The internet timeline begins in 1962, before the word
‘internet’ is invented. The world's 10,000 computers are primitive, although they cost hundreds of thousands of dollars. They have only few thousand words of magnetic core memory, and programming them is far from easy. Domestically, data communication over the phone lines is an AT and T monopoly. The ‘picture phone’ of 1939, shown again at the New York World fair in 1964, is still AT&T’s answer to the future of worldwide communications. But the four-year old Advanced Research Projects Agency (ARPA) of the U.S Department of Defense, a future-oriented funder of ‘high-risk, high-gain research, lays the groundwork for what becomes the ARPANET and, much later, the Internet. ARPANET adopted TCP/IP on January 1, 1993, and from there researches began to assemble the ‘network of network’ that become the modern internet. The online world then took on a more recognizable form in 1990, when computer scientist Tim Berners-Lee invented the World Wide Web. Vint Cerf. Widely known as a ‘Father of the Internet’, Cerf is the co-designer of the TCP/IP protocols and the architecture of the internet. In December 1997, President Bill Clinton presented the U.S National Medal of Technology to Cerf and his colleague, Robert E. Kahn, for founding and developing the Internet. Michael Bauer, the original owner of the internet.org before Facebook founder and CEO Mark Zuckerberg, discovered what became of his treasured domain just like anyone else: while watching Chris Cuomo on CNN Meaning of Internet The Internet, sometimes called simply “the Net” is a worldwide system of computer networks-a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It is also a means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected over the internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs. Basically, the way the internet works is by connecting billions of computers together in things called networks. Networks (“net for short”) are clusters of computers linked together so that they can send data to each other. That is the ISP’s network, you are on. The Internet grew out of the Advanced Research Projects Agency’s Wide Area Network (then called ARPANET) established by the US Department of Defense in 1960’s for collaboration in military research among business and government laboratories. Later universities and other US Institutions connected to it. This resulted in ARPANET growing beyond everyone’s expectations and acquiring the “internet” The development of hypertext based technology (called World Wide web, WWW, or just the Web) provided means of displaying text, graphics, and animations, and easy search and navigation tools that triggered Internet’s explosive worldwide growth. Different Types of Internet Connections There are many ways a personal electronic device can connect speeds. As technology changes, faster internet connections are needed to handle those changes, faster internet connections are needed to handle those changes. I thought it would be interesting to list some of the different types of internet connections that are available for home and personal use, paired with their average speeds. 1. Dial-up (Analog 56k).-Dial up access is cheap but slow. A modern (Internal or External) connects to the internet after the computer dials a phone number. This analog signal is converted to dials a phone number. This analog signal is converted to digital via the modern and sent over a land-line serviced by a public telephone network. Telephone lines are variable in quality and the connection can be poor at times. The lines regularly experience interference and this affects the speed, anywhere from 28k to 56k. Since computer or other device shares the same line as the telephone, they can’t be active at the same time. 2. DSL. DSL stands for Digital Subscriber Line. It is an internet connection that is always “on”. This uses 2 lines so your phone is not tied up when your computer is connected. There is also need to dial a phone number to connect. DSL uses a router to transport data and the range of connection speed, depending on the service offered, it is between 128k to 8 Mbps. 3. Cable. Cable provides an internet connection through a cable modern and operates over cable TV lines. There are different speeds depending on if you are uploading data transmissions or downloading. Since the coax dial-up or DSL telephone lines, you can get faster access. Cable speeds range from 512K to 20 Mbps. 4. Wireless. Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or cables to connect to the internet. Instead, it users radio frequency. Wireless is also an always on connection and it can be accessed from just about anywhere. Wireless networks are growing in coverage areas by the time minute so when I mean access from just about anywhere, I really meant it. Speeds will vary, and the range is between 5 Mbps to 20 Mbps. 5. Satellite. Satellite accesses the internet via satellite in earth’s orbit. The enormous distance that the signal travels from earth to satellite and back again, provides a delayed connection compared to cable and DSL. Satellite connection speeds are around 512k to 2.0 Mbps. 6. Cellular Technology. Cellular technology provides wireless internet access through cellphones. The speeds vary depending on the provider, but the most common are 3G and 4G speeds. A 3G is a term that describes a 3rd generation cellular network obtaining mobiles speeds of around 2.0 Mbps. 4G is the fourth generation of cellular wireless standards. The goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality is about 21 Mbps currently. The internet is one of the fastest-growing areas of technical infrastructure development. Today, information and communication technologies(ICTs) are omnipresent and the trend towards digitization is growing. The demand for internet and computer connectivity has led to the integration of computer technology into products that have usually functioned without it, such as cars and buildings. Electricity supply, transportation infrastructure, military services and logistics- virtually all modern services depend on the use of ICTs. Although the development of new technologies is focused only on meeting consumer demands in western countries, developing countries can also benefit from new technologies. With the availability of long-distance wireless communication technologies such as WiMAX and computer systems that are now available for less than USD 2006, many more people in developing countries should have easier access to the internet and related products and services. The influence of ICTs on society goes far beyond establishing basic information infrastructure. The availability of ICTs is a foundation of development in the creation, availability and use of network-based services. E-mails have displaced traditional letters online web representation is nowadays more important for business than printed publicity materials; and internet-based communication and phone services are growing faster than landline communications. The availability of ICTs and new network-based services offer a number of advantages for society in general, especially for developing countries. ICT applications, such as e-government, e-commerce, e-education,e-health and e-environment, are seen as enablers for development, as they provide an efficient channel to deliver wide range of basic services in remote and rural areas. Advantages and Risk of Information and Communication Technologies (ICTs) The introduction of ICTs into many aspects of everyday life has led to the development of the modern concept of the modern society. This development of the information society offers great opportunities. Unhindered access to the information can support democracy, as the flow of information is taken out of the control of state authorities (as happened, in Eastern Europe and North America). Technical developments have improved daily life-for example, online banking and shopping, the use of mobile data services and voice over internet protocol (VoIP) telephony are just some examples of how far the integration of ICTs into our daily lives advanced. However, the growth of the information society is accompanied by new and serious threats. Essential services such as water and electricity supply now rely on ICTs. Cars, traffic control, elevators, air conditioning and telephones also depend on the smooth functioning of ICTs. Attacks against information infrastructure and internet services now have the potential to harm society in new and critical ways. Attacks against information infrastructure and internet services have already taken place. Online fraud and hacking attacks are just some examples of computer- related crimes that are committed on a large scale every day. The financial damage caused by cybercrime is reported to be enormous. In 2003 alone, malicious software caused damages of up USD 17 billion. By some estimates, revenues from cybercrime exceeded USD 100 billion in 2007, outstripping the illegal trade in drugs for the first time. Nearly 60 percent of businesses in the United States believe that cybercrime is more costly to them than physical crime. These estimates clearly demonstrates the importance of protecting information infrastructures. Most of the above- mentioned attacks against computer infrastructure are not necessarily targeting critical infrastructure. However, the malicious software “Stuxnet” that was discovered in 2010 underlines the threat of attacks focusing on critical infrastructure. The software, with more than 4000 functions, focused on computer systems running software that is typically used to control critical infrastructure. Committing a cybercrime automatically involves a number of people and businesses, even if the offender acts alone. Due to the structure of the internet, the transmission of a simple e-mail requires the service of a number of providers. In addition to the e-mail provider, the transmission involves access providers as well as routers who forward the email to the recipient. The situation is similar to the downloading of movies containing child pornography. The downloading process involves the content provider who uploaded the pictures (for example on a website), the hosting provider who provided the storage the storage media for the website, the routers who forwarded the files to the user, and the finally the access provider who enabled the user to access the internet. Because of this involvement by multiple parties, internet service providers have long since been at the center of criminal investigations involving offenders who use the ISPs service to commit an offense. One of the main reasons for this development is that, even when the offender is acting from abroad, the providers located within the country’s national borders are a suitable subject for criminal investigations without violating the principle of national sovereignty. The fact that, on the other hand, cybercrime cannot be committed without the involvement of providers often do not have the ability to prevent these crime. The answer to the question is critical for economic development of ICT infrastructure. Providers will only operate their services if they are able to avoid criminalization within their regular mode of operation. In addition, law enforcement agencies also have a keen interest in the question. The law-enforcement agencies very often depends on cooperation of, and with, internet providers. This raises some concern, since limiting the liability of internet providers for acts committed by their users could have an impact on the ISPs’ cooperation and support for cybercrime investigations, as well as on the actual prevention of crime. CHAPTER II What is Cybercrime? Cybercrime is an activity done using computers and internet. We can say that it is an unlawful act wherein the computer either as a tool or target or both. Cybercrime is any crime that takes place online primarily online. That can run the gamut from the aforementioned identity theft and other security breaches to things like “revenge porn” cyber-stalking, harassment, bullying and even sexual exploitation. Terrorists are collaborating more on the internet, moving that most terrifying of crimes into cyberspace. History of Cybercrime The first recorded cybercrime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from a computer, has been around since 3500 B.C in India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the EIK Cloner. Cybercrime first started with hackers trying to break into computer networks. Some did it just for the thrill of accessing high-level security networks, but others sought to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdowns on personal and business computers. Banks and other financial institutions were among the fist large scale computer users in the private sector, for automate payroll and accounting functions. Therefore, fraud in a computer scheme emerged. One of the first cases cited as instance of the computer fraud involved equity-funding Corporation in the US, fraud was simple. The frauds succeed because the auditors and regulators accepted computer as definitive evidence of policies and did not ask original documentation. When the fraud was discovered, some 64,000 out of 97,000 policies allegedly issued by the company proved to be false, almost 1 billion pounds estimated to be loss. Therefore as the technological advance the number of cybercrime cases increased. There is no reliable and precise statistics of the losses the victims gain as the fact that victims do not detect many of these crimes. Therefore, fights against computer crime began. Several individuals were engage in the fight against computer crime from the early development. The founder and father of the knowledge of computer crimes are by many observers considered to be Donn B. Parker, USA. He was involved in the research of computer crime and security from the early 1970. He served as Senior Computer Security Consultant at the SRI International (Standard Research Institute), and was the main author of the first federal manual of law enforcement in the USA; “Computer Crime-Criminal Justice Resource Manual” (1979). This manual became soon an encyclopedia also for law enforcement outside US.