vulnerabilityThe ARPANET Era (1971-1989) Monthly Overview

    The Evolving Cybersecurity Landscape of September 1987

    Tuesday, September 22, 1987

    In September 1987, the cybersecurity landscape looked like this: the early years of computing were witnessing a pivotal transformation, driven by an increase in interconnected systems and a growing awareness of security vulnerabilities.

    This period was significantly influenced by events from the previous years, particularly how the 1983 film WarGames had dramatized the potential consequences of hacking and the vulnerability of military systems. The film fueled public interest in hacking culture and cybersecurity, highlighting the capabilities of young hackers and the implications of unauthorized access to computer systems.

    By this time, the hacker community was beginning to form a distinct identity, influenced by the Hacker Manifesto published in 1984, which articulated the philosophy of many early hackers. This manifesto laid the groundwork for a community that viewed hacking not merely as a crime but as an exploration of the digital landscape, a notion that would shape hacking culture for decades to come.

    In terms of actual threats, the early signs of malware were starting to surface. In 1986, the Brain virus had made headlines as one of the first known computer viruses to infect MS-DOS systems, signaling the emergence of malicious software that could spread beyond isolated systems. This was a harbinger of the more sophisticated threats that would follow, such as the infamous Morris Worm, which would emerge the following year and lead to significant disruptions across the ARPANET.

    September 1987 also saw the continued evolution of phone phreaking, where individuals exploited telephone systems to make free calls or gain unauthorized access. This underground culture was often intertwined with the hacker community, as both groups shared similar skills and motivations. The skills developed in phone phreaking were frequently transferable to computer hacking, reinforcing the notion that security vulnerabilities were widespread across multiple systems.

    Academically, research into encryption and security protocols was gaining traction. The debate over public vs. private encryption methods was heating up, as scholars and practitioners began to realize the importance of cryptographic techniques in securing communications and data. This discourse would eventually lead to the establishment of more formalized security practices and policies in later years.

    While no significant breaches or malware incidents were reported this specific week, the groundwork was being laid for the challenges that lay ahead. The establishment of the Computer Emergency Response Team (CERT) in November 1988, which would be a direct response to the threats emerging from the hacking community, was in its infancy, and discussions around creating a centralized body for addressing cybersecurity incidents were beginning to take shape.

    In summary, September 1987 was a month of transition in the cybersecurity realm, characterized by a growing awareness of vulnerabilities, the emergence of hacking culture, and the beginnings of organized responses to these new threats. As we look back, it is clear that this period set the stage for the challenges and developments that would define cybersecurity in the years to come.

    Sources

    hacking malware phone phreaking encryption history