industryThe ARPANET Era (1971-1989) Monthly Overview

    Reflections on Cybersecurity as 1987 Comes to a Close

    Tuesday, December 29, 1987

    In December 1987, the cybersecurity landscape looked like this: The year had been pivotal for the evolution of computing security, marked by significant developments in technology, culture, and emerging threats.

    The year began with the aftermath of the infamous Morris Worm, which had wreaked havoc on the ARPANET in late 1988. Although it was not yet widely recognized in December 1987, the groundwork for this significant event was being laid, as early computer scientists began to grasp the implications of networked systems and their vulnerabilities. The worm, created by Robert Tappan Morris, would later highlight the critical need for robust security measures in an increasingly interconnected world.

    In the realm of malware, the Brain virus had already made its debut earlier in 1986, marking one of the first instances of a computer virus affecting personal computers. Brain was noteworthy not just for its malicious intent but also for the way it spread through floppy disks, foreshadowing the challenges that would arise in protecting personal computing environments against viruses.

    The hacker culture was burgeoning during this period, fueled by the publication of the Hacker Manifesto in 1984, which articulated the motivations behind hacking. This cultural movement was not just about breaking into systems; it was also about exploring the capabilities of computers and challenging the status quo. As more individuals became aware of the potential for both creativity and disruption in the digital realm, discussions surrounding ethics in hacking began to surface.

    In the academic sphere, researchers were increasingly concerned about security vulnerabilities. The establishment of the Computer Emergency Response Team Coordination Center (CERT/CC) in November 1988, though not yet widely recognized in December, was a response to the urgent need for a structured approach to cybersecurity incidents. This initiative would later play a crucial role in providing guidance and support to organizations facing cyber threats.

    The year also saw the rise of phone phreaking, where hackers exploited the telephone system to make free calls and manipulate telecommunications networks. This activity exemplified the creativity and resourcefulness of early hackers, who were beginning to understand the implications of technology beyond mere computing. The intersection of telephony and computing security would become an important focus in the years to come.

    As 1987 came to a close, conversations around encryption were gaining momentum. The debates around the use of strong encryption for securing communications were intensifying, especially in light of concerns from government agencies about potential misuse by criminals and foreign adversaries. These discussions would set the stage for future legal and policy battles over encryption, privacy, and the balance between security and freedom.

    In summary, December 1987 was a crucial time in the history of cybersecurity, characterized by a growing awareness of vulnerabilities, the emergence of malware, and the evolution of hacker culture. As the field began to solidify its foundations, the events of the coming year would further accelerate the development of cybersecurity as we know it today.

    Sources

    cybersecurity ARPANET hacking malware encryption