- Timeline of Internet conflicts
The
Internet has a long history of turbulent relations, major maliciously designed disruptions (such as wide scalecomputer virus incidents, DOS and DDOS attacks that cripple services, and organized attacks that cripple major online communities), and other conflicts. This is a list of known and documented Internet,Usenet ,virtual community andWorld Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.Spawned from the original
ARPANET , the modern Internet, World Wide Web and other services on it, such as virtual communities (bulletin boards , forums, andMMO s) have grown exponentially. Such prolific growth of population, mirroring "offline" society, contributes to the amount of conflicts and problems online growing each year. Today, billions of people in nearly all countries use various parts of the Internet. Inevitably, as in "brick and mortar" or offline society, the virtual equivalent of major turning points, conflicts, and disruptions--the online equivalents of the falling of theBerlin Wall , the creation of theUnited Nations , spread ofdisease , and events like the Iraqi invasion of Kuwait will occur.Pre WWW era, 1950s-1991
1970s
1978:
* In May, the first known spam email was sent, to "several hundred" recipients.
1980s
1980:
*
ARPANET grinds to a complete halt on October 27th because of an accidentally-propagated status-message virus. [ [http://www.jmusheneaux.com/21bb.htm jmusheneaux.com: History of the Internet] ] [ [http://www.thocp.net/reference/internet/internet2.htm thocp.net: Arpanet History] ]1985:
*
Kevin Mitnick , a famous former computer criminal, was arrested by the FBI on February 15. Mitnick was convicted of wire fraud and of breaking into the computer systems ofFujitsu ,Motorola ,Nokia , andSun Microsystems . He served five years in prison. His pursuit and subsequent arrest made him one of the most famous hackers up to that time.1988:
* A 23-year-old graduate student at
Cornell University ,Robert Tappan Morris , released the internet's first worm, the Morris worm. Morris, the son of aNational Security Agency (NSA) computer security expert, wrote 99 lines of code and released them as an experiment. The program began replicating and infecting machines at a much faster rate than he had anticipated, causing machines all over the world to crash.1990:
* In response to the US Secret Service's
Operation Sundevil ,Mitch Kapor establishes theElectronic Frontier Foundation to provide legal representation in cases involving the civil rights of computer users.WWW era, 1991 onwards
1990s
1991:
*
Phil Zimmermann creates and releasesPretty Good Privacy , an encryption tool still in use. By 1993 he is the target of US government investigations charged with "munitions export without a license". The investigation ended in 1996 with no charges filed; this is the first known case of a government trying to stop the spread of encryption technology.1994:
* An international group, dubbed the "
Phonemasters " by theFBI , hacked into the networks of a number of companies includingMCI WorldCom , Sprint,AT&T , andEquifax credit reporters. The gang accounted for approximately $1.85 million in business losses. [ [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html pbs.org: notable hackers] ]* In late 1994,
Vladimir Levin convincedCitibank 's computers to transfer $10 million from its customers' accounts to his.Interpol arrested him at Heathrow Airport and Citibank got most of the money back. He pleaded guilty in 1995, but the method he used wasn't uncovered for another ten years and at that time was one of the largest computer crimes by dollar value.*Laurence Canter and Martha Siegel post the first large commercial
newsgroup spam , setting off anarms race between spammers and network operators.1995
*
Scientology and the internet : After documents copyrighted by theChurch of Scientology are posted toUsenet groupalt.religion.scientology , church lawyers send threats of legal action to several users and attempt to shut down the group. Lawsuits are brought against users Dennis Erlich,Grady Ward ,Arnaldo Lerma andKarin Spaink , but these fail to stem distribution of the documents.1996:
*Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of USD $12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail. [ [http://www.networkworld.com/research/2000/0626featside4.html Network World: Tim Lloyd Saga] ]
*President Bill Clinton signs theCommunications Decency Act into US federal law as part of theTelecommunications Act of 1996 . Web site operators turn their pages black in protest. The decency provisions are overturned the following year in "Reno v. American Civil Liberties Union ".1998:
* The Digital Millennium Copyright Act becomes law in the United States.
* The CIH computer virus is released, written by
Chen Ing Hau ofTaiwan . It is considered to be one of the most harmful widely circulated viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the systemBIOS , rendering computer systems unbootable. It was found in the wild in September.* Two Chinese hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank's computer network and stealing 720'000 yuan ($87,000). [ [http://www.infosecnews.org/hypermail/9912/1872.html Reuters archive: Court upholds hacker's death sentence] ]
* The US government allows the export of 56-bit encryption software, and stronger encryption software for highly sensitive data.
1999:
* From the time the Morris worm struck the internet until the onset of the Melissa virus, the internet was relatively free from swift-moving, highly destructive "malware." The
Melissa virus , however, was rapacious; damages have been estimated at nearly $400 million. It marked a turning point, being the first incident of its kind to affect the newly commercial internet.2000s
2000:
* The US government establishes a technical review process to allow the export of encryption software regardless of key length.
* Discovering a demo of their song "I Disappear " on theNapster P2P file-sharing network, rock bandMetallica filed legal action against Napster over it. This was the first time a major musical act publicly went against allegedly illegal file sharing.
* In February 2000, some of the internet's most reliable sites were rendered nearly unreachable by distributed denial-of-service (DDoS ) attacks.Yahoo took the first hit on February 7, 2000. In the next few days,Buy.com ,eBay ,CNN ,Amazon.com , ZDNet.com,E-Trade , andExcite were taken down by DDoS attacks. Though damage estimates vary widely, the FBI estimates that the companies suffered $1.7 billionUSD in lost business and other damages. [ [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/notable.html frontline: hackers: who are hackers: notable hacks ] ]2001:
*
Dmitry Sklyarov is arrested by FBI agents while visiting theUnited States for having crackedencryption onAdobe Acrobat e-book software, in violation of the United States'DMCA . This occurred despite the fact thatRussia , of which he is a citizen, does not honor this law as of 2001. [ [http://www.wired.com/news/politics/0,1283,45298,00.html Wired.com: Russian Adobe Hacker Busted] ] [ [http://www.eff.org/IP/DMCA/US_v_Elcomsoft/us_v_sklyarov_faq.html#Jurisdiction eff.org: info on DMCA and Russia] ]2002:
* Google receives legal notices from the
Church of Scientology and removes links toOperation Clambake from its search results.
* In October, a massive attack against the 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net. [ [http://news.com.com/2100-1001-963095.html news.com: Net attack flops, but threat persists] ]2003:
*
Site Finder , the attempt byVeriSign in 2003 to take control of all unregistered .com and .netdomain names for their own purposes, is launched, and just as quickly scuttled after massive public outcry and official protest from groups such asARIN and IANA.2004:
* In November,
Marvel Comics filed a lawsuit against the developers of theCity of Heroes MMO ,Cryptic Studios and their publisherNCSoft alleging that the game not only allows, but actively promotes, the creation of characters whose copyrights and trademarks are owned by Marvel, and that Cryptic has intentionally failed to police these infringing characters. The suit sought unspecified damages and an injunction to force the companies to stop making use of its characters. The case is settled and rejected by United States courts in December 2005 with no changes made to the City of Heroes game.2005:
* In October, the
2005 Sony BMG CD copy protection scandal began, where it was discovered thatSony BMG Music Entertainment surreptitiously and possibly illegally distributed copy protection software that forced itself to install on computers playing their audio CDs. As a result, many Windows based computers belonging to consumers were left vulnerable to exploit and hacking.* In November, it was revealed that the online video game
World of Warcraft , with millions of subscribers, would be hackable due to the far-reaching corruption and invasiveness of Sony's copy protection scheme. [ [http://www.theregister.co.uk/2005/11/04/secfocus_wow_bot/ The Register: World of Warcraft hackers using Sony BMG rootkit] ]* On December 20th, the "City of Heroes" game servers were nearly all hacked by an undisclosed method. According to
NCSoft representative CuppaJo, "Customer data and its security was not compromised in any way during the incident that occurred," and no additional information beyond this was publicly disclosed. As of July 2006, this is the first known hack of any MMO, of which there are millions of subscribers across numerous games. [ [http://boards.cityofheroes.com/showflat.php?Cat=&Board=info&Number=4361331 cityofheroes.com: official incident response] ] [ [http://www.kotaku.com/gaming/city-of-heroes/city-of-heroes-hacked-144399.php kotaku.com: City of Heroes Hacked] ] [ [http://www.jucaushii.ro/gamespace_316_rnews_4373_City_of_Heroes_Hacked.html jucaushii.ro: City of Heroes Hacked] ] [ [http://www.addict3d.org/index.php?page=viewarticle&type=news&ID=14982&title=City%20of%20Heroes%20Hacked addict3d.org: City of Heroes Hacked] ]2006:
* In January 2006, the
Electronic Frontier Foundation lodged aclass action lawsuit (Hepting vs. AT&T ) which alleged that AT&T had allowed agents of theNational Security Agency to monitor phone and internet communications of AT&T customers without warrants. In April 2006 a retired former AT&T technician, Mark Klein, lodged an affadavit supporting this allegation. [ [http://www.wired.com/news/technology/1,70619-0.html Wired: Whistle-Blower Outs NSA Spy Room] ] The Department of Justice has stated they will intervene in this lawsuit by means ofState Secrets Privilege . [ [http://www.eff.org/news/archives/2006_04.php#004613 EFF.org: Government Moves to Intervene in AT&T Surveillance Case] .] The existence of this database and the NSA program that compiled it was mostly unknown to the general public until "USA Today " broke the story onMay 10 ,2006 . [ [http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm USA Today: NSA has massive database of Americans' phone calls] ] It is estimated that the database contains over 1.9 trillion call-detail records of phone calls made afterSeptember 11, 2001 . [ [http://www.democracynow.org/article.pl?sid=06/05/12/1353225 Democracy Now: Three Major Telecom Companies Help US Government Spy on Millions of Americans] ] .
* On May 3rd, a massive DDOS assault on Blue Security, an anti-spam company, is redirected by Blue Security staff to theirMovable Type -hosted blog. The result is that the DDOS instead knocks out all access to over 1.8 million active blogs, including all ten million plus registeredLiveJournal accounts (which is owned by Movable Type's parent company). [ [http://news.netcraft.com/archives/2006/05/03/ddos_on_blue_security_blog_knocks_typepad_livejournal_offline.html Netcraft: DDoS on Blue Security Blog Knocks Typepad, LiveJournal Offline] ] [ [http://gigaom.com/2006/05/06/the-day-ddos-brought-down-six-apart/ gigaom.com: The Day DDoS Brought Down Six Apart] ]*The
MPAA in May was accused of hiring illegal hackers to fight torrent technology.cite news | author=Greg Sandoval | title=MPAA accused of hiring a hacker | date=May 24 ,2006 | publisher=CNET News.com | url=http://news.com.com/2100-1030_3-6076665.html?part=rss&tag=6076665&subj=news]* In June,
The Pirate Bay , aBitTorrent tracker website based in and operating fromSweden , is raided by Swedish police for allegedly violating United States, Swedish, and European Union copyright law. As of November 2006, the site remains online, operating fromDenmark and no legal action has been filed against it or its owners. [ [http://www.wired.com/news/technology/0,71089-0.html?tw=wn_index_2 Wired.com: Pirate Bay Bloodied But Unbowed] ] (The site is online now at thepiratebay.org)ee also
*
List of Internet topics Major aspects and issues
*
History of the Internet
*Internet democracy
* Privacy on the Internet
*Net neutrality
*Timeline of hacker history Functions
*
E-mail
*File-sharing
*Instant messaging
*Internet fax
*Search engine
*Web browser Underlying infrastructure
*
Hypertext Transfer Protocol (HTTP)
*Internet Service Provider (ISP)
*Usenet
*Web hosting
*World Wide Web (WWW)Regulatory bodies
*
Internet Assigned Numbers Authority (IANA)
*Internet Corporation for Assigned Names and Numbers (ICANN )References
Wikimedia Foundation. 2010.