"It's akin to computer rape." Dr. Sternman had a way with words to keep his audience attentive. Years of lecturing to sleeping freshman had taught him a few tricks. "A computer virus is uninvited, it invades the system, and then has its way with it. If that's not rape, I don't know what is."

"Your parallels are most vivid," said a grimacing Nancy Deere. "Let's leave that thought for now, and maybe you can explain the type of damage that a virus can do. It sounds to me like there are thousands of new diseases out there, and every one needs to be isolated, diagnosed and then cured. That appears to me to a formidable challenge."

"I could not have put it better, Senator. You grasp things quickly." Sternman was genuinely complimenting Nancy. "The similarities to the medical field cannot go unnoticed if we are to deal with the problem rationally and effectively. And like a disease, we need to predict the effects of the infection. What we have found in that area is as frightening.

"The first generation of viruses were simple in their approach. The designers correctly assumed that no one was looking for them, and they could enter systems without any deterrence. They erase files, scramble data, re-format hard drives . . .make the comput- er data useless.

"Then the second generation of viruses came along with the nom-de-guerre stealth. These viruses hid themselves more elabo- rately to avoid detection and had a built in self-preservation instinct. If the virus thinks it's being probed, it self de- structs or hides itself even further.

"In addition, second generation viruses learned how to become targeted. Some viruses have been designed to only attack a competitor's product and nothing else."

"Is that possible?" Asked Nancy Deere.

"It's been done many times. Some software bugs in popular soft- ware are the result of viral infections, others may be genuine bugs. Imagine a virus who sole purpose is to attack Lotus 123 spreadsheets. The virus is designed to create computational errors in the program's spreadsheets. The user then thinks that Lotus is to blame and so he buys another product. Yes, ma'am, it is possible, and occurs every day of the week. Keeping up with it is the trick.

"Other viruses attack on Friday the 13th. only, some attack only at a specified time . . .the damage to be done is only limited by imagination of the programmers. Third generation viruses were even more sophisticated. They were designed to do damage not only to the data, but to the computer hardware itself. Some were designed to overload communications ports with tight logical loops. Others were designed to destroy the hard disk by directly overdriving the disk or would cause amonitor to self-destruct. There is no limit to the possibilities.

"You sound as though you hold their skills in high regard, Doc- tor." Rickfield continued to make snide remarks whenever possi- ble.