• Email Us: [email protected]
  • Contact Us: +1 718 874 1545
  • Skip to main content
  • Skip to primary sidebar

Medical Market Report

  • Home
  • All Reports
  • About Us
  • Contact Us

The Morris Worm Saw A Grad Student Crash The Internet In 1988

May 31, 2023 by Deborah Bloomfield

If you ever think you’ve screwed up at college, you’ve surely got nothing on the creator of The Morris Worm. It was unleashed on November 2, 1988, by Cornell University PhD student Robert Morris Jr, and it broke The Internet.

There were no popping bottles involved in the incident, however, just three files that could launch what Morris and his colleague had coined “the brilliant project”: a self-replicating “worm” that could infect a computer, turning it into a base from which it could infect another.

Advertisement

The worm would begin its reign of terror from MIT’s Artificial Intelligence Lab in Cambridge, Massachusetts, but Morris himself was in Ithaca, New York. It was at 8pm on that fateful day that he remotely accessed prep.ai.mit.edu, a VAX 11/750 computer, and executed three files that would change the way we saw The Internet forever.

Morris’s intentions had been to see how far a group of self-propagating computer worms could travel through The Internet, explains Scott Shapiro in his new book Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. However, the first signs that his brilliant experiment might have gone awry first became apparent when he returned from dinner to find that the network was sluggish.

In his absence, The Morris Worm had replicated its way to Pittsburgh within minutes. It took less than three hours for it to spread from its point of origin in Ithaca back to Cornell where it was dawning on Morrison that the worm wasn’t just innocently infecting computers, it was crashing them, too.

And then, things took a sinister turn.

morris worm

The Morris Worm source code is now contained on a floppy disc at The Computer History Museum.

“At 1:05 a.m., the worm penetrated Lawrence Livermore National Laboratory, a site responsible for securing the country’s nuclear arsenal,” wrote Shapiro in Fancy Bear Goes Phishing. “Soon the worm had burrowed into the Los Alamos National Laboratory in New Mexico, the home of the Manhattan Project and the world’s first atomic bombs. Robert’s brilliant project no longer seemed so brilliant.”

Whatever scientific experiment Morris had been planning, its academic potential was not appreciated by Cornell University who in a report on the worm said that while there was no direct evidence of malicious intent, “given Morris’ evident knowledge of systems and networks, he knew or clearly should have known that such a consequence was certain, given the design of the worm. As such, it appears that Morris failed to consider the most probable consequences of his actions. At the very least, such failure constitutes reckless disregard of those probable consequences.”

You can find out more about The Morris Worm in an excerpt from Fancy Bear Goes Phishing that features in the Book Bites section of issue 11 of CURIOUS, IFLScience’s free e-magazine, alongside an interview with author and Professor of Law and Philosophy Shapiro about the hacks that inspired his book.

curious morris worm
Find out more about The Morris Worm and the history of hacking in our Book Bites and Meet The Author features in CURIOUS, out now. Image credit: IFLScience

As he told IFLScience, the history of hacks is often a more complex story than waging senseless war from behind a keyboard.

Advertisement

“Although the history of hacking seems like a technical story, it is actually a human story. This may sound counterintuitive, given that hacking is typically associated with highly skilled computer programmers who write code to gain unauthorized access to data on the internet,” Shapiro told IFLScience. “To truly understand the root causes of hacking, we need to consider the interplay between what I refer to as ‘upcode’ and ‘downcode’.”

“Downcode is the technical computer code that hackers use to gain access to systems and data. It’s the code literally below your fingertips. Upcode, on the other hand, refers to the social, political, and institutional forces that shape the world around us, including personal beliefs, social norms, legal rules, corporate policies, professional ethics, and website terms of service. While computers run on downcode, humans run on upcode. And upcode shapes downcode.”

“Ultimately, hackers exploit the human vulnerabilities that give rise to downcode insecurities. That’s why it’s a mistake to think of cybersecurity as just – or even primarily – an engineering problem. It is more useful to think of hacking as a human, upcode problem. By examining the interplay between upcode and downcode, we can gain a deeper understanding of how hackers operate, why they do what they do, and what steps we can take to prevent future attacks.”

Deborah Bloomfield
Deborah Bloomfield

Related posts:

  1. Tennis-U.S. Open order of play on Monday
  2. Malaysia’s Top Glove quarterly earnings plunge 48% on slower sales
  3. France says Mali must stick to election timetable
  4. Blinken meets Lopez Obrador to soothe thorny U.S.-Mexico relations

Source Link: The Morris Worm Saw A Grad Student Crash The Internet In 1988

Filed Under: News

Primary Sidebar

  • Project Hail Mary Trailer First Look: What Would Happen If The Sun Got Darker?
  • Newly Discovered Cell Structure Might Hold Key To Understanding Devastating Genetic Disorders
  • What Is Kakeya’s Needle Problem, And Why Do We Want To Solve It?
  • “I Wasn’t Prepared For The Sheer Number Of Them”: Cave Of Mummified Never-Before-Seen Eyeless Invertebrates Amazes Scientists
  • Asteroid Day At 10: How The World Is More Prepared Than Ever To Face Celestial Threats
  • What Happened When A New Zealand Man Fell Butt-First Onto A Powerful Air Hose
  • Ancient DNA Confirms Women’s Unexpected Status In One Of The Oldest Known Neolithic Settlements
  • Earth’s Weather Satellites Catch Cloud Changes… On Venus
  • Scientists Find Common Factors In People Who Have “Out-Of-Body” Experiences
  • Shocking Photos Reveal Extent Of Overfishing’s Impact On “Shrinking” Cod
  • Direct Fusion Drive Could Take Us To Sedna During Its Closest Approach In 11,000 Years
  • Earth’s Energy Imbalance Is More Than Double What It Should Be – And We Don’t Know Why
  • We May Have Misjudged A Fundamental Fact About The Cambrian Explosion
  • The Shoebill Is A Bird So Bizarre That Some People Don’t Even Believe It’s Real
  • Colossal’s “Dire Wolves” Are Now 6 Months Old – And They’ve Doubled In Size
  • How To Fake A Fossil: Find Out More In Issue 36 Of CURIOUS – Out Now
  • Is It True Earth Used To Take 420 Days To Orbit The Sun?
  • One Of The Ocean’s “Most Valuable Habitats” Grows The Only Flowers Known To Bloom In Seawater
  • World’s Largest Digital Camera Snaps 2,104 New Asteroids In 10 Hours, Mice With 2 Dads Father Their Own Offspring, And Much More This Week
  • Simplest Explanation For “Anomalous” Signals Coming From Underneath Antarctica Ruled Out
  • Business
  • Health
  • News
  • Science
  • Technology
  • +1 718 874 1545
  • +91 78878 22626
  • [email protected]
Office Address
Prudour Pvt. Ltd. 420 Lexington Avenue Suite 300 New York City, NY 10170.

Powered by Prudour Network

Copyrights © 2025 · Medical Market Report. All Rights Reserved.

Go to mobile version