Terminal Compromise - novelonlinefull.com
You’re read light novel Terminal Compromise Part 102 online at NovelOnlineFull.com. Please use the follow button to get notification about the latest chapter next time when you visit NovelOnlineFull.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
A bustle of activity and a man spoke to the dais without the a.s.sistance of a microphone. "Yessir, I am."
Sternman was definitely the academic type, Scott noted. A crum- pled ill fitting brown suit covering a small hunched body that was no more than 45 years old. He held an old scratched brief- case and an armful of folders and envelopes. Scott was reminded of the studious high school student that jocks enjoy tripping with their feet. Dr. Sternman busied himself to straighten the papers that fell onto the desk and his performance received a brief t.i.tter from the crowd.
"Ah, yes, Mr. Chairman," Sternman said. "I'm ready now." Rick- field looked as bored as ever.
"Thank you, Dr. Sternman. You are, I understand, a computer virus expert? Is that correct?"
"Yessir. My doctoral thesis was on the subject and I have spent several years researching computer viruses, their proliferation and propagation." Rickfield groaned to himself. Unintelligible mumbo jumbo.
"I also understand that your comments will be brief as we have someone else yet to hear from today." It was as much a command as a question.
"Yessir, it will be brief."
"Then, please, enlighten us, what is a virus expert and what do you do?" Rickfield grinned menacingly at Dr. Les Sternman, Pro- fessor of Applied Theoretical Mathematics, Ma.s.sachusetts Insti- tute of Technology.
"I believe the committee has received an advance copy of some notes I made on the nature of computer viruses and the danger they represent?" Rickfield hadn't read anything, so he looked at Boyers who also shrugged his shoulders.
"Yes, Dr. Sternman," Nancy Deere said, "and we thank you for your consideration." Rickfield glared at her as she politely upstaged him yet again. "May I ask, though, that you provide a brief description of a computer virus for the benefit of those who have not read your presentation?" She stuck it to Rickfield again.
"I'd be happy to, madam Chairwoman," he said nonchalantly. Rick- field's neck turned red at the inadvertent sudden rise in Senator Deere's stature. For the next several minutes Sternman solemnly described what a virus was, how it worked and a history of their attacks. He told the committee about Worms, Trojan Horses, Time Bombs, Logic Bombs, Stealth Viruses, Crystal Viruses and an a.s.sorted family of similar surrept.i.tious computer programs.
Despite Sternman's sermonly manner, his audience found the sub- ject matter fascinating.
"The reason you are here, Dr. Sternman, is to bring us up to speed on computer viruses, which you have done with alacrity, and we appreciate that." Rickfield held seniority, but Nancy Deere took charge due to her preparation. "Now that we have an under- standing of the virus, can you give us an idea of the type of problems that they cause?"
"Ah, yes, but I need to say something here," Sternman said.
"Please, proceed," Rickfield said politely.
"When I first heard about replicating software, viruses, and this was over 15 years ago, I, as many of my graduate students did, thought of them as a curious anomaly. A benign subset of comput- er software that had no antic.i.p.ated applications. We spent months working with viruses, self cloning software and built mathematical models of their behavior which fit quite neatly in the domain of conventional set theory. Then an amazing discovery befell us. We proved mathematically that there is absolutely no effective way to protect against computer viruses in software."
Enough of the spectators had heard about viruses over the past few years to comprehend the purport of that one compelling state- ment. Even Senator Rickfield joined Nancy and the others in their awe. No way to combat viruses? Dr. Sternman had dropped a bombsh.e.l.l on them.
"Dr. Sternman," said Senator Deere, "could you repeat that?
"Yes, yes," Sternman replied, knowing the impact of his state- ment. "That is correct. A virus is a piece of software and software is designed to do specific tasks in a hardware environ- ment. All software uses basically the same techniques to do its job. Without all of the technicalities, if one piece of software can do something, another piece of software can un-do it. It's kind of a computer arms race.
"I build a virus, and you build a program to protect against that one virus. It works. But then I make a small change in the virus to attack or bypa.s.s your software, and Poof! I blow you away. Then you build a new piece of software to defend against both my first virus and my mutated virus and that works until I build yet another. This process can go on forever, and frankly, it's just not worth the effort."
"What is not worth the effort, Doctor?" Asked Nancy Deere. "You paint a most bleak picture."
"I don't mean to at all, Senator." Dr. Sternman smiled soothing- ly up at the committee and took off his round horn rim gla.s.ses.
"I wasn't attempting to be melodramatic, however these are not opinions or guesses. They are facts. It is not worth the effort to fight computer viruses with software. The virus builders will win because the Virus Busters are the ones playing catch-up."
"Virus Busters?" Senator Rickfield mockingly said conspicuously raising his eyebrows. His reaction elicited a wave of laughter from the hall.
"Yessir," said Dr. Sternman to Rickfield. "Virus Busters.
That's a term to describe programmers who fight viruses. They mistakenly believe they can fight viruses with defensive software and some of them sell some incredibly poor programs. In many cases you're better off not using anything at all.
"You see, there is no way to write a program that can predict the potential behavior of other software in such a way that it will not interfere with normal computer operations. So, the only way to find a virus is to already know what it looks like, and go out looking for it. There are several major problems with this approach. First of all, the virus has already struck and done some damage. Two it has already infected other software and will continue to spread. Three, a program must be written to defeat the specific virus usually using a unique signature for each virus, and the vaccine for the virus must be distributed to the computer users.
"This process can take from three to twelve months, and by the time the virus vaccine has been deployed, the very same virus has been changed, mutated, and the vaccine is useless against it. So you see, the Virus Busters are really wasting their time, and worst of all they are deceiving the public." Dr. Sternman com- pleted what he had to say with surprising force.
"Doctor Sternman," Senator Rickfield said with disdain, "all of your theories are well and good, and perhaps they work in the laboratory. But isn't it true, sir, that computer viruses are an overblown issue that the media has sensationalized and that they are nothing more than a minor inconvenience?"
"Not really, Senator. The statistics don't support that conclu- sion," Dr. Sternman said with conviction. "That is one of the worst myths." Nancy Deere smiled to herself as the dorky college professor handed it right to a United States Senator. "The incidence of computer viruses has been on a logarithmic increase for the past several years. If a human disease infected at the same rate, we would declare a medical state of emergency."
"Doctor," implored Rickfield. "Aren't you exaggerating . . .?"
"No Senator, here are the facts. There are currently over 5000 known computer viruses and strains that have been positively identified. Almost five thousand, Senator." The good Doctor was a skilled debater, and Rickfield was being sucked in by his attack on the witness. The figure three thousand impressed everyone. A few low whistles echoed through the large chamber.
Stupid move Merrill, though Nancy.
"It is estimated, sir, that at the current rate, there will be over 100,000 active viruses in five years," Dr. Sternman dryly spoke to Rickfield, "that every single network in the United States, Canada and the United Kingdom is infected with at least one computer virus. That is the equivalent of having one member of every family in the country being sick at all times. That is an epidemic, and one that will not go away. No sir, it will not."
Sternman's voice rose. "It will not go away. It will only get worse."
"That is a most apoplectic prophesy, Doctor. I think that many of us would have trouble believing the doom and gloom you por- tend." Rickfield was sloughing off the Doctor, but Sternman was here to tell a story, and he would finish.
"There is more, Senator. Recent reports show that over 75% of the computers in the People's Republic of China are infected with deadly and destructive software. Why? The look on your face asks the question. Because, almost every piece of software in that country is bootleg, illegal copies of popular programs.
That invites viruses. Since vast quant.i.ties of computers come from the Pacific Rim, many with prepackaged software, new comput- er equipment is a source of computer viruses that was once con- sidered safe. Modem manufacturers have accidentally had viruses on their communications software; several major domestic software manufacturers have had their shrink-wrapped software infected.
"If you recall in 1989, NASA brought Virus Busters to Cape Kenne- dy and Houston to thwart a particular virus that threatened a s.p.a.ce launch. A year later as everyone remembers, NASA computers were invaded forcing officials to abort a flight. The attacks go on, and they inflict greater damage than is generally thought.
"Again, these are our best estimates, that over 90% of all viral infections go unreported."
"Doctor, 90%? Isn't that awfully high?" Nancy asked.
"Definitely, yes, but imagine the price of speaking out. I have talked to hundreds of companies, major corporations, that are absolutely terrified of anyone knowing that their computers have been infected. Or they have been the target of any computer crime for that matter. They feel that the public, their custom- ers, maybe even their stockholders, might lose faith in the company's ability to protect itself. So? Most viral attacks go unreported.
"It's akin to computer rape." Dr. Sternman had a way with words to keep his audience attentive. Years of lecturing to sleeping freshman had taught him a few tricks. "A computer virus is uninvited, it invades the system, and then has its way with it.
If that's not rape, I don't know what is."
"Your parallels are most vivid," said a grimacing Nancy Deere.
"Let's leave that thought for now, and maybe you can explain the type of damage that a virus can do. It sounds to me like there are thousands of new diseases out there, and every one needs to be isolated, diagnosed and then cured. That appears to me to a formidable challenge."
"I could not have put it better, Senator. You grasp things quickly." Sternman was genuinely complimenting Nancy. "The similarities to the medical field cannot go unnoticed if we are to deal with the problem rationally and effectively. And like a disease, we need to predict the effects of the infection. What we have found in that area is as frightening.
"The first generation of viruses were simple in their approach.
The designers correctly a.s.sumed that no one was looking for them, and they could enter systems without any deterrence. They erase files, scramble data, re-format hard drives . . .make the comput- er data useless.
"Then the second generation of viruses came along with the nom-de-guerre stealth. These viruses hid themselves more elabo- rately to avoid detection and had a built in self-preservation instinct. If the virus thinks it's being probed, it self de- structs or hides itself even further.
"In addition, second generation viruses learned how to become targeted. Some viruses have been designed to only attack a compet.i.tor's product and nothing else."
"Is that possible?" Asked Nancy Deere.
"It's been done many times. Some software bugs in popular soft- ware are the result of viral infections, others may be genuine bugs. Imagine a virus who sole purpose is to attack Lotus 123 spreadsheets. The virus is designed to create computational errors in the program's spreadsheets. The user then thinks that Lotus is to blame and so he buys another product. Yes, ma'am, it is possible, and occurs every day of the week. Keeping up with it is the trick.
"Other viruses attack on Friday the 13th. only, some attack only at a specified time . . .the damage to be done is only limited by imagination of the programmers. Third generation viruses were even more sophisticated. They were designed to do damage not only to the data, but to the computer hardware itself. Some were designed to overload communications ports with tight logical loops. Others were designed to destroy the hard disk by directly overdriving the disk or would cause amonitor to self-destruct.
There is no limit to the possibilities.