Timeline of Internet conflicts
This article possibly contains original research. (August 2008) (Learn how and when to remove this template message)
This article needs to be updated.February 2017)(
The Internet has a long history of turbulent relations, major maliciously designed disruptions (such as wide scale computer virus incidents, DOS and DDOS attacks that cripple services, and organized attacks that cripple major online communities), and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.
Spawned from the original ARPANET, the modern Internet, World Wide Web and other services on it, such as virtual communities (bulletin boards, forums, and Massively multiplayer online games) have grown exponentially. Such prolific growth of population, mirroring "offline" society, contributes to the number of conflicts and problems online growing each year. Today, billions of people in nearly all countries use various parts of the Internet. Inevitably, as in "brick and mortar" or offline society, the virtual equivalent of major turning points, conflicts, and disruptions—the online equivalents of the falling of the Berlin Wall, the creation of the United Nations, spread of disease, and events like the Iraqi invasion of Kuwait will occur.
Pre World Wide Web era
- ARPANET grinds to a complete halt on October 27 because of an accidentally-propagated status-message virus.
- Kevin Mitnick was arrested by the FBI on February 15. Mitnick was convicted of wire fraud and of breaking into the computer systems of Fujitsu, Motorola, Nokia, and Sun Microsystems. He served five years in prison. His pursuit and subsequent arrest made him one of the most famous hackers up to that time.
- A 23-year-old graduate student at Cornell University, Robert Tappan Morris, released the Internet's first worm, the Morris worm. Morris, the son of a National Security Agency (NSA) computer security expert, wrote 99 lines of code and released them as an experiment. The program began replicating and infecting machines at a much faster rate than he had anticipated, causing machines all over the world to crash.
- In response to the US Secret Service's Operation Sundevil, Mitch Kapor establishes the Electronic Frontier Foundation to provide legal representation in cases involving the civil rights of computer users.
World Wide Web era
- Phil Zimmermann creates and releases Pretty Good Privacy, an encryption tool still in use. By 1993 he is the target of US government investigations charged with "munitions export without a license". The investigation ended in 1996 with no charges filed; this is the first known case of a government trying to stop the spread of encryption technology.
- An international group, dubbed the "Phonemasters" by the FBI, hacked into the networks of a number of companies including MCI WorldCom, Sprint, AT&T, and Equifax credit reporters. The gang accounted for approximately $1.85 million in business losses.
- In late 1995, Vladimir Levin persuaded Citibank's computers to transfer $10 million from its customers' accounts to his. Interpol arrested him at Heathrow Airport and Citibank got most of the money back. He pleaded guilty in 1995, but the method he used wasn't uncovered for another ten years and at that time was one of the largest computer crimes by dollar value.
- Laurence Canter and Martha Siegel post the first large commercial newsgroup spam, setting off an arms race between spammers and network operators.
- Scientology and the Internet: After documents copyrighted by the Church of Scientology are posted to Usenet group alt.religion.scientology, church lawyers send threats of legal action to several users and attempt to shut down the group. Lawsuits are brought against users Dennis Erlich, Grady Ward, Arnaldo Lerma and Karin Spaink, but these fail to stem distribution of the documents.
- Tim Lloyd plants a software time bomb at Omega Engineering, a company in New Jersey. The results of the attack are devastating: losses of USD $12 million and more than 80 employees lose their jobs. Lloyd is sentenced to 41 months in jail.
- US President Bill Clinton signs the Communications Decency Act into US federal law as part of the Telecommunications Act of 1996. Web site operators turn their pages black in protest. The decency provisions are overturned the following year in Reno v. American Civil Liberties Union.
- The Digital Millennium Copyright Act (DMCA) becomes law in the United States.
- The CIH computer virus is released, written by Chen Ing Hau of Taiwan. It is considered to be one of the most harmful widely circulated viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system BIOS, rendering computer systems unbootable. It was found in the wild in September.
- Two Chinese hackers, Hao Jinglong and Hao Jingwen (twin brothers), are sentenced to death by a court in China for breaking into a bank's computer network and stealing 720,000 yuan ($87,000).
- The US government allows the export of 56-bit encryption software, and stronger encryption software for highly sensitive data.
- The Electronic Disturbance Theater launches the Floodnet tool for civil disobedience, a tool to create a denial-of-service attack (DOS). The first DoS attacks were launched against the Pentagon, the Frankfurt Stock Exchange and the Mexican government.
- From the time the Morris worm struck the Internet until the onset of the Melissa virus, the Internet was relatively free from swift-moving, highly destructive "malware". The Melissa virus, however, was rapacious; damages have been estimated at nearly $400 million. It marked a turning point, being the first incident of its kind to affect the newly commercial Internet.
- The US government establishes a technical review process to allow the export of encryption software regardless of key length.
- Discovering a demo of their song "I Disappear" on the Napster P2P file-sharing network, heavy metal band Metallica filed legal action against Napster over it (Metallica v. Napster, Inc.). This was the first time a major musical act publicly went against allegedly illegal file sharing.
- In February 2000, some of the Internet's most reliable sites were rendered nearly unreachable by distributed denial-of-service (DDoS) attacks. Yahoo! took the first hit on February 7, 2000. In the next few days, Buy.com, eBay, CNN, Amazon.com, ZDNet.com, E-Trade, and Excite were taken down by DDoS attacks. Though damage estimates vary widely, the FBI estimates that the companies suffered $1.7 billion USD in lost business and other damages.
- On May 5, 2000, the ILOVEYOU computer worm attacked tens of millions of Windows-based PCs. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The outbreak was estimated to have caused US$5.5–8.7 billion in damages worldwide, and estimated to cost the US$15 billion to remove the worm. The worm originated from the Philippines.
- Dmitry Sklyarov is arrested by FBI agents while visiting the United States for having cracked encryption on Adobe Acrobat e-book software, in violation of the United States' DMCA. This occurred despite the fact that Russia, of which he is a citizen, does not honor this law as of 2001.
- Google receives legal notices from the Church of Scientology and removes links to Operation Clambake from its search results.
- In October, a massive attack against the 13 root domain servers of the Internet is launched by unidentified hackers. The aim: to stop the domain name resolution service around the net.
- Site Finder, the attempt by VeriSign in 2003 to take control of all unregistered .com and .net domain names for their own purposes, is launched, and just as quickly scuttled after massive public outcry and official protest from groups such as ARIN and IANA.
- In November, Marvel Comics filed a lawsuit against the developers of the City of Heroes MMO, Cryptic Studios and their publisher NCsoft alleging that the game not only allows, but actively promotes, the creation of characters whose copyrights and trademarks are owned by Marvel, and that Cryptic has intentionally failed to police these infringing characters. The suit sought unspecified damages and an injunction to force the companies to stop making use of its characters. The case is settled and rejected by United States courts in December 2005 with no changes made to the game.
- In October, the Sony BMG copy protection rootkit scandal began, where it was discovered that Sony BMG surreptitiously and possibly illegally distributed copy protection software that forced itself to install on computers playing their audio CDs. As a result, many Windows based computers belonging to consumers were left vulnerable to exploit and hacking.
- In November, it was revealed that the online video game World of Warcraft, with millions of subscribers, would be hackable due to the far-reaching corruption and invasiveness of Sony's copy protection scheme.
- On December 20, the City of Heroes game servers were nearly all hacked by an undisclosed method. According to NCsoft representative CuppaJo, "Customer data and its security was not compromised in any way during the incident that occurred," and no additional information beyond this was publicly disclosed. As of July 2006, this is the first known hack of any MMO, of which there are millions of subscribers across numerous games.
- In January 2006, the Electronic Frontier Foundation lodged a class action lawsuit (Hepting v. AT&T) which alleged that AT&T had allowed agents of the National Security Agency to monitor phone and Internet communications of AT&T customers without warrants. In April 2006 a retired former AT&T technician, Mark Klein, lodged an affidavit supporting this allegation. The Department of Justice has stated they will intervene in this lawsuit by means of State Secrets Privilege. The existence of this database and the NSA program that compiled it was mostly unknown to the general public until USA Today broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail records of phone calls made after September 11 attacks.
- On May 3, a massive DDOS assault on Blue Security, an anti-spam company, is redirected by Blue Security staff to their Movable Type-hosted blog. The result is that the DDOS instead knocks out all access to over 1.8 million active blogs, including all ten million plus registered LiveJournal accounts (which is owned by Movable Type's parent company).
- The Motion Picture Association of America (MPAA) in May was accused of hiring illegal hackers to fight BitTorrent technology.
- In June, The Pirate Bay, a BitTorrent tracker website based in and operating from Sweden, is raided by Swedish police for allegedly violating United States, Swedish, and European Union copyright law. As of November 2006, the site remains online, operating from Denmark and no legal action has been filed against it or its owners. (The site is online now at thepiratebay.org)
|Wikimedia Commons has media related to Internet.|
- Computer and network surveillance
- Email fraud
- History of the Internet
- Identity theft
- Internet censorship
- Internet privacy
- Net neutrality
- Timeline of computer viruses and worms
- Timeline of computer security hacker history
- jmusheneaux.com: History of the Internet
- thocp.net: Arpanet History
- pbs.org: notable hackers
- Network World: Tim Lloyd Saga
- Reuters archive: Court upholds hacker's death sentence
- frontline: hackers: who are hackers: notable hacks
- Wired.com: Russian Adobe Hacker Busted
- eff.org: info on DMCA and Russia
- news.com: Net attack flops, but threat persists
- The Register: World of Warcraft hackers using Sony BMG rootkit
- cityofheroes.com: official incident response
- kotaku.com: City of Heroes Hacked
- jucaushii.ro: City of Heroes Hacked
- addict3d.org: City of Heroes Hacked
- Wired: Whistle-Blower Outs NSA Spy Room
- EFF.org: Government Moves to Intervene in AT&T Surveillance Case Archived 2007-09-29 at the Wayback Machine.
- USA Today: NSA has massive database of Americans' phone calls
- Democracy Now: Three Major Telecom Companies Help US Government Spy on Millions of Americans
- Netcraft: DDoS on Blue Security Blog Knocks Typepad, LiveJournal Offline
- gigaom.com: The Day DDoS Brought Down Six Apart
- Greg Sandoval (May 24, 2006). "MPAA accused of hiring a hacker". CNET News.com. Archived from the original on January 19, 2013.
- Wired.com: Pirate Bay Bloodied But Unbowed