Timeline of Internet conflicts

Timeline of Internet conflicts

The Internet has a long history of turbulent relations, major maliciously designed disruptions (such as wide scale computer virus incidents, DOS and DDOS attacks that cripple services, and organized attacks that cripple major online communities), and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

Spawned from the original ARPANET, the modern Internet, World Wide Web and other services on it, such as virtual communities (bulletin boards, forums, and MMOs) have grown exponentially. Such prolific growth of population, mirroring "offline" society, contributes to the amount of conflicts and problems online growing each year. Today, billions of people in nearly all countries use various parts of the Internet. Inevitably, as in "brick and mortar" or offline society, the virtual equivalent of major turning points, conflicts, and disruptions--the online equivalents of the falling of the Berlin Wall, the creation of the United Nations, spread of disease, and events like the Iraqi invasion of Kuwait will occur.

Pre WWW era, 1950s-1991



* In May, the first known spam email was sent, to "several hundred" recipients.



* ARPANET grinds to a complete halt on October 27th because of an accidentally-propagated status-message virus. [ [http://www.jmusheneaux.com/21bb.htm jmusheneaux.com: History of the Internet] ] [ [http://www.thocp.net/reference/internet/internet2.htm thocp.net: Arpanet History] ]


*Kevin Mitnick, a famous former computer criminal, was arrested by the FBI on February 15. Mitnick was convicted of wire fraud and of breaking into the computer systems of Fujitsu, Motorola, Nokia, and Sun Microsystems. He served five years in prison. His pursuit and subsequent arrest made him one of the most famous hackers up to that time.


* A 23-year-old graduate student at Cornell University, Robert Tappan Morris, released the internet's first worm, the Morris worm. Morris, the son of a National Security Agency (NSA) computer security expert, wrote 99 lines of code and released them as an experiment. The program began replicating and infecting machines at a much faster rate than he had anticipated, causing machines all over the world to crash.


* In response to the US Secret Service's Operation Sundevil, Mitch Kapor establishes the Electronic Frontier Foundation to provide legal representation in cases involving the civil rights of computer users.

WWW era, 1991 onwards



* Phil Zimmermann creates and releases Pretty Good Privacy, an encryption tool still in use. By 1993 he is the target of US government investigations charged with "munitions export without a license". The investigation ended in 1996 with no charges filed; this is the first known case of a government trying to stop the spread of encryption technology.


* An international group, dubbed the "Phonemasters" by the FBI, hacked into the networks of a number of companies including MCI WorldCom, Sprint, AT&T, and Equifax credit reporters. The gang accounted for approximately $1.85 million in business losses. [ [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html pbs.org: notable hackers] ]

* In late 1994, Vladimir Levin convinced Citibank's computers to transfer $10 million from its customers' accounts to his. Interpol arrested him at Heathrow Airport and Citibank got most of the money back. He pleaded guilty in 1995, but the method he used wasn't uncovered for another ten years and at that time was one of the largest computer crimes by dollar value.

*Laurence Canter and Martha Siegel post the first large commercial newsgroup spam, setting off an arms race between spammers and network operators.


* Scientology and the internet: After documents copyrighted by the Church of Scientology are posted to Usenet group alt.religion.scientology, church lawyers send threats of legal action to several users and attempt to shut down the group. Lawsuits are brought against users Dennis Erlich, Grady Ward, Arnaldo Lerma and Karin Spaink, but these fail to stem distribution of the documents.


*Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of USD $12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail. [ [http://www.networkworld.com/research/2000/0626featside4.html Network World: Tim Lloyd Saga] ]
*President Bill Clinton signs the Communications Decency Act into US federal law as part of the Telecommunications Act of 1996. Web site operators turn their pages black in protest. The decency provisions are overturned the following year in "Reno v. American Civil Liberties Union".


* The Digital Millennium Copyright Act becomes law in the United States.

* The CIH computer virus is released, written by Chen Ing Hau of Taiwan. It is considered to be one of the most harmful widely circulated viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system BIOS, rendering computer systems unbootable. It was found in the wild in September.

* Two Chinese hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank's computer network and stealing 720'000 yuan ($87,000). [ [http://www.infosecnews.org/hypermail/9912/1872.html Reuters archive: Court upholds hacker's death sentence] ]

* The US government allows the export of 56-bit encryption software, and stronger encryption software for highly sensitive data.


* From the time the Morris worm struck the internet until the onset of the Melissa virus, the internet was relatively free from swift-moving, highly destructive "malware." The Melissa virus, however, was rapacious; damages have been estimated at nearly $400 million. It marked a turning point, being the first incident of its kind to affect the newly commercial internet.



* The US government establishes a technical review process to allow the export of encryption software regardless of key length.
* Discovering a demo of their song "I Disappear" on the Napster P2P file-sharing network, rock band Metallica filed legal action against Napster over it. This was the first time a major musical act publicly went against allegedly illegal file sharing.
* In February 2000, some of the internet's most reliable sites were rendered nearly unreachable by distributed denial-of-service (DDoS) attacks. Yahoo took the first hit on February 7, 2000. In the next few days, Buy.com, eBay, CNN, Amazon.com, ZDNet.com, E-Trade, and Excite were taken down by DDoS attacks. Though damage estimates vary widely, the FBI estimates that the companies suffered $1.7 billion USD in lost business and other damages. [ [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html frontline: hackers: who are hackers: notable hacks ] ]


* Dmitry Sklyarov is arrested by FBI agents while visiting the United States for having cracked encryption on Adobe Acrobat e-book software, in violation of the United States' DMCA. This occurred despite the fact that Russia, of which he is a citizen, does not honor this law as of 2001. [ [http://www.wired.com/news/politics/0,1283,45298,00.html Wired.com: Russian Adobe Hacker Busted] ] [ [http://www.eff.org/IP/DMCA/US_v_Elcomsoft/us_v_sklyarov_faq.html#Jurisdiction eff.org: info on DMCA and Russia] ]


* Google receives legal notices from the Church of Scientology and removes links to Operation Clambake from its search results.
* In October, a massive attack against the 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net. [ [http://news.com.com/2100-1001-963095.html news.com: Net attack flops, but threat persists] ]


* Site Finder, the attempt by VeriSign in 2003 to take control of all unregistered .com and .net domain names for their own purposes, is launched, and just as quickly scuttled after massive public outcry and official protest from groups such as ARIN and IANA.


* In November, Marvel Comics filed a lawsuit against the developers of the City of Heroes MMO, Cryptic Studios and their publisher NCSoft alleging that the game not only allows, but actively promotes, the creation of characters whose copyrights and trademarks are owned by Marvel, and that Cryptic has intentionally failed to police these infringing characters. The suit sought unspecified damages and an injunction to force the companies to stop making use of its characters. The case is settled and rejected by United States courts in December 2005 with no changes made to the City of Heroes game.


* In October, the 2005 Sony BMG CD copy protection scandal began, where it was discovered that Sony BMG Music Entertainment surreptitiously and possibly illegally distributed copy protection software that forced itself to install on computers playing their audio CDs. As a result, many Windows based computers belonging to consumers were left vulnerable to exploit and hacking.

* In November, it was revealed that the online video game World of Warcraft, with millions of subscribers, would be hackable due to the far-reaching corruption and invasiveness of Sony's copy protection scheme. [ [http://www.theregister.co.uk/2005/11/04/secfocus_wow_bot/ The Register: World of Warcraft hackers using Sony BMG rootkit] ]

* On December 20th, the "City of Heroes" game servers were nearly all hacked by an undisclosed method. According to NCSoft representative CuppaJo, "Customer data and its security was not compromised in any way during the incident that occurred," and no additional information beyond this was publicly disclosed. As of July 2006, this is the first known hack of any MMO, of which there are millions of subscribers across numerous games. [ [http://boards.cityofheroes.com/showflat.php?Cat=&Board=info&Number=4361331 cityofheroes.com: official incident response] ] [ [http://www.kotaku.com/gaming/city-of-heroes/city-of-heroes-hacked-144399.php kotaku.com: City of Heroes Hacked] ] [ [http://www.jucaushii.ro/gamespace_316_rnews_4373_City_of_Heroes_Hacked.html jucaushii.ro: City of Heroes Hacked] ] [ [http://www.addict3d.org/index.php?page=viewarticle&type=news&ID=14982&title=City%20of%20Heroes%20Hacked addict3d.org: City of Heroes Hacked] ]


* In January 2006, the Electronic Frontier Foundation lodged a class action lawsuit (Hepting vs. AT&T) which alleged that AT&T had allowed agents of the National Security Agency to monitor phone and internet communications of AT&T customers without warrants. In April 2006 a retired former AT&T technician, Mark Klein, lodged an affadavit supporting this allegation. [ [http://www.wired.com/news/technology/1,70619-0.html Wired: Whistle-Blower Outs NSA Spy Room] ] The Department of Justice has stated they will intervene in this lawsuit by means of State Secrets Privilege. [ [http://www.eff.org/news/archives/2006_04.php#004613 EFF.org: Government Moves to Intervene in AT&T Surveillance Case] .] The existence of this database and the NSA program that compiled it was mostly unknown to the general public until "USA Today" broke the story on May 10, 2006. [ [http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm USA Today: NSA has massive database of Americans' phone calls] ] It is estimated that the database contains over 1.9 trillion call-detail records of phone calls made after September 11, 2001. [ [http://www.democracynow.org/article.pl?sid=06/05/12/1353225 Democracy Now: Three Major Telecom Companies Help US Government Spy on Millions of Americans] ] .
* On May 3rd, a massive DDOS assault on Blue Security, an anti-spam company, is redirected by Blue Security staff to their Movable Type-hosted blog. The result is that the DDOS instead knocks out all access to over 1.8 million active blogs, including all ten million plus registered LiveJournal accounts (which is owned by Movable Type's parent company). [ [http://news.netcraft.com/archives/2006/05/03/ddos_on_blue_security_blog_knocks_typepad_livejournal_offline.html Netcraft: DDoS on Blue Security Blog Knocks Typepad, LiveJournal Offline] ] [ [http://gigaom.com/2006/05/06/the-day-ddos-brought-down-six-apart/ gigaom.com: The Day DDoS Brought Down Six Apart] ]

*The MPAA in May was accused of hiring illegal hackers to fight torrent technology.cite news | author=Greg Sandoval | title=MPAA accused of hiring a hacker | date=May 24, 2006 | publisher=CNET News.com | url=http://news.com.com/2100-1030_3-6076665.html?part=rss&tag=6076665&subj=news]

* In June, The Pirate Bay, a BitTorrent tracker website based in and operating from Sweden, is raided by Swedish police for allegedly violating United States, Swedish, and European Union copyright law. As of November 2006, the site remains online, operating from Denmark and no legal action has been filed against it or its owners. [ [http://www.wired.com/news/technology/0,71089-0.html?tw=wn_index_2 Wired.com: Pirate Bay Bloodied But Unbowed] ] (The site is online now at thepiratebay.org)

ee also

* List of Internet topics

Major aspects and issues

* History of the Internet
* Internet democracy
* Privacy on the Internet
* Net neutrality
* Timeline of hacker history


* E-mail
* File-sharing
* Instant messaging
* Internet fax
* Search engine
* Web browser

Underlying infrastructure

* Hypertext Transfer Protocol (HTTP)
* Internet Service Provider (ISP)
* Usenet
* Web hosting
* World Wide Web (WWW)

Regulatory bodies

* Internet Assigned Numbers Authority (IANA)
* Internet Corporation for Assigned Names and Numbers (ICANN)


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Timeline of computing — History of computing Hardware before 1960 Hardware 1960s to present Hardware in Soviet Bloc countries Artificial intelligence Computer science Operating systems Programming languages …   Wikipedia

  • History of the Internet — Main article: Internet The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point to point communication between mainframe computers and terminals, expanded to point to point connections… …   Wikipedia

  • Outline of the Internet — See also: Index of Internet related articles The following hierarchical outline is provided as an overview of and topical guide to the Internet. The Internet is the worldwide, publicly accessible network of interconnected computer networks that… …   Wikipedia

  • Internet vigilantism — is the phenomenon of vigilantic acts taken through the Internet (the communication network or its service providers) or carried out using applications (World Wide Web, e mail) that depend on the Internet. The term encompasses vigilantism against… …   Wikipedia

  • Timeline of the 2011 Egyptian revolution under Hosni Mubarak's rule — This article is about timeline of the 2011 Egyptian revolution before Hosni Mubarak s resignation. For subsequent events, see Timeline of the 2011 Egyptian revolution under Supreme Council of the Armed Forces. Main article: Timeline of the 2011… …   Wikipedia

  • Timeline of alternative rock — This is a timeline of alternative rock, from its beginnings in the 1960s to the present. NOTOC 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005… …   Wikipedia

  • Timeline of musical events — Popular music Timeline of musical events 2010s • 2000s • 1990s • 1980s • 1970s • 1960s • 1950s • 1940s • 1930s • 1920s • 1910s • 1900s • 1890s • 1880s • 1870s • 1860s • 1850s • 1840s • 1830s • …   Wikipedia

  • Afghanistan — Islamic Republic of Afghanistan جمهوری اسلامی افغانستان Jomhūrī ye Eslāmī ye Afġānistān (Persian) د افغانستان اسلامي جمهوریت Da Afġānistān Islāmī Jomhoriyat …   Wikipedia

  • Somalia — Somali Republic Jamhuuriyadda Soomaaliya جمهورية الصومال‎ Jumhūriyyat as Sūmāl‎ …   Wikipedia

  • Israel — This article is about the modern country. For other uses, see Israel (disambiguation). State of Israel …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”