Pleasant@Rutgers.ARPA (03/26/83)
HUMAN-NETS Digest Friday, 25 Mar 1983 Volume 6 : Issue 11
Today's Topics:
Queries - BYTE Issue on Handicapped &
Devanagiri Text Editor,
Computers and People - Human Memory Capacity &
Hackers and Bit Memory
Computers and the Law - Computer Crime
----------------------------------------------------------------------
Date: 14 Feb 1983 14:25:08 EST (Monday)
From: Roger Frye <frye at BBN-UNIX>
Subject: BYTE Issue on Handicapped
The September issue of Byte was devoted to computer aids for the
handicapped. Does anyone else have further information,
specifically for quadriplegics. I am trying to help a college
educated man who was paralyzed in a car accident. He controls his
wheelchair and phone with a sip-and-puff device.
Roger Frye <frye at BBN-UNIX> 617-497-3155
------------------------------
Date: 17 February 1983 1914-EST
From: Vijay Saraswat at CMU-CS-A
Subject: Devanagiri Text Editor
I am interested in developing a system to input , process and
display Devanagiri characters and running text . Essentially , I am
interested in developing a text editor for a language based on the
Devanagiri script, like Hindi . The system will input characters
from a standard keyboard , process them for display (on a bit-mapped
screen ) which may involve superposition ,subscription and
superscription of characters and also convert them into a press file
suitable for printing on a device like the Dover. Since I am not
happy with the current SANSKRIT10 font on the Dover , this may also
involve the design of a new Devanagiri font .
Since I do not want to reinvent the wheel , comments , advice ,
pointers to existing work are solicited .
Thanks in advance .
Vijay.Saraswat@CMU-CS-A
------------------------------
Date: 12 January 1983 11:57 mst
From: RSanders.Pascalx at DENVER
Subject: re: Dynabooks with all my memory in them.
No thanks - I would rather have real books around (even LP's and
analog video-disks) until someone comes up with a sure-fire method
of backing up all my (off-line ?) memory. I've been around
computers too long to believe in the infallibility of disks, tapes,
core, semi-conductor memory, etc. Can you imagine what a few good
alpha or beta particles could do to a Dyanbook crammed with a few
gigabytes of storage? Especially if you live next door to a nuke
plant or MX missile warhead factory?
What happens if someone steals my Dynabook? Will it self-destruct
without my retinal patterns staring at the display? Will it
accidentally self-destruct when I get a black eye in a barroom
brawl? (Boy, aren't fantasies great!)
What about historical records? What will happen to history when
everyone's thoughts are recorded on an ancient form of silicon (or
whatever) memory that no-one uses any more? Who can say that the
rocks in your backyard aren't the Dynabook memories of ancient
astronauts, scattered around for us to decipher. (I think I'm going
off the deep end).
My main point is I won't trust all my life's records to a 8 1/2 by
11, 3 pound device of any nature. Maybe I'm getting old and cranky.
-- Rex
------------------------------
Date: 17 February 1983 06:57 est
From: SSteinberg.SoftArts at MIT-MULTICS
Subject: hackers and bit memory
I always thought that being a hacker was a matter of attitude and
behavior. A hacker is curious and playful and will try things out
to see what happens. Hackers will then use their knowledge to make
their work easier. Unlike most people, hackers tend to stay awake.
The industrial revolution would have been impossible without
hackers. The presence and importance of hackers has been at the
center of almost every great civilization. Homer appreciated a good
hack; Jesus did not. Zorba the Greek and Roger Bacon were good
hackers. Hacking certainly antedates computing and might antedate
mankind.
I doubt that it is reasonable to put a specific number on the bit
equivalent of human memory. How many bits does it take to ride a
bicycle? If you want to discuss how many bits a person can recall
then it might be easier, but remember, a lot of memorizers don't
have full random access.
Memory is really strange stuff. An acquaintance of mine is
dyslexic, but has an eidetic memory and can remember several pages
of a book and then struggle through reading them hours later. I do
this with sounds. Often when I can't understand something I had
just heard I find that repeating the sounds out loud will make the
words understandable.
------------------------------
Date: 17 Feb 1983 1711-CST
From: Clive Dawson <CC.Clive@UTEXAS-20>
Subject: Texas Legislature to consider a Computer Crime Law
Texas State Rep. Lloyd Criss from Galveston has introduced a bill
which will add a new category of computer crime to the Texas Penal
Code. The bill is currently in committee.
A transcription of this bill, together with a news release and
summary, can be found at the end of this message. (I understand
that some recent changes to the bill will raise some of the offenses
listed as Class B misdemeanors to Class A.) What bothers me most
about this bill is its definition of a "computer system". If the
bill passes in its present form, somebody could theoretically be
prosecuted for erasing the memory of my microwave oven or even for
pushing one of the buttons on my digital watch.
I'd like to suggest a better definition, but coming up with one is
not easy. If you have any comments on the bill, particularly about
how a computer system should be defined FOR PURPOSES OF THIS BILL,
please send me mail at Clive@UTexas.
Thanks,
Clive
====================================================================
Texas House of Representatives
NEWS RELEASE FOR MORE INFORMATION CONTACT:
December 15, 1982 GREG ENOS (512) 475-5749
Today's computer whiz kids may be less likely to group up into
tomorrow's computer criminals if a bill introduced by State
Representative Lloyd Criss is approved by the 68th Legislature.
Criss has prefiled a package of computer related bills including
a computer crimes law. "These bills are designed to catch state
law up with the advances in technology," Criss said.
Criss' House Bill 193 adds a new category of computer crimes to the
Texas Penal Code. "Computer crimes cost American government and
business an estimated $1.5 billion last year," Criss said. He
noted that the average computer crime loss is $500,000 compared
to $3,200 for the average bank robbery. "Many kinds of computer
abuse would be extremely difficult to prosecute under existing
penal statues written before the microchip was invented," Criss
said. House Bill 193 also empowers the Attorney General to
assist local prosecutors and law officers in investigating
and prosecuting computer crimes.
House Bill 66 by Criss would apply the state sales tax to the
sale of computer programs. "Sales tax on computer programs is a
perfect example of how law often lags behind technology," Criss
said. "The Comptroller collected sales tax on computer programs
until the Texas Supreme Court ruled in 1976 that programs are
intangible and so exempt from the tax." "So now no tax is
collected on millions of dollars worth of computer programs and
records and cassettes," Criss said. "This is not a tax
increase but rather an instance of the Legislature
correcting an unfortunate judicial decision."
Criss' house bill 114 specifically defines computer programs as
goods under the Texas Commercial Code. "This will extend legal
protection to consumers and especially businesses who contract to
buy computer programs," Criss said.
Criss predicts his computer package will be supported by banking,
insurance and business groups. "Those people depend on computers
and will want the legal protection my bills provide," Criss said.
-------------------------
BILL ANALYSIS
House Bill 193 By: Criss
Background Information:
Considering the great reliance of government and
business on computers, the potential for criminal abuse of
computers is great. The U.S. Chamber of Commerce estimates that
losses resulting from computer crime amount to $100 million per
year. One study states that the average proceeds from a computer
crime are $450,000 while the average bank robbery results in a
$10,000 loss. Eleven states have adopted computer-crime laws.
Problems the bill addresses:
Many computer crimes can be prosecuted under existing laws
relating to theft, fraud, etc. However, certain crimes such as
unauthorized access or destruction of data do not fall easily
into traditional categories of crime. For example, students at a
New England prep school recently used their school's computer and
a telephone to penetrate the computer memories of several Canadian
insurance companies. Millions of dollars worth of information
was destroyed. Had such a crime occurred in Texas, it is
doubtful any convictions would have resulted. Local law
agencies and prosecutors typically lack the training and
experience to investigate and prosecute technically complicated
computer crimes.
How H. B. 193 solves the problem:
H. B. 193 clarifies the Penal Code, making virtually all
computer crimes prosecutable. H. B. 193 also empowers the
Attorney General to assist local law enforcement agencies and
prosecutors in the investigation and prosecution of computer
crimes.
Section by Section Analysis:
Section 1. Amends Title 7 of the Penal Code by adding a new
Chapter 33 which:
1. defines terms
2. makes access of a computer system for a fraudulent
purpose a class A misdemeanor
3. makes breach of a computer security system a class B
misdemeanor
4. makes unauthorized or harmful access of a computer
system a class B misdemeanor
5. makes intentional interference with a computer system a
class B misdemeanor
Section 2. Amends Article 4410b of Chapter 4, Title 70,
Revised Statutes, mandating the Attorney General to assist local
agencies in the investigation and prosecution of computer crimes.
Section 3. Act takes effect September 1, 1983.
Section 4. Emergency clause.
-------------------------
A BILL TO BE ENTITLED
AN ACT
relating to the creation of offenses involving computers.
BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF TEXAS:
SECTION 1. Title 7, Penal Code, is amended by adding
Chapter 33 to read as follows:
Chapter 33. COMPUTER CRIMES
Sec. 33.01 DEFINITIONS. In this chapter:
(1) "Computer security system" means the
personnel, procedures, computer software, equipment, or other
means used by the operator of a computer system to restrict
access to a computer system, its software, and its services to
authorized users.
(2) "Computer software" means instructions or
statements that permit a computer system to perform a useful
function.
(3) "Computer system" means a device or set of
devices that stores data in an intangible form, or that, in response
to instructions or data given to it, analyzes data, converts data
from one form into another, or produces new data.
(4) "Computer system services" means providing or
using a computer system to perform work of value, allowing another
person to use a computer system, or storing, analyzing, converting,
or producing data on a computer system.
(5) "Operator," with respect to a computer system,
means the person who manages, controls, or directs the operation
and use of the system.
Sec. 33.02 ACCESS FOR FRAUDULENT PURPOSE.
(a) A person commits an offense if he intentionally uses or
allows another to use a computer system for the purpose of devising
or executing a scheme or artifice to obtain property or services
with intent to avoid payment for the property or service.
(b) In this section, "property" and "service" have
the same meanings as are given those terms in Section 32.01 of this
code.
(c) An offense under this section is a Class A misdemeanor.
Sec. 33.03. BREACH OF SECURITY SYSTEM.
(a) A person commits an offense if, without the effective
consent of the operator of the computer system, he intentionally:
(1) uses a computer system in order to breach a
computer security system;
(2) breaches a computer security system; or
(3) gives information concerning a computer security
system to another person.
(b) An offense under this sections is a Class B
misdemeanor.
Sec. 33.04. UNAUTHORIZED OR HARMFUL ACCESS.
(a) A person commits an offense if he:
(1) users a computer system in a manner not
permitted to him by the operator of the system;
or
(2) without the effective consent of the operator
alters, damages, or destroys a computer system,
computer software, or data contained or provided
by a computer system.
(b) An offense under this section is a Class B misdemeanor.
Sec. 33.05. INTERFERENCE WITH COMPUTER SERVICE.
(a) A person commits an offense if, without the effective
consent of the operator of the computer system, he intentionally
interferes with or interrupts computer system services to one
authorized to receive the services.
(b) An offense under this section is a class B misdemeanor.
SECTION 2. Chapter 4, Title 70, Revised Statutes, is
amended by adding Article 4410b to read as follows:
Art. 4410b. ENFORCEMENT OF COMPUTER CRIMES
PROVISIONS. The attorney general shall assist state and
local law enforcement and prosecuting agencies in informing
computer users of the provisions of Chapter 33, Penal Code, and
in investigating and prosecuting violations of Chapter 33, Penal
Code.
SECTION 3. This act takes effect September 1, 1983.
SECTION 4. The importance of this legislation and the
crowded condition of the calendars in both houses create an
emergency and an imperative public necessity that the
constitutional rule requiring bills to be read on three separate
days in each house be suspended, and this rule is hereby suspended.
====================================================================
------------------------------
End of HUMAN-NETS Digest
************************