Timeline of Internet conflicts
Encyclopedia
The Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 has a long history of turbulent relations, major maliciously designed disruptions (such as wide scale computer virus
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

 incidents, DOS and DDOS attacks
Denial-of-service attack
A denial-of-service attack or distributed denial-of-service attack is an attempt to make a computer resource unavailable to its intended users...

 that cripple services, and organized attacks that cripple major online communities), and other conflicts. This is a list of known and documented Internet, Usenet
Usenet
Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980...

, virtual community
Virtual community
A virtual community is a social network of individuals who interact through specific media, potentially crossing geographical and political boundaries in order to pursue mutual interests or goals...

 and World Wide Web
World Wide Web
The World Wide Web is a system of interlinked hypertext documents accessed via the Internet...

 related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.

Spawned from the original ARPANET
ARPANET
The Advanced Research Projects Agency Network , was the world's first operational packet switching network and the core network of a set that came to compose the global Internet...

, the modern Internet, World Wide Web and other services on it, such as virtual communities (bulletin boards, forums
Internet forum
An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are at least temporarily archived...

, and Massively multiplayer online game
Massively multiplayer online game
A massively multiplayer online game is a multiplayer video game which is capable of supporting hundreds or thousands of players simultaneously. By necessity, they are played on the Internet, and usually feature at least one persistent world. They are, however, not necessarily games played on...

s) have grown exponentially. Such prolific growth of population, mirroring "offline" society, contributes to the amount of conflicts and problems online growing each year. Today, billions of people in nearly all countries use various parts of the Internet. Inevitably, as in "brick and mortar" or offline society, the virtual equivalent of major turning points, conflicts, and disruptions—the online equivalents of the falling of the Berlin Wall
Berlin Wall
The Berlin Wall was a barrier constructed by the German Democratic Republic starting on 13 August 1961, that completely cut off West Berlin from surrounding East Germany and from East Berlin...

, the creation of the United Nations
United Nations
The United Nations is an international organization whose stated aims are facilitating cooperation in international law, international security, economic development, social progress, human rights, and achievement of world peace...

, spread of disease
Disease
A disease is an abnormal condition affecting the body of an organism. It is often construed to be a medical condition associated with specific symptoms and signs. It may be caused by external factors, such as infectious disease, or it may be caused by internal dysfunctions, such as autoimmune...

, and events like the Iraqi invasion of Kuwait
Gulf War
The Persian Gulf War , commonly referred to as simply the Gulf War, was a war waged by a U.N.-authorized coalition force from 34 nations led by the United States, against Iraq in response to Iraq's invasion and annexation of Kuwait.The war is also known under other names, such as the First Gulf...

 will occur.

1978

  • In May, the first known spam email
    Spam (electronic)
    Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately...

     was sent, to "several hundred" recipients.

1980

  • ARPANET
    ARPANET
    The Advanced Research Projects Agency Network , was the world's first operational packet switching network and the core network of a set that came to compose the global Internet...

     grinds to a complete halt on October 27 because of an accidentally-propagated status-message virus.

1985

  • Kevin Mitnick
    Kevin Mitnick
    Kevin David Mitnick is a computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States.-Personal life:Mitnick grew up in...

    , a famous former computer criminal, was arrested by the FBI on February 15. Mitnick was convicted of wire fraud and of breaking into the computer systems of Fujitsu
    Fujitsu
    is a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. It is the world's third-largest IT services provider measured by revenues....

    , Motorola
    Motorola
    Motorola, Inc. was an American multinational telecommunications company based in Schaumburg, Illinois, which was eventually divided into two independent public companies, Motorola Mobility and Motorola Solutions on January 4, 2011, after losing $4.3 billion from 2007 to 2009...

    , Nokia
    Nokia
    Nokia Corporation is a Finnish multinational communications corporation that is headquartered in Keilaniemi, Espoo, a city neighbouring Finland's capital Helsinki...

    , and Sun Microsystems
    Sun Microsystems
    Sun Microsystems, Inc. was a company that sold :computers, computer components, :computer software, and :information technology services. Sun was founded on February 24, 1982...

    . He served five years in prison. His pursuit and subsequent arrest made him one of the most famous hackers up to that time.

1988

  • A 23-year-old graduate student at Cornell University
    Cornell University
    Cornell University is an Ivy League university located in Ithaca, New York, United States. It is a private land-grant university, receiving annual funding from the State of New York for certain educational missions...

    , Robert Tappan Morris
    Robert Tappan Morris
    Robert Tappan Morris, , is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet - and subsequently becoming the first person convicted under the Computer Fraud and Abuse Act.He went on to co-found the online store...

    , released the Internet's first worm, the Morris worm
    Morris (computer worm)
    The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986...

    . Morris, the son of a National Security Agency
    National Security Agency
    The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

     (NSA) computer security expert, wrote 99 lines of code and released them as an experiment. The program began replicating and infecting machines at a much faster rate than he had anticipated, causing machines all over the world to crash.

1990

  • In response to the US Secret Service's Operation Sundevil
    Operation Sundevil
    Operation Sundevil was a 1990 nation-wide United States Secret Service crackdown on "illegal computer hacking activities." It involved raids in approximately fifteen different cities and resulted in three arrests and the confiscation of computers, the contents of electronic bulletin board systems ,...

    , Mitch Kapor
    Mitch Kapor
    Mitchell David Kapor is the founder of Lotus Development Corporation and the designer of Lotus 1-2-3. He is also a co-founder of the Electronic Frontier Foundation and was the first chair of the Mozilla Foundation...

     establishes the Electronic Frontier Foundation
    Electronic Frontier Foundation
    The Electronic Frontier Foundation is an international non-profit digital rights advocacy and legal organization based in the United States...

     to provide legal representation in cases involving the civil rights of computer users.

1991

  • Phil Zimmermann
    Phil Zimmermann
    Philip R. "Phil" Zimmermann Jr. is the creator of Pretty Good Privacy , the most widely used email encryption software in the world. He is also known for his work in VoIP encryption protocols, notably ZRTP and Zfone....

     creates and releases Pretty Good Privacy
    Pretty Good Privacy
    Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security...

    , an encryption tool still in use. By 1993 he is the target of US government investigations charged with "munitions export without a license". The investigation ended in 1996 with no charges filed; this is the first known case of a government trying to stop the spread of encryption technology.

1994

  • An international group, dubbed the "Phonemasters" by the FBI, hacked into the networks of a number of companies including MCI WorldCom, Sprint
    Sprint Nextel
    Sprint Nextel Corporation is an American telecommunications company based in Overland Park, Kansas. The company owns and operates Sprint, the third largest wireless telecommunications network in the United States, with 53.4 million customers, behind Verizon Wireless and AT&T Mobility...

    , AT&T
    AT&T
    AT&T Inc. is an American multinational telecommunications corporation headquartered in Whitacre Tower, Dallas, Texas, United States. It is the largest provider of mobile telephony and fixed telephony in the United States, and is also a provider of broadband and subscription television services...

    , and Equifax
    Equifax
    Equifax Inc. is a consumer credit reporting agency in the United States, considered one of the three largest American credit agencies along with Experian and TransUnion. Founded in 1899, Equifax is the oldest of the three agencies and gathers and maintains information on over 400 million credit...

     credit reporters. The gang accounted for approximately $1.85 million in business losses.

  • In late 1994, Vladimir Levin
    Vladimir Levin
    Левин, Владимир Леонидович is a Russian-born Jewish individual famed for his involvement in the attempt to fraudulently transfer US$10.7 million via Citibank's computers.- The commonly known story :...

     convinced Citibank
    Citibank
    Citibank, a major international bank, is the consumer banking arm of financial services giant Citigroup. Citibank was founded in 1812 as the City Bank of New York, later First National City Bank of New York...

    's computers to transfer $10 million from its customers' accounts to his. Interpol
    Interpol
    Interpol, whose full name is the International Criminal Police Organization – INTERPOL, is an organization facilitating international police cooperation...

     arrested him at Heathrow Airport and Citibank got most of the money back. He plead guilty in 1995, but the method he used wasn't uncovered for another ten years and at that time was one of the largest computer crimes by dollar value.

  • Laurence Canter and Martha Siegel
    Canter & Siegel
    -External links:* Ben Delisle, - 1994 Usenet post giving background on Canter and Siegel]* Ray Everett-Church, , Wired magazine, April 13, 1999* Sharael Feist, , CNET News, March 26, 2002* John M. Moran, , Hartford Courant, June 30, 2002...

     post the first large commercial newsgroup spam
    Newsgroup spam
    Newsgroup spam is a type of spam where the targets are Usenet newsgroups.Spamming of Usenet newsgroups actually pre-dates e-mail spam. The first widely recognized Usenet spam was posted on 18 January 1994 by Clarence L. Thomas IV, a sysadmin at Andrews University...

    , setting off an arms race
    Arms race
    The term arms race, in its original usage, describes a competition between two or more parties for the best armed forces. Each party competes to produce larger numbers of weapons, greater armies, or superior military technology in a technological escalation...

     between spammers and network operators.

1995

  • Scientology and the Internet: After documents copyrighted by the Church of Scientology
    Church of Scientology
    The Church of Scientology is an organization devoted to the practice and the promotion of the Scientology belief system. The Church of Scientology International is the Church of Scientology's parent organization, and is responsible for the overall ecclesiastical management, dissemination and...

     are posted to Usenet
    Usenet
    Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980...

     group alt.religion.scientology
    Alt.religion.scientology
    The newsgroup alt.religion.scientology is a Usenet newsgroup started in 1991 to discuss the controversial beliefs of Scientology, as well as the Church of Scientology, which claims exclusive intellectual property rights thereto and is viewed by many as a dangerous cult...

    , church lawyers send threats of legal action to several users and attempt to shut down the group. Lawsuits are brought against users Dennis Erlich, Grady Ward
    Grady Ward
    William Grady Ward is an American software engineer, lexicographer, and Internet activist who has featured prominently in the Scientology versus the Internet controversy....

    , Arnaldo Lerma
    Arnaldo Lerma
    Arnaldo Pagliarini Lerma is an American writer and activist, a former Scientologist, and critic of Scientology, who has appeared in television, media and radio interviews...

     and Karin Spaink
    Karin Spaink
    Karin Spaink is a journalist, writer and feminist.Spaink is a free speech advocate and social critic. Some of her battles include:* New-age writers who assert all diseases are only a psychological phenomenon;...

    , but these fail to stem distribution of the documents.

1996

  • Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of USD $12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail.
  • US President Bill Clinton signs the Communications Decency Act
    Communications Decency Act
    The Communications Decency Act of 1996 was the first notable attempt by the United States Congress to regulate pornographic material on the Internet. In 1997, in the landmark cyberlaw case of Reno v. ACLU, the United States Supreme Court struck the anti-indecency provisions of the Act.The Act was...

     into US federal law as part of the Telecommunications Act of 1996
    Telecommunications Act of 1996
    The Telecommunications Act of 1996 was the first major overhaul of United States telecommunications law in nearly 62 years, amending the Communications Act of 1934. This Act, signed by President Bill Clinton, was a major stepping stone towards the future of telecommunications, since this was the...

    . Web site operators turn their pages black in protest. The decency provisions are overturned the following year in Reno v. American Civil Liberties Union
    Reno v. American Civil Liberties Union
    Reno v. American Civil Liberties Union, , is a United States Supreme Court case, in which all nine Justices of the Court voted to strike down anti-indecency provisions of the Communications Decency Act , finding they violated the freedom of speech provisions of the First Amendment. Two Justices...

    .

1998

  • The Digital Millennium Copyright Act becomes law in the United States.

  • The CIH
    CIH (computer virus)
    CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus written by Chen Ing Hau of Travian...

     computer virus is released, written by Chen Ing Hau of Taiwan
    Taiwan
    Taiwan , also known, especially in the past, as Formosa , is the largest island of the same-named island group of East Asia in the western Pacific Ocean and located off the southeastern coast of mainland China. The island forms over 99% of the current territory of the Republic of China following...

    . It is considered to be one of the most harmful widely circulated viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system BIOS
    BIOS
    In IBM PC compatible computers, the basic input/output system , also known as the System BIOS or ROM BIOS , is a de facto standard defining a firmware interface....

    , rendering computer systems unbootable. It was found in the wild in September.

  • Two Chinese
    China
    Chinese civilization may refer to:* China for more general discussion of the country.* Chinese culture* Greater China, the transnational community of ethnic Chinese.* History of China* Sinosphere, the area historically affected by Chinese culture...

     hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank's computer network and stealing 720'000 yuan ($87,000).

  • The US government allows the export of 56-bit encryption software, and stronger encryption software for highly sensitive data.

1999

  • From the time the Morris worm struck the Internet until the onset of the Melissa virus, the Internet was relatively free from swift-moving, highly destructive "malware." The Melissa virus, however, was rapacious; damages have been estimated at nearly $400 million. It marked a turning point, being the first incident of its kind to affect the newly commercial Internet.

2000

  • The US government establishes a technical review process to allow the export of encryption software regardless of key length.
  • Discovering a demo
    Demo (music)
    A demo version or demo of a song is one recorded for reference rather than for release. A demo is a way for a musician to approximate their ideas on tape or disc, and provide an example of those ideas to record labels, producers or other artists...

     of their song "I Disappear
    I Disappear
    "I Disappear" is a song by the heavy metal band Metallica released as single only in Germany. The song was recorded as a contribution to the Mission: Impossible II Soundtrack and reached #1 on the Billboard Hot Mainstream Rock Tracks for seven weeks in summer 2000. It does not appear on any of...

    " on the Napster
    Napster
    Napster is an online music store and a Best Buy company. It was originally founded as a pioneering peer-to-peer file sharing Internet service that emphasized sharing audio files that were typically digitally encoded music as MP3 format files...

     P2P
    Peer-to-peer
    Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application...

     file-sharing network, rock band Metallica
    Metallica
    Metallica is an American heavy metal band from Los Angeles, California. Formed in 1981 when James Hetfield responded to an advertisement that drummer Lars Ulrich had posted in a local newspaper. The current line-up features long-time lead guitarist Kirk Hammett and bassist Robert Trujillo ...

     filed legal action against Napster over it. This was the first time a major musical act publicly went against allegedly illegal file sharing.
  • In February 2000, some of the Internet's most reliable sites were rendered nearly unreachable by distributed denial-of-service (DDoS) attacks. Yahoo took the first hit on February 7, 2000. In the next few days, Buy.com
    Buy.com
    Buy.com, Incorporated is an online retailer based in Aliso Viejo, California.Buy.com began by selling computers and electronics in 1997 and has since expanded into many other categories...

    , eBay
    EBay
    eBay Inc. is an American internet consumer-to-consumer corporation that manages eBay.com, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide...

    , CNN
    CNN
    Cable News Network is a U.S. cable news channel founded in 1980 by Ted Turner. Upon its launch, CNN was the first channel to provide 24-hour television news coverage, and the first all-news television channel in the United States...

    , Amazon.com
    Amazon.com
    Amazon.com, Inc. is a multinational electronic commerce company headquartered in Seattle, Washington, United States. It is the world's largest online retailer. Amazon has separate websites for the following countries: United States, Canada, United Kingdom, Germany, France, Italy, Spain, Japan, and...

    , ZDNet.com
    ZDNet
    ZDNet is a business technology news website published by CBS Interactive, along with TechRepublic and SmartPlanet. The brand was founded on April 1, 1991 as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication owned by CNET...

    , E-Trade, and Excite
    Excite
    Excite is a collection of Internet sites and services owned by IAC Search & Media, which is a subsidiary of InterActive Corporation . Launched in 1994, it is an online service offering a variety of content, including an Internet portal, a search engine, a web-based email, instant messaging, stock...

     were taken down by DDoS attacks. Though damage estimates vary widely, the FBI estimates that the companies suffered $1.7 billion USD in lost business and other damages.

2001

  • Dmitry Sklyarov
    Dmitry Sklyarov
    Dmitry Vitalevich Sklyarov is a Russian computer programmer known for his 2001 arrest by American law enforcement over software copyright restrictions under the DMCA anti-circumvention provision...

     is arrested by FBI agents while visiting the United States
    United States
    The United States of America is a federal constitutional republic comprising fifty states and a federal district...

     for having cracked encryption
    Encryption
    In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

     on Adobe Acrobat
    Adobe Acrobat
    Adobe Acrobat is a family of application software developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format . All members of the family, except Adobe Reader , are commercial software, while the latter is available as freeware and can be downloaded...

     e-book
    E-book
    An electronic book is a book-length publication in digital form, consisting of text, images, or both, and produced on, published through, and readable on computers or other electronic devices. Sometimes the equivalent of a conventional printed book, e-books can also be born digital...

     software, in violation of the United States' DMCA. This occurred despite the fact that Russia
    Russia
    Russia or , officially known as both Russia and the Russian Federation , is a country in northern Eurasia. It is a federal semi-presidential republic, comprising 83 federal subjects...

    , of which he is a citizen, does not honor this law as of 2001.

2002

  • Google receives legal notices from the Church of Scientology
    Church of Scientology
    The Church of Scientology is an organization devoted to the practice and the promotion of the Scientology belief system. The Church of Scientology International is the Church of Scientology's parent organization, and is responsible for the overall ecclesiastical management, dissemination and...

     and removes links to Operation Clambake
    Operation Clambake
    Operation Clambake, also referred to by its Web address, Xenu.net, is a Web site and Norway-based non-profit organization, launched in 1996, that publishes criticism of the Church of Scientology. It is owned and maintained by Andreas Heldal-Lund, who has stated that he supports the rights of all...

     from its search results.
  • In October, a massive attack
    2002 DNS Backbone DDoS
    Distributed denial of service attacks on root nameservers are Internet events in which distributed denial-of-service attacks target one or more of the thirteen Domain Name System root nameservers. The root nameservers are critical infrastructure components of the Internet, mapping domain names to...

     against the 13 root domain servers
    DNS root zone
    A DNS root zone is the top-level DNS zone in a Domain Name System hierarchy. Most commonly it refers to the root zone of the largest global DNS, deployed for the Internet. Ultimate authority over the DNS root zone rests with the US Department of Commerce NTIA...

     of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net.

2003

  • Site Finder
    Site Finder
    Site Finder was a wildcard DNS record for all .com and .net unregistered domain names, run by .com and .net top-level domain operator VeriSign between 15 September 2003 and 4 October 2003.-Site Finder:...

    , the attempt by VeriSign
    VeriSign
    Verisign, Inc. is an American company based in Dulles, Virginia that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the .com, .net, and .name generic top-level domains and the .cc and .tv country-code...

     in 2003 to take control of all unregistered .com and .net domain names for their own purposes, is launched, and just as quickly scuttled after massive public outcry and official protest from groups such as ARIN
    Arin
    Arin may refer to:* American Registry for Internet Numbers* Arin, Armenia - A town in Armenia* Arin language - An extinct Yeniseic language* Arın Soğancıoğlu, Turkish basketball player...

     and IANA
    Internet Assigned Numbers Authority
    The Internet Assigned Numbers Authority is the entity that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System , media types, and other Internet Protocol-related symbols and numbers...

    .

2004

  • In November, Marvel Comics
    Marvel Comics
    Marvel Worldwide, Inc., commonly referred to as Marvel Comics and formerly Marvel Publishing, Inc. and Marvel Comics Group, is an American company that publishes comic books and related media...

     filed a lawsuit against the developers of the City of Heroes
    City of Heroes
    City of Heroes is a massively multiplayer online role-playing game based on the superhero comic book genre, developed by Cryptic Studios and published by NCsoft. The game was launched in North America on April 27, 2004 and in Europe on February 4, 2005 with English, German and French language...

     Massively multiplayer online game
    Massively multiplayer online game
    A massively multiplayer online game is a multiplayer video game which is capable of supporting hundreds or thousands of players simultaneously. By necessity, they are played on the Internet, and usually feature at least one persistent world. They are, however, not necessarily games played on...

    , Cryptic Studios
    Cryptic Studios
    Cryptic Studios, a wholly owned Perfect World subsidiary, is a small American massively multiplayer online role-playing game developer headquartered in Los Gatos, California.-History:...

     and their publisher NCSoft
    NCsoft
    NCsoft is a South Korea-based online video game company, which has published massively multiplayer online role-playing games including Lineage, City of Heroes, Wildstar, Exteel, Guild Wars and Aion.-History:...

     alleging that the game not only allows, but actively promotes, the creation of characters whose copyrights and trademarks are owned by Marvel, and that Cryptic has intentionally failed to police these infringing characters. The suit sought unspecified damages and an injunction to force the companies to stop making use of its characters. The case is settled and rejected by United States courts in December 2005 with no changes made to the City of Heroes game.

2005

  • In October, the 2005 Sony BMG CD copy protection scandal
    2005 Sony BMG CD copy protection scandal
    The Sony BMG CD copy protection rootkit scandal concerns the copy protection measures included by Sony BMG on Compact Discs in 2005. Sony BMG included the Extended Copy Protection and MediaMax CD-3 software on music CDs. XCP was put on 52 titles and MediaMax was put on 50 titles...

     began, where it was discovered that Sony BMG Music Entertainment
    Sony BMG Music Entertainment
    Sony BMG Music Entertainment was a recorded music company, which was a 50–50 joint venture between the Sony Corporation of America and Bertelsmann AG...

     surreptitiously and possibly illegally distributed copy protection software that forced itself to install on computers playing their audio CDs. As a result, many Windows based computers belonging to consumers were left vulnerable to exploit and hacking.

  • In November, it was revealed that the online video game World of Warcraft
    World of Warcraft
    World of Warcraft is a massively multiplayer online role-playing game by Blizzard Entertainment. It is the fourth released game set in the fantasy Warcraft universe, which was first introduced by Warcraft: Orcs & Humans in 1994...

    , with millions of subscribers, would be hackable due to the far-reaching corruption and invasiveness of Sony's copy protection scheme.

  • On December 20, the City of Heroes game servers were nearly all hacked by an undisclosed method. According to NCSoft
    NCsoft
    NCsoft is a South Korea-based online video game company, which has published massively multiplayer online role-playing games including Lineage, City of Heroes, Wildstar, Exteel, Guild Wars and Aion.-History:...

     representative CuppaJo, "Customer data and its security was not compromised in any way during the incident that occurred," and no additional information beyond this was publicly disclosed. As of July 2006, this is the first known hack of any MMO, of which there are millions of subscribers across numerous games.

2006

  • In January 2006, the Electronic Frontier Foundation
    Electronic Frontier Foundation
    The Electronic Frontier Foundation is an international non-profit digital rights advocacy and legal organization based in the United States...

     lodged a class action
    Class action
    In law, a class action, a class suit, or a representative action is a form of lawsuit in which a large group of people collectively bring a claim to court and/or in which a class of defendants is being sued...

     lawsuit (Hepting vs. AT&T) which alleged that AT&T had allowed agents of the National Security Agency
    National Security Agency
    The National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...

     to monitor phone and Internet communications of AT&T customers without warrants. In April 2006 a retired former AT&T technician, Mark Klein, lodged an affidavit supporting this allegation. The Department of Justice
    United States Department of Justice
    The United States Department of Justice , is the United States federal executive department responsible for the enforcement of the law and administration of justice, equivalent to the justice or interior ministries of other countries.The Department is led by the Attorney General, who is nominated...

     has stated they will intervene in this lawsuit by means of State Secrets Privilege
    State Secrets Privilege
    The state secrets privilege is an evidentiary rule created by United States legal precedent. Application of the privilege results in exclusion of evidence from a legal case based solely on affidavits submitted by the government stating that court proceedings might disclose sensitive information...

    . The existence of this database and the NSA program that compiled it was mostly unknown to the general public until USA Today
    USA Today
    USA Today is a national American daily newspaper published by the Gannett Company. It was founded by Al Neuharth. The newspaper vies with The Wall Street Journal for the position of having the widest circulation of any newspaper in the United States, something it previously held since 2003...

    broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail record
    Call detail record
    A call detail record , also known as call data record, is a data record produced by a telephone exchange or other telecommunications equipment documenting the details of a phone call that passed through the facility or device...

    s of phone calls made after September 11, 2001.
  • On May 3, a massive DDOS assault on Blue Security, an anti-spam company, is redirected by Blue Security staff to their Movable Type
    Movable Type
    Movable Type is a weblog publishing system developed by the company Six Apart. It was publicly announced on September 3, 2001; version 1.0 was publicly released on October 8, 2001. On 12 December 2007, Movable Type was relicensed as free software under the GNU General Public License...

    -hosted blog. The result is that the DDOS instead knocks out all access to over 1.8 million active blogs, including all ten million plus registered LiveJournal
    LiveJournal
    LiveJournal is a virtual community where Internet users can keep a blog, journal or diary. LiveJournal is also the name of the free and open source server software that was designed to run the LiveJournal virtual community....

     accounts (which is owned by Movable Type's parent company).

  • The MPAA in May was accused of hiring illegal hackers
    Hacker (computer security)
    In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

     to fight BitTorrent technology.

  • In June, The Pirate Bay
    The Pirate Bay
    The Pirate Bay is a Swedish website which hosts magnet links and .torrent files, which allow users to share electronic files, including multimedia, computer games and software via BitTorrent...

    , a BitTorrent tracker
    BitTorrent tracker
    A BitTorrent tracker is a server that assists in the communication between peers using the BitTorrent protocol. It is also, in the absence of extensions to the original protocol, the only major critical point, as clients are required to communicate with the tracker to initiate downloads...

     website based in and operating from Sweden
    Sweden
    Sweden , officially the Kingdom of Sweden , is a Nordic country on the Scandinavian Peninsula in Northern Europe. Sweden borders with Norway and Finland and is connected to Denmark by a bridge-tunnel across the Öresund....

    , is raided by Swedish police for allegedly violating United States, Swedish, and European Union copyright law. As of November 2006, the site remains online, operating from Denmark
    Denmark
    Denmark is a Scandinavian country in Northern Europe. The countries of Denmark and Greenland, as well as the Faroe Islands, constitute the Kingdom of Denmark . It is the southernmost of the Nordic countries, southwest of Sweden and south of Norway, and bordered to the south by Germany. Denmark...

     and no legal action has been filed against it or its owners. (The site is online now at thepiratebay.org)

Major aspects and issues

  • History of the Internet
    History of the Internet
    The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching...

  • Internet democracy
    E-democracy
    E-democracy refers to the use of information technologies and communication technologies and strategies in political and governance processes...

  • Privacy on the Internet
    Internet privacy
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information or non-PII information such as a...

  • Net neutrality
  • Timeline of hacker history
    Timeline of hacker history
    timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.-1932:...


Functions

  • E-mail
    E-mail
    Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

  • File-sharing
  • Instant messaging
    Instant messaging
    Instant Messaging is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet...

  • Internet fax
    Internet fax
    Internet fax uses the Internet to receive and send faxes.Internet faxing, "e-Fax" or "online faxing" is a general term which refers to sending a document facsimile using the Internet, rather than using only phone networks with a fax machine.Depending on the specific method/implementation ,...

  • Search engine
    Search engine
    A search engine is an information retrieval system designed to help find information stored on a computer system. The search results are usually presented in a list and are commonly called hits. Search engines help to minimize the time required to find information and the amount of information...

  • Web browser
    Web browser
    A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier and may be a web page, image, video, or other piece of content...


Underlying infrastructure

  • Hypertext Transfer Protocol
    Hypertext Transfer Protocol
    The Hypertext Transfer Protocol is a networking protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web....

     (HTTP)
  • Internet Service Provider
    Internet service provider
    An Internet service provider is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections. Hosting ISPs lease server space for smaller businesses and host other people servers...

     (ISP)
  • Internet Relay Chat
    Internet Relay Chat
    Internet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file...

     (IRC)
  • Usenet
    Usenet
    Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980...

     (NEWS)
  • Web hosting
  • World Wide Web
    World Wide Web
    The World Wide Web is a system of interlinked hypertext documents accessed via the Internet...

     (WWW)

Regulatory bodies

  • Internet Assigned Numbers Authority
    Internet Assigned Numbers Authority
    The Internet Assigned Numbers Authority is the entity that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System , media types, and other Internet Protocol-related symbols and numbers...

     (IANA)
  • Internet Corporation for Assigned Names and Numbers (ICANN
    ICANN
    The Internet Corporation for Assigned Names and Numbers is a non-profit corporation headquartered in Marina del Rey, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998 to oversee a number of Internet-related tasks previously performed directly...

    )
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK