Technology has become a fundamental part of our daily life. Nowadays, every modern process uses computers to perform their actions. Until the late 1980s, all college assignments were done either by hand, or by typewriter. Today, in the twenty-first century, everything is done on computers. In the last century, letters and telegrams were used to communicate written material over long distances. However, today just one click is enough to send a message to the other side of the world. Technology is ubiquitous; now all banks and online stores place absolute trust in the internet to make bank transfers of often astonishingly large monetary sums. However, it is not all a bed of roses for the internet. Just as every thesis has its antithesis, the internet world found its executioner in computer viruses. There are many unfortunate people who, because of computer viruses, end up losing everything, from their images and music, to valuable works, and even thesis projects. We all know about the existence of viruses, but very few of us really understand how they work, how they propagate through the web, and the magnitude of the effects of viruses on our devices and our lives.
Hated by all, the computer virus is the number one enemy of all who own a laptop, a computer, tablet, and even a smartphone. Its construction is simple but can be devastating. The virus is a piece of software based on various characteristics and with innumerable “themes.” In the same way as a biological virus, it attacks the host (in this case, the computer) and begins to infect many others to increase its reach. Basically, the virus is hidden in a program or document and is released when these files are executed. This plague of the electronic age emerged in the 1970s, initially only for programmers to demonstrate their skills. However, it ended up becoming a very lucrative criminal activity. Today, there are malware (malicious software) being spread by email or infected sites, and even by artificial intelligence, which simulates real conversations in chats to convince the victim to click on a contaminated link.1
The malicious software can be of various types, of which two are the most common in the world of computer science. Perhaps the best known type of malware is the Trojan Horse, which is as treacherous as its namesake in Greek mythology. A Trojan typically disguises itself as a normal and benevolent application during its installation. The users who receive the Trojans are convinced to install them and execute them because they have received them from a trusted source. Once executed, a Trojan can cause severe damage, such as capture of bank passwords, credit card data, social network passwords, etc. Another common group of malware are worms, a particularly harmful subclass of viruses that are distinguished by their ability to spread without human action, using all communication capabilities available in a device to self-distribute.2 Worms replicate themselves inside an infected device, creating thousands of copies of itself, in order to spread more quickly and prevent an antivirus from removing them before causing damage and contaminating other devices. Worms are also used to open ports on the infected user’s device, allowing a hacker total remote control of all available resources on the infected device.3
A colossal number of viruses churn through the internet, but among all the stories that can be told about viruses, there is one that stands out among all the others: the virus “I Love You,” the one that took advantage of the innocence of a secret message of love that destroyed 45 million computers! The story behind the catastrophic message created by Onel de Guzman, will surprise many people, including you. Without further ado, the story of one of the most lethal thesis projects in history: I Love You.4
The world did not know what was coming, but at the beginning of the new century, a cupid from cyberspace was finishing his destructive message of love. His tutor at the Faculty of Computing of the AMA college in Manila, the capital of the Philippines, was anxiously awaiting the thesis of his most outstanding student. The final text, delivered at the beginning of February in 2000, had spelling mistakes and poor writing. However, the whole thesis was a guide on how to steal secret codes through the Internet, or how to enter a foreign computer and take control of it. It was, in short, a manual for the lethal virus, which three months later was going to expose the vulnerability of the new world order of Internet and computer technologies.5On May 4, 2000 computer networks around the world were invaded by the virus that has until today earned the title of fastest propagation invader. In a matter of hours, the “Love Bug,” as the virus became known, infected more than three million machines. It came with a message in which both the subject “I Love You” and the attachment “Love-Letter-For-You” appealed to the curiosity of the recipient. To further disarm the victim’s defenses, the e-mail came almost always in the name of a friend or acquaintance.6 Although it had no destructive load, the love letter caused deep havoc by producing an unprecedented e-mail branch that congested servers around the world, causing billions of dollars of losses for companies around the world. According to the consulting company Computer Economics, the losses were around twelve million dollars.7 Not even the “Code Red” and “Sircam” viruses, which in 2001 caused an injury of 3 million and 1.5 million dollars, respectively, overcame this virus that certainly entered into history as the most devastating of the global network of computers.8
“The teachers did not like my work, they rejected my thesis. They said it was against the policy of the faculty and everything just because I used the word steal instead of access. It was a simple matter of vocabulary,” recalls the “Clyde Barrow” of computer hacking and author of one of the greatest computer disasters in history.9
The truth is that his idea was brilliant, as well as perverse. If the virus “I love you” spread so quickly, it was because everyone liked the idea of receiving an anonymous love letter. The famous love letter was the product of the disgust of a disgruntled student with his faculty, the revenge of Onel, because they rejected his thesis. Clerks, stockbrokers, politicians, firemen, or journalists, people here and there, opened the message of the supposed admirer or secret lover who began his letter proclaiming his love. Just by clicking it, the program created by Onel de Guzman began to work, that is, to eliminate. First, the virus infected the computer itself and destroyed the information on the hard disk. Then the virus forwarded the electronic message to all the addresses that the receiver had stored, in an unstoppable chain. Within twenty-four hours three million computers had been infected and within a week there were already more than 45 million computers unusable.10 Probably the final number of victims of what some experts still qualify as the most virulent, devastating, and costly virus in history, will never be known. The teachers of the AMA School of Computer Science could not believe it when, three months after receiving the thesis of their model student, they realized that the virus that was going around the world worked exactly as Onel had explained in his dissertation. His thesis, which he called “The Trojan Horse,” still circulates on the Internet today and is the bible for many computer hackers, teachers, students, and curious people.11
What happened to the author of one of the most serious cyber catastrophes in history? Absolutely nothing. The Government of the Philippines had with Onel case its first cybercrime in its history. The Philippine authorities found a total absence of cybercrime legislation with which to prosecute the alleged perpetrator. After the appearance of the virus “I love you,” the government of the Philippines created a law on computer crimes, but it could not be applied retroactively and therefore did not affect the author of the love letter.[12: Robert Frank, “Lacking Laws, The Philippines Throws Out ‘Love Bug’ Case,” Wall Street Journal – Eastern Edition, (August 22, 2000): 20.]
Onel de Guzman just needed one computer and an internet connection to be able to invade more than 45 million computers in just one week.12 De Guzman’ virus was so powerful that it was even able to penetrate one of the most powerful cybernetic systems in the world, the Pentagon of the United States of America. Yes, it is no joke, a college student was able to infect four classified military systems of one of the safest and most sheltered facilities on the planet.13 If the Philippine was able to crash one of the most powerful systems in the world, monitor financial accounts, steal personal information and messages, we must be ever vigilant before we casually click on any email attachment.14 A computer virus, like a biological one, does not distinguish social condition, economic power, political position, or any other difference. They are there, waiting for a click, which will allow them to do what they do best: destroy everything in their way. Let’s be always alert.
- Funk & Wagnalls New World Encyclopedia, August 2016, s.v. “Computer Virus.” ↵
- Roberta D. Anderson, “Viruses, Trojans, and Spyware, Oh My; The Yellow Brick Road to Coverage in the Land of Internet Oz ,” Tort Trial & Insurance Practice Law Journal no. 2 (June 2013): 529. ↵
- Salem Press Encyclopedia Of Science, January 2017, s.v.”Computer viruses and worms,” by Linda Volonino. ↵
- “I Love You’ virus,” Journal of Property Management 70, no. 2 (March 2005): 9. ↵
- Adam Cohen, “School for Hackers,” Time Magazine 155, no. 21 (May 2000): 59. ↵
- Mark Ward, “A decade on from the I Love You bug,” BBC News (May 2010), 5. ↵
- Bob Edwards, “Analysis: Projected cost of damages caused by the ‘Love Bug’ computer virus,” Morning Edition (May 2000): 23-24. ↵
- Keith A. Rhodes, Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures (Washington D.C.: U.S. General Accounting Office, 2001), 23-24. ↵
- Rajiv Chandrasekaran, “Student Proposed Virus in Thesis; ‘Love Bug’ Probe Focuses on Filipino College Senior,” The Washington Post, (May 2000): 7-8. ↵
- Frank Prince, “Love Bug’ Redux: Keeping Alert to Danger,” Community Banker Journal, (June 2000): 45. ↵
- Rajiv Chandrasekaran, “Student Proposed Virus in Thesis; ‘Love Bug’ Probe Focuses on Filipino College Senior,” The Washington Post, (May 2000): 7-8. ↵
- Bob Edwards, “Analysis: Projected cost of damages caused by the ‘Love Bug’ computer virus,” Morning Edition (May 2000): 23-24. ↵
- Mark Lander, “A Filipino Linked to ‘Love Bug’ Talks About His License to Hack,” The New York Times, (October 21, 2000): 1. ↵
- Karen D. Loch,”Threats to Information Systems: Today’s Reality, Yesterday’s Understanding,” MIS Quarterly 16, no. 2 (June 1992): 177. ↵
80 comments
Monica Avila
This article was extremely interesting. Technology has many great attributes to it, yet it being used as a weapon is quite threatening. The fact that hackers can access so many computers and lives through one simple link is both amazing and frightening. Although Onel’s professors rejected his thesis, this did not give him justification to carry out his devious plan and cause so much damage to people’s personal property. Technology is fascinating and dangerous in so many ways.
Nathan Hudson
I am a Computer Science major, more specifically, I’m specializing in cybersecurity, so you can see why this article caught my eye. This was very well written. I enjoyed reading about something that I understood. I had no idea about this man or the virus before in my life. In the 2000s it makes sense how he could infiltrate millions of computers due to the age of computers and such. You’d think that 18 years after this guy hacked millions of computers we would have a better way of keeping viruses out. I mean we do, but if hackers want to get in, they’ll get in somehow.
Seth Castillo
I enjoyed the article’s breakdown of how a virus works and the two main types of viruses, however, I would have liked a further breakdown of these two viruses targets. Viruses at the time were fairly unstoppable. Back then it took an expert in programming to do something like this, now it can be done by anyone who has the willingness to learn basic code and a vulnerable target. It’s simply amazing how much simpler it has gotten to detect and create viruses. I would assume many people would have an anti-virus program on their computer so that these amateur creatures cant make their way in. The professionals, however more than likely have bypassed almost all of our programs. This is a great article overall.
Regina De La Parra
This was a very fun article to read because of the way it was written. The tone and chosen words were perfect to tell the story of a first-class hacker. I have always been interested in the whole hacking scheme and how just with the click of a button one can do a lot. This is a very interesting article about something we’re not usually familiar with, especially if your major doesn’t relate to something about technology, etc. I am glad I clicked on this article!
Jasmine Jaramillo
This article is important because it affects everyone. These days you can’t avoid the internet that often. It’s important to know how to be safe online and how to protect your device. This article gives a perfect example of why it is important to be cautious. The damage of the ‘Love Bug’ virus is unbelievable more than 45 million computers were damaged. This all happened in 2000, I can only imagine how horrible viruses these days with all the new software capabilities. This article also shows how smart hackers are because they know how to make their virus appeal to the public. In this case, it was a love letter from contacts they knew. Which goes to show that we need to be cautious opening links even if they are from people that we know.
Cheyanne Redman
I appreciate at the beginning of the article the author broke down technology from 30 years ago to new technology, and that he explained in detail what a virus is. This helps the reader not feel as lost with the technological terms. It is absolutely crazy that a virus, one man, and one computer can do that much damage to the cyber world, or even penetrate the most secure facility on the planet through a tiny email. Being a criminology major, I don’t have much background on cyber networks or systems, so this article is a good read to help educate the ones who do not know.
Aurora Torres
Wow! Never heard of this story before…find it so interesting that a college student could cause all the massive chaos with just one click and its over. Shows to the professor who rejected his thesis…sometimes we just don’t know what one is capable of.
Sebastian Castro Ramos
Computer viruses are one of the greatest threats to privacy and cyber security of the last twenty years. As you mention, they can mean the loss of files, social media, bank and work accounts, and even sensitive information that can ease identity theft. It is impressive how devastating the Guzman’s virus was, but as you say, people’s curiosity was what made it so successful, paired with no similar precedent with such malware to make people aware that something like what Guzman made could happen. It’s never a good idea to surf through sketchy websites or open files and links from just any sender. Excellent article!
Lisa Varela
In our modern age, one is bound to pick up on “computer talk.” I knew the terms Trojan Horse and worms and I knew that they could cause serious harm. However, when things are put into numbers the damage becomes materialized. The damage that Onel de Guzman created is mind-blowing! Great article, I learned facts that I previously did not know.
Erik Shannon
This is a very interesting article. I didn’t think this could mess up everything across the board. As a computer science major, this article was a very good read. It is crazy that a virus can do that much damage to a system. Hackers create and cause viruses to access our personal information and take it and use it as their own. Overall, this was a very interesting article.