• Email Us: [email protected]
  • Contact Us: +1 718 874 1545
  • Skip to main content
  • Skip to primary sidebar

Medical Market Report

  • Home
  • All Reports
  • About Us
  • Contact Us

The Morris Worm Saw A Grad Student Crash The Internet In 1988

May 31, 2023 by Deborah Bloomfield

If you ever think you’ve screwed up at college, you’ve surely got nothing on the creator of The Morris Worm. It was unleashed on November 2, 1988, by Cornell University PhD student Robert Morris Jr, and it broke The Internet.

There were no popping bottles involved in the incident, however, just three files that could launch what Morris and his colleague had coined “the brilliant project”: a self-replicating “worm” that could infect a computer, turning it into a base from which it could infect another.

Advertisement

The worm would begin its reign of terror from MIT’s Artificial Intelligence Lab in Cambridge, Massachusetts, but Morris himself was in Ithaca, New York. It was at 8pm on that fateful day that he remotely accessed prep.ai.mit.edu, a VAX 11/750 computer, and executed three files that would change the way we saw The Internet forever.

Morris’s intentions had been to see how far a group of self-propagating computer worms could travel through The Internet, explains Scott Shapiro in his new book Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks. However, the first signs that his brilliant experiment might have gone awry first became apparent when he returned from dinner to find that the network was sluggish.

In his absence, The Morris Worm had replicated its way to Pittsburgh within minutes. It took less than three hours for it to spread from its point of origin in Ithaca back to Cornell where it was dawning on Morrison that the worm wasn’t just innocently infecting computers, it was crashing them, too.

And then, things took a sinister turn.

morris worm

The Morris Worm source code is now contained on a floppy disc at The Computer History Museum.

“At 1:05 a.m., the worm penetrated Lawrence Livermore National Laboratory, a site responsible for securing the country’s nuclear arsenal,” wrote Shapiro in Fancy Bear Goes Phishing. “Soon the worm had burrowed into the Los Alamos National Laboratory in New Mexico, the home of the Manhattan Project and the world’s first atomic bombs. Robert’s brilliant project no longer seemed so brilliant.”

Whatever scientific experiment Morris had been planning, its academic potential was not appreciated by Cornell University who in a report on the worm said that while there was no direct evidence of malicious intent, “given Morris’ evident knowledge of systems and networks, he knew or clearly should have known that such a consequence was certain, given the design of the worm. As such, it appears that Morris failed to consider the most probable consequences of his actions. At the very least, such failure constitutes reckless disregard of those probable consequences.”

You can find out more about The Morris Worm in an excerpt from Fancy Bear Goes Phishing that features in the Book Bites section of issue 11 of CURIOUS, IFLScience’s free e-magazine, alongside an interview with author and Professor of Law and Philosophy Shapiro about the hacks that inspired his book.

curious morris worm
Find out more about The Morris Worm and the history of hacking in our Book Bites and Meet The Author features in CURIOUS, out now. Image credit: IFLScience

As he told IFLScience, the history of hacks is often a more complex story than waging senseless war from behind a keyboard.

Advertisement

“Although the history of hacking seems like a technical story, it is actually a human story. This may sound counterintuitive, given that hacking is typically associated with highly skilled computer programmers who write code to gain unauthorized access to data on the internet,” Shapiro told IFLScience. “To truly understand the root causes of hacking, we need to consider the interplay between what I refer to as ‘upcode’ and ‘downcode’.”

“Downcode is the technical computer code that hackers use to gain access to systems and data. It’s the code literally below your fingertips. Upcode, on the other hand, refers to the social, political, and institutional forces that shape the world around us, including personal beliefs, social norms, legal rules, corporate policies, professional ethics, and website terms of service. While computers run on downcode, humans run on upcode. And upcode shapes downcode.”

“Ultimately, hackers exploit the human vulnerabilities that give rise to downcode insecurities. That’s why it’s a mistake to think of cybersecurity as just – or even primarily – an engineering problem. It is more useful to think of hacking as a human, upcode problem. By examining the interplay between upcode and downcode, we can gain a deeper understanding of how hackers operate, why they do what they do, and what steps we can take to prevent future attacks.”

Deborah Bloomfield
Deborah Bloomfield

Related posts:

  1. Tennis-U.S. Open order of play on Monday
  2. Malaysia’s Top Glove quarterly earnings plunge 48% on slower sales
  3. France says Mali must stick to election timetable
  4. Blinken meets Lopez Obrador to soothe thorny U.S.-Mexico relations

Source Link: The Morris Worm Saw A Grad Student Crash The Internet In 1988

Filed Under: News

Primary Sidebar

  • Have You Seen This Snake? Florida Wants Your Help Finding Rare Species Seen Once In 50 Years
  • Plague Confirmed In Lake Tahoe Area For First Time In 5 Years, California Officials Say
  • Supergiant Star Spotted Blowing Milky Way’s Largest Bubble Of Its Kind, Surprising Astronomers
  • Game Theory Promised To Explain Human Decisions. Did It?
  • Genes, Hormones, And Hairstyling – Here Are Some Causes Of Hair Loss You Might Not Have Heard Of
  • Answer To 30-Year-Old Mystery Code Embedded In The Kryptos CIA Sculpture To Be Sold At Auction
  • Merry Mice: Human Brain Cells Transplanted Into Mice Reduce Anxiety And Depression
  • Asteroid-Bound NASA Mission Snaps Earth-Moon Portrait From 290 Million Kilometers Away
  • Forget State Mammals – Some States Have Official Dinosaurs, And They’re Awesome
  • Female Jumping Spiders Of Two Species Prefer The Sexy Red Males Of One, Leading To Hybridization
  • Why Is It So Difficult To Find New Moons In The Solar System?
  • New “Oxygen-Breathing” Crystal Could Recharge Fuel Cells And More
  • Some Gut Bacteria Cause Insomnia While Others Protect Against It, 400,000-Person Study Argues
  • Neanderthals And Homo Sapiens Got It On 100,000 Years Earlier Than We Thought
  • “Womb Of The Universe”: Native American Tribal Elders Help Archaeologists Decipher Ancient Rock Art In Missouri Cave
  • 16,000-Year-Old Paintings Suggest Prehistoric Humans Risked Their Lives To Enter “Shaman Training Cave”
  • Final Gasps Of A Dying Star Seen Through A Record-Breaking 130 Years Of Data
  • COVID-19 “Vaccine Alternative” Injection Could Be On Fast-Track To Approval From FDA
  • New Jersey Officials Investigate Possible First Locally Acquired Malaria Case Since 1991
  • First-of-Its-Kind Bright Orange Nurse Shark Recorded Off Costa Rica Makes History
  • Business
  • Health
  • News
  • Science
  • Technology
  • +1 718 874 1545
  • +91 78878 22626
  • [email protected]
Office Address
Prudour Pvt. Ltd. 420 Lexington Avenue Suite 300 New York City, NY 10170.

Powered by Prudour Network

Copyrights © 2025 · Medical Market Report. All Rights Reserved.

Go to mobile version