The Michigan Daily-Saturday, June 9, 1979-Page 7
iting a new policy program
..
, '" r
Daily Photo By JIM KRUZ
Cal at the North University Building Station
n their computer programs. Located near the
4s, NUBS was established in April 1971.
A computer engineering student, who
wished to remain unidentified, said
there is "a fair amount" of stealing
ID's. "I have a friend who had 12 ac-
counts stolen last year," he said.
Computer users are advised to
change their passwords often and keep
them secret, so hopeful "thieves" can't
find them. Nevertheless, no matter how
careful a user is, no one is entirely
protected from being robbed of com-
puter funds. Occasionally a "clever"
person will discover a "bug" in MTS
that allows him to gain access to
someone's password or private files.
While some computer whizzes
deliverately try to beat the system or
"crash" MTS, no one knows the extent
of this activity. Apparently there is a lot
more talk than action by those who
claim to have the skill to manipulate
the computer for the sake of fun or their
own gain.
A student explained how a friend
wrote a loop (continuously repeating)
program that kept asking the computer
for more space until all the files were
full and no one could use the computer
until it was fixed.
Emory said security breaks are very
rare, and stressed "the systems are
secure."
Volz agreed, saying it is "moderately
difficult" to beat MTS. "Once ina while
someone does cause the system to
crash," he said.
"MTS is hard to crash," explained an
upper level student. "You have to know
quite a bit (about the system.)" He
suggested "using students' cleverness
to make the system more secure."
This idea was tested on a limited
basis during spring term 1978 when
students in CCS 673 were asked to
assess the security of the MTS system
as a class project. According to Bob
Blue, a counselor at NUBS, the class
found three or four flaws which resulted
in subsequent modification of the
system.
"(The class) had limited effec-
tiveness because students find bugs
they don't tell anyone about," said
another computer engineering student.
A computer engineering major said
he was "proud" of himself for
discovering how to gain access to a
solution to a program assigned for one
of his classes.
Because this type of cleverness in-
dicates advanced skill, faculty mem-
bers sometimes encourage it, accor-
ding to Parker. Attacks on the system
have been encouraged "under the guise
that it is educational and helpful to
discover holes that can then be
plugged," he said.
"General encouragement of this type
of thing (trying to crash a computer
system) results in the breakdown of
ethical values," said Parker. His main
concern is that when students graduate
and enter the "real world" they are not
sure what is appropriate use of .the
computer.
Computer students and a teaching
assistant said "inventiveness" is en-
couraged to some extent at the Univer-
sity. "There is a lot of internal en-
couragement," said one student. "Ob-
viously the administration does not
support it."
Although official disciplinary policy
action for computer misuse requires
that a student follow the normal chan-
nels for grievance procedures in his
school or college, often instructors will
take the incident more lightly. They
may simply tell the student not to do it
again or to be more careful next time.
However, most computer abusers, .
whether or not their intent is malicious,
are not disciplined because they can't'
be caught. CCS department chairman
Prof. Larry Flanigan noted what he
called a "random eatch factor" in ap-
prehending computer abusers. "There
is not a good monitoring system
available," he said. "There is no way to
look over someone's shoulder and tell if
it is a legitimate use."
Questions about ethics and policy in
the use of computers have prompted
concern at a national level over the lack
'It's time to look into
policy issues on cam-
pus ... I'm not con-
scious of any major
problem here. (The
subcommittee) will set
some guidelines in ad-
vance of major
problems.'
-Prof Gordon
Nordby,
chairman ofrsubcnmmittee
cusesing computer use and
ethics on campus.
of legislation dealing specifically with
computers.
Computer abuse is a relatively new
problem that is not specifically dealt
with in most current state and federal
laws, despite its far-reaching im-
plications in society. Legislatures are
beginning to realize that the wording of
many state and federal laws must be
revised to include policy on computer
misuse.#
A bill making fraudulent use of a
computer a federal felony punishable
by up to 15 years and a $5,000 fine
currently is being revised in the U.S.
Senate Judiciary subcommittee. This
legislation, proposed by Sen. Abraham
Ribicoff, (D-Conn.), is the first federal
bill to cover many aspects of computer
crime.
If the bill is passed, persons in-
troducing fraudulent data into a
system, using computer facilities
without authorization, changing or
destroying data, or stealing money,
services, property, or data can be
prosecuted.
Although the Ribicoff bi
applies to the governmen
companies which condu
commerce, Parker said h
stimulate written noli
collegiate level. "It could change the
value structure in the computer field,"
especially in universities, he said.
Only two states now have legislation
explicitly defining computer crimes,
but about 15 state legislatures are con-
sidering computer-related bills.
In Michigan, the Senate Commerce
Committee is considering a bill
prohibiting a person from gaining ac-
cess to a computer or computer system
for fraudulent purposes. Intentional
damage to computer hardware is
prohibited. Violations will be
punishable by imprisonment up to ten
years or a $5,000 maximum fine.
A proposed amendment to the bill
makes cases involving $100 or less a
misdemeanor, according to Greg
Mann, an aide to Rep. Michael Bennane
(D-Detroit), who introduced the bill.
-The bill, which passed the House last
month, also was introduced by Rep.
Perry Bullard, (D-Ann Arbor). While
a student at the University, Mann said,
he used to play "football" on the com-
puters with his friends, even though he
didn't have an account himself. "I think
it (game-playing at the University) is
widespread," he said. He added that he
doesn't think people should be
prosecuted at the Univerity or similar
level for minor cases, even though it is
See DEBUGGING, Page 10
411 specifically
it and private
ct interstate
e hopes it will
cies at the
11
The Ann Arbar Film Cooperuffve presents ot MLB
SATURDAY, JUNE 9 $1.50
WAIT UNTIL DARK
(Terence Young,1968) 7 only-MLB3
"The story of a blind woman cajoled and then terrorized by three criminals who
want the heroin that is hidden inside her apartment, in the belly of a doll that
her husband unwittingly picked up on an airplane from a lady smuggler who
had to get rid of the goods before her accomplice discovered she had double
crossed him ... but that's not half of it ... The Climax of the film is directed
by Young with fine Hitchcockian intensity."-FILM QUARTERLY. Excellent
performance by ALAN ARKIN and AUDREY HEPBURN.
THE 7% SOLUTION
(Herbert Ross, 1976) 9 only-MLB 3
NICOLE WILLIAMSON is Sherlock Holmes, ROBERT DUVALL is Dr. Watson and
ALAN ARKIN is Sigmund Freud in this hilarious mystery spoof. They join forces
to solve the baffling disappearance of a popular French actress (VANESSA
REDGRAVE) and Freud ends up delving into Holmes' dreams, drug addiction,
and obsessive hatred of Professor Moriority. "100% entertainment."-Gene
Shalit. Tuesday: Free showing of .I JOUR SE LEVE and THE COUSINS
ii