Communications and the Internet

Computers collect, generate, and store data. Data communications, broadly conceived, have shaped the development and experience of computing. Histories of the telegraph, telephone and television are relevant to the history of computing; indeed some see computing has a part of the wider story of data and information. In the Collection we look at the transfer of data primarily between computers and peripherals and between computers.

The Internet is a global infrastructure for data communication, typically, the transfer of files. Through the development of the World Wide Web, and accompanying networking facilities, the Internet has enabled a virtual representation of professional, civic, commercial, social and personal life. The Collection is interested in recording and charting social aspects of the Internet. For example, it has materials relating to hacking, such as the journal 2600.

Electronic Messaging

In 1961, the Compatible Time Sharing System (CTSS) was a popular multiuser system, but lacked any features for allowing direct communication. Users of the system identified this need, however, and developed an ad-hoc system for sending messages to each other by writing files in a common directory with the recipient’s name. This was not secure - any user could read any mail messages, irrespective of their intended recipient.

The first documented proposal for a formal system for sending messages was Programming Staff Note 49 by Louis Pouzin, Glenda Schroeder, and Pat Crisman in 1964. This proposed a MAIL command for operators to notify users of events.

In 1965 Noel Morris and Tom Van Vleck implemented the MAIL command. Although the original proposal intended for it to be used by administrators to send messages to users, their implementation allowed any users to mail any other user. The MAIL program needed to run in a privileged mode to support this (equivalent of UNIX setuid). The functionality was similar to the original informal mail protocol. Each user had a mailbox file which contained their incoming mail. In the new system, this was a private file which only they could read. The MAIL command allowed arbitrary users to append messages to this file.

Another system used for communicating between users was the .SAVED command. This allowed users to write messages directly onto other users’ terminals. This was modified to provide notifications of new mail. When the MAIL command was used, it would first add the message to the recipient’s mailbox file and then write a message to their terminal (if they were logged in) to let them know that they had new mail. This was an important development over the older ad-hoc system, since it gave electronic mail delivery an immediacy not previously present. A user no longer had to periodically check their mail file to see if there were new messages.

The computers of this era were large machines with multiple users connected via terminals. They were very rarely connected to other machines. Mail was used in a similar way to internal mail in an organisation. It wasn’t until 1971 that these systems were expended to support networks. Ray Tomlinson modified the mail application to send messages to other machines via ARPANET, the system that would later evolve to become the Internet. This was the first use of the @ sign, used to signify user @ (at) computer.

The 1970s also saw the first instant messaging application. Emails were viewed as asynchronous messaging systems - replacements for postal mail where an immediate reply was not expected. The talk program, written for the PDP-11 and later ported to UNIX, split the screen of two users into two parts and allowed text typed by one user to appear at the bottom of their screen and the top of the other’s. Terminals of this era had very simple control mechanisms and talk was quite unreliable - two users tying at the same time could cause display corruption. Later terminals, with more advanced control mechanisms, made this kind of problem much more rare.

Electronic mail was originally a one-to-one communication system. In 1978, Ward Christensen introduced the Computerized Bulletin Board System (CBBS) in Chicago. This provided an online equivalent of the community notice board. Users would connect with their MODEMs, upload new files and collect those already there. The original system ran on a single MODEM, requiring users to connect one at a time. This kind of system gradually grew in popularity and eventually evolved into the kind of forums popular on the web today.

Bulletin board systems were very simple networks, typically consisting of a single server which clients would directly connect to. At the same time, ARPANET was evolving a peer-to-peer architecture with large university and government systems being connecting to a network. In 1979 Tom Truscott and Jim Ellis at Duke University implemented a form of message board using the UNIX to UNIX Copy Protocol (UUCP). This allowed users to post messages on a local machine which would then be relayed to other computers on the network. This became known as USENET, a contraction of user network. In 1985, UUCP would gradually be retired in favour of the Network News Transfer Protocol (NNTP), designed from scratch to efficiently propagate messages in this network.

In 1995, Deja News began maintaining an archive of the contents of USENET. Their index included posts from as early as 1981. This was controversial at the time, since many people had posted to USENET over the preceding decade with the expectation that their posts were transient.

Instant communication between computer users at this time was limited to the two conversing users supported by the talk program. In 1980, the Compuserve network launched an application they called a CB Simulator. In this period, increasing deregulation of the Citizens’ Band and the decreasing costs of radio equipment lead to increased popularity of CB radios and Compuserve aimed to exploit this. The CB Simulator introduced a simple many-to-many chat interface. The system was divided into channels, much like a real CB system (although they were identified by names rather than numbers). Text entered into one would be relayed to all other users in the same channel. This interface is still popular in more modern systems such as Internet Relay Chat (IRC) and Secure Internet Live Conferencing (SILC). In 1991, the CB Simulator would host the first online wedding.

Compuserve were responsible for two other innovations in electronic mail. In 1982, they introduced a bridge to Internet email, allowing Compuserve users to exchange email with Internet users. Prior to this, online service providers had maintained private email systems, where only subscribers to the system could exchange mails. This lead to people being forced to maintain several different email accounts in order to be able to communicate with everyone. The second significant development by Compuserve was the introduction of rich text email in 1992, with a WYSIWYG editor.

Instant messaging followed a similar pattern to email. The first system to allow instant messages to be exchanged was Quantum Link (which later became AOL), which allowed dial-up Commodore-64 users to exchange messages in 1985. In 1996 the Israeli company Mirabilis introduced ICQ (‘I seek you’) which brought instant messaging to the Internet. The proliferation of incompatible instant messaging systems lead to the development of the Jabber protocol in 2000. This was standardised by the Internet Engineering Task Force (IETF) as the Extensible Messaging and Presence Protocol (XMPP) in 2004. In 2005, Google introduced Google Talk, a commercial implementation of this standard.

David Chisnall

Further Reading
Tom Van Vleck’s History of Electronic Mail
Ray Tomlinson’s story of the first networked email

Social Life of the Internet

"When technique enters into every area of life, including the human, it ceases to be external to man and becomes his very substances. It is no longer face to face with man but is integrated with him, and it progressively absorbs him." J. Ellul

Currently, Internet associated technologies seem to be increasingly created and used for their social purposes. It is increasingly difficult to separate the technological from the social. It is the social application and implications of these technologies that have enabled the Internet to be an integral part of human society.

In this part of the collection, our main aim is to present the intimate integration between technology and society.

Victoria Wang

 Cybercrime

Currently, various Internet related technologies have generated new forms of human communication and interaction, bringing about new types of economic activities, social behaviours and even new social structures. Along with these, advances in technologies have also given rise to a new criminological phenomenon - cybercrime.

It is clear that cybercrime makes a significant contribution to the overall total of crimes committed nationally and internationally. The nature of cybercrime is of such complexity that it is unlikely to collect accurate and precise estimates, but a substantial amount of crime is likely to be related to the Internet and associated technologies.

Cybercrime is not officially defined. There are disagreements nationally and internationally regarding the definition of it. In theory, definitions are subjected to alterations by the use of crime type definitions in official crime statistical collections. In practice, different functional definitions are in use in various countries, which are of wide dimensions, covering various offences within the categories of organised crime, commercial crime, sex-related crime and deviance in cybercommunities. Research has shown that organised Crime (OC) groups are using computer technologies to both facilitate traditional crimes and create new forms of serious organised crime. Research has suggested that the commercial sector is the most obvious target for computer related crime and the financial losses from various offences within this category are significant nationally and internationally. Sex-related crimes are of serious concern since the use of the Internet and associated technologies by the sex industry is far more prevalent than providing and selling pornographic material. Research has demonstrated that the distribution of child pornography and the online grooming of children by paedophiles have been growing in a rapidly increasing rate since the late 1990s.     

The prevalence of cybercrime is significant. However, the exact prevalence and frequency of it, is hard to estimate since crime statistical reports of cybercrime have the common problem of serious under-estimation. The problem of under-presentation of cybercrime is caused by both general problems of crime statistics collection and interpretation, and specific problems which are only applied to cybercrime statistics.

Research has suggested that Internet related criminal activities are certainly included in general crime statistical reports. However, explicit notes of the involvement of the Internet and associated technologies are not observed. Hence, the degree to which offences are exacerbated by the facilitation of these technologies is hard to estimate. Most of official and unofficial cybercrime statistical reports are targeted at the business sector. The volume of these reports is significant yet the figures produced may not be representative. There is neither official crime statistical reports nor detailed studies about the extent of crime/deviance in cybercommunities. Research has suggested that government agencies may not consider these offences as criminal or more accurately anti-social behaviours as they do not result in any tangible/physical harm. Moreover, there is much debate over whether these online environments are newly created societies or merely grounds for virtual gaming.

In order to gain an intrinsic understanding of cybercrime, we may need to re-evaluate the term  cybercrime by separating it into two terms - cyber and crime. In studying the term 'cyber', we examine the role of the Internet and its associated technologies. Does it generate new criminal behaviours? The definition and categorisation of cybercrime should be based on the role of the Internet and associated technologies. By re-examine the term 'crime', we analyse offences of cyber related crime that appreciate the traditional legal definition of crime; and evaluate the possibility of some offences in the realm of cyber related crime that call for a reappraisal of the definition of crime.

Victoria Wang

Cyberspace Governance

A Declaration of the Independence of Cyberspace - John Perry Barlow

"Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather. ...

Governments derive their just powers from the consent of the governed. Youhave neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. Cyberspace does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions. ...

We will create a civilization of the Mind in Cyberspace. May it be more humane and fair than the world your governments have made before."

Davos, Switzerland, February 8, 1996.

1. Can cyberspace be governed?

2. How do law and technology adapt to the unique social characteristics of cyberspace governance?

Victoria Wang

The UK Web

The Web and Swansea University

David Dunbar, a lecturer in theoretical physics, was visiting the theoretical particle physics group at ULCA for academic year 1993-94. The UCLA experimental particle physics group showed David their web pages and he installed web software on a SUN SPARC machine belonging to his host, the ULCA theoretical particle physics group.

David mentioned the web and his installation in emails with graduate students back in Swansea. On their own initiative, Peter Coyle (a PhD student of Ian Halliday) and, in particular, Chris Abrahams (a PhD student of Aled Williams) took an interest and installed the web on the Swansea particle physics group machine Python.

Abrahams was a keen surfer. His site for surfers was soon noticed by the public and so appeared on the Ziff-Davis Road Map of the Internet, 1994.The earliest found software found on the machine Python is HTTPD version 1.3.

Swansea Surf Web page 

HoCC Facebook   HoCC Twitter  HoCC Flikr  HoCC Instagram