NP Troubling Implications of Internet's Ubiquity (WORMS!)
Jill Adams
grladams at teleport.com
Thu Jul 8 11:02:04 CDT 1999
Monday, July 5, 1999
DIGITAL NATION
Troubling Implications of Internet's Ubiquity
By Gary Chapman
Copyright 1999, The Los Angeles Times
Early last month, institutions around the world were crippled for
several days by a new computer virus called the ExploreZip Trojan
horse. A Trojan horse, in computer jargon, is a nasty software
program that hides inside a file a user is likely to want to see or
open.
The ExploreZip virus -- more accurately, a computer "worm," which
spreads more automatically than a virus -- affected machines running
Microsoft's Windows operating system and Windows application
software. Computers throughout the world were shut down, including
some at Microsoft and other large corporations as well as the
Pentagon.
The ExploreZip worm was a more debilitating version of the Melissa
virus that struck Windows machines earlier this year. Because of the
apparent vulnerability of Windows-based machines, some computer
experts have started to use the metaphor of a "monoculture" to
describe our current computing predicament.
The word "monoculture" comes from ecology and biology, another
example of the merging of biological terms with computer jargon, like
"virus" and "worm." In ecology, monoculture refers to the dominance
or exclusive prevalence of a single species or genetic type in an
ecological system -- a state typically regarded as pathological and
dangerous. Agricultural monocultures, for example, are highly
susceptible to blight, soil depletion, disease and other disasters.
In computing, the recent use of the term has referred to the
widespread dominance of Microsoft products. But we may want to extend
the metaphor further and contemplate whether we're developing a
universal digital monoculture, one with a troubling potential for
negative side effects. Think of it as the perils of digital
convergence.
By now, nearly everyone assumes that almost everything we do will be
absorbed into the digital "infosphere" -- as in IBM's advertising
phrase "Connecting everything to everything." It's only a matter of
time before television, radio, music, games, commerce and politics
are assimilated into the Internet.
This phenomenon is growing every day. We're about to step into the
so-called "post-PC" era, when networked computing will permeate our
homes and everyday objects such as refrigerators, telephones, cars
and stereos. This model is known as "ubiquitous" or "pervasive"
computing, when the Internet will be present in everything and
everywhere.
But few people stop to think of the vulnerabilities this might entail.
Recently there's been a controversy on the Internet over a new
product called Third Voice (http://www.thirdvoice.com), from a
company of the same name based in Redwood City, Calif. Third Voice is
a free browser plug-in (currently it only works with Windows and
Microsoft Internet Explorer 4.0) that allows users to create and see
notes or messages attached to Web pages by other, independent users.
The messages attached to pages are listed in a small menu bar on the
left of the browser screen. When the list is clicked, the messages
pop up over the Web page like digital Post-It notes. Third Voice
advertises its product as a way for users to have their own say about
Web content. Others have called it, pejoratively, "Web graffiti."
The controversy was generated by Web masters and Web designers who
don't like having their pages "defaced" by this product -- it puts
the appearance of their pages beyond their control, and, some of them
argue, it may be a copyright violation.
The interesting thing about Third Voice, however, is how it works.
The content of the Web page it modifies is not altered on the
originating server. The messages are simply stored on Third Voice's
own computers and merged with the Web page when a Third Voice user
requests the page. The messages then become a kind of "overlay" on
the original content, which is otherwise unaltered and available for
viewing by other users in its original form.
It will be interesting to see if this product provokes litigation and
if so, how that unfolds. But the real impact of Third Voice, along
with the recent viruses we've seen, is their demonstration of the
malleability of digital data, especially given their common format on
the Internet.
As we embed the Internet into everything we do and use, it's as if
we're building a global nervous system that can be tweaked or
twitched in infinite, unexpected and perhaps unpleasant ways by
anyone clever enough and using the right tools.
One could use the examples of Third Voice, viruses and the hundreds
of automated network "agents," or "bots" -- software programs that
roam the Internet and perform tasks specified by their users -- to
speculate on mind-boggling scenarios for the future.
Financial data, for example, could be manipulated in truly scary ways
that might not be detectable before serious damage is done. Digital
products might alter the appearance of videos or images or the
content of sound recordings. Companies could use digital copyright
management schemes that would allow automated network searches for
and prosecution of people holding unauthorized material. "Smart"
electrical power grids could be tempting targets for hackers and
virus programmers.
There was a case involving a pair of Armenian activists who
programmed a bot to replace the word "Turkey" with the word
"genocide" in all Usenet newsgroup postings (unwittingly producing
some odd online recipes for genocide). When two Arizona attorneys
introduced the first case of commercial spam by broadcasting e-mail
that advertised their firm, one programmer threatened to retaliate by
whipping up a "kill bot" that would seek out and delete any future
e-mail from the firm.
In other words, a digital monoculture makes us vulnerable to all
sorts of manipulations that have not been possible before. The more
ubiquitous this monoculture becomes, the more vulnerable we will be.
The year 2000 bug is probably the best example, but it's only the tip
of the proverbial iceberg.
The real problem is our unreflective rush into a digital monoculture,
a new kind of ecological hazard, using systems so complex, malleable
and unpredictable that almost no one understands the danger looming.
Gary Chapman is director of the 21st Century Project at the
University of Texas at Austin. He can be reached at
gary.chapman at mail.utexas.edu.
------------------------------------------
To subscribe to a listserv that forwards copies of Gary Chapman's
published articles, including his column "Digital Nation" in The Los
Angeles Times, send mail to:
listproc at mcfeeley.cc.utexas.edu
Leave the subject line blank. In the first line of the message, put:
Subscribe Chapman [First name] [Last name]
Leave out the brackets, just put your name after Chapman.
Send this message.
More information about the Pynchon-l
mailing list