A Brief History of Internet Hoaxes
A Brief History of Internet Hoaxes
Any one who uses email these days is well-known with the omnipresent spam fills up your inbox or your junk briefcase (if you are a bit more savvy). Worse than the "normal" spam are the hoaxes and urban legends that are sent out by well meaning but uninformed friends and family. I get some of these each month. I have worked hard to keep them to a minimum and have alienated some of my friends in the process. Have you ever wondered where or who started the hoaxes and urban legends. I mean who made up the first internet hoax? What was it? I wondered about it so I did some research. Here's what I found.
Discs Fiber
The First Hoax
Computer Incident Advisory ability (Ciac.org) has been providing the U.S. Division of energy with incident response, reporting and tracking of computer protection incidents since 1989. According to Ciac, the first known internet hoax was perpetrated in October of 1988 and was the so-called "2400 baud modem virus". The actual text of the hoax is shown below:
===================================================
Subj: in effect Nasty Virus
Area: normal (1)
I've just discovered probably the world's worst computer virus yet. I had just fulfilled, a late night session of Bbs'ing and file treading when I exited Telix 3 and attempted to run pkxarc to unarc the software I had downloaded. Next thing I knew my hard disk was seeking all over and it was apparently writing random sectors. Thank god for strong coffee and a recent backup. Everything was back to normal, so I called the Bbs again and downloaded a file. When I went to use ddir to list the directory, my hard disk was getting trashed again. I tried Procomm Plus Td and also Pc Talk 3. Same results every time. Something was up so I hooked up to my test equipment and dissimilar modems (I do investigate and improvement for a local computer telecommunications enterprise and have an in-house lab at my disposal). After other hour of corrupted hard drives I found what I think is the world's worst computer virus yet. The virus distributes itself on the modem sub-carrier present in all 2400 baud and up modems. The sub-carrier is used for Rom and register debugging purposes only, and otherwise serves no othr (sp) purpose. The virus sets a bit pattern in one of the internal modem registers, but it seemed to screw up the other registers on my Usr. A modem that has been "infected" with this virus will then transmit the virus to other modems that use a subcarrier (I suppose those who use 300 and 1200 baud modems should be immune). The virus then attaches itself to all binary incoming data and infects the host computer's hard disk. The only way to get rid of this virus is to wholly reset all the modem registers by hand, but I haven't found a way to vaccinate a modem against the virus, but there is the possibility of construction a subcarrier filter. I am calling on a 1200 baud modem to enter this message, and have advised the sysops of the two other boards(names withheld). I don't know how this virus originated, but I'm sure it is the work of person in the computer telecommunications field such as myself. Probably the best thing to do now is to stick to 1200 baud until we shape this thing out.
===================================================
Now for those of you that are unfamiliar with modems from that time period, the 2400 baud modem was the most recent technology in 1988. It is inescapable that the hoax didn't propagate to nearly the degree that a similar hoax would today but in its day this hoax caused its share of headaches. On a lighter note, the 2400 baud modem hoax also spawned the spoof hoax shown below.
===================================================
Date: 11-31-88 (24:60) Number: 32769
To: All Refer#: None
From: Robert Morris Iii Read: (N/A)
Subj: Virus Alert Status: collective Message
Warning: There's a new virus on the loose that's worse than anything I've seen before! It gets in straight through the power line, riding on the powerline 60 Hz subcarrier. It works by changing the serial port pinouts, and by reversing the direction one's disks spin. Over 300,000 systems have been hit by it here in Murphy, West Dakota alone! And that's just in the last 12 minutes.
It attacks Dos, Unix, Tops-20, Apple-Ii, Vms, Mvs, Multics, Mac, Rsx-11, Its, Trs-80, and Vhs systems.
To preclude the spresd of the worm:
1) Don't use the powerline.
2) Don't use batteries either, since there are rumors that this virus has invaded most major battery plants and is infecting the inescapable poles of the batteries. (You might try hooking up just the negative pole.)
3) Don't upload or download files.
4) Don't store files on floppy disks or hard disks.
5) Don't read messages. Not even this one!
6) Don't use serial ports, modems, or phone lines.
7) Don't use keyboards, screens, or printers.
8) Don't use switches, Cpus, memories, microprocessors, or mainframes.
9) Don't use electric lights, electric or gas heat or airconditioning, running water, writing, fire, clothing or the wheel.
I'm sure if we are all specific to follow these 9 easy steps, this virus can be eradicated, and the high-priced electronic fluids of our computers can be kept pure.
---Rtm Iii
===================================================
So that's where it started. From that humble starting the creative hoaxsters colse to the world have conjured forth the likes of these...
Bill Gates 00 giveaway
It takes guts to Say "Jesus"
Then there's my personal favorite...
Clinton got rid of Irs -- no more taxes
For more data on the silly hoaxes that people buy into checkout hoaxbusters.ciac.org. But if you in effect want to do yourself and your friends a favor take the following tips to heart.
Any piece of email that has the ask to "send this to everybody you know" is a hoax or just a useless chain letter.Hoaxes can also be identified by two factors that all the time occur together. Those factors are technical sounding language together with credibility by association. (e.g. "The engineers at Bell Labs and Ibm have considered that....")Chain letters can be identified in effect by using a bit of coarse sense. Look for the "hook". For example, the "A little girl is dying" chain letter hooks you with a sympathetic story. Once you've found the hook refer to tip #1. Save your relationships with your friends and family...forward this narrative to everybody you know. (Just kidding!)
A Brief History of Internet Hoaxes
Check Price on - Discs Fiber Products
Single Bowl Kitchen Sink Stainless Steel Gauge - Undermount - Double Bowl Kitchen Sink Stainless