[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

47.0. "Combatting Hackers" by QUILL::NELSON () Mon Aug 20 1984 00:12


        The following originally appeared in a  notesfile  on  CDC's  PLATO
   system.   As  you  may  or  may not know, PLATO system development is in
   Minneapolis, MN.

                                   JENelson
   =============================================================================



                 COMPUTER CRIME -- CHAPTER 534  H.F.No.  356

        An  Act  relating  to  crimes;  specifying  offenses  relating   to
   computers;  providing  penalties;  proposing  new law coded in Minnesota
   Statutes 1980, Chapter 609.

        Be it enacted by the Legislature of the State of Minnesota:

               Section 1.  609.87  Computer crime; definitions

        Subdivision 1, Applicability.  For purposes of sections  609.87  to\
   609.89 the terms defined in this section have the meanings given them.

        Subdivision 2, Access.  "Access"  means  to  instruct,  communicate\
   with, store data in, or retrieve data from a computer system or computer
   network.

        Subdivision 3, Computer.  "Computer"  means  an  electronic  device\
   which   performs   logical,  arithmetic  and  memory  functions  by  the
   manipulations of signals, including but not  limited  to  electronic  or
   magnetic impulses.

        Subdivision 4, Computer system.  "Computer system"  means  related,\
   connected or unconnected, computers and peripheral equipment.

        Subdivision 5, Computer  network.   "Computer  network"  means  the\
   interconnection  of  a  communications  system with a computer through a
   remote terminal or with two or more interconnected computers or computer
   systems.

        Subdivision 6, Property.  "Property" includes, but is  not  limited\
   to  electronically  processed or produced data and information contained
   in a computer or computer software in either machine or  human  readable
   form.

        Subdivision 7, Services.  "Services" includes but is not limited to\
   computer time, data processing, and storage functions.

        Subdivision 8,  Computer  Program.   "Computer  program"  means  an\
   instruction or statement or a series of instructions or statements, in a
   form acceptable to a  computer,  which  directs  the  functioning  of  a
   computer  system  in  a  manner designed to provide appropriate products
   from the computer.

        Subdivision 9, Computer  Software.   "Computer  software"  means  a\
   computer  program  or  procedures, or associated documentation concerned
   with the operations of a computer.

        Subdivision 10, Loss.  "Loss" means the greatest of the following:\

  (a)  the retail market value of the property or services involved;

  (b)  the reasonable repair or replacement cost, whichever is less; or

  (c)  the reasonable value of the damage created by the unavailability  of
       lack of utility of the property or services involved until repair or
       replacement can be effected.



                     Section 2.  609.88  Computer damage

        Subdivision 1, Acts.  Whoever does any of the following  is  guilty\
   of computer damage and may be sentenced as provided in subdivision 2;

  (a)  Intentionally and without  authorization  damages  or  destroys  any
       computer,  computer  system, computer network, computer software, or
       any property specifically defined in section 609.87, subdivision 6.

  (b)  Intentionally and without authorization and with intent to injure or
       defraud  alters  any  computer,  or  any other property specifically
       defined in section 609.87, subdivision 6.


        Subdivision 2, Penalty.  Whoever commits  computer  damage  may  be\
   sentenced as follows:

  (a)  To imprisonment for not more than ten years or payment of a fine  of
       not  more  than  $50,000,  or  both,  if the damage, destruction, or
       alteration results in a loss in excess of $2,500, to the owner,  his
       agent or lessee;

  (b)  To imprisonment for not more than five years or to a  payment  of  a
       fine of not more than $5,000, or both, if the damage, destruction or
       alteration results in a loss of more than $500, but  not  more  than
       $2,500 to the owner, his agent or lessee; or

  (c)  In all other cases to imprisonment for not more than 90 days or to a
       payment of a fine of not more than $500, or both.



                      Section 3.  609.89  Computer theft

        Subdivision 1, Acts.  Whoever does any of the following  is  guilty\
   of computer theft and may be sentenced as provided in subdivision 2;

  (a)  Intentionally and without authorization or claim of right access  or
       causes  to  be  accessed  in any computer, computer system, computer
       network or any part thereof for the purpose of obtaining services or
       property; or

  (b)  Intentionally and  without  claim  to  right,  and  with  intent  to
       permanently  deprive  the  owner  of  possession,  takes, transfers,
       conceals, or retains possession of any computer, computer system, or
       any  computer  software  or  data  contained in a computer, computer
       system, or computer network.


        Subdivision 2, Penalty.  Anyone who commits computer theft  may  be\
   sentenced as follows:

  (a)  To imprisonment for not more than ten years or to payment of a  fine
       of  not  more  than  $50,000, or both, if the loss to the owner, his
       agent, or lessee is in excess of $2,500; or

  (b)  To imprisonment for not more than five years or a payment of a  fine
       of  not  more  than  $5,000,  or both, if the loss to the owner, his
       agent or lessee is more than $500, but not more than $2,500; or

  (c)  In all other cases to imprisonment for not more than 90 days  or  to
       payment of a fine of not more than $500 or both.



                          Section 4.  Effective date

        This act is effective August 1, 1982  and  applies  to  all  crimes
   committed on or after that date.

        Approved March 22, 1982.

   =============================================================================
T.RTitleUserPersonal
Name
DateLines
47.1NY1MM::MUSLINMon Aug 20 1984 04:406
	a) What is PLATO?

	b) I object to the word "Hacker" in the title of this message! :-)


					- Victor -
47.2ORPHAN::BRETTMon Aug 20 1984 13:004
PLATO is a CDC cai system

/Bevin
47.3PSYCHE::MCVAYWed Aug 22 1984 00:5924
 PLATO is THE c.a.i. system.  It originally ran under the biggest
godawful machines around: CDC Cybers.  PLATO is also one of the finest 
courseware authoring languages ever developed.  It is possible to 
write, or simulate, almost anything on a PLATO terminal.  It is even 
possible to hook up oscilloscopes and simulate any sort of mechanical 
or electrical problem on the scope.  With all that, why isn't 
everything written in PLATO?

 ...because the developers confused the tool with the users.  They 
invented the greatest typewriter in the world, and then were puzzled 
that the greatest novels in the world weren't suddenly produced on it. 
Essentially, it was discovered that great coursewriting software 
doesn't lead to great courses.

 In recent years, PLATO has been resurrected on small systems.  It 
runs nicely on Apples and IBM PCs.  Someday a truly gifted writer/
teacher may even develop the great courseware the designers hoped 
might appear...

=================================================================

 On the original subject of this note: it's simply a matter of the law 
catching up with technology.  Once cars started using roads, speed 
limits were inevitable (except in England).
47.4ACE::BREWERTue Aug 21 1984 23:4415
	I also took a demo on a Plato system supported, I believe by a 6600
or 7600 CDC Cyber machine. Pretty neat for the time (6years or so ago).
All of the terminals that we used had touch screen user interface. I remember
them as capacitively controlled with a mylar or some such overlay over the
screen.

	re: CYBER (NOS.BE operating system)....

	    THANK GOD FOR DCL!!!

		I also remember all of the PLATO terminals having a "CDC of Iran"
logo on the front. The writeoff of Trilogy may have been small in comparison!

	-John
47.5VIKING::WATERS_1Wed Aug 22 1984 20:2410
	Doesn't anyone have any reaction to the subject matter instead
of the PLATO system?

				- Lester -

P.S. I have a number of legal issues on computer crime and regulation
(such as limiting BBS systems). they can be found on

		VIKING::WRK:[WATERS.BBS]
47.6TURTLE::GILBERTThu Aug 23 1984 19:079
I "grew up" in the vicinity of the original PLATO development (I tended to
avoid PLATO, since it was an easy way to spend all-nighters, and to flunk out
of college).  The "core" of the system was a CDC Cyber (later 2), and the most
incredibe hodge-podge of miscellaneous other equipment imaginable.  A small
fleet of PDP-11s were used as file servers, ....

Regarding the original note.  The legislation looks good; the software industry
needs such legislation.  Also, I was a nit surprised by the severity of the
maximum fines and jail sentences.
47.7QUILL::NELSONFri Aug 24 1984 03:4615
Some interesting legal questions, assuming the legislation has been enacted:

    1)  Consider the pirate in State A who steals software from a
    	computer in MN; the software is owned by a user located in
    	State B (both states may or may not be MN.)  Can user B charge
    	and convict under MN law?

    2)  What about pirates outside of the USA?  CDC has data links between
    	most of it's PLATO systems throughout the world; interactive links
    	are rare, but they do exist.

    4)  Are pirates in MN convictable under MN law if the computer they
    	steal from is not in MN?

    				JENelson