malwareThe ARPANET Era (1971-1989) Monthly Overview

    December 1987: A Pivotal Month for Cybersecurity Foundations

    Thursday, December 17, 1987

    In December 1987, the cybersecurity landscape looked like this: the early days of computer security were marked by experimentation and the emergence of a community aware of the fragility of computer systems. The previous year, in 1986, the infamous Morris Worm had drawn attention to the vulnerabilities inherent in networked systems, raising awareness about the need for robust security measures.

    One of the key developments in the realm of cybersecurity was the growing hacker culture, which was beginning to take shape during this period. Influential texts, such as the 1984 "Hacker Manifesto" by Loyd Blankenship, inspired a generation of programmers and hackers, setting the stage for a culture that valued exploration and knowledge-sharing, but also raised ethical questions regarding the boundaries of such activities.

    In academic circles, research on network security was becoming increasingly critical. The establishment of the Computer Emergency Response Team (CERT) in November 1988, although just on the horizon, was being discussed and anticipated. This initiative was aimed at addressing the growing number of computer security incidents and would become a pivotal organization in coordinating responses to breaches and vulnerabilities.

    Meanwhile, the development of early viruses was also a significant concern. The Brain virus, which emerged in 1986, was one of the first to gain widespread notoriety, and its effects were still being felt in the cybersecurity community. This virus, created by two brothers in Pakistan, infected floppy disks and was a precursor to the more sophisticated malware that would follow in the years to come.

    Additionally, the ongoing debate around encryption was heating up. As personal computing became more commonplace, discussions about protecting information from unauthorized access became increasingly relevant. The encryption methods available at the time were rudimentary, and the implications of strong encryption were beginning to be understood, foreshadowing the legislative and societal debates that would dominate the 1990s.

    Phone phreaking, the art of manipulating telephone systems, was also an integral part of the hacker culture at this time. As computer networks expanded, many phreakers began to explore the vulnerabilities of these systems, merging the worlds of telephony and computing in ways that would influence cybersecurity practices in the future.

    As December 1987 came to a close, the cybersecurity landscape was poised for dramatic changes. The growing recognition of the need for security measures, coupled with the burgeoning hacker culture and early incidents of malware, laid the groundwork for the developments that would define the field in the years to come. This month was not just a reflection of the past; it was a precursor to the challenges and innovations that awaited in the evolving digital landscape.

    Sources

    hacker culture early viruses encryption phone phreaking