Computer underground Digest Wed Sept 13, 1995 Volume 7 : Issue 73 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU Archivist: Brendan Kehoe Shadow Master: Stanton McCandlish Field Agent Extraordinaire: David Smith Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson CONTENTS, #7.73 (Wed, Sept 13, 1995) File 1--Some Questions about the Rimm/Cyberporn Study File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995) CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN THE CONCLUDING FILE AT THE END OF EACH ISSUE. --------------------------------------------------------------------- Date: Wed, 13 Sep 1995 22:51:01 EDT From: Jim Thomas <cudigest@sun.soci.niu.edu> Subject: File 1--Some Questions about the Rimm/Cyberporn Study SOME THOUGHTS ON CARNEGIE MELLON'S COMMITTEE OF INVESTIGATION Jim Thomas / Department of Sociology Northern 13 September, 1995 Illinois University (jthomas@sun.soci.niu.edu) ((BACKGROUND: As an undergraduate at Carnegie Mellon University this past year, 30 year old Martin Rimm published a research project in the Georgetown Law Journal on "pornography" on the Net. Time Magazine featured the project as a cover story in its July 3 issue. The project was attacked for intellectual and ethical improprieties, and CMU has begun an investigation into the project. What follows are just a few of the questions I had after following the project and its media coverage for these past two months--jt)) The Martin Rimm "Cyberporn" study, while thoroughly discredited on intellectual and other grounds, remains a problem for those involved in it. CMU sources indicate that the CMU provost has formed a committee with the faculty senate to investigate questions that have been raised about the study's procedures and ethics. (See CuD #7.58 and 7.59; A complete background, including the full study and a critique by Donna Hoffman and Tom Novack, can be found on the CuD homepage links at http://www.soci.niu.edu/~cudigest). Some might wonder why there exists a need to pursue an investigation of a discredited undergraduate project. To some, it may even appear that continued inquiry into its procedures and the background of Rimm, its "principal investigator," constitute an unnecessary witchhunt, reflecting a lynch-mob mentality. Such a view is erroneous and short-sighted. Continued questioning of the study is not an attempt to "disprove" or minimize Rimm's "finding" that 83.5 percent of Usenet images are "pornographic," to deny that there is sex on the Net, or to minimize the very real concerns of parents and others about limiting children's access to undesirable material. An airing of the study and its procedures should be pursued for several reasons. First, the results of the study continue to be used uncritically, especially by those who would exaggerate the prevalence of objectionable Internet material. Whether the figures approximate reality is irrelevant. The issue is that there is no basis in *this* study to give confidence in the figures. Normally, this would be no more than an intellectual dispute to be resolved by additional research. However, it is how the data were acquired and manipulated that cause concern. This leads to the second reason for pursuing questions about the research. There is sufficient evidence to suggest that serious ethical improprieties underlay the study. This, too, would normally be an in-house matter best left to a University and the subjects involved. However, at least some persons involved in the study turned an intellectual exercise into a highly visible public media event. As a consequence, the public has a right to address troubling questions that subvert both the intellectual credibility and the procedures by which claims were made and continue to be defended. Third, this is a cyberspace issue. It's no secret that researchers have found computer-mediated communication a rich source for ethnographic and other data collection. The apparent ethical improprieties are relevant to the broader intellectual community, as well as to the on-line public, to the extent that they suggest several ways by which scholars and others can go astray in violating basic human subjects canons. Finally, if sloppy research based on questionable data and practices produces claims that are used to subvert First Amendment rights in cyberspace, and when that research has been explicitly identified as the product of one of the leading U.S. research institutions, that institution has the responsibility of assuring the credibility of that which was done in its name. Pursuing questions raised by the study is not, or at least ought not become, a mechanism for public humiliation of the participants or an attempt to try them in public. Instead, raising further questions provides exactly what academic scholarship requires: An examination of procedures and methods of public claims in a public forum in a way that allows those expected to accept such claims an opportunity to assess the credibility and biases of the researchers. To that extent, as any good ethnographic scholar knows, questions about how data were gathered, about scholars' potentially biasing background experiences, or about interpretative procedures, are of direct relevance to the public. As a consequence, the CMU Committee of Inquiry might consider the following questions about the study as a way to facilitate independent assessment of the research. WHAT WAS THE "CMU/RIMM STUDY?" Time Magazine's July 3, 1995, issue featured as a cover story a Georgetown Law Journal article by Rimm ("Marketing Pornography on the Information Superhighway"), that uncritically reported the study's findings in a sensationalistic manner (One of the story's fuzzy graphics depicted a nude male presumably copulating with his computer). Although selective readers were given access to the study, including Ralph Reed (the Executive Director of the Christian Coalition), three journal commentators, Senator Charles Grassley, who misrepresented the study's findings to hype his anti-pornography Bill (S. 892), and Philip DeWitt, the Time writer who had access to the study as an exclusive, others who attempted to obtain a copy were refused. The reason: It was embargoed. Rimm claimed that the GLJ embargoed it, but the GLJ claimed otherwise (see below). The study purported to be an exhaustive analysis of "pornography" in cyberspace, and it contained numerous methodological flaws and demonstrably inaccurate claims (See the Hoffman and Novak critique). Among the controversial aspects of the study was the implication that it was a legitimate CMU-sponsored project. In fact, it was an ambitious undergraduate research project. But, once the CMU/Rimm connection was made, it became known as the "CMU study" in the media and in Congress. WAS THIS THE "CMU" STUDY? Before the study appeared in Time or the GLJ, Rimm appeared on Nightline discussing the "CMU study," Senator Grassley alluded to the "CMU study" (and planned to have Rimm testify in a Congressional hearing), and those supporting the study (including Ralph Reed and Catherine McKinnon) referred to the "CMU study." However, a recent call to Don Hale, Vice President for University Relations at CMU, said that CMU itself never claimed that the study was done under the auspices of CMU. "People were misinterpreting how we described the study from the gitgo," he said. And, he does make a compelling case. Hale explained that he often uses the term "CMU study" as a convenient shorthand to describe research projects done by faculty. "I never thought about the implications," he said, indicating that he would take more cautious steps in the future. He was convincing, and there is no reason to doubt his sincerity. But, his words do not reflect the actions of others, including some CMU personnel. When I spoke to several CMU personnel about the study in the first week of July before the controversy broke, they explicitly and unequivocally associated CMU with the study. There is often a thin line between shorthand connotation and summary denotation, and to my view, some CMU personnel crossed over that line. Then, there is Rimm himself. In the study, he explicitly and repeatedly refers to the study as the "CMU study". In his ABC Nightline appearance, Rimm and others, including Ted Koppel, called it the CMU study. The media, including the New York Times, called it the CMU study. The commentators on the GLJ article called it the "CMU study". Despite the resulting brouhaha, CMU did not disassociate from or officially respond to the study, until it issued a cryptic press release in Mid-July: Carnegie Mellon University is responsible for the integrity of research conducted at the university. As a community of scholars, in which truth and integrity are fundamental, the university generally examines carefully issues raised concerning the propriety of research conducted by members of the university community, taking due care to protect the rights of those members. Provost Paul Christiano already has informally sought and received advice from some faculty members about the study conducted by undergraduate student Marty Rimm and published by the Georgetown Law Journal. He will soon form a committee of distinguished and knowledgeable faculty to examine in more detail the issues that have been raised about the study. The committee will recommend the appropriate next steps, if any, that should be taken relative to this study and, if necessary, relative to policies on undergraduate research. The release indicates that this was no longer accepted by the school as the "CMU Study," but rather was now the work of "undergraduate student Martin Rimm." THE CMU INQUIRY Later in July, CMU Provost Paul Christiano adhered to CMU policy in forming a three-person Committee of Inquiry to investigate whether there existed sufficient grounds to form a five-person Committee of Investigation to address allegations of research impropriety. On August 8, Provost Christiano issued the following memo: The Committee of Inquiry, which was formed to conduct a limited inquiry into allegations directed at the subject research, now has completed its work. That committee has recommended, in accordance with the above-cited policy, that several allegations warrant the conduct of a thorough investigation, through a five-member faculty Committee of Investigation. This committee, to be formed jointly by me and the leadership of the Faculty Senate, is expected to submit its recommendations to me, to the president of the university, to the leaders of the Faculty Senate, to the dean of student affairs, and to the researchers themselves. The specific recommendations that have been provided to me by the Committee of Inquiry remain confidential, according to the above-cited University policy. However, I expect the Committee of Investigation to examine a full range of issues relating to the article and to the research preceding it. Until the Committee of Investigation has completed its work to determine which, if any, allegations are valid, it would be inappropriate for me to comment further on this matter. Indeed, all those who believe in fairness and in due process should take special care not to prejudge the conduct of persons who have engaged in this or any other research. While the well being of human participants, as well as the search for truth, must always be essential guiding principles, so also must be respect for the reputation and academic freedom of researchers and for due process. Carnegie Mellon University will continue to adhere to those principles. The committee will presumably ask a number of questions to address public concerns about the study. Among the troublesome questions include the following: QUESTIONS FOR RIMM Although the personal biography and life of a researcher can be and often is of relevance to especially qualitative research, private lives rarely are of significant relevance. This case is is an exception. If, for example, a scholar has a history of deceit, fabrication, or other behavior that raises questions about the veracity of research, the private history related to such acts becomes relevant. In Rimm's case, there seems to be disturbing history of behavior that would be of special concern to professionals assessing his credibility. A few credibility-challenging examples include: His authorship of a book listed in the Library of Congress records as: "How to Exploit Women, Dupe Men, and Make lots of Money." There appears to be no public copy available in the LoC, so only excerpts alledged to be from the book are available. In CyberWire Dispatch, Brock Meeks cites an excerpt: Into my mailbox flow excerpts of Marty's "how to" manual. Here is a sample of his turgid prose, taken from the Usenet posting, from a chapter on Anal Sex: "When searching for the best anal sex images, you must take especial care to always portray the woman as smiling, as deriving pleasure from being penetrated by a fat penis into her most tender crevice. The male, before ejaculation, is remarkably attuned to the slightest discrepancy; he is as much focused on her lips as on her anus. The slightest indication of pain can make some men limp." *QUESTION: Was this book used to entice the research subjects (the sysops) to participate in the study? "Books in Print" information reveals the following information: AUTHORS: Rimm, Martin Speranza, Carolyn; Illustrator TITLE: The Pornographer's Handbook; How to Exploit Women, Dupe Men, & Make Lots of Money PUBLISHER: Carnegie; 03/1995 EDITION: Orig. Ed. PAGINATION: 67p. ISBN/PRICE/BINDING: 0962547654;$5.95 pap. It has been reported on The Well that "Carnegie Press" and Rimm share the same address and phone, among other things. One close observer of the study raised the following questions: *QUESTION: In what states did Martin Rimm register "Carnegie Press" as a corporation? Did he do so in Pennsylvania? In New Jersey? In Delaware? Elsewhere? *QUESTION: If Rimm registered "Carnegie Press" as a corporation in April 1994, or before that date, is there an ethical issue raised by his intention to profit from grant-funded research on nonconsenting subjects? *QUESTION: Is there an ethical issue raised by the choice of the name "Carnegie Press"? Was the book satire, was it a methodological access key, or was it intended as a serious marketing guide? It's hard to tell, but the following post from Rimm to an anonymous correspondent raises further questions: Date: Sun, 18 Dec 1994 22:02:01 -0500 (EST) From: Martin Rimm <mr6e+@andrew.cmu.edu> To some extent, but the truth is I am ahead of the pornographers. However, with mainstream pornographers moving on-line, some of the best software engineers in the country are now working for the pornography industry, and I expect within a year or two they will leap ahead of me. Recently, Kenneth Guarino, of Southe Point Enterprises, the largest adult video distributor in the country, hired a team from Microsoft. ..................... Once my study is published, it will be obvious to them why such research is useful. In a two hour video, or magazine with 100 pictures, pornographers never knew what the customers really wanted. Now they can find out. Personally, I'm getting out of the pornography business, as I want to move on to other subjects on the net. *QUESTION: Which side of the fence was Rimm on? Rimm appears to be no stranger to controversy involving deception. Press reports indicate that, at age 16, Rimm posed as an Arab sheik to "infiltrate" an Atlantic City casino to "expose" teenage gambling. A New Jersey news story raises further questions. An excerpt: From the Atlantic City Press, Aug. 30: CYBERPORN RESEARCHER LINKED TO A.C. PRANKS * Marty Rimm, author of a controversial study of pornography on the Internet, was investigated by gaming officials for an alleged publicity stunt gone haywire and other hoaxes involving the Taj Mahal casino. ____________________________________________ By RAY ROBINSON The Press of Atlantic City Online Marty Rimm, author of a widely publicized study of pornography on computer networks, was suspected by state investigators of pulling two creative -- and potentially expensive -- pranks on the Trump Taj Mahal Casino Resort in 1990, according to documents reviewed by The Press. Although such behavior of itself does not necessarily subvert credibility, it does raise a subsequent question of whether similar methods were used to gain access to a research setting or produce a written product that is embargoed prior to publication in a non-peer reviewed outlet. *QUESTION: Was the access to confidential information and other data from sysops or other sources gathered under pretense? Rimm states explicitly in his study that his "research team" did not generally reveal to research subjects, the sysops, that they were being studied (GLJ, 1995: 1878). CyberWire's Brock Meeks wrote: How did Marty pull this off? Adult BBS operators aren't known for their openness and trusting attitudes, in general. When I asked Marty how he was able to do what had taken me years to do -- develop sources inside this network of adult BBS operators --he said: "[Y]ou didn't have powerful software which you could use to convince them that you indeed had something to offer. What took you years I could do in anywhere from five minutes to two months. You'll have to figure the rest out." *QUESTION: Did Rimm lie to gain access to sysops and their data? In his introduction, Rimm lists more than a score of professors, administrators, and staff as part of the "research team." Some have disassociated from the study or indicated that they had little, if any, significant role in it. What role did the listed members of the research team play? Where they full collaborating participants in a "research team" as he implies? Rimm's primary advisor, CMU Professor Marvin Sirbu, in a letter to EFF staff counsel Mike Godwin, even alluded to several of the professors, presumably two of whom are at the University of Oregon and one of whom is a Dean, as collaborators as a means to justify the legitimacy of the study. Consider the following: From: Martin Rimm <mr6e+@andrew.cmu.edu> Newsgroups: cmu.cs.discussion Subject: Re: More Censorship Date: Fri, 4 Nov 1994 00:31:15 -0500 The team of researchers consists of seven professors, three deans, four lawyers, two lobbyist groups, six undergraduate research assistants, three doctoral students, three programmers, and an art instructor. Martin \enddata{text, 547925302} Date: Tue, 4 Apr 1995 21:25:59 -0400 (EDT) To: mnemonic@eff.org Subject: Fwd: INTERNET ADULT BBS STUDY We appreciate your interest. We are making every effort to get you a complete copy of the study before publication. In the meantime, we would greatly appreciate an independent check of our legal notes, which the journal helped us with. (No one on our team is a lawyer). We need to return our final edits to the journal on Thursday, April 14. If before then you have a chance to review the attached, your comments would be most appreciative. Thanks again, Martin Rimm Principal Investigator It is interesting that in the first public post, Rimm listed four lawyers as part of the research team. In the April passage, Rimm indicates that no lawyers are members of the team. Of itself, this may seem unimportant until one asks whether this was, in fact, an authentic research TEAM. *QUESTION: Who, precisely, was on the research team, and what was their role? *QUESTION: Was this a legitimate research team, or was it simply window-dressing used to enhance the study's credibility? *QUESTION: Was, as Rimm claims, the data actually collected by a team, or was he, himself, the primary data-gatherer, using the language of research inappropriately? *QUESTION: If this was, in fact, a legitimate research team comprised of administrators and faculty, then what was their role in the demonstrable deception? If this research was in fact a true collaborative effort, would that not then also mean that that a score of CMU personnel are complicit in demonstrably unethical research? In the study, Rimm claims to have talked to a number of sysops, both by voice and e-mail. Robert Thomas, sysop of Amateur Action BBS, currently serving a sentence in a Federal penitentiary for making available adult material on his system that, while not illegal in his own state of California was illegal in Tennessee, was one of Rimm's research subjects. Rimm's account of events does not correspond with e-mail corespondence between Rimm and Thomas provided by Thomas's wife (CuD 7.59). *QUESTION: Did Rimm in fact communicate with all the sysops as he claimed? *QUESTION: Did Rimm's communication with the sysops indicate the kind of ethical impropriety that the released e-mail between he and Robert Thomas suggests? *QUESTION: Why doesn't the Committee of Investigation talk with Robert Thomas in order to ascertain how data from AA BBS were acquired? Early attempts to obtain a copy of the study from Rimm or the Georgetown Law Journal were barred by claims that the study was embargoed. In a December 18, 1994 post to Mike Godwin, Rimm claimed that the GLJ embargoed the study. In posts on The Well, a popular public access system in California, Time's Philip DeWitt claimed that he had an exclusive with Rimm. Kathy Ruemler, current editor-in-chief of the GLJ, wrote in a public Usenet post on September 6: V. RUMOR: TIME was restricted from having the study independently reviewed by an agreement with Law Journal. FACT: The Law Journal had no such agreement with TIME. Isn't TIME the one who referred to it as an exclusive? *QUESTION: Somebody seems to be lying. Who? An argument could be made that Rimm's advisor, Marvin Sirbu, and not Rimm, ought bear responsibility for improprieties in the study. After all, an advisor is ultimately responsible for assuring that proper ethical and methodological procedures are followed. In this case, such a judgment might be premature. In 1984, Rimm was involved in a study of high school gambling with Henry Lesieur, then a sociology professor at Johns Hopkins, and Bob Klein, reportedly a high school counsellor. Lesieur apparently was drawn to Rimm by his infiltration of a casino at 16: "That just intrigued me," he said. The study involved giving students in five high schools questionnaires. Rimm distributed them in one high school, Lesieur said. Was Rimm sufficiently apprised of ethical issues a decade ago such that he should be aware of appropriate behavior now? Lesieur could not say, but he observed: We had meetings and we went through the (ethical) protocols. ......... People didn't have to respond, it was totally anonymous. It (the study) went through human subjects, he was part of the process, and he followed the protocols. Although Rimm was a third author on a paper, Lesieur indicated that Rimm, in fact, did no writing. Now, it's unreasonable to expect a college undergraduate to fully understand the nuances of research ethics, let alone recall them a decade later. But, it's not unreasonable to expect that, given this apparent background in research, Rimm would not be aware that there are ethical protocols. Therefore, those who see Rimm as a "victim" of inadequate supervision have a weak case: Rimm was in a position to know that there are guidelines for protecting human subjects and that his own methodological descriptions indicates that he violated them. However, this still leaves several questions that Professor Sirbu might clear up. QUESTIONS FOR SIRBU Although Sirbu was quoted in a July New York Times story as saying that he never saw the final article that was submitted to GLJ, and that it was not the report he would have written, it is clear that he was closely involved with Rimm throughout the study. At issue here isn't the final article, but how Rimm could continue to collect data in ways that raise serious questions about why the advisor, who was professedly close to the study, did not engage in corrective intervention. In November correspondence with Mike Godwin, Sirbu claimed that he had no problem with the methodology and would be glad to discuss it. But, Sirbu seemed well-aware of the study long before that, as a memo to several CMU faculty and administrators indicates: Date: Tue, 27 Sep 1994 23:11:43 -0400 (EDT) From: Marvin Sirbu <ms6b+@andrew.cmu.edu> To: Erwin Steinberg <es2t+@andrew.cmu.edu>, Michael Caldwell Murphy <mm1v+@andrew.cmu.edu>, Don Hale <dh0c+@andrew.cmu.edu> Subject: Martin Rimm's research Cc: Jessie Barbour Ramey <jr3l+@andrew.cmu.edu>, Martin Rimm <mr6e+@andrew.cmu.edu> Gentlemen, I understand that you have been in touch with Martin Rimm regarding his research. Since Martin is currently working on this for credit under me, I have asked him if he would permit me to be included in any meetings that you may arrange. I have been meeting regularly with Martin since last Spring, and believe that he is nearing completion on a ground-breaking study that makes an important scholarly contribution. He has developed some very interesting methodological approaches, and has amassed a remarkable database of information on his chosen subject matter. As Martin and I have discussed, there is still much to do in interpreting the data. The bulk of his data collection focuses on privately operated Adult Bulletin Board Systems (BBS's) offering sexually oriented imagery. He has also examined partial data on the availability and consumption of such imagery at CMU from the Internet, although this data is not central to his work. We have had numerous discussions as to the most appropriate venue for publishing this work since it may appeal to groups as diverse as those concerned with telecommunications policy, law, mass communications, marketing science, or sociology of sexual deviance. We have also been discussing potential sources of external research support. Our most recent thinking has been to produce a Working Paper/Technical Report that could be disseminated from CMU pending determination of the most appropriate avenue for formal publication. Because of the subject matter, this research could provide fodder for everyone from the Kinsey Institute to Jerry Falwell to Andrea Dworkin, as have previous scholarly studies in this field. I might not have chosen myself to raise these issues via a message directly to the President, but sooner or later this study will come out and I suspect there will be significant interest among the press. It is certainly appropriate that CMU be prepared. Martin and I both concur that the way the research is publicized should be handled with great care, but I know that he is anxious, after working on this for more than a year, to get something out before he starts applying to graduate schools this fall. Among other things, Sirbu reveals his knowledge of Rimm's access to "availability and consumption" of the Usenet readership habits of CMU system users. It is well-established that users have a reasonable expectation of privacy. Sometimes, fulfilling administrative duties requires system administrators to monitor use, files, or other material that a user intends to be private. However, sometimes such monitoring raises questions. In the Rimm study, for example, users' Usenet newsgroup configuration files were systematically tabulated. Although reports differ on whether systems engineers or third parties monitored the files, it is clear that, according to the Rimm study, data on individuals were collected and compared, and the aggregate results then made public. It remains unclear whether, despite the serious appearance of impropriety, any breaches occurred. However, the question is of sufficient import to be addressed: *QUESTION: Did the acquisition of individual user information as described in Rimm's methodology, actually occur? If so, is such acquisition consistent with the ethical guidelines on human subjects? If Sirbu were as close to Rimm's study as his public pronouncements and private correspondence indicate, he surely would have, or should have, known of the practices Rimm employed. *QUESTION: "What did Sirbu know and when did he know it?" As Sirbu should know, "research team" has a special connotation among scholars. A research team is not a casual circle of people who may occasionally interact. Sirbu's professed close relationship with Rimm and involvement in Rimm's research would give him knowledge of whether a "research team," as the term is conventionally employed by reputable scholars, did in fact exist. Sirbu's claim (above) that some high-level faculty "collaborated" with Rimm adds credence to, and perpetuates the image of, an established group of professionals well-integrated into a research project directed by Rimm as "principal investigator." Given the fact the some "team" members were unaware that they were team members or have denied that they were members at all, one cannot help but suspect that the public is being deceived into believing that the study is more credentialed than it actually is. *QUESTION: Can Sirbu explain precisely what the "research team" members did to justify the label? *QUESTION: If there was, in fact, no "research team" in the conventional use of the term, why did Sirbu allow the fiction to persist? Perhaps the most important question Sirbu could address is the attempt to acquire funding for Rimm's project. It appears that Sirbu's attachment to the study included attempts to ride the funding gravy train by cashing in on Rimm's methodology. In November, Sirbu approached EFF's Mike Godwin to solicit EFF support for the project: Date: Mon, 7 Nov 1994 22:05:16 -0500 (EST) From: Marvin Sirbu <ms6b+@andrew.cmu.edu> To: mnemonc@eff.org Subject: Your visit to CMU As you may have gleaned from reading about the events at CMU, I have been working with Martin Rimm on a study of the availability and consumption of sexually explicit imagery on Adult BBS systems and, to a lesser extent, on Usenet. Xxxx Yyyy suggested that EFF might be interested in the work we've been doing. Among other things, we have data which could be analyzed to show the geographic distribution of consumers of adult BBS systems. Such data might be useful in countering or confirming assertions that "community standards" in places like Memphis are different from other regions of the country. I'll give you a call when we are both back in our respective cities. Marvin Sirbu Neither EFF's mission nor resources allow for such support, and the solicitation was rejected. But, federal funding remained a possibility. David Banks, a CMU statistics professor, provided some technical guidance for Rimm. According to Banks, in early November, 1994, he, Sirbu, and Rimm met to discuss what might be done with the paper. Rimm, reports Banks, needed money, because he sunk some of his own funds into the project. According to Banks: Also, Martin was aware that the Department of Justice had cut down AA BBS and seized their log files. And that info should contain names, log files, and it seemed reasonable to suspect that DOJ would have that set analyzed and that they would pay money for it. The grant attempted to link our interests with DoJ prosecutorial interests. According to Banks, the proposal had four research goals: 1) A summary of the statistics of "pornography" traffic that would identify the proportion of BBSes with a high percentage of material that might be worth prosecuting; 2) Consumption and usage trends over time: If pornography or pedophilia increases, then it would indicate that the BBS is trying to cultivate that market; 3) Information on individual downloads and covariance of user preferences that would correlate which types of files are most-likely to be associated other downloaded files; 4) "Placing it in the space of adult bulletin boards; adult BBSes have different personalities, characteristics, and specialties...who is the worst offender on pedophilia?" This, Banks explained, would allow DoJ to distribute its prosecutorial resources more effectively. Rimm was not listed as a co-principal investigator on the second round of grant submission, Banks explained, because DoJ would run the grant through CMU, which would be more difficult if Rimm were not a student. However, Rimm was written in as a consultant, according to Banks. Banks said that he often expressed his concern with ethical issues, both orally and in writing, and in July, 1995, he withdrew from the project because of these concerns. Why is the grant significant? The grant application raises serious ethical questions for Sirbu and Rimm. One fundamental canon of accepted ethical procedures is that researchers do nothing to put their subjects at risk (see CuD 7.58). Yet, that is precisely what this grant application would do. In his methodology, Rimm explains that he selected BBSes that were either the largest and most active "pornography" distributors, or that appeared to be aggressively moving into the "pornography" market (GLJ, 1995: 1876-77). If Banks's summary of the DoJ grant proposal is accurate, these BBSes are precisely those that the grant was designed to help prosecute, because they constitute the population that Rimm claimed to study. That Rimm and Sirbu then submitted a grant to the DoJ that could be used to bust the very people who were his subjects goes beyond any breach of research ethics that I can recall, ever, in the social sciences. This is not a minor lapse of ethics or an error in judgment. It is a fundamental violation of the most basic principles of the treatment of human subjects. Sirbu acknowledges that he was not only fully aware of Rimm's methodology, but that he would defend it. Hence, he was not unaware of the population of BBSes from which Rimm drew his data. From the existing evidence, it is clear that Sirbu was the driving force behind the DoJ grant that would put those subjects at severe risk. In fact, the grant was *DESIGNED* to put those subjects at risk. *QUESTION: How does Sirbu explain what appears to be a sanctionable violation of ethics? *QUESTION: In the (presumably required) Human Subjects application for CMU, did Sirbu fully apprise the Human Subjects review committee that, while there may be no "human subjects" in the proposed DoJ grant study, the research was designed to put at risk subjects of a previous (SURG) CMU funding of which he was the supervisor? There is a curious footnote relevant to the grant application. In the GLJ article, Rimm devotes considerable space to describing Amateur Action BBS, and calls the sysop, Robert Thomas, the Marquis de Cyberspace (GLJ: 1912). The propriety of the GLJ discussion has been discussed elsewhere (eg, CuD 7.58). What has not been discussed is Rimm's relationship with this research subject. Mike Godwin contacted Thomas's wife, and reports part of the response: That Martin Rimm was a member of the Amateur Action BBS, that he quarrelled publicly and privately with Robert and Carleen Thomas about how they ran their BBS (among other things, he wanted them to change the way their BBS software kept track of downloads), that his messages to them after they refused to comply with his "suggestions" grew angry and threatening, that he declared publicly that he would not renew his membership at Amateur Action, and that he *did* renew his membership in February of this year. Godwin also revealed that Thomas's wife produced the printout of a message from Rimm to Thomas in which which Rimm tells Thomas how much he admires him and how he hopes to be his "friend forever." In July, Godwin asked Thomas's wife if there were any information in her records pertaining to Rimm. Godwin summarized it on The Well: For example, his application for a renewal of his AABBS membership lists the same street address as that of the "Carnegie Press." A different phone number, though -- this one doesn't get you that weird message from the phone company when you call it. Instead, it just rings. Credit card number with (as I recall) an April 96 expiration date. Purchase on February 17 of a "six month" membership, which, according to Carleen, actually means he'll be current until August 17, 1995. Rimm first solicited membership in Amateur Action BBS in May of 1994. This is interesting since he's told at least one person that he didn't even know Robert Thomas's name until July of '94 when Thomas was convicted on obscenity charges in Memphis. Since the application from Rimm used in May of 1994 has Robert Thomas's name and address listed at the top, this seems unlikely. Want to know the best thing about the '94 application form? It was *mailed* in. It's filled out in Rimm's handwriting. If the records are accurate, Rimm, now involved in a funded study designed to facilitate prosecution of active "pornographic" BBSes, renewed his membership on the BBS that he described as the "market leader in adult pornography" (GLJ, 1854). Given Sirbu's professed close association with Rimm and the study's methodology, it is inconceivable that he was not aware of how the BBS data were collected. *QUESTION: Why did Sirbu not intervene to assure that ethical procedures were followed, given the evidence that they were not? *QUESTION: Did Sirbu himself conceal information about unethical data gathering? There are so many questions that CMU's Committee of Investigation could ask that only a portion can be suggested here. Whatever the answers to the above questions, it is clear that something rather unacceptable occurred in the conduct of this research. The visibility of the study and the use of the "findings" by policy-makers, which was an explicit intent of the study, require a thorough airing of these concerns. AN AFTER THOUGHT Here's why I continue to be concerned with the Rimm "Cyberporn" study and Carnegie Mellon's handling of the investigation of it. I teach research methods. I teach methods to sociology students in a senior capstone methodology course. I teach methods to graduate students in a seminar that draws students from several disciplines. In these courses, I include a strong ethical component. I'm not a dogmatic ethical purist, and I recognize the difficulty of walking the thin line between "ought" and "ought not." But, there are two fundamental principles I emphasize to students: 1) Always protect research subjects from any harm that your research may cause, and 2) Never deceive or lie to research subjects. It appears that not all at CMU share these precepts. Tonight I began the ethical component of the graduate methods seminar. The course is comprised of Masters and Doctoral students and Faculty. Each of the students has a topic, derived either as a course project or from their thesis/dissertation work. One student described a project that required "infiltration," deception of informants, and role-playing to secure the confidence of subjects. I thought of Rimm's study and the ethical message it would convey to this student: Research that specifies deceit and leads to harm is not only acceptable, but publishable in a reputable journal. "If they can do it at CMU, why can't we do it at NIU?" What can I say to the students and faculty about "real world" ethical behavior? What can I say to the student who argues that it may be acceptable to lie to subjects for the purpose of data gathering? How can I explain the proper role of a faculty research supervisor if a faculty advisor at a major research institution violates fundamental ethical precepts and the school seems to condone it? If Carnegie Mellon University remains silent on the questions raised, it will be complicit in a standard of research behavior that simply cannot be condoned. How CMU responds to the individuals involved is an internal matter that hopefully will be handled with compassion. However, this does not preclude an explicit and unequivocal statement, derived from a thorough investigation, that disavows both the Rimm study and the research model on which it is based. ------------------------------ Date: Sun, 19 Apr 1995 22:51:01 CDT From: CuD Moderators <cudigest@sun.soci.niu.edu> Subject: File 2--Cu Digest Header Info (unchanged since 19 Apr, 1995) Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically. CuD is available as a Usenet newsgroup: comp.society.cu-digest Or, to subscribe, send a one-line message: SUB CUDIGEST your name Send it to LISTSERV@VMD.CSO.UIUC.EDU The editors may be contacted by voice (815-753-0303), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115, USA. To UNSUB, send a one-line message: UNSUB CUDIGEST Send it to LISTSERV@VMD.CSO.UIUC.EDU (NOTE: The address you unsub must correspond to your From: line) Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on RIPCO BBS (312) 528-5020 (and via Ripco on internet); and on Rune Stone BBS (IIRGWHQ) (203) 832-8441. CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown) Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org In ITALY: ZERO! BBS: +39-11-6507540 In LUXEMBOURG: ComNet BBS: +352-466893 UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/ ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/ aql.gatech.edu (128.61.10.53) in /pub/eff/cud/ world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/ wuarchive.wustl.edu in /doc/EFF/Publications/CuD/ EUROPE: nic.funet.fi in pub/doc/cud/ (Finland) ftp.warwick.ac.uk in pub/cud/ (United Kingdom) JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD The most recent issues of CuD can be obtained from the Cu Digest WWW site at: URL: http://www.soci.niu.edu:80/~cudigest/ COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ------------------------------ End of Computer Underground Digest #7.73 ************************************