Introduction: A Brief History 1
The origins of the Internet began as a military project funded by the Defense Advanced Research Projects Agency (DARPA). It was through this project that computer scientists developed the protocols (computer language) used to transfer information between computers. In 1969 the first computer to computer linksâ or networkâwas established between four university computers. The network was called ARPAnet. 2 The first message was sent from a computer at the University of California, Los Angeles to Stanford University. The first message sent was âlo.â The intended message was âlogin,â but the system crashed before the entire message could be sent. From these humble beginnings grew the Internet of today.
In those early years of government-funded research and development, computer networks were in universities, military installations, and some financial institutions. The National Science Foundation (NSF) funded the construction of several lines that connected these several computer networks, interconnecting separate networks, forming what can be considered the original Internet backbone. This investment by the NSF led to DARPA ceding control over the administration of the Internet to the NSF.
From the beginning of the Internetâs development in the 1960s through its NSF years, there was no need for Internet security as we know it today. The users of the network were few in number, and those that could use a computer network were generally highly skilled academics or military personnel. Advances in usability and the existence of Graphical User Interfaces (GUIs) were not common. Moreover, there was no e-commerce of any kind. There wasnât a need for the users who operated a computer to prove it was truly them.
The modern Internet began in 1993, with the NSF granting licenses to several commercial service providers who could then sell Internet service to citizens. Most of these providers were phone companies, as it was through a phone line that a person could connect their computer to the network. This commercialization could be said to have created the Internet as we know it. Economic incentives compelled companies providing internet service to gain subscribers. This included building new telecommunication lines out to new areas of the country and finding cheaper ways of connecting people.
Economic incentives were also the foundation for the many innovations that occurred, as companies developed services and products to sell through the technology. E-commerce, pornography, search engines, and more were all developed shortly after the commercialization of the Internet. The convergence of people and commerce made the Internet a space highly conducive to crime and deviance. As we will discuss later, the ability of computer users to connect to the network without personal credentials being verifiedâbeing anonymousâmade deception much easier and crime inevitable.
Thinking about Technology and Society
When a new technology is introduced into societyâletâs say for example a new application that connects individuals with cars to people who need transportationâthe response by the media and many writers is to ask: âHow will the technology impact society?â or âHow will the technology change the way we do things?â For everyday discussions of technology, this is a perfectly valid way of talking about and thinking about new technology.
Figure 1.1 Mobile driving services such as Uber (shown) and Lyft are relatively new applications that link people who need transportation with people willing to provide that service. One way of thinking about these applications is to ask how they change the way we travel in cities. However, a more nuanced way of thinking about these applications is to ask the additional question of how do people modify and adapt the technology to their personal goals (https://marketresearchupdates.com/2019/03/06/grab-reportedly-valued-14-billion-investment-softbanks-vision-fund/).
However, most scholars of technology believe that there is an interplay between what a technology can do, often called the âaffordancesâ of a technology, and the values and goals of individuals (Bijker, Hughes, & Pinch, 2012; MacKenzie & Wajcman, 1999). Technology does not simply âimpactâ society. The makers of a technology will have a use in mind when they initially design it and introduce it to the public. But after its introduction, people often find new uses for the technology (see Figure 1.1).
For example, the initial thoughts of Twitter developer Jack Dorsey were to create a new version of the citizens band, or CB radio, for the Internet age. Its original purpose was to allow small groups to maintain contact with each other. Twitter has indeed become a kind of mobile, quick messaging system that is similar to how truckers used CB radio.
But Twitter has become much more than what its founders dreamed it would be. Groups with specific values and goals began using Twitter in ways that helped them achieve their goals. Twitter is now a public platform to publicize causes such as police brutality and sexual violence against women (Gill & Orgad, 2018; Graham & Smith, 2016; Mendes, Ringrose, & Keller, 2018; Royal & Hill, 2018). Groups seeking revolutionary changes in their countries have used Twitter to communicate their cause and organize on a mass scale. It has not all been positive for Twitter. The platform has also taken criticism as a space where racist, sexist, and homophobic ideas proliferate.
The point here is that a technology rarely ever impacts society in a simple, one-way fashion. Instead, a technology is designed with a series of affordances that the designer believes will lead to a given usage (Davis & Chouinard, 2016; Graves, 2007; Shaw, 2017). However, the goals and values of individuals will create new uses from these original affordances. Consequently, the patterns that develop around a technology after it is produced are hard to anticipate.
We import this understanding of technology into our exploration of cybercrime and cyberdeviance. For example, we should not only ask âHow do algorithms impact practices in the criminal justice system?â This is a good starting question because indeed algorithms have already changed aspects of the criminal justice system in the form of predictive policing and risk assessment in sentencing. However, we must also ask a more difficult, but more rewarding question: âHow do the values and goals of people influence the way algorithms are used in the criminal justice system?â
Criminal behavior via technology is often the result of people taking technology designed for one purpose, and finding new, illegal uses for the technology. Take asymmetric key Âcryptography. Asymmetric key cryptography makes it possible to share a message over a distance without two people physically meeting. A mathematically related key is made and split into two separate keys. One key is used for decrypting a message and is kept private by the user. The second key is used to encrypt messages and is made public. Anyone who wishes to send a private message can use the public key to encrypt a message, and then send it to the person with the public key. There are many benign or positive applications of asymmetric key cryptography, with militaries, governments, and banks all needing to send secure messages through computer networks. But it can also be used by terrorists, child pornography distributors, and other cybercriminals who wish to share sensitive information as well.
Interconnected Technologies
Complicating our thinking about technology is the fact that the Internet is not just one Âtechnology, but several interconnected technologies that produce the experience of being online. As an example, if law enforcement is looking to collect evidence for a case they will probably not look âon the Internet.â Instead, they will look on a suspectâs hard drive. They will request information about the suspectâs social media activity from the social media company (information stored on its databases). They may examine the log files on the suspectâs home router. All these technologies work together to produce interconnected computer networksâthe Internet.
The Internet is a complex ecosystem of technologies that produces an environment for social interaction. This environment is produced through several layers of technology. This includes the infrastructure through which computers communicate (e.g. copper wires, fiber-optic cables), the machines that house computer processors (e.g. smartphones, desktops, and increasingly household appliances), and the software applications or âappsâ that power the machines. This co...