​modified components​ ​one​ ​wanted​ ​to​ ​include​ ​(if​ ​necessary​ ​use​ ​IDA​ ​Pro​ ​or​ ​Olly​ ​Debug​ ​to​ ​hack​ ​the​ ​installer and​ ​emasculate​ ​whatever​ ​security​ ​or​ ​other​ ​features​ ​are​ ​necessary).​ ​Not​ ​a​ ​simple​ ​task​ ​but​ ​well within​ ​the​ ​range​ ​of​ ​many​ ​many​ ​third​ ​world​ ​hackers,​ ​almost​ ​down​ ​to​ ​the​ ​script​ ​kiddy​ ​level​ ​these days. Like caps_nats_skins_fan 11/1/2013​ ​12:11​ ​PM​ ​PDT A​ ​pardon?​ ​He​ ​personally​ ​caused​ ​the​ ​waste​ ​of​ ​millions​ ​of​ ​taxpayers​ ​dollars​ ​at​ ​national​ ​labs​ ​to implement​ ​cleanup​ ​and​ ​prevention.​ ​He​ ​should​ ​have​ ​been​ ​charged​ ​based​ ​on​ ​the​ ​number​ ​of machines​ ​he​ ​infected​ ​and​ ​the​ ​amount​ ​ot​ ​time​ ​and​ ​money​ ​to​ ​clean​ ​them​ ​up.​ ​He​ ​got​ ​off​ ​easy because​ ​of​ ​daddy. LikeShare 1 brucekorb 11/1/2013​ ​2:52​ ​PM​ ​PDT OTOH,​ ​he​ ​gave​ ​a​ ​wakeup​ ​call​ ​before​ ​truely​ ​malevolent​ ​worms​ ​came​ ​along.​ ​Not​ ​nice.​ ​He​ ​got​ ​his punishment.​ ​I​ ​wouldn't​ ​say​ ​he​ ​got​ ​off​ ​easy. Like 3 truthoutandunder 11/5/2013​ ​12:54​ ​PM​ ​PST Yes,​ ​he​ ​did.​ ​His​ ​dad​ ​was​ ​the​ ​head​ ​of​ ​the​ ​NSA.​ ​Had​ ​this​ ​been​ ​any​ ​one​ ​else,​ ​he​ ​would​ ​be​ ​behind bars;​ ​pay​ ​attention​ ​to​ ​Operation​ ​Sundevil? Like Wiggan 11/1/2013​ ​11:22​ ​AM​ ​PDT Interesting​ ​piece.​ ​It​ ​is​ ​sad​ ​how​ ​Morris​ ​is​ ​in​ ​the​ ​museum,​ ​and​ ​those​ ​who​ ​cleaned​ ​up​ ​the​ ​mess​ ​he made​ ​are​ ​not.​ ​Wonder​ ​if​ ​any​ ​security​ ​software​ ​companies​ ​release​ ​viruses​ ​to​ ​drum​ ​up business... LikeShare 2 rlj611

11/1/2013​ ​10:56​ ​AM​ ​PDT Nice​ ​article​ ​but​ ​it​ ​still​ ​amazes​ ​me​ ​how​ ​we​ ​trivialize​ ​certain​ ​crimes.​ ​What​ ​he​ ​did​ ​was​ ​wrong​ ​and he​ ​should​ ​have​ ​been​ ​punished​ ​I​ ​don't​ ​care​ ​how​ ​'bored'​ ​he​ ​was.​ ​We​ ​were​ ​all​ ​for​ ​3​ ​strikes​ ​and​ ​it didn’t​ ​matter​ ​what​ ​the​ ​1st,​ ​2nd​ ​or​ ​3rd​ ​strike​ ​was​ ​–​ ​we​ ​wanted​ ​to​ ​teach​ ​society​ ​a​ ​lesson.​ ​Well that​ ​didn’t​ ​work​ ​anymore​ ​than​ ​the​ ​death​ ​penalty​ ​or​ ​life​ ​sentences​ ​–​ ​people​ ​are​ ​going​ ​to​ ​do​ ​what they​ ​want​ ​to​ ​do.​ ​White​ ​collar​ ​criminals​ ​are​ ​seen​ ​as​ ​not​ ​as​ ​'criminal'​ ​or​ ​'didn't​ ​intend​ ​harm'​ ​but they​ ​are​ ​criminals​ ​-​ ​they​ ​break​ ​the​ ​law​ ​and​ ​let's​ ​stop​ ​pretending​ ​it's​ ​different. LikeShare 4 InfoSecGeek 11/4/2013​ ​2:09​ ​PM​ ​PST let's​ ​stop​ ​pretending​ ​all​ ​crimes​ ​are​ ​the​ ​same.​ ​beating​ ​and​ ​killing​ ​people​ ​is​ ​not​ ​the​ ​same​ ​as​ ​white collar​ ​crime.​ ​Ruining​ ​individuals​ ​financially​ ​is​ ​not​ ​the​ ​same​ ​as​ ​infecting​ ​their​ ​computer​ ​with​ ​a worm​ ​(although​ ​if​ ​the​ ​latter​ ​is​ ​a​ ​means​ ​to​ ​the​ ​former​ ​end​ ​it​ ​becomes​ ​part​ ​of​ ​the​ ​same​ ​severity, but​ ​if​ ​it's​ ​just​ ​used​ ​to​ ​spam​ ​herbal​ ​vaigra​ ​ads​ ​that's​ ​not​ ​the​ ​same). so​ ​don't​ ​get​ ​confused.​ ​it's​ ​either​ ​three​ ​strikes​ ​or​ ​it's​ ​not,​ ​make​ ​up​ ​your​ ​mind. Like 1 fgoodwin 11/1/2013​ ​10:28​ ​AM​ ​PDT Maybe​ ​the​ ​punishment​ ​for​ ​Morris​ ​didn't​ ​suit​ ​the​ ​crime.​ ​But​ ​I​ ​think​ ​it's​ ​obvious​ ​from​ ​the​ ​number​ ​of people​ ​who​ ​currently​ ​write​ ​malware​ ​that​ ​current​ ​punishments​ ​serve​ ​as​ ​no​ ​deterrent.​ ​Given​ ​the virulence​ ​of​ ​some​ ​of​ ​the​ ​malware​ ​that's​ ​out​ ​there,​ ​I​ ​wish​ ​the​ ​punishment​ ​was​ ​much​ ​more severe. LikeShare 1 cheesechoker 11/2/2013​ ​12:32​ ​PM​ ​PDT Either​ ​current​ ​punishments​ ​are​ ​not​ ​harsh​ ​enough,​ ​as​ ​you​ ​say,​ ​or…​ ​deterrence​ ​simply​ ​does​ ​not work.​ ​When​ ​you​ ​consider​ ​that​ ​computer​ ​crimes​ ​can​ ​carry​ ​decades-long​ ​sentences,​ ​even​ ​for minor​ ​"unauthorized​ ​entry"​ ​type​ ​offences,​ ​or​ ​even​ ​(ugh)​ ​copyright​ ​violations,​ ​it​ ​should​ ​be​ ​clear that​ ​the​ ​punishments​ ​are​ ​more​ ​than​ ​adequate.​ ​They​ ​just​ ​don't​ ​have​ ​the​ ​intended​ ​effect. Like mcope 11/1/2013​ ​10:10​ ​AM​ ​PDT Nice​ ​account.​ ​It​ ​amazes​ ​me​ ​how​ ​long​ ​ago​ ​everything​ ​occurred!​ ​One​ ​interesting​ ​footnote:​ ​I believe​ ​there's​ ​a​ ​story​ ​of​ ​an​ ​investigator​ ​who​ ​received​ ​an​ ​anonymous​ ​call​ ​a​ ​former​ ​roommate​ ​of Morris'.​ ​The​ ​roommate​ ​slipped​ ​up​ ​and​ ​called​ ​Morris​ ​by​ ​his​ ​initials​ ​"RTM."​ ​It​ ​didn't​ ​take​ ​long​ ​for the​ ​investigator​ ​to​ ​search​ ​the​ ​Harvard​ ​student​ ​directory​ ​and​ ​come​ ​up​ ​with​ ​Robert​ ​Tappan Morris.

Here is a TOP 10 BOTNETS AND SCAMS running n 2017-.pdf ...

2, Sudduth was talking with Paul Graham, another. Aiken Lab staffer and a friend of Morris, when Morris called. (The account that follows is drawn. from Sudduth's testimony to a Cornell commission. Sudduth died in 2006, and Graham declined. to be interviewed for this story.) Graham answered the phone. After the call ...

2MB Sizes 0 Downloads 127 Views

Recommend Documents

No documents