VIRUS-L Digest   Monday,  5 Feb 1990    Volume 3 : Issue 31

Today's Topics:

Included privileges with programs
Re: Virus Modeling
Help with Using Clean! (PC)
WDEF-A report (Mac)
Re: The Ultimate Anti-Viral Solution?
Virus detection through change detection / authorization
RE:YANKEE DOODLE (PC)
Viral Help (PC)
F-PROT and Virus Buster (PC)
WDEF on campus (Mac)
Re: 4096 and 1260 Viruses (PC)
Re: Universal virus detector
Re: Statistical Distribution of Viruses
WDEF A at the USC (Mac)
AIDS Trojan - the Police charge a US Citizen
Re: Gatekeeper veto: Normal behavior or virus attack? (Mac)
Universal virus detectors: Once more with feeling
AIDS Virus Suspect Arrested Near Cleveland, Ohio
Washington Post story on Joseph Popp; FYI

VIRUS-L is a moderated, digested mail forum for discussing computer
virus issues; comp.virus is a non-digested Usenet counterpart.
Discussions are not limited to any one hardware/software platform -
diversity is welcomed.  Contributions should be relevant, concise,
polite, etc., and sent to [email protected] (that's
LEHIIBM1.BITNET for BITNET folks).  Information on accessing
anti-virus, document, and back-issue archives is distributed
periodically on the list.  Administrative mail (comments, suggestions,
and so forth) should be sent to me at: [email protected].
- Ken van Wyk

---------------------------------------------------------------------------

Date:    Fri, 02 Feb 90 09:56:13 -0500
From:    [email protected]
Subject: Included privileges with programs

Hi,

    Ben Smith had an idea to monitor actions taken by programs
and compare those actions with what the vendor says the program needs
to do in order to function.

    I hate to shoot this down but consider this hypothetical case:

"PC-DOS V8.0" includes a security monitor with a list of privileges
for "Norton Super Utilities V6".  This list has "modify memory" and
"write boot sector" listed for Norton.

    Now suppose that a virus instead of trying to modify the boot
sector by itself, modifies Norton Disk Doctor to do the dirty work?
The monitor program would allow the Disk Doctor full access to the
boot sector and not know that it was really a corrupted Disk Doctor
actually writing viral code to the boot sector instead of making
repairs like the Disk Doctor normally does.

    My point is that even if a program is allowed to perform some
action, how is the monitor supposed to know whether that action is
legitimate or not?


                      Andy Wing
                      Senior Analyst
                      Temple University School of Medicine

------------------------------

Date:    02 Feb 90 15:46:01 +0000
From:    [email protected] (Greg Fife)
Subject: Re: Virus Modeling

[email protected] writes:
>                                        As someone pointed out, a real
>computer isn't a finite state machine because it includes the person
>operating it

A human being may or may not be a finite state machine, but the
effect he he has on a computer system is merely to add a finite
number of transitions to the computer. (Striking one of the finite
number of keys changes the interrupt state on a PC, putting in
a new disk changes many of the bits on that mass storage device).

You can't model exactly which inputs the human will provide, but
you can reason about behavior under any possible set of inputs.
In effect, a person at a computer is running a huge finite
automata through an input string consisting of his actions.

Take the initial state to be one of the finite number of
states which represents the introduction of the virus into
the system.  Mark the finite number of states which represent
"infection" as final states.  The question: "can infection occur"
is merely the question "does this FA have a nonempty language."
That question can be settled in finite time by testing the FA
on every input string of length less than or equal to the number
of states in the FA.  Do this once for every initial "infection"
state, and the result follows. :-)

You may need to add a few more states to better model
the input devices and the clock.

>(well the whole universe has a finite number of states
>but we're getting way beyond anything of practical use).

Yep.

                           Greg Fife
                           [email protected] , virginia.bitnet
                           uunet!virginia!uvacs!gnf3e

------------------------------

Date:    Fri, 02 Feb 90 12:41:00 -0400
From:    Michael Greve <[email protected]>
Subject: Help with Using Clean! (PC)

   I tried using M-Jruslm on a .exe file.  After it was finally done
disinfecting the file it would no longer work.  When trying to run the
exe file my machine froze.  I have downloaded CLEANP57 and tried
running it but have been unsucessful.  I'm following the directions
that come with the program but I'm still having problems.  I'm typing
the following:

                CLEAN A:\FILE.EXE [JERUSALEM B]

When I try it this way I get "Sorry I don't know anything about
[Jerusalem B].

When I try:

               CLEAN A:\FILE.EXE JERUSALEM B

it comes back with the instructions again.  Nothing happens.  I know
I'm not using this correctly.  Can anybody help with the proper
syntax.  When it asks for the "virus name", what do I type in for
Jerusalem B.  Do I use the [] brackets.  Do I have the correct
version.  I am running CLEAN 2.7V57.  When I run it, I do get a
message saying "This program may not be used in a business,
corporation, organization, government or agency environment without a
negotiated site license."  I'm not sure if this is the problem or not.
If I have a bad version, where could I get the correct one.  I've
tried getting onto Simtel but either cannot its very busy or I end up
downloading unusable or corrupted files.  I got this from the
"130.160.20.80" list.  Does anybody know of others I can use??  I'm
new to all this so please bear with me.  Thanks for any assistance.  I
really want to get rid of this virus.

                                       Michael Greve
                                       University of Pa.
                                       Wharton Computing
                                       [email protected]

------------------------------

Date:    Fri, 02 Feb 90 10:11:00 -0500
From:    "Anne Harwell/Technology Resources Ops. Mgr." <[email protected]>
Subject: WDEF-A report (Mac)

For those of you keeping track, WDEF-A has arrived in south Texas at
University of Tecas - Pan American. I had not heard of it getting this
far south until yesterday, when a routine virus inspection of the Mac
lab revelaed WDEF-A. The infection has been disinfected and I am sure
that it will recur next week, because many of the students in the lab
had infected floppies.

Anne Harwell
Technology Resources
University of Texas Pan American
AH491D@PANAM

------------------------------

Date:    02 Feb 90 19:13:16 +0000
From:    vronay%[email protected] (David Vronay)
Subject: Re: The Ultimate Anti-Viral Solution?

Well, the idea of programs containing descriptions of their own
activity is nice, but doesn't really solve the problem.  After
all, all an infecting virus has to do is change these permission
files.  Or better yet, the virus could patch the code that did
these checks so that the code would let this particular virus
go through.  If we think about how current virus detection programs
"work", they basically do exactly what you described (only, instead
of each manufacturing describing the program's behaviour, the burden
is on the user).  Take SAM, for instance, which can keep track of
legal and illegal activities on an application-by-application basis.
When it detects illegal activity, it brings up a dialog box that says
"Allow"  "Deny" and "Learn" (or three similar options).  Clicking on
"Learn" will change SAM's description of that program to allow that
potentially-illegal action in the future.  Now, that information is
stored in SAM somewhere, where any moderately clever virus could
find it and modify it.  Now, let's go one one step further and pretend
that Symantech made it impossible (via some yet-undiscovered hardware
scheme) for SAM to be modified.  Now our virus would be forced to
use the following piece of pseudo-code:

Step 1:  Set the window-manager's port 16,000 pixels to the left
Step 2:  Set up dialog-box sniffer code that works at _vblank time.
Step 3:  Do illegal virus activity
Step 4:  SAM brings up its dialog box, which now appears about 16
        feet off the screen due to step 1.
Step 5:  The dialog sniffer from step 2 "sees" the dialog and
        generates a mouse-down event over the "Learn" button.
Step 6:  SAM writes the new exception to its special harware
Step 7:  Restore the window-manager's port to its old position.

We have now successfully infected, despite all of super-SAM's
harware whatever.

Let's face it.  There is NO WAY WHATSOEVER to make a computer
virus-proof, because there is no way that a computer can
determine the true intentions of a piece of code.  (which, in tern,
is due to the fact that code doesn't HAVE intentions, only the
programmer who wrote it has intentions, and guess what?  They
don't make it through the compile! :-)

We should concentrate our efforts on education, not complex software
solutions.  After all, computer virii seem more a social problem
than a technological one.

- - ice
==================
email replies to: [email protected]
DISCLAIMER:  Not even I subscribe to everything I say
==================

------------------------------

Date:    Fri, 02 Feb 90 14:07:03 -0500
From:    "David W. Levine" <[email protected]>
Subject: Virus detection through change detection / authorization

When we try to evaluate schemes for detecting and preventing
the spread of viruses, it's important to remember that a virus
uses those operations a user normally does to spread. If a
virus only infects programs when you do something to modify
an executable program, you now have to determine that the
modification that was made was the one you desired. That's
a correctness problem, which we know is undecidable.

Determining what's executable, on modern day systems, is
also a very hard problem. Any systems that have shell
languages, or interpreters complicate this task immeasurably.
What does a shell script look like? A text file. What does
a hyper-text stack look like? While the current generation
of micro-computer viruses live mostly in program images,
there is no requirement that this be true in the future.

We can slow down the spread of viruses through lots of
different mechanisms, but each of these mechanisms reduces
the utility of computers. As long as we want our computers
to be general purpose machines, with lots of flexibility,
the virus writers will be able to exploit a programs legitimate
capabilities to spread viruses. Distinguishing between normal,
legitimate, change and illicit change is a very difficult problem.

                          - David W. Levine

------------------------------

Date:    Fri, 02 Feb 90 17:07:19 +0000
From:    [email protected]
Subject: RE:YANKEE DOODLE (PC)

Hi,
A few weeks ago, I asked about info and disinfector for the Yankee doodle
virus on a PC. It seems nobody knows anything about it, since I haven't
got any answer, so anybody out there has any idea !!
Last week, I downloaded "CLEAN UP" from Simtel, which claims to cure many
strains including Yankee Doodle, But the only thing it manages to do is
to offer deleting the infected file. I don't want to be rude, but what's
wrong with the good old DOS ">DEL file.ext" ?. Why to bother writing code
to do what DOS can do.

O. FADEL

- ------------------------------------------------------------------------------
Research student         | JANET   :  [email protected]
Computer Science Dept.   | ARPANET :  [email protected]
Bristol University       | BITNET  :  ousama%[email protected]
BRISTOL, UK              | UUCP    :  ... !mcvax!ukc!csisles!ousama
BS8 1TR                  |
- ------------------------------------------------------------------------------

------------------------------

Date:    02 Feb 90 20:02:02 +0000
From:    James Kolasa <[email protected]>
Subject: Viral Help (PC)

I've been having some problems with some PC's at the college where I teach.
The evidence points to a virus.  Someone from IBM ran a virus scanner on
a couple PC's and got the following message:

Found signature in (master boot record of drive 80) at offset 21 (15H):
1E5080FC02721780FC047312AD2750E33C08ED8A03F04A8017503E80700
A boot record of this disk may be infected with the Stoned virus.

Does "Stoned virus" ring a bell with anyone.  Could someone give me some
backgroud info?  References to past messages will be appreciated also.

                                   Thanx,
                                    jk

- --
- --   James Kolasa                |      "Computers are so naughty,
--
- --   121 Moloney, L.C.C.         |          I could just pinch them"
--
- --   Lexington, Ky.  40506-0235  |                   -The Martian
--
- --   [email protected]   {rutgers,uunet}!ukma!jkolasa   [email protected]
--

------------------------------

Date:    Fri, 02 Feb 90 17:15:10 +0000
From:    [email protected]
Subject: F-PROT and Virus Buster (PC)

Hi,

I tried to use VB_110.ARC to disinfect some files infected with Vienna
Virus, it works on some and leaves few without even sensing that the
virus is still exist, anybody has the same experience??

Another point, Running F-FCHK.EXE on a disk containing VB.EXE it gives
the message:    VB.EXE  suspected virus Alabama. While SCAN does not
detect anything wrong, any suggestion ??

O. FADEL

- ------------------------------------------------------------------------------
Research student         | JANET   :  [email protected]
Computer Science Dept.   | ARPANET :  [email protected]
Bristol University       | BITNET  :  ousama%[email protected]
BRISTOL, UK              | UUCP    :  ... !mcvax!ukc!csisles!ousama
BS8 1TR                  |
- ------------------------------------------------------------------------------

------------------------------

Date:    Fri, 02 Feb 90 15:38:00 -0600
From:    [email protected]
Subject: WDEF on campus (Mac)

FYI

The WDEF virus has reached us here at Texas Christian University. A
student came into our User Services area to obtain virus software and
one of his disks was infected. Luckily I had installed GateKeeper Aid
the day it came out. I just wanted the list to know how far this thing
has spread.

Karen Moncrief
Sr User Services Consultant
Texas Christian University
Fort Worth, Texas 76129
AppleLink:      U1069
Bitnet:         MONCRIEF@TCUAVMS

------------------------------

Date:    Fri, 02 Feb 90 23:19:13 +0000
From:    [email protected] (David Dyer-Bennet)
Subject: Re: 4096 and 1260 Viruses (PC)

John McAfee writes:
:       The strangest part of the virus is that it is also able to
:trap all other disk reads and writes, and whenever an infected file is
:accessed by any program, the virus performs a disinfection of the
:program on the fly.
^^^^^^^ infected file?

As a BBS sysop, I find this a particularly amusing feature: it assures
my users that anything downloaded from my BBS is not infected with
this class of virus!  The concept of BBS's as *the safest* source of
software (at least in this one regard) is rather amusing.

- --
David Dyer-Bennet, [email protected]
or [email protected]
or Fidonet 1:282/341.0, (612) 721-8967 9600hst/2400/1200/300
or [email protected], ...{amdahl,hpda}!bungia!viper!terrabit!ddb

------------------------------

Date:    Fri, 02 Feb 90 16:53:56 +0000
From:    [email protected] (Peter da Silva)
Subject: Re: Universal virus detector

> For example, you can add a
> hardware-enforced switch which when in the OFF position makes it
> impossible to set the "is executable" bit at all.

So far so good.

> In this mode, you
> can't do program development, install new executables, or even copy
> executable files -

Pretty much so.

> but you absolutely can't be infected either.

Not true. What constitutes an "executable file"? Is a BASIC program one?
You can write a virus in BASIC. How about Postscript? You can hide a
virus in Postscript. You can't turn off your BASIC or Postscript
interpreters...

This is the basic sort of protection used by old Burroughs computers: only
the compilers could create executable files, and they were trusted programs.
They had no memory protection hardware at all.
- --
_--_|\  Peter da Silva. +1 713 274 5180. <[email protected]>.
/      \
\_.--._/ Xenix Support -- it's not just a job, it's an adventure!
     v  "Have you hugged your wolf today?" `-_-'


------------------------------

Date:    Fri, 02 Feb 90 22:14:19 +0000
From:    [email protected] (Peter da Silva)
Subject: Re: Statistical Distribution of Viruses

[email protected] writes:
> I have never been innoculated against Polio-myelitis.

> We no longer innoculate against Small-pox.

The two cases are not equivalent. Smallpox doesn't have a non-human
vector.  Polio does... in fact I believe that stagnant water can serve
as a reservior for Polio. So we can't "eradicate" Polio the way we
have (almost) Smallpox.

Now I'll leave it up to you folks to decide which of these should
serve as a paradigm for Viruses.
- --
_--_|\  Peter da Silva. +1 713 274 5180. <[email protected]>.
/      \
\_.--._/ Xenix Support -- it's not just a job, it's an adventure!
     v  "Have you hugged your wolf today?" `-_-'

------------------------------

Date:    Fri, 02 Feb 90 23:08:54 -0500
From:    "Gregory E. Gilbert" <[email protected]>
Subject: WDEF A at the USC (Mac)

Guess that says it all.

So far we have seen two (2) infected disks at the computer center Mac
lab.  However, there are numerous other Mac labs that are not as
concerned about viruses as we are.  I assume we will see more infected
disks.

                                               Greg.

Postal address: Gregory E. Gilbert
               Computer Services Division
               University of South Carolina
               Columbia, South Carolina   USA   29208
               (803) 777-6015
Acknowledge-To: <C0195@UNIVSCVM>

------------------------------

Date:    Fri, 02 Feb 90 07:53:00 -0700
From:    [email protected] (Alan Jay)
Subject: AIDS Trojan - the Police charge a US Citizen

Yesterday afternoon in Clevland Ohio the FBI arrested a man on
blackmail charges relating to the AIDS trojan program sent out from
the UK in December.

The suspect, Dr Popp aged 39, was arrested at his parents residence.
He will appear in court today on the blackmail charge and extradition
procedures are under way.

=========================================================================

I wonder if anybody out there knows anything more about the gentelman
concerned with this event.  If so please email me and I will summarise.

Alan Jay

PS I think it is interesting that unlike the recent 'internet' case
that the charge is blackmail.  I suspect that this is due to the
current state of UK law.

- --
Alan Jay - Editor Connectivity              The IBM PC User Group, PO Box 360,
Tel.     01-863 1191   Fax: 01-863 6095     Harrow HA1 4LQ, ENGLAND
Email:   [email protected]                Path: ..!ukc!ibmpcug!alanj
***  For all users of IBM PC & ALL Compatibles  *** (+ Standard Disclaimer)

------------------------------

Date:    Sat, 03 Feb 90 15:17:36 -0600
From:    [email protected] (Alexis Rosen)
Subject: Re: Gatekeeper veto: Normal behavior or virus attack? (Mac)

[email protected] (Norman Swenson) writes:
>I have noticed something suspiciously virus-like on my Mac II.  I was

       First the good news.
       This is almost certainly not a virus.
       To make sure, find out if the file signature of ADoBe Separator
       is ADBS. If it is, you're fine.
       Otherwise, you might have a problem.

>getting a "Serious disk error" message from Microsoft Word and garbage
>in my files when using the editor in TeXtures.  Fearing an imminent
>disk crash, I backed up my hard disk to another.  While the files were
>copying over. I got a veto message from Gatekeeper (ver 1.1.1, w
>Gatekeeper Aid).  I decided to check my disk using Disinfectant 1.5...

> ...However, whenever I try to open the Illustrator folder on the backup
>disk, I get the following veto message: 'Gatekeeper has vetoed an
>attempt by Finder to violate "Res(other)" privileges against Desktop.
>[AddResource(ADBS,0)]'.  I have isolated the behavior to the Adobe
>Separator 2.0 program.  When I remove it from that folder, I do not
>get the message.  When I put it back, I don't get the message the
>first time I open the folder, but I do every time after that.  I made
>a copy of the folder on another disk, and at first I got the same
>behavior, but after I rebooted it went away on the second disk.  I
>looked at both desktop files using resedit; one had the ADBS resource
>in it, the other did not.  Is this normal behavior, or could it be due
>to a virus that Disinfectant 1.5 is not catching?  Why would opening a
>folder require adding a resource to the desktop file?  And why did
>Gatekeeper veto it on one disk, but not the other?

   I've seen this coming ever since the GK-Aid INIT was released- but
   then again, I anticipated WDEF in a message about seven months ago,
   and all of this revolves around one concept- file signatures that look
   like code, and vice versa (I can't claim any great genius on this,
   though- I got the idea from seeing C. Weber's FKEY Manager program
   cause crashes on Cmd-Shift-0... anyone else remember that?).

   To answer your questions (as best as I can from your description), the
   Adobe Separator utility has a file signature which happens to have the
   exact same four bytes as a type of executable resource that lives in
   the system file.  Now while I've never seen the GateKeeper-Aid, I'm
   pretty certain I know exactly what it does- it prevents any resource
   which looks like executable code to the Mac OS from going into the Mac
   desktop. This is a well-defined list which includes (not surprisingly)
   WDEF.

   So what happened was, when Separator was put on your hard disk, you
   didn't have GK-Aid, and so the Separator bundle (signature ADBS) was
   added to your desktop (as it should have been). When you tried to open
   the folder containing Separator for the first time, on your other
   disk, you were running GK-Aid.  At that point, the Finder wanted to
   add the bundle resource 'ADBS' to the second disk's Desktop file, and
   GateKeeper vetoed it.

   In summary, everything is OK (as long as I'm right that Separator's
   signature is 'ADBS'). GK and the Finder are both behaving as they
   should. The folks at Adobe get the programming-fools-of-the-week award
   for picking such a bad signature. Nothing to shoot them over, though.

   If you just override GK long enough for the signature to get into the
   desktop file, it will stop bothering you (the Finder only adds a
   bundle once).

Hope this helps (and I _really_ hope it's right)--
Alexis Rosen
[email protected]
{apple,cmcl2}!panix!alexis

DISCLAIMER: IF A NEW VIRUS TRASHES YOUR DISK, DON'T BLAME ME.

------------------------------

Date:    Sat, 03 Feb 90 18:17:00 -0500
From:    [email protected]
Subject: Universal virus detectors: Once more with feeling

David Chess continues, in essense, to complain about the user
interface.  He says that determining which changes to executables were
deliberate and which not is too hard, etc.  This again misses my
point.  I was not trying to sell anyone on a "solution to the virus
problem".  I was trying to point out that the apparent THEORETICAL
impediments to virus DETECTION were in no sense basic, but were
side-effects of the particular ways we have chosen to build our
hardware and our mathematical models.  We can make other choices if we
wish.

He also asks:

       Or it could create the object that it wanted, and call the copy
       utility.  Or is it impossible for a program to copy a non-executable
       thing to an executable thing?  That would help a little, but would
       also make the system less convenient to use.  How do you get a new
       copy of the linker?  How do you write a patch program?

No, on such a system you could not copy a non-executable thing to an
executable, unless you chose to have a copy routine which was marked
"may set the 'executable' bit".  Most people do not need patch
programs - most people are not programmers.  Those who need a patch
program can give it the appropriate rights.  You create a new linker
by linking one with the old one, if you are in the business of
creating new linkers.  Or you install one, already marked as
executable, from a binary disk you got from a trusted source.

Russell Wallace has two complaints: That this technique only catches
viruses at run-time, rather than by examining the code, and that
various things he does on his Amiga, like patching code, would become
impossible.  For the first, I suggest that *I* examine code by running
it on my CPU - it's much better at looking closely at things than I
am.  Today, that's a dangerous thing to do, since the act of
examination may let a virus do damage.  On a properly built system, I
would be told if the code tried to do anything to any of my
executables.

As for patching and such: The machines I described are perfectly
capable of doing anything any current machine can do.  If you give a
patch program the right to create executable code, it will work just
as it does today.  Of course, in the process you give up some of your
protection.  Hey, if you release the safety on a gun, you could
accidentally shoot yourself.  Imagine that!

Arthur Larky writes: "Perhaps I'm Missing Something" and points out
that an MS/DOS timestamp is worthless.  Yes, he did miss something -
my article which talked about where these timestamps come from.
Sorry, not from MS/DOS or any existing software or hardware....

He also says:

       But that's what I do for a living: "program development, install new
       executables, etc."  Oh, well, one can always retire to something less
       challenging such as urban warfare.

Welcome to the real world.  Only a minority of us do program
development, a minority that is growing smaller every day.  While most
owners of PC's have to install executables, that involves a minute
fraction of the time they spend using their systems.  If a system
protected them, it would be well worth building.  As to the developers
- - they are inherently doing something riskier, and will have to watch
their systems more carefully.  With the "no new executables" switch
off, they can develop - and be infected - as always.  They still get
the hardware modification log if they want it.

       I translate this to mean "find something other than a PC or a MAC on
       which to do your computing."  True, but it doesn't solve the current
       problem for most of us.

You bet.  But, to repeat myself, I wasn't TRYING to solve anyone's
current problems - I was trying to show that a solution is POSSIBLE,
if we decide it is worth the costs.  The problems involved are
monetary/political/organizational, NOT technical.
                                                       -- Jerry

------------------------------

Date:    03 Feb 90 17:57:50 +0000
From:    [email protected] ( Dr. Robin Lake )
Subject: AIDS Virus Suspect Arrested Near Cleveland, Ohio

                        COMPUTER BLACKMAIL ALLEGED
                 Lake [County] man held on British counts

For  those of you  who don't find  the Cleveland Plain  Dealer on your
doorstep or bushes each morning ----

>From Page 1 of The Plain Dealer, Cleveland, OH, Saturday, February 3
By META McMILLAN, Staff Writer

"  A Willowick man  is being held without  bond on a federal  fugitive
warrant, pending   extradition  to England  to  face    blackmail  and
extortion  charges in connection with a   computer disk that scrambled
and stymied computer systems across Europe and Africa.

Joseph L.  Popp Jr., 39, of W.  Willowick Dr., was brought before U.S.
Magistrate Joseph    W.  Bartunek  yesterday morning,   complaining of
mental illness, to face charges that the disk he allegedly created and
mailed to  as many as 26,000 businesses  and hospitals  was part of an
elaborate blackmail scheme.

Authorities in England  are seeking to extradite  Popp under the terms
of a 1972 treaty with the United States.

Bartunek delayed the extradition hearing until after he can review two
psychiatric  evaluations  of   Popp.    The magistrate   ordered   the
examinations  --- one by a  court-appointed psychiatrist and the other
by Popp's doctor --- after Popp's lawyer told the judge his client was
suffering from mental illness and was on medication.

Bartunek  said he expected the  psychiatric  reports   to be available
within  10 days, after  which he will determine  whether  a competency
hearing is needed before an extradition hearing is scheduled.

Popp  was arrested   Thursday  without  incident  by FBI   agents  and
Willowick police at the home he shared with is parents.  A warrant for
his arrest was issued Jan.  18 by a London  magistrate.  A sealed U.S.
warrant was issued Jan.  24 by U.S. District Judge Ann Aldrich.

Scotland Yard charges that about Dec. 11, while he was in London, Popp
mailed  20,000  to  26,000  IBM  data  disks to  hospitals,  insurance
companies and major corporations.

The disks purportedly  provided information on  what individuals could
do  to reduce their  chances  of  catching acquired immune  deficiency
syndrome.

After some   computers became infected  by  the  program,  word of the
potentially destructive disks spread within days, and  AIDS researches
in the United States were put on alert.

Companies  in African nations,  England, Belgium, Denmark, Holland and
Australia received the  disks, London  officials said.   Investigators
believe no disks were mailed to the United States or Canada.

The packages containing the  disks bore a  printed warning  that users
would be billed up to $378 for use of  the disk.  Payments  were to be
sent to PC Cyborg Corp., whose address is a post office box in Panama.

Gary Arbeznik,  an     assistant  U.S.  attorney,  said  that   London
authorities had told  U.S. investigators that "when  the disk was used
in a  computer, an  AIDS  program was generated.  At   the end of that
program, the screen would go blank, except for  an invoice, which said
"if you wish to  use this computer,"  up to  $378  must be paid  to an
address in Panama.

"When the money was  paid, an antidote  would be sent," Arbeznik said,
"Until then, the machine was unusable."

Popp is believed to have used the mailing list from PC Business World,
a London computer publication, to target recipients of the disks.

Officials of PC  BUsiness World  said  a  man  identifying  himself as
"Ketema," an African businessman, contacted the magazine's circulation
department in October about purchasing part of  its mailing  list.  He
paid more than $1,000 for 7,000 names, the magazine said.  About 1,200
of those  PC  users were hit with  the virus; the  rest were warned in
time, said senior reporter Mark Hamilton.

PC Business World said Cyborg also used other mailing lists.

Cyborg's directors are listed  as  Kitain  Mekonen, Asrat Wakjira  and
Fantu Mekease.

The suit for  extradition  said  Popp  began planning the   scheme  in
February 1989, when he set up the Panama firm.  FBI spokesman Bob Hawk
said the bureau had information that Popp was  prepared to mail out an
additional 2 million disks.

Popp, soft-spoken with dark hair and flecks of gray in his dark beard,
was  handcuffed as he appeared  in  the  courtroom.  He was dressed in
loafers, faded blue jeans and  a multicolored   sweater.  His eyes  at
time darted anxiously toward the few spectators in the courtroom.

He was  rushed in  and out  of   the federal courtroom    through back
entrances.

Popp   is a  zoologist and  anthropologist  who has conducted   animal
behavior research for several international health agencies, including
UNICEF   and  the World Health  ORganization.   He  said  he was under
psychiatric  care and taking medication  for a  mental illness.  Twice
during  the  morning  hearing,   he  said   he was  not  clear   about
proceedings.

Bartunek ordered the courtroom cleared  so Popp could consult with his
lawyer, John Kilroy,  who practices  in Euclid   [Ohio].  The  meeting
lasted  several minutes, after  which Bartunek again apprised Popp  of
the charges.

Popp  said he  understood  what  they  involved   but added  "I do not
understand how  it applies to  my  case."  Kilroy unsuccessfully asked
that Popp be held in a psychiatric hospital rather than in jail.

Kilroy described Popp,   and  Ohio  State  University graduate  [1972,
biological science]  with a  doctorate  in anthropology from   Harvard
University  [1979],  as  a  respected  anthropologist  being  unfairly
painted as a criminal.

Popp  left  the World Health Organization,  a  special agency  of  the
United  Nations,  a  few weeks before  Christmas  and returned  to his
parents' home, Kilroy said.

Popp received no money  in his  endeavor to  market the   flawed disk,
Kilroy said, but  had hoped  to generate money  to conduct research on
the AIDS virus.

Kilroy  said  he did  not have  enough information  to explain why the
disks apparently had shut down computer  systems across two continents
and in some cases destroyed the information those systems contained.

He   said he had  had only  two brief  interviews with Popp  since his
arrest.

John Austen, an investigator with  the computer crimes division of New
Scotland Yard, said  Popp's actions were  motivated  by money and that
Popp could face up to 10 years in prison for  each count of blackmail.
He declined comment on whether investigators believe Popp acted alone,
but  a    recent article in  the  Times   of London referred     to an
investigation seeking four men in connection with the virus.

Popp was moved  after the hearing to  an undisclosed jail.    Bartunek
told Kilroy to  make a  list of medications  Popp  required so federal
marshals could  ensure that he  received them.  Popp has complained to
Bartunek  that  while  he was held at the  Lake  County Jail after his
arrest Thursday, he as not given proper medication.

"I am deeply disturbed at  times,"  he told Bartunek, "and  one day in
custody  ... can be  a day of disorientation."  "   Staff writers Eric
Stringfellow and Rebecca Yerak contributed to this article.  "

[Sidebar articles include  a diagram  of  a PC  with  a Computer Virus
Glossary:  "Time   bomb,  Logic bomb,  Trojan    horse,  Vaccine"; and
"Neighbors express surprise at arrest".  Summary: "Quiet, Intelligent,
Outstanding young   man.  He  was  a  real smart  kid  ...  we  didn't
socialize that much, but I always figured he would end up being a CPA.
I remember him as a real gentleman.]

------------------------------

Date:    Sun, 04 Feb 90 09:39:00 -0500
From:    <DAVID%[email protected]>
Subject: Washington Post story on Joseph Popp; FYI

From:  The Washington Post, February 4, 1990. Page 18.
Byline Reuter.

 "Cleveland, [Ohio] Feb. 3 -- An anthropologist accused of
international computer fraud involving information about AIDS and a
possible computer virus was held without bail while a judge considered
reports on his sanity, authorities said today."
 "Joseph Popp, 39, appeared before a U. S. magistrate to face charges
that the computer disk he created was part of an international
blackmail scheme, said Assistant U.S. Attorney Gary Arbeznik."
 "The Cleveland Plain Dealer said that Popp, while in England, mail
the IBM data disks to as many as 26,000 hospitals, businesses and
government agencies worldwide."
 "The disks claimed to provide information on AIDS prevention but at
the end of the computer program Popp allegedly said a computer virus
would be unleashed unless $378 was sent to a post office box in
Panama."

------------------------------

End of VIRUS-L Digest
*********************
Downloaded From P-80 International Information Systems 304-744-2253