home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Sept 13, 1995 Volume 7 : Issue 73
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
-
- CONTENTS, #7.73 (Wed, Sept 13, 1995)
-
- File 1--Some Questions about the Rimm/Cyberporn Study
- File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: Wed, 13 Sep 1995 22:51:01 EDT
- From: Jim Thomas <cudigest@sun.soci.niu.edu>
- Subject: File 1--Some Questions about the Rimm/Cyberporn Study
-
- SOME THOUGHTS ON CARNEGIE MELLON'S COMMITTEE OF INVESTIGATION
-
- Jim Thomas / Department of Sociology Northern
- 13 September, 1995
- Illinois University (jthomas@sun.soci.niu.edu)
-
-
- ((BACKGROUND: As an undergraduate at Carnegie Mellon University this
- past year, 30 year old Martin Rimm published a research project in
- the Georgetown Law Journal on "pornography" on the Net. Time
- Magazine featured the project as a cover story in its July 3
- issue. The project was attacked for intellectual and ethical
- improprieties, and CMU has begun an investigation into the project.
- What follows are just a few of the questions I had after following
- the project and its media coverage for these past two months--jt))
-
-
- The Martin Rimm "Cyberporn" study, while thoroughly discredited on
- intellectual and other grounds, remains a problem for those involved
- in it. CMU sources indicate that the CMU provost has formed a
- committee with the faculty senate to investigate questions that have
- been raised about the study's procedures and ethics. (See CuD #7.58
- and 7.59; A complete background, including the full study and a
- critique by Donna Hoffman and Tom Novack, can be found on the CuD
- homepage links at http://www.soci.niu.edu/~cudigest).
-
- Some might wonder why there exists a need to pursue an investigation
- of a discredited undergraduate project. To some, it may even appear
- that continued inquiry into its procedures and the background of
- Rimm, its "principal investigator," constitute an unnecessary
- witchhunt, reflecting a lynch-mob mentality.
-
- Such a view is erroneous and short-sighted.
-
- Continued questioning of the study is not an attempt to "disprove"
- or minimize Rimm's "finding" that 83.5 percent of Usenet images are
- "pornographic," to deny that there is sex on the Net, or to minimize
- the very real concerns of parents and others about limiting
- children's access to undesirable material.
-
- An airing of the study and its procedures should be pursued for
- several reasons. First, the results of the study continue to be used
- uncritically, especially by those who would exaggerate the prevalence
- of objectionable Internet material. Whether the figures approximate
- reality is irrelevant. The issue is that there is no basis in *this*
- study to give confidence in the figures. Normally, this would be no
- more than an intellectual dispute to be resolved by additional
- research. However, it is how the data were acquired and manipulated
- that cause concern.
-
- This leads to the second reason for pursuing questions about the
- research. There is sufficient evidence to suggest that serious
- ethical improprieties underlay the study. This, too, would normally
- be an in-house matter best left to a University and the subjects
- involved. However, at least some persons involved in the study turned
- an intellectual exercise into a highly visible public media event. As
- a consequence, the public has a right to address troubling questions
- that subvert both the intellectual credibility and the procedures by
- which claims were made and continue to be defended. Third, this is a
- cyberspace issue. It's no secret that researchers have found
- computer-mediated communication a rich source for ethnographic and
- other data collection. The apparent ethical improprieties are
- relevant to the broader intellectual community, as well as to the
- on-line public, to the extent that they suggest several ways by which
- scholars and others can go astray in violating basic human subjects
- canons. Finally, if sloppy research based on questionable data and
- practices produces claims that are used to subvert First Amendment
- rights in cyberspace, and when that research has been explicitly
- identified as the product of one of the leading U.S. research
- institutions, that institution has the responsibility of assuring the
- credibility of that which was done in its name.
-
- Pursuing questions raised by the study is not, or at least ought not
- become, a mechanism for public humiliation of the participants or an
- attempt to try them in public. Instead, raising further questions
- provides exactly what academic scholarship requires: An examination
- of procedures and methods of public claims in a public forum in a way
- that allows those expected to accept such claims an opportunity to
- assess the credibility and biases of the researchers. To that extent,
- as any good ethnographic scholar knows, questions about how data were
- gathered, about scholars' potentially biasing background experiences,
- or about interpretative procedures, are of direct relevance to the
- public. As a consequence, the CMU Committee of Inquiry might consider
- the following questions about the study as a way to facilitate
- independent assessment of the research.
-
- WHAT WAS THE "CMU/RIMM STUDY?"
-
- Time Magazine's July 3, 1995, issue featured as a cover story a
- Georgetown Law Journal article by Rimm ("Marketing Pornography on the
- Information Superhighway"), that uncritically reported the study's
- findings in a sensationalistic manner (One of the story's fuzzy
- graphics depicted a nude male presumably copulating with his
- computer). Although selective readers were given access to the study,
- including Ralph Reed (the Executive Director of the Christian
- Coalition), three journal commentators, Senator Charles Grassley, who
- misrepresented the study's findings to hype his anti-pornography Bill
- (S. 892), and Philip DeWitt, the Time writer who had access to the
- study as an exclusive, others who attempted to obtain a copy were
- refused. The reason: It was embargoed. Rimm claimed that the GLJ
- embargoed it, but the GLJ claimed otherwise (see below).
-
- The study purported to be an exhaustive analysis of "pornography" in
- cyberspace, and it contained numerous methodological flaws and
- demonstrably inaccurate claims (See the Hoffman and Novak critique).
- Among the controversial aspects of the study was the implication that
- it was a legitimate CMU-sponsored project. In fact, it was an
- ambitious undergraduate research project. But, once the CMU/Rimm
- connection was made, it became known as the "CMU study" in the media
- and in Congress.
-
- WAS THIS THE "CMU" STUDY?
-
- Before the study appeared in Time or the GLJ, Rimm appeared on
- Nightline discussing the "CMU study," Senator Grassley alluded to the
- "CMU study" (and planned to have Rimm testify in a Congressional
- hearing), and those supporting the study (including Ralph Reed and
- Catherine McKinnon) referred to the "CMU study." However, a recent
- call to Don Hale, Vice President for University Relations at CMU,
- said that CMU itself never claimed that the study was done under the
- auspices of CMU. "People were misinterpreting how we described the
- study from the gitgo," he said. And, he does make a compelling case.
- Hale explained that he often uses the term "CMU study" as a
- convenient shorthand to describe research projects done by faculty.
- "I never thought about the implications," he said, indicating that he
- would take more cautious steps in the future. He was convincing, and
- there is no reason to doubt his sincerity. But, his words do not
- reflect the actions of others, including some CMU personnel.
-
- When I spoke to several CMU personnel about the study in the first
- week of July before the controversy broke, they explicitly and
- unequivocally associated CMU with the study. There is often a thin
- line between shorthand connotation and summary denotation, and to my
- view, some CMU personnel crossed over that line.
-
- Then, there is Rimm himself. In the study, he explicitly and
- repeatedly refers to the study as the "CMU study". In his ABC
- Nightline appearance, Rimm and others, including Ted Koppel, called
- it the CMU study. The media, including the New York Times, called it
- the CMU study. The commentators on the GLJ article called it the "CMU
- study".
-
- Despite the resulting brouhaha, CMU did not disassociate from or
- officially respond to the study, until it issued a cryptic press
- release in Mid-July:
-
- Carnegie Mellon University is responsible for the
- integrity of research conducted at the university. As
- a community of scholars, in which truth and integrity
- are fundamental, the university generally examines
- carefully issues raised concerning the propriety of
- research conducted by members of the university
- community, taking due care to protect the rights of
- those members.
-
- Provost Paul Christiano already has informally sought
- and received advice from some faculty members about the
- study conducted by undergraduate student Marty Rimm and
- published by the Georgetown Law Journal. He will soon
- form a committee of distinguished and knowledgeable
- faculty to examine in more detail the issues that have
- been raised about the study. The committee will
- recommend the appropriate next steps, if any, that
- should be taken relative to this study and, if
- necessary, relative to policies on undergraduate
- research.
-
- The release indicates that this was no longer accepted by the school
- as the "CMU Study," but rather was now the work of "undergraduate
- student Martin Rimm."
-
- THE CMU INQUIRY
-
- Later in July, CMU Provost Paul Christiano adhered to CMU policy in
- forming a three-person Committee of Inquiry to investigate whether
- there existed sufficient grounds to form a five-person Committee of
- Investigation to address allegations of research impropriety. On
- August 8, Provost Christiano issued the following memo:
-
- The Committee of Inquiry, which was formed to conduct a
- limited inquiry into allegations directed at the subject
- research, now has completed its work. That committee has
- recommended, in accordance with the above-cited policy, that
- several allegations warrant the conduct of a thorough
- investigation, through a five-member faculty Committee of
- Investigation. This committee, to be formed jointly by me
- and the leadership of the Faculty Senate, is expected to
- submit its recommendations to me, to the president of the
- university, to the leaders of the Faculty Senate, to the
- dean of student affairs, and to the researchers themselves.
-
- The specific recommendations that have been provided to me
- by the Committee of Inquiry remain confidential, according
- to the above-cited University policy. However, I expect the
- Committee of Investigation to examine a full range of issues
- relating to the article and to the research preceding it.
-
- Until the Committee of Investigation has completed its work
- to determine which, if any, allegations are valid, it would
- be inappropriate for me to comment further on this matter.
- Indeed, all those who believe in fairness and in due process
- should take special care not to prejudge the conduct of
- persons who have engaged in this or any other research.
- While the well being of human participants, as well as the
- search for truth, must always be essential guiding
- principles, so also must be respect for the reputation and
- academic freedom of researchers and for due process.
- Carnegie Mellon University will continue to adhere to those
- principles.
-
- The committee will presumably ask a number of questions to address
- public concerns about the study. Among the troublesome questions
- include the following:
-
- QUESTIONS FOR RIMM
-
- Although the personal biography and life of a researcher can be and
- often is of relevance to especially qualitative research, private
- lives rarely are of significant relevance. This case is is an
- exception. If, for example, a scholar has a history of deceit,
- fabrication, or other behavior that raises questions about the
- veracity of research, the private history related to such acts
- becomes relevant.
-
- In Rimm's case, there seems to be disturbing history of behavior
- that would be of special concern to professionals assessing his
- credibility.
-
- A few credibility-challenging examples include: His authorship of a
- book listed in the Library of Congress records as: "How to Exploit
- Women, Dupe Men, and Make lots of Money." There appears to be no
- public copy available in the LoC, so only excerpts alledged to be
- from the book are available. In CyberWire Dispatch, Brock Meeks cites
- an excerpt:
-
- Into my mailbox flow excerpts of Marty's "how to" manual.
- Here is a sample of his turgid prose, taken from the Usenet
- posting, from a chapter on Anal Sex: "When searching for
- the best anal sex images, you must take especial care to
- always portray the woman as smiling, as deriving pleasure
- from being penetrated by a fat penis into her most tender
- crevice. The male, before ejaculation, is remarkably attuned
- to the slightest discrepancy; he is as much focused on her
- lips as on her anus. The slightest indication of pain can
- make some men limp."
-
- *QUESTION: Was this book used to entice the research subjects
- (the sysops) to participate in the study?
-
- "Books in Print" information reveals the following information:
-
-
- AUTHORS: Rimm, Martin
- Speranza, Carolyn; Illustrator
-
- TITLE: The Pornographer's Handbook; How to Exploit
- Women, Dupe Men, & Make Lots of Money
-
- PUBLISHER: Carnegie; 03/1995
-
- EDITION: Orig. Ed.
-
- PAGINATION: 67p.
-
- ISBN/PRICE/BINDING:
- 0962547654;$5.95 pap.
-
- It has been reported on The Well that "Carnegie Press" and Rimm
- share the same address and phone, among other things. One close
- observer of the study raised the following questions:
-
- *QUESTION: In what states did Martin Rimm register "Carnegie Press"
- as a corporation? Did he do so in Pennsylvania? In New Jersey? In
- Delaware? Elsewhere?
-
- *QUESTION: If Rimm registered "Carnegie Press" as a corporation in
- April 1994, or before that date, is there an ethical issue raised by
- his intention to profit from grant-funded research on nonconsenting
- subjects?
-
- *QUESTION: Is there an ethical issue raised by the choice of the
- name "Carnegie Press"?
-
- Was the book satire, was it a methodological access key, or was
- it intended as a serious marketing guide? It's hard to tell,
- but the following post from Rimm to an anonymous correspondent
- raises further questions:
-
- Date: Sun, 18 Dec 1994 22:02:01 -0500 (EST)
- From: Martin Rimm <mr6e+@andrew.cmu.edu>
-
- To some extent, but the truth is I am ahead of the
- pornographers. However, with mainstream pornographers
- moving on-line, some of the best software engineers in the
- country are now working for the pornography industry, and I
- expect within a year or two they will leap ahead of me.
- Recently, Kenneth Guarino, of Southe Point Enterprises, the
- largest adult video distributor in the country, hired a
- team from Microsoft.
-
- .....................
-
- Once my study is published, it will be obvious to them why
- such research is useful. In a two hour video, or magazine
- with 100 pictures, pornographers never knew what the
- customers really wanted. Now they can find out. Personally,
- I'm getting out of the pornography business, as I want to
- move on to other subjects on the net.
-
- *QUESTION: Which side of the fence was Rimm on?
-
- Rimm appears to be no stranger to controversy involving deception.
- Press reports indicate that, at age 16, Rimm posed as an
- Arab sheik to "infiltrate" an Atlantic City casino to "expose"
- teenage gambling. A New Jersey news story raises further questions.
- An excerpt:
-
- From the Atlantic City Press, Aug. 30:
-
- CYBERPORN RESEARCHER LINKED TO A.C. PRANKS
-
- * Marty Rimm, author of a controversial study of pornography
- on the Internet, was investigated by gaming officials for
- an alleged publicity stunt gone haywire and other hoaxes
- involving the Taj Mahal casino.
- ____________________________________________
-
- By RAY ROBINSON
-
- The Press of Atlantic City Online
-
- Marty Rimm, author of a widely publicized study of pornography
- on computer networks, was suspected by state investigators of
- pulling two creative -- and potentially expensive -- pranks on
- the Trump Taj Mahal Casino Resort in 1990, according to
- documents reviewed by The Press.
-
- Although such behavior of itself does not necessarily subvert
- credibility, it does raise a subsequent question of whether similar
- methods were used to gain access to a research setting or produce a
- written product that is embargoed prior to publication in a non-peer
- reviewed outlet.
-
- *QUESTION: Was the access to confidential information and other data
- from sysops or other sources gathered under pretense?
-
- Rimm states explicitly in his study that his "research team" did not
- generally reveal to research subjects, the sysops, that they were
- being studied (GLJ, 1995: 1878). CyberWire's Brock Meeks wrote:
-
- How did Marty pull this off? Adult BBS operators aren't
- known for their openness and trusting attitudes, in general.
- When I asked Marty how he was able to do what had taken me
- years to do -- develop sources inside this network of adult
- BBS operators --he said: "[Y]ou didn't have powerful
- software which you could use to convince them that you
- indeed had something to offer. What took you years I could
- do in anywhere from five minutes to two months. You'll have
- to figure the rest out."
-
- *QUESTION: Did Rimm lie to gain access to sysops and their data?
-
- In his introduction, Rimm lists more than a score of professors,
- administrators, and staff as part of the "research team." Some have
- disassociated from the study or indicated that they had little, if
- any, significant role in it. What role did the listed members of the
- research team play? Where they full collaborating participants in a
- "research team" as he implies? Rimm's primary advisor, CMU Professor
- Marvin Sirbu, in a letter to EFF staff counsel Mike Godwin, even
- alluded to several of the professors, presumably two of whom are at
- the University of Oregon and one of whom is a Dean, as collaborators
- as a means to justify the legitimacy of the study.
-
- Consider the following:
-
- From: Martin Rimm <mr6e+@andrew.cmu.edu>
- Newsgroups: cmu.cs.discussion
- Subject: Re: More Censorship
- Date: Fri, 4 Nov 1994 00:31:15 -0500
-
- The team of researchers consists of seven professors, three
- deans, four lawyers, two lobbyist groups, six undergraduate
- research assistants, three doctoral students, three
- programmers, and an art instructor.
-
- Martin
-
- \enddata{text, 547925302}
-
- Date: Tue, 4 Apr 1995 21:25:59 -0400 (EDT)
- To: mnemonic@eff.org
- Subject: Fwd: INTERNET ADULT BBS STUDY
-
- We appreciate your interest. We are making every effort to
- get you a complete copy of the study before publication. In
- the meantime, we would greatly appreciate an independent
- check of our legal notes, which the journal helped us with.
- (No one on our team is a lawyer). We need to return our
- final edits to the journal on Thursday, April 14. If before
- then you have a chance to review the attached, your comments
- would be most appreciative.
- Thanks again,
- Martin Rimm
- Principal Investigator
-
- It is interesting that in the first public post, Rimm listed four
- lawyers as part of the research team. In the April passage, Rimm
- indicates that no lawyers are members of the team. Of itself, this
- may seem unimportant until one asks whether this was, in fact, an
- authentic research TEAM.
-
- *QUESTION: Who, precisely, was on the research team, and what was
- their role?
-
- *QUESTION: Was this a legitimate research team, or was it simply
- window-dressing used to enhance the study's credibility?
-
- *QUESTION: Was, as Rimm claims, the data actually collected by a team,
- or was he, himself, the primary data-gatherer, using the language of
- research inappropriately?
-
- *QUESTION: If this was, in fact, a legitimate research team
- comprised of administrators and faculty, then what was their role in
- the demonstrable deception? If this research was in fact a true
- collaborative effort, would that not then also mean that that a
- score of CMU personnel are complicit in demonstrably unethical
- research?
-
- In the study, Rimm claims to have talked to a number of sysops, both
- by voice and e-mail. Robert Thomas, sysop of Amateur Action BBS,
- currently serving a sentence in a Federal penitentiary for making
- available adult material on his system that, while not illegal in his
- own state of California was illegal in Tennessee, was one of Rimm's
- research subjects. Rimm's account of events does not correspond with
- e-mail corespondence between Rimm and Thomas provided by Thomas's
- wife (CuD 7.59).
-
- *QUESTION: Did Rimm in fact communicate with all the sysops as he
- claimed?
-
- *QUESTION: Did Rimm's communication with the sysops indicate the
- kind of ethical impropriety that the released e-mail between he
- and Robert Thomas suggests?
-
- *QUESTION: Why doesn't the Committee of Investigation talk with
- Robert Thomas in order to ascertain how data from AA BBS were
- acquired?
-
- Early attempts to obtain a copy of the study from Rimm or the
- Georgetown Law Journal were barred by claims that the study was
- embargoed. In a December 18, 1994 post to Mike Godwin, Rimm claimed
- that the GLJ embargoed the study. In posts on The Well, a popular
- public access system in California, Time's Philip DeWitt claimed
- that he had an exclusive with Rimm. Kathy Ruemler, current
- editor-in-chief of the GLJ, wrote in a public Usenet post on
- September 6:
-
- V. RUMOR: TIME was restricted from having the study
- independently reviewed by an agreement with Law Journal.
- FACT: The Law Journal had no such agreement with TIME.
- Isn't TIME the one who referred to it as an exclusive?
-
- *QUESTION: Somebody seems to be lying. Who?
-
- An argument could be made that Rimm's advisor, Marvin Sirbu, and
- not Rimm, ought bear responsibility for improprieties in the
- study. After all, an advisor is ultimately responsible for
- assuring that proper ethical and methodological procedures are
- followed. In this case, such a judgment might be premature.
-
- In 1984, Rimm was involved in a study of high school gambling with
- Henry Lesieur, then a sociology professor at Johns Hopkins, and Bob
- Klein, reportedly a high school counsellor. Lesieur apparently was
- drawn to Rimm by his infiltration of a casino at 16: "That just
- intrigued me," he said.
-
- The study involved giving students in five high schools
- questionnaires. Rimm distributed them in one high school, Lesieur
- said. Was Rimm sufficiently apprised of ethical issues a decade ago
- such that he should be aware of appropriate behavior now? Lesieur
- could not say, but he observed:
-
- We had meetings and we went through the (ethical) protocols.
- .........
- People didn't have to respond, it was totally anonymous.
- It (the study) went through human subjects, he was part
- of the process, and he followed the protocols.
-
- Although Rimm was a third author on a paper, Lesieur indicated that
- Rimm, in fact, did no writing.
-
- Now, it's unreasonable to expect a college undergraduate to fully
- understand the nuances of research ethics, let alone recall them a
- decade later. But, it's not unreasonable to expect that, given this
- apparent background in research, Rimm would not be aware that there are
- ethical protocols. Therefore, those who see Rimm as a "victim" of
- inadequate supervision have a weak case: Rimm was in a position to
- know that there are guidelines for protecting human subjects and that
- his own methodological descriptions indicates that he violated them.
- However, this still leaves several questions that Professor Sirbu
- might clear up.
-
- QUESTIONS FOR SIRBU
-
- Although Sirbu was quoted in a July New York Times story as saying
- that he never saw the final article that was submitted to GLJ, and
- that it was not the report he would have written, it is clear that
- he was closely involved with Rimm throughout the study. At issue
- here isn't the final article, but how Rimm could continue to collect
- data in ways that raise serious questions about why the advisor,
- who was professedly close to the study, did not engage in
- corrective intervention.
-
- In November correspondence with Mike Godwin, Sirbu claimed that he
- had no problem with the methodology and would be glad to discuss it.
- But, Sirbu seemed well-aware of the study long before that,
- as a memo to several CMU faculty and administrators indicates:
-
- Date: Tue, 27 Sep 1994 23:11:43 -0400 (EDT)
- From: Marvin Sirbu <ms6b+@andrew.cmu.edu>
- To: Erwin Steinberg <es2t+@andrew.cmu.edu>,
- Michael Caldwell Murphy <mm1v+@andrew.cmu.edu>,
- Don Hale <dh0c+@andrew.cmu.edu>
- Subject: Martin Rimm's research
- Cc: Jessie Barbour Ramey <jr3l+@andrew.cmu.edu>,
- Martin Rimm <mr6e+@andrew.cmu.edu>
-
- Gentlemen,
-
- I understand that you have been in touch with Martin Rimm
- regarding his research. Since Martin is currently working
- on this for credit under me, I have asked him if he would
- permit me to be included in any meetings that you may
- arrange.
-
- I have been meeting regularly with Martin since last Spring,
- and believe that he is nearing completion on a
- ground-breaking study that makes an important scholarly
- contribution. He has developed some very interesting
- methodological approaches, and has amassed a remarkable
- database of information on his chosen subject matter. As
- Martin and I have discussed, there is still much to do in
- interpreting the data.
-
- The bulk of his data collection focuses on privately
- operated Adult Bulletin Board Systems (BBS's) offering
- sexually oriented imagery. He has also examined partial
- data on the availability and consumption of such imagery at
- CMU from the Internet, although this data is not central to
- his work.
-
- We have had numerous discussions as to the most appropriate
- venue for publishing this work since it may appeal to groups
- as diverse as those concerned with telecommunications
- policy, law, mass communications, marketing science, or
- sociology of sexual deviance. We have also been discussing
- potential sources of external research support. Our most
- recent thinking has been to produce a Working
- Paper/Technical Report that could be disseminated from CMU
- pending determination of the most appropriate avenue for
- formal publication.
-
- Because of the subject matter, this research could provide
- fodder for everyone from the Kinsey Institute to Jerry
- Falwell to Andrea Dworkin, as have previous scholarly
- studies in this field.
-
- I might not have chosen myself to raise these issues via a
- message directly to the President, but sooner or later this
- study will come out and I suspect there will be significant
- interest among the press. It is certainly appropriate that
- CMU be prepared. Martin and I both concur that the way the
- research is publicized should be handled with great care,
- but I know that he is anxious, after working on this for
- more than a year, to get something out before he starts
- applying to graduate schools this fall.
-
- Among other things, Sirbu reveals his knowledge of Rimm's access to
- "availability and consumption" of the Usenet readership habits of
- CMU system users. It is well-established that users have a reasonable
- expectation of privacy. Sometimes, fulfilling administrative duties
- requires system administrators to monitor use, files, or other
- material that a user intends to be private. However, sometimes such
- monitoring raises questions. In the Rimm study, for example, users'
- Usenet newsgroup configuration files were systematically tabulated.
- Although reports differ on whether systems engineers or third parties
- monitored the files, it is clear that, according to the Rimm study,
- data on individuals were collected and compared, and the aggregate
- results then made public. It remains unclear whether, despite the
- serious appearance of impropriety, any breaches occurred. However, the
- question is of sufficient import to be addressed:
-
- *QUESTION: Did the acquisition of individual user information as
- described in Rimm's methodology, actually occur? If so, is such
- acquisition consistent with the ethical guidelines on human subjects?
-
- If Sirbu were as close to Rimm's study as his public pronouncements
- and private correspondence indicate, he surely would have, or should
- have, known of the practices Rimm employed.
-
- *QUESTION: "What did Sirbu know and when did he know it?"
-
- As Sirbu should know, "research team" has a special connotation among
- scholars. A research team is not a casual circle of people who may
- occasionally interact. Sirbu's professed close relationship with Rimm
- and involvement in Rimm's research would give him knowledge of
- whether a "research team," as the term is conventionally employed by
- reputable scholars, did in fact exist. Sirbu's claim (above) that
- some high-level faculty "collaborated" with Rimm adds credence to,
- and perpetuates the image of, an established group of professionals
- well-integrated into a research project directed by Rimm as
- "principal investigator."
-
- Given the fact the some "team" members were unaware that they were
- team members or have denied that they were members at all, one cannot
- help but suspect that the public is being deceived into believing
- that the study is more credentialed than it actually is.
-
- *QUESTION: Can Sirbu explain precisely what the "research team"
- members did to justify the label?
-
- *QUESTION: If there was, in fact, no "research team" in the
- conventional use of the term, why did Sirbu allow the fiction to
- persist?
-
- Perhaps the most important question Sirbu could address is the
- attempt to acquire funding for Rimm's project. It appears that
- Sirbu's attachment to the study included attempts to ride the funding
- gravy train by cashing in on Rimm's methodology.
-
- In November, Sirbu approached EFF's Mike Godwin to solicit EFF
- support for the project:
-
- Date: Mon, 7 Nov 1994 22:05:16 -0500 (EST) From: Marvin
- Sirbu <ms6b+@andrew.cmu.edu> To: mnemonc@eff.org Subject:
- Your visit to CMU
-
- As you may have gleaned from reading about the events at
- CMU, I have been working with Martin Rimm on a study of
- the availability and consumption of sexually explicit
- imagery on Adult BBS systems and, to a lesser extent, on
- Usenet. Xxxx Yyyy suggested that EFF might be interested
- in the work we've been doing. Among other things, we
- have data which could be analyzed to show the geographic
- distribution of consumers of adult BBS systems. Such
- data might be useful in countering or confirming
- assertions that "community standards" in places like
- Memphis are different from other regions of the country.
-
- I'll give you a call when we are both back in our
- respective cities.
-
- Marvin Sirbu
-
- Neither EFF's mission nor resources allow for such support, and the
- solicitation was rejected. But, federal funding remained a
- possibility.
-
- David Banks, a CMU statistics professor, provided some
- technical guidance for Rimm. According to Banks, in early November,
- 1994, he, Sirbu, and Rimm met to discuss what might be done with the
- paper. Rimm, reports Banks, needed money, because he sunk some of
- his own funds into the project. According to Banks:
-
- Also, Martin was aware that the Department of Justice
- had cut down AA BBS and seized their log files. And that
- info should contain names, log files, and it seemed
- reasonable to suspect that DOJ would have that set
- analyzed and that they would pay money for it.
-
- The grant attempted to link our interests with DoJ
- prosecutorial interests.
-
- According to Banks, the proposal had four research goals:
-
- 1) A summary of the statistics of "pornography" traffic that
- would identify the proportion of BBSes with a high
- percentage of material that might be worth prosecuting;
-
- 2) Consumption and usage trends over time: If pornography or
- pedophilia increases, then it would indicate that the BBS
- is trying to cultivate that market;
-
- 3) Information on individual downloads and covariance of
- user preferences that would correlate which types of
- files are most-likely to be associated other downloaded files;
-
- 4) "Placing it in the space of adult bulletin boards; adult
- BBSes have different personalities, characteristics, and
- specialties...who is the worst offender on pedophilia?"
-
- This, Banks explained, would allow DoJ to distribute its
- prosecutorial resources more effectively.
-
- Rimm was not listed as a co-principal investigator on the second
- round of grant submission, Banks explained, because DoJ would run
- the grant through CMU, which would be more difficult if Rimm were
- not a student. However, Rimm was written in as a consultant,
- according to Banks.
-
- Banks said that he often expressed his concern with ethical issues,
- both orally and in writing, and in July, 1995, he withdrew from the
- project because of these concerns.
-
- Why is the grant significant?
-
- The grant application raises serious ethical questions for Sirbu and
- Rimm. One fundamental canon of accepted ethical procedures is that
- researchers do nothing to put their subjects at risk (see CuD 7.58).
- Yet, that is precisely what this grant application would do.
-
- In his methodology, Rimm explains that he selected BBSes that were
- either the largest and most active "pornography" distributors, or
- that appeared to be aggressively moving into the "pornography" market
- (GLJ, 1995: 1876-77). If Banks's summary of the DoJ grant proposal is
- accurate, these BBSes are precisely those that the grant was designed
- to help prosecute, because they constitute the population that Rimm
- claimed to study.
-
- That Rimm and Sirbu then submitted a grant to the DoJ that could be
- used to bust the very people who were his subjects goes beyond any
- breach of research ethics that I can recall, ever, in the social
- sciences. This is not a minor lapse of ethics or an error in
- judgment. It is a fundamental violation of the most basic principles
- of the treatment of human subjects.
-
- Sirbu acknowledges that he was not only fully aware of Rimm's
- methodology, but that he would defend it. Hence, he was not unaware
- of the population of BBSes from which Rimm drew his data. From the
- existing evidence, it is clear that Sirbu was the driving force
- behind the DoJ grant that would put those subjects at severe risk. In
- fact, the grant was *DESIGNED* to put those subjects at risk.
-
- *QUESTION: How does Sirbu explain what appears to be a sanctionable
- violation of ethics?
-
- *QUESTION: In the (presumably required) Human Subjects application
- for CMU, did Sirbu fully apprise the Human Subjects review committee
- that, while there may be no "human subjects" in the proposed DoJ
- grant study, the research was designed to put at risk subjects of a
- previous (SURG) CMU funding of which he was the supervisor?
-
- There is a curious footnote relevant to the grant application. In
- the GLJ article, Rimm devotes considerable space to describing
- Amateur Action BBS, and calls the sysop, Robert Thomas, the Marquis
- de Cyberspace (GLJ: 1912). The propriety of the GLJ discussion has
- been discussed elsewhere (eg, CuD 7.58). What has not been discussed
- is Rimm's relationship with this research subject. Mike Godwin
- contacted Thomas's wife, and reports part of the response:
-
- That Martin Rimm was a member of the Amateur Action BBS,
- that he quarrelled publicly and privately with Robert and
- Carleen Thomas about how they ran their BBS (among other
- things, he wanted them to change the way their BBS software
- kept track of downloads), that his messages to them after
- they refused to comply with his "suggestions" grew angry
- and threatening, that he declared publicly that he would
- not renew his membership at Amateur Action, and that he
- *did* renew his membership in February of this year.
-
- Godwin also revealed that Thomas's wife produced the printout of a
- message from Rimm to Thomas in which which Rimm tells Thomas how
- much he admires him and how he hopes to be his "friend forever."
- In July, Godwin asked Thomas's wife if there were any information
- in her records pertaining to Rimm. Godwin summarized it on
- The Well:
-
- For example, his application for a renewal
- of his AABBS membership lists the same street address as
- that of the "Carnegie Press." A different phone number,
- though -- this one doesn't get you that weird message from
- the phone company when you call it. Instead, it just rings.
- Credit card number with (as I recall) an April 96
- expiration date. Purchase on February 17 of a "six month"
- membership, which, according to Carleen, actually means
- he'll be current until August 17, 1995.
-
- Rimm first solicited membership in Amateur Action BBS in
- May of 1994. This is interesting since he's told at least
- one person that he didn't even know Robert Thomas's name
- until July of '94 when Thomas was convicted on obscenity
- charges in Memphis. Since the application from Rimm used in
- May of 1994 has Robert Thomas's name and address listed at
- the top, this seems unlikely.
-
- Want to know the best thing about the '94 application form?
- It was *mailed* in. It's filled out in Rimm's handwriting.
-
- If the records are accurate, Rimm, now involved in a funded study
- designed to facilitate prosecution of active "pornographic" BBSes,
- renewed his membership on the BBS that he described as the "market
- leader in adult pornography" (GLJ, 1854).
-
- Given Sirbu's professed close association with Rimm and the study's
- methodology, it is inconceivable that he was not aware of how the BBS
- data were collected.
-
- *QUESTION: Why did Sirbu not intervene to assure that ethical
- procedures were followed, given the evidence that they were not?
-
- *QUESTION: Did Sirbu himself conceal information about unethical data
- gathering?
-
- There are so many questions that CMU's Committee of Investigation
- could ask that only a portion can be suggested here. Whatever the
- answers to the above questions, it is clear that something rather
- unacceptable occurred in the conduct of this research. The visibility
- of the study and the use of the "findings" by policy-makers, which
- was an explicit intent of the study, require a thorough airing of
- these concerns.
-
- AN AFTER THOUGHT
-
- Here's why I continue to be concerned with the Rimm "Cyberporn" study
- and Carnegie Mellon's handling of the investigation of it.
-
- I teach research methods. I teach methods to sociology students in a
- senior capstone methodology course. I teach methods to graduate
- students in a seminar that draws students from several disciplines.
- In these courses, I include a strong ethical component. I'm not a
- dogmatic ethical purist, and I recognize the difficulty of walking
- the thin line between "ought" and "ought not." But, there are two
- fundamental principles I emphasize to students: 1) Always protect
- research subjects from any harm that your research may cause, and 2)
- Never deceive or lie to research subjects. It appears that not all
- at CMU share these precepts.
-
- Tonight I began the ethical component of the graduate methods
- seminar. The course is comprised of Masters and Doctoral students
- and Faculty. Each of the students has a topic, derived either as a
- course project or from their thesis/dissertation work. One student
- described a project that required "infiltration," deception of
- informants, and role-playing to secure the confidence of subjects.
-
- I thought of Rimm's study and the ethical message it would convey to
- this student: Research that specifies deceit and leads to harm is not
- only acceptable, but publishable in a reputable journal. "If they
- can do it at CMU, why can't we do it at NIU?"
-
- What can I say to the students and faculty about "real world" ethical
- behavior? What can I say to the student who argues that it may be
- acceptable to lie to subjects for the purpose of data gathering? How
- can I explain the proper role of a faculty research supervisor if a
- faculty advisor at a major research institution violates fundamental
- ethical precepts and the school seems to condone it?
-
- If Carnegie Mellon University remains silent on the questions raised,
- it will be complicit in a standard of research behavior that simply
- cannot be condoned. How CMU responds to the individuals involved is
- an internal matter that hopefully will be handled with compassion.
- However, this does not preclude an explicit and unequivocal
- statement, derived from a thorough investigation, that disavows both
- the Rimm study and the research model on which it is based.
-
- ------------------------------
-
- Date: Sun, 19 Apr 1995 22:51:01 CDT
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CUDIGEST
- Send it to LISTSERV@VMD.CSO.UIUC.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu:80/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.73
- ************************************
-