There's lots of talk and rumors spinning around about how deep the I-tech groupies are in electronic monitoring and recording for the dome.
Are the concerns that phone logs, internet sites visited, and e-mail correspondence is being watched or is it that phone lines are actually being tapped. I understand that is only the latter that is illegal.
Good question. Suddenly I am receiving NO email from my old buddies on campus, not even jokes (well, maybe that's a good thing) but the silence the past few weeks has been deafening. Since a couple of these people are very tech-savvy, it has worried me, but I can't email them to ask!
No one I know is corresponding through campus email or on campus telephones anymore about anything that isn't strictly "bidness."
I know some very established, well-respected profs who wait until they are home on their personal phones and PCs to talk and email. Each believes that campus phones and computers are being monitored--especially those of the "usual suspects:" the people who are and have been the most outspoken against the administration.
My advice is to tread lightly on campus equipment...
An anecdote: a week ago, one of these professors threatened to call iT to come remove his phone and computer, since he might be fired for "misusing university equipment" should he receive a call from his wife or an email from his grandchildren.
You know, whether or not it is going on (and I am one of those who leans toward believing it is going on), it says a helluva lot about the stifling atmosphere on campus. Paranoid is right, but for good reason.
As Woody Allen said, "Just because I am paranoid doesn't mean they aren't out to get me."
I heard from a member of the USM staff that he decided to look on this web site while at work one day and an eye came up on the screen that said something to the effect of "You are being watched by spyware." Looking at this site would definately be "misuse of university equipment," huh! Just hope ST dosen't find out.
quote: Originally posted by: " You know, whether or not it is going on (and I am one of those who leans toward believing it is going on), it says a helluva lot about the stifling atmosphere on campus. Paranoid is right, but for good reason. As Woody Allen said, "Just because I am paranoid doesn't mean they aren't out to get me.""
The assumption among the faculty is they are being monitored. Increasingly, people are using home computers and cell phones for private communications. The atmosphere is toxic. It's hard to believe it's a university in 2004 rather than 1984. Dr. Hartwig was right on about the KGB.
It's probably time for some IT people to Do The Right Thing and talk. Remember, in the great scheme of things, "I was only following orders" is not much of an excuse.
The tendency to off subordinates who knew too much about the crimes of their superiors was especially marked under totalitarian regimes. Stalin routinely had his murderers murdered so that there was no "memory" of his crimes. The NKVD teams who massacred over 27,000 Polish officers, businessmen, government employees and clerics during WWII, for example, were all liquidated.
quote: Originally posted by: Paranoid "There's lots of talk and rumors spinning around about how deep the I-tech groupies are in electronic monitoring and recording for the dome. Are the concerns that phone logs, internet sites visited, and e-mail correspondence is being watched or is it that phone lines are actually being tapped. I understand that is only the latter that is illegal. "
Even if there isn't any surveillence, the fact that everyone is worried about it (and has been since last year), says a great deal about the atmosphere under the Thames administration. It doesn't have to be literally true to be significant.
quote: Originally posted by: foot soldier "Even if there isn't any surveillence, the fact that everyone is worried about it (and has been since last year), says a great deal about the atmosphere under the Thames administration. It doesn't have to be literally true to be significant."
quote: Originally posted by: GIGO "I won't argue with that statement."
Will be interesting to see if any of Shelby's evidence against Frank or Gary include taped phone conversations. I have no doubt that their computers were being monitored after they began the Dvorak investigation. NO doubt.
I would guess that some of the more outspoken critics of Thames are being technologically "watched" too. Polk, Henry, Scarborough, possibly Judd, probably Chambers. (D@mned "arts" professors! )
Hopefully, the rumors about surveilance don't turn out to be true. But I can totally understand the worries, more so since the suspensions. After all, aren't Frank Glamser and Gary Stringer charged with something like misusing USM property in the form of phones/computers in the course of the Dvorak investigation? Regardless of whether the charges themselves have merit, the administration's act of charging them with something like that implies that somehow somebody knew what was being said on USM phones and written USM computers. I think that this idea was already expressed in a speech at the faculty convocation, but I can't quite remember by whom. I'm not trying to sound like a conspiracy hound or anything, but I think that the many faculty members and staff persons who are being careful with what they say or send on campus lines are acting reasonably based on the information available to them. Prudence can't hurt anything in this situation.
quote: Originally posted by: Hellgirl "Hopefully, the rumors about surveilance don't turn out to be true. But I can totally understand the worries, more so since the suspensions. After all, aren't Frank Glamser and Gary Stringer charged with something like misusing USM property in the form of phones/computers in the course of the Dvorak investigation? Regardless of whether the charges themselves have merit, the administration's act of charging them with something like that implies that somehow somebody knew what was being said on USM phones and written USM computers. I think that this idea was already expressed in a speech at the faculty convocation, but I can't quite remember by whom. I'm not trying to sound like a conspiracy hound or anything, but I think that the many faculty members and staff persons who are being careful with what they say or send on campus lines are acting reasonably based on the information available to them. Prudence can't hurt anything in this situation."
Let's not forget that, prior to the Shelby charging the professors with misusing computers and phones, he and Hanbury conducted a six-week investigation. Now, how would you investigate for six weeks misuse of phones and PCs unless you were monitoring them?
Yes, he sent a message to everyone on campus. Watch what you say and where you say it.
By the way, there was a Printz article a couple of weeks ago on this very topic. The iTech guy who was interviewed said that USM did indeed have the capability to monitor computers (we already knew that) but that they didn't have time to monitor the 3,000 computers on campus.
I don't think anyone believes they are monitoring EVERY computer on campus--just probably those in the offices of the thorns in Shelby's side.
quote: Originally posted by: Hellgirl "Sorry, FS... I guess we were on the same train of thought."
Hey, no need to apologize! That we are thinking alike demonstrates that these suspicions aren't emanating from conspiracy loons, but from reasonable people with valid concerns.
quote: Originally posted by: usmstudent "I heard about faculty suspicions of monitering of e-mails a while before the firings. Thare has been talk of it for a while, I think."
I've heard talk of possible surveillence for quite a while as well. It was definetly an issue that worried people before the firings; it has just exploded since then.
Some surfers may have questions about privacy while accessing these sites on campus, but, Isaac Johnston, director of the iTech infrastructure unit, said currently USM does not have the capacity to monitor the web surfing patterns of users on the over 3,000 campus-wide computers.
"The volume of data that would be generated by this sort of monitoring would quickly exceed our storage capacity and identifying the sites that a single person visited in this volume of data would be difficult at best," said Johnston.
Johnston said every Web server visited, including hits from USM campus computers, logs certain information about the visit, including the computer's network address, the Web client and accessed pages.
"In general, this information is used to track server load and plan for future growth, but in isolated cases, the data collected can be of a much more invasive nature," said Johnston.
In the case of the USM Web server, the information collected is not sufficient to identify the individual that visited the Web site, he said. "But it is dangerous to assume that you are completely anonymous while browsing the Web." http://www.usm.edu/printz/archives/04082004/internet.html
quote: Originally posted by: former-staffer "Good question. Suddenly I am receiving NO email from my old buddies on campus, not even jokes (well, maybe that's a good thing) but the silence the past few weeks has been deafening. Since a couple of these people are very tech-savvy, it has worried me, but I can't email them to ask!"
The system has definitely been under virus attack the last few weeks. A number of my friends have home computers that have been infected through logging into the usm site. Whole areas of the campus have been shut down for extended periods of time. It is possible that some of the breakdown is from that. On the other hand it pays to be cautious. I'm so out at this point that I don't worry about them looking . . . I go to my home computer or cell when it involves strategizing or communicaiting with people I don't want to compromise.
Woohoo! Shelby is the source of all the viruses at the university. Direct cause and effect relationship established, shelby becomes president and USM internet becomes modern enough to be recognized by viruses. Nail him to the cross for modernizing us, they did it to fleming for trying.
quote: Originally posted by: "Here's what itech say about the topic: Some surfers may have questions about privacy while accessing these sites on campus, but, Isaac Johnston, director of the iTech infrastructure unit, said currently USM does not have the capacity to monitor the web surfing patterns of users on the over 3,000 campus-wide computers. "The volume of data that would be generated by this sort of monitoring would quickly exceed our storage capacity and identifying the sites that a single person visited in this volume of data would be difficult at best," said Johnston. "
Therefore, only selected people will be monitored.
quote: Originally posted by: someone "Woohoo! Shelby is the source of all the viruses at the university. Direct cause and effect relationship established, shelby becomes president and USM internet becomes modern enough to be recognized by viruses. Nail him to the cross for modernizing us, they did it to fleming for trying."
When Dr. Thames became President, one of the very first things he did was begin to control lines of communication -- phones, computers, etc. Henc, for example, the policy that one's computer could be seized. It was starting when I was there. A good virus scare is a good excuse to keep the computer system at least partially unuseable, and I will right now say yes, that does sound pretty paranoid. Doesn't the Glamser-Stringer experience PROVE that your lines of communication are compromised? And, what happens to G & S's computers? What happens to the work, particularly work done in collaboration with off-campus researchers, which was in progress?
A word to the wise -- before I left, I was amazed to see how much personal stuff had accumulated on my university computer. I started emailing it home, and deleting it from the work site.
Here's a thought to those who object to me using the computer and phone at work for personal business: is it more efficient to make a 2-minute call, or to take half the day off tp handle the same situation? Frankly, I considered the computer a perk in lieu of a real salary.
quote: Originally posted by: former-staffer " Here's a thought to those who object to me using the computer and phone at work for personal business: is it more efficient to make a 2-minute call, or to take half the day off tp handle the same situation? Frankly, I considered the computer a perk in lieu of a real salary."
And what of those who work long hours? Same deal. I spend most of my day and well into the evenings at work. Sad to say, work pretty much IS my home. If I can't use the uinversity computer for personal communications, then I am a lot less likely to work my long hours, which the university isn't paying me for.
quote: Originally posted by: someone "Woohoo! Shelby is the source of all the viruses at the university. Direct cause and effect relationship established, shelby becomes president and USM internet becomes modern enough to be recognized by viruses. Nail him to the cross for modernizing us, they did it to fleming for trying."
Hahahaha! You are saying that the only reason the computer system has been attacked by viruses is because it was updated? I have a 1996 model Gateway running Windows 95 on dial-up that was "attacked" a couple of years ago. I don't think modernization has anything to do with a computer's susceptiblity to viruses or worms.
As for nailing Thames to a cross, sorry, but I don't see him as any kind of tragic Christ figure. He brought on himself his own demise.
ah the voice of experience - in the old days this happened. Sorry, but if you paid attention to the recent worms they are denial of service ones that go after the switches not like the ones that one gets from not updating ones software protection software.
quote: Originally posted by: someone "ah the voice of experience - in the old days this happened. Sorry, but if you paid attention to the recent worms they are denial of service ones that go after the switches not like the ones that one gets from not updating ones software protection software."
And any server, "modernized" or not, can be susceptible to DOS attacks.
And let me add that DOS attacks are targeted. Usually the server that is attacked is attacked for a reason, for "offending" someone. I wonder if Shelby's role in the current crisis subjected USM's servers to this DOS attack. My understanding is that this attack came from out of state.
quote: Originally posted by: someone "ah the voice of experience - in the old days this happened. Sorry, but if you paid attention to the recent worms they are denial of service ones that go after the switches not like the ones that one gets from not updating ones software protection software."
Personally, I'm rather surprised that some underground group hasn't already deployed a massive DDoS attack on USM's infrastructure, either in sympathy to G&S or to make it look like the G&S supporters are indeed breaking the law. I've yet to see the word "hacktivism" used in this situation, but that doesn't mean somebody isn't ready to do it (or counterhactivism).
quote: Originally posted by: Johnston said every Web server visited, including hits from USM campus computers, logs certain information about the visit, including the computer's network address, the Web client and accessed pages. "In general, this information is used to track server load and plan for future growth, but in isolated cases, the data collected can be of a much more invasive nature," said Johnston. In the case of the USM Web server, the information collected is not sufficient to identify the individual that visited the Web site, he said. "But it is dangerous to assume that you are completely anonymous while browsing the Web." http://www.usm.edu/printz/archives/04082004/internet.html"
Just wanted to establish that this is nothing special. Any website that you visit will likely log information about you, and any Internet service provider that you sign up with will log information about your web activity. Since USM is essentially the web service provider for all of campus, they are collecting (logging) activity too.
Not to say that this cannot be turned toward evil ends - because it can. However, the fact that USM employs logging of web site activity is really nothing unusual at all. Some peopel may be surprised, if not horrified, to know what other providers and web sites might be able to discern about their browsing habits.
First, a serious observation: Logging is routine in all systems. However, barring a court order, most IT departmentss aren't about to "monitor" those logs except for "intrusion detection" because they are, as a rule, overworked & understaffed.
Second, a semi-serious recommendation: If this bothers you so much, get familiar with encryption or
... or IP spoofing. Using this wonderful technology, you can make it appear that your regular visits to Fire Shelby, rotten.com, or even kiddie p0rn sites originated in the Dome
quote: Originally posted by: Invictus "[Activeboard ate my homework] ... or IP spoofing. Using this wonderful technology, you can make it appear that your regular visits to Fire Shelby, rotten.com, or even kiddie p0rn sites originated in the Dome "
Great idea and is exactly what I did in my last months there . . .
quote: Originally posted by: Hellgirl "After all, aren't Frank Glamser and Gary Stringer charged with something like misusing USM property in the form of phones/computers in the course of the Dvorak investigation? Regardless of whether the charges themselves have merit, the administration's act of charging them with something like that implies that somehow somebody knew what was being said on USM phones and written USM computers. "
There are other ways to get this information other than taping phones or computers. For the sake of argument and to use as an example, let’s say that the case against Glamser and Stringer is that they called/emailed UK and mislead them as to their identities or something like that. The person at UK could have saved the email or printed it out or if it was a phone call, the person could give a deposition about the call. This would explain why Shelby ordered the locks changed and the computers confiscated so they could prove that the emails did in fact come from Glamser or Stringer. If there was some type of spyware on the computer, they would already have the proof they needed.
Overall, I think people are giving iTech too much credit. With the exception of a few exceptional individuals, I have never found iTech to be overly competent.