Online Today OLT-2180ONLINE TODAY'S BACKGROUNDER: THE ROBERT MORRIS WORM CASE (Editor's note: Robert T. Morris was arrested in November 1988 on charges hecreated and released a worm program that stymied thousands of Unix-basedcomputers. This file contains related stories carried by Online Today.) From 1988 files:THOUSANDS OF UNIVERSITY, RESEARCH COMPUTERS STUCK IN MAJOR ASSAULT (Nov. 4) Thousands of Unix-based computers at universities and research and militaryinstallations were slowed or shut down throughout the day yesterday as a rogueprogram ripped through international networks, an incident proclaimed by some tobe the largest assault ever on the nation's computers. No permanent damage or security breaches appear to have occurred during theattack. This led some to say this morning that the intrusion was not actually acomputer "virus" but rather was a "worm" program, in that it apparently wasdesigned to reproduce itself, but not to destroy data. Science writer Celia Hooper of United Press International says the virus/wormpenetrated the computers through a "security hole" in debugging software forelectronic mail systems that connect Unix-based computers, evidently then movingprimarily through ARPAnet (the Advanced Research Projects Agency Network) andNSFnet (network of the National Science Foundation) that link 2,000 computersworldwide. At other systems: -:- The virus/worm also apparently invaded the Science Internet network thatserves many labs, including NASA's Jet Propulsion Laboratory in Pasadena, Calif. -:- NASA spokesman Charles Redmond said there were no reports of the spaceagency's network, Space Physics Analysis Network (SPAN), being affected by theattack, but he added that SPAN was linked to some of the infected networks. Meanwhile, The New York Times this morning reported an anonymous call from aperson who said his associate was responsible for the attack and that theperpetrator had meant it to be harmless. The caller told the newspaper that his associate was a graduate student whomade a programing error in designing the virus, causing the intruder toreplicate much faster than expected. Said The Times, "The student realized hiserror shortly after letting the program loose and ... was now terrified of theconsequences." UPI's Hooper says the virus/worm intrusion was detected about 9 p.m. EasternTime Wednesday at San Francisco's Lawrence Livermore National Laboratory, one oftwo such labs where nuclear weapons are designed. Spokeswoman Bonnie JeanBarringer told UPI said the invasion "was detected and contained within twohours." The rogue program evidently spread through a flaw in the e- mail system of thenetworks. Hooper said it quickly penetrated Air Force systems at the NASA AmesResearch Center in Mountain View, Calif., and systems at the MassachusettsInstitute of Technology, the University of California at Berkeley, theUniversity of Wisconsin, the University of Chicago, the University of Michigan,the University of Rochester, the University of Illinois and Rutgers, Boston,Stanford, Harvard, Princeton, Columbia, Cornell and Purdue universities. Charley Kline, senior research programmer with the Computing Services Officeat the University of Illinois at Urbana-Champaign, Ill., told Associated Presswriter Bernard Schoenburg, "This is the first time that I know of that (a virusinfection) has happened on this scale to larger systems." Kline agreed the virus traveled between computer systems through e-mail and,once the messages were received, they linked up to command controls and told thelocal computers to make copies of the virus. Kline said the copies then soughtout other connected devices. He also said that as far as he knows, only locations using Digital EquipmentCorp.'s VAX computers or those systems made by Sun Microsystems Inc. wereaffected. He estimated about 75 percent of all national networks use suchsystems. Schoenburg also noted that all the affected computers use the BSD Unixoperating system, written at University of California/Berkeley as a modifiedversion AT&T's original Unix. Commenting on the situation, Chairman John McAfee of the new Computer VirusIndustry Association in Santa Clara, Calif., told AP writer Paul A. Driscoll,"The developer was clearly a very high-order hacker (because) he used a flaw inthe operating systems of these computers." Research director Todd Nugent of the University of Chicago's computingdepartment told UPI computer operators across the country were tipped off to theinvasion when they noticed their Unix-based systems running unusually slowly.The machines turned out to be bogged down by loads of viral programs. Nugentsaid that in one machine he had disconnected, the virus appeared to havereplicated itself 85 times. Today, in the morning-after, systems operators were fighting back on severalfronts: -:- First, a software "patch" has been developed to fend off the virus/worm.Spokesman Bill Allen of the University of Illinois at Urbana-Champaign toldUPI's Hooper, "The strategy is to shut off various (infected) computers from thenetwork then sanitize them, purging the virus with a patch program." Hooper saidthe patches, which find and excise the virus/worm from the computer and thenplug the hole through which it entered, now are circulating on campuses and havebeen posted nationally on computer bulletin board systems. -:- Secondly, the Defense Communications Agency has set up an emergency centerto deal with the problem. However, The New York Times noted that no knowncriminal investigations are under way. NSFnet Program Manager Al Thaler told UPI he considered the virus/worm "amean-spirited, vicious thing that interferes severely with the communicationsnetwork our research computers live in. We are angry." Even though it will behard to determine who started the virus/worm, Thaler said, "We are going totry." Finally, McAfee of the virus group told AP that this virus/worm was rarebecause it infested computers at major institutions, not just personalcomputers. "Any hacker in the world can infect personal computers," McAfee said,"but in this case, the person who did this would have had to have beenphysically at the site of one of the computers belonging to the network." Headded, though, that chances of identifying that person were "extremely slim." --Charles BowenREPORTS NAME 23-YEAR-OLD CORNELL STUDENT AS THE AUTHOR OF "VIRUS" (Nov. 5) A 23-year-old Cornell University student and the son of a government computersecurity expert now is said to be the person who planted that "virus" thatstymied some 6,000 Unix- based computers across the nation for more than 36hours this week. The New York Times this morning quoted two sources as identifying the suspectas Robert T. Morris Jr., a computer science graduate student. The paper saysCornell University authorities found that the young man possessed unauthorizedcomputer codes. The young man's father, Robert Morris Sr., the Silver Springs, Md., chiefscientist at the National Computer Security Center in Bethesda, Md.,acknowledged this morning that "it's possible" his son was responsible for therapidly-replicating virus that started crashing international networks lateWednesday night. However, Morris Sr., who is known for security programming in Unix systems,told science writer Celia Hooper of United Press International that he had "nodirect information" on his son's involvement. He added he had not spoken to hisson in several days and was unaware of his whereabouts. The elder Morris also told The Times that the virus "has raised the publicawareness to a considerable degree. It is likely to make people more careful andmore attentive to vulnerabilities in the future." As reported here, the incident, in which thousands of networked computers atuniversities and research and military installations were halted or slowed, issaid to be the largest assault ever on the nation's computers. However, nopermanent damage or security breaches appear to have occurred during the attack. Of Morris Jr.'s alleged involvement, Cornell Vice President M. Stuart Lynnreleased a statement late last night saying the Ithaca, N.Y., university hasuncovered some evidence. For instance, "We are investigating the (computerfiles) to see if the virus was inserted in the system at Cornell. So far, wehave determined that this particular student's account does hold files thatappear to have passwords for some computers at Cornell and Stanford Universityto which he's not entitled. "We also found that his account contains a list of passwords substantiallysimilar to those contained in the virus," said Lynn. He added that students'accounts show which computers they had accessed and what they had stored. Theuniversity is preserving all pertinent computer tapes and records to determinethe history of the virus. Morris Jr. himself has not been reached for comment. Associated Press writerDouglas Rowe says the young man is believed to have flown to Washington, D.C.,yesterday and plans to hire a lawyer and to meet with officials in charge of theinfected computer networks to discuss the incident. Rowe also quotes computer scientists as saying the younger Morris worked inrecent summers at the AT&T's Bell Laboratories, where one of his projectsreportedly was rewriting the communications security software for most computersthat run AT&T's Unix operating system. AP also notes that computer scientists who now are disassembling the virus tolearn how it worked said they have been impressed with its power and cleverness. Of this, Morris' 56-year-old father told the Times that the virus may havebeen "the work of a bored graduate student." Rowe says that when this comment was heard back at Cornell, Dexter Kozen,graduate faculty representative in the computer science department, chuckled andsaid, "We try to keep them from getting bored. I guess we didn't try hardenough." Meanwhile, there already is talk of repercussions if Morris is determined tobe responsible for the virus. Lynn said, "We certainly at Cornell deplore any action that disrupts computernetworks and computer systems whether or not it was designed to do so. Andcertainly if we find a member of the Cornell community was involved, we willtake appropriate disciplinary action." He declined to specify what the actionwould be. In addition, federal authorities may be calling. Speaking with reporter JosephVerrengia of Denver's Rocky Mountain News late yesterday, FBI spokesman WilliamCarter said a criminal investigation would be launched if it is determinedfederal law was violated. He said the bureau will review the Computer Fraud andAbuse Act, which deals with unauthorized access to government computers orcomputers in two or more states. Conviction carries a maximum penalty of 10years in prison. --Charles BowenROBERT MORRIS' FRIENDS SAY NO MALICE MEANT WITH ALLEGED VIRUS (Nov. 7) Friends of a Cornell University graduate student suspected of creating a"virus" that jammed some 6,000 networked computers for 36 hours last week saythey believe he intended no malice and that he also frantically tried to warnoperators after he saw his programming experiment had gone terribly awry. Twenty-three-year-old Robert Tappen Morris Jr. is said to now be in contactwith his father -- Robert T. Morris Sr., a computer security expert with thesuper secret National Security Agency - - and is expected to meet this week withFBI agents after hiring a lawyer. As reported earlier, the virus, which started Wednesday night, spread alongseveral major networks and, for about 36 hours, created widespread disturbancesin the unclassified branch of the military's defense data system, as well as inthousands of university and research computer systems. However, apparently noinformation was lost or damaged. Morris Sr. told Associated Press writer David Germain that he met with FBIagents for about an hour Saturday to explain why his son will not immediatelycomply with their request for more information. The elder Morris said the familyhas had preliminary discussions with an attorney and expects to hire one bytoday. He said his son won't be available for a comment until at least tomorrowor Wednesday. The New York Times yesterday quoted Morris' friends as saying he had spentweeks creating the virus. However, the paper said that by all accounts Morrismeant no harm to the systems; instead, the virus, created as an intellectualchallenge, was supposed to lie dormant in the systems. A friend alleges Morris discovered a flaw in the electronic mail section ofthe Unix 4.3 operating system, a modification of AT&T's original Unix producedby the University of California at Berkeley. When he saw the flaw allowed him tosecretly enter the networked Unix computers, Morris literally jumped onto thefriend's desk and paced around on top of it, the Times reported. Cornell instructor Dexter Kozen told AP the flaw was "a gaping hole in thesystem that I'm amazed no one exploited before." While the loophole was notevident before the virus was unleashed, "in retrospect it's really quiteobvious," Kozen said. Incidentally, the programmer who designed Unix's e-mail program through whichthe virus apparently entered told the Times this weekend that he had forgottento close a secret "back door." Eric Allman said he created the opening to makeadjustments to the program, but forgot to remove the entry point before theprogram was widely distributed in 1985. He was working for a programmingorganization at the University of California/Berkeley at the time. Friends and others say Morris' original vision was to spread a tiny programthroughout and have it secretly take up residence in the memory of each computerit entered, the Times said. Working virtually around the clock, Morris reportedly made a singleprogramming error involving one number that ultimately jammed more than 6,000computers by repeating messages time after time. AP's Germain said Morris reportedly went to dinner after setting the programloose Wednesday night and then checked it again before going to bed. Discoveringhis mistake, Morris desperately worked to find a way to stop the virus' spread. However, "his machines at Cornell were so badly clogged he couldn't get themessage out," said Mark Friedell, an assistant professor of computer science atHarvard University, where Morris did his undergraduate studies. AP says that, panicked, Morris called Andrew Sudduth, systems manager atHarvard's Aiken Laboratory. He asked Sudduth to send urgent messages to acomputer bulletin board system, explaining how to defeat the virus. Sudduth told The Washington Post, "The nets were like molasses. It took memore than an hour to get anything out at all." At a press conference this weekend, Cornell University officials said that,while the computer virus was traced to their institution, they actually had noevidence to positively identify Morris as the virus creator. Said Dean Krafft, Cornell's computer facilities manager, "We have nofingerprints. We have no eyewitness, but it was created on his computeraccount." Krafft added that Morris' computer account holds files that appear tohave unauthorized passwords for computers at Cornell and Stanford University. In addition, Cornell Vice President M. Stuart Lynn said the origin of theprogram is hard to investigate, and it may be impossible to trace the virus backto Morris. "At this stage we're simply not in a position to determine if theallegations are true," Lynn said, adding he did not know how long theinvestigation would take. Curiously, in light of Krafft's statements, Lynn is quoted as saying, "It'squite conceivable we may not be able to say with any certainty" if the virus wascreated in Cornell's computer system. Lynn also said the university had been contacted by the FBI, but there was noindication any criminal charges would be filed. Officials said the school coulddiscipline Morris if he was involved. By the way, one Cornell official, who spoke on condition of anonymity, told APthat it appeared there was an earlier version of the virus in Morris' computerfiles. Regarding possible penalties, United Press International this morning quotedan FBI spokesman as saying that the person responsible for the virus could faceup to 20 years in prison and $250,000 in fines for the federal offense ofunauthorized access to government computers. Finally, Harvard graduate student Paul Graham, a friend of Morris, told theTimes he thought Morris' exploit was similar to that of Mathias Rust, the youngWest German who flew a light plane through Soviet air defenses in May 1987 andlanded in Moscow. "It's as if Mathias Rust had not just flown into Red Square, but built himselfa stealth bomber by hand and then flown into Red Square." --Charles BowenFBI UPGRADES VIRUS PROBE TO A "FULL CRIMINAL INVESTIGATION" (Nov. 8) The young man alleged to have written the virus that stymied some 6,000networked computers last week has hired a Washington, D.C., attorney. Hisselection apparently comes just in time, because the FBI reportedly is upgradingits probe of the matter to a full criminal investigation. Robert T. Morris Jr., 23-year- old Cornell University graduate student, hasnot been formally charged, but nonetheless is widely alleged to have created thevirus that played havoc for 36 hours last week with Unix- based computers on thePentagon-backed ARPANET network and other systems. Associated Press writer Anne Buckley this morning reported that lawyer ThomasGuidoboni of the Washington firm of Bonner & O'Connell has been retained torepresent Morris. Guidoboni told Buckley, "We have notified the federalauthorities of our representation and (Morris') whereabouts. We are in theprocess of investigating the facts and circumstances which have been reported bythe press in order to determine our course of action." Meanwhile, The Washington Post this morning quoted law enforcement sources asconfirming their inquiry has been expanded to a full field investigation by theFBI's Washington field office. That means the FBI has consulted with federalprosecutors, agreed that the bureau has jurisdiction and that there is reason tobelieve there may have been a violation of federal criminal law. "In a full-scale investigation," Buckley said, "the government has the powerto subpoena records and documents and compel testimony through the authorizationof immunity, two techniques which are not permitted through preliminaryinquiries. The move indicate(s) the FBI (is) moving very quickly in the casebecause in many instances, preliminary inquiries take a month or more." AP also quoted a government source who spoke on condition of anonymity assaying investigators aren't sure whether any criminal activity actuallyoccurred, as defined by a statute passed in 1984. Says Buckley, "A section of that law says it is unlawful to enter a governmentcomputer with the intent to disrupt its functions. The crime is punishable by upto 10 years in prison. The source said that in this case, there's no evidencethat anything was taken from the computers, but rather that it was a question ofdisrupting computer systems. One section of law addresses sabotage, but thesource said it (is) unclear whether the virus case would involve an intent todisrupt the computer." AP says its source believes the bureau is investigating the matter in view ofthe fact that there were breaches of security, and that the Justice Departmentwill have to determine whether the matter involved criminal conduct. --Charles BowenGOVERNMENT MAY SUBPOENA CORNELL (Nov. 9) Sources close to the investigation of last week's massive virus attack say thegovernment may seek search warrants or subpoenas to get documents from CornellUniversity before trying to interview the virus's alleged author. Associated Press writer Pete Yost quotes Washington, D.C., lawyer ThomasGuidoboni as saying he hasn't been contacted by the FBI since informing thebureau that he was chosen on Monday to represent the suspect, 23-year-old RobertT. Morris Jr., a Cornell graduate student. Says Guidoboni, "The ball's in their court. We're waiting to hear from them." Yost notes that earlier the FBI had sought to question Morris, but that wasbefore Guidoboni was retained. The lawyer told AP he didn't think "we'll haveenough information by the end of this week" to determine whether to talk to theFBI. He says he wants to talk more with his client before deciding what courseto take. Says the wire service, "The possibility of seeking grand jury subpoenas or asearch warrant for data at Cornell that could shed light on the computer virusincident was considered (yesterday) within the FBI. It was discarded as beingunnecessary and then revived in discussions with Justice Department lawyers,said the sources, speaking on condition of anonymity." Meanwhile, Cornell Vice President M. Stuart Lynn reiterated that theuniversity will cooperate fully with the investigation. Morris, son of acclaimed computer security expert Robert Morris Sr. of Arnold,Va., has not been formally charged. Still, he is widely alleged to be the personwho created the virus that paralyzed some 6,000 networked Unix-based computerson the Pentagon-backed ARPANET network and other systems for about 36 hours lastweek. --Charles BowenFBI LOOKING AT WIDE RANGE OF POSSIBLE VIOLATIONS IN VIRUS CASE (Nov. 10) The FBI now is looking at a wide range of possible federal violations inconnection with last week's massive computer virus incident, ranging beyond thebureau's original focus on the provisions of the Computer Fraud and Abuse Act of1986. That was the word today from FBI Director William Sessions, who told a newsconference in Washington that the FBI is trying to determine whether statutesconcerning wire fraud, malicious mischief or unlawful access to storedcommunications may have been broken. The Associated Press notes that earlier the FBI had said it was concentratingon the 1986 Computer Fraud and Abuse Act, which prohibits fraud or relatedactivity in connection with computers. The FBI chief said, "We often look at intent as being knowing and intentionaldoing of an act which the law forbids and knowing that the law forbids it to bedone. But we also have other statutes which deal simply with knowingly doingsomething." The wire service observed the following about two statutes to which Sessionsreferred: -:- The malicious mischief statute provides a maximum 10-year prison term foranyone who wilfully interferes with the use of any communications linecontrolled by the US government. -:- The unlawful access law makes it a crime to prevent authorized access toelectronic communications while they are in electronic storage and carries amaximum six-month jail term absent malicious destruction or damage. Sessions also told reporters the preliminary phase of the bureau's criminalinvestigation probably will be completed in the next two weeks. As reported here earlier, authorities think 23-year-old Cornell Universitystudent Robert T. Morris created the virus that disrupted thousands of networkedcomputers last week. However, Morris has not yet been charged with any crime. --Charles BowenFBI SEIZES MORRIS RECORDS IN PROBE OF NATIONAL VIRUS CASE (Nov. 17) While young Robert T. Morris Jr. still has not been charged with anything inconnection with the nation's largest computer virus case, the FBI now revealsthat items it has seized so far in its probe include magnetic tapes from Morris'computer account at Cornell University. The Associated Press reports that documents released by the FBI late yesterdaysay investigators seized "two magnetic tapes labeled `files from Morris accountincluding backups' and hard copy related thereto" from Dean Krafft, a researchassociate in computer science at Cornell, where the 23- year-old Morris is agraduate student. AP says the agents also obtained "two yellow legal pads with calculus andassorted notes." Associate university counsel Thomas Santoro had taken the legalpads from an office in Upson Hall, a campus building that contains computerscience classrooms and offices, AP says. Even though Morris hasn't been charged, it has been widely reported that theyoung man told friends he created the virus that stymied an estimated 6,200Unix- based computers on ARPANET and other networks for some 36 hours earlierthis month. As reported, the FBI is conducting a criminal investigation to determinewhether statutes concerning wire fraud, malicious mischief or unlawful access tostored communications may have been violated. AP quotes these latest FBI documents as saying that US District Judge GustaveJ. DiBianco in the northern district of New York in Syracuse issued two warrantson Nov. 10 for the Cornell searches. The FBI searches were conducted that sameafternoon. "The government had said earlier that it might try to obtain documents fromthe university before interviewing Morris," AP observes, "and Cornell's vicepresident for information technologies, M. Stuart Lynn, had said the universitywould cooperate fully with the investigation." --Charles BowenMORRIS CASE NOW BEFORE GRAND JURY (Nov. 21) The case of Robert T. Morris Jr., the 23-year-old Cornell University graduatestudent alleged to have created the "virus" that jammed some 6,200 networkedcomputers, now is being weighed by a Syracuse, N.Y., federal grand jury. Speaking with The Associated Press recently, Assistant US Attorney AndrewBaxter declined to say when the panel began hearing evidence or whether anyonehas been subpoenaed to testify. Said Baxter, "I can say this is the only district in which a grand juryinvestigation is pending. Some evidence has been presented to the grand jury."He also declined to say whether anyone other than Morris is targeted in theinvestigation. As reported earlier, the FBI, which has subpoenaed computer tapes and otherrecords at Cornell's computer science department, is conducting a criminalinvestigation to determine whether statutes on wire fraud, malicious mischief orunlawful access to stored communications may have been broken. No one has been charged, but it has been widely reported that Morris toldfriends he created the virus that stymied military and research computers onARPANET and other networks for some 36 hours earlier this month. Meanwhile, an official with Los Alamos National Laboratory has told reporterLawrence Spohn of The Albuquerque, N.M., Tribune that his lab spent an estimated$250,000 to cleanse its computers of that virus. Security chief Jim McClary said the cost covered some 900 hours of labor toclean 400 terminals. McClary said he wasn't shocked by the virus, "but the surprising thing is howrapidly it spread ... and the amount of people and time it took to clean up." While the virus was short-lived and affected primarily computer time andpersonnel, as opposed to data or information, the incident demonstrates howvulnerable computer systems and networks can be, he said. --Charles Bowen3 HARVARD EXPERTS TO TALK WITH GRAND JURY IN "MORRIS VIRUS" CASE (Nov. 24) Cambridge, Mass., officials confirm that three Harvard computer specialistshave been called to testify before that federal grand jury in Syracuse, N.Y.,that is looking in the jamming of some 6,200 networked computers by a "virus"earlier this month. Harvard attorney Frank J. Connors tells United Press International the threearen't themselves targets of the inquiry, but rather were summoned to testifyabout their relationship with Robert T. Morris Jr., a 1988 Harvard graduate whois said to be the creator of the virus. As reported here earlier, Assistant US Attorney Andrew Baxter says Syracuse isthe only district in which a grand jury investigation of the virus case ispending. UPI says that those subpoenaed by FBI agents to appear before the grand jurynext Wednesday are assistant computer science professor Mark Friedell, computerprogrammer Andrew H. Sudduth and graduate student Paul Graham. Connors told the wire service, "The FBI served search warrants and we gavethem the computer information they requested." The the men are "simplywitnesses, not targets," he said, adding, "In the eyes of the JusticeDepartment, they may have information." Friedell was Morris' thesis adviser at Harvard. Sudduth and Graham wereworking at Harvard's Aiken Computational Laboratories on Nov. 2 when Morristelephoned from Cornell University. As noted earlier, Morris, now a graduatestudent at Cornell, is believed to have called associates for advice on how towarn other computer users and how to remove the virus. --Charles BowenMORRIS ASSOCIATES APPEAR (Dec. 1) Two Harvard University computer experts, graduate student Paul Graham andprogrammer Andrew H. Suddeth, appeared yesterday before a federal grand jury inSyracuse, N.Y., which is investigating the virus incident. Suddeth said earlier that Robert T. Morris called him in a panic for help ingetting out a message to other computer operators after he reportedly realizedwhat the virus was doing. The Associated Press says a third person subpoenaed -- Mark Friedell, anassociate professor of computer science -- was excused from testifying becausehe told prosecutors he knew nothing about the allegations of Morris' involvementwith the virus. Morris has not been subpoenaed to appear before the grand jury, lawyer ThomasGuidoboni of Washington, D.C., told the Syracuse Herald-Journal. Says AP, "Guidoboni so far has advised Morris not to talk with anyone aboutthe virus, including FBI agents. But the lawyer said an agreement may soon bereached in which an interview with agents would be arranged." --Charles Bowen From 1989 files:SPLIT SEEN ON HOW TO PROSECUTE MAN ACCUSED OF ARPANET VIRUS (Feb. 2) Authorities apparently are divided over how to prosecute Robert T. Morris Jr.,the 23- year-old Cornell University graduate student suspected of creating thevirus that stymied the national Arpanet computer network last year. The New York Times reports today these two positions at issue: -:- US Attorney Frederick J. Scullin in Syracuse, N.Y., wants to offer Morrisa plea bargain to a misdemeanor charge in exchange for information he couldprovide. Scullin reportedly already has granted Morris limited immunity in thecase. -:- Some in the US Justice Department want Morris charged with a felony inhopes of deterring similar computer attacks by others. They are angry overMorris's receiving limited immunity. Confirming a report in The Times, a source who spoke on condition of anonymitytold Associated Press writer Carolyn Skorneck the idea of granting Morrislimited immunity has "caused a lot of consternation down here." Skorneck notes the 1986 Computer Fraud and Abuse Act makes unlawful access toa government computer punishable by up to a year in jail and a $250,000 fine. Iffraud is proved, the term can reach 20 years in prison. The source told AP, "As far as we're concerned, the legal problem was still(Morris's) intent." In other words, officials apparently are uncertain whetherMorris had planned to create and spread the virus that infected some 6,000government computers on the network last Nov. 2. As reported earlier, Morris allegedly told friends he created the virus butthat he didn't intend for it to invade the Unix- based computers linked toArpanet. Skorneck says Mark M. Richard, the Justice Department official who isconsidering what charges should be brought in the case, referred questions tothe FBI, which, in turn, declined to discuss the case because it is an ongoinginvestigation. However, Skorneck's source said he understood the FBI was extremely upset overthe limited immunity granted to Morris. Meanwhile, Morris's attorney, Thomas Guidoboni of Washington, D.C., said noplea bargain had been worked out, "They have not told me," he said, "whatthey've recommended, and I've not offered on behalf of my client to plead guiltyto anything. I have told them we won't plead guilty to a felony. I'm veryemphatic about that." --Charles BowenMORRIS "WORM" WAS NEITHER GENIUS NOR CRIMINAL, COMMISSION SAYS (April 2) A Cornell University investigating commission says 23- year-old graduatestudent Robert Morris acted alone in creating the rogue program that infected upto 6,000 networked military computers last Nov. 2 and 3. In addition, the panel's 45- page report, obtained yesterday by The AssociatedPress, further concludes that while the programming by the Arnold, Md., studentwas not the work of a genius, it also was not the act of a criminal. AP says Morris, who is on a leave of absence from Cornell's doctoral program,declined to be interviewed by the investigating commission. Speculating on why Morris created the rogue program, the panel wrote, "It maysimply have been the unfocused intellectual meanderings of a hacker completelyabsorbed with his creation and unharnessed by considerations of explicit purposeor potential effect." Incidentally, the panel also pointed out what others in the industry observedlast November, that the program technically was not a "virus," which insertsitself into a host program to reproduce, but actually was a "worm," anindependent program that endlessly duplicates itself once placed in a computersystem. As reported, Morris still is being investigated by a federal grand jury inSyracuse, N.Y., and by the US Justice Department in Washington, D.C. AP says the university commission rejected the idea that Morris created theworm to point out the need for greater computer security. Says the report, "Thiswas an accidental byproduct of the event and the resulting display of mediainterest. Society does not condone burglary on the grounds that it heightensconcern about safety and security." The report said, "It is no act of genius or heroism to exploit suchweaknesses," adding that Morris, a first-year student, should have reported theflaws he discovered, which would "have been the most responsible course ofaction, and one that was supported by his colleagues." The group also believes the program could have been created by many students,graduate or undergraduate, particularly if they were aware of the Cornellsystem's well-known security flaws. The wire service quotes the report as speculating Morris probably wanted tospread the worm without detection, but did not want to clog the computers. Inthat regard, the commission said Morris clearly should have known the worm wouldreplicate uncontrollably and thus had a "reckless disregard" for theconsequences. However, the Cornell panel also disputed some industry claims that the Morrisprogram caused about $96 million in damage, "especially considering no work ordata were irretrievably lost." It said the greatest impact may be a loss oftrust among scholars who use the research network. AP says the report found that computer science professionals seem to favor"strong disciplinary measures," but the commission said punishment "should notbe so stern as to damage permanently the perpetrator's career." --Charles BowenETHICS STUDY NEEDED IN COMPUTING (April 4) A Cornell University panel says education is more effective than security inpreventing students from planting rogue programs in research networks. As reported earlier, the panel investigated the work of Cornell graduatestudent Robert Morris Jr., concluding the 23-year-old Maryland man acted aloneand never intended permanent damage when he inserted a "worm" into a nationwideresearch network last November. Speaking at a press conference late yesterday in Ithaca, N.Y., Cornell ProvostRobert Barker said, "One of the important aspects of making the report public isthat we can now use it on campus in a much fuller way than we have before." United Press International says Cornell has taken steps to improve itscomputer security since the incident, but members of the committee noted thatmoney spent on building "higher fences" was money that could not be spent oneducation. Barker said Cornell will place a greater emphasis on educating its students oncomputer ethics, and might use the recent case as an example, instead of relyingprimarily on increased security to prevent similar incidents. Said the provost,"It was the security of the national systems, and not of Cornell, that was theproblem here." As reported, Morris's worm infected up to 6,000 Unix-based computers acrossthe country. A federal grand jury in Syracuse, N.Y., investigated the case andJustice Department officials in Washington now are debating whether to prosecuteMorris. --Charles BowenMORRIS SUSPENDED FROM CORNELL (May 25) Robert T. Morris, the 23-year-old graduate student whose "worm" programbrought down some 6,000 networked government and scientific computers lastNovember, has been suspended from Cornell University. The New York Times reported today Cornell officials have ruled that Morris, afirst-year graduate student, violated the school's Code of Academic Integrity. The paper quoted a May 16 letter to Morris in which Alison P. Casarett, deanof Cornell's graduate school, said the young man will be suspended until thebeginning of the 1990 fall semester. Casarett added that if Morris wants toreapply, the decision to readmit him will be made by the graduate school'scomputer science faculty. The Times says the letter further states the decision to suspend Morris was anacademic ruling and was not related to any criminal charges Morris might face. No criminal charges have been levied against Morris so far. A federal grandjury earlier forwarded its recommendations to the US Justice Department, but noaction has been taken. As reported last month, a Cornell University commission has said Morris'action in creating and accidentally releasing the worm program into the ARPANETsystem of Unix-based computers at universities, private corporations andmilitary installations was "a juvenile act that ignored the clear potentialconsequences." While the Morris worm did not destroy data, it forced the shut- down of manyof the systems for up to two days while they were cleared of the rogue program. --Charles BowenMORRIS INDICTED IN WORM INCIDENT (July 27) A federal grand jury has indicted the 24-year-old Cornell University graduatestudent who is alleged to have released a "worm" program that temporarilycrippled the massive Internet computer network last November. Robert Tappan Morris of Arnold, Md., becomes the first person to be indictedunder the federal Computer Fraud and Abuse Act of 1986 in connection with thespread of a computer virus. In convicted, Morris faces a maximum sentence of five years in federal prisonand a $250,000 fine. Morris' attorney, Thomas A. Guidoboni, said his client willfight the charges. The virus, a worm that sought out unused memory throughout the system andrecopied itself to fill the vacant space, infected at least 6,000 computersnationwide. Internet is an unclassified, multinetwork system connecting 500networks and more than 60,000 computers around the world. The indictment, handed up yesterday in Syracuse, N.Y., charges Morris"intentionally and without authorization, accessed ... federal interestcomputers." The action, the indictment continued, "prevented the authorized use of one ormore of these federal interest computers and thereby caused a loss to one ormore others of a value aggregating $1,000 or more." The indictment said the illegally accessed computers included those at theUniversity of California at Berkeley, the Massachusetts Institute of Technology,the National Aeronautics and Space Administration, Purdue University and the USAir Force Base Logistics Command at Wright Paterson Air Force Base in Dayton,Ohio. "Mr. Morris will enter a plea of not guilty and contest the charge againsthim," Guidoboni said. He said his client "looks forward to his eventualvindication and his return to a normal life." Morris, a Harvard graduate and computer science graduate student at Cornell,is about to begin a one-year suspension from Cornell that stemmed from theincident. His father is chief computer scientist for the National ComputerSecurity Center near Baltimore. The indictment comes less than a week after the General Accounting Officefound that Internet and other similar systems remain open to attack with muchmore serious results than the temporary shutdown experienced last year. The GAO warned the Internet virus was relatively mild compared to other moredestructive viruses. It went on to recommend the President's Science Advisor andthe Office of Science and Technology Policy take the lead in developing newsecurity for Internet. In addition, the report said Congress should consider changes to the ComputerFraud and Abuse Act, or the Wire Fraud Act, to make it easier to bring chargesagainst computer saboteurs. The GAO said the Internet worm spread largely by exploiting security holes insystem software based on the Berkeley Software Distribution Unix system, themost commonly used operating system on Internet. The report from the GAO said the virus moved with startling speed. It wasfirst detected at 9 p.m. on Nov. 2. Within an hour it had spread to multiplesites and by the next morning had infected thousands of systems. According to GAO, the virus had four methods of attack. It used: -:- A debugging feature of the "Sendmail" utility program to allow the sendingof an executable program. After issuing a debug command, the virus gave ordersto copy itself. -:- A hole in another utility program -- "Fingerd," which allows users toobtain public information about other users -- to move on to distant computers. -:- Different methods to guess at user passwords. Once successful, the virus"masqueraded" as a legitimate user to spread and access other computers. -:- "Trusted host" features to spread quickly though local networks once onecomputer was penetrated. --J. Scott OrrMORRIS TO PLEAD INNOCENT (Aug. 2) Robert T. Morris Jr., the former Cornell University graduate student who wasindicted last week by a federal grand jury, will plead innocent in federal courtto charges he planted a computer worm that wrecked havoc with some 6,000computers nationwide, reports United Press International. As reported, the 24-year-old Arnold, Md., resident was indicted by the grandjury on charges of breaking a federal statute by gaining unauthorized access toa nationwide computer network and causing damage in excess of $1,000. Both federal investigators and a Cornell University panel claim Morris createdthe computer worm, which spread from the Cornell campus in Ithaca, N.Y., on Nov.2 to computers around the country, notes UPI. The worm infiltrated a Department of Defense computer system and forced manyfederal and university computers to shut down. The exact amount of damage hasnot been determined. If convicted, Morris could be sent to prison for five years and fined up to$250,000. In addition, the judge could order him to make restitution to thosewho were adversely affected by the incident. -- Cathryn ConroyPROSECUTORS ASK JUDGE NOT TO DISMISS ROBERT MORRIS "WORM" CASE (Oct. 14) Following defense allegations of prosecutorial misconduct, federal prosecutorshave filed a legal brief asking the judge not to dismiss felony charges againstformer Cornell University graduate student Robert T. Morris accused of computerfraud in last November's "worm" incident. Morris attorney Thomas Guidoboni has alleged his client's right to a fairtrial has been damaged by prosecutors allegedly leaking news to reporters. Lastmonth, Guidoboni accused federal officials of improperly revealing that Morrismade a statement to prosecutors and that officials were considering whether heshould be allowed to plead guilty to a misdemeanor. Now trial lawyer Mark Rasch of the fraud section of the Criminal Division ofthe US Department of Justice, has filed a brief asking federal Judge HowardMunson not to dismiss the charges. Steve Schaefer of United Press International reports Judge Munson hasscheduled a hearing on the issue for next Friday at US District Court for theNorthern District of New York. If Munson does not throw out the indictment, heis expected to schedule a date to begin the trial, Schaefer writes. Guidoboni's motion said there were articles in the local newspapers inSyracuse, N.Y., and that the release of the information contained in thearticles violated Department of Justice regulations and agreements between theDepartment of Justice and defense council. Schaefer notes Justice Department officials neither denied nor confirmed aprosecutor had improperly leaked information about the case, but Rasch's briefargues the defense did not offer proof of any specific harm Morris suffered as aresult of the alleged news leak. Guidoboni's other motion argues the indictment should be dismissed because itfails to allege Morris intended to cause damage or prevent the use of thecomputers. "It also alleged that the statute and indictment are vague, and failto put him on notice of what kind of conduct is illegal," Rasch said. "Ourresponse is essentially that it is neither vague nor ambiguous." The 24-year-old Morris, who is currently suspended from Cornell, is accused ofcreating the computer "worm" that invaded an estimated 6,000 computersnationwide through ARPANET, a network that links research computers at militarybases, universities and other institutions. He is the first person to be chargedwith violating a specific section of the 1986 Computer Fraud and Abuse Act. --Charles Bowen From 1990 files:ROBERT MORRIS "WORM" TRIAL BEGINS (Jan. 8) Jury selection was beginning today in Syracuse, N.Y., for the federal trial ofRobert T. Morris Jr., 24-year-old suspended Cornell University graduate studentaccused of designing and releasing a "worm" program that stymied some 6,000networked computers on Nov. 2, 1988. If convicted in this first criminal trial under the 1986 federal ComputerFraud and Abuse Act, the Arnold, Md., man faces up to five years in prison and a$250,000 fine. The New York Times reported yesterday the defense will try to demonstrateMorris's concern for computer safety by showing a videotape of a 1987 lecture hemade to officials of the National Security Agency about on how to foil computercrackers. However, the Time noted, prosecutors also might use the videotapes againstMorris. And the tape could lead testimony into classified areas. Morris, who also is the son of a chief scientist at the NSA's NationalComputer Security Center in Bethesda, Md., was indicted in July on a charge ofintentionally, without authorization, introducing a program into the militaryand research computer network. Computers shut down in the incident included some at the National Aeronauticsand Space Administration facility at Moffett Field, Calif., and the US Air ForceLogistics Command system at Wright-Patterson Air Force Base in Dayton, Ohio. Officials have said the outage cost millions of dollars in damage. The ReuterFinancial News Service says it understands that the only damage the governmentplans to allege at the trial is based on the hours needed to remove the programfrom thousands of sites across the country. Reuter added, "While Morris has refused a government offer of a trialstipulation that his actions launched the worm that clogged the computernetwork, he is not disputing that he wrote and dispatched the program." The wire service quoted papers on file in federal court as saying Morris metwith investigators and members of the US attorney's office on Dec. 1, 1988, andoutlined what happened under an agreement that the information could not be useddirectly against him. "After the meeting, the US attorney's office in Syracuse recommended Morris beallowed to plead guilty to a misdemeanor," Reuter said. "But Justice rejectedthe request and insisted the matter be handled as a felony. Morris' defenseattorney Thomas Guidoboni is expected to focus on intent." Reuter observes that the literal wording of the computer security act requiresthe government prove three separate elements, that: -:- Morris intentionally released the alleged worm program. -:- That he had no authorization to access those machines. -:- And that the unauthorized release caused a loss of at least $1,000 duringa one-year period. The wire service added that computer experts who analyzed the worm andcomments found in Morris' computer files believe the former student intended theworm to sit in different computers harmlessly, possibly flashing a message toalert users to security weaknesses. However, a small programing error caused theprogram to replicate uncontrollably, causing machines on the network to quicklybecome clogged, the experts say. About the case, computer science professor emeritus Harold Highland at theState University of New York told Associated Press writer William Kates that thetrial is a chance to garner support for tougher anti-cracker laws. "It's a no-lose situation," said Highland, who also is editor of the Computers& Security trade journal, "because the trial will showcase the weaknesses ofcomputer security and current computer security law." He said the trial will focus attention on the need for more stringent computertampering legislation. If the government loses, Highland said, computer securityadvocates "will say there is a need for stronger laws. If the government wins,they'll say he did it because the system is weak and we need to tighten up thesystem." In addition, associate professor Eugene Spafford of Purdue University, who isexpected to be a government witness, told AP that losses from computer crimes inthe United States total about $7 billion annually. "Ten years ago," he said, "these kinds of things didn't hurt anybody, but youhave to realize now all the places where computers are used and the dangersinvolved in shutting down a system or damaging data." Reports from The Associated Press and from Reuter's financial news service areavailable in the Executive News Service (GO ENS). --Charles BowenJURY SELECTED FOR MORRIS TRIAL (Jan. 9) A jury of eight women and four men has been chosen for the federal trial ofRobert T. Morris Jr., suspended Cornell University graduate student accused ofcrippling the national Internet computer network in November 1988 with a wormprogram. The first 10 potential jurors questioned yesterday from a pool of 93 weredismissed due to objections by the judge or by the lawyers. Defense attorneyThomas Guidoboni singled out for elimination jury candidates who said they hadcomputer experience. However, after the first 10 rejections, all parties were able to agree on thenext 12 candidates, finishing jury selection in less than three hours. In the major legal maneuver of the day, Justice Department lawyers filed amotion seeking to hinder Morris' expected defense that he did not intend toparalyze the network by allegedly introducing the worm. Associated Press writer William Kates reports the prosecutors asked JudgeHoward Munson to limit examination of witnesses on Morris' state of mind,specifically whether it was his intent to prevent authorized use of Internet andto cause any loss or damage to the system. Said the motion, "The evidence of lack of intent to cause loss or lack ofintent to prevent the authorized use of the victim computers, however, is simplynot relevant to any issue in this case." Judge Munson did not immediately rule on the motion. However, Kates noted thatwhen defense attorney Guidoboni raised the question of intent in a pretrialmotion to have Morris' indictment dismissed, Judge Munson rejected the argumentthat the defendant's intentions were pertinent to the indictment's legality. Guidoboni contends the federal law is unclear as to whether criminal intentmeans intent to cause damage or simply intent to gain access to computersystems. Kates says the prosecutors also asked the court to allow witnesses to explainwhat the worm program was designed to do. In a separate motion, the government said, "Evidence that Morris designedearlier versions of the computer virus are relevant to the charges." AP reportsthe earlier versions were not launched. The wire service predicts the trial will last about two weeks. The governmenthas presented the court with a list of about 20 potential witnesses andGuidoboni has named at least four witnesses in court. --Charles BowenCORNELL OFFICIAL SAYS MORRIS WORKED WEEKS ON WORM PROGRAM (Jan. 10) An official with Cornell University's computer science department hastestified that suspended graduate student Robert T. Morris worked for weekstrying to perfect a worm program that is said to be responsible for crashingthousands of networked computers on Nov. 2, 1988. Testifying yesterday in Morris' federal computer tampering trial in Syracuse,N.Y., Dean Krafft, director of computer facilities for Cornell's computerscience department, told the jury his investigation found that forms of the wormprogram existed in Morris' Cornell computer account as early as Oct. 15, 1988. According to dispatches from Associated Press writer William Kates and fromSteve Schaefer of United Press International, Kraft said those files were hiddenso they would remain undiscovered in a normal search of computer files. Krafft said he was able to uncover them as part of an exhaustive search of allcomputer science department files following the Nov. 2 disruption of some 6,000Unix-based systems on the Internet research network, including those at NASA andat Air Force facilities. Testifying before about 50 reporters and spectators in the federal courtroom,Krafft said the files in question were encrypted and in a compressed form thatwould keep somebody else from reading them. Also included in those files, he said, were the decrypted passwords of 73other computer users at Cornell. And Krafft said he found password files fromthe University of California in Berkeley, Massachusetts Institute of Technologyand Harvard University. Krafft told the court the final worm program stored in Morris' computer areaon Nov. 2 took two days to decode and an additional week to translate. The government hopes that Krafft's testimony will bolster accusations made byJustice Department trial attorney Mark Rasch in his opening statement earlieryesterday. Rasch told the jury it is the government's position that Morrislaunched a "full-scale assault" on military and research computer networks witha program purposely made "hard to defeat." Rasch said Morris "devoted a lot of time, energy and research to planning thisassault" from his computer at Cornell University in Ithaca, N.Y. "This assaultwas deliberate, it was planned, it was calculated." The prosecutor said the worm program was designed to break into as manycomputers connected to Internet as possible and that it was programmed with manydifferent ways to accomplish its goal. "It was designed to be innocuous," Rasch said. "It was designed to hide itselfto frustrate the victims of the attack. It was deliberately and consciouslydesigned to be difficult to trace back to him. He took extraordinary steps toprotect himself from being caught." Added Rasch, "Valuable computer time was lost, valuable research was lost,people could not communicate with each other, their computers were crashing.They were being assaulted from the outside." Countering the government's case, defense attorney Thomas Guidoboni said inhis opening statement that Morris had only been experimenting with computersecurity and that creation of the program did not constitute a felony. Morris "made a critical mistake and it caused the (worm) to spread much fasterthan he anticipated," Guidoboni said. But "this worm caused no permanent damageand it was not designed to cause permanent damage. ... It was designed to spreadslowly and quietly and only affect a few computers." Guidoboni said that once Morris realized the problems the program was causing,he tried unsuccessfully to stop it, then tried to notify those connected withthe network. The defense counsel also characterized Internet as a network chiefly concernedwith research and "not a network that launched missiles and sends out armies."He added, "This network was used for playing chess, sending love letters,sending recipes" as well as research. Guidoboni said Morris, whose father is chief scientist at the NationalSecurity Agency's National Computer Security Center in Fort Meade, Md., is a"bright young man" keenly interested in computer safety. The worm, the attorney said, "was an experiment that had never been donebefore. You will hear that he made a mistake, a critical mistake that causedthis (worm) to spread a lot quicker and caused its immediate discovery." "There are two sides to every story," Guidoboni said. "Mr. Morris is notcharged with assault or breaking or entering. Mr. Morris isn't charged withassaulting anyone." In fact, the lawyer said, Morris "made several importantcontributions to computer safety. This was a special concern to him." As reported earlier, the Morris trial is expected to last about two weeks. --Charles BowenMORRIS "WORM" SAID MEANT TO CRACK AS MANY COMPUTERS AS POSSIBLE (Jan. 12) A California computer analyst says the worm program that stymied 6,000networked computers 14 months ago was "designed to break into as many computersystems as possible, and be difficult to detect." Testifying at the trial of the man accused of creating that worm, KeithBostic, a computer analyst at the University of California at Berkeley, said therogue program "was designed to solve or crack computer passwords. The wormactually had as part of its program a list of passwords that it would try." And, Bostic testified, the list closely matched one that investigators saythey found in computer files maintained by 25-year-old Robert T. Morris atCornell University. Morris, a 1988 Harvard University graduate who was attending his first year ofgraduate school at Cornell, is charged with releasing the worm that crippledcomputers on the Internet and Arpanet systems Nov. 2, 1988. Reporting on the trial from Syracuse, N.Y., Steve Schaefer of United PressInternational quoted Bostic as saying the worm was designed so that if one ofthe about 430 passwords on its list did not get into a system, the program woulduse other basic information to try to crack the password. If that did not work, the witness said, the worm would use a computerizeddictionary until it found a match for the password. And, if the host computer'ssecurity was programmed to jumble passwords, the worm would try differentmethods to solve the jumble. Finally, Bostic said, the worm also was programmed to change its own name to"sh," the name of a common program in the targeted systems, and to change itsidentification number frequently, making it more difficult to detect. "It uses simple, quick, powerful attacks," Bostic said. Morris, who lives in Arnold, Md., is the first person to be prosecuted under aportion of the 1986 Computer Fraud and Abuse Act. If convicted, he faces up tofive years in prison and a $250,000 fine. --Charles BowenCORNELL CLASSMATE CALLS ROBERT MORRIS' PROGRAM "PRETTY AMAZING" (Jan. 13) It was "pretty amazing," says a Cornell University graduate student, to watchclassmate Robert T. Morris Jr. slip in and out of a computer at theMassachusetts Institute of Technology undetected. Testifying at Morris' computer tampering trial, Dawson Dean III said that fivedays before the 1988 crash of thousands of computers on national researchnetworks, Morris let him look over his shoulder at a terminal on Cornell'sIthaca, N.Y., campus and watch him enter an MIT computer. "The machine didn't know that he was logged in," Dean said. "It was prettyamazing." The 25-year-old Morris is accused of creating and releasing a "worm" programthat temporarily crippled some 6,000 Unix-based computers on the Internet andArpanet systems on Nov. 2 and 3, 1988. Covering the federal trial in Syracuse, N.Y., Steve Schaefer of United PressInternational reports Dean testified yesterday that Morris let him scan a listof more than 400 passwords Morris allegedly had discovered. Dean, an MIT graduate and doctoral candidate at Cornell, said the passwordshad been translated from an "encrypted" form into English. "There are 4,096 waysto encrypt a given password," Dean said. "He said he had done it basically tosee if it was possible to do." Dean told the jury Morris gave him the impression that a computer at Cornellspent four days running a program that Morris had designed to find the truespellings of the encrypted passwords. Said Dean, "I asked him, `Is mine in the list?' I also asked him if thepassword of this other really obnoxious graduate student was (listed)." ForJustice Department trial lawyer Ellen Meltzer, Dean confirmed in court that thelist he read that night was similar to one investigators found in computer filesMorris maintained at Cornell. Dean said Morris told him he would pursue a doctorate and career in computerlanguages and that, although he already had extensive experience in computersecurity, did not plan to write his thesis on security issues. "He told me hehad hacked around with computers before," Dean said. Then, under cross examination, Dean commented he thought Morris' efforts tobreak computer security systems were the result of an inquisitive mind. "He wasa graduate student of computer science," Dean said. "You're learning to doresearch. It's a real natural instinct to want to learn how the thing works." Schaefer also reports that in earlier testimony yesterday, William Johnston, acomputer systems manager at the Lawrence Berkeley Laboratory in California, saidthe Nov. 2 worm did not at any time endanger cancer patients at the researchcenter. However, he added, it did cost the lab more than of $10,000 to purge thesystem. Morris, the first person to be prosecuted under a portion of the 1986 ComputerFraud and Abuse Act, faces up to five years in prison and a $250,000 fine ifconvicted. --Charles BowenMORRIS JURY LEARNING ON THE JOB (Jan. 15) Members of the jury now hearing testimony in the federal computer tampering ofRobert T. Morris in Syracuse, N.Y., were selected specifically because of theirlack of knowledge about computers. When the jury was seated last week, US Justice Department lawyers EllenMeltzer and Mark Rasch and defense attorney Thomas Guidoboni interviewed 23prospective jurors to hear the case and both sides focused on computerknowledge. In fact, the only three prospective jurors who said they owned a personalcomputer were rejected. However, two jurors who worked with computers at theirjobs -- an airline reservation clerk and insurance claims processor -- wereaccepted for the panel. Law professor Theodore Hagelin of Syracuse University told Associated Presswriter William Kates it is not uncommon to fill a jury with people unfamiliarwith a subject that is central to a trial, but that it can be a gamble. "It's a trial strategy one has to decide," Hagelin said, "but you run a realrisk of losing them in the flood of information and definitions they must listento." The 25-year-old Morris is accused of unleashing a "worm" program thattemporarily immobilized some 6,000 networked Unix-based computers in November1988. Kates reports that during much of the first three days of testimony last week,"jurors listened as witnesses painstakingly tried to simplify thehigh-technology world of computers, explaining alien terms like 'e-mail,''finger demons' and 'decompilation,' or the differences among source codes,assembly codes and binary codes. Even the court reporter has struggled to keepup with the jargon." Professor Hagelin commented, "By choosing jurors that are not particularlysophisticated about technology, you create a juror pool with an open mind, or atleast you hope so." Lawyer Harold L. Burstyn, who specializing in computer law, added that onecomputer expert could contaminate the jury. "You'd have to be deathly afraidthat one individual, claiming to be an expert or being an expert, would get allthe other jurors to follow him because of his knowledge, rather than because oftheir belief in guilt or innocence," he said, adding that jurors lacking greatcomputers knowledge would be better able to follow the instructions of law givenby the judge. However, professor Hagelin noted that prosecutors must educate jurorssufficiently before ending their case. "On one level you have to get them tounderstand what happened," he said, "but on a second level you have to put it away that won't swamp them, a way that will stay in their minds when they go totheir room to deliberate. The real trick is to find the balance. They can onlyfollow so far." --Charles BowenUS ARMY FIRST THOUGHT WORM ATTACK WAS THE WORK OF A FOREIGN POWER (Jan. 17) A US Army computer specialist has told a federal jury in Syracuse, N.Y., thathis first reaction to a "worm" program in November 1988 was to think his networkwas under attack by a foreign power trying to steal weapons secrets. Testifying yesterday at the computer tampering trial of a suspended CornellUniversity student charged with creating the worm, Michael Muuss, leader of theAdvanced Computer Systems team at the US Army Ballistic Research Laboratory atAberdeen Proving Ground in Maryland, said the worm forced him to removecomputers from military and research networks at a cost of more than $53,000. Covering the trial now in its second week, Associated Press writer WilliamKates and Steve Schaefer of United Press International both quoted Muuss astestifying, "Our specific concern was that it was an attack by a foreign power.We had a real fear that someone had broken in and was trying to take data insideand send it to somebody outside, or that it would modify data." However, the attorney for Robert T. Morris, the 25-year-old Arnold, Md., manaccused of creating and releasing the worm, suggested the Army overreacted tothe situation. Muuss told the court the Army lab shut down 200 computers linked to Milnet, aglobal network that carries unclassified military data, when the worm infected amachine hooked up to the Internet research network. AP notes Milnet carriesinformation such as computational chemistry and data on improving projectilesand armors. The Army official said the research center disconnected itself from Milnetand two supercomputers at Aberdeen were shut off to outsiders for six days whilea team worked to eradicate the worm. Defense attorney Thomas Guidoboni questioned Muuss about that shutdown,asking why it lasted so long when most universities attacked by the worm wereback in operations within a few days. "At a university," Muuss replied, "the end result may have been that someonedidn't get a paper published." By contrast, he said, his computers containedinformation on the evolution of weapons to 20 years in the future. "Protectingdefense information is a critical part of the defense business. We had tocertify that no data was stolen or modified and make sure our system couldresist such an attack if it happened again." Muuss acknowledged that computer security at the lab had been improvedbecause of the worm's invasion. Earlier in the day yesterday, the jury heard testimony from computer systemmanagers at Purdue University, Carnegie-Mellon, Georgia Tech and the Universityof Rochester. Some said that, while no data was permanently lost or damaged, theworm was costly in terms of eradication and follow-up investigations. However,Daniel Nydick, a systems manager at Carnegie-Mellon, said he got rid of the wormby simply crawling under his computer and unplugging it. Meanwhile, the University of Rochester's computer lab manager, LiudvikasBukys, testified the worm forced three people at the school to work overtime tocorrect glitches and problems caused by the worm. Under cross-examination, Bukystestified that the program was not designed to destroy files or data. But Bukys' stronger comments apparently came away from the hearing of thejury. Speaking with UPI's Schaefer outside the courtroom, Bukys said he thoughtMorris ought go to prison for creating the worm, adding, "If this guy doesn'texperience some serious punishment, then it's going to be open season on oursystem. Apparently, there are people who don't have the moral backbone to say,`I'm not going to do this because it's wrong.'" Acknowledging that the defense contends the worm was an experiment gone awryand that Morris did not intend to cause any damage, Bukys said outside thecourtroom, "I find that argument rather appalling. That's arguing that burglarsare doing you a favor by showing you how crummy your locks are. This particularburglar raided every house on the block, and I guess the defense is arguing thatnow everybody in the whole neighborhood has better locks so they should feelsafer." --Charles BowenMORRIS "FRANTIC" AFTER WORM PROGRAM RELEASE, STUDENT SAYS (Jan. 18) A Harvard University graduate student says his friend, Robert T. Morris, wasfrantic after a worm program got out of control in November 1988 and beganparalyzing a national computer network. Testifying at Morris' federal computer tampering trial in Syracuse, N.Y.,yesterday, 25-year-old Paul Graham said Morris designed the worm to break intothe Internet system, but that it wasn't intended to replicate wildly as it didor to cause any damage. "It was just supposed to go from computer to computer tosee how far it could get," Graham said. "Once it got in, it wasn't supposed todo anything." Associated Press writer William Kates and Steve Schaefer of United PressInternational both quoted Graham as testifying Morris deliberately addedsafeguards to limit the growth of his program to ensure it would cause nopermanent file damage to the computers it attacked. However, said Graham, "He put in a wrong number and instead of just allowinga few copies every once-in-a-while, it made lots of copies every time." From Cornell University, where he was a graduate student, Morris telephonedGraham at Harvard on the night of the attack after realizing his worm programwas out of control. "He sounded like he had a final the next day that he hadn't studied for,"Graham said. "He sounded miserable. He sounded in a state of shock and horror."Graham added that the usually "puritanical" Morris was even using profanities. Graham said that after the worm was out of control, Morris tried to regainaccess to his computer at Cornell to try to stop it, but that his programalready had immobilized Cornell's computers, preventing him from getting backinto the system. "We thought maybe we could send out another program that could eat the wormand stop its processes," Graham said, "but there was no way to send somethingafter the virus. It wouldn't get through. It was pointless." Graham said he first learned of the worm when Morris was visiting Harvard fora weekend in late October 1988. He said Morris mentioned his plan to design aprogram to infect Internet after discovering a bug in Harvard's Unix system thatwould allow unauthorized entry. Graham said he was sitting alone in his adviser's office at Harvard whenMorris walked in and announced he had found a flaw in the Internet network. "Iwas sitting in (Professor) Mumford's office and the door opened and R.T.M.walked in and announced he had just found a big hole," Graham said. "He waspacing back and forth across the room and at the end of one of his passes acrossthe room he walked right up onto Mr. Mumford's desk. I don't think he realizedhe was standing on the desk." The witness said he also discussed the program and methods of implementing itwith Morris while they waited for a friend in front of a restaurant. "He wantedto make a virus that would spread around Internet," Graham said. "There wasnever any question of having it do anything bad." Graham added he never told anyone about Morris' worm because the plan wasmentioned to him in confidence and he hadn't realized Morris was so close tohaving it finished. He said he saw nothing wrong about what Morris was doingbecause breaking into systems is a common practice of fledgling computersecurity students. Under cross examination by the defense, Graham said Morris "specificallyintended" not to destroy any data. "If you don't have commands in your programto start files, then it's safe," Graham said. The problem, Graham testified, was in a portion of the program designed toprevent it from copying into a computer more than once, except occasionally toprevent programers from using a simple method to defeat the program. Morris madean error in that portion of the program and that glitch let it replicate out ofcontrol, Graham said. "I said, `You idiot,'" Graham testified. "It was such a great idea, and heblew it. I was really mad." --Charles BowenMORRIS CALLS HIS WORM "DISMAL FAILURE," BUT NOT MALICIOUS (Jan. 19) Testifying in his own defense, Robert T. Morris Jr. has told a federal jurythe worm program he created at Cornell University in 1988 was a "dismal failure"but that it was not intended to cause any damage to the computer networks itinvaded. The 25-year-old suspended Cornell graduate student, charged with releasing theworm that temporarily crippled some 6,000 Unix-based computers for two days,testified yesterday that he miscalculated while writing the worm program duringa three-week period in October 1988. Covering the trial in Syracuse, N.Y., Steve Schaefer of United PressInternational and Associated Press writer William Kates quoted Morris as saying,"It was an experiment. I never heard of anything similar before. My purpose wasto see if I could write a program that would spread as fast as possible." Morris, speaking publicly for the first time since the worm incident 14 monthsago, said that had his experiment worked successfully, the worm would havespread quietly and undetected over the Arpanet and Internet computer networks,but "it was a dismal failure." He said he gathered passwords from various universities and, withoutpermission, decoded them to ensure the worm would spread widely. Also, he said,he took steps to make the worm harmless and protect it from easy eradication. Morris said he let the worm enter the Internet network through computers atthe Massachusetts Institute of Technology in Cambridge. After releasing the wormfrom Cornell at about 8 p.m. on Nov. 2, 1988, he went to dinner. He returnedabout three hours later and noticed Cornell's own computer was slow to respondto commands. Then, when he found copies of the worm in the Cornell system, heknew it was spreading and was not working as planned. He said that is when hestarted to get scared. Morris said he thought about sending out a second worm to track down anddestroy the first one, but decided against it after seeing the unpredictablenature of the first worm. "I messed up the first worm and I didn't think I wouldbe able to do any better of a job," Morris said. He said he also was unsure hecould get into the computer system once the worm had begun to cripple it. So instead, he called Andrew Sudduth, a friend at Harvard University, andasked him to send a message on a computer bulletin board system read mainly byInternet users. Morris said he wanted to apologize for unleashing the worm andtell users how to eliminate it. Earlier this week, Sudduth testified he eventually did send a warning message,but that it didn't show up on the computer system for two days because the routehe picked to keep his identity a secret already was backed up with mail. Finally, Morris said he then did what many a young man in trouble do: "Iscrewed up my courage and called my father." (Morris' father is chief scientistat the top-secret National Security Agency's Computer Security Center in FortMeade, Md.) "He was not amused," Morris said, prompting laughter from his sister, also inthe courtroom. "My father advised me to come home and not talk to anybody." Under cross examination by Justice Department prosecutor Mark Rasch, Morrisacknowledged that even if the worm had worked as planned, it would have enteredcomputers he was not authorized to work with and that it would have taken timefor experts to defeat it. During the testimony, US District Judge Howard Munson asked Morris about hisprogramming mistake. Morris said a portion of the program was designed to prevent it from copyingitself into a computer more than once, except once in every seven times itreturned to an infected machine. That, he said, was intended to limit the numberof computers the worm would enter more than once, while stopping programmersfrom using a simple method to defeat it. However, he said, he made a "program error or a design error," underestimatingthe speed with which the worm would infiltrate various systems. The problem was"the choice of one in seven instead of, say, one in 1,000." Following Morris' testimony, defense attorney Thomas Guidoboni moved thatcharges against his client be dropped, contending the prosecution failed toprove two requirements of the indictment: that Morris prevented authorized useof computers and that the action cost a minimum of $1,000 in damage. However, Judge Munson denied the motion and adjourned the trial until Monday.The told the jury it could expect to hear closing arguments then. --Charles BowenJURY GETS ROBERT MORRIS WORM CASE (Jan. 22) A federal jury of nine women and three men this afternoon began deliberatingthe fate of Robert T. Morris Jr., suspended Cornell University graduate studentaccused of temporarily crippling research and military computer systems inNovember 1988 with a worm program. If convicted, the 25-year-old Arnold, Md., man -- the first person to beprosecuted under a portion of the 1986 Computer Fraud and Abuse Act -- faces upto five years in prison and a $250,000 fine. Earlier today in the Syracuse, N.Y., courtroom, Justice Department attorneyEllen Meltzer said in her closing arguments that Morris clearly unleashed hisdestructive program deliberately. Covering the closing statements, Steve Schaefer of United Press Internationalquoted Meltzer as pointing out that Morris, who claims the incident was theresult of an experiment gone awry, testified last week that he actually wrotethe program carefully to avoid detection and then set it loose. "He took each and every one of these steps to avoid ever being recognized asthe creator of this worm," Meltzer argued. She added there was no questionMorris created the worm and sent it out over the Internet network with theintention of gaining access to federal computers he was not authorized to use. Meltzer said Morris furthermore knew his program would cross state lines andthat investigating and counteracting it would take computer experts aconsiderable amount of time. She said Morris took advantage of flaws in existing computer systems, but thatthe flaws did not create the damage that witnesses from 14 institutionstestified was created by the worm. "Indeed," Meltzer said, "Robert Morris didnot put those bugs in the software, but those weaknesses did not create theworm. Robert Morris created the worm." Meltzer told the jury, "The fact that the worm did not cause permanent damageto computer files, when it could have, is not a defense to this crime. ... Eachand every one of you must understand that the worm was not merely a mistake. Itwas a crime against the government of the United States." In the defense's closing statement, Morris attorney Thomas Guidoboni said hisclient did not intend for his program to cause damage or prevent authorized useof computers on the affected networks. "The government spent a lot of time in this case proving things that weren'tin dispute," said Guidoboni. What the defendant has in this case is the truth." He said witnesses testified Morris inserted commands in the program that weredesigned to limit its growth, that Morris never intended to bring any computersdown, never intended to prevent authorized access and never intended to causeany damage. "He made a mistake. He told his friend, `I really messed up,' and Paul(Graham) said, `You idiot,'" Guidoboni said. "Paul said let's send another wormout there like a PAC man to eat it up, and he said, `No. I didn't do such a goodjob on the first one.'" "You've heard Mr. Morris, and you've heard his testimony. The government, Isubmit, hasn't made a dent in it," Guidoboni said. Schaefer noted the government said the defense argument that the worm did nopermanent damage to computer memories did not constitute a valid defense. In the government's rebuttal argument, Justice Department lawyer Mark Raschsaid, "Mr. Morris is not charged with deleting files. Mr. Morris is charged withbreaking into computers and preventing their authorized use. He certainly didthat." Rasch added that Morris' action forced experts to spend hours investigatingthe worm. "They didn't know it had no Trojan Horses in it," Rasch told the jury."They didn't know it had no trap doors or anything like that, and the reasonthey didn't know is because Robert Morris did not want them to know." Following a lunch recess, US District Judge Howard Munson instructed the juryas to the legal issues in the case. The jurors began their deliberation at 2:15p.m. EST. --Charles BowenJURY CONVICTS MORRIS IN WORM CASE (Jan. 23) More than seven hours after starting deliberation, a federal jury last nightconvicted Robert T. Morris Jr. of computer tampering. He was accused ofreleasing a worm program that caused millions of dollars in down-time and damageto computer networks in November 1988. US District Judge Howard Munson released the former Cornell Universitygraduate student on his own recognizance depending sentencing and scheduled ahearing on new motions for Feb. 27 in US District Court in Albany, N.Y. The 25-year-old Morris, now the first person ever convicted under the 1986federal Computer Fraud and Abuse Act, could be sentenced to a maximum five yearsin prison and $250,000 fine. The government can be expected to file a memorandum recommending a penalty forMorris one week before the sentencing date. Prosecutors declined to say what they will recommend. However, JusticeDepartment attorney Ellen Meltzer, who along with Mark Rasch prosecuted thecase, told Steve Schaefer of United Press International that at no time has sheor Rasch indicated they will seek the maximum penalty. "The government will file an appropriate sentencing memorandum," Rasch added."A felony is a serious offense. (The worm) has had a profound effect on users ofcomputers across the country." Defense attorney Thomas Guidoboni, expressing disappointment in the verdict,said he won't discuss possible appeals until after the hearing, where he said hewould introduce a motion for an acquittal. Morris, who lives with his family in Arnold, Md., managed only a silent smileas his family huddled with Guidoboni following the verdict. He then strode offsilently with his girlfriend as dozens of reporters asked for comments on theverdict. Meanwhile, talking outside the Syracuse, N.Y., federal courtroom where thetwo-week trial took place, the defendant's father -- Robert T. Morris Sr. --said he believed the landmark trial was fair but that he also doesn't view hisson as a criminal. Of the verdict, the elder Morris commented, "Anyone would have come to thesame conclusion. I think the trial was a fair one, and he had an opportunity tostate his case and he did so." However, the father, who is a chief scientist for the National SecurityAgency's computer security division, emphasized, "It's perfectly obvious thereis not a fraudulent or dishonest bone in his body." Schaefer noted the Morris family declined to discuss the case during the weeksof testimony and the elder Morris continued to refuse to talk about anyramifications the decision might have on his profession. He said only, "I'm moreinterested in my family and my son right at the moment." However, others in the computer industry already were talking aboutramifications of the case. Associated Press writer William Kates said the verdict "shocked" some ofMorris' friends, who said his worm program was experimental and not malicious,and that it helped the computer community by pointing out weakness in networkslike Internet. Dean Krafft, director of computer facilities for Cornell's computer sciencedepartment, where Morris was studying when he transmitted the worm, told AP,"You don't want to see him scarred for life. He's certainly a bright kid." Also Lance J. Hoffman, a professor of engineering and applied science atGeorge Washington University, said, "It's time for the computer industry to takea hard look at itself." He added that many research networks were "held togetherwith chicken wire and bubblegum." But others said they were happy with the verdict. Ludivikas Bukys, lab manager for the computer science department at theUniversity of Rochester, who testified against Morris in the trial, told Kates,"This is important. If he had been acquitted, it would have been open season forother people to do similar things." --Charles BowenMORRIS CONVICTION MAY SLOW ACTION ON SECURITY BILLS (Jan. 24) Momentum on Capitol Hill for tougher computer security laws will probably slowdown following Monday evening's guilty verdict returned against Robert TappanMorris Jr., creator of the worm program that infiltrated the Internet system in1988. According to The Washington Post, some lawmakers were concerned that theComputer Fraud and Abuse Act, enacted in 1986 and used for the first time in theMorris trial, might not be adequate to convict him since it makes no mention ofcomputer viruses or worms. Instead, The Post speculates that the Morris verdictwill send out a tough message that the computer security laws now on the booksare sufficient to convict computer criminals. Although the computer industry wants tough laws in recognition that tamperingwith the machines and networks is a serious offense, it also is concerned thatif Congress legislates too heavily, innovation will be suppressed in anover-regulated environment. "It does demonstrate that the law that they used to prosecute him iseffective," said Dennis Steinauer, virus specialist at the National Institute ofStandards and Technology. Rep. Wally Herger (R-Calif.) is the author of a House bill that would closeperceived loopholes in the Computer Fraud and Abuse Act. Although he admitsaction on the bill may be delayed since the guilty verdict, he insists stricterlaws are still needed. "Why is it after three years that we only have one conviction? I think thatthe answer to that is that it is very, very difficult with the present tool thatwe have to come up with a conviction," he told Post reporter John Burgess. Meanwhile, computer industry leaders believe the Morris conviction will send astrong message. "We really are concerned that the world stop thinking aboutthese folks as some kind of Robin Hoods," said Doug Jerger, director of thesoftware industry division of the computer services group known as Adapso."They're criminals." --Cathryn ConroyATTORNEY ASKS COURT TO THROW OUT ROBERT MORRIS' "WORM" VERDICT (Feb. 14) The attorney representing Robert T. Morris Jr. has filed a motion urging afederal court to throw out last month's guilty verdict in the highly-publicizedcomputer "worm" case, contending the prosecutor made "prejudicial" remarks atthe end of the trial. Thomas Guidoboni's motion urges federal Judge Howard Munson to eitherreconsider the evidence himself or to order a new trial. The 24-year-old Morris, a former Cornell University graduate student, wasfound guilty Jan. 22, becoming the first person ever convicted under a portionof the 1986 Computer Fraud and Abuse Act. The Arnold, Md., man was accused ofreleasing a computer worm in November 1988 that temporarily stymied thousands ofnetworked computers. Morris, yet to be sentenced, faces up to five years inprison and a possible $250,000 fine. Steve Schaefer of United Press International reports Guidoboni's motionalleges US Justice Department trial attorney Ellen Meltzer made "highlyprejudicial" remarks during her closing arguments. Specifically, he says it wasimproper for Meltzer to compare the defendant's actions to that of a terrorist. "The reference to terrorism at this trial is especially egregious," the motionsays, "because little more than a year ago, a number of Syracuse Universitystudents were killed in the crash of a Pan American World Airways jetliner overLockerbie, Scotland, due to a presumed terrorist bomb." UPI says Meltzer and fellow Justice Department lawyer Mark Rasch are expectedto respond to the motion before Feb. 27, when Munson is to rule on the motionsat a hearing scheduled for US District Court in Albany, N.Y. --Charles BowenJUDGE UPHOLDS MORRIS CONVICTION (Feb. 27) US District Judge Howard Munson today rejected defense motions to overturnlast month's conviction of computerist Robert T. Morris Jr., who created theworm program that temporarily locked up some 6,000 networked computers inNovember 1988. At an Albany, N.Y., hearing, the judge set May 4 for sentencing of Morris inSyracuse, N.Y. The 24-year-old former Cornell University graduate student, whowas the first person to be prosecuted under a portion of the 1986 Computer Fraudand Abuse Act, now could be sentenced to up to five years in prison and up to$250,000 in fines. Charles F. Porcari of United Press International reports Judge Munson ruledthat, contrary to a motion by defense attorney Thomas Guidoboni, the Syracuse,N.Y., jury in last month's trial was not prejudice by prosecutor's closingremarks that compared Morris to a "terrorist," even though 35 SyracuseUniversity students were killed 13 months before when a terrorist bomb blew upPan Am Flight 103 over Lockerbie, Scotland. Judge Munson also rejected two other defense arguments, that his instructionsto the jury were unfair and that Morris did not violate a federal law oncomputer tampering but rather he merely exceeded the authority given to him byCornell University to work with computers. Porcari says Morris, who was suspended from Cornell until September, now isworking as a programmer at Harvard University, where he earned his bachelorsdegree in early 1988. --Charles BowenMORRIS GETS 3 YEARS' PROBATION (May 5) Robert T. Morris Jr., convicted in January of releasing a worm program thatstymied networked computers for two days in November 1988, has been sentenced tothree years' probation, fined $10,000 and ordered to perform 400 hours ofcommunity service. He received no jail time. Twenty-four-year-old Morris, a suspended Cornell University graduate student,smiled broadly yesterday as the sentence was handed down by US District JudgeHoward Munson in Syracuse, N.Y. Morris hugged his mother and shook hands withhis father, then left the courthouse without comment. He had reason to be happy. As the first person convicted under the 1986federal Computer Fraud and Abuse Act, he could have been sentenced to up to fiveyears in prison and $250,000 in fines. Defense attorney Thomas Guidoboni told Steve Schaefer of United PressInternational he will appeal the conviction. "The sentence was reasonable," thelawyer said, but "we're appealing for legal reasons. We are concerned that he isnow a convicted felon." On the other side, US Attorney Frederick Scullin Jr. told Associated PressWriter Hilary Appelman he believed the sentence was fair. "This is sort of aunique circumstance. I don't feel it's going to be any sort of a precedent." Headded future computer vandals may face stricter sentences. "Would-be hackers arenow on notice that the Department of Justice will vigorously prosecute futurecomputer criminals and seek severe penalties, regardless of what their motivesare," he said. Morris, who was indicted in July 1989 on charges he introduced the worm into amilitary and research network, was found guilty by a jury Jan. 22. During histrial, he acknowledged he wrote and released the worm Nov. 2, 1988, but said itwas an accident that it replicated out of control and froze some 6,000Unix-based networked computers linked to Internet, Arpanet and Milnet. The young man remains suspended from Cornell until September. Right now, hehas been living in Cambridge, Mass., and working as a programmer at HarvardUniversity. Prior to yesterday's sentencing, David O'Brien, a lawyer representing Morris,argued for leniency, saying Morris accepted responsibility for his actions. "Themost fundamental thing that struck me about Mr. Morris," O'Brien said, "is hisbasic decency, his basic honesty. Robert is too decent of a person to try tohoodwink people out of their money. There is a world of difference betweenRobert and what other people who have abused this equipment have done." While Morris did not speak at the sentencing nor to reporters afterward, hisfather, Robert Morris Sr., a scientist at the National Computer Security Centerin Bethesda, Md., told AP he does not consider his son a criminal. "There isreal computer crime in this country," Morris Sr. said. "It is rampant andextremely expensive, and this case did not begin to touch on that." Meanwhile, other reaction to the sentence varied greatly. Writing in The Washington Post this morning, John Burgess quoted Keith Bostic,a University of California software specialist who helped stop the virus'sspread, as saying he welcomed the decision not to send Morris to jail. "He wasplaying with fire," Bostic said, "but he didn't really mean to burn anybody."Bostic was a witness for the prosecution during Morris's trial. On the other hand, Rep. Wally Herger (R-Calif.), author of legislation thatwould outlaw viruses, condemned the ruling. In a statement, Herger said, "I amvery disappointed that the sentence did not include some prison time for thisserious offense. In this ground-breaking case, we must send a strong messagethat computer virus outbreaks will be punished severely." Finally, Jude Franklin, who oversees computer security for Planning Resex.lhCorp., a McLean, Va., computer services company, told the Post he thought theprosecution and conviction of Morris would do the job of deterrence. The $10,000 fine was "severe" for a graduate student, Franklin said, adding,"Clearly he's learned a lesson and, much more importantly, the community ofbright young graduate students and really bright hackers . . . have learned thatthis is not something they can do." --Charles BowenW.VA. JURIST WANTS ROBERT MORRIS (May 8) The chief justice of West Virginia's state Supreme Court wants convictedcomputer intruder Robert T. Morris Jr. to be assigned to help develop a fastersystem to process child support payments in the state. As reported earlier, part of the federal sentence handed down to the CornellUniversity graduate student was that he perform 400 hours of "communityservice." Chief Justice Richard Neely is asking federal officials that thesentence, or part of it, be served in West Virginia. Morris, convicted in January of creating and releasing a worm program thatstymied networked computers for two days in November 1988, also was sentenced tothree years' probation and fined $10,000 under the Computer Fraud and Abuse Act. Frank Watterson, the chief federal probation officer in Albany, N.Y., toldUnited Press International it will be 10 days to two weeks before a decision ismade on how Morris will serve the public. Neely told the wire service that while watching a cable network news featurelast winter about Morris, he said to himself, "That's the kid I need." Thejustice serves on a steering committee that is developing a computer system toaccelerate the processing of child support payments. Neely said he has contacted the head of the criminal division of theDepartment of Justice, Morris's lawyer, the judge who presided at the trial andMorris's probation officer. "I said, `Look, this is no joking matter. My state desperately needs thisguy,'" Neely said. "We have women and children who are almost starving becausewe can't pay for the programmers we need to fix the child advocate and familymaster systems, both of which were mandated by federal statute. I thought backthen, that it would be a matter of him either working with us for a year orgoing to prison. But the judge realized he wasn't a vicious guy, otherwise hewouldn't have deviated from the sentencing guidelines. The kid didn't plan toscrew up everyone's disks. He had a program designed to undo what he'd done.Only it didn't work right." The justice said Morris has shown an interest in working in West Virginia,even though he is not forced to choose between that and prison. "We need anenthusiastic genius to help us work from the ground level up," Neely said. --Charles BowenJUSTICE DEPARTMENT SAYS IT WILL NOT APPEAL ROBERT MORRIS SENTENCE (June 2) The Justice Department says it has decided not to appeal last month's lightsentence of Robert T. Morris Jr., the suspended Cornell University graduatestudent convicted of releasing a worm program that paralyzed a national computernetwork for two days in November 1988. Federal prosecutors had sought jail time for Morris, but the judge sentencedthe young man to three years' probation, fined him $10,000 and ordered him toperform 400 hours of community service. Associated Press writer James Rowley says the decision not to appeal was madeafter a recommendation by Assistant Attorney General Edward S.G. Dennis Jr.,head of the criminal division. Justice Department spokesman Doug Tillett told Rowley federal authorities feltprosecutors made their point by obtaining the felony conviction. "In terms ofdeterrent value," he said, "our point was made by the fact we brought the case.It was up to the discretion of the judge to mete out a proper sentence." He added Justice officials regarded Morris as "a bright kid who shouldn't havedone what he did." The case was seen as an important test of the computer fraudlaw, he said. Defense lawyer Thomas Guidoboni told AP he was pleased about the government'sdecision not to appeal. Online Today covered the Morris case throughout. For an extensive file ofearlier stories, enter GO OLT-2180 at any prompt. And for other reports from TheAssociated Press, enter GO APO at any prompt. They also are available in theExecutive News Service (GO ENS). --Charles BowenMORRIS SENTENCED TO THE PHONE DUTY AT BOSTON BAR ASSOCIATION (Nov. 8) Robert Morris, the former Cornell University student convicted of releasing aworm that stymied thousands of government computers in 1988, is answering thephones for the Boston Bar Association. It's all part of his penalty assigned bythe judge. The Associated Press quotes Francis Moran, executive director of the barassociation, as saying the 24-year-old Morris began his telephone duties severalweeks ago. Earlier this year, Morris became the first person convicted under the 1986Computer Fraud and Abuse Act, which makes it a felony to intentionally gainunauthorized access to federal computers. Subsequently, a federal judgesentenced the Cambridge, Mass., resident to 400 hours of community service andthree years' probation. He also was fined $10,000. In his well-publicized trial, Morris testified an experiment went badly awrywhen he used a Cornell computer to unleash the worm program into the network onNov. 2, 1988. Prosecutors alleged the action caused at least $165,000 worth ofdamage. Morris, who later was suspended from Cornell, is appealing his conviction. Reports from The Associated Press are accessible by entering GO APO at anyprompt. They also are availablein the Executive News Service (GO ENS). --Charles Bowen!ssible by entering GO APO at anyprompt. They also are availablein the Executive News Service (GO ENS). --