Feeds

Senator ‘Cheesy Chuck’ Schumer phears the virus

McVeigh resurrected for emphasis

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Poor worm, thou art infected! I mean the computer virus, not its target. Its image ripe and diseased with grand fictions, the gravity and nature of the computer virus phenomenon, as far as the public understands it, is now whatever anyone with the microphone says it is.

To wit: "A more technologically sophisticated Timothy McVeigh may, at this moment, be at home developing a virus that could undermine the American economy," declared U.S. Senator Chuck Schumer (Democrat, New York) as recently as February.

The destruction of the WTC didn't really undermine the U.S. economy, neither has the "War on Terror," but the lowly computer virus "could."

Why claim such a ridiculous thing? Too much strong drink before lunch? A codependent need for a techno-bogeyman to rail against? Victim of a Beltway culture of exaggeration in which no one pays attention unless the message is delivered draped in hysteria?

I used to strongly favor creeping nincompoopism as sufficient explanation. But having seen the mythos of the computer virus escalate over ten years, it's too glib.
Take, for instance, one of the FBI's first forays into virus discussion in 1996. Well before the National Infrastructure Protection Center opened its doors, the bureau published an allegedly scholarly article on computer crime that discussed viruses. It was, at the time, an unintentionally amusing piece that told of the "Lecture" virus, a malicious popinjay, said to corrupt the hard drive and scold the user for not catching it, and the "SPA" virus, which was alleged to examine programs to determine whether they were properly licensed. If it detected illegally copied software, it dialed 911 and asked for help.

Most infamous of the bunch was the wishy-washy slow infector, the "Clinton" virus -- said to "[eradicate] itself when it [could not] decide which program to infect."

If you worked in the computer security industry at the time and saw the article, it was immediately obvious the FBI authors had been sucked in by a series of jokes. Specifically, the citation was traced to an April Fool's column in a computer magazine, a column taken way too seriously in the FBI's haste to provide something that sounded informed to the law enforcement community.

Once it became publicized, the bureau's gaffe generated much clucking and snide comment on the nature of incompetence. However, there would be no real reason for embarrassment today, when Schumerian claims re the capability of computer viruses are commonplace.

Philosopher's Stone

The senator's press release from February included much terrific copy: "Terrorists can use viruses to shut down commerce ..." and "Frankly, I fear we're on the verge of a digital Armageddon," among others. Although his words were gone with the wind in a day or two, the hyperventilating assessment of the nature of virus danger is constant. The names on the delivering end change, but that's it.

As a political and social practice, it's much like alchemy -- that Middle Age pseudo-chemistry dictated by magical and philosophical associations. In more modern terms, excluding the minor and elementary business of updating anti-virus software, everyone devotes themselves to either winging it or making unusual, sometimes interesting and weird but always wrong, guesses about the nature of future and what should be done about it.

There are many Philosopher's Stones promised to turn lead into gold: Trustworthy Computing, the Govnet, corporate-government information sharing. There is the lip-service search for the elixir of youth: an anti-virus program that's not after-the-fact and which timid corporate America can actually be persuaded to use.

The computer virus itself is the alkahest -- the alchemical universal solvent, the solution for every need. Need to melt the Internet? Call for the alkahest. Are economic losses attributed to poor computer security uncompelling? Dissolve them in the alkahest. Must the irrational claim be transformed into rationality? Mix it with the alkahest!

In 1996, the "Lecture" virus only formatted the hard drive. Loser! No alkahest for "digital Armageddon," it was just an April Fool's joke and an underpowered one at that. (And the happening term for doom was "electronic Pearl Harbor," a far more modest interpretation of Megiddo.) The "SPA" virus was pathetic, too, but not particularly far-fetched. An actual DOS virus, named Raubkopie, chided the user, in German, over the use of pirated software.

Those pulled in by the virus jokes knew none of this then, and it exposed them as rank amateurs. But if anyone of the same vintage remains in the bureau or NIPC and they remember the incident, it must surely be with a bemused, "What was all the fuss about?"

© 2002 SecurityFocus.com, all rights reserved.

Internet Security Threat Report 2014

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.