How​ ​a​ ​grad​ ​student​ ​trying​ ​to​ ​build​ ​the​ ​first botnet​ ​brought​ ​the​ ​Internet​ ​to​ ​its​ ​knees By​ ​Timothy​ ​B.​ ​Lee​ ​November​ ​1,​ ​2013

Robert​ ​Morris​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​)

Here​ ​is​ ​a​ ​ ​TOP​ ​10​ ​BOTNETS​ ​AND​ ​SCAMS​ ​running​ ​n​ ​2017: https://goo.gl/5k9Zyn https://goo.gl/7bT1cv https://goo.gl/4xkpz7 https://goo.gl/42be5a https://goo.gl/n4HNKk https://goo.gl/NVzNB7 https://goo.gl/prg5Vr https://goo.gl/UaXLLS https://goo.gl/hUYSgf https://goo.gl/tBqp5W https://goo.gl/W77UkL

On​ ​November​ ​3,​ ​1988,​ ​25​ ​years​ ​ago​ ​this​ ​Sunday,​ ​people​ ​woke​ ​up​ ​to​ ​find​ ​the​ ​Internet​ ​had changed​ ​forever.​ ​The​ ​night​ ​before,​ ​someone​ ​had​ ​released​ ​a​ ​malevolent​ ​computer​ ​program​ ​on the​ ​fledgling​ ​computer​ ​network.​ ​By​ ​morning,​ ​thousands​ ​of​ ​computers​ ​had​ ​become​ ​clogged​ ​with numerous​ ​copies​ ​of​ ​a​ ​computer​ ​"worm,"​ ​a​ ​program​ ​that​ ​spread​ ​from​ ​computer​ ​to​ ​computer much​ ​like​ ​a​ ​biological​ ​infection. It​ ​took​ ​days​ ​of​ ​effort​ ​by​ ​hundreds​ ​of​ ​systems​ ​administrators​ ​to​ ​clean​ ​up​ ​the​ ​mess,​ ​and​ ​the Internet​ ​community​ ​spent​ ​weeks​ ​analyzing​ ​what​ ​had​ ​happened​ ​and​ ​how​ ​to​ ​make​ ​sure​ ​it​ ​didn't happen​ ​again.​ ​A​ ​graduate​ ​student​ ​named​ ​Robert​ ​Morris​ ​was​ ​unmasked​ ​as​ ​the​ ​culprit​ ​behind the​ ​worm.​ ​A​ ​brilliant​ ​loner,​ ​he​ ​seemed​ ​to​ ​be​ ​motivated​ ​more​ ​by​ ​intellectual​ ​curiosity​ ​than​ ​malice. That​ ​didn't​ ​save​ ​him​ ​from​ ​becoming​ ​one​ ​of​ ​the​ ​first​ ​people​ ​prosecuted​ ​and​ ​convicted​ ​under​ ​an anti-hacking​ ​statute​ ​that​ ​Congress​ ​had​ ​passed​ ​a​ ​few​ ​years​ ​earlier. But​ ​the​ ​most​ ​significant​ ​effect​ ​of​ ​the​ ​worm​ ​was​ ​how​ ​it​ ​permanently​ ​changed​ ​the​ ​culture​ ​of​ ​the Internet.​ ​Before​ ​Morris​ ​unleashed​ ​his​ ​worm,​ ​the​ ​Internet​ ​was​ ​like​ ​a​ ​small​ ​town​ ​where​ ​people thought​ ​little​ ​of​ ​leaving​ ​their​ ​doors​ ​unlocked.​ ​Internet​ ​security​ ​was​ ​seen​ ​as​ ​a​ ​mostly​ ​theoretical problem,​ ​and​ ​software​ ​vendors​ ​treated​ ​security​ ​flaws​ ​as​ ​a​ ​low​ ​priority. The​ ​Switch​ ​newsletter The​ ​day's​ ​top​ ​stories​ ​on​ ​the​ ​world​ ​of​ ​tech. The​ ​Morris​ ​Worm​ ​destroyed​ ​that​ ​complacency.​ ​It​ ​forced​ ​software​ ​vendors​ ​to​ ​take​ ​security​ ​flaws in​ ​their​ ​products​ ​seriously.​ ​It​ ​invigorated​ ​the​ ​field​ ​of​ ​computer​ ​security,​ ​creating​ ​a​ ​demand​ ​for such​ ​experts​ ​in​ ​both​ ​academia​ ​and​ ​industry.​ ​Today,​ ​the​ ​Internet​ ​is​ ​infested​ ​with​ ​malware​ ​that

works​ ​a​ ​lot​ ​like​ ​the​ ​software​ ​Morris​ ​set​ ​out​ ​to​ ​build​ ​a​ ​quarter-century​ ​ago.​ ​And​ ​the​ ​community​ ​of Internet​ ​security​ ​professionals​ ​who​ ​fight​ ​these​ ​infections​ ​can​ ​trace​ ​the​ ​roots​ ​of​ ​their​ ​profession back​ ​to​ ​the​ ​events​ ​of​ ​November​ ​1988. Morris​ ​has​ ​gone​ ​on​ ​to​ ​a​ ​brilliant​ ​career​ ​as​ ​an​ ​entrepreneur,​ ​computer​ ​scientist,​ ​and​ ​investor. And​ ​the​ ​man​ ​who​ ​prosecuted​ ​him,​ ​Mark​ ​Rasch,​ ​now​ ​says​ ​that​ ​he​ ​would​ ​support​ ​pardoning​ ​him. Wednesday:​ ​A​ ​late​ ​night​ ​phone​ ​call Andrew​ ​Sudduth​ ​was​ ​best​ ​known​ ​as​ ​a​ ​world-class​ ​rower.​ ​In​ ​1984,​ ​he​ ​was​ ​part​ ​of​ ​an​ ​American team​ ​that​ ​won​ ​a​ ​silver​ ​medal​ ​in​ ​that​ ​summer's​ ​Olympic​ ​games.​ ​But​ ​he​ ​was​ ​also​ ​a​ ​talented computer​ ​hacker.​ ​In​ ​the​ ​fall​ ​of​ ​1988,​ ​he​ ​worked​ ​on​ ​the​ ​technical​ ​staff​ ​of​ ​Harvard​ ​University's Aiken​ ​Computational​ ​Laboratory. Sudduth​ ​had​ ​gotten​ ​to​ ​know​ ​Robert​ ​Morris​ ​while​ ​Morris​ ​was​ ​an​ ​undergraduate​ ​at​ ​Harvard. Morris​ ​had​ ​graduated​ ​from​ ​Harvard​ ​and​ ​began​ ​graduate​ ​studies​ ​at​ ​Cornell​ ​University​ ​in​ ​fall 1988.​ ​Around​ ​11​ ​p.m.​ ​on​ ​Wednesday,​ ​Nov.​ ​2,​ ​Sudduth​ ​was​ ​talking​ ​with​ ​Paul​ ​Graham,​ ​another Aiken​ ​Lab​ ​staffer​ ​and​ ​a​ ​friend​ ​of​ ​Morris,​ ​when​ ​Morris​ ​called.​ ​(The​ ​account​ ​that​ ​follows​ ​is​ ​drawn from​ ​Sudduth's​ ​testimony​ ​to​ ​a​ ​Cornell​ ​commission.​​ ​Sudduth​ ​died​ ​in​ ​2006,​ ​and​ ​Graham​ ​declined to​ ​be​ ​interviewed​ ​for​ ​this​ ​story.) Graham​ ​answered​ ​the​ ​phone.​ ​After​ ​the​ ​call,​ ​Graham​ ​reportedly​ ​told​ ​Sudduth​ ​that​ ​Morris​ ​had admitted​ ​releasing​ ​a​ ​worm​ ​that​ ​was​ ​then​ ​spreading​ ​across​ ​the​ ​Internet.​ ​Half​ ​an​ ​hour​ ​later, Morris​ ​called​ ​again.​ ​This​ ​time​ ​Sudduth​ ​answered​ ​the​ ​call,​ ​and​ ​Morris​ ​suggested​ ​steps​ ​that Harvard​ ​administrators​ ​could​ ​take​ ​to​ ​protect​ ​their​ ​computers​ ​from​ ​the​ ​worm. An​ ​increasingly​ ​panicked​ ​Morris​ ​called​ ​a​ ​third​ ​time,​ ​around​ ​2:30​ ​a.m.​ ​According​ ​to​ ​Sudduth, Morris​ ​"seemed​ ​preoccupied​ ​and​ ​appeared​ ​to​ ​believe​ ​that​ ​he​ ​had​ ​made​ ​a​ ​'colossal'​ ​mistake." Morris​ ​asked​ ​Sudduth​ ​to​ ​post​ ​an​ ​anonymous​ ​message​ ​on​ ​his​ ​behalf​ ​apologizing​ ​for​ ​the​ ​incident and​ ​explaining​ ​how​ ​to​ ​update​ ​computers​ ​to​ ​immunize​ ​them​ ​against​ ​the​ ​worm's​ ​spread. Sudduth​ ​complied​ ​with​ ​Morris's​ ​request​ ​an​ ​hour​ ​later,​ ​posting​ ​an​ ​anonymous​ ​message​ ​on​ ​the Usenet​ ​bulletin​ ​board​ ​system​ ​at​ ​3:34​ ​a.m.,​ ​Thursday,​ ​Nov​ ​3.​ ​"There​ ​may​ ​be​ ​a​ ​virus​ ​loose​ ​on​ ​the Internet,"​ ​the​ ​message​ ​said.​ ​"Here​ ​is​ ​the​ ​gist​ ​of​ ​a​ ​message​ ​I​ ​got:​ ​I'm​ ​sorry."​ ​The​ ​message​ ​then explained​ ​how​ ​to​ ​prevent​ ​the​ ​worm​ ​from​ ​spreading​ ​further. Unfortunately,​ ​Sudduth's​ ​message​ ​wasn't​ ​noticed​ ​until​ ​Saturday,​ ​long​ ​after​ ​it​ ​could​ ​do​ ​any​ ​good.

Eugene​ ​Spafford​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​) Thursday:​ ​Cleaning​ ​up​ ​the​ ​mess Eugene​ ​Spafford​ ​woke​ ​up​ ​early​ ​that​ ​morning,​ ​made​ ​himself​ ​a​ ​cup​ ​of​ ​coffee​ ​and​ ​sat​ ​down​ ​at​ ​his home​ ​computer​ ​to​ ​check​ ​his​ ​e-mail.​ ​In​ ​1988,​ ​most​ ​people​ ​had​ ​never​ ​even​ ​heard​ ​of​ ​the​ ​Internet or​ ​e-mail.​ ​But​ ​Spafford,​ ​an​ ​assistant​ ​professor​ ​of​ ​computer​ ​science​ ​at​ ​Purdue,​ ​was​ ​used​ ​to getting​ ​a​ ​steady​ ​stream​ ​of​ ​e-mails​ ​from​ ​friends​ ​and​ ​colleagues​ ​at​ ​research​ ​institutions​ ​across the​ ​country. So​ ​when​ ​he​ ​dialed​ ​into​ ​his​ ​workstation​ ​on​ ​the​ ​Purdue​ ​campus,​ ​he​ ​was​ ​surprised​ ​to​ ​discover​ ​that he​ ​hadn't​ ​received​ ​any​ ​e-mail​ ​since​ ​he​ ​logged​ ​on​ ​the​ ​night​ ​before.​ ​He​ ​tried​ ​to​ ​log​ ​into​ ​the​ ​mail server​ ​to​ ​figure​ ​out​ ​what​ ​the​ ​problem​ ​might​ ​be,​ ​but​ ​the​ ​server​ ​was​ ​too​ ​overloaded​ ​to​ ​respond. Spafford​ ​got​ ​dressed​ ​and​ ​drove​ ​to​ ​campus​ ​to​ ​investigate​ ​the​ ​problem.​ ​He​ ​discovered​ ​that​ ​"there were​ ​a​ ​lot​ ​of​ ​processes​ ​running​ ​in​ ​the​ ​background​ ​that​ ​shouldn't​ ​have​ ​been​ ​there"​ ​on​ ​the​ ​mail server.​ ​And​ ​he​ ​soon​ ​learned​ ​that​ ​the​ ​same​ ​mysterious​ ​malady​ ​had​ ​struck​ ​machines​ ​not​ ​only across​ ​Purdue's​ ​campus​ ​but​ ​also​ ​across​ ​the​ ​country. The​ ​professor​ ​quickly​ ​assembled​ ​a​ ​team​ ​of​ ​about​ ​eight​ ​people,​ ​who​ ​began​ ​analyzing​ ​the​ ​worm to​ ​figure​ ​out​ ​how​ ​to​ ​stop​ ​it.​ ​By​ ​the​ ​end​ ​of​ ​the​ ​day,​ ​they​ ​had​ ​mostly​ ​finished​ ​dissecting​ ​the

program​ ​to​ ​understand​ ​how​ ​it​ ​worked​ ​and​ ​had​ ​issued​ ​a​ ​recommendation​ ​on​ ​how​ ​to​ ​halt​ ​its spread. Similar​ ​efforts​ ​were​ ​underway​ ​at​ ​other​ ​universities.​ ​Some​ ​of​ ​the​ ​first​ ​people​ ​to​ ​notice​ ​the​ ​attack were​ ​students​ ​at​ ​the​ ​University​ ​of​ ​California,​ ​Berkeley.​ ​Because​ ​they​ ​were​ ​on​ ​the​ ​West​ ​Coast,​ ​it was​ ​early​ ​Wednesday​ ​evening​ ​when​ ​the​ ​worm​ ​began​ ​attacking​ ​their​ ​systems.​ ​A​ ​group​ ​of undergraduates​ ​returned​ ​from​ ​dinner​ ​to​ ​discover​ ​that​ ​an​ ​automated​ ​program​ ​had​ ​been repeatedly​ ​trying​ ​to​ ​log​ ​into​ ​a​ ​Berkeley​ ​computer.​ ​They​ ​alerted​ ​members​ ​of​ ​the​ ​Berkeley​ ​IT​ ​staff, some​ ​of​ ​whom​ ​worked​ ​late​ ​into​ ​the​ ​night​ ​to​ ​diagnose​ ​the​ ​problem. Coincidentally,​ ​the​ ​annual​ ​Berkeley​ ​Unix​ ​Workshop​ ​was​ ​scheduled​ ​to​ ​start​ ​on​ ​Thursday morning.​ ​The​ ​worm​ ​targeted​ ​machines​ ​running​ ​the​ ​Unix​ ​operating​ ​system,​ ​so​ ​some​ ​people skipped​ ​the​ ​formal​ ​conference​ ​proceedings​ ​and​ ​joined​ ​the​ ​worm-analysis​ ​effort.​ ​By​ ​the​ ​end​ ​of the​ ​day​ ​on​ ​Thursday,​ ​the​ ​Berkeley​ ​team​ ​also​ ​understood​ ​the​ ​program​ ​well​ ​enough​ ​to​ ​make recommendations​ ​on​ ​how​ ​to​ ​stop​ ​it. Then​ ​they​ ​ordered​ ​calzones​ ​for​ ​dinner​ ​and​ ​hunkered​ ​down​ ​for​ ​another​ ​all-nighter,​ ​as​ ​they prepared​ ​to​ ​take​ ​the​ ​worm​ ​apart​ ​bit​ ​by​ ​bit.​ ​The​ ​Berkeley​ ​hackers​ ​wanted​ ​to​ ​understand​ ​how​ ​the worm​ ​worked​ ​so​ ​they​ ​could​ ​verify​ ​that​ ​it​ ​hadn't​ ​done​ ​any​ ​permanent​ ​damage​ ​to​ ​the​ ​computers​ ​it had​ ​already​ ​infected​ ​and​ ​that​ ​it​ ​didn't​ ​have​ ​any​ ​more​ ​nasty​ ​surprises​ ​in​ ​store​ ​for​ ​computers​ ​that hadn't​ ​been​ ​cleaned​ ​up​ ​yet.​ ​By​ ​Friday​ ​afternoon,​ ​researchers​ ​had​ ​finished​ ​dissecting​ ​the​ ​worm, and​ ​they​ ​presented​ ​their​ ​findings​ ​at​ ​a​ ​closing​ ​session​ ​of​ ​the​ ​Unix​ ​workshop. Spafford​ ​emerged​ ​as​ ​a​ ​clearinghouse​ ​for​ ​information​ ​flowing​ ​among​ ​his​ ​own​ ​group,​ ​forensic teams​ ​at​ ​Berkeley,​ ​the​ ​Massachusetts​ ​Institute​ ​of​ ​Technology,​ ​the​ ​University​ ​of​ ​Utah​ ​and harried​ ​administrators​ ​across​ ​the​ ​country.​ ​By​ ​the​ ​end​ ​of​ ​the​ ​day,​ ​he​ ​had​ ​created​ ​a​ ​mailing​ ​list dedicated​ ​to​ ​the​ ​worm.​ ​He​ ​was​ ​also​ ​one​ ​of​ ​several​ ​people​ ​to​ ​write​ ​an​ ​in-depth​ ​analysis​ ​of​ ​the worm​ ​in​ ​the​ ​following​ ​weeks. Friday:​ ​"We​ ​don't​ ​have​ ​a​ ​medical​ ​school" The​ ​worm​ ​began​ ​to​ ​attract​ ​intense,​ ​and​ ​predictably​ ​clueless,​ ​media​ ​attention.​ ​For​ ​many reporters,​ ​the​ ​incident​ ​was​ ​the​ ​first​ ​time​ ​they​ ​had​ ​heard​ ​of​ ​either​ ​the​ ​Internet​ ​or​ ​malware. "There​ ​were​ ​some​ ​mainstream​ ​outlets​ ​with​ ​National​ ​Enquirer-type​ ​headlines​ ​of​ ​invasions​ ​of hackers​ ​or​ ​whatever,"​ ​Spafford​ ​says. By​ ​Friday​ ​morning,​ ​there​ ​were​ ​so​ ​many​ ​reporters​ ​calling​ ​MIT​ ​about​ ​the​ ​worm​ ​that​ ​the​ ​school held​ ​a​ ​press​ ​conference.​ ​"The​ ​media​ ​was​ ​uniformly​ ​disappointed​ ​that​ ​the​ ​virus​ ​did​ ​nothing​ ​even remotely​ ​visual,"​ ​recalled​ ​Mark​ ​Eichin​ ​and​ ​Jon​ ​Rochlis,​ ​two​ ​MIT​ ​researchers​ ​who​ ​helped​ ​to dissect​ ​the​ ​worm.​ ​"Several​ ​also​ ​seemed​ ​pained​ ​that​ ​we​ ​weren't​ ​moments​ ​away​ ​from​ ​World​ ​War III." "I​ ​got​ ​one​ ​call​ ​from​ ​a​ ​newspaper​ ​in​ ​Southern​ ​Indiana,"​ ​Spafford​ ​says.​ ​"The​ ​reporter​ ​asked​ ​me, in​ ​all​ ​earnestness,​ ​'Do​ ​our​ ​readers​ ​need​ ​to​ ​worry​ ​about​ ​catching​ ​this​ ​virus?'" "Gosh,​ ​I​ ​don't​ ​know,"​ ​Spafford​ ​deadpanned​ ​in​ ​response.​ ​"We​ ​don't​ ​have​ ​a​ ​medical​ ​school.​ ​You ought​ ​to​ ​call​ ​the​ ​folks​ ​at​ ​Indiana​ ​University." But​ ​the​ ​press​ ​did​ ​fill​ ​in​ ​one​ ​important​ ​piece​ ​of​ ​the​ ​puzzle.​ ​On​ ​Saturday​ ​morning,​ ​the​ ​New​ ​York Times​ ​broke​ ​the​ ​news​ ​that​ ​Robert​ ​Morris​ ​Jr.,​ ​a​ ​23-year-old​ ​computer​ ​science​ ​graduate​ ​student at​ ​Cornell,​ ​had​ ​created​ ​the​ ​worm.

Morris,​ ​reported​ ​Times​ ​reporter​ ​John​ ​Markoff,​ ​was​ ​the​ ​"brilliant"​ ​son​ ​of​ ​Robert​ ​Morris​ ​Sr.,​ ​"one of​ ​the​ ​Government's​ ​most​ ​respected​ ​computer​ ​security​ ​experts."​ ​The​ ​elder​ ​Morris​ ​told​ ​Markoff that​ ​the​ ​worm​ ​was​ ​"the​ ​work​ ​of​ ​a​ ​bored​ ​graduate​ ​student." A​ ​Cornell​ ​report​ ​would​ ​find​ ​that​ ​at​ ​Harvard,​ ​"Morris​ ​was​ ​the​ ​kind​ ​of​ ​student​ ​who​ ​was​ ​bright​ ​but bored​ ​by​ ​routine​ ​homework,​ ​and​ ​often​ ​devoted​ ​his​ ​main​ ​energies​ ​elsewhere.​ ​He​ ​apparently continued​ ​this​ ​pattern​ ​at​ ​Cornell,"​ ​where​ ​he​ ​"seemed​ ​to​ ​prefer​ ​to​ ​work​ ​alone"​ ​and​ ​"spent​ ​many hours​ ​programming​ ​at​ ​the​ ​computer."​ ​His​ ​Cornell​ ​peers​ ​said​ ​Morris​ ​didn't​ ​develop​ ​many​ ​friends in​ ​the​ ​two​ ​months​ ​between​ ​his​ ​arrival​ ​on​ ​campus​ ​and​ ​the​ ​release​ ​of​ ​the​ ​worm.​ ​Of​ ​course,​ ​this combination​ ​of​ ​traits​ ​was​ ​hardly​ ​unusual​ ​among​ ​computer​ ​science​ ​graduate​ ​students.

A​ ​floppy​ ​disk​ ​at​ ​the​ ​Computer​ ​History​ ​Museum​ ​in​ ​Silicon​ ​Valley​ ​contains​ ​a​ ​copy​ ​of​ ​the​ ​Morris Worm's​ ​source​ ​code.​ ​(Photo​ ​by​​ ​Intel​ ​Free​ ​Press​) Anatomy​ ​of​ ​a​ ​worm A​ ​worm​ ​is​ ​a​ ​computer​ ​program​ ​that​ ​spreads​ ​from​ ​computer​ ​to​ ​computer​ ​by​ ​exploiting​ ​security vulnerabilities​ ​in​ ​target​ ​machines.​ ​Once​ ​released,​ ​it​ ​operates​ ​without​ ​human​ ​assistance​ ​or control,​ ​scanning​ ​the​ ​Internet​ ​for​ ​new​ ​hosts​ ​to​ ​infect,​ ​attacking​ ​them​ ​and​ ​then​ ​launching​ ​a​ ​new copy​ ​of​ ​the​ ​software​ ​on​ ​the​ ​new​ ​host.​ ​While​ ​experimental​ ​worms​ ​had​ ​been​ ​developed​ ​in​ ​the past,​ ​Morris's​ ​worm​ ​spread​ ​much​ ​further​ ​and​ ​faster​ ​than​ ​any​ ​previous​ ​worm. Forensic​ ​evidence​ ​would​ ​reveal​ ​that​ ​Morris​ ​started​ ​using​ ​Cornell​ ​computers​ ​to​ ​develop​ ​the worm​ ​around​ ​Oct.​ ​15,​ ​1988.​ ​The​ ​worm​ ​used​ ​several​ ​attacks​ ​to​ ​spread​ ​from​ ​computer​ ​to computer.​ ​One​ ​attack​ ​exploited​ ​a​ ​common​ ​Internet​ ​service​ ​known​ ​as​ ​"finger,"​ ​which​ ​was installed​ ​on​ ​most​ ​Unix​ ​machines.

Another​ ​attack​ ​took​ ​advantage​ ​of​ ​the​ ​fact​ ​that​ ​many​ ​users​ ​chose​ ​easy-to-guess​ ​passwords, such​ ​as​ ​their​ ​username​ ​spelled​ ​backwards​ ​or​ ​a​ ​common​ ​term​ ​from​ ​the​ ​dictionary.​ ​The​ ​worm obtained​ ​a​ ​computer's​ ​password​ ​file,​ ​which​ ​contained​ ​encrypted​ ​copies​ ​of​ ​every​ ​user's password.​ ​It​ ​then​ ​systematically​ ​guessed​ ​passwords​ ​using​ ​a​ ​dictionary​ ​of​ ​common​ ​words.​ ​If​ ​it discovered​ ​a​ ​user's​ ​password,​ ​it​ ​attempted​ ​to​ ​use​ ​that​ ​user's​ ​credentials​ ​to​ ​access​ ​other​ ​servers where​ ​that​ ​same​ ​user​ ​had​ ​an​ ​account. On​ ​Oct.​ ​20,​ ​Morris​ ​made​ ​the​ ​300-mile​ ​trek​ ​to​ ​visit​ ​friends​ ​at​ ​Harvard,​ ​staying​ ​for​ ​two​ ​days.​ ​Upon his​ ​return,​ ​Morris​ ​added​ ​code​ ​to​ ​exploit​ ​a​ ​third​ ​security​ ​vulnerability.​ ​The​ ​code​ ​targeted​ ​a​ ​flaw​ ​in "sendmail,"​ ​a​ ​ubiquitous​ ​utility​ ​that,​ ​as​ ​its​ ​name​ ​suggests,​ ​was​ ​used​ ​to​ ​send​ ​e-mail.​ ​It​ ​seems likely​ ​that​ ​Morris​ ​learned​ ​about​ ​this​ ​vulnerability​ ​during​ ​his​ ​Harvard​ ​trip.​ ​Graham,​ ​the​ ​Harvard friend​ ​Morris​ ​would​ ​call​ ​the​ ​night​ ​he​ ​released​ ​the​ ​worm,​ ​e-mailed​ ​Morris​ ​on​ ​Oct.​ ​26​ ​to​ ​ask,​ ​"any news​ ​on​ ​the​ ​brilliant​ ​project?" An​ ​early​ ​version​ ​of​ ​the​ ​worm​ ​recovered​ ​from​ ​an​ ​automatic​ ​backup​ ​of​ ​Morris's​ ​Cornell​ ​files included​ ​extensive​ ​comments​ ​describing​ ​Morris's​ ​vision​ ​for​ ​the​ ​project.​ ​Those​ ​comments suggest​ ​that​ ​Morris​ ​had​ ​even​ ​more​ ​ambitious​ ​goals​ ​than​ ​he​ ​eventually​ ​achieved.​ ​Morris​ ​didn't just​ ​want​ ​to​ ​create​ ​a​ ​worm​ ​that​ ​would​ ​silently​ ​replicate​ ​itself​ ​across​ ​the​ ​Internet.​ ​He​ ​hoped​ ​to build​ ​what​ ​we​ ​would​ ​now​ ​call​ ​a​ ​botnet:​ ​a​ ​network​ ​of​ ​thousands​ ​of​ ​computers​ ​coordinating​ ​with one​ ​another​ ​and​ ​available​ ​to​ ​carry​ ​out​ ​further​ ​instructions​ ​at​ ​the​ ​direction​ ​of​ ​their​ ​master. The​ ​worm,​ ​he​ ​wrote​ ​in​ ​comments​ ​on​ ​an​ ​early​ ​version​ ​of​ ​the​ ​worm,​ ​will​ ​need​ ​to​ ​"decide​ ​what​ ​to break​ ​into​ ​next"​ ​and​ ​will​ ​need​ ​"methods​ ​of​ ​breaking​ ​into​ ​other​ ​systems."​ ​He​ ​also​ ​wanted​ ​"some way​ ​for​ ​ME​ ​to​ ​send​ ​out​ ​commands,​ ​protected​ ​by​ ​an​ ​encoded​ ​password." Morris​ ​wanted​ ​to​ ​avoid​ ​infecting​ ​the​ ​same​ ​machine​ ​multiple​ ​times,​ ​which​ ​could​ ​slow​ ​infected machines​ ​down​ ​and​ ​draw​ ​unwanted​ ​attention.​ ​But​ ​the​ ​most​ ​obvious​ ​way​ ​to​ ​do​ ​that​ ​—​ ​have​ ​an infected​ ​machine​ ​publicly​ ​signal​ ​its​ ​infected​ ​status​ ​to​ ​other​ ​copies​ ​of​ ​the​ ​worm​ ​—​ ​could​ ​itself​ ​aid efforts​ ​to​ ​detect​ ​and​ ​eradicate​ ​the​ ​worm.​ ​To​ ​solve​ ​this​ ​dilemma,​ ​Morris​ ​thought​ ​he​ ​would​ ​need to​ ​build​ ​a​ ​"global​ ​database"​ ​of​ ​infected​ ​computers.​ ​However,​ ​he​ ​admitted,​ ​doing​ ​that​ ​could prove​ ​"really​ ​hard." By​ ​the​ ​time​ ​he​ ​released​ ​the​ ​worm​ ​two​ ​weeks​ ​later,​ ​he​ ​had​ ​only​ ​made​ ​small​ ​steps​ ​toward implementing​ ​these​ ​ideas.​ ​He​ ​never​ ​created​ ​a​ ​command-and-control​ ​system​ ​that​ ​would​ ​have allowed​ ​him​ ​to​ ​send​ ​instructions​ ​to​ ​infected​ ​machines.​ ​The​ ​worms​ ​did​ ​have​ ​code​ ​designed​ ​to send​ ​a​ ​homing​ ​beacon​ ​to​ ​a​ ​particular​ ​computer​ ​at​ ​Berkeley,​ ​which​ ​could​ ​have​ ​been​ ​part​ ​of​ ​a planned​ ​command-and-control​ ​system.​ ​But,​ ​thanks​ ​to​ ​a​ ​programming​ ​error,​ ​even​ ​that subroutine​ ​didn't​ ​work. Morris​ ​did​ ​implement​ ​a​ ​mechanism​ ​designed​ ​to​ ​prevent​ ​multiple​ ​copies​ ​of​ ​the​ ​worm​ ​from running​ ​on​ ​the​ ​same​ ​computer.​ ​If​ ​two​ ​worms​ ​found​ ​themselves​ ​on​ ​the​ ​same​ ​machine,​ ​they would​ ​flip​ ​a​ ​virtual​ ​coin,​ ​and​ ​then​ ​the​ ​losing​ ​copy​ ​of​ ​the​ ​worm​ ​would​ ​commit​ ​electronic​ ​seppuku. But​ ​Morris​ ​modified​ ​this​ ​scheme​ ​in​ ​a​ ​way​ ​that​ ​made​ ​it​ ​ineffective.​ ​One​ ​time​ ​out​ ​of​ ​seven, selected​ ​at​ ​random,​ ​the​ ​losing​ ​worm​ ​would​ ​make​ ​itself​ ​immortal​ ​rather​ ​than​ ​committing​ ​suicide. "This​ ​was​ ​probably​ ​done​ ​to​ ​defeat​ ​any​ ​attempt​ ​to​ ​put​ ​a​ ​fake​ ​worm​ ​process​ ​on​ ​the​ ​TCP​ ​port​ ​to kill​ ​existing​ ​worms,"​ ​Spafford​ ​wrote​ ​in​ ​his​ ​worm​ ​postmortem.​ ​But​ ​the​ ​move​ ​also​ ​undermined​ ​the original​ ​purpose​ ​of​ ​the​ ​self-destruct​ ​scheme:​ ​preventing​ ​multiple​ ​worms​ ​from​ ​infecting​ ​the​ ​same computer.​ ​As​ ​a​ ​result,​ ​on​ ​the​ ​morning​ ​of​ ​Nov.​ ​3​ ​the​ ​population​ ​of​ ​worms​ ​grew​ ​exponentially​ ​until computers'​ ​resources​ ​were​ ​exhausted​ ​from​ ​running​ ​so​ ​many​ ​copies.

Morris​ ​also​ ​took​ ​numerous​ ​precautions​ ​to​ ​make​ ​it​ ​more​ ​difficult​ ​to​ ​detect​ ​and​ ​remove​ ​copies​ ​of the​ ​worm.​ ​For​ ​example,​ ​as​ ​soon​ ​as​ ​a​ ​worm​ ​infected​ ​a​ ​new​ ​machine,​ ​it​ ​would​ ​encrypt​ ​the​ ​files​ ​it used​ ​to​ ​carry​ ​out​ ​the​ ​infection​ ​and​ ​remove​ ​references​ ​to​ ​them​ ​from​ ​the​ ​file​ ​system.​ ​It​ ​would​ ​also periodically​ ​kill​ ​and​ ​respawn​ ​itself​ ​so​ ​that​ ​it​ ​wouldn't​ ​show​ ​up​ ​in​ ​lists​ ​of​ ​long-running​ ​processes. Morris,​ ​Spafford​ ​concluded,​ ​"may​ ​have​ ​been​ ​a​ ​moderately​ ​experienced​ ​Unix​ ​programmer,​ ​but he​ ​was​ ​by​ ​no​ ​means​ ​the​ ​'Unix​ ​wizard'​ ​many​ ​have​ ​been​ ​claiming."​ ​Creating​ ​the​ ​worm​ ​required considerable​ ​effort,​ ​and​ ​a​ ​non-trivial​ ​amount​ ​of​ ​skill.​ ​Yet​ ​Morris​ ​made​ ​a​ ​number​ ​of​ ​rookie mistakes.​ ​"The​ ​worm​ ​could​ ​have​ ​been​ ​much​ ​more​ ​virulent​ ​had​ ​the​ ​author​ ​been​ ​more experienced​ ​or​ ​less​ ​rushed​ ​in​ ​his​ ​coding,"​ ​Spafford​ ​wrote.

(Photo​ ​by​​ ​Terry​ ​Ross​) The​ ​Internet​ ​loses​ ​its​ ​innocence Morris's​ ​worm​ ​rocked​ ​the​ ​young​ ​Internet,​ ​which​ ​had​ ​fewer​ ​than​ ​100,000​ ​computers​ ​on​ ​it​ ​at​ ​the time.​ ​"It​ ​was​ ​largely​ ​a​ ​North​ ​American​ ​network,"​ ​Spafford​ ​says.​ ​"The​ ​majority​ ​of​ ​people​ ​had some​ ​tie​ ​to​ ​computation​ ​for​ ​their​ ​jobs.​ ​I​ ​wouldn't​ ​say​ ​that​ ​we​ ​trusted​ ​each​ ​other,​ ​but​ ​there​ ​was more​ ​a​ ​community​ ​sense​ ​of​ ​caring​ ​for​ ​the​ ​stability​ ​and​ ​appropriate​ ​use​ ​of​ ​the​ ​computing systems." Network​ ​administrators​ ​in​ ​1988​ ​took​ ​few​ ​precautions​ ​against​ ​online​ ​attacks.​ ​"There​ ​was​ ​no​ ​such thing​ ​as​ ​a​ ​firewall​ ​back​ ​then,"​ ​Spafford​ ​says.​ ​"You​ ​didn't​ ​have​ ​people​ ​who​ ​were​ ​vandals​ ​or anarchists​ ​or​ ​criminals​ ​as​ ​much.​ ​There​ ​were​ ​many​ ​public​ ​servers​ ​because​ ​universities​ ​shared​ ​a lot​ ​of​ ​their​ ​data​ ​and​ ​resources." Shock​ ​over​ ​the​ ​worm​ ​provided​ ​a​ ​boost​ ​to​ ​Spafford's​ ​field​ ​of​ ​computer​ ​security.​ ​Before​ ​the​ ​worm, "I​ ​had​ ​no​ ​funding​ ​agency​ ​or​ ​academic​ ​interest​ ​in​ ​security​ ​mechanisms​ ​or​ ​the​ ​kind​ ​of​ ​things​ ​that​ ​I

was​ ​interested​ ​in​ ​doing,"​ ​Spafford​ ​says.​ ​Afterward,​ ​"work​ ​began​ ​on​ ​a​ ​number​ ​of​ ​different security​ ​programs.​ ​Intrusion​ ​detection​ ​and​ ​malware​ ​detection​ ​both​ ​kind​ ​of​ ​took​ ​off." It​ ​would​ ​be​ ​another​ ​decade​ ​before​ ​the​ ​Internet​ ​was​ ​attacked​ ​by​ ​new​ ​malware​ ​infections​ ​serious enough​ ​to​ ​again​ ​attract​ ​widespread​ ​public​ ​attention.​ ​And​ ​by​ ​then,​ ​the​ ​network​ ​had​ ​changed radically.​ ​It​ ​had​ ​millions​ ​of​ ​users,​ ​rather​ ​than​ ​thousands,​ ​and​ ​the​ ​average​ ​technical sophistication​ ​of​ ​these​ ​users​ ​was​ ​much​ ​lower. Unlike​ ​the​ ​Morris​ ​worm,​ ​the​ ​most​ ​significant​ ​malware​ ​outbreaks​ ​of​ ​the​ ​dot-com​ ​era​ ​--​ ​including "Melissa,"​​ ​"ILOVEYOU"​​ ​and​​ ​"SirCam"​​ ​--​ ​worked​ ​by​ ​tricking​ ​gullible​ ​users​ ​into​ ​clicking​ ​on executable​ ​files​ ​sent​ ​to​ ​them​ ​as​ ​e-mail​ ​attachments.​ ​Once​ ​activated​ ​by​ ​a​ ​user,​ ​these​ ​programs sent​ ​copies​ ​of​ ​themselves​ ​to​ ​people​ ​in​ ​the​ ​victim's​ ​Outlook​ ​address​ ​book. But​ ​starting​ ​in​ ​2001,​ ​the​ ​Internet​ ​saw​ ​a​ ​rash​ ​of​ ​potent​ ​malware​ ​infections​ ​that,​ ​like​ ​Morris's creation​ ​(and​ ​unlike​ ​most​ ​of​ ​the​ ​Outlook-based​ ​malware)​ ​could​ ​spread​ ​from​ ​computer​ ​to computer​ ​without​ ​human​ ​assistance.​ ​The​​ ​Code​ ​Red​​ ​worm​ ​exploited​ ​vulnerabilities​ ​in​ ​Microsoft's IIS​ ​Web​ ​server.​ ​Other​ ​high-profile​ ​worms​ ​included​​ ​Slammer​​ ​and​​ ​Blaster​,​ ​both​ ​of​ ​which appeared​ ​online​ ​in​ ​2003. In​ ​the​ ​last​ ​decade,​ ​malware​ ​authors​ ​have​ ​finally​ ​achieved​ ​something​ ​like​ ​Morris's​ ​original, unrealized​ ​vision​ ​of​ ​using​ ​a​ ​worm​ ​to​ ​create​ ​a​ ​vast​ ​network​ ​of​ ​computers​ ​operating​ ​under​ ​the control​ ​of​ ​the​ ​malware's​ ​author.​ ​Consider​ ​the​​ ​Conficker​​ ​worm,​ ​which​ ​first​ ​appeared​ ​online​ ​in 2008​ ​and​ ​has​ ​infected​ ​millions​ ​of​ ​Windows​ ​computers.​ ​Despite​ ​Microsoft's​ ​best​ ​efforts​ ​to eradicate​ ​it,​ ​the​ ​worm​ ​is​ ​still​ ​active​ ​today,​ ​its​ ​spread​ ​aided​ ​by​ ​the​ ​use​ ​of​ ​old,​ ​pirated​ ​copies​ ​of Windows​ ​in​ ​the​ ​developing​ ​world. Conficker​ ​doesn't​ ​just​ ​mindlessly​ ​copy​ ​itself​ ​across​ ​the​ ​Internet.​ ​Once​ ​it​ ​infects​ ​a​ ​computer,​ ​it opens​ ​a​ ​channel​ ​to​ ​the​ ​worm's​ ​creator​ ​and​ ​awaits​ ​further​ ​instructions.​ ​Such​ ​a​ ​network​ ​of​ ​zombie computers,​ ​known​ ​as​ ​a​ ​"botnet,"​ ​has​ ​become​ ​an​ ​important​ ​part​ ​of​ ​the​ ​Internet's​ ​underground economy.​ ​Today,​ ​there​ ​are​ ​many​ ​such​ ​botnets​ ​available​ ​for​ ​rental.​ ​Unscrupulous​ ​individuals use​ ​them​ ​to​ ​send​ ​spam​ ​e-mail​ ​messages,​ ​overwhelm​ ​Web​ ​sites​ ​with​ ​traffic,​ ​or​ ​perform​ ​other nefarious​ ​tasks. Morris​ ​stands​ ​trial As​ ​far​ ​as​ ​we​ ​can​ ​tell,​ ​Morris​ ​has​ ​never​ ​spoken​ ​to​ ​the​ ​press​ ​about​ ​the​ ​incident​ ​that​ ​made​ ​him famous.​ ​True​ ​to​ ​form,​ ​he​ ​didn't​ ​respond​ ​to​ ​our​ ​requests​ ​for​ ​an​ ​interview.​ ​But​ ​there's​ ​a​ ​broad consensus​ ​that​ ​that​ ​he​ ​didn't​ ​have​ ​the​ ​kind​ ​of​ ​malicious​ ​intentions​ ​that​ ​many​ ​modern​ ​worm authors​ ​do.​ ​His​ ​primary​ ​motive​ ​appears​ ​to​ ​have​ ​been​ ​intellectual​ ​curiosity,​ ​not​ ​a​ ​desire​ ​for​ ​profit or​ ​destruction.​ ​Morris​ ​could​ ​have​ ​had​ ​his​ ​worm​ ​destroy​ ​files​ ​or​ ​steal​ ​secrets​ ​on​ ​the​ ​machines​ ​it infected,​ ​but​ ​it​ ​did​ ​nothing​ ​of​ ​the​ ​sort. But​ ​this​ ​apparent​ ​lack​ ​of​ ​ill​ ​intent​ ​didn't​ ​save​ ​Morris​ ​from​ ​prosecution​ ​under​ ​the​ ​Computer​ ​Fraud and​ ​Abuse​ ​Act,​ ​which​ ​Congress​ ​passed​ ​in​ ​1986.​ ​ ​The​ ​attorney​ ​who​ ​prosecuted​ ​the​ ​case,​ ​Mark Rasch,​ ​says​ ​he​ ​and​ ​his​ ​colleagues​ ​at​ ​the​ ​Department​ ​of​ ​Justice​ ​carefully​ ​considered​ ​whether​ ​to charge​ ​Morris​ ​with​ ​a​ ​felony​ ​or​ ​a​ ​misdemeanor. "We​ ​didn't​ ​believe​ ​that​ ​Morris​ ​intended​ ​to​ ​cause​ ​harm​ ​or​ ​damage,"​ ​Rasch​ ​says.​ ​In​ ​his​ ​view, Morris​ ​was​ ​"motivated​ ​mainly​ ​by​ ​curiosity​ ​and​ ​by​ ​a​ ​desire​ ​to​ ​show​ ​that​ ​he​ ​could​ ​do​ ​it." On​ ​the​ ​other​ ​hand,​ ​the​ ​Justice​ ​Department​ ​worried​ ​that​ ​"if​ ​the​ ​government​ ​treated​ ​this​ ​as​ ​a misdemeanor,​ ​a​ ​trivial​ ​offense,​ ​that​ ​others​ ​would​ ​go​ ​out​ ​and​ ​do​ ​it,"​ ​Rasch​ ​said.​ ​"You​ ​had conduct​ ​that​ ​was​ ​planned,​ ​premeditated,​ ​that​ ​was​ ​deliberate,​ ​over​ ​periods​ ​of​ ​months,​ ​that

caused​ ​massive​ ​disruption​ ​and​ ​expense​ ​to​ ​a​ ​wide​ ​number​ ​of​ ​different​ ​individuals."​ ​That​ ​required a​ ​response,​ ​the​ ​government​ ​believed. So​ ​Morris​ ​was​ ​charged​ ​with​ ​a​ ​single​ ​felony​ ​count.​ ​Rasch​ ​says​ ​Morris​ ​could​ ​have​ ​been​ ​charged with​ ​a​ ​separate​ ​felony​ ​for​ ​each​ ​of​ ​the​ ​thousands​ ​of​ ​computers​ ​the​ ​worm​ ​infected.​ ​But​ ​the​ ​lawyer and​ ​his​ ​colleagues​ ​believed​ ​that​ ​would​ ​be​ ​overkill.​ ​"I​ ​don't​ ​believe​ ​that​ ​you​ ​over-prosecute someone​ ​to​ ​send​ ​a​ ​message,"​ ​Rasch​ ​says.​ ​"I​ ​don't​ ​believe​ ​in​ ​the​ ​head-on-a-stake​ ​theory​ ​of prosecution." But​ ​others​ ​viewed​ ​even​ ​a​ ​single​ ​felony​ ​count​ ​as​ ​excessive.​ ​Spafford,​ ​for​ ​example,​ ​believes​ ​that Morris's​ ​actions​ ​warranted​ ​some​ ​punishment,​ ​but​ ​he​ ​says​ ​"the​ ​felony​ ​prosecution​ ​was​ ​probably too​ ​extreme." There​ ​was​ ​plenty​ ​of​ ​evidence​ ​that​ ​Morris​ ​had​ ​created​ ​the​ ​worm.​ ​Backup​ ​tapes​ ​at​ ​Cornell showed​ ​that​ ​someone​ ​had​ ​used​ ​Morris's​ ​account​ ​to​ ​develop​ ​the​ ​worm​ ​in​ ​the​ ​weeks​ ​before​ ​it was​ ​released.​ ​And​ ​Rasch​ ​says​ ​he​ ​called​ ​both​ ​Sudduth​ ​and​ ​Graham​ ​to​ ​testify​ ​against​ ​their friend. Morris​ ​didn't​ ​try​ ​to​ ​deny​ ​being​ ​the​ ​worm's​ ​author.​ ​"He​ ​came​ ​in​ ​and​ ​testified:​ ​'I​ ​did​ ​it,​ ​and​ ​I'm sorry,'"​ ​Rasch​ ​says.​ ​When​ ​it​ ​came​ ​time​ ​for​ ​the​ ​government​ ​to​ ​cross-examine​ ​Morris,​ ​Rasch turned​ ​to​ ​one​ ​of​ ​his​ ​colleagues​ ​and​ ​quipped,​ ​"Should​ ​I​ ​prove​ ​he​ ​didn't​ ​do​ ​it​ ​or​ ​he's​ ​not​ ​sorry?" In​ ​1990,​ ​Morris​ ​was​ ​convicted​ ​by​ ​a​ ​jury.​ ​Sentencing​ ​guidelines​ ​recommended​ ​15​ ​to​ ​21​ ​months in​ ​prison.​ ​Instead,​ ​Judge​ ​Howard​ ​Munson​​ ​sentenced​ ​Morris​​ ​to​ ​serve​ ​three​ ​years​ ​of​ ​probation,​ ​to do​ ​400​ ​hours​ ​of​ ​community​ ​service​ ​and​ ​to​ ​pay​ ​a​ ​$10,000​ ​fine. Morris's​ ​lawyers​ ​tried​ ​to​ ​convince​ ​the​ ​courts​ ​that​ ​Morris's​ ​conduct​ ​didn't​ ​fall​ ​within​ ​the​ ​definition of​ ​the​ ​crime​ ​he​ ​was​ ​charged​ ​with.​ ​The​ ​CFAA​ ​made​ ​it​ ​a​ ​felony​ ​to​ ​intentionally​ ​gain​ ​unauthorized access​ ​to​ ​a​ ​"federal​ ​interest​ ​computer"​ ​and​ ​to​ ​cause​ ​damage​ ​as​ ​a​ ​result.​ ​Morris's​ ​legal​ ​team argued​ ​that​ ​the​ ​statute​ ​required​ ​the​ ​government​ ​to​ ​prove​ ​that​ ​both​ ​the​ ​access​ ​and​ ​the​ ​damage were​ ​intentional.​ ​The​ ​judge​ ​rejected​ ​that​ ​argument,​ ​holding​ ​that​ ​the​ ​government​ ​needed​ ​only​ ​to show​ ​that​ ​Morris​ ​intended​ ​to​ ​gain​ ​unauthorized​ ​access,​ ​not​ ​that​ ​he​ ​intended​ ​to​ ​cause​ ​harm. Morris's​ ​arguments​ ​were​​ ​rejected​ ​by​ ​an​ ​appeals​ ​court​​ ​in​ ​1991.

Paul​ ​Graham​ ​(Photo​ ​by​​ ​Gabor​ ​Cselle​) Pardon​ ​Robert​ ​Morris? By​ ​all​ ​accounts,​ ​Robert​ ​Morris​ ​has​ ​conducted​ ​himself​ ​admirably​ ​in​ ​the​ ​quarter-century​ ​since​ ​he created​ ​the​ ​worm.​ ​In​ ​1995,​ ​Morris​ ​joined​ ​his​ ​friend​ ​Paul​ ​Graham​ ​as​ ​a​ ​co-founder​ ​of​ ​Viaweb,​ ​one of​ ​the​ ​first​ ​e-commerce​ ​startups.​ ​According​ ​to​ ​Graham,​ ​Morris​ ​"was​​ ​so​ ​publicity​ ​averse​​ ​after​ ​the Worm​ ​that​ ​he​ ​didn't​ ​want​ ​his​ ​name​ ​on"​ ​Viaweb's​ ​site,​ ​so​ ​he​ ​was​ ​listed​ ​under​ ​the​ ​pseudonym "John​ ​McArtyem."​ ​Viaweb​ ​was​​ ​sold​ ​to​ ​Yahoo​​ ​for​ ​$49​ ​million​ ​in​ ​1998. Morris​ ​then​ ​returned​ ​to​ ​graduate​ ​school,​ ​earning​ ​a​ ​doctorate​ ​from​ ​Harvard​ ​in​ ​1999.​ ​He​ ​joined the​ ​faculty​ ​of​ ​MIT,​ ​conducting​ ​research​ ​on​ ​computer​ ​networks​ ​and​ ​getting​ ​tenure​ ​in​ ​2006.​ ​In 2005,​ ​Graham​ ​and​ ​Morris​ ​teamed​ ​up​ ​to​ ​found​ ​Y​ ​Combinator,​ ​a​ ​"startup​ ​accelerator"​ ​that​ ​has become​ ​legendary​ ​in​ ​Silicon​ ​Valley. Morris​ ​has​ ​"never​ ​tried​ ​to​ ​gain​ ​any​ ​notoriety​ ​or​ ​credit"​ ​for​ ​his​ ​work​ ​on​ ​the​ ​worm,​ ​Spafford​ ​says. "He​ ​has​ ​not​ ​tried​ ​to​ ​make​ ​any​ ​money​ ​or​ ​work​ ​in​ ​this​ ​area.​ ​His​ ​behavior​ ​has​ ​been​ ​consistent​ ​in supporting​ ​his​ ​defense:​ ​that​ ​it​ ​was​ ​an​ ​accident​ ​and​ ​he​ ​felt​ ​badly​ ​about​ ​it.​ ​I​ ​think​ ​it's​ ​very​ ​much​ ​to his​ ​credit​ ​that​ ​that​ ​has​ ​been​ ​his​ ​behavior​ ​ever​ ​since." Rasch​ ​agrees.​ ​"I​ ​would​ ​not​ ​object​ ​if​ ​Robert​ ​Morris​ ​was​ ​granted​ ​a​ ​pardon,"​ ​he​ ​says.​ ​"I​ ​would represent​ ​him​ ​if​ ​he​ ​wanted.​ ​He​ ​was​ ​not​ ​a​ ​bad​ ​person.​ ​I​ ​don't​ ​see​ ​any​ ​reason​ ​he​ ​should​ ​have​ ​to wear​ ​this​ ​as​ ​a​ ​mark​ ​of​ ​shame​ ​for​ ​the​ ​rest​ ​of​ ​his​ ​life." 32

Comments ● ​ ​Share​ ​on​ ​FacebookShare ● ​ ​ ​Share​ ​on​ ​TwitterTweet ● Share​ ​via​ ​Email The​ ​Post​ ​Recommends

Here’s​ ​what​ ​you​ ​need​ ​to​ ​know​ ​about​ ​the​ ​diversity​ ​visa​ ​lottery​ ​program

President​ ​Trump,​ ​others,​ ​call​ ​for​ ​an​ ​end​ ​to​ ​the​ ​27-year-old​ ​visa​ ​program​ ​that​ ​brought​ ​Sayfullo Saipov​ ​to​ ​the​ ​United​ ​States. 6​ ​hours​ ​ago

‘I’m​ ​the​ ​victim​ ​here’:​ ​Corey​ ​Feldman​ ​defends​ ​himself​ ​in​ ​contentious​ ​‘Today’​ ​interviews

The​ ​1980s​ ​child​ ​star​ ​discussed​ ​his​ ​campaign​ ​to​ ​raise​ ​$10​ ​million​ ​to​ ​reveal​ ​the​ ​names​ ​of​ ​alleged Hollywood​ ​pedophiles. 2​ ​days​ ​ago

JFK’s​ ​last​ ​birthday:​ ​Gifts,​ ​champagne​ ​and​ ​wandering​ ​hands​ ​on​ ​the​ ​presidential​ ​yacht

The​ ​party​ ​aboard​ ​the​ ​Sequoia​ ​included​ ​dinner,​ ​dancing​ ​and​ ​the​ ​president's​ ​pursuit​ ​of​ ​a legendary​ ​Washington​ ​journalist's​ ​wife. May​ ​26

PAID​ ​PROMOTED​ ​STORIES

● What​ ​Causes​ ​Psoriatic​ ​Arthritis?​ ​Yahoo!​ ​Search

● Here's​ ​What​ ​Dental​ ​Implants​ ​Should​ ​Cost​ ​In​ ​Los​ ​Angeles​ ​Dental​ ​Implants​ ​In​ ​Sponsored Ads

● Los​ ​Angeles,​ ​California:​ ​This​ ​Brilliant,​ ​New​ ​Company​ ​Is​ ​Disrupting​ ​a​ ​$200​ ​Billion Industry​ ​EverQuote

● Celebrity​ ​Halloween​ ​Costumes​ ​That​ ​Might​ ​Even​ ​Be​ ​a​ ​Little​ ​Too​ ​Striking​ ​TVGuide.com

● The​ ​Most​ ​Important​ ​Map​ ​of​ ​America​ ​You​ ​Will​ ​Ever​ ​See​ ​(See​ ​Map)​ ​Banyan​ ​Hill Publishing

● PhD​ ​Millionaire​ ​Warns:​ ​"Get​ ​Out​ ​Of​ ​Cash​ ​Now"​ ​The​ ​Crux Recommended​ ​by Discussion​ ​Policy 32​ ​Comments The​ ​comment​ ​section​ ​on​ ​this​ ​story​ ​is​ ​now​ ​closed.​ ​All​ ​comment​ ​sections​ ​close​ ​after​ ​14​ ​days. For​ ​more​ ​on​ ​how​ ​we​ ​manage​ ​comments​ ​and​ ​other​ ​feedback,​ ​please​ ​see​ ​our​​ ​discussion​ ​and submission​ ​guidelines ● All​ ​Comments ○ Newest​ ​First ● Pause​ ​live​ ​updates truthoutandunder 11/5/2013​ ​12:50​ ​PM​ ​PST You​ ​didn't​ ​even​ ​bother​ ​to​ ​mentioned​ ​that​ ​he​ ​was​ ​the​ ​son​ ​of​ ​the​ ​then​ ​director​ ​of​ ​the​ ​NSA?​ ​How does​ ​that​ ​slip​ ​by​ ​you?​ ​You​ ​clearly​ ​haven't​ ​done​ ​your​ ​research,​ ​or​ ​you're​ ​continuing​ ​to​ ​keep​ ​mum about​ ​the​ ​sealed​ ​testimony​ ​in​ ​this​ ​case.​ ​There​ ​was​ ​no​ ​justice​ ​served​ ​then,​ ​and​ ​I​ ​doubt​ ​a​ ​pardon would​ ​matter​ ​now.​ ​Is​ ​his​ ​coddled​ ​existence​ ​of​ ​being​ ​VC​ ​funder​ ​not​ ​good​ ​enough​ ​for​ ​him​ ​now​ ​for some​ ​reason?​ ​Get​ ​a​ ​real​ ​career,​ ​you​ ​are​ ​not​ ​a​ ​real​ ​journalist. LikeShare Robert​ ​Eckman 11/7/2013​ ​11:12​ ​AM​ ​PST What​ ​does​ ​his​ ​father​ ​being​ ​director​ ​of​ ​the​ ​NSA​ ​have​ ​to​ ​do​ ​with​ ​the​ ​story?​ ​Sure,​ ​considering​ ​our current​ ​NSA​ ​scandals,​ ​it's​ ​ironic,​ ​but​ ​that's​ ​not​ ​relevant​ ​to​ ​the​ ​story.​ ​This​ ​isn't​ ​a​ ​story​ ​about​ ​the

NSA​ ​snooping​ ​or​ ​hacking​ ​in​ ​1988;​ ​this​ ​is​ ​a​ ​story​ ​about​ ​an​ ​individual​ ​who​ ​worked​ ​on​ ​a​ ​self created​ ​project​ ​that​ ​blew​ ​up​ ​in​ ​his​ ​face​ ​and​ ​changed​ ​how​ ​we​ ​view​ ​computer​ ​security.​ ​You​ ​imply that​ ​there​ ​was​ ​more​ ​going​ ​on​ ​in​ ​this​ ​case,​ ​that​ ​the​ ​NSA​ ​must​ ​have​ ​something​ ​to​ ​do​ ​with​ ​it,​ ​but​ ​if that​ ​testimony​ ​is​ ​sealed,​ ​then​ ​it's​ ​not​ ​available. I​ ​think​ ​Tim​ ​Lee​ ​did​ ​a​ ​great​ ​job​ ​on​ ​this.​ ​I​ ​studied​ ​this​ ​incident​ ​a​ ​long​ ​time​ ​ago,​ ​and​ ​I​ ​think​ ​this​ ​was researched​ ​well,​ ​I​ ​am​ ​impressed​ ​that​ ​he​ ​reached​ ​out​ ​and​ ​interviewed​ ​individuals​ ​that​ ​were willing​ ​to​ ​contribute.​ ​Unless​ ​you​ ​have​ ​some​ ​real​ ​facts​ ​to​ ​present​ ​(and​ ​not​ ​just​ ​unfounded accusations​ ​or​ ​unsubstantiated​ ​paranoia​ ​rants),​ ​then​ ​I​ ​would​ ​shy​ ​away​ ​from​ ​attacking​ ​a reputable​ ​writer.​ ​This​ ​is​ ​a​ ​forum​ ​for​ ​discussion,​ ​not​ ​for​ ​bullying. Like 2 computeruser 11/3/2013​ ​8:33​ ​AM​ ​PST Christmas​ ​Tree​ ​EXEC​ ​was​ ​the​ ​first​ ​widely​ ​disruptive​ ​computer​ ​worm,​ ​which​ ​paralysed​ ​several international​ ​computer​ ​networks​ ​in​ ​December​ ​1987.​ ​Morris​ ​seems​ ​to​ ​be​ ​the​ ​first​ ​person​ ​to​ ​be caught. LikeShare 2 IndianaGreen 11/2/2013​ ​8:14​ ​AM​ ​PDT A​ ​key​ ​question​ ​we​ ​must​ ​always​ ​ask​ ​ourselves​ ​is​ ​not​ ​whether​ ​we​ ​can​ ​do​ ​something,​ ​but​ ​whether we​ ​should.​ ​Robert​ ​Morris​ ​was​ ​motivated​ ​by​ ​the​ ​same​ ​intellectual​ ​curiosity​ ​our​ ​atomic​ ​scientists at​ ​Los​ ​Alamos​ ​had.​ ​Whether​ ​it​ ​was​ ​a​ ​computer​ ​worm​ ​or​ ​an​ ​atomic​ ​bomb,​ ​it​ ​wasn't​ ​so​ ​much​ ​if​ ​it was​ ​possible​ ​to​ ​create​ ​such​ ​a​ ​thing,​ ​but​ ​whether​ ​they​ ​should​ ​create​ ​it.​ ​Scientists​ ​currently working​ ​on​ ​autonomous​ ​killer​ ​robots​ ​should​ ​ask​ ​themselves​ ​the​ ​same​ ​question. LikeShare 1 stevelaudig 11/1/2013​ ​5:39​ ​PM​ ​PDT "On​ ​the​ ​other​ ​hand,​ ​the​ ​Justice​ ​Department​ ​worried​ ​that​ ​"if​ ​the​ ​government​ ​treated​ ​this​ ​as​ ​a misdemeanor,​ ​a​ ​trivial​ ​offense,​ ​that​ ​others​ ​would​ ​go​ ​out​ ​and​ ​do​ ​it,"​ ​Rasch​ ​said.​ ​"You​ ​had conduct​ ​that​ ​was​ ​planned,​ ​premeditated,​ ​that​ ​was​ ​deliberate,​ ​over​ ​periods​ ​of​ ​months,​ ​that caused​ ​massive​ ​disruption​ ​and​ ​expense​ ​to​ ​a​ ​wide​ ​number​ ​of​ ​different​ ​individuals."​ ​That​ ​required a​ ​response,​ ​the​ ​government​ ​believed." Unethical​ ​to​ ​consider​ ​any​ ​matters​ ​outside​ ​the​ ​conduct​ ​to​ ​charge​ ​the​ ​conduct.​ ​The​ ​government officials​ ​involved​ ​knew​ ​and​ ​believed​ ​it​ ​was​ ​an​ ​accident​ ​and​ ​for​ ​other​ ​reasons​ ​connected​ ​with "governing"​ ​not​ ​justice​ ​made​ ​it​ ​a​ ​felony.​ ​Deeply​ ​offensive,​ ​yet​ ​typical.​ ​And​ ​all​ ​the​ ​while​ ​the​ ​same government​ ​did/does/will​ ​do​ ​nothing​ ​against​ ​large​ ​institutions,​ ​calling​ ​it​ ​the​ ​"Department​ ​of Justice"​ ​is​ ​false​ ​labelling. LikeShare 1

-C4PIO11/1/2013​ ​4:52​ ​PM​ ​PDT Good​ ​article,​ ​but​ ​no​ ​need​ ​for​ ​a​ ​pardon.​ ​He​ ​knew​ ​what​ ​he​ ​was​ ​doing​ ​when​ ​he​ ​opened​ ​Pandora's Box. LikeShare 2 truthoutandunder 11/5/2013​ ​12:52​ ​PM​ ​PST His​ ​father​ ​was​ ​the​ ​head​ ​of​ ​the​ ​NSA​ ​at​ ​the​ ​time,​ ​this​ ​whole​ ​thing​ ​could​ ​have​ ​been​ ​a​ ​false​ ​flag operation.​ ​But​ ​we'll​ ​never​ ​know.​ ​Particularly​ ​not​ ​with​ ​drivel​ ​like​ ​this​ ​being​ ​shoveled​ ​down purportedly​ ​reputable​ ​news​ ​sources.​ ​Educate​ ​yourself,​ ​this​ ​author​ ​isn't​ ​going​ ​to​ ​do​ ​it​ ​for​ ​you,​ ​but perhaps​ ​real​ ​old​ ​hackers​ ​may:​​ ​http://cm.bell-labs.com/who/dmr/crypt.html Like SoFedUp14 11/1/2013​ ​2:48​ ​PM​ ​PDT Great​ ​article. LikeShare 2 abrooklynite 11/1/2013​ ​2:04​ ​PM​ ​PDT White​ ​college​ ​kid​ ​causes,​ ​untold​ ​economic​ ​damage,​ ​a​ ​short​ ​prison​ ​sentence​ ​is​ ​still​ ​too​ ​much, give​ ​him​ ​community​ ​service​ ​and​ ​probation.​ ​'Oh​ ​he​ ​was​ ​young​ ​and​ ​didn't​ ​know​ ​any​ ​better,​ ​he was​ ​just​ ​experimenting.' Black​ ​kid​ ​with​ ​a​ ​bag​ ​of​ ​weed,​ ​"lock​ ​him​ ​up!"​ ​On​ ​his​ ​permanent​ ​record​ ​forever. Don't​ ​pardon​ ​him. LikeShare 3 Soudesuka 11/1/2013​ ​2:20​ ​PM​ ​PDT "White​ ​college​ ​kid​ ​causes,​ ​untold​ ​economic​ ​damage,​ ​a​ ​short​ ​prison​ ​sentence​ ​is​ ​still​ ​too​ ​much, give​ ​him​ ​community​ ​service​ ​and​ ​probation.​ ​'Oh​ ​he​ ​was​ ​young​ ​and​ ​didn't​ ​know​ ​any​ ​better,​ ​he was​ ​just​ ​experimenting.' Black​ ​kid​ ​with​ ​a​ ​bag​ ​of​ ​weed,​ ​"lock​ ​him​ ​up!"​ ​On​ ​his​ ​permanent​ ​record​ ​forever." So​ ​one​ ​overzealous​ ​prosecution​ ​shouldn't​ ​be​ ​overturned​ ​because​ ​overzealous​ ​prosecutions happen​ ​elsewhere? Like 1 SoFedUp14 11/1/2013​ ​2:48​ ​PM​ ​PDT

White​ ​banker​ ​causes​ ​untold​ ​economic​ ​damage,​ ​let's​ ​give​ ​him​ ​a​ ​bonus. Like 7 The​ ​Mystery​ ​Machine 11/3/2013​ ​2:59​ ​PM​ ​PST He​ ​also​ ​initiated​ ​a​ ​programming​ ​movement​ ​that​ ​prevented​ ​an​ ​untold​ ​amount​ ​of​ ​economic damage.​ ​Sure​ ​his​ ​method​ ​wasn't​ ​the​ ​correct​ ​way,​ ​but​ ​it​ ​showed​ ​how​ ​damaging​ ​insecure​ ​code can​ ​be. Like 2 View​ ​More​ ​Replies Coach_1 11/1/2013​ ​1:47​ ​PM​ ​PDT My​ ​firewall​ ​reports​ ​that​ ​I​ ​get​ ​about​ ​100,000​ ​unauthorized​ ​attempts​ ​per​ ​week​ ​to​ ​access​ ​my computer​ ​and​ ​it​ ​is​ ​turned​ ​off​ ​all​ ​night.​ ​When​ ​I​ ​turn​ ​on​ ​my​ ​computer​ ​it​ ​is​ ​basically​ ​useless​ ​for about​ ​10​ ​minutes​ ​while​ ​it​ ​goes​ ​through​ ​a​ ​bunch​ ​of​ ​code​ ​to​ ​protect​ ​me​ ​from​ ​malware.​ ​I​ ​have​ ​the latest​ ​version​ ​of​ ​Adobe​ ​Reader​ ​on​ ​my​ ​computer​ ​as​ ​I​ ​expect​ ​every​ ​other​ ​Windows​ ​based computer​ ​in​ ​the​ ​world​ ​has​ ​and​ ​at​ ​least​ ​once​ ​a​ ​day​ ​I​ ​get​ ​a​ ​request​ ​to​ ​update​ ​the​ ​Adobe​ ​Reader. Obviously​ ​some​ ​malware​ ​is​ ​attempting​ ​to​ ​piggy-back​ ​onto​ ​a​ ​non-Adobe​ ​version​ ​of​ ​the​ ​software in​ ​order​ ​to​ ​take​ ​over​ ​my​ ​computer. What​ ​a​ ​mess​ ​we've​ ​created. LikeShare SoloOwl 11/1/2013​ ​5:33​ ​PM​ ​PDT I​ ​don't​ ​have​ ​Adobe​ ​Reader​ ​nor​ ​do​ ​I​ ​install​ ​it​ ​on​ ​anybody​ ​else's​ ​machine​ ​(unless​ ​they​ ​have severe​ ​vision​ ​problems​ ​--​ ​Adobe​ ​has​ ​good​ ​assistive​ ​tech).​ ​Try​ ​Foxit​ ​Reader​ ​instead.​ ​It​ ​has​ ​a smaller​ ​footprint,​ ​and​ ​needs​ ​fewer​ ​updates.​ ​It​ ​works​ ​nicely. If​ ​it​ ​is​ ​really​ ​true​ ​that​ ​any​ ​piece​ ​of​ ​software​ ​updates​ ​itself​ ​daily,​ ​either​ ​you​ ​missed​ ​a​ ​crucial update​ ​(or​ ​an​ ​update​ ​was​ ​not​ ​properly​ ​recorded​ ​in​ ​the​ ​software's​ ​data)​ ​or​ ​you​ ​are​ ​indeed infected.​ ​I​ ​would​ ​uninstall​ ​the​ ​software,​ ​including​ ​all​ ​preferences,​ ​and​ ​clean​ ​the​ ​Registry.​ ​Wait two​ ​weeks​ ​or​ ​so.​ ​If​ ​it​ ​still​ ​wants​ ​to​ ​update​ ​itself,​ ​you​ ​are​ ​almost​ ​certainly​ ​infected.​ ​Save​ ​all​ ​your emails,​ ​bookmarks,​ ​music,​ ​videos,​ ​photos,​ ​and​ ​other​ ​documents​ ​to​ ​an​ ​external​ ​drive.​ ​Reinstall Windows,​ ​making​ ​sure​ ​to​ ​delete​ ​all​ ​partitions​ ​and​ ​re-create​ ​them​ ​when​ ​Windows​ ​Setup​ ​asks. Reinstall​ ​your​ ​software;​ ​use​ ​filehippo.com​ ​as​ ​a​ ​safe​ ​source.​ ​Copy​ ​back​ ​your​ ​documents​ ​as needed​ ​or​ ​all​ ​at​ ​once. "What​ ​a​ ​mess​ ​we​ ​created."​ ​How​ ​true.​ ​If​ ​you​ ​had​ ​to​ ​deal​ ​with​ ​customers​ ​who​ ​return​ ​their​ ​infected computers​ ​for​ ​repairs,​ ​you​ ​would​ ​feel​ ​the​ ​pain. Like Richard88 11/1/2013​ ​1:45​ ​PM​ ​PDT

Notice​ ​this:​ ​pseudonym​ ​"John​ ​McArtyem." If​ ​you​ ​pronounce​ ​"Artyem"​ ​it​ ​turns​ ​out​ ​to​ ​be​ ​Ar-Ty-em​ ​=​ ​RTM​ ​=​ ​Robert​ ​T.​ ​Morris.​ ​Clever. LikeShare 5 InfoSecGeek 11/4/2013​ ​1:56​ ​PM​ ​PST RTM​ ​is​ ​actually​ ​an​ ​accepted​ ​acronym​ ​as​ ​well​ ​as​ ​his​ ​initials.​ ​Although​ ​it​ ​is​ ​more​ ​commonly expressed​ ​using​ ​the​ ​variant​ ​RTFM.​ ​Read​ ​the​ ​manual. Like 1 USAconcerned 11/1/2013​ ​12:25​ ​PM​ ​PDT Beware​ ​of​ ​downloading​ ​programs​ ​such​ ​as​ ​Windows​ ​Explorer,​ ​there​ ​are​ ​sites​ ​in​ ​India masquerading​ ​as​ ​this​ ​and​ ​other​ ​downloads...I​ ​know​ ​from​ ​recent​ ​nightmare​ ​experience​ ​with​ ​off site​ ​advertising​ ​taking​ ​over​ ​Windows​ ​explorer​ ​9​ ​that​ ​I​ ​had​ ​downloaded,​ ​it​ ​was​ ​not​ ​from Microsoft...no​ ​one​ ​could​ ​get​ ​rid​ ​of​ ​it,​ ​not​ ​Microsoft,​ ​Norton​ ​or​ ​Geek​ ​squad​ ​techs...the​ ​program​ ​is still​ ​somewhere​ ​in​ ​my​ ​computer..​ ​I​ ​use​ ​Google...even​ ​downloaded​ ​Explorer​ ​10...and​ ​get​ ​this​ ​my wife​ ​got​ ​a​ ​call​ ​asking​ ​her​ ​if​ ​I​ ​was​ ​still​ ​having​ ​problems​ ​with​ ​Windows​ ​and​ ​why​ ​I​ ​was​ ​not​ ​using it...caller​ ​had​ ​a​ ​thick​ ​Indian​ ​accent,.also​ ​Norton​ ​and​ ​other​ ​anti​ ​virus​ ​and​ ​malwear​ ​protection programs​ ​that​ ​come​ ​with​ ​new​ ​computers​ ​are​ ​in​ ​my​ ​opinion​ ​virus​ ​and​ ​malewear​ ​themselves​ ​and cannot​ ​be​ ​gotten​ ​rid​ ​of... LikeShare Soudesuka 11/1/2013​ ​2:32​ ​PM​ ​PDT "Beware​ ​of​ ​downloading​ ​programs​ ​such​ ​as​ ​Windows​ ​Explorer" You​ ​should​ ​never​ ​download​ ​Windows​ ​Explorer,​ ​since​ ​it's​ ​installed​ ​by​ ​default​ ​on​ ​your​ ​computer.​ ​I think​ ​you're​ ​talking​ ​about​ ​Internet​ ​Explorer?​ ​If​ ​so,​ ​the​ ​only​ ​way​ ​that​ ​updates​ ​is​ ​through​ ​Windows Update,​ ​so​ ​yeah,​ ​don't​ ​ever​ ​download​ ​that​ ​either. "no​ ​one​ ​could​ ​get​ ​rid​ ​of​ ​it,​ ​not​ ​Microsoft,​ ​Norton​ ​or​ ​Geek​ ​squad​ ​techs...the​ ​program​ ​is​ ​still somewhere​ ​in​ ​my​ ​computer" NO​ ​NO​ ​NO.​ ​You​ ​need​ ​to​ ​FORMAT​ ​AND​ ​REINSTALL​ ​your​ ​machine,​ ​it's​ ​the​ ​only​ ​way​ ​to​ ​be​ ​sure. Back​ ​up​ ​your​ ​personal​ ​data​ ​(not​ ​applications,​ ​just​ ​documents​ ​and​ ​photos​ ​and​ ​such),​ ​then reinstall​ ​Windows​ ​from​ ​scratch. Like 1 Soudesuka 11/4/2013​ ​7:13​ ​AM​ ​PST "When​ ​you​ ​first​ ​activate​ ​Windows​ ​you​ ​are​ ​directed​ ​to​ ​a​ ​site​ ​where​ ​you​ ​choose​ ​your​ ​own browser.​ ​It​ ​would​ ​not​ ​surprise​ ​me​ ​if​ ​the​ ​bad​ ​guys​ ​spoofed​ ​that​ ​site.​ ​"

It​ ​would​ ​surprise​ ​me​ ​very​ ​much,​ ​because​ ​the​ ​bad​ ​guys​ ​would​ ​have​ ​to​ ​compromise​ ​either​ ​the default​ ​OEM​ ​Windows​ ​install​ ​image​ ​or​ ​the​ ​Internet's​ ​DNS​ ​system,​ ​neither​ ​of​ ​which​ ​is​ ​a​ ​simple task. Like 1 InfoSecGeek 11/4/2013​ ​2:03​ ​PM​ ​PST Gotta​ ​wonder​ ​if​ ​those​ ​are​ ​bootlegged​ ​copies​ ​of​ ​Windows.​ ​If​ ​so​ ​compromising​ ​the​ ​install​ ​image might​ ​not​ ​be​ ​that​ ​challenging​ ​a​ ​task.​ ​If​ ​nothing​ ​else​ ​it​ ​seems​ ​it​ ​would​ ​be​ ​simple​ ​to​ ​do​ ​an​ ​install, hack​ ​away​ ​on​ ​the​ ​resulting​ ​system,​ ​and​ ​then​ ​rebuild​ ​an​ ​install​ ​kit​ ​using​ ​whatever​ ​modified components​ ​one​ ​wanted​ ​to​ ​include​ ​(if​ ​necessary​ ​use​ ​IDA​ ​Pro​ ​or​ ​Olly​ ​Debug​ ​to​ ​hack​ ​the​ ​installer and​ ​emasculate​ ​whatever​ ​security​ ​or​ ​other​ ​features​ ​are​ ​necessary).​ ​Not​ ​a​ ​simple​ ​task​ ​but​ ​well within​ ​the​ ​range​ ​of​ ​many​ ​many​ ​third​ ​world​ ​hackers,​ ​almost​ ​down​ ​to​ ​the​ ​script​ ​kiddy​ ​level​ ​these days. Like caps_nats_skins_fan 11/1/2013​ ​12:11​ ​PM​ ​PDT A​ ​pardon?​ ​He​ ​personally​ ​caused​ ​the​ ​waste​ ​of​ ​millions​ ​of​ ​taxpayers​ ​dollars​ ​at​ ​national​ ​labs​ ​to implement​ ​cleanup​ ​and​ ​prevention.​ ​He​ ​should​ ​have​ ​been​ ​charged​ ​based​ ​on​ ​the​ ​number​ ​of machines​ ​he​ ​infected​ ​and​ ​the​ ​amount​ ​ot​ ​time​ ​and​ ​money​ ​to​ ​clean​ ​them​ ​up.​ ​He​ ​got​ ​off​ ​easy because​ ​of​ ​daddy. LikeShare 1 brucekorb 11/1/2013​ ​2:52​ ​PM​ ​PDT OTOH,​ ​he​ ​gave​ ​a​ ​wakeup​ ​call​ ​before​ ​truely​ ​malevolent​ ​worms​ ​came​ ​along.​ ​Not​ ​nice.​ ​He​ ​got​ ​his punishment.​ ​I​ ​wouldn't​ ​say​ ​he​ ​got​ ​off​ ​easy. Like 3 truthoutandunder 11/5/2013​ ​12:54​ ​PM​ ​PST Yes,​ ​he​ ​did.​ ​His​ ​dad​ ​was​ ​the​ ​head​ ​of​ ​the​ ​NSA.​ ​Had​ ​this​ ​been​ ​any​ ​one​ ​else,​ ​he​ ​would​ ​be​ ​behind bars;​ ​pay​ ​attention​ ​to​ ​Operation​ ​Sundevil? Like Wiggan 11/1/2013​ ​11:22​ ​AM​ ​PDT Interesting​ ​piece.​ ​It​ ​is​ ​sad​ ​how​ ​Morris​ ​is​ ​in​ ​the​ ​museum,​ ​and​ ​those​ ​who​ ​cleaned​ ​up​ ​the​ ​mess​ ​he made​ ​are​ ​not.​ ​Wonder​ ​if​ ​any​ ​security​ ​software​ ​companies​ ​release​ ​viruses​ ​to​ ​drum​ ​up business... LikeShare 2 rlj611

11/1/2013​ ​10:56​ ​AM​ ​PDT Nice​ ​article​ ​but​ ​it​ ​still​ ​amazes​ ​me​ ​how​ ​we​ ​trivialize​ ​certain​ ​crimes.​ ​What​ ​he​ ​did​ ​was​ ​wrong​ ​and he​ ​should​ ​have​ ​been​ ​punished​ ​I​ ​don't​ ​care​ ​how​ ​'bored'​ ​he​ ​was.​ ​We​ ​were​ ​all​ ​for​ ​3​ ​strikes​ ​and​ ​it didn’t​ ​matter​ ​what​ ​the​ ​1st,​ ​2nd​ ​or​ ​3rd​ ​strike​ ​was​ ​–​ ​we​ ​wanted​ ​to​ ​teach​ ​society​ ​a​ ​lesson.​ ​Well that​ ​didn’t​ ​work​ ​anymore​ ​than​ ​the​ ​death​ ​penalty​ ​or​ ​life​ ​sentences​ ​–​ ​people​ ​are​ ​going​ ​to​ ​do​ ​what they​ ​want​ ​to​ ​do.​ ​White​ ​collar​ ​criminals​ ​are​ ​seen​ ​as​ ​not​ ​as​ ​'criminal'​ ​or​ ​'didn't​ ​intend​ ​harm'​ ​but they​ ​are​ ​criminals​ ​-​ ​they​ ​break​ ​the​ ​law​ ​and​ ​let's​ ​stop​ ​pretending​ ​it's​ ​different. LikeShare 4 InfoSecGeek 11/4/2013​ ​2:09​ ​PM​ ​PST let's​ ​stop​ ​pretending​ ​all​ ​crimes​ ​are​ ​the​ ​same.​ ​beating​ ​and​ ​killing​ ​people​ ​is​ ​not​ ​the​ ​same​ ​as​ ​white collar​ ​crime.​ ​Ruining​ ​individuals​ ​financially​ ​is​ ​not​ ​the​ ​same​ ​as​ ​infecting​ ​their​ ​computer​ ​with​ ​a worm​ ​(although​ ​if​ ​the​ ​latter​ ​is​ ​a​ ​means​ ​to​ ​the​ ​former​ ​end​ ​it​ ​becomes​ ​part​ ​of​ ​the​ ​same​ ​severity, but​ ​if​ ​it's​ ​just​ ​used​ ​to​ ​spam​ ​herbal​ ​vaigra​ ​ads​ ​that's​ ​not​ ​the​ ​same). so​ ​don't​ ​get​ ​confused.​ ​it's​ ​either​ ​three​ ​strikes​ ​or​ ​it's​ ​not,​ ​make​ ​up​ ​your​ ​mind. Like 1 fgoodwin 11/1/2013​ ​10:28​ ​AM​ ​PDT Maybe​ ​the​ ​punishment​ ​for​ ​Morris​ ​didn't​ ​suit​ ​the​ ​crime.​ ​But​ ​I​ ​think​ ​it's​ ​obvious​ ​from​ ​the​ ​number​ ​of people​ ​who​ ​currently​ ​write​ ​malware​ ​that​ ​current​ ​punishments​ ​serve​ ​as​ ​no​ ​deterrent.​ ​Given​ ​the virulence​ ​of​ ​some​ ​of​ ​the​ ​malware​ ​that's​ ​out​ ​there,​ ​I​ ​wish​ ​the​ ​punishment​ ​was​ ​much​ ​more severe. LikeShare 1 cheesechoker 11/2/2013​ ​12:32​ ​PM​ ​PDT Either​ ​current​ ​punishments​ ​are​ ​not​ ​harsh​ ​enough,​ ​as​ ​you​ ​say,​ ​or…​ ​deterrence​ ​simply​ ​does​ ​not work.​ ​When​ ​you​ ​consider​ ​that​ ​computer​ ​crimes​ ​can​ ​carry​ ​decades-long​ ​sentences,​ ​even​ ​for minor​ ​"unauthorized​ ​entry"​ ​type​ ​offences,​ ​or​ ​even​ ​(ugh)​ ​copyright​ ​violations,​ ​it​ ​should​ ​be​ ​clear that​ ​the​ ​punishments​ ​are​ ​more​ ​than​ ​adequate.​ ​They​ ​just​ ​don't​ ​have​ ​the​ ​intended​ ​effect. Like mcope 11/1/2013​ ​10:10​ ​AM​ ​PDT Nice​ ​account.​ ​It​ ​amazes​ ​me​ ​how​ ​long​ ​ago​ ​everything​ ​occurred!​ ​One​ ​interesting​ ​footnote:​ ​I believe​ ​there's​ ​a​ ​story​ ​of​ ​an​ ​investigator​ ​who​ ​received​ ​an​ ​anonymous​ ​call​ ​a​ ​former​ ​roommate​ ​of Morris'.​ ​The​ ​roommate​ ​slipped​ ​up​ ​and​ ​called​ ​Morris​ ​by​ ​his​ ​initials​ ​"RTM."​ ​It​ ​didn't​ ​take​ ​long​ ​for the​ ​investigator​ ​to​ ​search​ ​the​ ​Harvard​ ​student​ ​directory​ ​and​ ​come​ ​up​ ​with​ ​Robert​ ​Tappan Morris.

Here is a TOP 10 BOTNETS AND SCAMS running n 2017-.pdf ...

2, Sudduth was talking with Paul Graham, another. Aiken Lab staffer and a friend of Morris, when Morris called. (The account that follows is drawn. from Sudduth's testimony to a Cornell commission. Sudduth died in 2006, and Graham declined. to be interviewed for this story.) Graham answered the phone. After the call ...

2MB Sizes 0 Downloads 90 Views

Recommend Documents

Here is a TOP 10 BOTNETS AND SCAMS running n 2017-.pdf ...
problem, and software vendors treated security flaws as a low priority. The Switch newsletter. The day's top stories on the world of tech. The Morris Worm ...

Winter is here! - Groups
Page 1. Winter is here! Color the boy and the snowman. Can you name all the winter clothes?

FADEC is Here! - MOBILPASAR.COM
In addition to much improved fuel control, at low power settings the ignition timing will be adjusted more efficiently, which will produce more torque than the magneto engine's standard 24° BTDC (before top dead center). Magneto Memories. The FADEC

Here is we
Abelssoft PDF Compressor.Albumgood girl gone bad.MYour Christmas. Bonus. Nba 26 12 2015.Revenges02e07 xvid.Lecharme del.Hereis we.Private Specials 65.Rabbids invasion s01e08.Wherethe boysare. 84.This twist offateleads to hiscrazy biatch hereis we out

Top-10-Greek-Islands-Eyewitness-Top-10-Travel-Guide.pdf
Download ]]]]]>>>>>(-PDF-) Top 10 Greek Islands (Eyewitness Top 10 Travel ... The majority of these internet sites possess a large collection of PDF eBooks ...

Scams and Schemes Activity Sheet.pdf
Scams and Schemes Activity Sheet.pdf. Scams and Schemes Activity Sheet.pdf. Open. Extract. Open with. Sign In. Main menu.

6th-Scams and schemes.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 6th-Scams and schemes.pdf. 6th-Scams and schemes.pdf. Open.

Here She Is and There She Goes.pdf
Here She Is and There She Goes.pdf. Here She Is and There She Goes.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Here She Is and There ...

here she is ... and there she goes?
2007, showing the 52 contestants meeting in Los Angeles to prepare for the ... fying pageant got sick, so Olive, as runner-up, advanced to the next stage of ...

Muse - Time Is Running Out.pdf
B B B B B B B B B B B B DB. H. B B B B Q P H. Page 3 of 3. Muse - Time Is Running Out.pdf. Muse - Time Is Running Out.pdf. Open. Extract. Open with. Sign In.

10 Km_Clasificación General.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.Missing:

Top 10 Tips for Throwing a Successful Event - Ohio Union
sizable event, such as a banquet, dance, conference, concert, or other event where more ... 4. Find out the maximum capacity of the room for the way you want it set .... Phone: Call the Event Services Office at 292-5200 and speak with an Event ...

Top 10 Qualities of a Proje...
Mar 10, 2009 - What qualities are most important for a project leader to be effective? ... in Project Management Training, have looked in to what makes an.

N-representability is QMA-complete
The class QMA (“quantum Merlin-Arthur”). ○ A problem ... Consider a system of n qubits. ○ Given ..... Reduced density matrices in translation-invariant systems?

Scams and Schemes Activity Sheet esp.pdf
de alguna forma, ya sea impresa o digital. Page 1 of 1. Scams and Schemes Activity Sheet esp.pdf. Scams and Schemes Activity Sheet esp.pdf. Open. Extract.

Magic Tricks, Lines, Bets, Scams and Psychology PDF ...
You're about to learn a variety of magic tricks, bets and scams to break the ice in no time flat. Interactive tricks are the perfect tools to allow you to approach ...

PSA-Timeshare Resale Scams and Tips.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. PSA-Timeshare ...