Knowledge

AF/91

Source đź“ť

209:
and affecting its messaging software. The U.S. military, which had mostly committed to using Windows for their computer programs, became increasingly concerned about AF/91 potentially reaching them, hence why it was mentioned at FOSE. Though the NSA was said to have considered any computer with
58:
is not known to have used a strategy similar to this in the Gulf War. Despite its publication date and the article clarifying it was for April Fools' Day, the story drew significant media attention, with several sources erroneously describing AF/91 as real well into the early 2000s.
343:, one section described AF/91 as though it was real, although it was not referred to by name. When questioned on the topic, writer Brian Duffy claimed his sources were unnamed "senior level intelligence officers", and stated he had "no doubt" that AF/91 existed. 210:
windowing technology to be "doomed", computers infected by AF/91 could last up to four years if used very infrequently due to the virus' neural network requiring continuous use to learn, potentially long enough for the NSA to develop dedicated
355:
column that he believed it resulted from "a creepy enthusiasm" for unusual weapons, the competitiveness of the media to report "the hot scoop", and the "uniquely American" belief that technology is the answer to everything.
190:—which was supposedly delayed just so AF/91 could be smuggled into Iraq and start working—at which point it was activated, disabling Iraqi air defenses and rendering half of their computers and printers unserviceable. 150:
but required lengthy periods of time to work as intended, even after its activation time was reduced by 75%, reportedly taking several weeks to set up, learn, and activate on systems operating 24 hours every day.
371:, were cloaked in printers and other office equipment similar to how the original article said AF/91 was smuggled into Iraq, with such viruses often effective against Windows and 202: 75:
magazine volume 13, issue 13. Gantz claimed in the article that he had first heard of AF/91 in a conversation he overheard at the 1991 Federal Office Systems Expo (FOSE), a
351:
Technology writer George Smith, remarking on the wide acceptability of AF/91's existence as fact in spite of clear evidence of its fictional nature, wrote in his
738: 685: 205:, allowing the virus to spread rapidly. By then, the virus had "mutated", capable of permanently embedding itself into a computer's 363:
revisited Gantz's story, this time reporting that viruses similar to AF/91 had actually been developed. The real unnamed viruses,
255: 186:. After infecting an Iraqi air defense site, AF/91 remained dormant in Iraqi computer systems until the opening stages of the 506: 33: 445: 733: 723: 634: 555: 163: 82:
convention. Most other details relating to AF/91 came from an unnamed friend, who Gantz claimed was employed as a
659: 404: 233:
additions were made to the story of AF/91 that were not present in Gantz's original article, including that:
616: 335: 183: 728: 319: 748: 101: 67:
AF/91 originated from the article "Meta-Virus Set to Unleash Plague on Windows 3.0 Users" written by
364: 238: 167: 155: 105: 288:
reported AF/91's existence as though it was real, with the story presented as an early example of
76: 753: 743: 516: 308: 187: 718: 8: 547: 368: 262: 171: 97: 51: 259: 217:
At the end of the article, Gantz revealed the secret of what "AF/91" meant: "91 is the
211: 159: 109: 83: 640: 630: 591: 561: 551: 511: 314: 242: 132: 327: 293: 135: 251:
AF/91 was installed in the printer itself, not separate software that came with it
583: 194: 117: 79: 112:, apparently literally "gobbling them at the edges", ultimately overloading the 272: 206: 143: 131:
were noted to be especially vulnerable to the virus, as were computers running
29: 543:
The Next World War: Computers Are the Weapons and the Front Line Is Everywhere
455: 712: 595: 450: 352: 166:
operations. In the lead-up to Operation Desert Storm, AF/91 was installed on
147: 128: 55: 644: 565: 289: 90: 626: 620: 541: 218: 201:
brought several infected printers with them; these were then used by the
139: 37: 480: 622:
Triumph Without Victory: The Unreported History of the Persian Gulf War
341:
Triumph Without Victory: The Unreported History of the Persian Gulf War
285: 230: 113: 93: 25: 409: 302: 46: 292:. Media outlets said to have reported on AF/91 as fact included the 248:
The software AF/91 was installed on was specifically a computer chip
690: 125: 41: 16:
Fake computer virus envisioned as an April Fools' Day joke in 1991
179: 193:
However, AF/91 unintentionally made its way out of Iraq after
372: 203:
Ministry of Information and Communications Technology of Iran
121: 615: 312:. Others that erroneously presented AF/91 as real included 198: 175: 297: 405:"Meta-Virus Set to Unleash Plague on Windows 3.0 Users" 54:
joke; in reality, no such virus ever existed, and the
89:
AF/91 was described as a "meta-virus" designed as a "
142:(as mentioned in the article's title). AF/91 used a 162:during the Gulf War as part of the U.S. military's 271:AF/91 actually failed, being destroyed after the 71:editor John Gantz, published on April 1, 1991 in 710: 439: 437: 435: 433: 431: 429: 427: 330:analyst in a paper about Russian cyberwarfare. 268:The printers used in the operation were French 284:Though AF/91 was intended as a joke, several 424: 306:, and several American newspapers such as 279: 483:. Granite Island Group. February 12, 2003 683: 581: 584:"Pentagon's 'Kill Switch': Urban Myth?" 120:and permanently freezing the computer. 108:". AF/91 was claimed to be able to eat 739:Computer-related introductions in 1991 711: 504: 241:unit inserted the virus into a dug-up 158:(NSA) developed AF/91 to defeat Iraqi 100:systems by "attacking the software in 86:automated data processing specialist. 657: 539: 443: 402: 577: 575: 535: 533: 500: 498: 475: 473: 398: 396: 394: 392: 390: 388: 224: 34:United States Intelligence Community 13: 684:Moynihan, Michael (May 29, 2013). 658:Lemos, Robert (December 1, 2010). 318:in their March 1999 issue, author 14: 765: 572: 530: 495: 470: 446:"Iraqi Cyberwar: an Ageless Joke" 385: 164:Suppression of Enemy Air Defenses 444:Smith, George (March 10, 2003). 44:. The hoax originated in a 1991 660:"Attack of the Trojan printers" 582:Hambling, David (May 2, 2000). 245:connected to Iraqi air defenses 677: 651: 609: 275:bombed the building storing it 254:The Iraqi system targeted was 154:According to the article, the 62: 1: 403:Gantz, John (April 1, 1991). 378: 617:U.S. News & World Report 336:U.S. News & World Report 7: 184:Central Intelligence Agency 32:purportedly created by the 10: 770: 625:(1st ed.). New York: 505:Wilson, Jim (March 1999). 346: 724:1991 in military history 239:U.S. Army Special Forces 156:National Security Agency 50:article published as an 280:Media misinterpretation 221:for April Fool's Day." 146:that learned with each 77:U.S. federal government 734:April Fools' Day jokes 138:, namely the then-new 96:" and used to disable 686:"You're Being Hacked" 540:Adams, James (1998). 517:Hearst Communications 507:"Information Warfare" 309:The Commercial Appeal 188:Gulf War air campaign 619:(February 4, 1992). 548:Simon & Schuster 197:pilots deserting to 369:penetration testing 263:command and control 229:Over time, several 160:air defense systems 106:display controllers 69:Tech Street Journal 324:The Next World War 260:Iraqi Armed Forces 214:to counter AF/91. 212:antivirus software 174:and smuggled into 98:real-time computer 729:April 1991 events 512:Popular Mechanics 322:in his 1998 book 315:Popular Mechanics 243:fiber-optic cable 225:Further additions 136:operating systems 133:Microsoft Windows 761: 749:Gulf War fiction 703: 702: 700: 698: 681: 675: 674: 672: 670: 655: 649: 648: 613: 607: 606: 604: 602: 579: 570: 569: 537: 528: 527: 525: 523: 502: 493: 492: 490: 488: 477: 468: 467: 465: 463: 454:. Archived from 441: 422: 421: 419: 417: 400: 328:Hudson Institute 294:Associated Press 91:machine-language 52:April Fools' Day 769: 768: 764: 763: 762: 760: 759: 758: 709: 708: 707: 706: 696: 694: 682: 678: 668: 666: 656: 652: 637: 614: 610: 600: 598: 580: 573: 558: 538: 531: 521: 519: 503: 496: 486: 484: 479: 478: 471: 461: 459: 458:on June 5, 2003 442: 425: 415: 413: 401: 386: 381: 349: 282: 227: 195:Iraqi Air Force 170:software for a 118:broadcast storm 80:office supplies 65: 17: 12: 11: 5: 767: 757: 756: 751: 746: 741: 736: 731: 726: 721: 705: 704: 676: 650: 635: 608: 571: 556: 529: 494: 469: 423: 383: 382: 380: 377: 367:developed for 348: 345: 281: 278: 277: 276: 273:U.S. Air Force 269: 266: 252: 249: 246: 226: 223: 207:display device 144:neural network 129:computer chips 64: 61: 30:computer virus 28:surrounding a 15: 9: 6: 4: 3: 2: 766: 755: 752: 750: 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 720: 717: 716: 714: 693: 692: 687: 680: 665: 661: 654: 646: 642: 638: 636:0-8129-1948-3 632: 628: 624: 623: 618: 612: 597: 593: 589: 585: 578: 576: 567: 563: 559: 557:0-684-83452-9 553: 549: 545: 544: 536: 534: 518: 514: 513: 508: 501: 499: 482: 476: 474: 457: 453: 452: 451:SecurityFocus 447: 440: 438: 436: 434: 432: 430: 428: 412: 411: 406: 399: 397: 395: 393: 391: 389: 384: 376: 374: 370: 366: 365:Trojan horses 362: 357: 354: 353:SecurityFocus 344: 342: 339:'s 1992 book 338: 337: 331: 329: 325: 321: 317: 316: 311: 310: 305: 304: 299: 295: 291: 287: 274: 270: 267: 264: 261: 258:, the actual 257: 253: 250: 247: 244: 240: 236: 235: 234: 232: 222: 220: 215: 213: 208: 204: 200: 196: 191: 189: 185: 181: 177: 173: 169: 165: 161: 157: 152: 149: 148:machine cycle 145: 141: 137: 134: 130: 127: 123: 119: 115: 111: 107: 103: 99: 95: 92: 87: 85: 81: 78: 74: 70: 60: 57: 56:U.S. military 53: 49: 48: 43: 39: 35: 31: 27: 23: 19: 754:Virus hoaxes 744:Cyberwarfare 697:February 17, 695:. Retrieved 689: 679: 669:February 17, 667:. Retrieved 663: 653: 621: 611: 601:February 17, 599:. Retrieved 587: 546:. New York: 542: 522:February 17, 520:. Retrieved 510: 487:November 13, 485:. Retrieved 462:November 13, 460:. Retrieved 456:the original 449: 416:November 13, 414:. Retrieved 408: 360: 358: 350: 340: 334: 332: 323: 313: 307: 301: 290:cyberwarfare 286:news outlets 283: 228: 216: 192: 168:Trojan horse 153: 88: 72: 68: 66: 45: 21: 20: 18: 719:1991 hoaxes 627:Times Books 320:James Adams 219:Julian Date 140:Windows 3.0 114:peripherals 63:Description 40:during the 38:cyberweapon 713:Categories 379:References 231:apocryphal 94:palindrome 26:virus hoax 664:InfoWorld 596:1059-1028 410:InfoWorld 375:systems. 361:InfoWorld 359:In 2010, 303:Nightline 84:U.S. Navy 73:InfoWorld 47:InfoWorld 691:Newsweek 645:24503100 566:38976269 326:, and a 178:through 126:Motorola 42:Gulf War 481:"Email" 182:by the 172:printer 116:with a 110:windows 102:printer 643:  633:  594:  564:  554:  347:Legacy 265:system 180:Jordan 24:was a 588:Wired 373:Linux 122:Intel 36:as a 22:AF/91 699:2023 671:2023 641:OCLC 631:ISBN 603:2023 592:ISSN 562:OCLC 552:ISBN 524:2023 489:2015 464:2015 418:2015 256:Kari 199:Iran 176:Iraq 124:and 104:and 333:In 298:CNN 715:: 688:. 662:. 639:. 629:. 590:. 586:. 574:^ 560:. 550:. 532:^ 515:. 509:. 497:^ 472:^ 448:. 426:^ 407:. 387:^ 300:, 296:, 237:A 701:. 673:. 647:. 605:. 568:. 526:. 491:. 466:. 420:.

Index

virus hoax
computer virus
United States Intelligence Community
cyberweapon
Gulf War
InfoWorld
April Fools' Day
U.S. military
U.S. federal government
office supplies
U.S. Navy
machine-language
palindrome
real-time computer
printer
display controllers
windows
peripherals
broadcast storm
Intel
Motorola
computer chips
Microsoft Windows
operating systems
Windows 3.0
neural network
machine cycle
National Security Agency
air defense systems
Suppression of Enemy Air Defenses

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑